Terrific Terminology
Research Proposals and Where to Find Them
Hot Takes
Recruitment
IRB, Please Love Me
100

Self-reflexivity is . . .

The routine practice of considering how our own experiences and perspectives impact how we view and interact with the world

100

The "procedures" section of a proposal is also known as . . .

The methods section

100

People sometimes say they are doing __________ when in reality, they just designed a really unorganized and non-rigorous study.

Grounded Theory

100

True or False: Qualitative research requires no planning for recruiting participants.

False

100

True or False: If we plan to conduct interviews or ethnographic fieldwork within an organization outside of the one granting us IRB-approval, we must provide IRB with a letter from that organization approving our work.

True

200

When we note contextual meaning and provide lush detail about our observations, we're employing . . .

Thick Description
200

In a proposal, researchers must indicate on the broadest level what they intend to do before elaborating on the methods. This is broadest description is called . . .

The purpose

200

Qualitative methodologists and quantitative methodologists differ in their perception of objectivity and subjectivity. What would a qualitative methodologist argue?

Objectivity is not possible. Subjectivity should be embraced, as researchers are the instrument. 

200

What are some ways that researchers can recruit participants? 

Email, text, phone, fliers, recruitment programs, word of mouth, social media.

200

When we put together an IRB application at Washburn, we must include a document that all participants sign to indicate they are willing and able to participate in the study. What's this document called?

Consent form

300

The acronym IRB stands for . . .

Institutional Review Board

300

What part of the research proposal summarizes what's been studied, defines core concepts used in the project, and recognizes core contributors to the study of those concepts?

Literature Review

300

In qualitative research, researchers will sometimes reach out to participants to get their reactions to the researchers' interpretations. This follow-up communication with participants is called . . .

Participant checks

300

Recruitment is also called . . .

Sampling

300

Of the three levels of IRB review, which one do qualitative studies most commonly receive?

Expedited

400

Deliverables refer to . . .

The end products of a research study

400

The ______ section of a research proposal explains how the research will be conducted (aka the logistics, including recruitment, sampling, analytic approach, etc.).

Methods or methodology

400

People writing __________________ argue that their own experiences can be analyzed to help others like them better understand their experiences, a process that some critics have called "me-search."

Auto-ethnographies

400

What is snowball sampling?

Recruitment approach where researchers ask participants to pass along the project to friends/family who might be interested in participating. 

400

True or false: The recruitment message that we get IRB-approved doesn't have to be used when recruiting participants via textual communication?

False. Beyond modifying the message to include our names, we must use the recruitment message exactly as approved.

500

What term refers to the broadest, preferred ways of understanding reality, knowledge, and information-gathering?

Paradigm

500

True or False: Rationales in research proposals should only address the gaps in the literature. 

False

500
Tabula Rasa refers to . . .

The traditional Grounded Theory belief that researchers should not reference any scholarship/literature while collecting data. 

500

What is Extreme Instance/Deviance Sampling?

Recruiting people who are unusual, unique, or rare

500

When explaining our plan to maintain confidentiality, what should we cover? (Pick at least 1 thing for this question.)

How we are keeping participants' sensitive/personal data secure by saving our work on password-protected devices, not leaving our devices unlocked with that data present, only using pseudonyms in our notes, deleting voice recordings once they're transcribed and de-identified, etc. 

M
e
n
u