Presentation is loading. Please wait.

Presentation is loading. Please wait.

1 Second Edition Dr. Wasim Al-Habil. Chapter 5...................... Chapter 5...................... Research Methods for Business Students Research Methods.

Similar presentations


Presentation on theme: "1 Second Edition Dr. Wasim Al-Habil. Chapter 5...................... Chapter 5...................... Research Methods for Business Students Research Methods."— Presentation transcript:

1 1 Second Edition Dr. Wasim Al-Habil. Chapter 5...................... Chapter 5...................... Research Methods for Business Students Research Methods for Business Students Mark Saunders, Philip Lewis and Adrian Thornhill

2 2 Chapter 5 Research Methods for Business Students

3 3 Key Topics Aware of issues related to gaining access and research ethics. Able to evaluate a range of strategies to help you to gain access to organizations and to individual participants. Able to anticipate ethical issues at each stage of your research process, to help you to deal with these. Able to evaluate the ethical issues associated with particular data collection methods.

4 4 Previously … we looked at turning Research ideas into Research Projects Move from a Research idea To a General Focus Research Question To a series of Research Questions To Specific Research Objectives

5 5 And we considered..The literature review process Research questions and objectives Define parameters Generate and refine key words Conduct search Obtain literature Evaluate Record Start drafting review ……….after several iterations (repetition)… Written critical review of the literature….. Feedback loop

6 6 Differing approaches to research Data collection methods Research strategies Time horizons Research approaches Research philosophy

7 7 Wish to research Formulate and clarify your Research topic Critically review the literature Choose your research approach and strategy Negotiate access and address ethical issues Plan your data collection and collect the data using one or more of : SamplingSecondary dataObservationSemi-structured and in-depth interviewsQuestionnaires Analyse your data using one or both of: Write your project report Submit your report Quantitative methodsQualitative methods The research Process Reflection and review at each stage

8 8 5.1 Introduction Access and ethics are critical aspects for the conduct of research. Insufficient attention may therefore be paid to gaining access and even less to the likelihood of ethical concerns arising in relation to the conduct of the research project. These are aspects that require careful attention at the outset of any research project.

9 9 5.2 Problems associated with access Your ability to collect data will depend on gaining access to their source or to appropriate sources where there is a choice. The appropriateness of a source will, of course, depend on your research question, related to objectives and strategy. The first level of access is physical access or entry. Gaining physical access can be difficult for number of reasons.

10 10 5.2 Problems associated with access Why gain physical access is difficult? Physical access or entry - obstacles include:  time and resources available in an organization.  lack of perceived value of your work  potentially sensitive topic area  concerns over confidentiality  perceptions of researcher’s credibility or competence  a change in external events force refusal You may need to re-consider your case study, your research questions and objectives.

11 11 5.2 Problems associated with access Access is a process not an event – you may need to visit other parts of the org. and need to re-negotiate access each time. The gatekeepers with who you negotiate access may not be the actual participants in the research. How representative are those who you actually Interview on the ‘shopfloor’? Who chooses them? This affects reliability and validity.

12 12 5.2 Problems associated with access Cognitive Access is your ability to understand the social reality of the org. in relation to your research q’s. Tip: If you are clear enough in advance about your research q’s and objectives then this will enhance your credibility with the gatekeepers and facilitate both types of access. Don’t just expect permission for access to be granted.

13 13 5.2 Problems associated with access Cognitive access will lead you to gain access to the data that you need your intended participants to share with you in order to understand their social reality and to be able to address your research question and objectives. Access is likely to be a problem area, in terms of gaining permission for physical access, maintaining that access, and being able to create sufficient scope to address fully the research question and objectives that guide your work.

14 14 5.2 Problems associated with access The extent to which feasibility will affect the nature of your research, or at least the approach that you adopt. A request to undertake research may involve you seeking access to a range of participants based on an organizational sample.

15 15 5.2 Problems associated with access Operating as an external researcher is likely to pose problems, so you need to remain sensitive to the issue of goodwill and seek to foster it at each level. An internal or participant researcher is also likely to face problems of access to data. And your status in the organization may pose particular problems in relation to cognitive access.

16 16 5.3 Strategies to gain access The need to identify a feasible research question and objectives, from the perspective of gaining access. Personal entry to an organization will be less applicable where you send a self- administered, postal questionnaire to organizational participants, in situations where you do not need to gain physical access in order to identify participants.

17 17 5.3 Strategies to gain access Summary of strategies to gain access: 1. 1. Allowing yourself sufficient time 2. 2. Using existing contacts and developing new ones 3. 3. Providing a clear account of purpose and type of access required 4. 4. Overcoming organizational concerns about the granting of access

18 18 5.3 Strategies to gain access Summary of strategies to gain access: 1. 1. Identifying possible benefits to the organization in granting you access 2. 2. Using suitable language 3. 3. Facilitating ease of reply when requesting access 4. 4. Developing your access on an incremental basis 5. 5. Establishing your credibility with intended participants

19 19 5.3 Strategies to gain access Allowing yourself sufficient time: Physical access may take weeks or even months to arrange, and in many cases the time invested will not result in access being granted. If you are able to contact a participant directly, such as manager, and exchange of correspondence may be sufficient to gain access.

20 20 5.3 Strategies to gain access Allowing yourself sufficient time: In the situation where your intended participants are not the same people who grant you physical access, you will need to allow further time to gain their acceptance. Once you have gained physical access to the organization and to your participants, you will be concerned with gaining cognitive access.

21 21 Table 5.2 Summary checklist to gain access Allow yourself plenty of time  Be prepared to make a follow-up telephone call or email  Allow time for your request to be considered and evaluated  You may be called in to an explanatory meeting  Understanding the org. culture takes time (Cognitive access)

22 22 5.3 Strategies to gain access Using existing contacts and developing new ones: The use of known contacts will depend largely on your choice of research strategy and approach to selecting a sample, as suggested by your research question and objectives. You will need to be able to identify the most appropriate person to contact for help, either directly or indirectly. You may consider making a direct approach to an organization in an attempt to identify the appropriate person to contact in relation to a particular research project.

23 23 5.3 Strategies to gain access Using existing contacts and developing new ones: You may consider using the Internet to send a written request to such a person. Contact a broker or a gatekeeper Suggesting approaching an organization's personnel manager because this person will have contacts across the organization and can therefore be very helpful in terms of facilitating access.

24 24 5.3 Strategies to gain access Providing a clear account of purpose and type of access required: Providing a clear account of your requirements will allow your intended participants to be aware of what will be required from them. Establishing your credibility will be vital in order to gain access.

25 25 5.3 Strategies to gain access Overcoming organizational concerns about the granting of access: Concerns about the amount of time or resources that will be involved in the request for access. Sensitivity about the topic. The confidentiality of the data that would have to be provided and the anonymity of the organization or individual participants.

26 26 5.3 Strategies to gain access Possible benefits to the organization of granting you access: A discussion may allow them to think through an issue and to reflect on the action that they have adopted to manage it. The intention would be to provide each of your participants with something of value and to fulfill any expectations about exchange between the provider and receiver of the research data, thereby prompting some of those whom you approach to grant access.

27 27 5.3 Strategies to gain access Possible benefits to the organization of granting you access: Where access is granted in return for supplying a report of your findings it may be important to devise a simple contract to make clear what has been agreed.

28 28 5.3 Strategies to gain access Using suitable language: Some researchers advise against referring to certain terms used in relation to research activity when making an approach to an organization for access, because these may be perceived as threatening or not interesting to the potential participant. Use of language will depend largely on the nature of the people you are contacting.

29 29 Table 5.2 Summary checklist to gain access Exercise care and attention in your use of language, so that it is appropriate to the person who receives it without any hint of being patronising, threatening or boring. In your introductory letter:  Refer to yourself as a ‘researcher’ not a ‘student.’  Draft and re-draft.  See example in textbook.

30 30 5.3 Strategies to gain access Facilitating ease of reply when requesting access: The inclusion of a simple pro forma for recipients of your written requests for access to use generally ensures a reply. It may not be suitable in all cases, and should be designed to fit the research method being used.

31 31 5.3 Strategies to gain access Developing your access on an incremental basis: Reference has been made above to the strategy of achieving access by stages: 1. 1. The first stage involved a request to conduct interviews. 2. 2. The next stage involved negotiating access to undertake observation. 3. 3. The final stage was in effect an extension to the second stage and involved gaining permission to tape-recorded the interactions being observed.

32 32 5.3 Strategies to gain access Developing your access on an incremental basis: There are potentially a number of advantages related to the use of this strategy. Using an incremental strategy at least gains you access to a certain level of data. As you establish your credibility, you can develop the possibility of achieving a fuller level of data.

33 33 5.3 Strategies to gain access Developing your access on an incremental basis: A further advantage may follow from the opportunity that you have to design your request for further access specifically to the situation and in relation to opportunities that may become apparent from your initial level of access. But the incremental process will be time consuming, and you need to consider the amount of time that you will have for your research project before embarking on such a strategy.

34 34 5.3 Strategies to gain access Establishing your credibility with intended participants: Just because you have been granted entry into an organization, you will not be able to assume that those whom you wish to interview, survey or observe will be prepared to provide their cooperation.

35 35 5.4 Research Ethics Definition: “..a code of behaviour appropriate to academics and the conduct of research.” (Wells 1994, in Saunders et al)  See Appendix 3 for a code of ethics.  Watch out for social norms and power relationships.

36 36 5.4 Research ethics Define research ethics: Ethical concerns will emerge as you plan your research, seek access to organizations and to individuals, collect, analyze and report your data. Ethics refers to the appropriateness of your behavior in relation to the rights of those who become the subject of your work, or are affected by it.

37 37 5.4 Research ethics Define research ethics: The conduct of your research may be guided by a code of ethics. A code of ethics will provide you with a statement of principles and procedures for the conduct of your research. You may also be required to submit your research proposal to a faculty or institutional research ethics committee.

38 38 5.4 Research ethics Define research ethics: Researchers need to be sensitive to the way in which the granting of access affects this type of relationship. In addition, as a research in an organizational setting you will need to remain sensitive to the fact that your presence is a temporary one, whereas the people from whom you collect data will need to work together after you depart.

39 39 5.4 Research ethics Nature and scope of ethical issues in business and management: 1. 1. Ethical issues that affect the research process generally 2. 2. Ethical issues during the design and initial access stages 3. 3. Ethical issues during the data collection stage 4. 4. Data protection and research

40 40 5.4 Research ethics Ethical issues that affect the research process generally: 1. 1. Privacy of possible and actual participants 2. 2. Voluntary nature of participation and the right to withdraw partially or completely from the process 3. 3. Consent and possible deception of participants 4. 4. Maintenance of the confidentiality of data provided by individuals or identifiable participants and their anonymity 5. 5. Reactions of participants to the way in which you seek to collect data 6. 6. Effects on participants of the way in which you use, analyze and report your data 7. 7. Behavior and objectivity of the researcher

41 41 5.4 Research ethics Ethical issues during the design and initial access stages One of the key stages at which you need to consider the potential for ethical problems to arise is when you seek initial access. The nature of participant consent See figure 5.1 in page 133

42 42 Fig 5.1 The nature of participant consent Lack of consent Implied of consentInformed consent Participant lacks knowledge Researcher uses deception to collect data

43 43 Fig 5.1 The nature of participant consent Lack of consent Implied of consentInformed consent Participant does not fully understand her/ his rights Researcher implies consent about the use of data from fact of access or return of questionnaire

44 44 Fig 5.1 The nature of participant consent Lack of consent Implied of consentInformed consent Participant consent given freely and based on full information about participation rights and use of data

45 45 5.4 Research ethics Ethical issues during the data collection stage The data collection stage is associated with a range of ethical issues. Some of these are general issues that will apply to whichever method is being used to collect data. Other issues are more specifically related to a particular method of collecting data. Once participants have agreed to take part in your research, they still maintain their right to privacy.

46 46 5.4 Research ethics Ethical issues during the data collection stage: During the data collection stage, objectivity means making sure that you collect your data accurately and fully – that you avoid exercising subjective selectivity in what you record. Confidentiality and anonymity have also been shown to be important in terms of gaining access to organizations and individuals. Use of the Internet and email during data collection will lead to the possibility of serious ethical, or netiquette, issues related to confidentiality and anonymity.

47 47 5.4 Research ethics Ethical issues during the data collection stage: The ability to explore data or to seek explanations through qualitatively based methods means that there will be greater scope for ethical and other issues to arise in relation to this approach to research. The relatively greater level of control associated with qualitatively based research methods should be exercised with care so that your behavior remains within appropriate and acceptable parameters

48 48 5.4 Research ethics Ethical issues during the data collection stage: The use of observation techniques raises its own ethical concerns. The boundaries of what is permissible to observe need to be clearly drawn. Where access is denied after being requested you may have no other choice but to carry out covert observation – where this is practical. One group who may consider suing a covert approach are those of you whom we refer to as internal or practitioner- researchers. There are recognized advantaged and disadvantages associated with being an internal researcher.

49 49 5.4 Research ethics Ethical issues related to the analysis and reporting stages: The maintenance of you objectivity will be vital during the analysis stage to make sure that you do not misrepresent the data collected. The ethical issues of confidentiality and anonymity also come to the fore during the reporting stage of your research. Embarrassment and even harm could result from reporting data that are clearly attributable to a particular individual.

50 50 5.4 Research ethics Ethical issues related to the analysis and reporting stages: Where you are aware that your findings may be used to make a decision that could adversely affect the collective interests of those who were your participants, it may be ethical to refer to this possibility even though it reduces the level of access that you achieve.

51 51 5.4 Research ethics Ethical issues related to the analysis and reporting stages: This discussion about the impact of research on the collective interests of those who participate brings us back to the reference made above to the particular ethical issues that arise in relation to the analysis of secondary data derived from survey research.

52 52 5.4 Research ethics Data protection and research: an introduction Personal data should be finely protected. You should instead seek advice that is appropriate to the particular circumstance of your research project where this involves the collection and processing of personal data. Further category of personal data: Racial/ethnic origin, political opinions, religious, trade union membership etc.

53 53 5.5 Summary Access and ethics are critical aspects for the conduct of research. Different types and levels of access have been identified that help us to understand the problem of gaining entry: 1. 1. Physical access 2. 2. Continuing access 3. 3. Cognitive access

54 54 5.5 Summary Feasibility has been recognized to be organizations and to intended participants within them have been described and discussed. Research ethics refer to the appropriateness of your behavior in relation to the rights of those who become the subject of your work or are affected by the work. Potential ethical issues should be recognized and considered from the outset of you research and be one of the criteria against which your research proposal is judged.

55 55 5.5 Summary Feasibility has been recognized to be organizations and to intended participants within them have been described and discussed. Research ethics refer to the appropriateness of your behavior in relation to the rights of those who become the subject of your work or are affected by the work. Potential ethical issues should be recognized and considered from the outset of you research and be one of the criteria against which your research proposal is judged.

56 56 5.5 Summary Ethical concerns are likely to occur at all stages of your research project: when seeking access, during data collection, as you analyze data and when you report them. Qualitative research is likely to lead to a grater range of ethical concerns in comparison with quantitative research, although all research methods have specific ethical issues associated with them.

57 57 5.5 Summary Ethical concerns are also associated with the power relationship between the research and those who grant access, and the researcher ’ s role (as external researcher, internal researcher). The use of the Internet and email to collect data may also generate ethical concerns.

58 58 5.5 Summary The introduction of data protection legislation has led to this aspect of research assuming a greater importance and to a need for researchers to comply carefully with a set of legal requirements to protect the privacy and interests of their data subjects.


Download ppt "1 Second Edition Dr. Wasim Al-Habil. Chapter 5...................... Chapter 5...................... Research Methods for Business Students Research Methods."

Similar presentations


Ads by Google