SlideShare a Scribd company logo
!
World Research Codes and Guidelines
ESOMAR GUIDELINE ON SOCIAL MEDIA
RESEARCH
CONTENTS
1. Introduction
1.1 Scope
1.2 Definitions
2. Key principles
2.1 Distinguishing market, social and opinion research as a
purpose
2.2 Conforming to law
2.3 Consent and notification
2.4 Protecting identifiable data
2.5 Ensuring no harm
2.6 Children
2.7 Reputation of the industry
2.8 Reporting
3. Some specific recommendations for certain social media
3.1 Defining social media areas
3.2 Private social media areas issues
3.3 Market research social media areas issues
4. Further Information
Appendix 1: Key fundamentals of the ICC/ESOMAR Code
Appendix 2: Contract/Policy advice with sub-contractors/third
party suppliers of SMR
!
© 2011 ESOMAR. All rights reserved. Issued July 2011
No part of this publication may be reproduced or copied in any
form or by any means, or translated, without the prior
permission in writing of ESOMAR.
ESOMAR codes and guidelines are drafted in English and the
English texts are the definitive versions.
!
"!
BACK TO CONTENTS
1. INTRODUCTION
The evolution of social media in recent years has changed the
way that hundreds of millions of people share information
about themselves around the world. The concept of consumers
generating their own content on the internet has become
ubiquitous. This has created new opportunities for researchers
to observe, interact and gather information. Already many
techniques have been developed to leverage social media such
as community panels, crowd-sourcing, co-creation,
netnography, blog mining and web scraping. Moreover it is
likely that many more will evolve over the coming years as the
internet continues to change.
The ICC/ESOMAR International Code on Market and Social
Research requires that the same fundamental ethical and
professional principles which govern face to face, mail and
telephone research, are also applied to all types of online
research (see Appendix 1). This document aims to provide
guidance for the use of social media in market, social and
opinion research.
It builds upon previously issued guidelines concerning Online
Research and Passive Data Collection and supports
ESOMAR’s mission to ensure effective self-regulation to foster
public confidence in our profession and industry. It aims to
provide social media researchers with an awareness of the
issues and guidance on how they can best apply the Code’s
fundamental principles of respect for consumers, trust,
transparency and professionalism. This guideline also supports
ESOMAR’s consistent position to maintain a clear distinction
between market, social and opinion research and marketing
and PR activities.
Recognising that online research generally, and social media
specifically, is continually evolving, this guideline conveys
ethical and professional principles rather than being prescriptive
about methodology.
Social media data often includes personally identifiable
information. Most regulations in this area were developed
before it
was possible for one person to communicate with many on a
publicly accessible online platform. Updates in privacy and
data protection laws are still being developed and often lag
changes in practises that have become generally accepted.
This guideline is based on the principles underlying relevant
laws and regulations presently in operation, especially with
respect to data protection and intellectual property. However it
also aims to propose pragmatic solutions that work within
the spirit of existing laws and the ICC/ESOMAR Code, while
aligning with currently accepted usage of online information
around the world.
1.1 Scope
This guideline covers the collection of social media data for
market, opinion or social research purposes. It recognizes
that there are many different activities enabled by social media
- of which market, opinion or social research is just one –
and that these varied activities (including customer service and
customer relations management) necessarily have
different implications for consumers and those who make use of
social media.
Researchers must not allow personal data they collect in a
market research project to be used for any other purpose than
market, social and opinion research. If it is intended to collect
personalised social media data for other purposes, they
must clearly differentiate this activity from their research
activities and not misrepresent it as research. See section 2.1 for
more on this issue.
This guideline shall be read in conjunction with the
ICC/ESOMAR International Code on Market and Social
Research and
other ESOMAR guidelines available at www.esomar.org#
1.2 Definitions
Social media is defined as internet based platforms and
technologies that permit users’ interaction and/or facilitate the
creation and exchange of user generated content. Whilst the
scope is evolving, currently the most frequently used
examples include:
• Online forums/discussions, communities, blogs, social
networks (e.g. Facebook)
• Video/photo sharing (e.g. YouTube)
• Multi-person/group communication and/or collaboration
platforms (e.g. Twitter).
Social media data refers to the information (photos, comments,
etc.) that users generate or share while engaged in or
with social media. It often includes personally identifiable data.
!
$!
BACK TO CONTENTS
Social media research (SMR) covers all research where social
media data is utilised either by itself or in conjunction with
information from other sources. Examples of current social
media research include:
• Monitoring or crawling social media platforms (from
automated monitoring of brand sentiment through to ad-hoc
desk
research)
• Ethnographic research (from observing online social behaviour
to participating and collecting primary data in various
forms, including ‘friending’ users). This includes netnography
• Co-creational techniques used for research purposes
• Online communities that generate or deliver consumer
opinions, reactions, feedback on a regular, formal or systematic
basis.
Note that SMR excludes behavioural tracking research, even
when conducted on social media websites.
Throughout this guideline a number of specific terms will be
used whose meanings are as follows:
Data collection is the process of extracting data from social
media data for analysis, and is sometimes referred to as
scraping or crawling. This can be automated or done manually.
Masking is a technique whereby the original social media data
such as comments, photos or videos is altered to a point
that it cannot be traced back or attributed to the original user
(using a search engine for example). See Section 2.4.
MROC (Market Research Online Community) is one of the more
frequently used terms used to describe an online
community created specifically for the purposes of market,
social and opinion research. Others include DORC (Dedicated
Online Research Community).
Personally identifiable information (referred to as personal data
in EU legislation) is information that can be used to
uniquely identify, contact, or locate a single person or combined
with other sources to uniquely identify a single individual
ToU is the Terms of Use policy that a website or online service
requires its users to accept.
Walled garden is an online service which requires users to
register or apply for membership before being permitted to
participate. A walled garden can only be accessed after the user
has obtained a login and/or password, even if entry is
automatic.
The following general terms are taken from the definitions in
the ICC/ESOMAR Code:
Client is any individual or organisation that requests,
commissions or subscribes to all or any part of a market
research
project.
Market research is the systematic gathering and interpretation
of information about individuals or organisations using the
statistical and analytical methods and techniques of the applied
social sciences to gain insight or support decision making.
The identity of respondents will not be revealed to the user of
the information without explicit consent and no sales
approach will be made to them as a direct result of their having
provided information.
Researcher is any individual or organisation carrying out, or
acting as a consultant on a market research project,
including those working in client organisations.
User is any individual or organisation from which information
is collected for the purposes of a market research project,
whether they are aware of it or not, or is approached for
interview. In the context of SMR, the user may also be referred
to
as an Author, Member or Poster. (Note: this term is equivalent
to a Respondent or Participant in other market, opinion or
social research modes.)
!
%!
BACK TO CONTENTS
2. KEY PRINCIPLES
All the core fundamental principles of the ICC/ESOMAR Code
(see Appendix 1) apply to social media research. The
following section explains the implications of them for this
context.
2.1 Distinguishing market, social and opinion research as the
purpose
Researchers must not allow personal data they collect in a
market research project to be used for any other purpose than
market, social and opinion research. This principle can cause
particular issues when investigating social media.
Under Article 7c of the ICC/ESOMAR Code, if quotes
containing personally identifiable information are passed to the
client, unless national provisions require stricter regulations,
the following conditions must apply:
i) the respondent has explicitly expressed this wish and/or
ii) the respondent has given their explicit consent
iii) on the understanding that no commercial activity will be
directed at them as a direct result of their having provided
information.
In some cases those taking part in research-based communities
could be exposed to sales and PR messages as part of
the research process. This is permissible under the
ICC/ESOMAR Code provided the purpose is for research (see
section
3.3 for more guidance on how best to inform users about the
purpose).
The ICC/ESOMAR Code requires researchers to be transparent
in their dealings and not to misrepresent as market
research any project which has another purpose. To aid clarity
and protect the reputation of the researcher and of market
research, the research services and the organisation or company
carrying them out must be presented in such a way that
they are clearly differentiated from any non-research activities.
To ensure the public is not confused when social media
data is being used by an organisation which is involved in both
research and non-research activities, it is recommended
that:
• the company’s privacy policy and promotional literature must
differentiate the different services that are being offered
and separate market research from other activities;
• it must be easy for users and others to contact the researchers
carrying out market research and those making
enquiries must not be confused by having apparently to get in
touch with a non-research organisation or deal with
non-research staff to raise queries or complaints about market
research activities;
• the introduction used when contacting a user must clearly
define the purpose and they must not be left with the
impression that the exercise has a research purpose if it does
not.
These requirements do not prevent researchers from being
involved in non-research activities providing the purpose of
collecting personally identifiable data is not misrepresented.
Nor do they in any way restrict the right of the organisation to
promote the fact that it carries out both market research and
other activities providing they are clearly differentiated and
that they are conducted separately and in accordance with the
relevant laws and local professional rules of conduct. More
guidance in this area is given in the Distinguishing Market
Research from Other Data Collection Activities#
2.2 Conforming to the law
Researchers must conform to all relevant national and
international laws. There are three main legal aspects to
consider
here.
First, social media research must comply with national and
international data privacy legislation and relevant requirements
for notice, consent, accuracy, security and access when
personally identifiable data is collected and stored. See section
2.3 for more on ‘Consent’. There are also legal issues and
measures (e.g. Safe Harbour requirements) relating to
international transfer of personal data where data from which
personal identifiers have not been removed is transmitted
across national borders!as well as considerations as to whether
the country to which the data is transferred offers an
adequate level of protection from a data protection perspective.
!
&!
BACK TO CONTENTS
The second legal issue is that by accessing virtually all online
services, researchers will be subject to the service owners’
Terms of Use (ToU). Most ToU have intellectual property rights
clauses that explicitly forbid the unauthorised copying of
material. Many go further to bar all forms of social media data
collection.
Subject to ‘fair use’ exceptions in certain countries, such ToU
could prevent a researcher from even copying material to
their computer for further analysis and forbid any form of
selling on of that information to their clients, without
permission.
For example, the following popular social media ToU can be
located on the web at:
Facebook: www.facebook.com/terms.php
Twitter: twitter.com/tos
LinkedIn: www.linkedin.com/static?key=user_agreement
Researchers should therefore check what conditions apply to the
content they use from social media and respect any
requests for privacy (including robot.txt file requests, secure
pages, etc). They must seek permission to scrape content
from any source where this might breach the ToU and to abide
by that service’s ruling. Where permission is not granted,
reading of such information and summarising the issues without
copying anything is permissible, subject to the guidelines
in section 3. Note, researchers should not engage in efforts to
circumvent web sites’ protections of the data they hold (eg
IP spoofing, fictitious user ID’s, etc).
Where researchers use third party aggregators for data
collection services, the onus is on the researcher to check with
their supplier that permissions have been obtained and the data
has been sourced lawfully (see Appendix 2).
The third legal aspect concerns copyright. The ToU will usually
also address copyright issues and the use of material on
the website. Often the website owner will also be the copyright
owner. However copyright laws are complex. They also
vary across jurisdictions and researchers must acquaint
themselves and observe the relevant laws on this topic.
2.3 Consent and notification
The ICC/ESOMAR Code states that users’ co-operation must be
based on adequate information about the purpose and
nature of the project and their agreement to participation
obtained. In addition, in some countries, existing data
protection
laws may also require users to be informed when personally
identifiable data is collected.
Although it is potentially easy to obtain consent from members
of market, social and opinion research communities, it
poses more issues for other social media where users will
generally not have been informed in advance or have
consented to its use for research unless this is covered in the
ToU.
As noted in the ESOMAR Online Research guideline,
researchers must remain mindful of concerns about privacy and
intrusion if sending an email requesting such consent. They
must reduce any inconvenience such an email might cause to
the recipient by clearly stating its purpose in the subject
heading and keeping the total message as brief as possible.
If consent has not been obtained (directly or under the ToU)
researchers must ensure that they report only depersonalised
data from social media sources. If researchers are using
automated data collection services, they are recommended to
use filters and controls to remove personal identifiers such as
user names, photos, links to the user’s profile, etc. Where
this is not possible or they are manually collecting data from
websites, their analysis must only be with depersonalised
data and no attempt should be made to identify people – see
section 2.4 for a discussion on when identifiable quotes can
be potentially used.
If depersonalized social media research data is passed on to
another researcher or client, the researcher must have a
contract with the recipient of the data which requires them not
to attempt to use technical means to re-identify quotes or
their posters and use such data for a non research purpose and
to observe the ICC/ESOMAR Code and the provisions of
this guideline.
When researchers, or their automated agents, interact directly
with users within social media, they must also convey to
them their purpose, role and how they will use any comments.
They must also seek permission from users and the
service owners or their representatives to conduct their work.
Furthermore when taking part, researchers must ensure
they do not misrepresent themselves as a genuine member of
that social media space.
!
'!
BACK TO CONTENTS
When researchers, or their automated agents, are working in
social media spaces, they must provide an email address
and a telephone number and/or mail address to facilitate contact
and verification. For additional transparency, and to meet
data collection notice requirements, researchers must publish a
privacy policy on their website which explains how any
personal data they collect is handled, offering appropriate
measures to ensure that users can exercise their rights to
require that their personal data are deleted or rectified, or that
their personal data are not made available to others.
2.4 Protecting identifiable data
Social media platforms offer many opportunities to view
personally identifiable data. Some people post information that
overtly discloses their identity, are aware of this and have a
diminished expectation of privacy. Others are not aware that
the services they are using are open for others to collect data
from or think that they have disguised their identity by using
a pseudonym or username. However, online services are now
available that make it possible in many cases to identify a
“poster” from their username or comments and can link that to
many other aspects of personally identifiable data including
their address, phone number, likely income and socio
demographic data.
Given this, data cannot always be 100% anonymised on the
internet by merely removing the username and linked URL
from the comment. Therefore if researchers wish to quote
publicly made comments in reports or to pass these on to
people not bound by the ICC/ESOMAR Code (or a contract
linked to this), they must first check if the user’s identity can
be easily discoverable using online search services. If it can,
they must make reasonable efforts to either seek permission
from the user to quote them or mask the comment to such an
extent that the identity of the user cannot be obtained.
Masking is a technique whereby raw data is so changed that it
becomes very difficult for others to find the data online with
a search service and thereby identify the person from whom it
originates. It is a useful technique to ensure that the
anonymity of people making comments is preserved where
1. the researcher has not sought their permission and
2. the comment would be easily traceable with a search service.
The degree of masking required will depend on the nature of the
comment and its author. Masking can be applied in
varying degrees ranging from just changing the odd word
through altering key features of a comment to précising. It is
the
responsibility of the researcher to decide which is most
appropriate. Factors to take into account include:
• If the topic being discussed is sensitive or personal
• If abusive language is used
• If it includes anything against the law
• If it includes anything embarrassing or is likely to impact
career opportunities
• If it includes any personally identifiable information
• If it includes any data about others that is not already public.
In the case of public pictures or videos, consideration should be
given to techniques such as pixelation of faces, where
masking is required. Note, masking is unlikely to be sufficient
in many B2B contexts or when researching very small
groups, as identification is highly likely even if masked. When
a researcher passes a masked comment on in a report to a
client, they should clearly indicate if it has been masked.
If a researcher decides to seek users’ permission to quote them,
they must abide by relevant country laws, be sensitive to
users’ concerns about being observed and explain clearly and
honestly the purpose of their work. The user should be
given the opportunity to check the bona fides of the researcher,
if they so wish, before deciding what to do.
Where researchers use services to enhance comments with
demographic profiles (eg personal profiles), they should only
use this information for research classification purposes. Since
such services often provide other identifiable personal
information (eg phone number, address or email), they could
permit unintentional linkage of research data to personal
data and this must not be used in analysis or passed on.
!
(!
BACK TO CONTENTS
2.5 Ensuring no harm
Another key principle of the ICC/ESOMAR Code is that the
rights of users as private individuals shall be respected and
that they shall not be harmed or adversely affected as the direct
result of participating in research.
The greatest risk in social media research relates to
inadvertently revealing the identities of users, who did not
realise they
were participating in research and so would not expect to be
identified. Again to ensure users are not harmed by research
activities, the abiding principle must be one of caution,
removing any personal identifiers in data as soon as possible
taking into account necessary quality controls.
2.6 Children
Researchers must take special care when carrying out research
among children and young people (see ESOMAR
Guideline on Interviewing Children and Young People).
This is a particular issue with many social media platforms as
their users can include children. Where data is likely to be
from a child, researchers must take particular care in masking
responses to ensure that the user cannot be identified or
obtain permission from a parent or legal guardian to collect and
use identifiable data (see ESOMAR Guideline for Online
Research).
Where a market research online community (MROC) is being
conducted with young people, permission must be obtained
from a parent or legal guardian.
2.7 Reputation of the industry
Researchers must not do anything that might damage the
reputation of market, social and opinion research.
Given its specific nature, working with social media requires
additional care since any mistakes or misunderstandings can
be spread virally within minutes across the network. Social
media researchers must therefore be mindful of the core
principles of the ICC/ESOMAR Code in the work they and their
companies conduct and avoid activities and practices
which could undermine public confidence in market, social and
opinion research.
2.8 Reporting
The ICC/ESOMAR Code requires that projects are reported and
documented accurately, transparently and objectively.
As social media research is a relatively new area, care needs to
be taken by researchers to explain the impact that this
sample source may have had on the results and their validity
and reliability. This is necessary to ensure transparency for
all involved and to educate users who may not be familiar with
this type of research data rather than to devalue the
information obtained.
3. SOME SPECIFIC RECOMMENDATIONS FOR CERTAIN
SOCIAL MEDIA
3.1 Defining social media areas
There are three areas in which social, opinion and market
research could be conducted. These are defined as follows:
• Public social media: This covers the majority of social media.
It includes all places where access has been set by
the website or the user to ‘public’ and entry is without any form
of entry barrier. It can also include those where a
username or password is required, but these are required for
identification or site revenue reasons, rather than to
protect the privacy of the data posted. Examples include public
profile pages of social media networks; public micro-
blogging posts; and many forums (including those where a
username may be required, but is automatically granted,
that is they are not moderated).
• Private social media: This covers areas where the user or the
website do not want the data to be publically
accessible. All require username identification for access,
although this is not a distinguishing feature. These are
sometimes referred to as ‘walled gardens’. Examples include:
‘private wall to wall’ or individual communications on
social media networks; protected posts on micro-blogging sites;
or forums/groups areas where admittance is
controlled by an administrator or moderator.
!
)!
BACK TO CONTENTS
• Market research social media: This covers any online place
specifically created for market, social and opinion
research purposes where users have been informed of its
function and the use to which their comments might be put.
Typically (but not always) these are also private spaces.
Examples include Market Research Online Communities
(MROC’s), certain blogs, online ethnographic and co-creational
techniques which utilise social media platforms.
In addition to the guidelines in Section 2, researchers need to
consider the following when using data derived from private
and market research social media spaces.
3.2 Private social media areas issues
Researchers can only access these areas with the permission of
the service operator or their agents. They should make it
clear in their profile and preferably also in their avatar and/or
username that they are a researcher, who they work for and
their purpose. In interacting with members of a private area they
should include a reference to their role, so that members
are left in no doubt who they are talking to.
As a general rule, researchers should not copy or scrape content
within private areas, even if they have permission of the
site owner. If researchers do so, it should be made clear to all
users that this is happening and they should provide
individuals with a process to be excluded from such data
collection.
Researchers must observe great sensitivity interacting with
people in private spaces. When this needs to be done, they
must follow the guidelines in section 2.3 on consent and
notification and 2.4 on protecting identifiable data#
3.3 Market research social media areas issues
Market, social and opinion research spaces are normally private
walled gardens where members must agree the purpose
for which data is being collected and the terms and conditions
for participation before they sign up to take part in the
community, blog or co-creational project.
These terms must be simple, clearly worded and easy to
understand. Members must be fully aware of:
• The purpose of the space - that it is for research, but in the
case of a MROC, that they may be exposed to marketing
information for research purposes only. This might include
incentives for panel participation noting that using the
client’s products could be regarded as marketing in some
countries
• That all data may be shared with the client – this is especially
important since some members will actively share real
names and photos
• How it could be used
• The rules for interacting (i.e. no cyber-bullying, defamatory
comments etc)
• The site privacy policy including requirements listed in the
Online Research guideline.
Unlike public internet areas, content can be copied and scraped
and utilised for any research purpose, subject to
members being fully aware of these applications. However the
personal identity of those making comments must be
protected. Some research communities offer clients
opportunities to meet members and interact with them directly
but this
must be only with the consent of members. Clients must agree
to abide by the ICC/ESOMAR Code, in particular that such
interaction will be for research purposes only.
Where spaces are communal, members should be warned about
contributing personally identifiable information. For
example, members in a community should be given the option
of using a pseudonym and uploading a photo of an avatar,
a pet or inanimate object, rather than requiring that they use
their real name and a photo of themselves. In addition on
sign up, researchers should provide reassurance to community
members that they will never ask for information that could
create a risk of identity theft if lost, misused or disclosed to an
unauthorised party, such as credit card numbers, social
insurance/social security numbers or bank account details.
The role of moderators and clients should be unambiguously
identified as such in all their interactions and
communications with members. However care needs to be taken
to protect them from being easily contacted outside the
project, so it may be necessary to withhold full names and/or
emails of such people and to utilise secure email systems
within the relevant software.
!
*!
BACK TO CONTENTS
Where MROC’s are used to test products, advertising and/or
communication of messages it is important that users are
made aware of this. If users are taking part in a simulated sales
test, it must be clear that they are helping in a research
project and not in some form of direct marketing or sales
exercise. No personal data collected during the course of an
MROC may be used for any non-research purpose such as
subsequent direct marketing or promotion to the individuals
taking part.
4. FURTHER INFORMATION
Members who are unsure about the application of the Guideline
in specific circumstances can seek advice by contacting
the ESOMAR Professional Standards Committee,
[email protected]
Project Team
• Adam Phillips, Committee Chair, Managing Director, Real
Research and Chair of ESOMAR Professional Standards
and Legal Committees
• Ulf Andersen, MD of Synovate Scandinavia
• Pete Comley, Founder, Join the Dots (previously known as
Virtual Surveys)
• Ed Keller, CEO, Keller Fay Group, co-founder of WOMMA
Word-of-Mouth Marketing Association
• Peter Milla, Member of CASRO Task Force
• Annie Petitt, Chief Research Officer, Conversition
• Niels Schillewaert, Managing Partner of InSites Consulting
• Kristin Sharp, CEO of Ipsos Understanding UnLtd
• David Stark, VP, Compliance and Privacy, GfK, member of
ESOMAR Professional Standards and Legal Committees
!
+!
BACK TO CONTENTS
APPENDIX 1: KEY FUNDAMENTALS OF THE ICC/ESOMAR
CODE !
1. Market researchers shall conform to all relevant national and
international laws.
2. Market researchers shall behave ethically and shall not do
anything which might damage the reputation of market
research.
3. Market researchers shall take special care when carrying out
research among children and young people.
4. Users’ cooperation is voluntary and must be based on
adequate, and not misleading, information about the general
purpose and nature of the project when their agreement to
participate is being obtained and all such statements shall
be honoured.
5. The rights of users as private individuals shall be respected
by market researchers and they shall not be harmed or
adversely affected as the direct result of cooperating in a market
research project.
6. Market researchers shall never allow personal data they
collect in a market research project to be used for any
purpose other than market research.
7. Market researchers shall ensure that projects and activities
are designed, carried out, reported and documented
accurately, transparently and objectively.
8. Market researchers shall conform to the accepted principles
of fair competition.
APPENDIX 2: CONTRACT/POLICY ADVICE WITH SUB-
CONTRACTORS/THIRD PARTY SUPPLIERS OF
SMR
When sub-contractors are used, ESOMAR recommends the
researcher checks if they follow appropriate practices and
procedures, especially with respect to observing any legal
requirements and also about the privacy and protection of
identifiable user data. Researchers should:
• Carry out due diligence when identifying and selecting sub-
contractors
• Execute written Non-Disclosure agreements
• Execute written contracts that outline duties, obligations, and
responsibilities of the sub-contractors that address all
parts of the research process, especially privacy and data
protection; parties involved and address non-disclosure
requirements
• Engage in on-going oversight of sub-contractors and their
activities and
• Ensure any data provided to them by sub-contractors is
provided legally and in accordance to service ToU.
Policies and contracts relating to the research process and
privacy are available from CASRO ,http://www.casro.org!-
through the CASRO Privacy Protection Program (CASRO 3P).
The CASRO 3P program has been designed to address
the needs of various geographies, including the US and the EU.
Model contracts for transfer of personal data from the EU are
available from the European Commission
http://ec.europa.eu/justice/policies/privacy/modelcontracts/inde
x_en.htm
End of document!
1. Salesperson interview
A “salesperson” may be anyone who acts in a selling capacity
such as a medical equipment sales representative, an
entrepreneur selling his/her new product, a Deloitte partner who
sells his/her accounting services…
Daniel
Each student is required to conduct an informational interview
with a sales person and produce a typed two to three page, 12
font, single spaced report that answers the following questions:
1. What are three attributes of a high-performing sales person?
0. High achiever – Be able to set goals and measure your
performance in comparison to those goals
0. Empathy – Being able to read and identify with the
customers/clients. As salespeople we have to understand the
other end, the consumer. We have to respect and establish a
rapport with them by standing along their side and not being
judgmental.
0. Confident and Curiosity - Be knowledgeable in the
products/services you sale to your customers/clients, it would
drive higher result of sale.
1. What is the hardest aspect of selling?
1. Rejection of a customer’s purchase is sometimes hard. Not
always a customer coming in to our Apple campus store is ready
to make a purchase. We have to understand that we cannot
always push for a purchase and “seal the deal”. Handling a
rejection is an important part in this process to be a better
salesman.
1. Why is it critical to understand buyers’ motivation to
purchase?
2. It is highly critical, since we all have wants and needs.
Understanding what drives the customers to buy our products
will help us develop an effective sales and marketing messages.
Also, high motivation to purchase now leads to higher
motivation to purchase our products in the future as long we
understand the customer.
1. Why is it important to develop a personal and professional
relationship with a prospective buyer?
3. It is all about creating and maintaining relationships with our
customers; whether they are coming to purchase a new product
or only to receive help to troubleshoot an Apple product.
Customer-Store relationship is what drives sales. We have to
built trust with our customers, so they would always know they
could come back to the store to shop and receive the highest
care and experience.
1. What are the best aspects of the sales profession?
4. See the smile on people’s face when they walk out of the
store. Knowing that I just made someone’s life easier and
happier by solving his or her problems.
1. What knowledge and skills are necessary to be successful in a
sales career?
5. People oriented – Listen to your customers/clients
5. Curiosity – Always drive yourself to learn. Knowledge and
information are key parts to success
5. Achiever – Setting goals and doing our best to achieve them.
5. Believe in what you sale – often times people are trying to
sale a product they do not believe in, which creates a bad
rapport with the customers.
1. What role does ethics play in building a sustainable long-
term buyer relationship?
6. Ethics plays a big role in building a sustainable long-term
buyer relationship. Business code of conduct, ethical principles
and integrity are key parts in business’ success in the long run.
Customers trust us, the sales representatives to conduct the
highest customer service. We have to honor that code of ethics
in order to build a sustainable relationship with our customers.
If we did not conduct good ethic principles in the business, our
reliability as a business would have been low. Thus, we would
not be able to maintain long-term relationship.
1. Describe a typical work day
7. A typical workday at the Apple store would be to first make
sure the store is clean, neat and shiny. We are making sure all
products are in place and organized before any customer walk
into the store. The store manager always making sure before the
start of day to brief us about any new promotions or products’
price change. At the store we not only selling products, we are
also assisting customers by troubleshooting their Apple devices,
from iPods to Macs. Sales at the store happens naturally, most
people come in knowing what they need and want, we are just
making sure we are giving them the highest service possible, so
they would always want to come back. Some other times
customer would walk into the store not knowing exactly what
they are looking for, so we would jump right in for the rescue to
give advices and tips of what they should buy without pushing
them to make the final decision of purchase. When reaching the
last minutes to closing time, we lock the doors and letting the
last people make their purchases, organizing the store and
making the end of day sales report.
1. Why would you recommend a career in sales?
8. Sales career is not only because of the money. I would
recommend a career in sales for one main reason, people. If you
love working with people, solve people’s problems, curious and
high achiever, sales is the job for you. I would not be in this
business if I did not get any satisfaction from successfully
closing a deal. When I see a customer’s satisfied and happy
after I assisted them in a problem, it means the world to me and
I hope for other Sales people too. That’s why I believe that a
career in sales could lead to an amazing opportunity to grow
personally and professionally.
For information on how to schedule and conduct an
Informational Interview reference:1. How to Conduct an
Informational Interview
http://law2.wlu.edu/career/page.asp?pageid=1821. How to Land
and Ace An
Informational Interviewhttp://www.forbes.com/sites/jacquelyns
mith/2013/12/11/how-to-land-and-ace-an-informational-
interview/1. Conducting Information Interviews
http://uncw.edu/career/informationinterviews.html

More Related Content

Similar to !World Research Codes and Guidelines ESOMAR GUIDEL.docx

Develop project pia+ risk identification
Develop project pia+ risk identificationDevelop project pia+ risk identification
Develop project pia+ risk identification
Trilateral Research
 
A Research Project PresentationOnline Policies for Enabling Fi.docx
A Research Project PresentationOnline Policies for Enabling Fi.docxA Research Project PresentationOnline Policies for Enabling Fi.docx
A Research Project PresentationOnline Policies for Enabling Fi.docx
makdul
 
Integration of Bayesian Theory and Association Rule Mining in Predicting User...
Integration of Bayesian Theory and Association Rule Mining in Predicting User...Integration of Bayesian Theory and Association Rule Mining in Predicting User...
Integration of Bayesian Theory and Association Rule Mining in Predicting User...
Editor IJCATR
 
Integration of Bayesian Theory and Association Rule Mining in Predicting User...
Integration of Bayesian Theory and Association Rule Mining in Predicting User...Integration of Bayesian Theory and Association Rule Mining in Predicting User...
Integration of Bayesian Theory and Association Rule Mining in Predicting User...
Editor IJCATR
 
GDPR's Impact on Social Media - Everything You Need to Know
GDPR's Impact on Social Media - Everything You Need to KnowGDPR's Impact on Social Media - Everything You Need to Know
GDPR's Impact on Social Media - Everything You Need to Know
Visitor Analytics
 
chapter 6 Ethics and Professionalism of ET.pptx
chapter 6   Ethics and Professionalism of ET.pptxchapter 6   Ethics and Professionalism of ET.pptx
chapter 6 Ethics and Professionalism of ET.pptx
AmanuelZewdie4
 
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docxRunning head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
jeanettehully
 
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docxRunning head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
glendar3
 
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docxRunning head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
todd581
 
An approach for evaluation of social...
An approach for evaluation of social...An approach for evaluation of social...
An approach for evaluation of social...
STIinnsbruck
 
Social networks management policies
Social networks management policiesSocial networks management policies
Social networks management policies
Gabriel BREZOIU
 
ETHICAL ISSUES WITH CUSTOMER DATA COLLECTION
ETHICAL ISSUES WITH CUSTOMER DATA COLLECTIONETHICAL ISSUES WITH CUSTOMER DATA COLLECTION
ETHICAL ISSUES WITH CUSTOMER DATA COLLECTION
Pranav Godse
 
Advanced Techniques in Social Media Data Analysis.docx
Advanced Techniques in Social Media Data Analysis.docxAdvanced Techniques in Social Media Data Analysis.docx
Advanced Techniques in Social Media Data Analysis.docx
Quick Metrix
 
The Fund Industry Goes Social Webinar
The Fund Industry Goes Social WebinarThe Fund Industry Goes Social Webinar
The Fund Industry Goes Social Webinar
NICSA
 
Social Media Discussion Paper
Social Media Discussion PaperSocial Media Discussion Paper
Social Media Discussion Paper
Jon Koelle Christensen
 
Session B: Handout 3
Session B: Handout 3Session B: Handout 3
Session B: Handout 3
feitwincities
 
How to Safely Scrape Data from Social Media Platforms and News Websites.pdf
How to Safely Scrape Data from Social Media Platforms and News Websites.pdfHow to Safely Scrape Data from Social Media Platforms and News Websites.pdf
How to Safely Scrape Data from Social Media Platforms and News Websites.pdf
RobertBrown631492
 
How to Safely Scrape Data from Social Media Platforms and News Websites.pptx
How to Safely Scrape Data from Social Media Platforms and News Websites.pptxHow to Safely Scrape Data from Social Media Platforms and News Websites.pptx
How to Safely Scrape Data from Social Media Platforms and News Websites.pptx
RobertBrown631492
 
A STUDY ON CONSUMERS’ PERCEPTION TOWARDS SOCIAL MEDIA ADVERTISING IN ERODE DI...
A STUDY ON CONSUMERS’ PERCEPTION TOWARDS SOCIAL MEDIA ADVERTISING IN ERODE DI...A STUDY ON CONSUMERS’ PERCEPTION TOWARDS SOCIAL MEDIA ADVERTISING IN ERODE DI...
A STUDY ON CONSUMERS’ PERCEPTION TOWARDS SOCIAL MEDIA ADVERTISING IN ERODE DI...
IRJET Journal
 
8367 collaborative policy-administration-pdf
8367 collaborative policy-administration-pdf8367 collaborative policy-administration-pdf
8367 collaborative policy-administration-pdf
Chinnu SD
 

Similar to !World Research Codes and Guidelines ESOMAR GUIDEL.docx (20)

Develop project pia+ risk identification
Develop project pia+ risk identificationDevelop project pia+ risk identification
Develop project pia+ risk identification
 
A Research Project PresentationOnline Policies for Enabling Fi.docx
A Research Project PresentationOnline Policies for Enabling Fi.docxA Research Project PresentationOnline Policies for Enabling Fi.docx
A Research Project PresentationOnline Policies for Enabling Fi.docx
 
Integration of Bayesian Theory and Association Rule Mining in Predicting User...
Integration of Bayesian Theory and Association Rule Mining in Predicting User...Integration of Bayesian Theory and Association Rule Mining in Predicting User...
Integration of Bayesian Theory and Association Rule Mining in Predicting User...
 
Integration of Bayesian Theory and Association Rule Mining in Predicting User...
Integration of Bayesian Theory and Association Rule Mining in Predicting User...Integration of Bayesian Theory and Association Rule Mining in Predicting User...
Integration of Bayesian Theory and Association Rule Mining in Predicting User...
 
GDPR's Impact on Social Media - Everything You Need to Know
GDPR's Impact on Social Media - Everything You Need to KnowGDPR's Impact on Social Media - Everything You Need to Know
GDPR's Impact on Social Media - Everything You Need to Know
 
chapter 6 Ethics and Professionalism of ET.pptx
chapter 6   Ethics and Professionalism of ET.pptxchapter 6   Ethics and Professionalism of ET.pptx
chapter 6 Ethics and Professionalism of ET.pptx
 
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docxRunning head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
 
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docxRunning head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
 
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docxRunning head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
 
An approach for evaluation of social...
An approach for evaluation of social...An approach for evaluation of social...
An approach for evaluation of social...
 
Social networks management policies
Social networks management policiesSocial networks management policies
Social networks management policies
 
ETHICAL ISSUES WITH CUSTOMER DATA COLLECTION
ETHICAL ISSUES WITH CUSTOMER DATA COLLECTIONETHICAL ISSUES WITH CUSTOMER DATA COLLECTION
ETHICAL ISSUES WITH CUSTOMER DATA COLLECTION
 
Advanced Techniques in Social Media Data Analysis.docx
Advanced Techniques in Social Media Data Analysis.docxAdvanced Techniques in Social Media Data Analysis.docx
Advanced Techniques in Social Media Data Analysis.docx
 
The Fund Industry Goes Social Webinar
The Fund Industry Goes Social WebinarThe Fund Industry Goes Social Webinar
The Fund Industry Goes Social Webinar
 
Social Media Discussion Paper
Social Media Discussion PaperSocial Media Discussion Paper
Social Media Discussion Paper
 
Session B: Handout 3
Session B: Handout 3Session B: Handout 3
Session B: Handout 3
 
How to Safely Scrape Data from Social Media Platforms and News Websites.pdf
How to Safely Scrape Data from Social Media Platforms and News Websites.pdfHow to Safely Scrape Data from Social Media Platforms and News Websites.pdf
How to Safely Scrape Data from Social Media Platforms and News Websites.pdf
 
How to Safely Scrape Data from Social Media Platforms and News Websites.pptx
How to Safely Scrape Data from Social Media Platforms and News Websites.pptxHow to Safely Scrape Data from Social Media Platforms and News Websites.pptx
How to Safely Scrape Data from Social Media Platforms and News Websites.pptx
 
A STUDY ON CONSUMERS’ PERCEPTION TOWARDS SOCIAL MEDIA ADVERTISING IN ERODE DI...
A STUDY ON CONSUMERS’ PERCEPTION TOWARDS SOCIAL MEDIA ADVERTISING IN ERODE DI...A STUDY ON CONSUMERS’ PERCEPTION TOWARDS SOCIAL MEDIA ADVERTISING IN ERODE DI...
A STUDY ON CONSUMERS’ PERCEPTION TOWARDS SOCIAL MEDIA ADVERTISING IN ERODE DI...
 
8367 collaborative policy-administration-pdf
8367 collaborative policy-administration-pdf8367 collaborative policy-administration-pdf
8367 collaborative policy-administration-pdf
 

More from katherncarlyle

After reading chapter 4, evaluate the history of the Data Encryp.docx
After reading chapter 4, evaluate the history of the Data Encryp.docxAfter reading chapter 4, evaluate the history of the Data Encryp.docx
After reading chapter 4, evaluate the history of the Data Encryp.docx
katherncarlyle
 
After reading Chapter 2 and the Required Resources please discuss th.docx
After reading Chapter 2 and the Required Resources please discuss th.docxAfter reading Chapter 2 and the Required Resources please discuss th.docx
After reading Chapter 2 and the Required Resources please discuss th.docx
katherncarlyle
 
After reading chapters 16 and 17 post a short reflection, approximat.docx
After reading chapters 16 and 17 post a short reflection, approximat.docxAfter reading chapters 16 and 17 post a short reflection, approximat.docx
After reading chapters 16 and 17 post a short reflection, approximat.docx
katherncarlyle
 
After reading chapter 3, analyze the history of Caesar Cypher an.docx
After reading chapter 3, analyze the history of Caesar Cypher an.docxAfter reading chapter 3, analyze the history of Caesar Cypher an.docx
After reading chapter 3, analyze the history of Caesar Cypher an.docx
katherncarlyle
 
After having learned about Cognitive Psychology and Humaistic Psycho.docx
After having learned about Cognitive Psychology and Humaistic Psycho.docxAfter having learned about Cognitive Psychology and Humaistic Psycho.docx
After having learned about Cognitive Psychology and Humaistic Psycho.docx
katherncarlyle
 
Advisory from Professionals Preparing Information .docx
Advisory from Professionals Preparing Information .docxAdvisory from Professionals Preparing Information .docx
Advisory from Professionals Preparing Information .docx
katherncarlyle
 
After completing the assigned readings and watching the provided.docx
After completing the assigned readings and watching the provided.docxAfter completing the assigned readings and watching the provided.docx
After completing the assigned readings and watching the provided.docx
katherncarlyle
 
Advocacy is a vital component of the early childhood professiona.docx
Advocacy is a vital component of the early childhood professiona.docxAdvocacy is a vital component of the early childhood professiona.docx
Advocacy is a vital component of the early childhood professiona.docx
katherncarlyle
 
After completing this weeks assignment...   Share with your classma.docx
After completing this weeks assignment...   Share with your classma.docxAfter completing this weeks assignment...   Share with your classma.docx
After completing this weeks assignment...   Share with your classma.docx
katherncarlyle
 
African Americans men are at a greater risk for developing prostate .docx
African Americans men are at a greater risk for developing prostate .docxAfrican Americans men are at a greater risk for developing prostate .docx
African Americans men are at a greater risk for developing prostate .docx
katherncarlyle
 
Advances over the last few decades have brought innovative and c.docx
Advances over the last few decades have brought innovative and c.docxAdvances over the last few decades have brought innovative and c.docx
Advances over the last few decades have brought innovative and c.docx
katherncarlyle
 
Advocacy is a vital component of the early childhood professional’s .docx
Advocacy is a vital component of the early childhood professional’s .docxAdvocacy is a vital component of the early childhood professional’s .docx
Advocacy is a vital component of the early childhood professional’s .docx
katherncarlyle
 
Advocacy Through LegislationIdentify a problem or .docx
Advocacy Through LegislationIdentify a problem or .docxAdvocacy Through LegislationIdentify a problem or .docx
Advocacy Through LegislationIdentify a problem or .docx
katherncarlyle
 
Advanced pathoRespond to Stacy and Sonia 1 day agoStacy A.docx
Advanced pathoRespond to  Stacy and Sonia 1 day agoStacy A.docxAdvanced pathoRespond to  Stacy and Sonia 1 day agoStacy A.docx
Advanced pathoRespond to Stacy and Sonia 1 day agoStacy A.docx
katherncarlyle
 
After completing the reading this week, we reflect on a few ke.docx
After completing the reading this week, we reflect on a few ke.docxAfter completing the reading this week, we reflect on a few ke.docx
After completing the reading this week, we reflect on a few ke.docx
katherncarlyle
 
Adopting Enterprise Risk Management inToday’s Wo.docx
Adopting Enterprise Risk Management inToday’s Wo.docxAdopting Enterprise Risk Management inToday’s Wo.docx
Adopting Enterprise Risk Management inToday’s Wo.docx
katherncarlyle
 
Addisons diseaseYou may use the textbook as one reference a.docx
Addisons diseaseYou may use the textbook as one reference a.docxAddisons diseaseYou may use the textbook as one reference a.docx
Addisons diseaseYou may use the textbook as one reference a.docx
katherncarlyle
 
AdultGeriatric DepressionIntroduction According to Mace.docx
AdultGeriatric DepressionIntroduction According to Mace.docxAdultGeriatric DepressionIntroduction According to Mace.docx
AdultGeriatric DepressionIntroduction According to Mace.docx
katherncarlyle
 
Adopt-a-Plant Project guidelinesOverviewThe purpose of this.docx
Adopt-a-Plant Project guidelinesOverviewThe purpose of this.docxAdopt-a-Plant Project guidelinesOverviewThe purpose of this.docx
Adopt-a-Plant Project guidelinesOverviewThe purpose of this.docx
katherncarlyle
 
Adolescent development is broad and wide-ranging, including phys.docx
Adolescent development is broad and wide-ranging, including phys.docxAdolescent development is broad and wide-ranging, including phys.docx
Adolescent development is broad and wide-ranging, including phys.docx
katherncarlyle
 

More from katherncarlyle (20)

After reading chapter 4, evaluate the history of the Data Encryp.docx
After reading chapter 4, evaluate the history of the Data Encryp.docxAfter reading chapter 4, evaluate the history of the Data Encryp.docx
After reading chapter 4, evaluate the history of the Data Encryp.docx
 
After reading Chapter 2 and the Required Resources please discuss th.docx
After reading Chapter 2 and the Required Resources please discuss th.docxAfter reading Chapter 2 and the Required Resources please discuss th.docx
After reading Chapter 2 and the Required Resources please discuss th.docx
 
After reading chapters 16 and 17 post a short reflection, approximat.docx
After reading chapters 16 and 17 post a short reflection, approximat.docxAfter reading chapters 16 and 17 post a short reflection, approximat.docx
After reading chapters 16 and 17 post a short reflection, approximat.docx
 
After reading chapter 3, analyze the history of Caesar Cypher an.docx
After reading chapter 3, analyze the history of Caesar Cypher an.docxAfter reading chapter 3, analyze the history of Caesar Cypher an.docx
After reading chapter 3, analyze the history of Caesar Cypher an.docx
 
After having learned about Cognitive Psychology and Humaistic Psycho.docx
After having learned about Cognitive Psychology and Humaistic Psycho.docxAfter having learned about Cognitive Psychology and Humaistic Psycho.docx
After having learned about Cognitive Psychology and Humaistic Psycho.docx
 
Advisory from Professionals Preparing Information .docx
Advisory from Professionals Preparing Information .docxAdvisory from Professionals Preparing Information .docx
Advisory from Professionals Preparing Information .docx
 
After completing the assigned readings and watching the provided.docx
After completing the assigned readings and watching the provided.docxAfter completing the assigned readings and watching the provided.docx
After completing the assigned readings and watching the provided.docx
 
Advocacy is a vital component of the early childhood professiona.docx
Advocacy is a vital component of the early childhood professiona.docxAdvocacy is a vital component of the early childhood professiona.docx
Advocacy is a vital component of the early childhood professiona.docx
 
After completing this weeks assignment...   Share with your classma.docx
After completing this weeks assignment...   Share with your classma.docxAfter completing this weeks assignment...   Share with your classma.docx
After completing this weeks assignment...   Share with your classma.docx
 
African Americans men are at a greater risk for developing prostate .docx
African Americans men are at a greater risk for developing prostate .docxAfrican Americans men are at a greater risk for developing prostate .docx
African Americans men are at a greater risk for developing prostate .docx
 
Advances over the last few decades have brought innovative and c.docx
Advances over the last few decades have brought innovative and c.docxAdvances over the last few decades have brought innovative and c.docx
Advances over the last few decades have brought innovative and c.docx
 
Advocacy is a vital component of the early childhood professional’s .docx
Advocacy is a vital component of the early childhood professional’s .docxAdvocacy is a vital component of the early childhood professional’s .docx
Advocacy is a vital component of the early childhood professional’s .docx
 
Advocacy Through LegislationIdentify a problem or .docx
Advocacy Through LegislationIdentify a problem or .docxAdvocacy Through LegislationIdentify a problem or .docx
Advocacy Through LegislationIdentify a problem or .docx
 
Advanced pathoRespond to Stacy and Sonia 1 day agoStacy A.docx
Advanced pathoRespond to  Stacy and Sonia 1 day agoStacy A.docxAdvanced pathoRespond to  Stacy and Sonia 1 day agoStacy A.docx
Advanced pathoRespond to Stacy and Sonia 1 day agoStacy A.docx
 
After completing the reading this week, we reflect on a few ke.docx
After completing the reading this week, we reflect on a few ke.docxAfter completing the reading this week, we reflect on a few ke.docx
After completing the reading this week, we reflect on a few ke.docx
 
Adopting Enterprise Risk Management inToday’s Wo.docx
Adopting Enterprise Risk Management inToday’s Wo.docxAdopting Enterprise Risk Management inToday’s Wo.docx
Adopting Enterprise Risk Management inToday’s Wo.docx
 
Addisons diseaseYou may use the textbook as one reference a.docx
Addisons diseaseYou may use the textbook as one reference a.docxAddisons diseaseYou may use the textbook as one reference a.docx
Addisons diseaseYou may use the textbook as one reference a.docx
 
AdultGeriatric DepressionIntroduction According to Mace.docx
AdultGeriatric DepressionIntroduction According to Mace.docxAdultGeriatric DepressionIntroduction According to Mace.docx
AdultGeriatric DepressionIntroduction According to Mace.docx
 
Adopt-a-Plant Project guidelinesOverviewThe purpose of this.docx
Adopt-a-Plant Project guidelinesOverviewThe purpose of this.docxAdopt-a-Plant Project guidelinesOverviewThe purpose of this.docx
Adopt-a-Plant Project guidelinesOverviewThe purpose of this.docx
 
Adolescent development is broad and wide-ranging, including phys.docx
Adolescent development is broad and wide-ranging, including phys.docxAdolescent development is broad and wide-ranging, including phys.docx
Adolescent development is broad and wide-ranging, including phys.docx
 

Recently uploaded

ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
PECB
 
Smart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICTSmart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICT
simonomuemu
 
Walmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdfWalmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdf
TechSoup
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
Celine George
 
Cognitive Development Adolescence Psychology
Cognitive Development Adolescence PsychologyCognitive Development Adolescence Psychology
Cognitive Development Adolescence Psychology
paigestewart1632
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
tarandeep35
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
amberjdewit93
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
adhitya5119
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
WaniBasim
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
History of Stoke Newington
 
How to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 InventoryHow to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 Inventory
Celine George
 
DRUGS AND ITS classification slide share
DRUGS AND ITS classification slide shareDRUGS AND ITS classification slide share
DRUGS AND ITS classification slide share
taiba qazi
 
How to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRMHow to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRM
Celine George
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
AyyanKhan40
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
chanes7
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
adhitya5119
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
Priyankaranawat4
 
How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17
Celine George
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Dr. Vinod Kumar Kanvaria
 

Recently uploaded (20)

ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
 
Smart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICTSmart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICT
 
Walmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdfWalmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdf
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
 
Cognitive Development Adolescence Psychology
Cognitive Development Adolescence PsychologyCognitive Development Adolescence Psychology
Cognitive Development Adolescence Psychology
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
 
How to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 InventoryHow to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 Inventory
 
DRUGS AND ITS classification slide share
DRUGS AND ITS classification slide shareDRUGS AND ITS classification slide share
DRUGS AND ITS classification slide share
 
How to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRMHow to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRM
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
 
How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
 

!World Research Codes and Guidelines ESOMAR GUIDEL.docx

  • 1. ! World Research Codes and Guidelines ESOMAR GUIDELINE ON SOCIAL MEDIA RESEARCH CONTENTS 1. Introduction 1.1 Scope 1.2 Definitions 2. Key principles 2.1 Distinguishing market, social and opinion research as a purpose 2.2 Conforming to law 2.3 Consent and notification 2.4 Protecting identifiable data 2.5 Ensuring no harm 2.6 Children
  • 2. 2.7 Reputation of the industry 2.8 Reporting 3. Some specific recommendations for certain social media 3.1 Defining social media areas 3.2 Private social media areas issues 3.3 Market research social media areas issues 4. Further Information Appendix 1: Key fundamentals of the ICC/ESOMAR Code Appendix 2: Contract/Policy advice with sub-contractors/third party suppliers of SMR ! © 2011 ESOMAR. All rights reserved. Issued July 2011 No part of this publication may be reproduced or copied in any form or by any means, or translated, without the prior permission in writing of ESOMAR. ESOMAR codes and guidelines are drafted in English and the English texts are the definitive versions. !
  • 3. "! BACK TO CONTENTS 1. INTRODUCTION The evolution of social media in recent years has changed the way that hundreds of millions of people share information about themselves around the world. The concept of consumers generating their own content on the internet has become ubiquitous. This has created new opportunities for researchers to observe, interact and gather information. Already many techniques have been developed to leverage social media such as community panels, crowd-sourcing, co-creation, netnography, blog mining and web scraping. Moreover it is likely that many more will evolve over the coming years as the internet continues to change. The ICC/ESOMAR International Code on Market and Social Research requires that the same fundamental ethical and professional principles which govern face to face, mail and telephone research, are also applied to all types of online research (see Appendix 1). This document aims to provide guidance for the use of social media in market, social and opinion research. It builds upon previously issued guidelines concerning Online Research and Passive Data Collection and supports ESOMAR’s mission to ensure effective self-regulation to foster public confidence in our profession and industry. It aims to provide social media researchers with an awareness of the issues and guidance on how they can best apply the Code’s fundamental principles of respect for consumers, trust, transparency and professionalism. This guideline also supports ESOMAR’s consistent position to maintain a clear distinction between market, social and opinion research and marketing
  • 4. and PR activities. Recognising that online research generally, and social media specifically, is continually evolving, this guideline conveys ethical and professional principles rather than being prescriptive about methodology. Social media data often includes personally identifiable information. Most regulations in this area were developed before it was possible for one person to communicate with many on a publicly accessible online platform. Updates in privacy and data protection laws are still being developed and often lag changes in practises that have become generally accepted. This guideline is based on the principles underlying relevant laws and regulations presently in operation, especially with respect to data protection and intellectual property. However it also aims to propose pragmatic solutions that work within the spirit of existing laws and the ICC/ESOMAR Code, while aligning with currently accepted usage of online information around the world. 1.1 Scope This guideline covers the collection of social media data for market, opinion or social research purposes. It recognizes that there are many different activities enabled by social media - of which market, opinion or social research is just one – and that these varied activities (including customer service and customer relations management) necessarily have different implications for consumers and those who make use of social media. Researchers must not allow personal data they collect in a market research project to be used for any other purpose than market, social and opinion research. If it is intended to collect personalised social media data for other purposes, they
  • 5. must clearly differentiate this activity from their research activities and not misrepresent it as research. See section 2.1 for more on this issue. This guideline shall be read in conjunction with the ICC/ESOMAR International Code on Market and Social Research and other ESOMAR guidelines available at www.esomar.org# 1.2 Definitions Social media is defined as internet based platforms and technologies that permit users’ interaction and/or facilitate the creation and exchange of user generated content. Whilst the scope is evolving, currently the most frequently used examples include: • Online forums/discussions, communities, blogs, social networks (e.g. Facebook) • Video/photo sharing (e.g. YouTube) • Multi-person/group communication and/or collaboration platforms (e.g. Twitter). Social media data refers to the information (photos, comments, etc.) that users generate or share while engaged in or with social media. It often includes personally identifiable data. ! $!
  • 6. BACK TO CONTENTS Social media research (SMR) covers all research where social media data is utilised either by itself or in conjunction with information from other sources. Examples of current social media research include: • Monitoring or crawling social media platforms (from automated monitoring of brand sentiment through to ad-hoc desk research) • Ethnographic research (from observing online social behaviour to participating and collecting primary data in various forms, including ‘friending’ users). This includes netnography • Co-creational techniques used for research purposes • Online communities that generate or deliver consumer opinions, reactions, feedback on a regular, formal or systematic basis. Note that SMR excludes behavioural tracking research, even when conducted on social media websites. Throughout this guideline a number of specific terms will be used whose meanings are as follows: Data collection is the process of extracting data from social media data for analysis, and is sometimes referred to as scraping or crawling. This can be automated or done manually. Masking is a technique whereby the original social media data such as comments, photos or videos is altered to a point that it cannot be traced back or attributed to the original user
  • 7. (using a search engine for example). See Section 2.4. MROC (Market Research Online Community) is one of the more frequently used terms used to describe an online community created specifically for the purposes of market, social and opinion research. Others include DORC (Dedicated Online Research Community). Personally identifiable information (referred to as personal data in EU legislation) is information that can be used to uniquely identify, contact, or locate a single person or combined with other sources to uniquely identify a single individual ToU is the Terms of Use policy that a website or online service requires its users to accept. Walled garden is an online service which requires users to register or apply for membership before being permitted to participate. A walled garden can only be accessed after the user has obtained a login and/or password, even if entry is automatic. The following general terms are taken from the definitions in the ICC/ESOMAR Code: Client is any individual or organisation that requests, commissions or subscribes to all or any part of a market research project. Market research is the systematic gathering and interpretation of information about individuals or organisations using the statistical and analytical methods and techniques of the applied social sciences to gain insight or support decision making. The identity of respondents will not be revealed to the user of the information without explicit consent and no sales
  • 8. approach will be made to them as a direct result of their having provided information. Researcher is any individual or organisation carrying out, or acting as a consultant on a market research project, including those working in client organisations. User is any individual or organisation from which information is collected for the purposes of a market research project, whether they are aware of it or not, or is approached for interview. In the context of SMR, the user may also be referred to as an Author, Member or Poster. (Note: this term is equivalent to a Respondent or Participant in other market, opinion or social research modes.) ! %! BACK TO CONTENTS 2. KEY PRINCIPLES All the core fundamental principles of the ICC/ESOMAR Code (see Appendix 1) apply to social media research. The following section explains the implications of them for this context.
  • 9. 2.1 Distinguishing market, social and opinion research as the purpose Researchers must not allow personal data they collect in a market research project to be used for any other purpose than market, social and opinion research. This principle can cause particular issues when investigating social media. Under Article 7c of the ICC/ESOMAR Code, if quotes containing personally identifiable information are passed to the client, unless national provisions require stricter regulations, the following conditions must apply: i) the respondent has explicitly expressed this wish and/or ii) the respondent has given their explicit consent iii) on the understanding that no commercial activity will be directed at them as a direct result of their having provided information. In some cases those taking part in research-based communities could be exposed to sales and PR messages as part of the research process. This is permissible under the ICC/ESOMAR Code provided the purpose is for research (see section 3.3 for more guidance on how best to inform users about the purpose). The ICC/ESOMAR Code requires researchers to be transparent in their dealings and not to misrepresent as market research any project which has another purpose. To aid clarity and protect the reputation of the researcher and of market research, the research services and the organisation or company carrying them out must be presented in such a way that they are clearly differentiated from any non-research activities.
  • 10. To ensure the public is not confused when social media data is being used by an organisation which is involved in both research and non-research activities, it is recommended that: • the company’s privacy policy and promotional literature must differentiate the different services that are being offered and separate market research from other activities; • it must be easy for users and others to contact the researchers carrying out market research and those making enquiries must not be confused by having apparently to get in touch with a non-research organisation or deal with non-research staff to raise queries or complaints about market research activities; • the introduction used when contacting a user must clearly define the purpose and they must not be left with the impression that the exercise has a research purpose if it does not. These requirements do not prevent researchers from being involved in non-research activities providing the purpose of collecting personally identifiable data is not misrepresented. Nor do they in any way restrict the right of the organisation to promote the fact that it carries out both market research and other activities providing they are clearly differentiated and that they are conducted separately and in accordance with the relevant laws and local professional rules of conduct. More guidance in this area is given in the Distinguishing Market Research from Other Data Collection Activities# 2.2 Conforming to the law Researchers must conform to all relevant national and international laws. There are three main legal aspects to consider
  • 11. here. First, social media research must comply with national and international data privacy legislation and relevant requirements for notice, consent, accuracy, security and access when personally identifiable data is collected and stored. See section 2.3 for more on ‘Consent’. There are also legal issues and measures (e.g. Safe Harbour requirements) relating to international transfer of personal data where data from which personal identifiers have not been removed is transmitted across national borders!as well as considerations as to whether the country to which the data is transferred offers an adequate level of protection from a data protection perspective. ! &! BACK TO CONTENTS The second legal issue is that by accessing virtually all online services, researchers will be subject to the service owners’ Terms of Use (ToU). Most ToU have intellectual property rights clauses that explicitly forbid the unauthorised copying of material. Many go further to bar all forms of social media data collection. Subject to ‘fair use’ exceptions in certain countries, such ToU could prevent a researcher from even copying material to their computer for further analysis and forbid any form of
  • 12. selling on of that information to their clients, without permission. For example, the following popular social media ToU can be located on the web at: Facebook: www.facebook.com/terms.php Twitter: twitter.com/tos LinkedIn: www.linkedin.com/static?key=user_agreement Researchers should therefore check what conditions apply to the content they use from social media and respect any requests for privacy (including robot.txt file requests, secure pages, etc). They must seek permission to scrape content from any source where this might breach the ToU and to abide by that service’s ruling. Where permission is not granted, reading of such information and summarising the issues without copying anything is permissible, subject to the guidelines in section 3. Note, researchers should not engage in efforts to circumvent web sites’ protections of the data they hold (eg IP spoofing, fictitious user ID’s, etc). Where researchers use third party aggregators for data collection services, the onus is on the researcher to check with their supplier that permissions have been obtained and the data has been sourced lawfully (see Appendix 2). The third legal aspect concerns copyright. The ToU will usually also address copyright issues and the use of material on the website. Often the website owner will also be the copyright owner. However copyright laws are complex. They also vary across jurisdictions and researchers must acquaint themselves and observe the relevant laws on this topic.
  • 13. 2.3 Consent and notification The ICC/ESOMAR Code states that users’ co-operation must be based on adequate information about the purpose and nature of the project and their agreement to participation obtained. In addition, in some countries, existing data protection laws may also require users to be informed when personally identifiable data is collected. Although it is potentially easy to obtain consent from members of market, social and opinion research communities, it poses more issues for other social media where users will generally not have been informed in advance or have consented to its use for research unless this is covered in the ToU. As noted in the ESOMAR Online Research guideline, researchers must remain mindful of concerns about privacy and intrusion if sending an email requesting such consent. They must reduce any inconvenience such an email might cause to the recipient by clearly stating its purpose in the subject heading and keeping the total message as brief as possible. If consent has not been obtained (directly or under the ToU) researchers must ensure that they report only depersonalised data from social media sources. If researchers are using automated data collection services, they are recommended to use filters and controls to remove personal identifiers such as user names, photos, links to the user’s profile, etc. Where this is not possible or they are manually collecting data from websites, their analysis must only be with depersonalised data and no attempt should be made to identify people – see section 2.4 for a discussion on when identifiable quotes can be potentially used. If depersonalized social media research data is passed on to
  • 14. another researcher or client, the researcher must have a contract with the recipient of the data which requires them not to attempt to use technical means to re-identify quotes or their posters and use such data for a non research purpose and to observe the ICC/ESOMAR Code and the provisions of this guideline. When researchers, or their automated agents, interact directly with users within social media, they must also convey to them their purpose, role and how they will use any comments. They must also seek permission from users and the service owners or their representatives to conduct their work. Furthermore when taking part, researchers must ensure they do not misrepresent themselves as a genuine member of that social media space. ! '! BACK TO CONTENTS When researchers, or their automated agents, are working in social media spaces, they must provide an email address and a telephone number and/or mail address to facilitate contact and verification. For additional transparency, and to meet data collection notice requirements, researchers must publish a privacy policy on their website which explains how any personal data they collect is handled, offering appropriate measures to ensure that users can exercise their rights to
  • 15. require that their personal data are deleted or rectified, or that their personal data are not made available to others. 2.4 Protecting identifiable data Social media platforms offer many opportunities to view personally identifiable data. Some people post information that overtly discloses their identity, are aware of this and have a diminished expectation of privacy. Others are not aware that the services they are using are open for others to collect data from or think that they have disguised their identity by using a pseudonym or username. However, online services are now available that make it possible in many cases to identify a “poster” from their username or comments and can link that to many other aspects of personally identifiable data including their address, phone number, likely income and socio demographic data. Given this, data cannot always be 100% anonymised on the internet by merely removing the username and linked URL from the comment. Therefore if researchers wish to quote publicly made comments in reports or to pass these on to people not bound by the ICC/ESOMAR Code (or a contract linked to this), they must first check if the user’s identity can be easily discoverable using online search services. If it can, they must make reasonable efforts to either seek permission from the user to quote them or mask the comment to such an extent that the identity of the user cannot be obtained. Masking is a technique whereby raw data is so changed that it becomes very difficult for others to find the data online with a search service and thereby identify the person from whom it originates. It is a useful technique to ensure that the anonymity of people making comments is preserved where 1. the researcher has not sought their permission and
  • 16. 2. the comment would be easily traceable with a search service. The degree of masking required will depend on the nature of the comment and its author. Masking can be applied in varying degrees ranging from just changing the odd word through altering key features of a comment to précising. It is the responsibility of the researcher to decide which is most appropriate. Factors to take into account include: • If the topic being discussed is sensitive or personal • If abusive language is used • If it includes anything against the law • If it includes anything embarrassing or is likely to impact career opportunities • If it includes any personally identifiable information • If it includes any data about others that is not already public. In the case of public pictures or videos, consideration should be given to techniques such as pixelation of faces, where masking is required. Note, masking is unlikely to be sufficient in many B2B contexts or when researching very small groups, as identification is highly likely even if masked. When a researcher passes a masked comment on in a report to a client, they should clearly indicate if it has been masked. If a researcher decides to seek users’ permission to quote them, they must abide by relevant country laws, be sensitive to users’ concerns about being observed and explain clearly and honestly the purpose of their work. The user should be given the opportunity to check the bona fides of the researcher, if they so wish, before deciding what to do. Where researchers use services to enhance comments with demographic profiles (eg personal profiles), they should only use this information for research classification purposes. Since
  • 17. such services often provide other identifiable personal information (eg phone number, address or email), they could permit unintentional linkage of research data to personal data and this must not be used in analysis or passed on. ! (! BACK TO CONTENTS 2.5 Ensuring no harm Another key principle of the ICC/ESOMAR Code is that the rights of users as private individuals shall be respected and that they shall not be harmed or adversely affected as the direct result of participating in research. The greatest risk in social media research relates to inadvertently revealing the identities of users, who did not realise they were participating in research and so would not expect to be identified. Again to ensure users are not harmed by research activities, the abiding principle must be one of caution, removing any personal identifiers in data as soon as possible taking into account necessary quality controls. 2.6 Children Researchers must take special care when carrying out research among children and young people (see ESOMAR Guideline on Interviewing Children and Young People).
  • 18. This is a particular issue with many social media platforms as their users can include children. Where data is likely to be from a child, researchers must take particular care in masking responses to ensure that the user cannot be identified or obtain permission from a parent or legal guardian to collect and use identifiable data (see ESOMAR Guideline for Online Research). Where a market research online community (MROC) is being conducted with young people, permission must be obtained from a parent or legal guardian. 2.7 Reputation of the industry Researchers must not do anything that might damage the reputation of market, social and opinion research. Given its specific nature, working with social media requires additional care since any mistakes or misunderstandings can be spread virally within minutes across the network. Social media researchers must therefore be mindful of the core principles of the ICC/ESOMAR Code in the work they and their companies conduct and avoid activities and practices which could undermine public confidence in market, social and opinion research. 2.8 Reporting The ICC/ESOMAR Code requires that projects are reported and documented accurately, transparently and objectively. As social media research is a relatively new area, care needs to be taken by researchers to explain the impact that this sample source may have had on the results and their validity and reliability. This is necessary to ensure transparency for all involved and to educate users who may not be familiar with this type of research data rather than to devalue the
  • 19. information obtained. 3. SOME SPECIFIC RECOMMENDATIONS FOR CERTAIN SOCIAL MEDIA 3.1 Defining social media areas There are three areas in which social, opinion and market research could be conducted. These are defined as follows: • Public social media: This covers the majority of social media. It includes all places where access has been set by the website or the user to ‘public’ and entry is without any form of entry barrier. It can also include those where a username or password is required, but these are required for identification or site revenue reasons, rather than to protect the privacy of the data posted. Examples include public profile pages of social media networks; public micro- blogging posts; and many forums (including those where a username may be required, but is automatically granted, that is they are not moderated). • Private social media: This covers areas where the user or the website do not want the data to be publically accessible. All require username identification for access, although this is not a distinguishing feature. These are sometimes referred to as ‘walled gardens’. Examples include: ‘private wall to wall’ or individual communications on social media networks; protected posts on micro-blogging sites; or forums/groups areas where admittance is controlled by an administrator or moderator. !
  • 20. )! BACK TO CONTENTS • Market research social media: This covers any online place specifically created for market, social and opinion research purposes where users have been informed of its function and the use to which their comments might be put. Typically (but not always) these are also private spaces. Examples include Market Research Online Communities (MROC’s), certain blogs, online ethnographic and co-creational techniques which utilise social media platforms. In addition to the guidelines in Section 2, researchers need to consider the following when using data derived from private and market research social media spaces. 3.2 Private social media areas issues Researchers can only access these areas with the permission of the service operator or their agents. They should make it clear in their profile and preferably also in their avatar and/or username that they are a researcher, who they work for and their purpose. In interacting with members of a private area they should include a reference to their role, so that members are left in no doubt who they are talking to. As a general rule, researchers should not copy or scrape content within private areas, even if they have permission of the site owner. If researchers do so, it should be made clear to all users that this is happening and they should provide individuals with a process to be excluded from such data collection. Researchers must observe great sensitivity interacting with people in private spaces. When this needs to be done, they
  • 21. must follow the guidelines in section 2.3 on consent and notification and 2.4 on protecting identifiable data# 3.3 Market research social media areas issues Market, social and opinion research spaces are normally private walled gardens where members must agree the purpose for which data is being collected and the terms and conditions for participation before they sign up to take part in the community, blog or co-creational project. These terms must be simple, clearly worded and easy to understand. Members must be fully aware of: • The purpose of the space - that it is for research, but in the case of a MROC, that they may be exposed to marketing information for research purposes only. This might include incentives for panel participation noting that using the client’s products could be regarded as marketing in some countries • That all data may be shared with the client – this is especially important since some members will actively share real names and photos • How it could be used • The rules for interacting (i.e. no cyber-bullying, defamatory comments etc) • The site privacy policy including requirements listed in the Online Research guideline. Unlike public internet areas, content can be copied and scraped and utilised for any research purpose, subject to members being fully aware of these applications. However the personal identity of those making comments must be
  • 22. protected. Some research communities offer clients opportunities to meet members and interact with them directly but this must be only with the consent of members. Clients must agree to abide by the ICC/ESOMAR Code, in particular that such interaction will be for research purposes only. Where spaces are communal, members should be warned about contributing personally identifiable information. For example, members in a community should be given the option of using a pseudonym and uploading a photo of an avatar, a pet or inanimate object, rather than requiring that they use their real name and a photo of themselves. In addition on sign up, researchers should provide reassurance to community members that they will never ask for information that could create a risk of identity theft if lost, misused or disclosed to an unauthorised party, such as credit card numbers, social insurance/social security numbers or bank account details. The role of moderators and clients should be unambiguously identified as such in all their interactions and communications with members. However care needs to be taken to protect them from being easily contacted outside the project, so it may be necessary to withhold full names and/or emails of such people and to utilise secure email systems within the relevant software. ! *!
  • 23. BACK TO CONTENTS Where MROC’s are used to test products, advertising and/or communication of messages it is important that users are made aware of this. If users are taking part in a simulated sales test, it must be clear that they are helping in a research project and not in some form of direct marketing or sales exercise. No personal data collected during the course of an MROC may be used for any non-research purpose such as subsequent direct marketing or promotion to the individuals taking part. 4. FURTHER INFORMATION Members who are unsure about the application of the Guideline in specific circumstances can seek advice by contacting the ESOMAR Professional Standards Committee, [email protected] Project Team • Adam Phillips, Committee Chair, Managing Director, Real Research and Chair of ESOMAR Professional Standards and Legal Committees • Ulf Andersen, MD of Synovate Scandinavia • Pete Comley, Founder, Join the Dots (previously known as Virtual Surveys) • Ed Keller, CEO, Keller Fay Group, co-founder of WOMMA Word-of-Mouth Marketing Association • Peter Milla, Member of CASRO Task Force • Annie Petitt, Chief Research Officer, Conversition • Niels Schillewaert, Managing Partner of InSites Consulting • Kristin Sharp, CEO of Ipsos Understanding UnLtd • David Stark, VP, Compliance and Privacy, GfK, member of
  • 24. ESOMAR Professional Standards and Legal Committees ! +! BACK TO CONTENTS APPENDIX 1: KEY FUNDAMENTALS OF THE ICC/ESOMAR CODE ! 1. Market researchers shall conform to all relevant national and international laws. 2. Market researchers shall behave ethically and shall not do anything which might damage the reputation of market research. 3. Market researchers shall take special care when carrying out research among children and young people. 4. Users’ cooperation is voluntary and must be based on adequate, and not misleading, information about the general purpose and nature of the project when their agreement to participate is being obtained and all such statements shall be honoured. 5. The rights of users as private individuals shall be respected by market researchers and they shall not be harmed or adversely affected as the direct result of cooperating in a market research project. 6. Market researchers shall never allow personal data they collect in a market research project to be used for any
  • 25. purpose other than market research. 7. Market researchers shall ensure that projects and activities are designed, carried out, reported and documented accurately, transparently and objectively. 8. Market researchers shall conform to the accepted principles of fair competition. APPENDIX 2: CONTRACT/POLICY ADVICE WITH SUB- CONTRACTORS/THIRD PARTY SUPPLIERS OF SMR When sub-contractors are used, ESOMAR recommends the researcher checks if they follow appropriate practices and procedures, especially with respect to observing any legal requirements and also about the privacy and protection of identifiable user data. Researchers should: • Carry out due diligence when identifying and selecting sub- contractors • Execute written Non-Disclosure agreements • Execute written contracts that outline duties, obligations, and responsibilities of the sub-contractors that address all parts of the research process, especially privacy and data protection; parties involved and address non-disclosure requirements • Engage in on-going oversight of sub-contractors and their activities and • Ensure any data provided to them by sub-contractors is provided legally and in accordance to service ToU.
  • 26. Policies and contracts relating to the research process and privacy are available from CASRO ,http://www.casro.org!- through the CASRO Privacy Protection Program (CASRO 3P). The CASRO 3P program has been designed to address the needs of various geographies, including the US and the EU. Model contracts for transfer of personal data from the EU are available from the European Commission http://ec.europa.eu/justice/policies/privacy/modelcontracts/inde x_en.htm End of document! 1. Salesperson interview A “salesperson” may be anyone who acts in a selling capacity such as a medical equipment sales representative, an entrepreneur selling his/her new product, a Deloitte partner who sells his/her accounting services… Daniel Each student is required to conduct an informational interview with a sales person and produce a typed two to three page, 12 font, single spaced report that answers the following questions: 1. What are three attributes of a high-performing sales person? 0. High achiever – Be able to set goals and measure your performance in comparison to those goals 0. Empathy – Being able to read and identify with the customers/clients. As salespeople we have to understand the other end, the consumer. We have to respect and establish a rapport with them by standing along their side and not being judgmental. 0. Confident and Curiosity - Be knowledgeable in the
  • 27. products/services you sale to your customers/clients, it would drive higher result of sale. 1. What is the hardest aspect of selling? 1. Rejection of a customer’s purchase is sometimes hard. Not always a customer coming in to our Apple campus store is ready to make a purchase. We have to understand that we cannot always push for a purchase and “seal the deal”. Handling a rejection is an important part in this process to be a better salesman. 1. Why is it critical to understand buyers’ motivation to purchase? 2. It is highly critical, since we all have wants and needs. Understanding what drives the customers to buy our products will help us develop an effective sales and marketing messages. Also, high motivation to purchase now leads to higher motivation to purchase our products in the future as long we understand the customer. 1. Why is it important to develop a personal and professional relationship with a prospective buyer? 3. It is all about creating and maintaining relationships with our customers; whether they are coming to purchase a new product or only to receive help to troubleshoot an Apple product. Customer-Store relationship is what drives sales. We have to built trust with our customers, so they would always know they could come back to the store to shop and receive the highest care and experience. 1. What are the best aspects of the sales profession? 4. See the smile on people’s face when they walk out of the store. Knowing that I just made someone’s life easier and happier by solving his or her problems. 1. What knowledge and skills are necessary to be successful in a sales career? 5. People oriented – Listen to your customers/clients 5. Curiosity – Always drive yourself to learn. Knowledge and information are key parts to success 5. Achiever – Setting goals and doing our best to achieve them.
  • 28. 5. Believe in what you sale – often times people are trying to sale a product they do not believe in, which creates a bad rapport with the customers. 1. What role does ethics play in building a sustainable long- term buyer relationship? 6. Ethics plays a big role in building a sustainable long-term buyer relationship. Business code of conduct, ethical principles and integrity are key parts in business’ success in the long run. Customers trust us, the sales representatives to conduct the highest customer service. We have to honor that code of ethics in order to build a sustainable relationship with our customers. If we did not conduct good ethic principles in the business, our reliability as a business would have been low. Thus, we would not be able to maintain long-term relationship. 1. Describe a typical work day 7. A typical workday at the Apple store would be to first make sure the store is clean, neat and shiny. We are making sure all products are in place and organized before any customer walk into the store. The store manager always making sure before the start of day to brief us about any new promotions or products’ price change. At the store we not only selling products, we are also assisting customers by troubleshooting their Apple devices, from iPods to Macs. Sales at the store happens naturally, most people come in knowing what they need and want, we are just making sure we are giving them the highest service possible, so they would always want to come back. Some other times customer would walk into the store not knowing exactly what they are looking for, so we would jump right in for the rescue to give advices and tips of what they should buy without pushing them to make the final decision of purchase. When reaching the last minutes to closing time, we lock the doors and letting the last people make their purchases, organizing the store and making the end of day sales report. 1. Why would you recommend a career in sales? 8. Sales career is not only because of the money. I would recommend a career in sales for one main reason, people. If you
  • 29. love working with people, solve people’s problems, curious and high achiever, sales is the job for you. I would not be in this business if I did not get any satisfaction from successfully closing a deal. When I see a customer’s satisfied and happy after I assisted them in a problem, it means the world to me and I hope for other Sales people too. That’s why I believe that a career in sales could lead to an amazing opportunity to grow personally and professionally. For information on how to schedule and conduct an Informational Interview reference:1. How to Conduct an Informational Interview http://law2.wlu.edu/career/page.asp?pageid=1821. How to Land and Ace An Informational Interviewhttp://www.forbes.com/sites/jacquelyns mith/2013/12/11/how-to-land-and-ace-an-informational- interview/1. Conducting Information Interviews http://uncw.edu/career/informationinterviews.html