Tag Archives: securing

WHAT ARE SOME STRATEGIES FOR SECURING ACCESS TO RESOURCES NECESSARY FOR PRIMARY RESEARCH

Gaining access to resources is often a crucial step in the research process, as primary research frequently relies on being able to observe phenomena firsthand, interact directly with human or animal subjects, gain entry to private or restricted areas, utilize specialized equipment or facilities, and view documents not otherwise publicly available. While access needs vary widely depending on the topic, methods, and goals of each research project, some generally applicable best practices can improve researchers’ chances of obtaining what they require.

First, thoroughly researching both the resources sought and the protocols/requirements for accessing them is essential. Make sure to understand precisely what is entailed in terms of permission levels, access limitations, qualifying criteria, regulations, confidentiality agreements, and any fees or costs involved. Consulting directly with those who control the resources can provide clarity on feasibility and any uncertainty in the proposal. Starting early allows maximum time for dialogue, troubleshooting obstacles, and iterative feedback/refinement of the access strategy.

Second, carefully crafting a formal written access request tailored to the specific situation is important. Provide compelling justification for why the resources are necessary, appropriate, and will be safely and responsibly utilized. Focus on how the proposed research aligns with and benefits the controlling entity’s interests, values, policies and any other priorities. Clearly communicate plans to respect subjects’ privacy, confidentiality of information obtained, security of physical spaces and digital data, as well as intellectual property considerations. Specifically address any perceived risks and propose effective mitigation approaches.

Third, it is wise to leverage personal and professional connections whenever feasible. Reaching out to acquaintances within the target institution, relevant professional associations or political circles can open doors more readily than an impersonal letter. The energy and enthusiasm of capable advocates elsewhere in one’s network elevates credibility. Meeting key decision makers in person, if permitted, allows forming a direct rapport and addressing concerns through dialogue. Following up afterwards to express appreciation for their consideration also fosters ongoing goodwill.

Fourth, consider offering something in exchange for the requested access, recognizing that altruism alone may not suffice given legal/ethical obligations and limited resources. Propose value-added collaboration like providing summary analyses, contributing subject-matter expertise, acknowledging the organization in publications or inviting them to related events. Volunteer unpaid services or even make a modest monetary donation commensurate with budget. Compromise and compromise creatively to achieve mutual benefit wherever possible.

Fifth, persist diplomatically if initial requests are denied. Request feedback on deficiencies and resubmit strengthened proposals addressing the issues raised. Suggest reasonable alternatives scopes, timeframes or supervision models that still serve research needs while accommodating constraints. Appeal decisions through approved processes if miscommunications or reconsideration could yield a different outcome. Know when to graciously accept “no” and redirect efforts productively rather than irritate decision makers with stubborn insistences.

Sixth, properly handle any access that is approved by fulfilling commitments to safeguard subjects, respect policies, share results, protect proprietary interests and more. Maintain open communication throughout and provide timely updates. Send heartfelt appreciation afterwards. Upheld integrity builds warranted confidence for future cooperation, while breaches jeopardize it for one’s self and others. Continually evaluate experiences for lessons applicable to subsequent requests as careers progress.

Gaining primary research access often mandates meticulous planning, optimizing known factors within one’s control while judiciously navigating social, regulatory and resource realities beyond. A balanced combination of diligence, interpersonal skills, compromise and perseverance within ethical bounds can overcome many barriers with patience and understanding on all sides. Proper stewardship of access then granted further enables valuable work for the benefit of scholarship and society.