{"id":12844,"date":"2023-03-16T15:06:27","date_gmt":"2023-03-16T15:06:27","guid":{"rendered":"https:\/\/www.glos.ac.uk\/information\/?post_type=ht_kb&#038;p=12844"},"modified":"2024-06-05T11:04:20","modified_gmt":"2024-06-05T11:04:20","slug":"procedures-for-protecting-online-survey-respondents-and-using-social-media-for-research","status":"publish","type":"ht_kb","link":"https:\/\/www.glos.ac.uk\/information\/knowledge-base\/procedures-for-protecting-online-survey-respondents-and-using-social-media-for-research\/","title":{"rendered":"Procedures for Protecting Online Survey Respondents and Using Social Media for Research"},"content":{"rendered":"\n<p class=\"\">Below are general guidelines for protecting survey respondents:<\/p>\n\n\n\n<ol class=\"wp-block-list\"><li>Commitments to confidentiality should be obtained in writing form all individuals who have access to survey data or who participate in the data collections process.<\/li><\/ol>\n\n\n\n<ol start=\"2\" class=\"wp-block-list\"><li>The linkages between survey responses and subject identifiers should be minimised. In many cases, respondent names need not be obtained during any phase of the research process. When specific identifiers, such as names or addresses, are necessary, they can be physically separated from the interview forms in which the actual survey responses are recorded.<br><\/li><li>Only those persons who are involved in the survey project should have access to<br>completed surveys.<br><\/li><li>Identifiers should be removed from completed questionnaires as soon as possible.<br><\/li><li>Actual questionnaire responses should not be available to individuals who could identify respondents from their profile of responses (such as supervisors in the case of a survey of employees).<br><\/li><li>Actual data files usually will include an identification number for each respondent. The linkage between these numbers and other respondent identifiers (such as names and addresses) should not be available to data file users.<br><\/li><li>Special care should be taken when presenting data for very small categories of respondents who might be identifiable<br><\/li><li>Researchers are responsible for the destruction of completed survey research instruments, or their continuing secure storage, when a project has been completed or when the use of the actual survey questionnaire has ended. (Kimmel, J. (2007) Ethical Issues in Behavioural Research. Oxford: Blackwell, p191)<\/li><\/ol>\n\n\n\n<h2 class=\"heading wp-block-heading\">BPS Guidelines \u2013 Internet Mediated Research (IMR)<\/h2>\n\n\n\n<section class=\"acf-block acf-block--reference no-mt no-mb       \" style=\"border-color:#a5a2a2\">\n\t<div class=\"container\">\n\t\t<div class=\"columns is-flex is-vcentered is-marginless\">\n\t\t<div class=\"column is-narrow\">\n\t\t\t\t\t<span\n\t\t\t\tclass=\"reference-icon is-block\"\n\t\t\t\tstyle=\"\n\t\t\t\t\tdisplay:inline-block;\n\t\t\t\t\twidth:24px;\n\t\t\t\t\theight:24px;\n\t\t\t\t\tbackground-color:#1ca691;\n\t\t\t\t\tmask: url('https:\/\/www.glos.ac.uk\/information\/wp-content\/themes\/glos--parent\/resources\/dist\/img\/icons\/reference\/link.svg') no-repeat center;\n\t\t\t\t\tmask-size: contain;\n\t\t\t\t\"\n\t\t\t\taria-label=\"link icon\"\n\t\t\t\ttitle=\"Reference is a link\"\n\t\t\t><\/span>\n\t\t<\/div>\n\t\t\t<div class=\"column\" style=\"color:#000!important\">\n\t\t\t\t<p><a href=\"https:\/\/www.bps.org.uk\/psychologist\/internet-mediated-research\" target=\"_blank\" rel=\"noopener\">British Psychological Society &#8211; Ethics Guidelines for Internet-Mediated Research (2021)<\/a><\/p>\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/div>\n<\/section>\n\n\n\n<p class=\"\">Additional consideration is required for research carried out using content available from the internet (i.e. blog posts, tweets etc.) \u2013 the distinction between public\/private; confidentiality (particularly relating to publishing quotes from discussion boards etc.); copyright issues; valid consent; withdrawal; debriefing.<\/p>\n\n\n\n<h3 class=\"heading wp-block-heading\">Valid consent<\/h3>\n\n\n\n<p class=\"\">\u201cIt is important in IMR, as in any research, that participants providing valid consent are given sufficient details about the study, and the nature of their participation, as well as possible associated risks. Not all of these risks are obvious in IMR, as they can be different to risks that might normally be present in offline contexts. One such risk relates to the levels of researcher control over confidentiality of data, particularly during the data gathering process (for example, where data is stored on the server of a third-party software provider). While it is normal practice (offline) to assure participants of the confidentiality of their personally identifiable information, in IMR the risks for violating this principle can be greater. Researchers need to be aware that it is impossible to maintain absolute confidentiality of participants\u2019 personal information gathered online because the networks are not in the control of the researcher. Situations where data are collected in IMR with no potentially identifying information attached are not common. For example, even an IP address stored alongside online survey responses may be linked to an identifiable individual (see the further discussion under Principle 4 on potential risks to anonymity and confidentiality).\u201d<\/p>\n\n\n\n<h3 class=\"heading wp-block-heading\">Deception<\/h3>\n\n\n\n<p class=\"\">\u201cFor some research designs, it may be necessary to withhold relevant information or disguise the research question(s) before data gathering (e.g. to avoid contaminating the data and jeopardising the validity and scientific value of a study)\u2026 In face-to-face research, such ethics issues are typically addressed by debriefing participants about the true nature of the research at the end of the study\u2026 In IMR there is an additional risk: that participants may not participate for the full duration of the study and may not be exposed to the debriefing information that could otherwise provide important safeguards. RECs should balance the scientific value of any withholding of information or deception against the risk that participants may discontinue before the disclosure and debriefing (relatively easily done in an online survey), and any likely harm that could emerge in such cases.\u201d<\/p>\n\n\n\n<h3 class=\"heading wp-block-heading\">Withdrawal<\/h3>\n\n\n\n<p class=\"\">\u201c\u2026a participant may decide to exit a survey or experiment part way through, and do this by closing their web browser. In such situations it may not be clear whether the participant intended to withdraw their valid consent for the use of any data already stored. To use any such partial data could thus violate a participant\u2019s withdrawal rights. Essentially, in IMR such difficulties need to be anticipated, and withdrawal procedures made clear and robust as possible. For example, displaying a clearly visible \u2018exit\u2019 or \u2018withdraw\u2019 button on each page of a survey or experiment is often good practice. Clicking this would ideally lead to a debrief page and perhaps also a statement asking participants if they require their data to be withdrawn, or whether their partial data can be used (this relates also to the principle of scientific value). Problems will still arise in situations where a participant chooses to exit by closing their browser window, however. Also, some situations make it difficult to implement the \u2018exit\u2019 procedures recommended here (e.g. off-the-shelf online survey software solutions may often not incorporate this functionality). A button at the very end of a study confirming consent to use the data or partial data submitted could help here; arguably, if this has not been verified by a participant then their data should not be used.\u201d<\/p>\n\n\n\n<h2 class=\"heading wp-block-heading\">Further resources<\/h2>\n\n\n\n<section class=\"acf-block acf-block--reference no-mt no-mb       \" style=\"border-color:#a5a2a2\">\n\t<div class=\"container\">\n\t\t<div class=\"columns is-flex is-vcentered is-marginless\">\n\t\t<div class=\"column is-narrow\">\n\t\t\t\t\t<span\n\t\t\t\tclass=\"reference-icon is-block\"\n\t\t\t\tstyle=\"\n\t\t\t\t\tdisplay:inline-block;\n\t\t\t\t\twidth:24px;\n\t\t\t\t\theight:24px;\n\t\t\t\t\tbackground-color:#1ca691;\n\t\t\t\t\tmask: url('https:\/\/www.glos.ac.uk\/information\/wp-content\/themes\/glos--parent\/resources\/dist\/img\/icons\/reference\/link.svg') no-repeat center;\n\t\t\t\t\tmask-size: contain;\n\t\t\t\t\"\n\t\t\t\taria-label=\"link icon\"\n\t\t\t\ttitle=\"Reference is a link\"\n\t\t\t><\/span>\n\t\t<\/div>\n\t\t\t<div class=\"column\" style=\"color:#000!important\">\n\t\t\t\t<p><a href=\"https:\/\/www.gov.uk\/government\/publications\/social-media-research-guidance-using-social-media-for-social-research\" target=\"_blank\" rel=\"noopener\">Government.UK &#8211; Social Media Research Guidance; using social media for social research<\/a><\/p>\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/div>\n<\/section>\n","protected":false},"excerpt":{"rendered":"<p>Below are general guidelines for protecting survey respondents: Commitments to confidentiality should be obtained in writing form all individuals who have access to survey data or who participate in the data collections process. The linkages between survey responses and subject identifiers should be minimised. In many cases, respondent names need not be obtained during any [&hellip;]<\/p>\n","protected":false},"author":43,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","format":"standard","meta":{"_acf_changed":false,"_searchwp_excluded":"","footnotes":""},"schools":[],"campuses":[],"subject_area":[],"ht-kb-category":[5],"ht-kb-tag":[],"class_list":["post-12844","ht_kb","type-ht_kb","status-publish","format-standard","hentry","ht_kb_category-governance-and-structure"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.glos.ac.uk\/information\/wp-json\/wp\/v2\/ht-kb\/12844","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.glos.ac.uk\/information\/wp-json\/wp\/v2\/ht-kb"}],"about":[{"href":"https:\/\/www.glos.ac.uk\/information\/wp-json\/wp\/v2\/types\/ht_kb"}],"author":[{"embeddable":true,"href":"https:\/\/www.glos.ac.uk\/information\/wp-json\/wp\/v2\/users\/43"}],"replies":[{"embeddable":true,"href":"https:\/\/www.glos.ac.uk\/information\/wp-json\/wp\/v2\/comments?post=12844"}],"version-history":[{"count":4,"href":"https:\/\/www.glos.ac.uk\/information\/wp-json\/wp\/v2\/ht-kb\/12844\/revisions"}],"predecessor-version":[{"id":12848,"href":"https:\/\/www.glos.ac.uk\/information\/wp-json\/wp\/v2\/ht-kb\/12844\/revisions\/12848"}],"wp:attachment":[{"href":"https:\/\/www.glos.ac.uk\/information\/wp-json\/wp\/v2\/media?parent=12844"}],"wp:term":[{"taxonomy":"schools","embeddable":true,"href":"https:\/\/www.glos.ac.uk\/information\/wp-json\/wp\/v2\/schools?post=12844"},{"taxonomy":"campuses","embeddable":true,"href":"https:\/\/www.glos.ac.uk\/information\/wp-json\/wp\/v2\/campuses?post=12844"},{"taxonomy":"subject_area","embeddable":true,"href":"https:\/\/www.glos.ac.uk\/information\/wp-json\/wp\/v2\/subject_area?post=12844"},{"taxonomy":"ht_kb_category","embeddable":true,"href":"https:\/\/www.glos.ac.uk\/information\/wp-json\/wp\/v2\/ht-kb-category?post=12844"},{"taxonomy":"ht_kb_tag","embeddable":true,"href":"https:\/\/www.glos.ac.uk\/information\/wp-json\/wp\/v2\/ht-kb-tag?post=12844"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}