Research Methodology
Fifth Edition
Checkpoint: Protecting data

Visit the website: How do you reassure participants about how their data will be used?

Visit the website: What regulations and policies are in place to protect data?

Visit the website: How do you reassure participants about how their data will be used?

Visit the website: What regulations and policies are in place to protect data?