In this post, I will provide a summary of the RIS660 course. Each lecture is divided into a set of questions. First, the question is presented with a concise answer. After this, a more elaborate answer is given. All the questions and their concise answers are made into flashcards.
Lecture 1: Risk, safety and security research; Developing ideas; Ethical considerations
Listen to Lecture 1
Question 1-1: What is risk, safety, and security research?
Generating new knowledge about risk, safety and security.
Risk, safety, and security research involve generating new knowledge about these broad, multifaceted topics. It encompasses various scientific disciplines and theoretical perspectives such as social sciences, psychology, engineering, medicine, and statistics. The field explores the meaning of these objects, the scope of research, philosophical underpinnings, and appropriate methodological approaches. There are diverse perspectives within risk, safety, and security sciences, including safety engineering, organizational safety, occupational safety, enterprise risk management, cyber security, societal resilience, and food safety management.
Question 1-2: Distinguish between different types of risk, safety, and security research.
Applied vs. fundamental, descriptive vs. analytical, quantitative vs. qualitative, conceptual vs. empirical.
Risk, safety, and security research can be categorized into applied vs. fundamental, descriptive vs. analytical, quantitative vs. qualitative, and conceptual vs. empirical. These categories are not mutually exclusive, and research often combines elements from different types.
Question 1-3: What are examples of questionable practices in research ethics?
Practises influencing the participants; self-esteem, rights, physical/mental stress, privacy, benefits, justification.
Examples of questionable practices include inducing participants to commit acts diminishing their self-esteem, violating rights of self-determination, exposing participants to physical or mental stress, invading their privacy, withholding benefits from some participants, and not treating participants fairly or with respect. Justification for such practices might be considered if the research can provide substantial benefits and there is no alternative method.
Question 1-4 What are important ethical considerations in research involving people?
Informed consent, confidentiality, voluntary participation, withdrawal consent, non-identifiable, handeling of personal data.
Informed consent and confidentiality are crucial in research involving people. Informed consent entails voluntary participation, providing information about the project’s purposes and implications, and allowing participants to withdraw consent at any time. Confidentiality ensures that participants and informants remain non-identifiable in published research, and personal data is handled confidentially and with care.
Question 1-5 What is the norm regarding confidentiality and privacy in research involving people?
That participants are non-identifiable, and personal data is handled with care conform GDPR.
The norm is that participants and informants are not identifiable in published research. Any personal data is handled confidentially and with care. Real-world research, prior to GDPR, sets guidelines for data protection. Relevant links for further information: sikt.no and forksningsetikk.no.
Lecture 2
Listen to Lecture 2
Question 2-1 Qualitative vs quantitative: What to select?
The most suitable method for answering the research question should be chosen. This depends on the method, strategy, form of the research question, control of behaviour Events and whether the research focuses on contemporary events.
Method | Strategy | Form of Research Question | Requires Control of Behavioral Events? | Focuses on Contemporary Events? |
---|---|---|---|---|
Experiment | How, why? | Yes | Yes | Yes |
Survey | Who, what, where, how many, how much? | No | Yes | Yes |
Archival Analysis | Who, what, where, how many, how much? | No | Yes/No | Yes/No |
History | How, why? | No | No | No |
Case Study | How, why? | No | Yes | Yes |
Question 2-2 What are case studies and when are they suitable?
- Definition: In-depth examination within a real-life context.
- Suitability: Explore complex social phenomena, contextual relationships, and unique situations.
- When Appropriate: To answer “how” and “why” questions, aiming for comprehensive understanding.
Question 2-3 Why research multiple cases and what is meant by ‘grounded theory’?
Researching Multiple Cases:
Explore patterns, commonalities, and variations across different instances. Useful for comparing two situations.
Grounded Theory:
- Methodology: Develops theories directly from data.
- Approach: Systematic analysis without preconceived theories.
- Goal: Generate concepts and theories grounded in the data for a deeper understanding.
Question 2-4 What are the four steps of a research design?
Research Process Steps:
- Design:
- Concepts/Theory, Causal Validity, Generalization, Repeatability.
- Preparation (Protocol Development):
- Quality vs. Quantitative, Screening of Respondents, Field Procedures, Pilot Studies.
- Collection:
- Collecting data preferably using triangulation (using multiple sources/methods).
- Analysis (Results + Analysis):
- Analysing all the evidence. Studying all the evidence is only possible with a narrow scope.
Lecture 3 Building the bridge between SAM535 and RIS660
Listen to Lecture 3
Access the complete summary!
Running this blog has not been free! I have to cover server costs and plugins to keep this site running smoothly.
Comprehensive Summaries: Full access to all the summaries.
Flashcards: Learn efficiently.
Audio: A good quality audio file for each week.
Combined audio file at the bottom of the page.
Email Support: Direct email support for any questions about the material.
Best of luck with the exam! Leave a comment if you liked it, and send me an email if anything is unclear or needs improving.
Leave a Reply