In this Case Assignment, you will be reading several articles and sources describing data collection protocols, arrangements, and relationships, and the kinds of issues that need to be considered in developing a set of procedures for your study.
DOC670 Applied Statistics for Research
Module 4 Case
DESIGNING THE TRIANGULATION APPROACH TO ADDRESS THE RESEARCH PROBLEM
Assignment Overview
In this Case Assignment, you will be reading several articles and sources describing data collection protocols, arrangements, and relationships, and the kinds of issues that need to be considered in developing a set of procedures for your study. You will then be asked to construct a basic procedure list and plan for your study, taking these issues into consideration and allowing for the decisions you previously made regarding design, measures, and respondents.
As the course progresses, you will be making a series of decisions in which you will increasingly specify the structure of your project. These decisions build on each other in critical ways. However, you are not locked into previous decisions if you subsequently decide you need to change direction. As before, you have an opportunity to go back and revise and/or extend the previous sections completed in previous modules. If you do revise earlier sections, please include them and indicate what changes you have made to them.
Case Assignment
Prepare a 5- to 7-page paper in accordance with the following Assignment Expectations, describing the procedural issues for your project, in accordance with the following outline:
Briefly describe the organization within which you are working for your project, and your relationship to it.
Identify your organizational contact/liaison person(s), their role within the organization, how you got involved with them, the role that you expect them to play in regard to your project, and the arrangements you have for maintaining regular contact with them.
Complete a basic plan/timeline for your project, according to the following grid. Identify the principal activities you will need to carry out, the approximate dates when you might complete them (or, if you’re unable to identify specific dates, at least how long you expect each activity to take), and any necessary prerequisites for any of these activities (that is, things that have to happen before the activity can be undertaken). Be sure to include both specific activities related to research and administrative events such as project approval and IRB (https://www.trident.edu/students-and-alumni/institutional-review-board/) approval, as well as any needed organizational reviews.
Activities Date start Date complete Prerequisites Deliverables (if any)
1
2
3
Identify any potential sources of difficulty or complication for your project—that is, things that might make it difficult to complete. For each difficulty, identify any ideas you might have about how to overcome it, and any kind of specific help you might need to resolve these issues.
Assignment Expectations
Length: The written component of this assignment should be 5–7 pages long (double-spaced) without counting the cover page and reference page.
Organization: Subheadings should be used to organize your paper according to the questions.
Grammar and Spelling: While no points are deducted for minor errors, assignments are expected to adhere to standard guidelines of grammar, spelling, punctuation, and sentence syntax. Points may be deducted if grammar and spelling impact clarity. We encourage you to use tools such as grammarly.com and proofread your paper before submission.
When you write your paper make sure you do the following:
Answer the assignment questions directly.
Stay focused on the precise assignment questions. Do not go off on tangents or devote a lot of space to summarizing general background materials.
Use evidence from your readings to justify your conclusions.
Be sure to cite at least five credible resources.
Make sure to reference your sources of information with both a bibliography and in-text citations.See the Trident guide to APA Style, 7th edition. Another resource is the “Writing Style Guide,” which is found under “My Resources” in the TLC Portal.
Your assignment will be graded using the following criteria:
Assignment-Driven Criteria: Student demonstrates mastery covering all key elements of the assignment.
Critical Thinking/Application to Professional Practice: Student demonstrates mastery conceptualizing the problem and analyzing information. Conclusions are logically presented and applied to professional practice in an exceptional manner.
Business Writing and Quality of References: Student demonstrates mastery and proficiency in written communication and use of appropriate and relevant literature at the doctoral level.
Citing Sources: Student demonstrates mastery applying APA formatting standards to both in-text citations and the reference list.
Professionalism and Timeliness: Assignments are submitted on time.
DOC670 Applied Statistics for Research
Module 4 SLP
DESIGNING THE TRIANGULATION APPROACH TO ADDRESS THE RESEARCH PROBLEM
In DOC640 you discussed using Dedoose to do content analysis on qualitative data such as interviews. Content analysis can also be done on reports, statements, etc., from secondary data. Using the Strategic Plan from the United Way of Orange County’s website this Word Cloud was produced showing the most frequent words used in the Strategic Plan (the Strategic Plan was posted on the Web and then the text was copied to a Word document).
word cloud
Some of the words are clearly a part of their strategic mission and could be used to analyze transcripts from interviews later after you receive IRB approval.
Here is an example using Dedoose to analyze transcripts on priorities in Information Security by Information Security Specialists. Here the scenario for this research is described to show you results from the Dedoose analysis.
There were eleven propositions for insider threat for computer systems in an organization, and the propositions were evaluated in terms of importance and timing within an insider risk program. Seven volunteers participated in the research. The interviews were conducted over Zoom with the audio portion of the discussions recorded. Each of the participants was presented with the eleven propositions and discussed each in the interview. While the respondents are anonymous, Table 1 shows their demographics and role in setting up insider threat programs.
Table 1
Participant demographics
Table 1
The volunteers were recruited from the LinkedIn business networking platform. Over 70 individuals received invitations. Each invitation contained information about the purpose of the study, the fact that there would be a recorded interview, and that the research is carried out under applicable laws that govern research. The Informed Consent document was explained to prospective participants. Once they accepted the LinkedIn invitation, the respondents received a link to a Qualtrics survey containing the Informed Consent document. After they signed the Informed Consent form, it was possible to continue the research using the recorded interview. Of the 73 invitations sent, 25 of the individuals responded in the affirmative. Six withdrew their offer of participation, and others either did not sign the electronic copy of the Informed Consent or could not participate for some other reason. Seven volunteers were the final count of participants.
The central discussion of the interviews was dictated by the research question and the eleven propositions. Those eleven propositions were predetermined as the overarching themes of the interviews. Each proposition was presented to the volunteers one at a time, and then the subject stated their judgments. By signing the informed consent, the subject agreed to the Zoom interview and to have the audio of the interview recorded. Recording the discussions allowed detailed analysis of the conversations using the Dedoose qualitative analysis tool.
Transcription of audio data from the structured interviews occurred in three phases. In the first phase, the audio files underwent automatic transcription to text using a tool called Trint. The second transcription phase consisted of a transcriber listening to the MP3 audio files while reviewing the transcribed text and making corrections to inaccuracies. The third and final step was a second sweep of each text file to ensure that all the corrections had been made. The researcher and one assistant reviewed the transcribed text. The files underwent final validation by the researcher. After transcription of the audio and double-verification for accuracy, the text-based files were placed into Dedoose. Additionally, the demographic data regarding the participants was added as well.
After putting the files into Dedoose, an inductive method was applied to the transcribed data for the data coding. The image below shows a visual example of the coding process. Each transcript was first open coded as the transcriber listens to the audio of the interview. Subsequent passes allowed for linking related ideas in the axial coding part of the analysis. Figure 5 shows an example of the coding process.
Figure 5
Figure 5. Example of Open coding and Axial coding process in Dedoose.
The responses to the 11 propositions were coded according to two criteria, the first criterion is the importance of the proposed practice, and the second criterion is the timeline of implementing the practice when setting up a new insider threat program. Coding of the remainder of the text files from each of the interviews consists of a three-step process. The steps were open coding, axial, and lastly selective coding.
For this project, the 11 propositions provided a pre-existing framework of themes attached to each of the 11 propositions. One set deals with the importance of each proposition and another set deals with the timeliness of each proposition. These two frameworks were entered into Dedoose.
Each of the codes for the two types or characteristics were weighted in a custom fashion. Because there are 11 proposed processes, each code got a weight range of 1 to 11. In Dedoose, the higher the number, the greater the weight. When coding the interview, the researcher can evaluate the mood, context, and emphasis when adding a code weight to an excerpt in the text of each discussion. Figure 6 shows a sample of how each code can be assigned a weight range.
Figure 6
Figure 6. Weight range options set for coding in Dedoose, minimum weight 1, maximum weight 11.
Analysis of the transcripts with the coding yielded these results in Dedoose in Table 2.
Table 2
Table 2
These weights then can be used to interpret the interviews and to produce a graphical analysis.
SLP Assignment Expectations
For your Background analysis, obtain a document from your firm such as a statement from the president, statement to the stockholders, strategic plan, or something of that sort. Then use the WordCloud addin for Word 2016. Here is a video to show you how to obtain the free Addin ProWordCloud: https://www.youtube.com/watch?v=my1JRX84tyc
Now produce a WordCloud from the document you selected. Add to your Background a discussion of the results of the WordCloud and the areas identified. Discuss how these relate to the research question for your DSP. You will NOT use Dedoose here because you can NOT collect any interviews until you have your IRB approval. If you want you can work on using Dedoose to analyze the document you just used to produce a WordCloud; however, this is not required.
Add this to the growing work you have on the Background for the firm you are studying.
Your assignment will be graded using the following criteria:
Assignment-Driven Criteria: Student demonstrates mastery covering all key elements of the assignment.
Critical Thinking/Application to Professional Practice: Student demonstrates mastery conceptualizing the problem and analyzing information. Conclusions are logically presented and applied to professional practice in an exceptional manner.
Business Writing and Quality of References: Student demonstrates mastery and proficiency in written communication and use of appropriate and relevant literature at the doctoral level.
Citing Sources: Student demonstrates mastery applying APA formatting standards to both in text citations and the reference list.
Professionalism and Timeliness: Assignments are submitted on time.
Collepals.com Plagiarism Free Papers
Are you looking for custom essay writing service or even dissertation writing services? Just request for our write my paper service, and we'll match you with the best essay writer in your subject! With an exceptional team of professional academic experts in a wide range of subjects, we can guarantee you an unrivaled quality of custom-written papers.
Get ZERO PLAGIARISM, HUMAN WRITTEN ESSAYS
Why Hire Collepals.com writers to do your paper?
Quality- We are experienced and have access to ample research materials.
We write plagiarism Free Content
Confidential- We never share or sell your personal information to third parties.
Support-Chat with us today! We are always waiting to answer all your questions.