D. Research Protocol. Participants will be asked to take part in a face to face interview. These interviews will be approximately an hour long. These interviews will take place either in the lead investigators office at UTEP, or a mutually agreed upon location where the researcher and participant can speak privately. The interviews will consist of questions on the interview guide. Although a guide will be used, the structure of the interview is flexible to allow for probing based on details that arise in the interviews. …show more content…
Confidentiality of participants will be protected by removing their names from data. No names will be disclosed in the project, and resulting publications will use pseudonyms. The investigator will use verbal consent in order to protect their privacy and confidentiality of participants. The rationale behind this is that although the project does not ask particularly sensitive questions, the individual nature of women’s experiences could lead to discussion of topics that are stigmatized (White et al. 2012). Recordings will be transferred to the lead investigator’s computer as soon as possible after recording, and after transfer, files will be erased from the recorder. The recordings will be kept in a password protected folder on a password protected