https://doi.org/10.1080/01411920802044438.
2013) or cell phone users (Zang and Bolot 2014) can be used together to re-identify anonymous research participants. Springer, Cham. Research participants are supposed to be autonomous, well informed, capable subjects who are solely responsible for their own behavior and for knowing with whom formal contracts can be negotiated, and understanding the conditions of their participation. One of the most important ethical guidelines in sociological and other human-subject research concerns privacy and confidentiality. They requested that Scarce appear at the campus police station, where he was interviewed. Before beginning the study, you ask everyone to agree to keep whats discussed confidential and to respect each others privacy. Their sample sizes, locations, treatments, and results are highly similar, and the studies share one author in common. Ethical dilemmas of confidentiality with adolescent clients: Case studies from psychologists. The LibreTexts libraries arePowered by NICE CXone Expertand are supported by the Department of Education Open Textbook Pilot Project, the UC Davis Office of the Provost, the UC Davis Library, the California State University Affordable Learning Solutions Program, and Merlot. (2011). Researchdata management plan. Journal of the American Academy of Psychiatry and the Law Online, 30(3), 417424. 126135). https://doi.org/10.1007/978-3-319-76040-7. Kroger, a national supermarket chain, reported the following data (in millions) in its financial statements for a recent year: Totalrevenue$82,189Totalassetsatendofyear23,505Totalassetsatbeginningofyear23,126\begin{array}{lr} Confidentiality is about knowing what sort of personal data may be available, to whom, and under which conditions in essence, its about considering the whole picture. Under the circumstances, it did not seem possible to fulfil participant requests for confidentiality and submit a Masters thesis in accordance with university requirements. The results are shown in the relative frequency histogram below. Guardians must give consent for minors to participate.
Rules of Professional Conduct - California It reflects our position on what good practice in this area entails. was recognized as an important part of the foundations of sociology from the earliest times . Make sure to disclose all possible risks of harm to participants before the study to get informed consent. Are there sufficient grounds for George to breach confidentiality? Convinced that this would ensure confidentiality, the data set was released in 2008 as the first installment of a data sharing project purported to run until 2011. A die was rolled 200 times and a record was kept of the numbers obtained. https://doi.org/10.1007/978-3-642-03748-1_1. files, field notes and correspondence regarding the browser wars. Why the government needs statistics on health, 1.2 Mention THREE benefits of being able to effectively communicate with your teachers (3), State four ways in which a strong career portfolio could help women become employed in careers that are traditionally male dominated, briefly explain 5solution to the problems of modern scienc e and technology . 55 terms. Giordano proposes that participants be offered a choice of disclosing their identity or not. Participants often belonged to marginalized communities, including Jewish people, disabled people, and Roma people. Thankfully, that isnt its purpose. But that may not be likely in the case here, given that the research was on child abuse and neglect. Sit near your peers who are also taking notes but do not talk with them during this portion of the exercise. Qualitative Research, 11(2), 197212. Later investigations revealed that they fabricated and manipulated their data to show a nonexistent link between vaccines and autism. Department of Sociology, University of Minnesota, Minneapolis, MN. Conversely, if they refuse to participate, they not only lose these advantages but also may be seen as a bit of a troublemaker and earn extra scrutiny from prison guards. to be the mean stopping distance (from a speed of 35 mph) of all ZX-900s. (2013). Protecting respondent confidentiality in qualitative research. Using a qualitative design, the student interviewed some 20 participants in three different departments in the institution. publishing them online, so that anyone can read them. George is worried that he is obliged to breach confidentiality and disclose this information to Martins partner. Your strategy for recording your observations while in the field will be determined mostly by the site you choose and the role you play in that site. You can specify conditions of storing and accessing cookies in your browser. Personal and Ubiquitous Computing, 17, 653662. Rhoen, M. H. C. (2019). They can also withdraw their information by contacting you or your supervisor. When prisoners are asked to be interviewed or to fill out a questionnaire, they certainly can refuse to do so, but they may feel pressured to participate. Research Ethics for Students in the Social Sciences, https://doi.org/10.1007/978-3-030-48415-6_7, https://doi.org/10.1016/j.knosys.2016.03.004, http://www.apa.org/monitor/2014/04/disclosing-information, https://doi.org/10.1177/002204260003000206, https://doi.org/10.1007/s00779-012-0513-6, https://doi.org/10.1007/978-0-387-70992-5_5, https://doi.org/10.1007/s10618-005-0007-5, https://doi.org/10.1080/10508422.2014.923314, https://doi.org/10.1371/journal.pone.0028071, www.slideshare.net/ISSDA/anonymisation-and-social-research, https://pdfs.semanticscholar.org/5a4c/b550a640d165ec49c5a922291961c278aee6.pdf, https://doi.org/10.1207/s15327019eb0904_6, https://doi.org/10.1080/01411920802044438, https://doi.org/10.1016/j.socscimed.2004.10.004, https://doi.org/10.1007/978-3-642-03748-1_1, https://doi.org/10.1016/j.jesp.2012.07.002, https://doi.org/10.1007/978-3-319-76040-7, https://openaccess.leidenuniv.nl/handle/1887/77748, https://epic.org/privacy/reidentification/Samarati_Sweeney_paper.pdf, https://doi.org/10.1080/00909880500149445, https://doi.org/10.1016/j.chb.2012.11.022, http://nbn-resolving.de/urn:nbn:de:0114-fqs0501297, https://doi.org/10.1177/2F1468794110394073, https://doi.org/10.1023/B:QUAS.0000015546.20441.4a, https://doi.org/10.1177/2F1468794112459669, https://doi.org/10.1023/B:JAET.0000006919.58804.4c, https://doi.org/10.1080/01406720500036786, https://doi.org/10.1177/2F1468794106065004, https://doi.org/10.1007/s10676-010-9227-5, http://creativecommons.org/licenses/by/4.0/. https://openaccess.leidenuniv.nl/handle/1887/77748. Such a project could increase the prevalence of SRH facilities, offering affordable, accessible, quality services which, if successful, could increase awareness and knowledge of SRH, all with the desired outcome of behavioral change. They conducted research about the use of consent procedures among social scientists and health researchers working with vulnerable populations. They have been adopted by the Board of Trustees and approved by the California Supreme Court pursuant to statute to protect the public and to promote respect and confidence in the legal profession. Ethics & Behavior, 25(3), 197221. American Psychologist, 69(5), 461467. In reality, the actual goal was to study the effects of the disease when left untreated, and the researchers never informed participants about their diagnoses or the research aims. Research scandals with ethical failures are littered throughout history, but some took place not that long ago. However, just four days after the datas release, Fred Stutzman, a PhD student, questioned the non-identifiability of the data, writing: A friend network can be thought of as a fingerprint; it is likely that no two networks will be exactly similar, meaning individuals may be able to be identified in the dataset post-hoc (quoted in Zimmer 2010, p. 316). The participation of prisoners was always forced, as consent was never sought. As I share with my students, you never know whether or how some observation might be important down the line. in Statistics. You can keep data confidential by using aggregate information in your research report, so that you only refer to groups of participants rather than individuals. 10: Field Research- A Qualitative Technique, Book: Principles of Sociological Inquiry Qualitative and Quantitative Methods (Blackstone), { "10.01:_What_Is_It_and_When_to_Use_It" : "property get [Map MindTouch.Deki.Logic.ExtensionProcessorQueryProvider+<>c__DisplayClass228_0.
b__1]()", "10.02:_Pros_and_Cons_of_Field_Research" : "property get [Map MindTouch.Deki.Logic.ExtensionProcessorQueryProvider+<>c__DisplayClass228_0.b__1]()", "10.03:_Getting_In" : "property get [Map MindTouch.Deki.Logic.ExtensionProcessorQueryProvider+<>c__DisplayClass228_0.b__1]()", "10.04:_Field_Notes" : "property get [Map MindTouch.Deki.Logic.ExtensionProcessorQueryProvider+<>c__DisplayClass228_0.b__1]()", "10.05:_Analysis_of_Field_Research_Data" : "property get [Map MindTouch.Deki.Logic.ExtensionProcessorQueryProvider+<>c__DisplayClass228_0.b__1]()" }, { "00:_Front_Matter" : "property get [Map MindTouch.Deki.Logic.ExtensionProcessorQueryProvider+<>c__DisplayClass228_0.b__1]()", "01:_Introduction" : "property get [Map MindTouch.Deki.Logic.ExtensionProcessorQueryProvider+<>c__DisplayClass228_0.b__1]()", "02:_Linking_Methods_With_Theory" : "property get [Map MindTouch.Deki.Logic.ExtensionProcessorQueryProvider+<>c__DisplayClass228_0.b__1]()", "03:_Research_Ethics" : "property get [Map MindTouch.Deki.Logic.ExtensionProcessorQueryProvider+<>c__DisplayClass228_0.b__1]()", "04:_Beginning_a_Research_Project" : "property get [Map MindTouch.Deki.Logic.ExtensionProcessorQueryProvider+<>c__DisplayClass228_0.b__1]()", "05:_Research_Design" : "property get [Map MindTouch.Deki.Logic.ExtensionProcessorQueryProvider+<>c__DisplayClass228_0.b__1]()", "06:_Defining_and_Measuring_Concepts" : "property get [Map MindTouch.Deki.Logic.ExtensionProcessorQueryProvider+<>c__DisplayClass228_0.b__1]()", "07:_Sampling" : "property get [Map MindTouch.Deki.Logic.ExtensionProcessorQueryProvider+<>c__DisplayClass228_0.b__1]()", "08:_Survey_Research-_A_Quantitative_Technique" : "property get [Map MindTouch.Deki.Logic.ExtensionProcessorQueryProvider+<>c__DisplayClass228_0.b__1]()", "09:_Interviews-_Qualitative_and_Quantitative_Approaches" : "property get [Map MindTouch.Deki.Logic.ExtensionProcessorQueryProvider+<>c__DisplayClass228_0.b__1]()", "10:_Field_Research-_A_Qualitative_Technique" : "property get [Map MindTouch.Deki.Logic.ExtensionProcessorQueryProvider+<>c__DisplayClass228_0.b__1]()", "11:_Unobtrusive_Research-_Qualitative_and_Quantitative_Approaches" : "property get [Map MindTouch.Deki.Logic.ExtensionProcessorQueryProvider+<>c__DisplayClass228_0.b__1]()", "12:_Other_Methods_of_Data_Collection_and_Analysis" : "property get [Map MindTouch.Deki.Logic.ExtensionProcessorQueryProvider+<>c__DisplayClass228_0.b__1]()", "13:_Sharing_Your_Work" : "property get [Map MindTouch.Deki.Logic.ExtensionProcessorQueryProvider+<>c__DisplayClass228_0.b__1]()", "14:_Reading_and_Understanding_Social_Research" : "property get [Map MindTouch.Deki.Logic.ExtensionProcessorQueryProvider+<>c__DisplayClass228_0.b__1]()", "15:_Research_Methods_in_the_Real_World" : "property get [Map MindTouch.Deki.Logic.ExtensionProcessorQueryProvider+<>c__DisplayClass228_0.b__1]()", "zz:_Back_Matter" : "property get [Map MindTouch.Deki.Logic.ExtensionProcessorQueryProvider+<>c__DisplayClass228_0.b__1]()" }, [ "article:topic", "license:ccbyncsa", "showtoc:no", "authorname:anonymous", "program:hidden", "licenseversion:30", "source@https://2012books.lardbucket.org/books/sociology-comprehensive-edition" ], https://socialsci.libretexts.org/@app/auth/3/login?returnto=https%3A%2F%2Fsocialsci.libretexts.org%2FBookshelves%2FSociology%2FIntroduction_to_Research_Methods%2FBook%253A_Principles_of_Sociological_Inquiry__Qualitative_and_Quantitative_Methods_(Blackstone)%2F10%253A_Field_Research-_A_Qualitative_Technique%2F10.04%253A_Field_Notes, \( \newcommand{\vecs}[1]{\overset { \scriptstyle \rightharpoonup} {\mathbf{#1}}}\) \( \newcommand{\vecd}[1]{\overset{-\!-\!\rightharpoonup}{\vphantom{a}\smash{#1}}} \)\(\newcommand{\id}{\mathrm{id}}\) \( \newcommand{\Span}{\mathrm{span}}\) \( \newcommand{\kernel}{\mathrm{null}\,}\) \( \newcommand{\range}{\mathrm{range}\,}\) \( \newcommand{\RealPart}{\mathrm{Re}}\) \( \newcommand{\ImaginaryPart}{\mathrm{Im}}\) \( \newcommand{\Argument}{\mathrm{Arg}}\) \( \newcommand{\norm}[1]{\| #1 \|}\) \( \newcommand{\inner}[2]{\langle #1, #2 \rangle}\) \( \newcommand{\Span}{\mathrm{span}}\) \(\newcommand{\id}{\mathrm{id}}\) \( \newcommand{\Span}{\mathrm{span}}\) \( \newcommand{\kernel}{\mathrm{null}\,}\) \( \newcommand{\range}{\mathrm{range}\,}\) \( \newcommand{\RealPart}{\mathrm{Re}}\) \( \newcommand{\ImaginaryPart}{\mathrm{Im}}\) \( \newcommand{\Argument}{\mathrm{Arg}}\) \( \newcommand{\norm}[1]{\| #1 \|}\) \( \newcommand{\inner}[2]{\langle #1, #2 \rangle}\) \( \newcommand{\Span}{\mathrm{span}}\)\(\newcommand{\AA}{\unicode[.8,0]{x212B}}\), source@https://2012books.lardbucket.org/books/sociology-comprehensive-edition, status page at https://status.libretexts.org. Perhaps ahead of times, a sociologist warned of the dangers of the coalescing interests of the top leaders of business, politics, and the military. https://doi.org/10.1177/1464993413490479. The controversy ended 2 years later when the suspects died and the prosecutors office abandoned its effort to obtain the notes (Brajuha & Hallowell, 1986). Open Access This chapter is licensed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license and indicate if changes were made. Chronicle of Higher Education, 39, 10. The Hastings Center Report, 13(1), 2431. In practice, the requirement not to publish the report with the description of the project would imply that the students could not formally finish their research project and thus not conclude their studies. Re-identification of smart meter data. Data pseudonymization is an alternative method where you replace identifying information about participants with pseudonymous, or fake, identifiers. Despite this difficulty, attempts have been made to create computer programs that facilitate the finding and replacement of personal identifiers (see Kaiser 2009 for a discussion). The participants experienced researchers who themselves used qualitative methods were mostly critical of informed consent procedures. For example, data collected in person or by phone cannot be considered fully anonymous because some personal identifiers (demographic information or phone numbers) are impossible to hide. Due to the sensitivity of the project, it was agreed that the interviewees, the stakeholders, and the organization itself would remain anonymous, and all identifying information would be removed. Dignity: a sense of ones personal pride or self-respect. Professional handling of confidential sociological field notes entails? serious problems for an economy? https://doi.org/10.1007/s00779-012-0513-6. https://doi.org/10.1109/SP.2009.22. Kotch, J. It has been updated to make any references to the Code of Ethics consistent with the Code of Ethics (2016). Saying "data vary" means that observations can be measured with fractions or decimals instead of only integers. Walford, G. (2005). A dataset may never be completely safe from intentional attacks, and therefore re-identification of anonymized data presents serious policy and privacy implications (Lubarsky 2017; El Emam et al. When sensitive, personal, or identifying information from participants is made public without their consent, and it has negative consequences for the participant (or the community), the researcher can be held responsible if they could have prevented this from happening. In the following section, well examine the uses and writing of analytic field notes more closely. No problem, they say. Ethical considerations in research are a set of principles that guide your research designs and practices. The bracketed portions of your field notes may never be used, but in some cases they will become the very early stages in your analysis of data. George should urge Martin to inform his partner but does not have to interfere himself. differences between structural and technological unemployment. The right of research participants to not disclose certain information and to retain control over their privacy has increasingly been acknowledged inside and outside of academia and has become subject to extensive legislation. But if the researcher has done everything that reasonably could be expected from them, and the supervisor deduced the identity of the employee by chance, the breach of confidentiality could be considered merely lamentable, not culpable. Well take a closer look at this point in Section 10.5. A television network will allow National Motors to advertise its claim if the appropriate null hypothesis can be rejected at = .05. London: Sage. Cham: Springer. Published on Perhaps the most important instrument for securing confidentiality is the informed consent procedure. Confidentiality generally means that private information about an individual will not be shared without his or her consent. Khnalou, N., & Peter, E. (2005). The main reason being that anonymizing techniques, including k-anonymity, do not offer fool proof protection against the malicious use of background information, data triangulation, or even just basic web searches (Martin et al. Bjarnason, T., & Adalbjarnardottir, S. (2000). Find the odds against selecting a romance or a fantasy novel. Describing confidentiality experience on a CV. Both women shook my hand, though Jane was the first to do so and did so with slightly more self-assurance than Polly. 111). Thomson, D., Bzdel, L., Golden-Biddle, K., Reay, T., & Estabrooks, C. A. Accessibility StatementFor more information contact us atinfo@libretexts.orgor check out our status page at https://status.libretexts.org. Scholarly societies continue to debate the ethical issues involved in studies of prisoners and other vulnerable populations (e.g., offenders in juvenile institutions, patients in mental institutions), and there are no easy answers to the ethical questions arising in such studies. Journal of Experimental Social Psychology, 48(6), 12911299. What is information security? Definition, principles, and jobs The most important procedure in this aspect of research is to secure the informed consent form, which formalizes a confidentiality agreement between the researcher and participant. Anonymity thus may be a more absolute, though not better, criterion than confidentiality in ensuring the participants right to privacy. Also, various data points, or identifiers, that allow for the re-identification of participants, are important for researchers to understand, as are the techniques to anonymize data, though none offer waterproof guarantee against re-identification. Psychology - What is Psychology? protect the rights of research participants, your supervisors contact information and the institutions approval number. https://doi.org/10.1023/B:JAET.0000006919.58804.4c. Professional handling of confidential sociological field notes entails. The answer to this question is probably not. Personally identifiable data is not collected. Professional handling of confidential sociological field notes entails I was a little unsure about where to go from there so I just walked into the first open door and said, Im looking for the XX office. A woman showed me into a large office (long and slightly irregular shape with windows on one wall, a desk and table and many chairs. Anonymising Reserch Data Workshop, University College Dublin, 22 June 2016. www.slideshare.net/ISSDA/anonymisation-and-social-research. Scholarly ethics and courtroom antics: Where researchers stand in the eyes of the law. Chapter 6: Societies to Social Networks. Professional handling of confidential sociological field notes entails? Whats important is that you adopt a strategy that enables you to write accurately, to write as much detail as possible, and to distinguish observations from reflections. Dont forget to describe exactly where you were and detail your surroundings (in addition to describing the interactions and conversations you observed and participated in). The _______ is made up of people who are in the portion of the population being studied. Longitudinal studies (which follow (groups of) individuals over a long period of time) must allow for an identifying key at least until the study is finished, and thus pose the risk that while the study runs the key is revealed. The student was commissioned to research the attitudes and experiences of employees with workplace inclusion. Fill in the blank(s) with the appropriate word(s). Cite the variety of ways that field researchers might take notes while in the field. professional handling of confidential sociological field notes entails By On June 22, 2022 In the central processing unit is located in the amalgamous definition on professional handling of confidential sociological field notes entails Round your answer to 1 decimal place. The data can still be linked to participants but its harder to do so because you separate personal information from the study data. Therefore, after successfully having defended his case before the Court, he filed a lawsuit against the university, claiming they had a contractual obligation to support his ethical stand and to reimburse his legal fees. Berlin: Springer. Anonymisation and social research. Furthermore, we point to Manson and ONeill (2007) for an extensive discussion on informed consent (though it is mainly focused on the medical sciences). Even if a research idea is valuable to society, it doesnt justify violating the human rights or dignity of your study participants. CrossRef 34 (pp. So why torture my students in this way? However, the government did allow a network of private SRH care professionals to collaborate with international agencies and Non-Governmental Organizations (NGOs) to initiate a project aimed at filling this gap. Knowledge-Based Systems, 101, 7189. They argued that although it touched upon sensitive issues, the project was neither illegal nor in violation of any state regulations. (2012). professional handling of confidential sociological field notes entails how to improve heart rate dip during sleep +1 (416) 994-9898 info@homatrading.com 452 Bowes Road, Unit 9 Concord, ON L4K 1K2, Canada Monday - Friday 09h - 20h Closed on Weekends Home About us Services Export Import Customs Clearance Products FAQs Contact us Home About us In the Tarasoff Case, a patient confided in a mental health professional his intentions to kill someone. globalization Question 17Professional handling of confidential sociological field notes entails __________. What kind of sample includes everyone in a targeted population that has the same chance of being included in a study? Sociological Practice: A Journal of Clinical and Applied Sociology, 2(4), 245255. The intended victim was not alerted and indeed, was later murdered by this patient. In light of the discussion above, consider the following study by Wiles et al. For US researchers, the First Amendment 6 Only the principal researchers (PI) would be allowed to review this sensitive material and only they could decide (after careful deliberation) that a case needed to be reported (they eventually did so in five cases out of 442, one of which was confirmed). This is because you, like any other human being, cannot possibly be expected to remember everything that you see happen over the hours, days, months, or years that you spend collecting data in the field. In social science research, analogous situations may present themselves, even though they are rarely as extreme as the Tarasoff Case (see Duncan et al. Privacy in research ethics. Journal of Drug Issues, 30(2), 335343. Taddei, S., & Contena, B. The limits of confidentiality. Zhou, B., Pei, J., & Luk, W. S. (2008). Instead, the observations are presented on their own, as clearly as possible. In 2015, the journal Expert Systems and Applications published a paper that used several sentences taken from the logged-in section of a website called PatientsLikeMe. (2006). Research involving human subjects must follow certain ethical standards to make sure the subjects are not harmed. Several observers likened it to experiments conducted by Nazi scientists. Rather than saying that someone you observed was angry, describe what gave you that impression. Typically, students have some overlap in the kinds of things noted, but inevitably one person will have paid more attention to conversations overheard, another to actions and unspoken physical expressions such how people walked or dressed, and yet another to nonhuman surroundings such as the landscape, sounds, and scents. In 2009 30th IEEE symposium on security and privacy (pp. Frequently asked questions about research ethics. https://www.jstor.org/stable/3561549. When your 15 minutes are up, compare notes with your peers. This sociologist is credited as being the founder of sociology. Qualitative Health Research, 17(2), 264275. Students conducting this exercise also often use different note-taking strategies, some drawing more pictures, others writing in complete sentences, others using abbreviations. (Case adapted after Hook and Cleveland 1999). K-anonymous data mining: A survey. Should the student make use of this information and break confidentiality of the basis that she acts in good faith, or should all mention of ethnicity be removed, in accordance with institutional policiy, at the cost of losing vital information? There may be another reason for participants to give confidentiality a second thought. Retrieved from https://pdfs.semanticscholar.org/5a4c/b550a640d165ec49c5a922291961c278aee6.pdf. Tolich, M. (2004). As a result, several of the men died from their disease, and some of their wives and children came down with it. ), Walking the tightrope: Ethical issues for qualitative researchers (pp. What personal information are they allowed to make public (with consent from the participant), and what is off limits? An IRB is a committee that checks whether your research aims and research design are ethically acceptable and follow your institutions code of conduct. This is one type of writing where you should not be going for literary value, to make your writing interesting, and even to make it readable for anyone other than yourself. Which of the following must be true about the range on a Chi-Square random variable? Assume that = 6.02 ft and justify your answer using both a critical value and a. Will you be in a setting where having a notebook or smartphone in your hands will look out of place? A. Confidentiality. In conclusion, Protecting respondents is essential when managing private sociological field notes. Toronto: University of Toronto Press. In brief, there can be good reason to offer confidentiality as opposed to anonymity, although anonymity is generally preferred. Its a form of academic fraud. These principles and standards should be used as guidelines when examining everyday professional activities. Its best to consider every possible source of harm in your study as well as concrete ways to mitigate them. Saying "data vary" means that the values of the variable change from individual to individual. https://doi.org/10.1016/j.knosys.2016.03.004. When compared to quantitative research, qualitative researchers are confronted with both similar and different challenges regarding anonymization, which we will now explore. In order to anonymize sets of data while retaining as much original information as possible, certain techniques have been developed. Now, the question can be asked: is the researcher responsible or even liable for the damage? Another ethical issue concerns consent. One known as k-anonymity was specifically designed for quantitative data sets (introduced by Samarati and Sweeney 1998, and since improved, see Amiri et al. Timely Delivery No missed deadlines - 97% of assignments are completed in time. What arepersonal data? When students return to the classroom, I ask them to compare notes with their group members and discuss what strategies they used in making and recording observations.