At the heart of this compilation, however, is methodology; specifically, the unique and shared design considerations in qualitative and quantitative research as well as the synergy derived from mixed methods designs.
“Methodology: 26 Articles on Design Considerations in Qualitative, Quantitative, & Mixed Methods Research — Plus, Thoughts on becoming a methodologist” is available for download here.
However, in the articles chosen for this compilation, reflexivity plays the starring role and is central to the discussions of bias, “qualitative literacy,” gathering data in the field, and conducting research with the most vulnerable and marginalized populations.
“Reflexivity: 10 Articles on the Role of Reflection in Qualitative Research” is available for download here.
Four other recent compilations are also available for download:
“The Focus Group Method: 18 Articles on Design & Moderating is available for download here.
“The In-depth Interview Method: 12 Articles on Design & Implementation” is available for download here.
“Qualitative Data Analysis: 16 Articles on Process & Method” is available for download here.
“Qualitative Research: Transparency & Reporting” is available for download here.
Back in 2018, Research Design Review posted an article titled “Five Tech Solutions to Qualitative Data Collection: What Strengthens or Weakens Data Quality?” The focus of this article is on a presentation given in May 2018 concerning technological alternatives to qualitative research data collection. Importantly, the aim of the presentation was, not to simply identify different approaches to data collection beyond the in-person and telephone modes but rather, to examine the strengths and limitations of these technological solutions from a data quality – specifically, Credibility – standpoint.
Broadly speaking, technological approaches to qualitative research data gathering offer clear advantages over in-person methods, particularly in the areas of:
Representation, e.g., geographic coverage, potential access to hard-to-reach population segments;
Cooperation, e.g., convenience and flexibility of time and place for participants, appropriateness for certain demographic segments (18-49 year olds*);
Validity associated with data accuracy, e.g., research capturing in-the-moment experiences do not rely on memory recall;
Validity associated with the depth of data, e.g., capturing multiple contextual dimensions through text, video, and images;
Validity associated with data accuracy and depth allowing for the triangulation of data;
Researcher effects, e.g., mitigated by the opportunity for greater reflection and consistency across research events;
Participant effects, e.g., mitigated by the multiple ways to express thoughts, willingness to discuss sensitive issues, and (possibly) a lower tendency for social desirability responding; and
Efficient use of resources (i.e., time, money, and staff).
There are also potential drawbacks to any technological solution, including those associated with:
Uneven Internet access and comfort with technology among certain demographic groups (e.g., sampling favors “tech savvy” individuals), hard-to-reach and marginalized segments of the population;
Difficulty in managingengagement, including the unique researcher skills and allocation of time required;
Potential participant burnout from researcher’s requests for multiple input activities and/or days of engagement. This is a type of participant effect that negatively impacts validity;
Nonresponse due to mode, e.g., unwillingness or inability to participate to a mostly text-based discussion;
Data accuracy, e.g., participant alters behavior in a study observing in-home meal preparation;
Missing important visual &/or verbal cues which may interfere with rapport building and an in-depth exploration of responses;
Difficulty managing analysis due to lots and lots of data (in volume & formats);
Fraud, misrepresentation – “Identity is fluid and potentially multiple on the Internet” (James and Bushner, 2009, p. 35) and people may not share certain images or video that reveal something “embarrassing” about themselves**; and
Security, confidentiality, anonymity (e.g., data storage, de-identification).