SlideShare a Scribd company logo
1 of 30
Online Surveys: Best Practices and Ethics Dr. Valerie Irvine Co-Director, TIE Research Lab University of Victoria, Canada http://tie.uvic.ca [email_address] Twitter: _valeriei Acknowledgement to Dr. John Williams, University of Northern Iowa
Some Advantages… ,[object Object],[object Object],[object Object],[object Object],[object Object]
Use of Internet for Research ,[object Object],[object Object],[object Object],[object Object],[object Object]
Online vs. Traditional ,[object Object],[object Object],[object Object],[object Object],[object Object]
Ethical Considerations ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Lack of Direct Contact Beneficial? ,[object Object],[object Object]
Lack of Direct Contact Detrimental? ,[object Object],[object Object],[object Object],[object Object]
Seven Ethical Issues ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Informed Consent ,[object Object],[object Object],[object Object]
Options to Documentation of Consent ,[object Object],[object Object],[object Object]
Deception ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Right to Withdraw ,[object Object],[object Object],[object Object]
Withdrawing Data ,[object Object],[object Object]
Withdrawing Data ,[object Object],[object Object],[object Object]
Withdrawing Data ,[object Object]
Confidentiality and Anonymity ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Confidentiality and Anonymity ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Confidentiality and Anonymity ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Confidentiality and Anonymity ,[object Object],[object Object],[object Object],[object Object],[object Object]
Confidentiality and Anonymity ,[object Object],[object Object],[object Object],[object Object]
Avoiding Harm ,[object Object],[object Object],[object Object]
Avoiding Harm ,[object Object]
Measurement ,[object Object],[object Object],[object Object]
Measurement ,[object Object],[object Object],[object Object],[object Object]
Getting Read ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Common Mistakes in Conducting Surveys (online) ,[object Object],[object Object],[object Object],[object Object]
Common Mistakes in Conducting Surveys (online) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Pilot it first ,[object Object],[object Object]
Examples of Online Research ,[object Object],[object Object],[object Object]
References Birnbaum, M. H., & Reips, U. -D. (2005).  Behavioral research and data collection via the Internet. In R. W. Proctor and K.-P. L. Vu (Eds.), The handbook of human factors in Web design (pp. 471-492). Mahwah, New Jersey: Erlbaum. Buchanan, T., Johnson, J. A., & Goldberg, L. E. (2005).  Implementing a five-factor personality inventory for use on the Internet.  European Journal of Psychological Assessment, 21 , 115-127. Ess, C. (2007). Internet Research Ethics. In A. Joinson, K. McKenna, T. Postmes, and U.-D. Reips (Eds.),  The Oxford Handbook of Internet Psychology , pp 487-502. New York: Oxford University Press. Krantz, J. H. & Dalal, R. (2000).  Validity of web-based psychological research. In M.H. Birnbaum (Ed.),  Psychological Experiments on the Internet  (pp. 35 – 60). San Diego, CA: Academic Press.

More Related Content

What's hot

Beyond Methodology - ethical implications of doing online research
Beyond Methodology - ethical implications of doing online researchBeyond Methodology - ethical implications of doing online research
Beyond Methodology - ethical implications of doing online researchNele Heise
 
The Impact of Frequent Use Email When Creating Account at the Websites on the...
The Impact of Frequent Use Email When Creating Account at the Websites on the...The Impact of Frequent Use Email When Creating Account at the Websites on the...
The Impact of Frequent Use Email When Creating Account at the Websites on the...ijcsit
 
Plagiarism tutorial
Plagiarism tutorialPlagiarism tutorial
Plagiarism tutorialcarol90403
 
Zimmer sachrp slides v2
Zimmer sachrp slides v2Zimmer sachrp slides v2
Zimmer sachrp slides v2Michael Zimmer
 
Online research and ethical principles of online communication
Online research and ethical principles of online communicationOnline research and ethical principles of online communication
Online research and ethical principles of online communicationNele Heise
 
Rebecca eynon e research ethics 2014
Rebecca eynon e research ethics 2014Rebecca eynon e research ethics 2014
Rebecca eynon e research ethics 2014oiisdp
 
Hello, My Name Is Host Name Endgrain Rad Kaminsky
Hello, My Name Is Host Name Endgrain Rad KaminskyHello, My Name Is Host Name Endgrain Rad Kaminsky
Hello, My Name Is Host Name Endgrain Rad KaminskyTifanija
 
Anything Goes?! Ethical Dimensions of Online Research
Anything Goes?! Ethical Dimensions of Online ResearchAnything Goes?! Ethical Dimensions of Online Research
Anything Goes?! Ethical Dimensions of Online ResearchNele Heise
 
Plagiarism: What Writers Need to Know
Plagiarism: What Writers Need to KnowPlagiarism: What Writers Need to Know
Plagiarism: What Writers Need to KnowRavi Shankar
 
PLAGIARISM DETECTION & MANAGEMENT USING TURNITIN
PLAGIARISM DETECTION & MANAGEMENT USING TURNITINPLAGIARISM DETECTION & MANAGEMENT USING TURNITIN
PLAGIARISM DETECTION & MANAGEMENT USING TURNITINDr.Kamran Ishfaq
 
Plagiarism and Techniques to Avoid Plagiarism
Plagiarism and Techniques to Avoid PlagiarismPlagiarism and Techniques to Avoid Plagiarism
Plagiarism and Techniques to Avoid PlagiarismBhaswat Chakraborty
 
Future of the article C Mavergames March 2013
Future of the article C Mavergames March 2013Future of the article C Mavergames March 2013
Future of the article C Mavergames March 2013Cochrane.Collaboration
 
Ethical considerations in online research for the social sciences
Ethical considerations in online research for the social sciencesEthical considerations in online research for the social sciences
Ethical considerations in online research for the social sciencescodyskinner
 
ICA 2013: Evidence on the Extent of Harms Experienced by Children as a Result...
ICA 2013: Evidence on the Extent of Harms Experienced by Children as a Result...ICA 2013: Evidence on the Extent of Harms Experienced by Children as a Result...
ICA 2013: Evidence on the Extent of Harms Experienced by Children as a Result...Monica Bulger
 
Using Technology To Detect Plagiarism
Using Technology To Detect PlagiarismUsing Technology To Detect Plagiarism
Using Technology To Detect Plagiarismguestf17a2e
 
Preventing & detecting plagiarism
Preventing & detecting plagiarismPreventing & detecting plagiarism
Preventing & detecting plagiarismLCCeszymanski
 

What's hot (20)

Beyond Methodology - ethical implications of doing online research
Beyond Methodology - ethical implications of doing online researchBeyond Methodology - ethical implications of doing online research
Beyond Methodology - ethical implications of doing online research
 
The Impact of Frequent Use Email When Creating Account at the Websites on the...
The Impact of Frequent Use Email When Creating Account at the Websites on the...The Impact of Frequent Use Email When Creating Account at the Websites on the...
The Impact of Frequent Use Email When Creating Account at the Websites on the...
 
Plagiarism tutorial
Plagiarism tutorialPlagiarism tutorial
Plagiarism tutorial
 
Zimmer sachrp slides v2
Zimmer sachrp slides v2Zimmer sachrp slides v2
Zimmer sachrp slides v2
 
Online research and ethical principles of online communication
Online research and ethical principles of online communicationOnline research and ethical principles of online communication
Online research and ethical principles of online communication
 
On the ecological validity of a password study
On the ecological validity of a password studyOn the ecological validity of a password study
On the ecological validity of a password study
 
Rebecca eynon e research ethics 2014
Rebecca eynon e research ethics 2014Rebecca eynon e research ethics 2014
Rebecca eynon e research ethics 2014
 
Hello, My Name Is Host Name Endgrain Rad Kaminsky
Hello, My Name Is Host Name Endgrain Rad KaminskyHello, My Name Is Host Name Endgrain Rad Kaminsky
Hello, My Name Is Host Name Endgrain Rad Kaminsky
 
Anything Goes?! Ethical Dimensions of Online Research
Anything Goes?! Ethical Dimensions of Online ResearchAnything Goes?! Ethical Dimensions of Online Research
Anything Goes?! Ethical Dimensions of Online Research
 
Plagiarism: What Writers Need to Know
Plagiarism: What Writers Need to KnowPlagiarism: What Writers Need to Know
Plagiarism: What Writers Need to Know
 
PLAGIARISM DETECTION & MANAGEMENT USING TURNITIN
PLAGIARISM DETECTION & MANAGEMENT USING TURNITINPLAGIARISM DETECTION & MANAGEMENT USING TURNITIN
PLAGIARISM DETECTION & MANAGEMENT USING TURNITIN
 
Plagiarism
PlagiarismPlagiarism
Plagiarism
 
Plagiarism and Techniques to Avoid Plagiarism
Plagiarism and Techniques to Avoid PlagiarismPlagiarism and Techniques to Avoid Plagiarism
Plagiarism and Techniques to Avoid Plagiarism
 
Future of the article C Mavergames March 2013
Future of the article C Mavergames March 2013Future of the article C Mavergames March 2013
Future of the article C Mavergames March 2013
 
Ethical considerations in online research for the social sciences
Ethical considerations in online research for the social sciencesEthical considerations in online research for the social sciences
Ethical considerations in online research for the social sciences
 
Pennv3
Pennv3Pennv3
Pennv3
 
ICA 2013: Evidence on the Extent of Harms Experienced by Children as a Result...
ICA 2013: Evidence on the Extent of Harms Experienced by Children as a Result...ICA 2013: Evidence on the Extent of Harms Experienced by Children as a Result...
ICA 2013: Evidence on the Extent of Harms Experienced by Children as a Result...
 
Using Technology To Detect Plagiarism
Using Technology To Detect PlagiarismUsing Technology To Detect Plagiarism
Using Technology To Detect Plagiarism
 
Preventing & detecting plagiarism
Preventing & detecting plagiarismPreventing & detecting plagiarism
Preventing & detecting plagiarism
 
Institution Bulletin: Volume 4 Issue 1
Institution Bulletin: Volume 4 Issue 1Institution Bulletin: Volume 4 Issue 1
Institution Bulletin: Volume 4 Issue 1
 

Similar to Edmedia2011 online.surveys

Survey Methodology for Security and Privacy Researchers
Survey Methodology for Security and Privacy ResearchersSurvey Methodology for Security and Privacy Researchers
Survey Methodology for Security and Privacy ResearchersElissa Redmiles
 
06 Network Study Design: Ethical Considerations and Safeguards (2016)
06 Network Study Design: Ethical Considerations and Safeguards (2016)06 Network Study Design: Ethical Considerations and Safeguards (2016)
06 Network Study Design: Ethical Considerations and Safeguards (2016)Duke Network Analysis Center
 
06 Network Study Design: Ethical Considerations and Safeguards
06 Network Study Design: Ethical Considerations and Safeguards06 Network Study Design: Ethical Considerations and Safeguards
06 Network Study Design: Ethical Considerations and Safeguardsdnac
 
The remote proctored exams dilemma (slightly revised for QQI/NAIN)
The remote proctored exams dilemma (slightly revised for QQI/NAIN)The remote proctored exams dilemma (slightly revised for QQI/NAIN)
The remote proctored exams dilemma (slightly revised for QQI/NAIN)Phillip Dawson
 
Survey Research
Survey Research Survey Research
Survey Research atrantham
 
The remote proctored exams dilemma
The remote proctored exams dilemmaThe remote proctored exams dilemma
The remote proctored exams dilemmaPhillip Dawson
 
Sharing Confidential Data in ICPSR
Sharing Confidential Data in ICPSRSharing Confidential Data in ICPSR
Sharing Confidential Data in ICPSRARDC
 
321423152 e-0016087606-session39134-201012122352 (1)
321423152 e-0016087606-session39134-201012122352 (1)321423152 e-0016087606-session39134-201012122352 (1)
321423152 e-0016087606-session39134-201012122352 (1)Iin Angriyani
 
Overcoming obstacles to sharing data about human subjects
Overcoming obstacles to sharing data about human subjectsOvercoming obstacles to sharing data about human subjects
Overcoming obstacles to sharing data about human subjectsRobin Rice
 
POL SOC 360 Survey Research
POL SOC 360 Survey ResearchPOL SOC 360 Survey Research
POL SOC 360 Survey Researchatrantham
 
Student privacy self-management: Implications for learning analytics
Student privacy self-management: Implications for learning analyticsStudent privacy self-management: Implications for learning analytics
Student privacy self-management: Implications for learning analyticsUniversity of South Africa (Unisa)
 
Plagiarism in the Digital Age: Voices from the Front Lines
Plagiarism in the Digital Age: Voices from the Front LinesPlagiarism in the Digital Age: Voices from the Front Lines
Plagiarism in the Digital Age: Voices from the Front LinesTurnitin User Experience Team
 
Data collection.pptx
Data collection.pptxData collection.pptx
Data collection.pptxRohanRo11
 
CSCW 2016: Beyond the Belmont Principles
CSCW 2016: Beyond the Belmont PrinciplesCSCW 2016: Beyond the Belmont Principles
CSCW 2016: Beyond the Belmont PrinciplesJessica Vitak
 
The ethics of MOOC research: why we should involve learners
The ethics of MOOC research: why we should involve learnersThe ethics of MOOC research: why we should involve learners
The ethics of MOOC research: why we should involve learnersRebecca Ferguson
 
ChildBrain/Predictable summer school - Open Science
ChildBrain/Predictable summer school - Open Science ChildBrain/Predictable summer school - Open Science
ChildBrain/Predictable summer school - Open Science Robert Oostenveld
 
Data Sharing & Data Citation
Data Sharing & Data CitationData Sharing & Data Citation
Data Sharing & Data CitationMicah Altman
 

Similar to Edmedia2011 online.surveys (20)

Survey Methodology for Security and Privacy Researchers
Survey Methodology for Security and Privacy ResearchersSurvey Methodology for Security and Privacy Researchers
Survey Methodology for Security and Privacy Researchers
 
Internet-based research
Internet-based researchInternet-based research
Internet-based research
 
06 Network Study Design: Ethical Considerations and Safeguards (2016)
06 Network Study Design: Ethical Considerations and Safeguards (2016)06 Network Study Design: Ethical Considerations and Safeguards (2016)
06 Network Study Design: Ethical Considerations and Safeguards (2016)
 
06 Network Study Design: Ethical Considerations and Safeguards
06 Network Study Design: Ethical Considerations and Safeguards06 Network Study Design: Ethical Considerations and Safeguards
06 Network Study Design: Ethical Considerations and Safeguards
 
The remote proctored exams dilemma (slightly revised for QQI/NAIN)
The remote proctored exams dilemma (slightly revised for QQI/NAIN)The remote proctored exams dilemma (slightly revised for QQI/NAIN)
The remote proctored exams dilemma (slightly revised for QQI/NAIN)
 
Survey Research
Survey Research Survey Research
Survey Research
 
The remote proctored exams dilemma
The remote proctored exams dilemmaThe remote proctored exams dilemma
The remote proctored exams dilemma
 
Online marketing research 2011
Online marketing research 2011Online marketing research 2011
Online marketing research 2011
 
Sharing Confidential Data in ICPSR
Sharing Confidential Data in ICPSRSharing Confidential Data in ICPSR
Sharing Confidential Data in ICPSR
 
321423152 e-0016087606-session39134-201012122352 (1)
321423152 e-0016087606-session39134-201012122352 (1)321423152 e-0016087606-session39134-201012122352 (1)
321423152 e-0016087606-session39134-201012122352 (1)
 
Lecture 3--Research Ethics
Lecture 3--Research EthicsLecture 3--Research Ethics
Lecture 3--Research Ethics
 
Overcoming obstacles to sharing data about human subjects
Overcoming obstacles to sharing data about human subjectsOvercoming obstacles to sharing data about human subjects
Overcoming obstacles to sharing data about human subjects
 
POL SOC 360 Survey Research
POL SOC 360 Survey ResearchPOL SOC 360 Survey Research
POL SOC 360 Survey Research
 
Student privacy self-management: Implications for learning analytics
Student privacy self-management: Implications for learning analyticsStudent privacy self-management: Implications for learning analytics
Student privacy self-management: Implications for learning analytics
 
Plagiarism in the Digital Age: Voices from the Front Lines
Plagiarism in the Digital Age: Voices from the Front LinesPlagiarism in the Digital Age: Voices from the Front Lines
Plagiarism in the Digital Age: Voices from the Front Lines
 
Data collection.pptx
Data collection.pptxData collection.pptx
Data collection.pptx
 
CSCW 2016: Beyond the Belmont Principles
CSCW 2016: Beyond the Belmont PrinciplesCSCW 2016: Beyond the Belmont Principles
CSCW 2016: Beyond the Belmont Principles
 
The ethics of MOOC research: why we should involve learners
The ethics of MOOC research: why we should involve learnersThe ethics of MOOC research: why we should involve learners
The ethics of MOOC research: why we should involve learners
 
ChildBrain/Predictable summer school - Open Science
ChildBrain/Predictable summer school - Open Science ChildBrain/Predictable summer school - Open Science
ChildBrain/Predictable summer school - Open Science
 
Data Sharing & Data Citation
Data Sharing & Data CitationData Sharing & Data Citation
Data Sharing & Data Citation
 

More from Valerie Irvine

Driving an Electric Vehicle: Why Didn't I Do It Sooner
Driving an Electric Vehicle: Why Didn't I Do It SoonerDriving an Electric Vehicle: Why Didn't I Do It Sooner
Driving an Electric Vehicle: Why Didn't I Do It SoonerValerie Irvine
 
Language & Literacy Symposium keynote for Family Literacy Alberta
Language & Literacy Symposium keynote for Family Literacy AlbertaLanguage & Literacy Symposium keynote for Family Literacy Alberta
Language & Literacy Symposium keynote for Family Literacy AlbertaValerie Irvine
 
Beyond Blended: Supporting Learner Engagement and Access
Beyond Blended: Supporting Learner Engagement and AccessBeyond Blended: Supporting Learner Engagement and Access
Beyond Blended: Supporting Learner Engagement and AccessValerie Irvine
 
Redesign for Multi-Access Learning
Redesign for Multi-Access LearningRedesign for Multi-Access Learning
Redesign for Multi-Access LearningValerie Irvine
 
Video Conferencing via Robots: Needs and Implications of Access by Cyber Proxy
Video Conferencing via Robots: Needs and Implications of Access by Cyber ProxyVideo Conferencing via Robots: Needs and Implications of Access by Cyber Proxy
Video Conferencing via Robots: Needs and Implications of Access by Cyber ProxyValerie Irvine
 
The Role of Multi-Access in Mainstreaming Open Education
The Role of Multi-Access in Mainstreaming Open EducationThe Role of Multi-Access in Mainstreaming Open Education
The Role of Multi-Access in Mainstreaming Open EducationValerie Irvine
 
Revisiting the History of Open Education
Revisiting the History of Open EducationRevisiting the History of Open Education
Revisiting the History of Open EducationValerie Irvine
 
Instructor Lens on Opening Access via Multi-Access Learning
Instructor Lens on Opening Access via Multi-Access LearningInstructor Lens on Opening Access via Multi-Access Learning
Instructor Lens on Opening Access via Multi-Access LearningValerie Irvine
 
Beyond Blended: Realigning Higher Education for the 21st Century Learner Thro...
Beyond Blended: Realigning Higher Education for the 21st Century Learner Thro...Beyond Blended: Realigning Higher Education for the 21st Century Learner Thro...
Beyond Blended: Realigning Higher Education for the 21st Century Learner Thro...Valerie Irvine
 
Multi-Access Presentation for UVic Corporate/External Relations Tour
Multi-Access Presentation for UVic Corporate/External Relations TourMulti-Access Presentation for UVic Corporate/External Relations Tour
Multi-Access Presentation for UVic Corporate/External Relations TourValerie Irvine
 
Multi-Access presentation to University of Victoria Computer Science Department
Multi-Access presentation to University of Victoria Computer Science DepartmentMulti-Access presentation to University of Victoria Computer Science Department
Multi-Access presentation to University of Victoria Computer Science DepartmentValerie Irvine
 
Thinking Outside of the Classroom: Campus Technology 2013 presentation
Thinking Outside of the Classroom: Campus Technology 2013 presentationThinking Outside of the Classroom: Campus Technology 2013 presentation
Thinking Outside of the Classroom: Campus Technology 2013 presentationValerie Irvine
 
Odyssey conference 2012publish
Odyssey conference 2012publishOdyssey conference 2012publish
Odyssey conference 2012publishValerie Irvine
 
Etug2010pres 100628092811-phpapp01
Etug2010pres 100628092811-phpapp01Etug2010pres 100628092811-phpapp01
Etug2010pres 100628092811-phpapp01Valerie Irvine
 
2011 newfac-orientation-moodle2
2011 newfac-orientation-moodle22011 newfac-orientation-moodle2
2011 newfac-orientation-moodle2Valerie Irvine
 
Edmedia2011 techgradsuper
Edmedia2011 techgradsuperEdmedia2011 techgradsuper
Edmedia2011 techgradsuperValerie Irvine
 
Edmedia2011 lit.sys.review
Edmedia2011 lit.sys.reviewEdmedia2011 lit.sys.review
Edmedia2011 lit.sys.reviewValerie Irvine
 

More from Valerie Irvine (20)

Driving an Electric Vehicle: Why Didn't I Do It Sooner
Driving an Electric Vehicle: Why Didn't I Do It SoonerDriving an Electric Vehicle: Why Didn't I Do It Sooner
Driving an Electric Vehicle: Why Didn't I Do It Sooner
 
Language & Literacy Symposium keynote for Family Literacy Alberta
Language & Literacy Symposium keynote for Family Literacy AlbertaLanguage & Literacy Symposium keynote for Family Literacy Alberta
Language & Literacy Symposium keynote for Family Literacy Alberta
 
Beyond Blended: Supporting Learner Engagement and Access
Beyond Blended: Supporting Learner Engagement and AccessBeyond Blended: Supporting Learner Engagement and Access
Beyond Blended: Supporting Learner Engagement and Access
 
Redesign for Multi-Access Learning
Redesign for Multi-Access LearningRedesign for Multi-Access Learning
Redesign for Multi-Access Learning
 
Video Conferencing via Robots: Needs and Implications of Access by Cyber Proxy
Video Conferencing via Robots: Needs and Implications of Access by Cyber ProxyVideo Conferencing via Robots: Needs and Implications of Access by Cyber Proxy
Video Conferencing via Robots: Needs and Implications of Access by Cyber Proxy
 
The Role of Multi-Access in Mainstreaming Open Education
The Role of Multi-Access in Mainstreaming Open EducationThe Role of Multi-Access in Mainstreaming Open Education
The Role of Multi-Access in Mainstreaming Open Education
 
Revisiting the History of Open Education
Revisiting the History of Open EducationRevisiting the History of Open Education
Revisiting the History of Open Education
 
Instructor Lens on Opening Access via Multi-Access Learning
Instructor Lens on Opening Access via Multi-Access LearningInstructor Lens on Opening Access via Multi-Access Learning
Instructor Lens on Opening Access via Multi-Access Learning
 
Beyond Blended: Realigning Higher Education for the 21st Century Learner Thro...
Beyond Blended: Realigning Higher Education for the 21st Century Learner Thro...Beyond Blended: Realigning Higher Education for the 21st Century Learner Thro...
Beyond Blended: Realigning Higher Education for the 21st Century Learner Thro...
 
Multi-Access Presentation for UVic Corporate/External Relations Tour
Multi-Access Presentation for UVic Corporate/External Relations TourMulti-Access Presentation for UVic Corporate/External Relations Tour
Multi-Access Presentation for UVic Corporate/External Relations Tour
 
Multi-Access presentation to University of Victoria Computer Science Department
Multi-Access presentation to University of Victoria Computer Science DepartmentMulti-Access presentation to University of Victoria Computer Science Department
Multi-Access presentation to University of Victoria Computer Science Department
 
Thinking Outside of the Classroom: Campus Technology 2013 presentation
Thinking Outside of the Classroom: Campus Technology 2013 presentationThinking Outside of the Classroom: Campus Technology 2013 presentation
Thinking Outside of the Classroom: Campus Technology 2013 presentation
 
Multi-Access Learning
Multi-Access LearningMulti-Access Learning
Multi-Access Learning
 
515 inquiry
515 inquiry515 inquiry
515 inquiry
 
Odyssey conference 2012publish
Odyssey conference 2012publishOdyssey conference 2012publish
Odyssey conference 2012publish
 
Irvine au806-seminar
Irvine au806-seminarIrvine au806-seminar
Irvine au806-seminar
 
Etug2010pres 100628092811-phpapp01
Etug2010pres 100628092811-phpapp01Etug2010pres 100628092811-phpapp01
Etug2010pres 100628092811-phpapp01
 
2011 newfac-orientation-moodle2
2011 newfac-orientation-moodle22011 newfac-orientation-moodle2
2011 newfac-orientation-moodle2
 
Edmedia2011 techgradsuper
Edmedia2011 techgradsuperEdmedia2011 techgradsuper
Edmedia2011 techgradsuper
 
Edmedia2011 lit.sys.review
Edmedia2011 lit.sys.reviewEdmedia2011 lit.sys.review
Edmedia2011 lit.sys.review
 

Recently uploaded

Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentInMediaRes1
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitolTechU
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerunnathinaik
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,Virag Sontakke
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupJonathanParaisoCruz
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...jaredbarbolino94
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 

Recently uploaded (20)

Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media Component
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptx
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developer
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized Group
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 

Edmedia2011 online.surveys

  • 1. Online Surveys: Best Practices and Ethics Dr. Valerie Irvine Co-Director, TIE Research Lab University of Victoria, Canada http://tie.uvic.ca [email_address] Twitter: _valeriei Acknowledgement to Dr. John Williams, University of Northern Iowa
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30. References Birnbaum, M. H., & Reips, U. -D. (2005). Behavioral research and data collection via the Internet. In R. W. Proctor and K.-P. L. Vu (Eds.), The handbook of human factors in Web design (pp. 471-492). Mahwah, New Jersey: Erlbaum. Buchanan, T., Johnson, J. A., & Goldberg, L. E. (2005). Implementing a five-factor personality inventory for use on the Internet. European Journal of Psychological Assessment, 21 , 115-127. Ess, C. (2007). Internet Research Ethics. In A. Joinson, K. McKenna, T. Postmes, and U.-D. Reips (Eds.), The Oxford Handbook of Internet Psychology , pp 487-502. New York: Oxford University Press. Krantz, J. H. & Dalal, R. (2000). Validity of web-based psychological research. In M.H. Birnbaum (Ed.), Psychological Experiments on the Internet (pp. 35 – 60). San Diego, CA: Academic Press.