Collecting ''sensitive'' data in business ethics research: A case for the unmatched count technique (UCT)

被引:21
|
作者
Dalton, DR [1 ]
Daily, CM [1 ]
Wimbush, JC [1 ]
机构
[1] PURDUE UNIV,KRANNERT GRAD SCH BUSINESS,W LAFAYETTE,IN 47907
关键词
D O I
10.1023/A:1017917904743
中图分类号
F [经济];
学科分类号
02 ;
摘要
Some would argue that the more promising areas of business ethics research are ''sensitive.'' In such areas, it would be expected that subjects, if inclined to respond at all, would be guarded in their responses, or respond inaccurately. We provide an introduction to an empirical approach - the unmatched block count (UCT) - for collecting these potentially sensitive data which provides absolute anonymity and confidentiality to subjects and ''legal immunity'' to the researcher. Interestingly, under UCT protocol researchers could not divulge subjects' responses even if they were inclined to do so. Beyond that, UCTs provide complete disclosure to subjects and there is no deception.
引用
收藏
页码:1049 / 1057
页数:9
相关论文
共 44 条
  • [41] A Novel Business Intelligence Technique to Improve High Performance within an Organization Applying Insights from Hydrogeological Case Research-in-Progress
    Samuel-Ojo, Olusola
    Olfman, Lorne
    Reinen, Linda A.
    Flenner, Arjuna
    Oglesby, David D.
    Funning, Gareth J.
    Idemudia, Efosa C.
    AMCIS 2013 PROCEEDINGS, 2013,
  • [42] Case study on communicating with research ethics committees about minimizing risk through software: an application for record linkage in secondary data analysis
    Schmit, Cason
    Ferdinand, Alva O.
    Giannouchos, Theodoros
    Kum, Hye-Chung
    JAMIA OPEN, 2024, 7 (01)
  • [43] Multi-sided platform and data-driven care research A longitudinal case study on business model innovation for improving care in complex neurological diseases
    Fuerstenau, Daniel
    Klein, Stefan
    Vogel, Amyn
    Auschra, Carolin
    ELECTRONIC MARKETS, 2021, 31 (04) : 811 - 828
  • [44] Privacy by Design at Population Data BC: a case study describing the technical, administrative, and physical controls for privacy-sensitive secondary use of personal information for research in the public interest
    Hertzman, Caitlin Pencarrick
    Meagher, Nancy
    McGrail, Kimberlyn M.
    JOURNAL OF THE AMERICAN MEDICAL INFORMATICS ASSOCIATION, 2013, 20 (01) : 25 - 28