Detailed Information on Publication Record
2022
An experimental study of countermeasures against threats : real-world effects meet treatment effects
CHYTILEK, Roman, Miroslav MAREŠ, Jakub DRMOLA, Lenka HRBKOVÁ, Petra MLEJNKOVÁ et. al.Basic information
Original name
An experimental study of countermeasures against threats : real-world effects meet treatment effects
Authors
CHYTILEK, Roman (203 Czech Republic, guarantor, belonging to the institution), Miroslav MAREŠ (203 Czech Republic, belonging to the institution), Jakub DRMOLA (203 Czech Republic, belonging to the institution), Lenka HRBKOVÁ (203 Czech Republic, belonging to the institution), Petra MLEJNKOVÁ (203 Czech Republic, belonging to the institution), Zuzana ŠPAČKOVÁ (203 Czech Republic) and Michal TÓTH (703 Slovakia, belonging to the institution)
Edition
Quality & Quantity, Dordrecht, Springer, 2022, 0033-5177
Other information
Language
English
Type of outcome
Článek v odborném periodiku
Field of Study
50601 Political science
Country of publisher
Netherlands
Confidentiality degree
není předmětem státního či obchodního tajemství
References:
Impact factor
Impact factor: 1.072 in 2017
RIV identification code
RIV/00216224:14230/22:00129457
Organization unit
Faculty of Social Studies
Keywords in English
Security; Experiments; Contamination; Pre-treatment; Treatment efect
Tags
Tags
International impact, Reviewed
Změněno: 5/11/2022 11:05, Mgr. Blanka Farkašová
Abstract
V originále
The experimental study of positions on policies and measures against various new types of threat is fast becoming a mainstream research practice. In this article we argue as follows: in security studies in particular, there is a risk that the experimental treatment is contaminated by subjects’ previous experience of the real world (‘contamination’), and this may substantially complicate the assessment of the size of the experimental treatment’s causal effect. We discuss ways to decrease the risk of uncontrolled contamination. Using two experimental case studies we show two typical cases of contamination in security studies (one, where the contamination of all treatments was extremely high, and another, where the level of contamination was unknown and might have varied across the experimental groups) and consider what this implies for the substantive results of the experiments. An analysis of contamination should become a routine, especially when reporting security experiments.
Links
TL01000398, research and development project |
|