You are on page 1of 14

Journal of Peace Research

http://jpr.sagepub.com/

Field research in conflict environments: Methodological challenges and snowball sampling


Nissim Cohen and Tamar Arieli
Journal of Peace Research 2011 48: 423
DOI: 10.1177/0022343311405698

The online version of this article can be found at:


http://jpr.sagepub.com/content/48/4/423

Published by:

http://www.sagepublications.com

On behalf of:
Peace Research Institute Oslo

Journal of Peace Research Replication Data

Additional services and information for Journal of Peace Research can be found at:

Email Alerts: http://jpr.sagepub.com/cgi/alerts

Subscriptions: http://jpr.sagepub.com/subscriptions

Reprints: http://www.sagepub.com/journalsReprints.nav

Permissions: http://www.sagepub.com/journalsPermissions.nav

Downloaded from jpr.sagepub.com at The Open University Library on July 28, 2011
jour nal of

peace
R E S E A R C H

Journal of Peace Research


48(4) 423435
Field research in conflict environments: The Author(s) 2011
Reprints and permission:
Methodological challenges and snowball sagepub.co.uk/journalsPermissions.nav
DOI: 10.1177/0022343311405698
sampling jpr.sagepub.com

Nissim Cohen
School of Political Sciences, University of Haifa, Israel
Tamar Arieli
Conflict Management Program, Tel Hai College, Israel

Abstract
Conducting research in conflict environments is a challenge, given their complexity and common attitudes of
distrust and suspicion. Yet, conflict and methodology are usually analyzed as separate fields of interest. Methodolo-
gical aspects of field work in conflict environments have not been systematically analyzed. This article addresses the
central methodological problems of research conducted in conflict environments. We suggest the use of the snowball
sampling method (hereafter, SSM) as an answer to these challenges. The effectiveness of this method has been
recognized as significant in a variety of cases, mainly regarding marginalized populations. We claim that in conflict
environments, the entire population is marginalized to some degree, making it hidden from and hard to reach for
the outsider researcher. The marginalization explains why it is difficult to locate, access and enlist the cooperation of
the research populations, which in a non-conflict context would not have been difficult to do. SSM directly addresses
the fears and mistrust common to the conflict environment and increases the likelihood of trusting the researcher by
introduction through a trusted social network. We demonstrate how careful use of SSM as a second best but still
valuable methodology can help generate cooperation. Therefore, the evaluation of SSM, its advantages and limita-
tions in implementation in conflict environments can be an important contribution to the methodological training of
researchers. In addition to its effectiveness under conditions of conflict, SSM may, in some cases, actually make the
difference between research conducted under constrained conditions and research not conducted at all. Together
with our experiences in the field, we supply several insights and recommendations for optimizing the use of SSM
in a conflict environment.

Keywords
conflict, field research, methodology, Middle East, snowball sample

Introduction rely on and to reproduce results. On the other hand,


there are many cases in social research in which one can-
There is a broad question in the literature regarding the
not fully uphold these rigid principles of scientific
validity of research conducted under less than optimal research. Should we give up the attempts to improve our
conditions. On the one hand, scientific research should understanding of those cases due to lack of optimal
conform to common principles; it should be systematic, conditions?
reproducible, reliable, and valid. Adhering to these
principles is in essence the difference between research
writing and other texts. Thus, scientific research should Corresponding author:
be conducted in a manner which allows others to both tammyar@gmail.com

Downloaded from jpr.sagepub.com at The Open University Library on July 28, 2011
424 journal of PEACE RESEARCH 48(4)

This general question is critical especially in the Clearly, conflict is a phenomenon which deserves
context of conducting field research in conflict environ- extensive attention and research. Yet, the conflict envi-
ments. It often seems that conflict and methodology are ronment poses challenges to the researcher in many
considered and analyzed as separate fields of interest. ways. As we will review, these challenges include the dif-
Conflicts are a natural part of human interaction, so ficulties related to accessing data, its analysis and inter-
we must question how this phenomenon can affect pretation, and its presentation. These challenges affect
research outcomes and processes. Researchers want to any researcher in a conflict environment, but especially
believe that their work will contribute, whether to pure when he/she is identified with a side in the conflict.
academic knowledge or to the potential of influencing The Snowball Sampling Method (hereafter, SSM) is
policy. The focus on questions of methodology can pro- suggested in the literature as a useful method in a variety
mote these goals by facilitating the study of complex of research populations. This is a technique for finding
research environments of conflict. research subjects where one subject gives the researcher
A systematic review of the surprisingly few research the name of another, who in turn provides the name
studies devoted to questions of methodology in conflict of a third, and so on (Vogt, 2005: 300). In this method,
environments reveals that there is a real problem, the sample group grows like a rolling snowball. Most of
particularly in collecting large-N datasets (Clark, 2006; the cases in which SSM has been used are characterized
Romano, 2006). This problem is voiced in Clarks by less than optimal research conditions where other
(2006) survey, a pioneering attempt to analyze the meth- methodologies are not applicable. We suggest that SSM
odological training of political scientists in the Middle has unique advantages, utilities, and applications for
East. This survey provides a rare database of experiences research conducted in conflict environments when used
reflecting the acute need for methodological tools and with care. Indeed, the use of SSM in some research envir-
insights for researchers conducting studies in environ- onments may be the only effective method and the
ments of conflict. Similarly, Romano (2006) points to deciding factor in whether research can be conducted
the fact that research in Middle East conflict zones is at all. Yet, the link between conflict and SSM has not
usually qualitative rather than quantitative in nature. been analyzed.
He sees this as a result of the politically sensitive nature The article proceeds as follows. In the second section,
of research in these areas. Further support for the exis- we analyze the circumstances of conflict as a research
tence of this problem is in Jacobsen & Landaus environment and the problems it presents. In the third
(2003) evaluation of studies of refugees, forced migrants, and fourth sections, we present SSM as an important
and displaced people. Their examination portrays the method of convenience sampling in qualitative research
problematic lack of transparency of researchers regarding and review its advantages and limitations. In the fifth
their methodological choices and compromises. section, we discuss the contribution of SSM to research
This article, born of our experiences in case study in conflict environments. This serves us in presenting
research in conflict environments, focuses on this need. our insights and recommendations, derived from our
Each of us, separately, has experienced planning and experiences in the field. Although there are many ethical
executing research in conflict environments. These stud- issues regarding the use of SSM in conflict environments,
ies represented different disciplines in social science. this discussion will be limited to the question of SSMs
They included a geo-political evaluation of Israeli effectiveness. A summary and discussion are presented
Palestinian border enterprises following the Oslo peace in the sixth section.
process (Arieli, 2009a), a political analysis of the lack
of involvement of Palestinian and Jordanian business
communities in promoting the peace process with Israel
Conflict environments and implications
(Cohen, 2008; Cohen & Ben-Porat, 2008), and a for research
geo-political analysis of the IsraelJordan border and of the Conflict environments
developing cross-border cooperation since the Israel A conflict environment is one in which people, whether
Jordan peace treaty (Arieli, 2009b). Although our work individuals or groups, perceive their needs, goals or inter-
stems from different disciplines, we encountered many ests to be contradicted by the goals or interests of the
shared aspects and challenges in our field work in environ- other side (Kriesberg, 1998). Group conflict usually con-
ments where conflict was a dominant feature. Our mutual cerns contradictory, concrete goals in the areas of terri-
discussions and study of the theoretical and practical issues tory, resources, trade, self-determination, religious
of methodology became the foundation for this article. rights, cultural values, and so on (Bar-Tal, 2000). Such

Downloaded from jpr.sagepub.com at The Open University Library on July 28, 2011
Cohen & Arieli 425

conflict is often accompanied by significant levels of environment, which may be closed to and mistrusting
misunderstanding, considerably exaggerating the per- of outsiders. This challenge may be especially significant
ceived disagreement and creating a general atmosphere for studies which focus on the conflict itself and in some
of distrust and suspicion. cases even for those not directly related to it. For exam-
A society experiencing conflict is affected as a whole. ple, the study of the relationships between Catholic and
Conflict has an impact on the circumstances of life for Protestant business communities in North Ireland
groups and individuals with direct interests and involve- requires an understanding of the intricacies of the con-
ment therein, but it also has significance for those see- flict and its reflection in society (Ben-Porat, 2006).
mingly without. Thus, in an environment affected by The above discussion also has direct implications for
conflict, all parts of society, including normative sectors, the issue of trust. Intergroup conflict is usually highly
can be highly suspicious of outsiders and express a prefer- emotionally and cognitively engaging for the societies
ence to refrain from exposure. This is opposed to the recog- involved (Rouhana & Bar-Tal, 1998). Even after the res-
nized phenomenon where, in a non-conflict environment, olution of conflict, intergroup relations can be cold and
usually only specific populations have distinct tendencies unstable due to a basic lack of societal trust, making the
to refrain from exposure to outsiders and are difficult to prospect of conducting research a daunting one. In a
access for research purposes (as will be outlined). conflict environment, societies tend to become internally
This atmosphere of distrust could be further united and self-protective (Bar-Tal, 2000). As a result,
aggravated in places and times where freedom is lacking. high levels of societal suspicion and distrust may be
The lack of political freedom could be the result of a directed towards the researcher as an outsider.
perception of national emergency related to conflict An environment of conflict is not necessarily one of
(e.g. McCarthyism) or of the nature of the local regime. actual war. Rather, it implies a wider range of adverse
This lack of political freedom, for example in authoritar- social situations. Galtung (1969) differentiates between
ian regimes, increases the difficulty for researchers to negative and positive peace. While negative peace is
engage people to expose their personal circumstances and simply the absence of war, positive peace means that
views. In this vein, Harik (1987: 6667) claims that the the structures of domination underlying war are elim-
most important explanation for the paucity of political inated from the societal condition. This differentiation
attitude surveys in the Arab world is that the political correlates to some degree to the concepts of cold and
climate for this type of research does not exist. Tessler warm peace. A cold peace is the stabilization of nor-
& Jamal (2006) see the study of the attitudes, values, and malized relations, while a warm peace points to the
behavior patterns of ordinary citizens as the missing existence of highly developed transnational ties (Press-
dimension of political science research dealing with the Barnathan, 2006). Under conditions of a cold peace,
Arab world, due to the political climate in many of those despite the initial resolution of the primary disputed
countries. issues, there is the actual possibility of a return to con-
A threatening political atmosphere could increase the flict (Miller, 2005). Situations of negative and cold
tendency and need of specific, marginalized populations peace have detrimental implications for the prospect
to operate underground, far from the public eye. It of conducting field research.
could also detract from the freedom, openness, and
accessibility of society as a whole. We therefore suggest Main challenges of field work in conflict environments
that the above-mentioned dimension of the ordinary Social research in an environment of conflict involves
citizen is underrepresented in the study of conflict in several methodological challenges. These are projected
general. This paucity of research is due to conflict- onto the researchers tasks of identifying research popu-
related sensitivities, a national focus on internal security, lations, mapping subjective perceptions on conflict,
and the possibility of political repression. These contrib- gaining familiarity with the needs, interests and concerns
ute to an atmosphere of political and societal suspicion, of the human research population, and assessing the
fear, and general distrust which serves to deter both quality of information received. While the interpretation
researchers from field work in conflict environments of data and ethical challenges of research in conflict
and research populations from cooperating in research environments have been discussed, political scientists
studies, as will be shown. have reflected less on the strategies they use to collect
The researcher, whether a party to the conflict or data in conflict settings (Fujii, 2010).
not, faces the challenge of gaining familiarity with and The main difficulties in recruiting interviewees in
cooperation from the research population in this conflict environments are lack of contact information

Downloaded from jpr.sagepub.com at The Open University Library on July 28, 2011
426 journal of PEACE RESEARCH 48(4)

(e.g. whom to interview), a lack of system information most acute political upheavals are least studied through
(e.g. organizational ignorance), cultural differences (e.g. in-depth field research.
language barriers), legal, political, and ideological con- Finally, the survey confirms the dearth of academic
straints (e.g. contact with foreigners), technical accessi- training for conducting field work and highlights areas
bility (e.g. mobility limitations), and, most important, to which greater attention must be paid. It indicates an
an atmosphere of fear and distrust. According to Clark acute need to better prepare researchers for the challenges
(2006), these and other technical and ethical concerns that regularly arise in research under conditions of
are the reason why countries experiencing the most acute conflict.
political upheavals are least studied in terms of in-depth Romano (2006), too, points to the Middle East as a
field research. problematic environment for research, due to the
A survey conducted in the years 20042005 exam- violence, mostly political in nature, in this region.
ined the field work training of 55 researchers in political Although his article does not focus solely on issues of
science, specifically regarding their research experiences methodology, he does include several methodological
in Middle East countries (Clark, 2006). Although this notes such as the recommendation that researchers
survey focuses on the Middle East, its implications are decide in advance what methods they will use to gather
much broader. Clarks interest in the Middle East was information.
due to the unique conditions of the authoritarian and The challenges outlined above are not limited to the
semi-authoritarian political climates there. These politi- Middle East. Focusing on the South African experience,
cal climates create or enhance conditions of fear and lack Jacobsen & Landau (2003: 186187) question the valid-
of trust and therefore pose a challenge to field research. ity of many research studies of refugees and forced migra-
Yet these conditions are exactly the obstacles which tion, owing to questionable uses of methodology. They
researchers face in many conflict environments. There- identify some key methodological problems, such as
fore, the analysis of the data from the survey provides denied access, lack of response due to mistrust, unfami-
valuable insights for the general study of conflict and for liar contexts, security and confidentiality issues, non-
the analysis of the prospects of conducting qualitative representativity, and bias. Their central claim is that
research in many conflict environments. The survey despite logistical and other challenges, there is no justifi-
points to three main findings regarding the researchers cation for ad hoc research design, obfuscation or exagger-
work in these environments (Clark, 2006). ated research claims. These concerns emphasize the need
The first is the centrality of the challenge related to for a methodological tool which is both academically
the authoritarian political conditions prevalent in the rigorous and adaptable to challenging field conditions.
region. This is reflected in political repression, a sense Jacobsen & Landau go on to honestly admit their
of continuous presence of internal security forces, and failure to stick to strictly defined sampling and interview
various political sensitivities. Another significant con- strategy, despite their extensive preparations to ensure
tributing factor is the anti-Western (usually in the form randomness and representativity. The main problem
of anti-USA) sentiment in many of these countries which repeated itself was the lack of response due to a
(Clark, 2006: 418). Together, these conditions were basic lack of trust toward the local researchers by the
cited by respondents as the main causes of difficulties potential interviewees.
in locating and engaging cooperation of interviewees. As we will demonstrate, careful use of SSM, as a sec-
The second finding is how the political climate affects ond best but still valuable methodology, can help the
researchers choices of countries for study, their interview researcher overcome many of these challenges. There-
techniques, and the ethical dilemmas they encounter. fore, the evaluation of SSM, with its advantages and
Contrary to the intuitive assumption that cultural differ- limitations in implementation in conflict environments,
ences are the main obstacle to conducting field research can be an important contribution to the methodological
in a foreign land, it is the conditions of authoritarianism, training of researchers.
not unique to the Middle East, which had the greatest
impact upon field research. Thus, 47% of the researchers
reported that they chose, avoided, or abandoned coun- Snowball sampling methodology
tries of research based on feasibility issues related to the SSM, or chain-referral sampling, is a distinct method of
political climate (Clark, 2006). This problematic reality convenience sampling which has been proven to be espe-
has dramatic implications and significance for the study cially useful in conducting research in marginalized soci-
of conflict. It explains why countries experiencing the eties. This method is commonly used to locate, access,

Downloaded from jpr.sagepub.com at The Open University Library on July 28, 2011
Cohen & Arieli 427

and involve people from specific populations in cases A systematic review of the literature reveals that SSM has
where the researcher anticipates difficulties in creating been used to investigate a wide variety of specific popula-
a representative sample of the research population. It has tions. As early as the late 1930s, Whyte (1955) employed
been suggested that SSM is probably the most effective this method in his classic study of street-corner society.
method to access hidden and/or hard to reach popula- The method has been used in the study of gangs (Patrick,
tions (Valdez & Kaplan, 1999). Nevertheless, for reasons 1973), drug users (Fitzgerald & Hamilton, 1997), HIV/
which will be outlined below, SSM is usually not, and AIDS sufferers (Tabnak & Sun, 2000), prostitution
should not be, the first choice of research methodology (McNamara, 1994), criminals (Fitzgerald, 1996), slums
when a more representative sampling method is possible. (Aggarwal, Pandey & Bhattacharya, 2007), and the seri-
Berg (1988) claims that regarding SSM, a bond or ously ill (Sudman & Freeman, 1988). Indeed, the literature
link exists between the initial sample and others in the regarding the use of SSM in research is rich and varied.
same target population. This bond allows the researcher Nevertheless, none of these studies is oriented towards the
to access additional respondents by way of referral study of conflict. As we will show, SSM has significant
within the circle of acquaintance of the research advantages for the prospect of conducting research in
sample. In this vein, Spreen (1992) shows that SSM conflict environments.
belongs to the wider set of link-tracing methodologies. Atkinson & Flint (2001) distinguish between the
These methodologies use the social networks of inter- formal and informal role of SSM as a research method.
viewees to expand the researchers potential contacts SSM as an informal means of reaching a target popula-
(Thomson, 1997). tion, by creating contacts with a respondents circle of
SSM is used in both qualitative and quantitative acquaintances, can be especially useful if the aim of the
research. In the former, SSM is used primarily to access study is explorative, qualitative or descriptive. In explora-
potential interviewees. In the latter, the method is used tive research, for example, SSM is an excellent tool to
to find participants for surveys. However, it is reasonable gain initial knowledge of the research population, thus
to assume that the use of SSM in quantitative research allowing the researcher to avoid surprises and overcome
will be less common, owing to the need for large pop- difficulties in later stages of research. In this vein, SSM
ulations. When studying hidden or hard to reach popula- could prove to be helpful in both technical and substan-
tions, the research sample is usually small and, therefore, tial aspects of field research, such as in mapping research
the option of conducting a survey will be limited. populations, testing preliminary research assumptions
SSM has been used in various research contexts and is and hypotheses, or validating research tools.
invaluable when seeking interviewees from populations SSM can also be used in quantitative methodology as
with specific characteristics which are recognized only a method of sampling in a more formalized and statistical
by the populations individuals. The literature especially sense when random sampling (e.g. random household
emphasizes the use of SSM when studying hidden or surveys) is not possible. In these cases, SSM can be com-
otherwise inaccessible research populations. Hidden plemented by additional statistical techniques. SSM can
populations intentionally or inadvertently shield them- and should also be used in accessing and interviewing
selves from public awareness and have little social visibi- control groups to further bolster the validity of the
lity (Watters & Biernacki, 1989). The membership of research findings.
these populations is often not easily distinguishable, SSM can serve as either an alternative or a comple-
complicating the prospect of sampling for research pur- mentary research strategy. It can serve as an alternative
poses (Morgan, 1996; Valdez & Kaplan, 1999). Popula- strategy, when other usually preferred methodologies are
tions may hide for various reasons, including religious, not feasible because of challenging circumstances in the
cultural or social affiliation (e.g. members of extreme research environment. It can also serve as a complemen-
religious groups), economic and/or political preferences tary strategy to be used with other research methods to
or activities (e.g. individuals of elite status), or legal or increase research efficiency and quality and reduce the
social institutional norms (e.g. kleptomaniacs). chance of sampling bias. Thus, SSM can be complemen-
There are also populations which are not hidden but ted by additional sample methodologies, such as quota
are hard to reach for research purposes. The reasons for sampling. In quota sampling, there is an initial stage of
their relative inaccessibility are varied and may include preparation in which the research population is analyzed
social or political status (e.g. high governmental figures), and subgroups are identified and quantified in advance
technical or bureaucratic obstacles (e.g. released prison- according to their relative size. After this initial prepara-
ers), or closed social groups (e.g. gangs). tion, the researcher can try to establish contact,

Downloaded from jpr.sagepub.com at The Open University Library on July 28, 2011
428 journal of PEACE RESEARCH 48(4)

familiarity, and trust with members of each subgroup in cooperation in an environment of uncertainty and risk,
order to initiate the beginning of a snowball sample. common to populations who fear exposure. The knowl-
These contacts can eventually serve as the first link in a edge that the researcher was referred by a trusted person
network of contacts to be developed within each sub- increases the potential for trust and cooperation in pro-
group. This combination proves to be better in generat- viding data. Notwithstanding these significant advan-
ing responsiveness of interviewees than the common tages, SSM has also some distinct limitations.
practice of sending researchers, unknown and untrusted,
to seek interviews with research subjects. Thus, Cohen Limitations
(2008) combined SSM with quota sampling in the effort In essence, representativity is the central limitation of
to sample a wide variety of business people from Jordan SSM. Convenience sampling, by definition, is usually
and the Palestinian Authority. He eventually established not random or representative, so it often results in selec-
several networks of contacts developed through snowball tion bias and external and internal validity limitations
sampling, each characterized by a specific business (Valdez & Kaplan, 1999; Moore & Hagedorn, 2001).
activity or region. That is the main reason why SSM will usually serve as
The evaluation of SSM, with its advantages and a second best methodology. In SSM, the research
limitations in implementation in conflict environments, subjects are not collected randomly, as expected by pure
is an important contribution to the methodological sampling principles. Rather, they are dependent on the
training of researchers. referrals of the respondents first accessed and on the will-
ingness of the research subjects to participate hence the
common claim that most snowball samples are biased
Snowball sampling methodology: and cannot be generalized (Kaplan, Korf & Sterk,
Advantages and limitations 1987; Griffiths et al., 1993). We claim that despite this
Advantages significant limitation, it is possible to increase the
SSM can play a key role in three critical stages of data representativity of SSM by sufficient planning of the
collection: locating, accessing, and involving hidden and sampling process and goals, initiating parallel snowball
hard to reach populations. networks and using quota sampling (as described above).
A problematic aspect of relying on referrals is the like-
Locating. Through the use of social networks, the lihood of excluding individuals who do not belong to the
researcher is introduced to sectors of societies which specific network being accessed (Van Meter, 1990).
would otherwise be difficult to identify. In addition to Therefore, those with wider social networks are more
its effectiveness, SSM is also efficient, helping the likely to be identified and accessed than others, creating
researcher locate the appropriate population with a min- a degree of selection bias. Thus, by relying on referrals,
imum of time, money, and effort. many potential interviewees are masked (Heckathorn,
1997) as they are not exposed or referred to the researcher,
Accessing and involving. Accessing, involving, and either because of gatekeeper bias or because of social
gaining the subjects cooperation in the data collection network limitations. Relying on links of specific chain
processes of research remain significant challenges even referrals would probably result in enlisting respondents
after the initial location of potential research subjects. of relatively homogeneous affiliation who do not necessa-
Here, SSM allows the researcher to use past ties and rily represent the entire research population, thereby
communication with prior research subjects in order to reducing the validity and reliability of the research
gain access to and cooperation from potential new sub- conclusions.
jects. This is especially significant in establishing contact Problems of representativity can also arise from gate-
with relatively closed populations such as societal elites, keeper bias. Gatekeepers, in this context are go-
gangs, and extremist groups. betweens: those who are in the position to facilitate
A central factor in gaining access to and enlisting the contact between the researcher and potential respon-
cooperation of subjects is trust. Defining trust as the dents. These gatekeepers may have their own reasons,
belief of an individual in the good faith of others and personal or otherwise, for referring or not referring the
their future intentions (Hosmer, 1995), the belief that researcher to specific potential respondents (Groger,
the researcher is acting in good faith is fundamental to Mayberry & Straker, 1999).
the establishment of a working relationship with the Another aspect related to representativity is the will-
research subject. Trust can enhance and facilitate ingness of subjects to participate in the study. Although

Downloaded from jpr.sagepub.com at The Open University Library on July 28, 2011
Cohen & Arieli 429

willingness to participate in research is an acute problem Given the success of SSM in accessing such groups,
in random sampling, it is exacerbated in SSM. SSM is we maintain that SSM can be useful in conducting stud-
fundamentally used as a method to develop contacts ies in conflict environments. SSM can address conditions
within specific populations who often prefer to remain of minimal trust arising from uncertainty about the
hidden. This desire to maintain a low profile increases future and allow the researcher to penetrate the research
the likelihood of unwillingness to cooperate in research population preoccupied with conflict at both cognitive
efforts. Thus, snowball samples may be more biased and emotional levels and enlist its cooperation.
toward the more cooperative participants who are willing SSMs ability to accomplish the above goals comes
to participate in the study (Peterson & Valdez, 2005). from its very definition as a trace-linking methodology,
The result of these limitations is a possible reduction which uses the social networks of interviewees in order
in the external validity of the research. In addition, by to expand the researchers potential contacts. Thus, the
overemphasizing social network cohesiveness (Griffiths researcher, initially an outsider to the research popula-
et al., 1993), we may also reduce the researchs internal tion, can begin the study with a very small pool of
validity. These problematic aspects of internal and exter- contacts, even as small as a single individual. Despite the
nal validity are illustrated explicitly in a study entitled tendency of groups in conflict environments to be
What we didnt learn because of who would not talk united, protective, and thus relatively closed to outsiders,
to us (Groger, Mayberry & Straker, 1999). as a trusted contact of a familiar person, the researcher is
Atkinson & Flint (2001) claim that the problem of introduced to new contacts as an insider, to be some-
selection bias may be partially addressed by the genera- what trusted. New contacts, in turn, provide the names
tion of a large sample and by the replication of results of additional contacts, and in this fashion the researcher
to strengthen generalizations. This solution, however, has access to social circles otherwise relatively closed or
ignores the fact that sampling mistakes may be repeated impenetrable. Putnam (1993, 1995, 2000) points to this
even in large populations, if the sampling population rationale when describing trust as an integral part of
remains the same. Notwithstanding these limitations, social capital and social networks.
Peterson & Valdez (2005) generated a randomized Thus, the mechanism through which SSM addresses
community-based sample in their study of Mexican- both marginalized populations and conflict societies is
American adolescent females involved with gangs. They trust, which is the common obstacle to conducting
demonstrated that SSM, when used with sound proce- research in these groups. In both cases, SSM allows some
dures and commitment, can produce valid research degree of access to reticent, suspicious populations who
results. fear exposure. Trust, fundamental to the working rela-
tionship between the researcher and the research popula-
tion, is based on the belief in the good faith of the
SSM and the circumstances of conflict as a researcher and his/her future intentions and is estab-
research environment lished through the social network through which the
While the contribution of SSM has been emphasized in researcher is introduced. Any definition of trust involves
studying marginalized populations as reviewed above, a social relationship in which one person makes himself
the literature has not yet fully appreciated the potential vulnerable to another who can do him harm if the trust is
contribution of SSM when engaging in research under misplaced (Levi, 2001). In this vein, Williams points out
conditions of conflict. There are substantial differences the link between cooperation and dependency. In his
in the circumstances of societies experiencing various words, if there are to be continuing practices of cooper-
stages of conflict and those of marginalized populations, ation, then people must be motivated, one way or
just as there are significant differences within the see- another, to enter into dependent positions (Williams,
mingly endless variety of marginalized populations 1988: 116). This dependency is a factor of trust.
(which could include elite groups, people involved in By penetrating social networks through SSM, research-
illegal activities, people with specific sexual tendencies, ers have been able to overcome the problem of lack of
people with diseases, and others as outlined above). Yet, response rooted in mistrust. This is demonstrated in
when it comes to conducting research, conflict environ- Jacobsen & Landaus (2003: 199) study of refugees. In
ments and marginalized populations share many simila- light of the lack of response they faced using other
rities. In fact, we suggest that in conditions of conflict, methods, they replaced their initial research method
the entire population is marginalized to some degree, with SSM and succeeded in interviewing 750 research sub-
making it hard to reach for the outside researcher. jects, in an otherwise impenetrable research environment.

Downloaded from jpr.sagepub.com at The Open University Library on July 28, 2011
430 journal of PEACE RESEARCH 48(4)

Romano (2006), too, describes his success, during his These three different case studies strengthen our claim
research study in Iraq, in expanding the network of his that under conditions of conflict or post conflict, the
contacts and interviewees by using SSM and being intro- entire population can be considered hidden, hard to
duced to officials he did not know existed. Only through reach, and marginalized to some degree. The marginali-
the use of SSM did he gain access to high-level meetings zation explains why it was difficult to locate, access, and
and important conferences he did not originally know enlist the cooperation of the research populations, which
were being held. Similarly, Tessler & Jamal (2006) state in a non-conflict context would not have been difficult
that without SSM networks, many civic associations to do. Such populations included people from normative
would have been largely inaccessible to them in their field sectors of society, business people, scientists, tour opera-
research. Thus, SSM has proven to be effective where tors, and junior local government officials. This phe-
other methods may fail in addressing distrust. Yet, these nomenon of societal marginalization appeared to be
research studies do not systematically analyze the mech- based mainly on factors of ideology, religion, and/or fear
anisms through which SSM succeeds in penetrating related to the conflict.
otherwise closed researched populations and the signifi- It is significant to note that our challenges in the
cance of the contribution of SSM. field were especially unique since we were not perceived
In the next section, we will use our experience from as external researchers, neutral to the conflict. Rather,
the field to analyze the value of SSM in conflict we were careful to identify ourselves as Israeli-Jewish
environments. researchers and thus were exposed to perceptions
regarding the conflict itself. This of course amplified the
Insights from the field: The value of SSM need for a basis of trust in accessing the Palestinian and
in the context of the IsraelArab conflict Jordanian research population and enlisting its
The IsraelArab conflict as a regional conflict has impli- cooperation.
cations for almost all aspects of Israeli and Arab societal Enlisting cooperation to recruit interviewees in con-
life. It has gone through periods of varying degrees of flict environments, as noted above, involves overcoming
violence and experienced highs and lows in terms of many difficulties such as social and organizational famil-
negotiations and anticipation of its resolution. As iarity, technical issues, and cultural and linguistic bar-
Jewish-Israeli researchers, we have had first-hand experi- riers. In addition, ideology and religion are dominant
ence with the difficulties of identifying, accessing, and factors in both the decision to participate in a research
enlisting the cooperation of specific research populations study and to supply the names of others relevant to the
in Jordan and in the Palestinian Authority, for the pur- research. In conflict, even SSM can prove to be a limited
pose of conducting interviews. Arieli (2009a) analyzed method in enlisting research participants. Often the
IsraeliPalestinian economic enterprises during the years main reason for societal marginalization appears to be a
19982000 and distinguished among three types of fear of identification and exposure. This fear can be of
initiatives focused on the border region: roadside the government, of pressure groups, or of the public.
markets, industrial parks, and the casino in Jericho. Thus, in specific types of regimes and political cultures
Using SSM, she was able to gain access to the operators where political participation is not always encouraged,
and clientele of these enterprises. Cohen & Ben-Porat the entire society often avoids making public declarations
(2008) explained the relative lack of involvement of about its views and activities. This fear became evident in
Jordanian and Palestinian business communities in the the repeated requests of interviewees to remain anon-
Middle East peace processes. Using SSM, they estab- ymous. Many others refused to participate at all. The
lished contact with a variety of Jordanian and Palestinian presence of this phenomenon is supported by the Direc-
business people and obtained their agreement to partic- tor of Research at the Jordan Center for Public Policy
ipate in interviews. The third case study mapped and Research and Dialogue in Amman. He remarked on the
analyzed the developing IsraelJordan cross-border methodological difficulty of interviewing Jordanians on
trends since the peace treaty of 1994. Using SSM, Arieli issues of economic public policy and governance:
(2009b) interviewed the main active components of
cross-border cooperation as the research population. Non-Jordanians and/or people based outside the Arab
These case studies, each with its own research questions world often do not appreciate the fear that most in the
and populations, have the IsraelArab conflict as a shared country have of government and their consequent reluc-
tance to speak out publicly on topics such as that dealt
dominant feature, a feature that hindered the effort to
with by this paper. (Kardoosh & Burgis, 2006: 3)
enlist the cooperation of the target populations.

Downloaded from jpr.sagepub.com at The Open University Library on July 28, 2011
Cohen & Arieli 431

Another source of fear can be the researcher him/herself. interviews conducted. During periods of crisis in
As an outsider, he or she can sometimes be threatening political relations or violence, there was a marked decline
to individuals from the research population. As our in the willingness of Palestinians and Jordanians to par-
experience has shown, there was a pronounced reluc- ticipate in our studies and an increased reliance on SSM
tance towards participation in research studies and resis- to locate, access, and enlist cooperation. Our recommen-
tance to sharing views. Thus, in the initial stages of dations aim at increasing the effectiveness of the method
many contacts, even those established via SSM, we were and minimizing the possibility of selection bias. The sug-
often asked if we were from the media. Only after pro- gestions focus on creating and seizing opportunities for
viding assurance that we were from academia did the interacting with the research population, the representa-
interview proceed and additional contacts were pro- tion and conduct of the researcher, and ways to reduce
vided. It is interesting to note that when relationships selection bias.
developed with various individuals from the research Flexibility, creativity, and daring proved to be invalu-
population, some admitted to initially suspecting that able throughout the process of SSM. These traits were
we were from the Israeli, Jordanian or Palestinian critical in creating and seizing opportunities to interact
Mukhabarat (secret services). with the research population and in enlisting participants
SSM directly addresses these fears and increases the for research. Owing to sensitivities of the circumstances
likelihood of trusting the researcher by introduction of conflict, we had no option of publicly calling for
through a trusted social network. This was manifested respondents through the use of conventional methods
in our experience every time we approached a new social such as media advertising or university channels. There-
network related to a specific sector or geographic area. It fore, we had to be creative and tried to engineer encoun-
proved to be almost impossible to approach individuals ters with the research population in untraditional and
from the research population through use of methods sometimes difficult locations and situations.
other than SSM. Thus, initial attempts to approach The process of enlisting participants requires that the
potential interviewees without a personal referral were researcher leave his/her comfort zone and approach the
largely unsuccessful. People ignored our emails, slammed environment of the research population. This effort
down the phone when we identified ourselves as enlarges the pool of potential respondents and increases
researchers, or simply refused to cooperate. levels of trust. In an environment of conflict, this could
However, SSM does not totally eliminate hesitations even require a willingness to take a degree of calculated
about cooperation with the researcher, who is an unfami- risk. Thus, our research studies would not have been
liar person. Also, notwithstanding the value of SSM in possible without meetings and interviews conducted at
minimizing fear and allowing the development of trust border crossings, army checkpoints, and various sites
between the researcher and research population, there such as markets and factories inside the Palestinian terri-
is no guarantee that this method will always provide valid tories during periods of significant instability.
and reliable data. Careful monitoring of data is crucial to In this vein, professional gatherings such as con-
social research methods. Yet, our experience has shown gresses, symposia, and conventions for scientists, busi-
that there is no real alternative to SSM in conducting ness people, tour operators, and other groups proved
research in an environment of conflict. In the next sec- to be very productive environments for the effective use
tion, we will provide recommendations and suggestions of SSM. These meetings facilitate and accelerate the pro-
for maximum effectiveness and minimum selection bias cesses of SSM because they offer the opportunity to
in the use of SSM under conditions of conflict. approach a concentrated pool of specific research popu-
lations. Participation in a conference allows face-to-face
Insights from the field: Recommendations regarding interaction and leads to immediate referrals within a lim-
the use of SSM in a conflict environment ited section of the research population in a short period
We derived several recommendations from our research of time. Thus, the researcher, an outsider not usually
experience for optimizing the use of SSM in a conflict affiliated with the conferences field of interest, must
environment. As emphasized, this discussion will be utilize a degree of flexibility, creativity, and daring to
limited to the question of SSMs effectiveness, putting locate and access events such as these and to enlist the
aside ethical aspects of this method for future discus- cooperation of their participants.
sions. The conflict dynamics during the various stages The effectiveness of SSM is also dependent on the
of our research studies were central factors influencing conduct of the researcher. Thus, the following sugges-
the number, the location, and the atmosphere of the tions can increase communication and trust between the

Downloaded from jpr.sagepub.com at The Open University Library on July 28, 2011
432 journal of PEACE RESEARCH 48(4)

researcher and the research population, and even increase The researcher should also demonstrate maximum
the likelihood of cooperation in future studies. While sensitivity towards the respondents. Our experiences of
these suggestions apply to all social research studies, they conducting research in conflict environments demon-
are especially relevant in the context of conflict due to strate that participation in research studies, especially
the centrality of trust. Trust is central to the method those dealing with sensitive issues such as public policy
of SSM. Our experience has shown that integrity, or politics, could lead to significant consequences endan-
transparency, continuity and sensitivity are the factors gering the respondents, their family members or their
which increase trust between the research population interests. In this context, black lists prove to be signif-
and the researcher. icant in deterring Jordanian business people, academics,
Lack of integrity erodes trust and significantly reduces lawyers, and journalists from cooperating with Israelis.
the likelihood of cooperation. It is therefore critical that People on these lists are publicly denounced and even
the researcher be truthful during all interactions with the boycotted for their involvement with Israeli interests
research population. Transparency also increases trust. (Cohen, 2008; Arieli, 2009b). Hence, the respondents
Whenever possible, the researcher should supply the should feel confident that the researcher appreciates their
research population with information regarding the need for privacy and confidentiality regarding their
research organizers, goals, processes, and results. We involvement and any information they supply. Guaran-
noticed that volunteering this information increased the teeing the anonymity of the respondent, as well as that
trust and involvement of our research populations in of his/her referrals, has proven to be central to enlisting
research studies. Sharing our knowledge and demonstrat- cooperation in research.
ing our familiarity and expertise reduced suspicions It is interesting to note that this sensitivity and even
about our identity, affiliation, and intentions. For exam- fear regarding exposure of cooperative ventures between
ple, the IsraelPalestinian and IsraelJordanian peace Jordanians, Palestinians, and Israelis were not limited to
processes were the focus of our research studies. These the Arab participants who could have been in actual
were understandably controversial issues to many mem- danger in case of exposure. Israeli partners, too, were
bers of our research populations in Jordan and the careful in revealing details regarding these cooperative
Palestinian Authority. Despite the sensitivity of these ventures. This sensitivity reflected both their interest in
cross-border studies, we found it was always advisable ensuring the continuity of cross-border cooperation and
to begin our contact by presenting our Israeli national- also real concern for the protection of their Arab part-
ity and organizational affiliation, our research subject, ners. This diffusion of concern regarding exposure
and our goals. In cases in which we presented this extended even to third-party international and local
information belatedly, or in response to a question, organizations. Thus, when we approached various
we noticed a dramatic decline in many respondents NGOs involved in promoting peace, they were usually
willingness to cooperate and to refer other potential unwilling to supply specific details regarding activities
respondents. and participants.
Based on our experience, we also recommend that the It is critical that the interaction with the researcher is
researcher continuously maintains a high level of visibi- not an unpleasant experience involving any disrespect for
lity with the target population. The continuity of our the respondent. Therefore, researchers should behave
relationship with the research population was essential according to the social, religious, and cultural norms of
to the development of familiarity and increasing trust, the target population and adopt an empathetic approach
which, in turn, positively affected the respondents sense towards the respondent and his/her milieu. Conservative
of obligation and cooperation. Furthermore, familiarity and modest dressing, especially in encounters between
proved to be central to the likelihood of the development men and women, is advisable when conducting research
of chain referrals to additional members of the research in traditional societies.
population. For example, we noticed that repeated Finally, the researcher must increase his or her aware-
encounters with individuals of the research population ness of the leading limitation of SSM, namely, lack of
increased familiarity and facilitated their willingness to representativity. Awareness of the effect of phenomena
cooperate and refer further respondents. Furthermore, such as community gatekeepers can minimize negative
unplanned encounters with respondents in different effects on the sampling process. To overcome problems
venues (e.g. businesses, conferences, and government with external validity arising from the fact that SSM
offices) contributed to establishing our position as often draws from a set pool of respondents within spe-
known and trustworthy researchers. cific social networks, we recommend that the researcher

Downloaded from jpr.sagepub.com at The Open University Library on July 28, 2011
Cohen & Arieli 433

combine SSM with other methods such as quota cases but not yet recognized in the context of conflict.
sampling techniques. In this manner, the researcher We discuss the centrality of SSM as an important
would map specific target populations and use SSM to method of convenience sampling in research and present
create parallel networks of respondents to ensure repre- and analyze the advantages and limitations of this
sentation of participants from different areas and method in the stages of locating, accessing, and involving
subgroups. hidden and hard to reach populations. We go on to
demonstrate how SSM can help the researcher overcome
many of the above-mentioned challenges. These discus-
Summary and discussion sions of SSM and of conflict environments, together
This article deals with the challenge of conducting with our experiences in the field, provide the basis for
research in an environment of conflict by suggesting the generating several insights and recommendations.
use of SSM. There is an acute problem in conducting Our insights and recommendations aim to optimize
research in conflict environments and an obvious need the use of SSM in conflict environments, increasing its
for increased awareness and discussion of the many effectiveness and representativity. Flexibility, creativity,
methodological difficulties and challenges which and daring in creating and seizing opportunities to inter-
researchers face. This problem is reflected in both the act with the research population and in enlisting partici-
literature and in our research experiences. pants for research are needed. In addition, the researcher
We claim that researchers should not hesitate to should present and conduct him/herself with integrity,
describe the difficulties they face and the choices and transparency, and sensitivity vis-a`-vis the research
compromises they must sometimes make in adapting population. Such conduct can facilitate the process of
their research strategies to the complex political, social, chain referrals needed for SSM by overcoming the basic
and security realities of conflict environments. This dis- lack of trust common to the conflict environment. The
cussion will increase the transparency and the validity of mechanism of trust is the fundamental element upon
research findings and contribute to developing app- which SSM rests, because it is ultimately a practice of
ropriate research methodologies for conflict environ- cooperation between the researcher and the research
ments and to the policymaking process. population.
While the value of SSM in social research has been A central issue remaining for future research and
recognized specifically in connection with the study of discussion is the question of data interpretation. This
the lifestyles of marginalized populations and in comple- article focuses on the challenges of enlisting cooperation
menting other research methods, the literature has not of research populations. We emphasize that the use of
yet appreciated and analyzed the potential contribution SSM could cause selection bias and recommend ways
of SSM to studies conducted under conditions of con- to minimize this challenge. Yet, this is only one aspect
flict. We suggest that careful use of SSM has unique of the big question how should data collected in a con-
advantages for research conducted in conflict environ- flict environment be interpreted? SSM is indeed invalu-
ments, primarily because it can help researchers locate, able in approaching and enlisting cooperation, but there
access, and enlist the cooperation of potential subjects. is a difference between the challenge of engaging the
We claim that under conditions of conflict, the entire research population and the evaluation of the data gener-
population is marginalized to some degree, making it ated. To what degree does the use of SSM in creating
hidden and hard to reach for the outsider researcher. trusted networks of referrals affect the reliability of the
This marginalization complicates the task of locating and responses generated through this method? These ques-
enlisting the cooperation of research populations who, in tions remain the basis for future research and discussion.
a non-conflict context, would not be considered hidden This article opened with a broad question about con-
or hard to reach. ducting research in less than optimal conditions such as
We begin by presenting the problem of research in conflict environments. While fieldwork is an essential
conflict environments, examining the various challenges component of research, the complexity of the conflict
of recruiting interviewees lack of contact information, environment may deter researchers from approaching
lack of system information, cultural differences, legal, and studying various social questions from a street level
political and ideological restraints, technical accessibility, perspective. SSM is an especially useful method for such
and most important, the atmosphere of fear and distrust. fieldwork and may make the difference between research
In addressing this problem, we suggest a method com- conducted under constrained circumstances and research
monly used successfully in a variety of social research not conducted at all.

Downloaded from jpr.sagepub.com at The Open University Library on July 28, 2011
434 journal of PEACE RESEARCH 48(4)

Acknowledgements Galtung, Johan (1969) Violence, peace and peace


We would like to thank Guy Ben Porat, Niv Gordon, research. Journal of Peace Research 6(3): 167191.
and Dan Miodownik for their remarks and advice for Griffiths, Paul; Michael Gossop, Beverly Powis & John
the English version of this article. The responsibility for Strang (1993) Reaching hidden populations of drug
the content lies with the authors alone. users by privileged access interviewers: Methodologi-
cal and practical issues. Addiction 88(1): 16171626.
Groger, Lisa; Pamela S Mayberry & Jane K Straker
References (1999) What we didnt learn because of who would
Aggarwal, Abha; Arvind Pandey & BN Bhattacharya not talk to us. Qualitative Health Research 9(6):
(2007) Risk factors for maternal mortality in Delhi 829835.
slums: A community-based case-control study. Indian Harik, Iliya (1987) Some political and cultural consid-
Journal of Medical Sciences 61(9): 517526. erations bearing on survey research in the Arab world.
Arieli, Tamar (2009a) IsraeliPalestinian border enter- In: Mark Tessler et al. (eds) The Evaluation and
prises revisited. Journal of Borderlands Studies 24(1): Application of Survey Research in the Arab World.
111. Boulder, CO: Westview.
Arieli, Tamar (2009b) Bordering on conflict: An evalua- Heckathorn, Douglas D (1997) Respondent-driven
tion of developing interdependence along the Israeli sampling: A new approach to the study of hidden
Jordanian border. Ramat Gan: Bar Ilan University: populations. Social Problems 44(2): 174199.
unpublished doctoral dissertation. Hosmer, Larue T (1995) Trust: The connecting link
Atkinson, Rowland & John Flint (2001) Accessing hidden between organizational theory and philosophical ethics.
and hard-to-reach populations: Snowball research Academy of Management Review 20(2): 379403.
strategies. Social Research Update No. 33. Guildford: Jacobsen, Karen & Loren B Landau (2003) The dual
University of Surrey, Department of Sociology. imperative in refugee research: Some methodological
Bar-Tal, Daniel (2000) From intractable conflict and ethical considerations in social science research
through conflict resolution to reconciliation: Psycho- on forced migration. Disasters 27(3): 185206.
logical analysis. Political Psychology 21(2): 351365. Kaplan, Charles; Dirk Korf & Claire Sterk (1987)
Ben-Porat, Guy (2006) Global Liberalism, Local Popu- Temporal and social contexts of heroin-using popula-
lism, Peace and Conflict in Israel and Northern Ireland. tions: An illustration of the snowball sampling tech-
Syracuse, NY: Syracuse University Press. nique. Journal of Mental and Nervous Disorders
Berg, Sven (1988) Snowball sampling. In: Samuael Kotz 175(9): 566574.
& Norman Johnson (eds) Encyclopaedia of Statistical Kardoosh, Marwan A & Michelle Leanne Burgis (2006)
Sciences. Vol. 8. New York: John Wiley, 528532. A story of qualified success? Qualifying industrial
Clark, Janine A (2006) Field research methods in the zones, economic policy making & governance in
Middle East. PS: Political Science and Politics 39(3): Jordan. Jordan Center for Public Policy Research
417423. and Dialogue (http://www.jcpprd.org/Files/Research
Cohen, Nissim (2008) Business communities in the Database/QIZ,%20Policy,%20Governance.pdf).
peace process and globalization: A costbenefit calcu- Kriesberg, Louis (1998) Constructive Conflict: From
lation of political participation in Jordan and the Escalation to Resolution. Lanham, MD: Rowman and
Palestinian Authority. Politica 18: 5786 (Hebrew). Littlefield.
Cohen, Nissim & Guy Ben-Porat (2008) Business commu- Levi, Margaret (2001) Sociology of trust. In: Neil
nities and peace: The costbenefit calculations of politi- Smelser & Paul Baltes (eds) International Encyclopedia
cal involvement. Peace and Change 33(3): 426446. of the Social and Behavioral Sciences. Oxford: Elsevier,
Fitzgerald, John L (1996) Hidden populations and the 1592215926.
gaze of power. Journal of Drug Issues 26(1): 521. McNamara, Robert P (1994) The Times Square Hustler:
Fitzgerald, John L & Margaret Hamilton (1997) Confi- Male Prostitution in New York City. Westport, CT:
dentiality, disseminated regulation and ethico-legal Praeger.
liabilities in research with a hidden population of Miller, Benjamin (2005) When and how regions become
illicit drug users. Addiction 92(1): 10991108. peaceful: Potential theoretical pathways to peace.
Fujii, Lee Ann (2010) Shades of truth and lies: Interpret- International Studies Review 7(2): 229267.
ing testimonies of war and violence. Journal of Peace Moore, John W & John Hagedorn (2001) Female
Research 47(2): 231241. Gangs: A Focus on Research. Washington, DC: U.S.

Downloaded from jpr.sagepub.com at The Open University Library on July 28, 2011
Cohen & Arieli 435

Department of Justice, Office of Justice Programs, Tessler, Mark & Amaney Jamal (2006) Political attitude
Office of Juvenile Justice and Delinquency research in the Arab world: Emerging opportunities.
Prevention. PS: Political Science and Politics 39(3): 433437.
Morgan, Patricia (1996) Unknown, unexplored, and Thomson, Stephan K (1997) Adaptive sampling in
unseen populations: An introduction into the truly behavioral surveys. NIDA Research Monograph
hidden worlds of drugs and alcohol research. Journal 296319.
of Drug Issues 26(1): 14. Valdez, Avelardo & Charles D Kaplan (1999) Reducing
Patrick, James (1973) A Glasgow Gang Observed. London: selection bias in the use of focus groups to investigate
Eyre Methuen. hidden populations: The case of Mexican-American
Petersen, Rebecca D & Avelardo Valdez (2005) Using gang members from South Texas. Drugs and Society
snowball-based methods in hidden populations to 14: 209224.
generate a randomized community. Youth Violence Van Meter, Karl (1990) Methodological and design
and Juvenile Justice 3(1): 151167. issues: Techniques for assessing the representatives
Press-Barnathan, Galia (2006) The neglected dimension of snowball samples. NIDA Research Monograph,
of commercial liberalism: Economic cooperation and 3143.
transition to peace. Journal of Peace Research 43(3): Vogt, W Paul (2005) Dictionary of Statistics and Metho-
261278. dology: A Nontechnical Guide for the Social Sciences.
Putnam, Robert D (1993) Making Democracy Work: London: Sage.
Civic Traditions in Modern Italy. Princeton, NJ: Watters, John K & Patrick Biernacki (1989) Targeted
Princeton University Press. sampling: Options for the study of hidden popula-
Putnam, Robert D (1995) Bowling alone: Americas tions. Social Problems 36(4): 416430.
declining social capital. Journal of Democracy 6(1): Whyte, William F (1955) Street Corner Society: The
6578. Social Structure of an Italian Slum, 2nd edn. Chicago:
Putnam, Robert D (2000) Bowling Alone: The Collapse University of Chicago Press.
and Revival of American Community. New York: Williams, Bernard (1988) Formal structures and social
Simon & Schuster. reality. In: Diego Gambetta (ed.) Trust: Making and
Romano, David (2006) Conducting research in the Breaking Cooperative Relations. New York: Blackwell,
Middle Easts conflict zones. PS: Political Science and 313.
Politics 39(3): 439441.
Rouhana, Nadin & Daniel Bar-Tal (1998) Psychological NISSIM COHEN, b. 1975, PhD in public policy
dynamics of intractable ethno-national conflicts: The (Ben-Gurion University of the Negev); Lecturer, School
IsraeliPalestinian case. The American Psychologist of Political Sciences, University of Haifa (2011);
53(7): 761770. Post-doctoral fellow, Center for the Study of Public
Spreen, Marinus (1992) Rare populations, hidden Choice, George Mason University (201011). Current
populations and link-tracing designs: What and why? main interests: public policy, public administration, and
Bulletin Methodologie Sociologique 36: 3458. political economy.
Sudman, Seymour & Howard E Freeman (1988) The
use of network sampling for locating the seriously ill. TAMAR ARIELI, b. 1966, PhD in conflict
Medical Care 26(10): 992999. management and negotiation (Bar Ilan University);
Tabnak, Farzaneh & Richard Sun (2000) Need for HIV/ Lecturer, Tel Hai College, Ashkelon Academic College
AIDS early identification and preventative measures (2009); Post-doctoral fellow, Schusterman Scholar,
among middle-aged and elderly women. American Jewish Studies Program, Indiana University (201011).
Journal of Public Health 90(1): 287288. Research interests: border management policies.

Downloaded from jpr.sagepub.com at The Open University Library on July 28, 2011

You might also like