All Academic, Inc. Research Logo

Info/CitationFAQResearchAll Academic Inc.
Document

Response Patterns in Computer-Administered Surveys
Unformatted Document Text:  Computer Administered Surveys 22 Despite the level of statistical significance (p ≤ .01), replication of this study benefit from a larger participant pool. Finally, even though this study had a theoretical framework that used social desirability, two aspects of social desirability research were noticeably absent: first, that a researcher specializing in social desirability was not a member of the research team on this study; and second, that a method of research into socially-desirable responding such as the Crowne-Marlowe scale was not included in this study. As stated previously, this type of scale was not included because the questions asked in scales like Crowne-Marlowe are so different from the main topic of this study that it might have aroused suspicion in the participants. Fine tuning the measurement instrument by camouflaging established social- desirability measures within a framework of questions about Internet privacy behavior might strengthen this type of research. Closing Promising results came from simple examinations of frequencies of responses in relation to the hypotheses and research questions. The study was intended to test users’ perceptions, attitudes, and socially-desirable response behaviors in regard to Internet privacy and security, which it did. Participants in this study were glib with their personal information, unwilling to read privacy policies, and perfectly pleased with allowing possibly-malicious programs to be placed on their computers. This study did collect a wealth of data measuring perception and attitudes of Internet users toward various Internet privacy issues, providing a jumping-off point for further research.

Authors: Roseman, Joshua. and Mitrook, Michael.
first   previous   Page 23 of 25   next   last



background image
Computer Administered Surveys
22
Despite the level of statistical significance (p
.01), replication of this study benefit
from a larger participant pool. Finally, even though this study had a theoretical framework
that used social desirability, two aspects of social desirability research were noticeably absent:
first, that a researcher specializing in social desirability was not a member of the research
team on this study; and second, that a method of research into socially-desirable responding
such as the Crowne-Marlowe scale was not included in this study. As stated previously, this
type of scale was not included because the questions asked in scales like Crowne-Marlowe are
so different from the main topic of this study that it might have aroused suspicion in the
participants. Fine tuning the measurement instrument by camouflaging established social-
desirability measures within a framework of questions about Internet privacy behavior might
strengthen this type of research.
Closing
Promising results came from simple examinations of frequencies of responses in
relation to the hypotheses and research questions. The study was intended to test users’
perceptions, attitudes, and socially-desirable response behaviors in regard to Internet privacy
and security, which it did. Participants in this study were glib with their personal information,
unwilling to read privacy policies, and perfectly pleased with allowing possibly-malicious
programs to be placed on their computers.
This study did collect a wealth of data measuring perception and attitudes of Internet
users toward various Internet privacy issues, providing a jumping-off point for further
research.


Convention
All Academic Convention can solve the abstract management needs for any association's annual meeting.
Submission - Custom fields, multiple submission types, tracks, audio visual, multiple upload formats, automatic conversion to pdf.
Review - Peer Review, Bulk reviewer assignment, bulk emails, ranking, z-score statistics, and multiple worksheets!
Reports - Many standard and custom reports generated while you wait. Print programs with participant indexes, event grids, and more!
Scheduling - Flexible and convenient grid scheduling within rooms and buildings. Conflict checking and advanced filtering.
Communication - Bulk email tools to help your administrators send reminders and responses. Use form letters, a message center, and much more!
Management - Search tools, duplicate people management, editing tools, submission transfers, many tools to manage a variety of conference management headaches!
Click here for more information.

first   previous   Page 23 of 25   next   last

©2012 All Academic, Inc.