Deck 8: Unobtrusive Measures, Secondary Analysis, and the Uses of Official Statistics

Full screen (f)
exit full mode
Question
The analysis of available data can be considered a type of unobtrusive measure.
Use Space or
up arrow
down arrow
to flip the card.
Question
One way of avoiding problems of unobtrusive measurement in the field is through the use of simulations.
Question
The "Dayton Water Survey" involved a mail questionnaire to water users.
Question
The "hatching chick exhibit" example was used in order to illustrate physical trace analysis.
Question
A thorough literature review, although important, is secon dary to the actual gathering of primary data.
Question
Data archives contain primary sources or raw data which are available to researchers for reanalysis.
Question
"Post hoc error" refers to the false assumption that, since one variable or outcome follows another in time, it is the cause of that outcome.
Question
The use of the Uniform Crime Reports in the analysis of crime trends serves as an example of secondary analysis.
Question
Due to inaccuracies historical documents are not very useful sources for criminal justice researchers.
Question
The best test of the usefulness of a content analysis scheme is its replicability.
Question
Secondary analysis involves the systematic classification of the content of mass media.
Question
Since most data gathered by agencies for official purposes are, for the most part, "fudged" they are not very useful for research purposes.
Question
Confederates refer to those who intrude and eventually de stroy one's ability to perform an unobtrusive study.
Question
Confederates are informants who are unaware of treatment.
Question
Mechanical aids should generally be avoided in unobtrusive measurement.
Question
There is general agreement among criminologists that dis guised observation is unethical.
Question
Simulation involves the transfer of observations into numerical scores.
Question
Those doing unobtrusive measures cannot do much to control the problem of waiting lengthy periods of time in order to observe that which they wish to observe.
Question
Criminal justice researchers enjoy the same state?granted right to confidentiality as doctors and clergy.
Question
Computer searches use a computer's retrieval system to search its data bank for sources which a user identifies by means of key words.
Question
Meta?analysis involves examining multiple studies and summarizing and comparing their statistical results.
Question
A mock trial is an example of a simulation.
Question
Which of the following was not identified as an advantage of unobtrusive measures?

A) nonreactivity
B) superior to experiments
C) more natural d avoids overreliance on attitudinal data
Question
The National Archive of Criminal Justice Data is an electronic library of primary data.
Question
High inter-rater reliability is essential for the integrity of a content analysis.
Question
Meta?analysis is simply another term for a literature review.
Question
Offender?based transaction statistics begin with finger printing and end when the case is dismissed or the arrested person is acquitted, convicted, or sentenced.
Question
Historical data and archives are excellent sources for unobtrusive measurement.
Question
The "Dayton Water Survey" was an example of an unobtrusive measure.
Question
Meta?analysis involves summing and synthesizing results across multiple separate studies to produce cumulative conclusions.
Question
Simulation involves games or research strategies which mimic reality.
Question
Mechanical aids can enhance unobtrusive measurement.
Question
Automated pin mapping uses geographic information systems in order to identify locations of crime events, arrests and similar activities.
Question
Which of the following is not a type of unobtrusive measurement?

A) content analysis
B) secondary analysis
C) factor analysis
D) physical trace analysis
Question
The use of confederates in disguised observation refers to:

A) studying renegades or criminals
B) using control groups
C) employing plants in order to facilitate that which is to be observed
D) using multivariate designs
Question
Which of the following is not an advantage of unobtrusive measurement?

A) avoids privacy invasion
B) nonreactivity
C) more natural method
D) avoids overreliance upon attitudinal data
Question
Which of the following is not true of simulations?

A) are an example of unobtrusive measures
B) attempt to mimic or imitate key features of reality
C) may pose ethical problems
D) are generally immoral and thus unacceptable in criminal justice research
Question
Confederates can be used in unobtrusive measurement to speed up the action.
Question
Secondary analysis involves the reanalysis of data which has already been gathered by someone else.
Question
There is not general agreement among criminologists that disguised observation is unethical.
Question
Which is not true of unobtrusive measures?

A) natural
B) nonreactive
C) guaranteed confidentiality
D) less dependent upon verbal reports
Question
The reanalysis of data previously gathered by someone else is a description of:

A) factor analysis
B) probit analysis
C) content analysis
D) secondary analysis
Question
is the systematic classification and study of the content of mass media.
Question
Hagan's study of authors' definitions of organized crime represents an example of:

A) secondary analysis
B) meta analysis
C) content analysis
D) factor analysis
Question
entails a variety of gaming strategies that attempt to imitate a more complex social reality.
Question
The application of empirical social scientific methods to the analysis of history is called:

A) histograms
B) historiography
C) factor analysis
D) causal analysis
Question
In contrast to primary sources, secondary sources are:

A) unanalyzed, raw data
B) government reports
C) data gathered by others
D) previously analyzed and evaluated information
Question
Which of the following was not discussed as a type of unobtrusive method?

A) case studies
B) simple observation
C) disguised observation
D) simulation
Question
A statistical analysis of data from many different studies dealing with the same research question to determine general findings describes:

A) factor analysis
B) physical trace analysis
C) meta?analysis
D) small space analysis
Question
The reanalysis of data which was originally gathered for other purposes or by other researchers is an example of:

A) content analysis
B) secondary analysis
C) small space analysis
D) physical trace analysis
Question
Humphreys' Tearoom Trade study involved:

A) physical trace analysis
B) disguised observation c simulation
D) secondary analysis
Question
is the study of deposits, accretion of matter, and other indirect substances produced by previous human interaction.
Question
A mock jury study would be an example of:

A) physical trace analysis
B) disguised observation
C) secondary analysis
D) simulation
Question
The subsequent explanation of the true purposes of deceptive research to participants is called:

A) debriefing
B) replication
C) recapitulation
D) meta-analysis
Question
are nonreactive methods of data gathering in which subjects are not aware of being studied.
Question
The examination of many studies in order to summarize and compare their statistical findings is an example of:

A) meta?analysis
B) content analysis
C) factor analysis
D) a literature review
Question
The major concern with respect to Milgram's Obedience to Authority was:

A) ethics
B) replication
C) accuracy
D) design
Question
Data archives are:

A) libraries which contain primary data sets
B) depositories for ancient artifacts
C) an example of physical trace analysis
D) used for literature reviews
Question
The Dayton Water Survey involved:

A) a self?report survey
B) simulation
C) participant observation
D) physical trace analysis
Question
involves the reanalysis of data that were previously gathered for other purposes.
Question
Some critics view disguised observation as privacy invasion. Do you agree/disagree with this view? Explain
Question
Discuss and give some examples of the major types of unobtrusive methods.
Question
Discuss the usefulness of simulations as data gathering strategies in criminal justice research.
Question
Define and give some examples of meta?analysis.How does it differ from what we ordinarily call a literature review?
Question
refers to quantitative analysis which reviews, combines, and summarizes the results of many different studies dealing with the same research question.
Question
is a technique developed by Stanley Milgram in which letters are addressed, stamped, but unposted and "lost," and the returns used to measure the popularity of organizations.
Question
collect felony arrest records from participating states and details such cases from booking to final disposition.
Question
What are the general advantages/disadvantages of unobtrusive measures as data gathering strategies?
Question
are persons who pretend to be subjects, but are really in on an experiment in order to "speed up the action."
Question
What are some limitations in doing secondary analysis of official data? Give some examples of criminal justice studies that have employed secondary analysis.
Question
observation is a type of research strategy in which the informed consent of subjects is not sought and researchers pretend to be part of the study group.
Question
What is content analysis? Give some examples of criminal justice research that has employed it.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/72
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 8: Unobtrusive Measures, Secondary Analysis, and the Uses of Official Statistics
1
The analysis of available data can be considered a type of unobtrusive measure.
True
2
One way of avoiding problems of unobtrusive measurement in the field is through the use of simulations.
True
3
The "Dayton Water Survey" involved a mail questionnaire to water users.
False
4
The "hatching chick exhibit" example was used in order to illustrate physical trace analysis.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
5
A thorough literature review, although important, is secon dary to the actual gathering of primary data.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
6
Data archives contain primary sources or raw data which are available to researchers for reanalysis.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
7
"Post hoc error" refers to the false assumption that, since one variable or outcome follows another in time, it is the cause of that outcome.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
8
The use of the Uniform Crime Reports in the analysis of crime trends serves as an example of secondary analysis.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
9
Due to inaccuracies historical documents are not very useful sources for criminal justice researchers.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
10
The best test of the usefulness of a content analysis scheme is its replicability.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
11
Secondary analysis involves the systematic classification of the content of mass media.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
12
Since most data gathered by agencies for official purposes are, for the most part, "fudged" they are not very useful for research purposes.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
13
Confederates refer to those who intrude and eventually de stroy one's ability to perform an unobtrusive study.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
14
Confederates are informants who are unaware of treatment.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
15
Mechanical aids should generally be avoided in unobtrusive measurement.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
16
There is general agreement among criminologists that dis guised observation is unethical.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
17
Simulation involves the transfer of observations into numerical scores.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
18
Those doing unobtrusive measures cannot do much to control the problem of waiting lengthy periods of time in order to observe that which they wish to observe.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
19
Criminal justice researchers enjoy the same state?granted right to confidentiality as doctors and clergy.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
20
Computer searches use a computer's retrieval system to search its data bank for sources which a user identifies by means of key words.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
21
Meta?analysis involves examining multiple studies and summarizing and comparing their statistical results.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
22
A mock trial is an example of a simulation.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
23
Which of the following was not identified as an advantage of unobtrusive measures?

A) nonreactivity
B) superior to experiments
C) more natural d avoids overreliance on attitudinal data
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
24
The National Archive of Criminal Justice Data is an electronic library of primary data.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
25
High inter-rater reliability is essential for the integrity of a content analysis.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
26
Meta?analysis is simply another term for a literature review.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
27
Offender?based transaction statistics begin with finger printing and end when the case is dismissed or the arrested person is acquitted, convicted, or sentenced.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
28
Historical data and archives are excellent sources for unobtrusive measurement.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
29
The "Dayton Water Survey" was an example of an unobtrusive measure.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
30
Meta?analysis involves summing and synthesizing results across multiple separate studies to produce cumulative conclusions.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
31
Simulation involves games or research strategies which mimic reality.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
32
Mechanical aids can enhance unobtrusive measurement.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
33
Automated pin mapping uses geographic information systems in order to identify locations of crime events, arrests and similar activities.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
34
Which of the following is not a type of unobtrusive measurement?

A) content analysis
B) secondary analysis
C) factor analysis
D) physical trace analysis
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
35
The use of confederates in disguised observation refers to:

A) studying renegades or criminals
B) using control groups
C) employing plants in order to facilitate that which is to be observed
D) using multivariate designs
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
36
Which of the following is not an advantage of unobtrusive measurement?

A) avoids privacy invasion
B) nonreactivity
C) more natural method
D) avoids overreliance upon attitudinal data
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
37
Which of the following is not true of simulations?

A) are an example of unobtrusive measures
B) attempt to mimic or imitate key features of reality
C) may pose ethical problems
D) are generally immoral and thus unacceptable in criminal justice research
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
38
Confederates can be used in unobtrusive measurement to speed up the action.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
39
Secondary analysis involves the reanalysis of data which has already been gathered by someone else.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
40
There is not general agreement among criminologists that disguised observation is unethical.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
41
Which is not true of unobtrusive measures?

A) natural
B) nonreactive
C) guaranteed confidentiality
D) less dependent upon verbal reports
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
42
The reanalysis of data previously gathered by someone else is a description of:

A) factor analysis
B) probit analysis
C) content analysis
D) secondary analysis
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
43
is the systematic classification and study of the content of mass media.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
44
Hagan's study of authors' definitions of organized crime represents an example of:

A) secondary analysis
B) meta analysis
C) content analysis
D) factor analysis
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
45
entails a variety of gaming strategies that attempt to imitate a more complex social reality.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
46
The application of empirical social scientific methods to the analysis of history is called:

A) histograms
B) historiography
C) factor analysis
D) causal analysis
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
47
In contrast to primary sources, secondary sources are:

A) unanalyzed, raw data
B) government reports
C) data gathered by others
D) previously analyzed and evaluated information
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
48
Which of the following was not discussed as a type of unobtrusive method?

A) case studies
B) simple observation
C) disguised observation
D) simulation
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
49
A statistical analysis of data from many different studies dealing with the same research question to determine general findings describes:

A) factor analysis
B) physical trace analysis
C) meta?analysis
D) small space analysis
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
50
The reanalysis of data which was originally gathered for other purposes or by other researchers is an example of:

A) content analysis
B) secondary analysis
C) small space analysis
D) physical trace analysis
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
51
Humphreys' Tearoom Trade study involved:

A) physical trace analysis
B) disguised observation c simulation
D) secondary analysis
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
52
is the study of deposits, accretion of matter, and other indirect substances produced by previous human interaction.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
53
A mock jury study would be an example of:

A) physical trace analysis
B) disguised observation
C) secondary analysis
D) simulation
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
54
The subsequent explanation of the true purposes of deceptive research to participants is called:

A) debriefing
B) replication
C) recapitulation
D) meta-analysis
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
55
are nonreactive methods of data gathering in which subjects are not aware of being studied.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
56
The examination of many studies in order to summarize and compare their statistical findings is an example of:

A) meta?analysis
B) content analysis
C) factor analysis
D) a literature review
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
57
The major concern with respect to Milgram's Obedience to Authority was:

A) ethics
B) replication
C) accuracy
D) design
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
58
Data archives are:

A) libraries which contain primary data sets
B) depositories for ancient artifacts
C) an example of physical trace analysis
D) used for literature reviews
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
59
The Dayton Water Survey involved:

A) a self?report survey
B) simulation
C) participant observation
D) physical trace analysis
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
60
involves the reanalysis of data that were previously gathered for other purposes.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
61
Some critics view disguised observation as privacy invasion. Do you agree/disagree with this view? Explain
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
62
Discuss and give some examples of the major types of unobtrusive methods.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
63
Discuss the usefulness of simulations as data gathering strategies in criminal justice research.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
64
Define and give some examples of meta?analysis.How does it differ from what we ordinarily call a literature review?
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
65
refers to quantitative analysis which reviews, combines, and summarizes the results of many different studies dealing with the same research question.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
66
is a technique developed by Stanley Milgram in which letters are addressed, stamped, but unposted and "lost," and the returns used to measure the popularity of organizations.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
67
collect felony arrest records from participating states and details such cases from booking to final disposition.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
68
What are the general advantages/disadvantages of unobtrusive measures as data gathering strategies?
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
69
are persons who pretend to be subjects, but are really in on an experiment in order to "speed up the action."
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
70
What are some limitations in doing secondary analysis of official data? Give some examples of criminal justice studies that have employed secondary analysis.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
71
observation is a type of research strategy in which the informed consent of subjects is not sought and researchers pretend to be part of the study group.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
72
What is content analysis? Give some examples of criminal justice research that has employed it.
Unlock Deck
Unlock for access to all 72 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 72 flashcards in this deck.