Social Media Marketing Strategies Used by Small Retail Businesses



Download 0,96 Mb.
Pdf ko'rish
bet23/54
Sana29.04.2022
Hajmi0,96 Mb.
#593895
1   ...   19   20   21   22   23   24   25   26   ...   54
Ethical Research 
Researchers adhered to strict ethical standards when working with human subjects 
(Bromley et al., 2015). An ethical protection for researchers is obtaining a signed 
informed consent from a participant prior to collecting any data. Informed consent was 
an important component in protecting the welfare of the individuals participating in 
research (Griffith, 2014). Participants should receive enough information about the 
research to make an informed decision (Bromley et al., 2015). Before contacting 
potential participants for my study, I obtained permission from Walden’s Institutional 
Review Board (IRB) before I contacted, selected, and interviewed participants. The 
IRB’s role was to ensure that I complied with the 
Federal Policy for the Protection of 
Human Subjects (45 CFR 46) (Walden University, 2017).
Each participant received my 
contact information along with an informed consent form which detailed the purpose of 
the study, confidentiality, and the participation guidelines. Participants agreed to 
participate in this study voluntarily and without any form of incentive or compensation.
Additionally, participants were informed that they could contact me via telephone, email, 
or in person if they chose to withdraw or no longer participate in this study. 


43 
I completed the National Institute of Health’s (NIH) course in Protecting Human 
Research Participants that focused on conducting ethical research practices and ensuring 
participant protection. I ensured participants remained anonymous by not using any 
potentially identifiable information to maintain ethical protection, rights, and 
confidentiality. I am responsible for protecting a participant’s identity (Oetzel et al., 
2015). Griffith (2014) referred to participants numerically until each participant had a 
designated label. I labeled each participant in numerical order beginning at the number 
one until each participant had a number. Griffith (2014) suggested all documents and 
participant-related material be secured for a minimum of five years to ensure anonymity.
I notified participants that I would take notes and use an audio recording device, which is 
secured by me in a locked, fireproof safe for a minimum of five years.

Download 0,96 Mb.

Do'stlaringiz bilan baham:
1   ...   19   20   21   22   23   24   25   26   ...   54




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish