Beruflich Dokumente
Kultur Dokumente
6. Incidental data 12
6.1. Database enhancement 13
6.2. Loyalty cards 14
7. Retail tracking 14
8. Physical monitoring 14
9. Further information 16
the observers are concealed and the brain scans, eye-tracking and RFID
observation is not disclosed). (radio frequency identification).
For some time websites have been col- These developments bring a growing
lecting browsing data and other passive need to differentiate market research
measures based on techniques such as from other activities and for transparency
cookies and web bugs. with respondents about the information
that is being collected, especially in view
However, the latest online research of data protection legislation. In many
techniques now include the observation countries, some of these activities are
of online groups and bloggers, often controlled by data privacy legislation,
linked with growing marketing methods but these activities can also raise ethical
such as WOM (Word of Mouth) which concerns as well as legislative issues.
rely upon observing how people inter-
act with one another in both the face
to face and virtual environments, also 3. Key ethical principles
in areas such as mystery shopping and
employee behaviour. It is not practical to give detailed guid-
ance on every possible form of passive
Behavioural data collected as an data collection. In this section some of
incidental bi-product of other activities the key ethical and legal principles that
are becoming available and raising must be taken into account are spelled
concerns: out. In subsequent sections considera-
• Smart cards and scanners are tion is given to some of the more com-
increasingly used to collect a wide mon forms of passive data collection.
range of consumer or member beha-
viour; 3.1. Personal data
• Mobile phones can track geographic Legal requirements for data protection
location; deal exclusively with the gathering,
• Ticket booking systems can track processing and storage of personally
destinations. identifiable data. This includes any
information relating to an identified or
In the future, technologies that are identifiable natural person (i.e. a private
currently being developed will include individual as opposed to a corporate or
ensure its proper use and to pro- exclusively for supervisory, control or
tect respondents’ anonymity. This analysis purposes and where it will be
problem is most acute in the case of seen or heard only by the interviewer,
business-to-business, medical and moderator, supervisor or researcher
other research among special sub- working on the survey. In both these
groups of the population where there situations, respondents must be told
is much higher probability that some about the recording at the end of the
of the respondents may be identifiable interview and be given the opportunity
by people who subsequently see the to see or hear the relevant section
recording; but in principle it applies to of the record and, if they so wish, to
all types of surveys. have this destroyed or to have their
image pixelated so that they cannot be
Public interest in data protection and identified.
in avoiding unnecessary intrusions on
privacy means that researchers must Some countries have legal restrictions
therefore ensure that audio and video on the use of recording devices which
recording is used with great care and would require advance notice in all
with appropriate safeguards for the cases. This is particularly the case for
rights of respondents. This is provided recording telephone conversations, but
for by Article 7 of the ICC/ESOMAR may also apply to any recording device.
International Code. This Guideline sets
out in more detail the ways in which Closed circuit television or video
this Article should be applied in practice streaming should not be carried out
with the following recommendations. without permission in advance from
respondents.
4.1. Respondents’ agreement to the
use of recording 4.2. Client rights to copies of the
Respondents must be told at the original data
beginning of the interview or group It is generally accepted research
discussion that tape or video recording practice that the client is entitled to be
techniques are to be used unless this supplied, at cost, with duplicate copies
knowledge might bias the respondent’s of the original survey information
subsequent behaviour. The only other obtained from respondents, provided
exception where advance notification that this has been anonymised. Where
is not essential is for recordings made this information is held in the form of
While most internet content like web and intended recipient even realizes
pages and e-mail can pass through there is a hidden message) or other
IP networks (such as the Internet) means such as a digital watermark, so
as plain text, video must be encoded that the origin of videos can be traced
first. Encoding is a process where a back unequivocally in the event of them
mathematical algorithm compresses becoming public without the respond-
and discards video data. This proc- ents’ permission.
ess removes blank audio and freezes
images where there is no movement; 4.6. Audio recording and listening in
this makes video streams smaller and to telephone interviews
more efficient by just concentrating In many countries there are legal restric-
data on the movement of objects or tions on listening in to, or recording phone
people within the video. Once the video calls. Some allow exceptions when the
is encoded (whether it’s live or on purpose of the listening in is part of a
demand), the video is transmitted over quality control strategy. ESOMAR cannot
the internet in small chunks, which are provide country by country guidance.
played by the client media player then However, the use in the introduction to
discarded, they aren’t saved anywhere the interview of a phrase such as “this
on the client side. interview may be recorded for staff
training purposes” is recommended.
If the video transmission system used
does deliver a copy of the recording to Where a client wishes to listen in to a
the receiving computer, the researcher telephone interview, or listen to audio
must take steps to ensure that any copy recordings of interviews, the guidance in
of the video stream saved in the cache the previous section on client observing
of the observer’s computer is either applies.
deleted or is not used in a way which
breaches this Guideline.
5. Observation of
ESOMAR recommends that steps are human behaviour
taken to ensure that video streams and
digital video files are “fingerprinted” When researchers set out to observe
via steganography (art and science human behaviour not by interview but
of writing hidden messages in such a just by watching, two general courses
way that no one apart from the sender are open to them. They can be openly
involved in the activity they are obser- • Researchers explain significant fac-
ving – participant observers, or they can tors that may be expected to influence
remain aloof from the activity – acting the person’s willingness to participate
almost like voyeurs or covert observers. (such as risks, discomfort, adverse
The ethical issues vary depending on the effects, or limitations on confidential-
approach taken. ity) and other aspects about which the
person may inquire.
5.1. Participant Observation
Participant observation is a well estab- • Researchers tell participants that they
lished social science technique and has can withdraw from the research at any
been used in investigations of human time as well as explain the foreseeable
interactions. The Ethical Standards of consequences of declining to partici-
the American Psychological Associa- pate or withdrawing.
tion1 provides excellent guidance par-
ticularly on the very critical component • For persons who are legally incapable
of “informed consent”, guidance which of giving informed consent, research-
ESOMAR endorses. ers nevertheless provide an appropriate
explanation, obtain the person’s con-
Here are some of the features of sent, and obtain appropriate permission
informed consent as described in the from a legally authorised person, if such
Standards: substitute consent is permitted by law.
The APA Standard also advises on Internet areas which are set up specifi-
reporting: cally for respondents to visit in order
to participate in research – i.e. created
“In reports or presentations of their for the researcher for the purpose of
research, researchers do not disclose research, should be subject to all the
confidential or personally identifiable requirements of informed consent and
information concerning their subjects confidentiality, required of other direct
unless the person has given written research approaches.
permission (or unless there is some
other ethical or legal authorisation 5.2. Undisclosed observation
to do so). “Ordinarily,” the Standards There is wide cultural variability in
add, “in such scientific and professional levels of covert or undisclosed obser-
presentations, psychologists disguise vation that are tolerable within differ-
confidential information concerning ent countries. For instance in the UK
such persons or organizations so that speed cameras are ubiquitous, while
they are not individually identifiable in the USA there was huge public
to others and so that discussions do outcry against installing them as they
not cause harm to subjects who might were seen as violating privacy. Atti-
identify themselves.” tudes towards privacy differ between
cultures. Observation in public places,
5.1.1. Participation in Internet activity whether disclosed or undisclosed, is
If people express their views in legitimate. Where possible and always
public internet areas, where they would when required by legislation, research-
expect anybody who was interested ers using undisclosed observation
could see and read and transmit their techniques in public places (such as
ideas, then this is in the public domain. shops, restaurants etc.) should provide
notification to the public.
‘Walled gardens’ need more careful
handling. The researcher joining a 5.2.1. Public places
restricted group intent on research, If videoing people in public places, the
should announce his presence and researcher should display clear warning
objectives and seek the permission signs. If observation is taking place in
either of the area moderator, if there is an environment, research ethics may
one, or the members of the group. be addressed by placing a notification at
the entrance to the store or restaurant
11
During the month of February, we will Such personal data can be processed
be conducting random observation of for those purposes and analysed for
interactions between customers and management purposes though it will
sales staff for the purpose of improving usually have very limited sets of data
our services to the public. variables and will not allow much by
Company name; contact details. way of general research insights.
12
13
data before passing it to the specialist till roll data recorded against the loyalty
coding organisation. card. For legitimate research analysis,
the process described for database
Once the specialist coding is completed enhancement should be followed.
and returned to the research agency,
the codes are added to the rest of the
database and from there on handled 7. Retail tracking
as anonymised data for analysis. No
information about a specific individual is RFID technology is currently being
released outside the research company. developed to help retailers and pro-
ducers with the logistics of getting
If a respondent receives some form of products to the right place at the right
marketing approach as a result of analysis time by tracking their whereabouts.
of the survey data, they will receive it There are no examples at the moment
because they are part of some much of the data being used for customer
larger target group defined by survey tracking or linking product whereabouts
analysis. It will not be based on their to identified individuals. This technology
individual data as supplied in the survey. will be monitored by ESOMAR and revi-
This is the same for any survey carried sions to this Guideline issued if needed.
out to support marketing. A respondent
who is representing a group of people
with certain characteristics may receive 8. Physical monitoring
marketing messages designed for that
group of people. Neuromeasurement, the physical
monitoring of respondents using sen-
It is essential for the research agency to sors and devices such as EEG (Electro
explain the relevant data protection issues Encephylogram) or fMRI (Functional
to the third party coder and they must sign Magnetic Resonance Imaging) is a
a declaration that they will comply with the growing area of consumer research.
requirements of the ICC/ESOMAR Code The key issue here is informed consent.
and data protection legislation. For both fMRI and EEG, the onus is on
6.2. Loyalty cards the research agency or neuromarketing
Companies frequently want to bring company to explain fully the role and
together loyalty card sign up informa- use of the technology, both at recruit-
tion of customer surveys with detailed ment and prior to implementation. The
14
15
9. Further information
Queries about implementing the Guide-
line should be sent to the ESOMAR
Professional Standards Committee,
professional.standards@esomar.org
Helpful links
The Ethical Standards of the American
Psychological Association
www.apa.org/ethics
Project team
Chair of Project Team: John O’Brien,
consultant to the Professional Standards
Committee
Laurent Battais, managing director
Marketingscan, France
Hy Mariampolski, managing director
Qualidata Research, USA
Max Kalehoff, ex Buzzmetrics, USA
Peter Laybourne, chairman Neuroco,
UK
Ana Claudia Medeiros, consumer and
market insight manager Unilever, UK
Dan Foreman, director, Opinium
Research, UK
16
ESOMAR
Eurocenter 2
Barbara Strozzilaan 384
1083 HN Amsterdam
The Netherlands
Tel +31 20 664 2141
Fax +31 20 664 2922
E-mail professional.standards@esomar.org
www.esomar.org
www.esomar.org