Research Methodology
Fifth Edition
Checkpoint: Protecting data
Visit the website: How do you reassure participants about how their data will be used?
Visit the website: What regulations and policies are in place to protect data?
Visit the website: How do you reassure participants about how their data will be used?
Visit the website: What regulations and policies are in place to protect data?