Open access peer-reviewed chapter - ONLINE FIRST

Surveying Sensitive Topics with Indirect Questioning

By Evrim Oral

Submitted: September 6th 2018Reviewed: January 17th 2019Published: February 25th 2019

DOI: 10.5772/intechopen.84524

Downloaded: 140

Abstract

Data reliability is a common concern especially when asking about sensitive topics such as sexual misconduct, domestic violence, or drug and alcohol abuse. Sensitive topics might cause refusals in surveys due to privacy concerns of the subjects. Unit nonresponse occurs when sampled subjects fail to participate in a study; item nonresponse occurs when sampled subjects do not respond to certain survey questions. Unit nonresponse reduces sample size and study power; it might also increase bias. Respondents, on the other hand, might answer the sensitive questions in a manner that will be viewed favorably by others instead of answering truthfully. Social desirability bias (SDB) has long been recognized as a serious problem in surveying sensitive topics. Various indirect questioning methods have been developed to reduce SDB and increase data reliability, one of them being the randomized response technique (RRT). In this chapter, we will review some of the important indirect questioning techniques proposed for binary responses, with a special focus on RRTs. We will discuss the advantages and disadvantages of some of the indirect questioning techniques and describe some of the recent novel methods.

Keywords

  • social desirability bias
  • unmatched count technique
  • network scale-up technique
  • nonrandomized response technique
  • randomized response technique

1. Introduction: surveying sensitive topics

Data reliability is a common concern across all studies that use surveys, but more so while asking sensitive questions. Sensitive questions include sacred, private, or potentially exposing information that could be incriminating or discriminating for a respondent, or for the social group that is represented by the respondent [1]. For example, in studies which evaluate exposure to HIV infection, respondents are often asked sensitive questions regarding their opposite- or same-sex sexual practices. As another example, in studies which aim to assess substance use and abuse, respondents might suppress disclosure of their drug and alcohol misuse to avoid embarrassment or potentially harmful/unwanted consequences. Estimating the prevalence of such sensitive attributes is particularly important for health care researchers to build scientific knowledge, create necessary public health interventions, and develop political strategies.

Two problems typically arise while studying sensitive topics, (1) nonresponse rate increase and (2) social desirability bias (SDB), which is defined as the tendency of answering questions in a socially acceptable fashion rather than answering truthfully, occurs. Nonresponse rates can be reduced by utilizing some strategies such as using advance letters, offering incentives, using more experienced interviewers, and making the topic salient to respondents [2, 3, 4, 5, 6]. However, if these strategies are more effective for some particular subpopulations compared to others, a reduction in nonresponse can in reality increase nonresponse bias. Statistical techniques can also be used to minimize the effects of unit nonresponse after the data is collected [7]; yet, none of these approaches can prevent SDB.

Many researchers have suggested using self-administered modes such as mail, web, computer-assisted self-interviewing (CASI), audio computer-assisted self-interviewing (ACASI), telephone audio computer-assisted self-interviewing (T-ACASI), or touchtone data entry (TDE) in order to reduce SDB [8, 9, 10, 11]. However, self-administered modes have their own drawbacks. For example, all self-administered surveys are known to be susceptible to produce low-quality data since they lack the interviewer feedback to help clarify the questions when respondents do not understand them. As another example, it is known that computer-based surveys, such as CASI or ACASI, are mostly completed by younger, more computer savvy respondents, which potentially could introduce bias to estimates. T-ACASI, on the other hand, mainly suffers from high break-offs. There are additional issues about the feasibility of utilizing T-ACASI in survey tools with the elderly [12]. In addition, when surveying disadvantaged populations, self-administered surveys might not be a viable option. In fact, illiteracy, poor vision, respondent preference, or other reasons can cause self-administration not to occur: in a self-administered component of a computer-assisted personal survey, only 79% of CASI cases were actually fully self-administered [13]. For an extensive review of advantages and disadvantages of some of the common survey modes, see Smith and Kim [14].

An effective, alternative way to improve response rates and prevent SDB simultaneously is to increase the perceived privacy of the respondents. If the respondents’ privacy can be guaranteed, then their tendency to refuse to participate and/or provide untruthful answers would decrease. All indirect questioning techniques aim to achieve this goal via different approaches. In the next section, we review some of the indirect questioning techniques that have been developed to increase the perceived privacy of the respondents, where the characteristic under study (the outcome) is binary in nature. Some of these techniques explained here have been extended to the cases where the characteristic under study is quantitative or polychotomous in nature; here we will only focus on the binary outcomes, such as in yes/no type of questions. Note that all indirect questioning techniques have produced extensive research areas: they all have been modified and/or extended since they have been first introduced; here we briefly summarize the most important ones and present their main aspects for conciseness.

2. Indirect questioning techniques

Several indirect surveying methodologies have been developed to increase respondents’ confidentiality when the characteristic under study has a sensitive nature. Among them, the most commonly used ones for binary outcomes are, namely, unmatched count technique (UCT), network scale-up technique (NST), nonrandomized response technique (NRRT), and randomized response technique (RRT).

UCT, which is also called the item count technique, was first introduced by Raghavarao and Federer [15] with the name “block total response procedure,” but it was formally developed by Miller [16] in the form that we use today. Since then, UCT has been applied by many researchers such as Miller et al. [17], LaBrie and Earleywine [18], Biemer and Brown [19], Wolter and Laier [20], Gervais and Najle [21], and so forth. UCT provides privacy by embedding a sensitive behavior (which is of interest) within several nonsensitive behaviors. All nonsensitive behaviors and sensitive behavior should be binary outcomes (yes/no). In applying the technique, survey participants are randomly divided into two groups. Individuals in one group are provided with a list of nonsensitive behaviors (say, k items), whereas individuals in the other group are provided with the same list of nonsensitive behaviors plus one sensitive behavior that is under study (in total k + 1 items). Participants in both groups are asked to report the total number of activities that they have engaged in. The prevalence of the sensitive behavior is then estimated by calculating the difference between the two independent group means. Several researchers have modified and/or extended UCT in recent years such as Tsuchiya [22], Chaudhuri and Christofides [23], Hussain et al. [24], Ibrahim [25], and so on. As an example on how to apply UCT, consider the study of Zimmerman and Langer [26] in which the technique was utilized to improve the prevalence estimates of marihuana use and ever having had sex with a person of the same gender among the tenth grade students in the Miami-Dade County Public Schools. In their study, the sample (1524 students) was randomly assigned to receive one of three lists on the survey: 33% of the respondents received a list with four nonsensitive items only; 33% received a list with the four nonsensitive items plus the sensitive item about sex with someone of the same gender; 33% received a list with the four nonsensitive items plus the sensitive item about ever using marihuana. Their UCT estimate of prevalence of having sex with someone of the same gender was 80% higher than the prevalence from direct questioning (DQ) (15.9 vs. 8.7%); similarly, their UCT estimate of marihuana use was 21% higher than the prevalence from DQ (20.6 vs. 16.7%). Assuming that for socially undesirable behaviors, higher prevalence estimates are more accurate than the lower prevalence estimates; Zimmerman and Langer [26] concluded that their results demonstrate the superiority of UCT compared to DQ.

The NST was first proposed by Bernard et al. [27] in order to estimate the size of a population at risk and was first used to get an estimate of the number of victims killed in the 1985 Mexico City earthquake [28]. The method was later refined and used to estimate the HIV-seropositive persons in the USA [29]. NST basically involves two steps: (1) the personal network size of the members of a random sample of a population is estimated and (2) an estimate of the number of members of the hidden subpopulation is obtained using the information from step 1. The method heavily relies on the assumption that people’s social networks on average are representative of the general population; for example, if respondents report knowing 500 people on average, five of whom are sex workers, we can estimate that 1% of the general population is sex workers. The estimated prevalence is then combined with known information about the size of the general population, say the population of the USA, to produce an estimate for the number of people in the USA who are sex workers (see Russell et al. [30] for more details on NST and its limitations).

NRRT was first introduced by Swensson [31] and later modified by Takahasi and Sakasegawa [32]. The main idea behind Swensson’s NRRT was to combine a nonsensitive behavior with a sensitive behavior in the same question so that it would not be possible for the interviewer to know which behavior is being responded with a “yes” answer; and therefore, respondents are provided with some level of privacy. Swensson’s NRRT requires two independent samples to calculate the estimate of the sensitive characteristic; for this purpose, survey participants can be randomly divided into two groups. Let U be the nonsensitive behavior, such as being married, and let A be the sensitive behavior under study, such as abusing prescription drugs. Let us demonstrate the combined question using Table 1 given below.

A (Do you use prescription pain relievers without a doctor’s prescription?)U (Are you married?)
YesNo
Yesab
Nocd

Table 1.

Demonstration of Swensson’s NRRT.

Respondents in the first group receive the question “Do you belong to one of the groups a, b, or c in the table?” whereas respondents in the second group receive the question “Do you belong to one of the groups a, b, or d in the table?” Realize that the probability of belonging to groups a, b, c, or d is P (A = 1, U = 1), P(A = 1, U = 0), P(A = 0, U = 1), or P(A = 0, U = 0), respectively. If we denote the unknown proportion of the population members who have the sensitive characteristic A, i.e., the prevalence of the sensitive characteristic, by πA, and let

Xij=1,if the respondentireplies witha ''yes''in samplej0,if the respondentireplies witha ''no''in samplej

where 0πA1, i=1,2,nj, and j=1,2, then the probability of getting a “yes” response from sample 1 becomes

PXi1=1 = PA=1U=1 + PA=1U=0 + PA=0U=1E1

and the probability of getting a “yes” response from sample 2 becomes

PXi2=1=PA=1U=1 + PA=1U=0 + PA=0U=0.E2

Since,

PA=1U=1 + PA=1U=0=PA=1,

and

PA=0U=1 + PA=0U=0=PA=0,

using the Eqs. (1) and (2), we can write

PXi1=1 + PXi2=1=2PA=1+PA=0,

or

PA=1=PXi1=1 + PXi2=11.E3

From Eq. (3), πAcan be estimated using the proportions of “yes” responses, which are calculated from the samples as:

π̂AS=π̂1+π̂21E4

where π̂j=i=1njXij/nj, j=1,2. One can easily show that the estimator given by (4) is an unbiased estimator of πA:

Eπ̂AS=1n1Ei=1n1Xi1+1n2Ei=1n2Xi21=1n1i=1n1PXi1=1+1n2i=1n2PXi2=11=2PA=1+PA=01=πA.

The variance of the estimator given in Eq. (4) is derived in a few steps:

Varπ̂AS=1n12Vari=1n1Xi1+1n22Vari=1n2Xi2=1n12i=1n1PXi1=11PXi1=1+1n22i=1n2PXi2=11PXi2=1=PXi1=11PXi1=1n1+PXi2=11PXi2=1n2,

which can be estimated by

Var̂π̂AS=π̂11π̂1n1+π̂21π̂2n2.E5

Swensson’s NRRT was later modified by Takahasi and Sakasegawa [32] as follows: In the first stage, all respondents are asked a nonsensitive binary question, such as “If you have to choose between adopting a cat or a dog, which would you prefer?” but directed not to report their answers to the interviewer (replies are silent). In the second stage, the sensitive behavior is combined with the previous nonsensitive question and asked the respondents in the format given below:

  • If you are a dog person, and use prescription pain relievers without a doctor?s prescription, say 0.

  • If you are a dog person, and do not use prescription pain relievers without a doctor?s prescription, say 1.

  • If you are a cat person, and use prescription pain relievers without a doctor?s prescription, say 1.

  • If you are a cat person, and do not use prescription pain relievers without a doctor?s prescription, say 0.

In this NRRT, to be able to obtain the estimates, the nonsensitive and sensitive behaviors need to be independent (U and A should not be related). As we explain in the next section, if the nonsensitive binary question’s prevalence in the population is known, then Takahasi and Sakasegawa’s NRRT is equivalent to Warner’s model. If the nonsensitive binary question’s prevalence in the population is not known, then this method requires the use of two independent samples. By relaxing the assumption of independence of the nonsensitive and sensitive behaviors, Takahasi and Sakasegawa [32] proposed an additional NRRT as well, where the nonsensitive behavior has three outcomes instead of two; as a result, in this NRRT, three independent samples are required instead of two independent samples. For a comprehensive review of NRRTs, interested readers are referred to Tian and Tang [33].

Different than the previous indirect questioning techniques, RRTs provide confidentiality by utilizing a randomization device, such as a deck of playing cards, a pair of dice, or a spinning game wheel while asking the sensitive question. The interviewer does not observe which playing card is chosen or what numbers the dice show, thus a respondent’s privacy is absolutely guaranteed by the RRT process because the interviewer cannot know which statement the participant is responding to. In the next section, we review some of the main RRTs that have been proposed as well as some of the recently developed techniques.

3. Randomized response techniques

The first RRT was introduced by Warner [34]. Warner’s RRT asks the sensitive question by providing respondents a randomization device with two statements on it that appear with known probabilities θ and 1−θ. For example, consider a spinning game wheel which divided into two sectors with areas θ and 1−θ. The first statement on the device possesses the sensitive characteristic, and the other statement is simply the complementary of the first one. Let us suppose that the sensitive characteristic is being HIV+. The two statements on the wheel would read “I am HIV+” and “I am HIV-” (see Figure 1). The respondents spin the wheel in private and answer truthfully with a “yes” or “no” to the statement on which the arrowhead lands. Since the spinning process is not observed by the interviewer, this model assures privacy protection for the respondents [34].

Figure 1.

Demonstration of the randomization device in the Warner’s model.

Let the unknown proportion of the population members who have the sensitive characteristic A be denoted by πA, and let

Xi=1,if the respondentireplies witha ''yes''0,if the respondentireplies witha ''no''E6

where 0πA1and i=1,2,n;then the probability of getting a “yes” response can be written as

PXi=1=πAθ+1πA1θ,E7

and, from Eq. (7), an unbiased estimator of πAcan be derived as

π̂AW=π̂+θ12θ1,

where θ0.5and π̂=i=1nXi/n.The variance of Warner’s estimator can be derived as [34]

Varπ̂AW=πA1πAn+θ1θn2θ12.E8

Now, let us compare Swensson’s NRRT with Warner’s model. For simplicity, let us assume that n1=n2=n/2and the prevalence of U (say, the proportion of the married people in the population) is known from previous studies. Let us also assume that U and A are not related behaviors. In Swensson’s NRRT, if we denote the prevalence of U by p, the probability of getting a “yes” response from samples 1 and 2 can be written as

PXi1=1=πA+PA=0PU=1=πA+1πAp

and

PXi1=2=πA+PA=0PU=0=πA+1πA1p,

respectively, assuming that the nonsensitive and sensitive behaviors are independent. Since we have

PXi1=11PXi1=1=πA1πA12p+p1πA1p1πA

and

PXi2=11PXi2=1=p1πA1p1πA,

the variance of π̂AScan be simplified as

Varπ̂AS=2nPXi1=11PXi1=1+PXi2=11PXi2=1=2nπA1πAp2+1p2+21πAp1p.               (9)E9

In order to compare Warner’s RRT with Swensson’s NRRT, we calculated theoretical relative efficiencies (REs)

REθ,p=Varπ̂AWVarπ̂AS

from Eqs. (8) and (9) for various combinations of πAand θ=pvalues using a FORTRAN code and providing our results in Table 2. The FORTRAN code used is given in the Appendix.

πAθ=p
0.050.100.150.200.250.300.350.400.45
0.10.4450.4890.5900.7651.0671.6302.8546.36025.298
0.20.4950.5460.6500.8281.1381.7172.9786.59226.122
0.30.5240.5880.7020.8921.2191.8313.1626.97427.577
0.40.5450.6240.7540.9631.3201.9843.4277.55829.878
0.50.5640.6620.8131.0521.4552.2013.8188.44633.445
0.60.5850.7080.8911.1751.6502.5274.4249.84839.145
0.70.6150.7751.0091.3701.9693.0725.45512.26349.028
0.80.6670.8991.2341.7492.6004.1647.54117.18869.271
0.90.8171.2561.8922.8674.4807.44413.84332.120130.806

Table 2.

Relative efficiencies of the estimators from Warner’s model and Swensson’s NRRT for various πAand θ=pvalues. The shaded cells show the cases where Warner’s model is more efficient than Swensson’s model.

One can conclude from Table 2 that Warner’s model is more efficient, i.e., has smaller variance, than Swensson’s NRRT for small θ=pvalues. When θ=p0.25, however, Warner’s estimator π̂AWloses its efficiency. The reason for this efficiency loss is due to the fact that when θ0.5, the variance in Eq. (8) . However, keep in mind that small θvalues are not preferable in Warner’s model since they do not provide sufficient privacy protection [33, 35]. In order to further investigate how Warner’s RRT compete with Swensson’s NRRT, we also assumed the case where θpand calculated the theoretical REs as given above, for the case where πAvalues were set to 0.1, 0.2, and 0.3. The results are provided in Table 3. Realize that we only present the RE values for 0.05p0.5and 0.05θ0.45since

REθ,p=RE1θ,p=REθ,1p=RE1θ,1p.
pθ
0.050.100.150.200.250.300.350.400.45
πA = 0.1
0.050.4450.6911.0491.6012.5164.2007.84018.23974.394
0.100.3150.4890.7431.1331.7812.9745.55112.91352.672
0.150.2510.3890.5900.9011.4162.3654.41410.26841.882
0.200.2130.3300.5010.7651.2032.0083.7488.72035.567
0.250.1890.2930.4450.6791.0671.7813.3247.73331.543
0.300.1730.2680.4070.6210.9761.6303.0437.07828.870
0.350.1620.2510.3820.5830.9161.5292.8546.64027.085
0.400.1550.2410.3660.5580.8771.4652.7346.36025.940
0.450.1510.2350.3570.5440.8551.4282.6666.20225.298
0.500.1500.2330.3540.5400.8481.4172.6446.15225.091
πA = 0.2
0.050.4950.6810.9521.3692.0613.3346.08613.94956.409
0.100.3970.5460.7631.0981.6532.6754.88311.19245.258
0.150.3380.4650.6500.9351.4082.2784.1589.53038.537
0.200.3000.4120.5760.8281.2472.0183.6848.44334.142
0.250.2730.3760.5250.7561.1381.8413.3607.70031.138
0.300.2550.3510.4900.7051.0611.7173.1347.18329.046
0.350.2420.3330.4660.6701.0081.6322.9786.82627.604
0.400.2340.3220.4500.6470.9741.5762.8766.59226.659
0.450.2290.3150.4410.6340.9541.5442.8196.46026.122
0.500.2280.3130.4380.6300.9481.5342.8006.41725.948
πA = 0.3
0.050.5240.6830.9161.2751.8712.9675.33612.10348.646
0.100.4500.5880.7881.0971.6102.5534.59110.41241.851
0.150.4010.5230.7020.9771.4332.2734.0879.27037.259
0.200.3660.4780.6410.8921.3092.0753.7328.46534.024
0.250.3410.4450.5970.8311.2191.9333.4777.88631.695
0.300.3230.4220.5650.7871.1541.8313.2927.46830.014
0.350.3100.4050.5430.7561.1091.7583.1627.17228.826
0.400.3020.3940.5280.7351.0781.7103.0756.97428.032
0.450.2970.3870.5200.7231.0611.6823.0256.86127.577
0.500.2950.3850.5170.7191.0551.6733.0096.82427.429

Table 3.

Relative efficiencies of the estimators from Warner’s model and Swensson’s NRRT for various θand p values when πA=0.1,0.2,0.3.The shaded cells show the cases where Warner’s model is more efficient than Swensson’s model.

The FORTRAN code used for Table 3 can be obtained from the author upon request.

One can observe from Table 3 that Warner’s model is more efficient than Swensson’s NRRT only for small θvalues. One can also observe that REs become higher when πAvalues increase, except for some special cases where p0.25and θ0.10. Note that in both Tables 2 and 3, REswhen θ=0.5.

When the nonsensitive binary question’s prevalence in the population is known (say, the prevalence of being a dog person is 1θ,and the prevalence of being a cat person is θ), Takahasi and Sakasegawa’s NRRT becomes equivalent to Warner’s model. To see this, let the unknown proportion of the population members who have the sensitive characteristic A be denoted by πA, where 0πA1, and let Xi(i=1,2,n) be defined as in Eq. (6). If θis known, the probability of getting a “1” response from Takahasi and Sakasegawa’s NRRT can be written as

PXi=1=1πA1θ+πAθ,E10

which is equal to the probability of getting a “yes” response from Warner’s model, i.e., Eq. (7) and thus, provides the same estimator when solved for πA.

There have been many different RRTs developed since Warner’s original method, such as in Greenberg et al. [36, 37], Gupta [38], Gupta et al. [39, 40, 41], Yu et al. [42], Sihm et al. [43], Gupta and Shabbir [44], and so on. Efforts specifically have been made to improve the efficiency of the technique by reducing the variance and thus the confidence intervals, because, the primary disadvantage of the Warner’s model, and in fact of all RRTs, is that the variances of the estimators are higher than the ones that could be obtained from DQ [35, 45]; for a comprehensive review of RRTs, interested readers are referred to Chaudhuri and Mukerjee [35], Chaudhuri [46], and Chaudhuri and Christofides [47]. In the next subsection, we will review some real-life applications of RRTs and their comparisons with other surveying techniques.

3.1 Applications of RRTs

Two meta-analyses of 6 validation and 32 comparative studies which utilized RRTs showed that in various settings, the RRT results are superior to those from DQ and become more valid as the sensitivity of a topic increases [48].

The benefits of the RRTs have also been demonstrated by many statistical methodology researchers via theorems and simulation studies; however, their use in large or national surveys has been somewhat limited. In fact, to our knowledge, the only study which applied an RRT on a national level was done by Kirtadze et al. [49] in the country of Georgia. Kirtadze et al. [49] used a multistage cluster sampling and surveyed 4805 respondents to assess under-reporting of drug abuse in the Republic of Georgia. They utilized the unrelated question RRT to ask questions such as “During the last 12 months, have you taken hashish or marihuana?” They found that all RRT estimates for prevalence of controlled substance use were higher than the DQ estimates, which indicates under-reporting with DQ. For example, lifetime cannabis use estimate was 88.24% higher from RRT than from DQ. Kirtadze et al. [49], however, did not use a gold standard such as urinalysis and thus did not know the “true” value of prevalence of illegal drug use in the Republic of Georgia’s study population.

Although not nationwide, there have been other researchers who incorporated RRTs in their surveys. Fisher et al. [50], for example, used forced RRT to estimate the prevalence of substance use and sexual activity of high school students who enrolled to their clinic. They compared their results with the ones from a non-anonymous questionnaire which was completed by the same students earlier the same academic year. While RRT provided higher rates for substance use-related questions with respect to the DQ, it provided similar rates for sexual activity-related questions (36% from DQ vs. 31% from RRT). Fisher et al. [50] concluded that admitting to sexual activity in the school setting might carry less stigma and perceived risk than admitting to marihuana or cocaine use [50]. We suggest, however, that this result might indicate that the high school students who participated in the study overestimated their sexual behavior when asked directly to live up to peer acceptance; in other words, we suggest that forced RRT corrected the over-reporting.

In another study, Srivastava et al. [51] used Warner’s RRT to assess the extent of sexual abuse among children in several districts of Uttar Pradesh state of India. They found that the estimates from RRT were higher than the national estimates obtained from Ministry of Women and Child Development, Government of India, which is an indicator of potential under-reporting with DQ.

In a more recent study, Chhabra et al. [52] used convenience sampling and asked the question “Have you ever been a victim of sexual abuse by a friend or family member?” to 585 students in a college in Delhi, India. They divided their sample into three equal randomly selected groups and asked the sexual abuse-related question using (1) DQ, (2) the RRT proposed by Sihm et al. [43], and (3) the confidential method, which was their gold standard to compare their results. The prevalence of sexual abuse was 14% with the gold standard, 8% with the DQ method, and 12% with the RRT. Note that their confidential method, however, was also a surveying technique in which the participants wrote down their answers and put them into a closed box.

3.2 Inflated variance

Although all RRTs lead to unbiased (i.e., accurate) estimates of the sensitive characteristic of interest, their variances are larger than the ones from the DQ technique. Thus, the price for using an RRT instead of the DQ is the inflated variance, which is due to the randomization process. Consequently, if the question of interest is not considered to be really sensitive by most of the respondents in a specific population, using an RRT instead of the DQ inflates the variance of the estimates unnecessarily. Besides, it is known that there are cultural or social differences in the extent to which topics are perceived as sensitive. For example, smoking marihuana is a less threatening topic in the Netherlands than in the USA, or questions regarding education are considered to be sensitive in Sweden [1]. Similarly, questions regarding HIV status or sexual practices might not be considered to be sensitive by patients who visit an HIV clinic for treatment. Unfortunately, once an RRT is incorporated within a survey, even if the question of interest turns out to be not sensitive after collecting the data, one has to proceed with the inefficient estimate obtained from the RRT. Motivated by the fact that if researchers do not have a priori knowledge about the sensitivity level of a question in a specific population, then they should be able to select between the estimators from an RRT and the DQ; Ardah and Oral [45] proposed a novel two-stage RRT for a binary response where they utilized Warner’s RRT in the second stage. Their model provides unbiased estimators of both prevalence of the sensitive characteristic and the proportion of cheating in the population simultaneously and allows one to obtain better estimates by avoiding the unnecessary penalty, i.e., the inflated variance, if the question of interest turns out to be significantly not sensitive. Although there are some other RRTs which can estimate the sensitivity level of a question, such as in Gupta [38], none of these RRTs have the ability to avoid the inflated variance if the question’s sensitivity level turns out to be low.

Ardah and Oral [45] denoted the unknown true proportion of population members that have the sensitive characteristic A by πA, where 0πA1. They showed that, in a self-protective no-saying model (i.e., when a respondent cheats, s/he always answers in favor of the least stigmatizing category (see [53])) if one uses the DQ, the proportion of respondents who have the sensitive characteristic A becomes

πA=πD+πC,E11

where πDis the proportion of respondents who reply with a “yes” to the sensitive question when asked directly and πCis the proportion of respondents who cheat (i.e., the proportion of respondents who reply with a “no” to the sensitive question even though they have the characteristic A). Realize that in Eq. (11), πCis the SDB, and if all respondents answer truthfully in the DQ, i.e., if πC=0, then πA=πD. Unfortunately, the SDB, i.e., the proportion of cheaters, cannot be measured using the DQ. Ardah and Oral’s [45] proposed model, however, allows one to both estimate it and select the unbiased estimator with the minimum variance depending on the sensitivity level of the question (or proportion of cheating in the population). Ardah and Oral [45] utilized unrelated question RRT in the second stage of their model as well; in fact, their model can easily be extended to any desired RRT [45].

4. Conclusion

Numerous indirect questioning techniques have been developed to ask survey questions on sensitive topics or stigmatizing characteristics. All indirect questioning techniques have their own limitations: In applying the UCT, only one of the group members provide the information on the sensitive characteristic of interest [25]. NST is known to suffer from recall bias, barrier effects, transmission error, and response bias [54]. NRRTs can be vulnerable to cheating due to distrust as much as the RRTs [55]. RRTs have some disadvantages as well: integrating a randomization device into a survey tool might not be practical in some situations, such as when researchers plan to use venue sampling to reach LGBT community members in gay bars or clubs. RRTs are also known not to work well if the respondents do not understand the process and/or do not follow the instructions properly. Besides, there might be cultural, social, or personal differences in the extent to which topics are perceived to be sensitive. Thus, we suggest that researchers should select the optimal surveying technique by considering various aspects of their study, such as the target population, sensitivity level of the question, available resources, and practicality of integrating a specific technique, at once. As in Erdmann [55], we also suggest that researchers should not rely on the more-is-better assumption, which is assuming that the higher prevalence estimates are more accurate than the lower prevalence estimates, in comparing different techniques; instead, we suggest to use a valid gold standard (such as urinalysis or a lie detector) for comparisons, whenever possible, perhaps using a small subsample.

Appendix

!***************************************************************************

! This code was written to calculate the relative efficiencies in Table 2

!***************************************************************************

INCLUDE 'link_fnl_static.h'

REAL(8) THETA,C, PIA, K,E, VAR_RRT, VAR_NRRT

REAL(8) R(21,21)

INTEGER I,J,ITENO,N

OPEN (3,FILE="C:\Users\Oral\Documents\Fortran results\Table2.txt")

WRITE(3,*) ""

WRITE(3,*) ""

WRITE(3,50) "Calculated Relative Efficiencies for various p=theta and Population Proportion (Pi_A) combinations"

WRITE(3,*)""

WRITE(3,*)"*****RE MATRIX*****"

WRITE(3,*)""

WRITE(3,*)"p=Theta value "

DO K=0.0,1.05,0.05

WRITE(3, 100,advance='no') K

END DO

WRITE(3, *) "

DO J=1,148

WRITE(3, 200,advance='no') '_'

END DO

WRITE(3, *) "

THETA=0.0

PIA=0.0

DO I=1,11

THETA=0.0

DO J=1,21

WRITE (*,*) 'theta=p=', THETA, 'Pi_A=', PIA

VAR_RRT=(PIA*(1-PIA))+((THETA*(1-THETA))/(((2*THETA)-1)**2.0))

VAR_NRRT=2*((((PIA*(1-PIA)))*(1-(2*THETA)+(2*(THETA**2.0))))+(2*(1-PIA)*THETA*(1-THETA)))

WRITE (*,*) 'VAR_RRT=',VAR_RRT, 'VAR_NRRT=', VAR_NRRT

R(I,J)=VAR_RRT/VAR_NRRT

THETA=THETA+0.05

WRITE(3,100,advance='no') R(I,J);

END DO

WRITE (*,*)"

WRITE(3, *) "

PIA=PIA+0.1

END DO

100 FORMAT (F15.5,1X)

200 FORMAT (A1)

CLOSE(3)

END

Download

chapter PDF

© 2019 The Author(s). Licensee IntechOpen. This chapter is distributed under the terms of the Creative Commons Attribution 3.0 License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

How to cite and reference

Link to this chapter Copy to clipboard

Cite this chapter Copy to clipboard

Evrim Oral (February 25th 2019). Surveying Sensitive Topics with Indirect Questioning [Online First], IntechOpen, DOI: 10.5772/intechopen.84524. Available from:

chapter statistics

140total chapter downloads

More statistics for editors and authors

Login to your personal dashboard for more detailed statistics on your publications.

Access personal reporting

We are IntechOpen, the world's leading publisher of Open Access books. Built by scientists, for scientists. Our readership spans scientists, professors, researchers, librarians, and students, as well as business professionals. We share our knowledge and peer-reveiwed research papers with libraries, scientific and engineering societies, and also work with corporate R&D departments and government entities.

More about us