1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Leokris [45]
2 years ago
6

Which of the following methods could be considered a "best practice" in terms of informing respondents how their answers to an o

n-line survey about personal information will be protected?
A. Respondents are informed that investigators will try to keep their participation confidential; however, confidentiality cannot be assured.
B. Respondents are informed that a research assistant will transfer all the research data to a password-protected computer that is not connected to the internet, via a USB flashdrive. The computer is located in a research team member's office.
C. The investigator uses the informed consent process to explain her institution's method for guaranteeing absolute confidentiality of research data.
D. The investigator uses the informed consent process to explain how respondent data will be transmitted from the website to his encrypted database without ever recording respondents' IP addresses, but explains that on the internet confidentiality cannot be absolutely guaranteed.
Social Studies
2 answers:
Anton [14]2 years ago
7 0

The “best practice” for this case is that the investigator uses the informed consent process to explain how respondent data will be transmitted from the website to his encrypted database without ever recording respondents' IP addresses, but explains that on the Internet confidentiality cannot be absolutely guaranteed. This is one of the essential ethics for conducting internet-based research.

 

EXPLANATION:

Five online research methods are widely used by scholars because of the precise nature of the offered results:

1. Online focus group

Online focus group is a subgroup of online research techniques. Online focus groups is the method that is typically used for consumer research, a B2B research, and political research. A moderator is appointed to do and oversee a focus group that invites pre-selected participants and meets the requirements representing certain areas of interest to be part of this focus group at a certain time. Respondents are usually given an incentive to be a part of the discussion which is usually one hour and 90 minutes.

2. Online interview

This method is very similar to a face-to-face interview. However, it differs in terms of the needed standard practices, comprehending with sampling and respondents. Online interviews are arranged using a variety of computer-mediated communications (CMC), basically, SMS or Email.  

On the foundation of response time for this interview, they are categorized into asynchronous and synchronous methods. Synchronous online interviews are taken through media such as online chat, where the responses are received in real-time whereas asynchronous online interviews are those that occur via Email where responses are usually not in real-time.  

Similar to that of face-to-face interviews, online interviews investigate respondents' thoughts and feedback on a certain topic to gain insight into their experiences, attitudes, or ideas.

3. Online qualitative research

In addition to online focus groups online and online interviews, there are a variety of aspects of online qualitative research. These aspects comprise mobile diaries, blogs, and communities. These methods support cost and time savings and are very convenient for scholars to collect information for their research topics.  

The sophistication level brought by online qualitative research methods is better than other traditional forms because respondents can be recruited from panels, existing databases, or can be added by doing surveys.

4. Online text analysis

This technique of analysis is an augmentation of existing text analysis since the 17th century which is a group of various online research examples that are used to gain insights from content which is available online. By utilizing this online research technique, scholars can explain the format of written, verbal or graphic communication.  

Categories such as paragraphs, web pages, sentences, pseudo sentences, documents, etc. It is usually used for quantitative research but for better text interpretation, scholars also use qualitative techniques.

5. Social network Analysis

Social network analysis is an emergent online research technique that is obtaining acceptance because of the increasing adoption of social networking devices. By doing social networks analysis, a scholar can map and measure relationships and flows between people, URLs, organizations, computers or groups using graph theory.  

For example, the newest meme culture has advanced a new social structure where related people are referred to as “memes” and "nodes" are "connection" between these nodes.

LEARN MORE

If you’re interested in learning more about this topic, we recommend you to also take a look at the following questions:

• Which is an online research source that not considered reliable? brainly.com/question/11333105

• When conducting research online for an easy which tip should the researcher follow? brainly.com/question/12314449

KEYWORDS : Online Research Methods, Personal Information on Online Research

Subject  : Social Studies

Class  : 10-12

Sub-Chapter : Research Ethics

Andre45 [30]2 years ago
6 0

Answer:

D. The investigator uses the informed consent process to explain how respondent data will be transmitted from the website to his encrypted database without ever recording respondents' IP addresses, but explains that on the internet confidentiality cannot be absolutely guaranteed.

Explanation:

Keep in mind that breach of information during on-line survey could be the researcher's fault or subject's fault, depending on how they secure their internet connection.

- Method A is not suitable because of this phrase:   'confidentiality cannot be assured' .  This will make the subject thinks that the researchers are not taking responsibilities in protecting the information.

-Method B is not suitable because it create a physical location where people could come in and directly steal the data of all the subjects,

- Method C is not suitable because it does not educate the subjects with the possibilities that they can personally made the mistake that can cause the breach of information.

- Method D is the most suitable because it conveys that the research team is making their full efforts to ensure the anonymity of the subjects and also educate them regarding the possibilities of breach information from the subject's mistake. (it would be even better if the investigator advised the subjects to use trusted VPN services.)

You might be interested in
Which of the following actions is an example of impersonation?
Tamiku [17]
Answer: C

Voting under another citizen’s name is included as impersonation.
5 0
2 years ago
Read 2 more answers
Which statement best describe the realationship between power and authority
Nana76 [90]

Answer:

Authority most often comes from the duties and responsibilities delegated to a position holder in a bureaucratic structure

Power is the possession of authority, control, or influence by which a person influences the actions of others, either by direct authority or by some other, more intangible means

Explanation:

8 0
2 years ago
Salient features of the post industrial society
sveticcg [70]

<span>The salient features of the post industrial society is marked by the increased value of knowledge. This increased knowledge shows what benefits of the economic employment patterns gives if managed correctly. The increased creativity thru tertiary education as shown how the young ones uses technology to create something.</span>

6 0
3 years ago
Which country controlled Louisiana during the French and Indian war
EastWind [94]

Answer:

Great Britain

Explanation:

3 0
3 years ago
According to personality psychologists, leader traits will play a stronger role shaping leader behavior in what type of situatio
Mrac [35]

Answer: From a leadership perspective, a person's traits play a stronger role in their leader behavior and ultimately leader effectiveness when the situation permits the expression of their disposition. Thus, personality traits prominently shape leader behavior in weak situations.

Explanation:

7 0
2 years ago
Other questions:
  • Why is reforestation important?
    15·1 answer
  • What trophic level does the lizard fill in the food web?
    9·2 answers
  • In Ireland, what does the color green stand for?<br><br> Spring <br> Countryside <br> Hope
    15·2 answers
  • Kyle is 3 years old. Anytime he attempts to play with his sister's dolls or in her play kitchen, he is scolded by his parents an
    8·1 answer
  • Describe the ways in which the U.S. government, local governments, and/or individuals attempted to interfere with the specific c
    14·1 answer
  • A focus on how we learn observable responses is most relevant to the ____________ perspective.
    7·2 answers
  • What was the main problem between the North and the South?
    10·1 answer
  • Kyle writes an essay about indentured servants in the 1800s:
    8·2 answers
  • ईस्ट इडिया कंपनी ने सहायक संधि के द्वारा भारतीय<br>रियासतो पर किस प्रकार कब्जा किया?​
    7·1 answer
  • What are some manufactured products in the Midwest?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!