Skip to main content
Log in

Collecting "Sensitive" Data in Business Ethics Research: A Case for the Unmatched Count Technique (UCT)

  • Published:
Journal of Business Ethics Aims and scope Submit manuscript

Abstract

Some would argue that the more promising areas of business ethics research are "sensitive." In such areas, it would be expected that subjects, if inclined to respond at all, would be guarded in their responses, or respond inaccurately. We provide an introduction to an empirical approach -- the unmatched block count (UCT) -- for collecting these potentially sensitive data which provides absolute anonymity and confidentiality to subjects and "legal immunity" to the researcher. Interestingly, under UCT protocol researchers could not divulge subjects' responses even if they were inclined to do so. Beyond that, UCTs provide complete disclosure to subjects and there is no deception.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Similar content being viewed by others

References

  • Alpar, P. and D. Spitzer: 1990, ‘Response Behavior of Entrepreneurs in a Mail Survey’, Entrepreneurship: Theory & Practice 14(2), 31–44.

    Google Scholar 

  • American Psychological Association: 1992, Ethical Principles of Psychologists and Code of Conduct (American Psychological Association, Washington, DC).

    Google Scholar 

  • American Psychological Association: 1991, Questionnaires Used in the Prediction of Trustworthiness in Pre employment Selection Decision: An APA Task Force Report.

  • Armacost, R. L., J. C. Hosseini, S. A. Morris and K. A. Rehbein: 1991, ‘An Empirical Comparison of Direct Questioning, Scenario, and Randomized Response Methods for Obtaining Sensitive Business Information’, Decision Sciences 22(5), 1073–1090.

    Google Scholar 

  • Bergmann, T. J., D. H. Mundt and E. J. Illgen: 1990, ‘The Evolution of Honesty Rights and Means for their Evaluation’, Employee Responsibilities and Rights Journal 3, 215–223.

    Google Scholar 

  • Boruch, R. F. and J. S. Cecil: 1979, Assuring the Confidentiality of Social Research Data (University of Pennsylvania Press, Philadelphia, PA).

    Google Scholar 

  • Chaudhuri, A. and R. Mukerjee: 1988, Randomized Responses: Theory and Techniques (Marcel Dekker, Inc., New York).

    Google Scholar 

  • Dalton, D. R. and M. B. Metzger: 1992a, ‘Towards Candor, Cooperation, and Privacy in Applied Business Ethics’, Business Ethics Quarterly 2, 207–221.

    Google Scholar 

  • Dalton, D. R. and M. B. Metzger: 1992b, ‘Integrity Testing: A Delicate Balance’, Ethikos 5, 14–17.

    Google Scholar 

  • Dalton, D. R. and M. B. Metzger: 1992, ‘Integrity Testing' for Personnel Selection: An Unsparing Perspective’, Journal of Business Ethics 12, 147–156.

    Google Scholar 

  • Dalton, D. R., M. B. Metzger and J. C. Wimbush: In press, ‘Integrity Testing: An Overview and Research Agenda’, in G. R. Ferris and K. M. Rowland (eds.), Research in Personnel and Human Resources Management (Vol. 12) (JAI Press, Greenwich, CN).

  • Durham, A. M. and M. J. Lichtenstein: 1983, ‘Response Bias in Self-report Surveys: Evaluation of Randomized Responses’, in G. P. Waldo (ed.), Measurement Issues in Criminal Justice (Sage Publications, Beverly Hills, CA).

    Google Scholar 

  • Fox, J. A. and P. E. Tracy: 1986, Randomized Response: A Method for Sensitive Surveys (Sage Publications, Beverly Hills, CA).

    Google Scholar 

  • Herzberger, S. D.: 1990, ‘The Cyclical Nature of Child Abuse: A Study of Research Methodology’, American Behavioral Scientist 33, 529–545.

    Google Scholar 

  • Hosseini, J. C. and R. L. Armacost: 1990, ‘Gathering Sensitive Data in Organizations’, American Behavioral Scientist 36(4), 443–471.

    Google Scholar 

  • Jones, J. W., P. Ash and C. Soto: 1990, ‘Employee Privacy Rights and Pre-Employment Honesty Tests’, Employee Relations Law Journal 15, 561–575.

    Google Scholar 

  • Lee, R. M.: 1993, Doing Research on Sensitive Topics (Sage Publication, Newbury Park).

    Google Scholar 

  • Lee, R. M. and C. M. Renzetti: 1990, ‘The Problems of Researching Sensitive Topics’, American Behavioral Scientist 33, 510–528.

    Google Scholar 

  • Manhardt, P. J.: 1989. ‘Base Rates and Test of Deception: Has I/O Psychology Shot Itself in the Foot?’, The Industrial-Organizational Psychologist 25(2), 48–50.

    Google Scholar 

  • Martin, S. L. and W. Terris: 1991, ‘Predicting Infrequent Behavior: Clarifying the Impact on False-positive Rates’, Journal of Applied Psychology 76, 484–487.

    Article  Google Scholar 

  • Melton, G. and J. Gray: 1988, ‘Ethical Dilemmas in AIDS Research: Individual Privacy and Public Health’, American Psychologist 43, 60–64.

    Article  Google Scholar 

  • Metzger, M. B. and D. R. Dalton: 1992, ‘Just Say No' To Integrity Testing’, Journal of Law and Public Policy 4, 9–38.

    Google Scholar 

  • Moore, R. W. and R. M. Stewart: 1989, ‘Evaluating Employee Integrity: Moral and Methodological Problems’, Employee Responsibilities and Rights Journal 2, 203–215.

    Google Scholar 

  • Murphy, K. R.: 1987, ‘Detecting Infrequent Deception’, Journal of Applied Psychology 72, 611–614.

    Article  Google Scholar 

  • Murphy, K. R.: 1989, ‘May be Should Shoot Ourselves in the Foot: Reply to Manhardt’, The Industrial-Organizational Psychologist 26(3), 45–46.

    Google Scholar 

  • National Academy of Sciences: 1979, Report on the Panel on Privacy and Confidentiality as Factors in Survey Response (National Academy of Sciences, Washington, DC).

    Google Scholar 

  • O'Bannon, R. M., L. A. Goldinger and G. S. Appleby: 1988, Honesty and Integrity Testing: A Practical Guide (Applied Information Resources, Atlanta, GA).

    Google Scholar 

  • Raghavarao, D. and W. T. Federer.: 1973, Application of the BIB Designs as an Alternative to the Randomized Response Method in Survey Sampling. Number BU-490-M in the Mimeo Series of the Biometrics Unit, Cornell University.

  • Raghavarao, D. and W. T. Federe.: 1979, ‘Block Total Response as an Alternative to the Randomized Response Method in Surveys’, Journal of the Royal Statistical Society (Series B: Methodological) 41(1), 40–45.

    Google Scholar 

  • Randall, D. M. and A. M. Gibson: 1990, ‘Methodology in Business Ethics Research: A Review and Critical Assessment’, Journal of Business Ethics 9, 457–665.

    Google Scholar 

  • Renzetti, C. M. and R. M. Lee: 1993, Researching Sensitive Topics (Sage Publications, Newbury Park, CA).

    Google Scholar 

  • Sackett, P. R., L. R. Burris and C. Callahan: 1989, ‘Integrity Testing for Personnel Selection: An Update’, Personnel Psychology 42, 491–528.

    Google Scholar 

  • Schuman, H. and G. Kalton: 1985, ‘Survey Methods’, in G. Lindzey and E. Aronson (eds.), The Handbook of Social Psychology (Random House, New York), pp. 635–698.

    Google Scholar 

  • Seiber, J. E. and B. Stanley: 1988, ‘Ethical and Professional Dimensions of Socially Sensitive Research’, American Psychologist 43, 49–55.

    Article  Google Scholar 

  • Smith, L. L., W. T. Federer and D. Raghavarao: 1974, ‘A Comparison of Three Techniques for Eliciting Truthful Answers to Sensitive Questions’, Proceedings of the American Statistical Association (Social Statistics Section), 447–452.

  • Steeh, C. G.: 1981, ‘Trends in Nonrsponse Rates, 1952–1979’, Public Opinion Quarterly 45, 40–57.

    Article  Google Scholar 

  • Tracy, P. E. and J. A. Fox: 1981, ‘The Validity of Randomized Response for Sensitive Measurements’, American Sociological Review 46, 187–200.

    Google Scholar 

  • U. S. Congress: 1991, The Use of Integrity Tests for Pre-employment Screening. Office of Technical Assistance (United States Printing Office, Washington, DC).

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

About this article

Cite this article

Dalton, D.R., Daily, C.M. & Wimbush, J.C. Collecting "Sensitive" Data in Business Ethics Research: A Case for the Unmatched Count Technique (UCT). Journal of Business Ethics 16, 1049–1057 (1997). https://doi.org/10.1023/A:1017917904743

Download citation

  • Issue Date:

  • DOI: https://doi.org/10.1023/A:1017917904743

Keywords

Navigation