Study Document
… student success, showing how to capitalize on student strengths and interests rather than focusing on weaknesses?
Interview Process
The interview process for this qualitative research is as follows. Researchers will use a convenience sample of parents, teachers, and administrators who agree to participate in the study. The interview process will take place in the form of focus groups.
There will be several focus group sessions. Two of the sessions ……
References
Benner, A.D., Boyle, A.E. & Sadler, S. (2016). Parental Involvement and Adolescents’ Educational Success: The Roles of Prior Achievement and Socioeconomic Status. Journal of Youth and Adolescence 45(6): 1053-1064.
Castro, M., Esposito-Casas, E., Lopez-Martin, E., et al. (2015). Parental involvement on student academic achievement: A meta-analysis. Educational Research Review 14(2015): 33-46.
Creswell, J.W. & Poth, C.N. (2018). Qualitative Inquiry Research Design. Los Angeles: SAGE.
Hill, N.E., Witherspoon, D.P. & Bartz, D. (2016). Parental involvement in education during middle school: Perspectives of ethnically diverse parents, teachers, and students. The Journal of Educational Research 111(1): 12-27.
Ma, X., Shen, J., Krenn, HY., et al. (2016). A meta-analysis of the relationship between learning outcomes and parental involvement. Educational Psychology Review 28(4): 771-801.
Park, S. & Holloway, S. (2018). Parental Involvement in Adolescents\\' Education: An Examination of the Interplay among School Factors, Parental Role Construction, and Family Income. School Community Journal 28(1): 9-36.
Ule, M., Zivoder, A. & duBois-Reymond, M. (2015). ‘Simply the best for my children’: patterns of parental involvement in education. International Journal of Qualitative Studies in Education 28(3): 329-348.
Study Document
Phenomenology and Grounded Theory Approaches
Both phenomenology and grounded theory are commonly used approaches to qualitative research in the social sciences. While grounded theory and phenomenology can sometimes be used simultaneously in ways that “slur” or “blur” the distinction … the social sciences. While grounded theory and phenomenology can sometimes be used simultaneously in ways that “slur” or “blur” the distinction between multiple qualitative methods, researchers in education should ultimately focus their attention on the best method for exploring single, focused research questions and their real-world applications … that have distinct meaning for the population. The researcher seeks broad “essential” elements that characterized the lived, shared experience of the population under study (Starks & Brown Trinidad, 2007, p. 1373). Therefore, grounded theory and phenomenology are similar but they do use different research methods and have … previously undefined or unknown issue, problem, or phenomenon, then phenomenological research methods would be……
References
Baker, C., Wuest, J., & Stern, P. N. (1992). Method slurring: the grounded theory/phenomenology example. Journal of Advanced Nursing, 17(11), 1355–1360.doi:10.1111/j.1365-2648.1992.tb01859.x
Creswell, J. W. (2013). Qualitative inquiry and research design: Choosing among five approaches. eBook.
Norton, S.M. (2013). A phenomenological investigation into the self-efficacy beliefs of teachers who have presisted in the teaching profession. Liberty University Dissertation.
Starks, H., & Brown Trinidad, S. (2007). Choose Your Method: A Comparison of Phenomenology, Discourse Analysis, and Grounded Theory. Qualitative Health Research, 17(10), 1372–1380.doi:10.1177/1049732307307031
Suddaby, R. (2006). From the Editors: What Grounded Theory is Not. Academy of Management Journal, 49(4), 633–642.doi:10.5465/amj.2006.22083020
Wimpenny, P. & Gass, J. (2001). Interviewing in phenomenology and grounded theory: is there a difference? Journal of Advanced Nursing 31(6): 1485-1492.
Yalof, B. (2014). Marshaling resources. The Grounded Theory Review 13(1).
Study Document
Understanding the Value of qualitative Research
qualitative researchers have a number of different research strategies available to them, including case studies, phenomenology, grounded theory and ethnography. Each of these research … the potential impact of research in supporting positive social change through public policy in the paper’s conclusion.
Review and Discussion
Role of the qualitative researcher
The role of the qualitative researcher is to examine, in-depth, a wide array of textual data, various documents, pictures, music and virtually any other non-numeric human artifact to … 534). In addition, addressing any ethical issues that may be involved and securing permission to enter a research site are part of the qualitative researcher’s role (Creswell & Creswell, 2018).
Although Neuman (2008) specifies that ethnography is used with groups from other cultures, Creswell (2003) does not … different definitions, the role of the ethnographical researcher is to develop an insider perspective of a group……
References
Abrahams, M. (2011, March 10). Boxing proves a hit for French sociologist. The Guardian. Retrieved from https://www.theguardian.com/education/2011/jan/10/improbable-research-boxing-sociologist .
Asselin, M. E. (2009, March-April). Insider research: Issues to consider when doing qualitative research in your own setting. Nurses in Professional Development, 19(2), 99-103.
Burress, C. (2003, December 8). UC’s ‘boxing sociologist’ / Combative French professor spent 3 years in ring. SFGate. Retrieved from https://www.sfgate.com/bayarea/article/UC-s-boxing-sociologist-Combative-French-2509824.php#photo-2684464 .
Creswell, J. W. (2003). Qualitative inquiry and research design: Choosing among five traditions. Thousand Oaks, CA: Sage Publications.
Creswell, J. W., & Creswell, J. D. (2018). Research design: Qualitative, quantitative, and mixed methods approaches (5th ed.). Retrieved from https://content.ashford.edu
Ishioka, T. (2015, March). How can one be a boxer?: Pain and pleasure in a Manila boxing camp. International Journal of Japanese Sociology, 24(1), 92-105.
Neuman, W. L. (2003). Social research methods: Qualitative and quantitative approaches, 5th ed. New York: Allyn & Bacon.
Wacquant, L. (2011). Habitus as topic and tool: Reflections on becoming a prizefighter. Qualitative Research in Psychology, 8(1), 81-92.
Study Document
… as nation-states increasingly rely on cyberspace. However, cyber espionage had generated concerns regarding its acceptability given its potential threats to national security. This study explores the proposition that cyber security should be deemed an acceptable state behavior while cyber attack is unacceptable. This study seeks to answer the question, “How is cyber espionage an acceptable state behavior for intelligence gathering though it is a form of unacceptable … an acceptable state behavior for intelligence gathering though it is a form of unacceptable cyberattack?” Background information to provide the context for this study is discussed as well as a review of existing literature on the topic. A qualitative case study research design based on the Just War Theory will be utilized to conduct this research. Data will be collected from professionals in international … sample, the researcher will utilize purposive sampling approach. Individuals within the researcher’s professional networks will be……
Bibliography
Agarwal A. & CERT-IN. “Cyber Espionage, Infiltration and Combating Techniques.” Indian Computer Emergency Response Team, 2013. https://www.cert-in.org.in/Downloader?pageid=5&type=2&fileName=CIPS-2013-0128.pdf
Banks, W.C. “Cyber Espionage and Electronic Surveillance: Beyond the Media Coverage.” Emory law Journal 66, (2017).
Georgieva, I. “The Unexpected Norm-Setters: Intelligence Agencies in Cyberspace.” Contemporary Security Policy (2019).
Hjortdal, M. “China’s Use of Cyber Warfare: Espionage Meets Strategic Deterrence.” Journal of Strategic Security 4, no. 2 (2011).
Libicki, M. “The Coming of Cyber Espionage Norms.” 9th International Conference on Cyber Conflict, 2017. https://ccdcoe.org/uploads/2018/10/Art-01-The-Coming-of-Cyber-Espionage-Norms.pdf " target="_blank" REL="NOFOLLOW">
Study Document
… as nation-states increasingly rely on cyberspace. However, cyber espionage had generated concerns regarding its acceptability given its potential threats to national security. This qualitative case study research explores the proposition that cyber security should be deemed an acceptable state behavior while cyber attack is unacceptable. This study seeks to answer the question, “How is cyber espionage an acceptable state behavior for intelligence gathering though it potentially damages relations between nation-states?” … to answer the question, “How is cyber espionage an acceptable state behavior for intelligence gathering though it potentially damages relations between nation-states?” The qualitative case study examined existing studies on this issue and employed thematic analysis to analyze the data. The study found that cyber espionage is an acceptable state behavior since it plays a key role in cyber warfare, helps to establish appropriate countermeasures … key role in cyber warfare, helps to establish appropriate countermeasures against cyberattacks……
Bibliography
Ablon, L. “Data Thieves: The Motivations of Cyber Threat Actors and Their Use and Monetization of Stolen Data.” RAND Corporation, March 2018. https://www.rand.org/content/dam/rand/pubs/testimonies/CT400/CT490/RAND_CT490.pdf
Agarwal A. & CERT-IN. “Cyber Espionage, Infiltration and Combating Techniques.” Indian Computer Emergency Response Team, 2013. https://www.cert-in.org.in/Downloader?pageid=5&type=2&fileName=CIPS-2013-0128.pdf
Banks, W.C. “Cyber Espionage and Electronic Surveillance: Beyond the Media Coverage.” Emory law Journal 66, (2017).
Baxter, P. & Jack, S. “Qualitative Case Study Methodology: Study Design and Implementation for Novice Researchers.” The Qualitative Report 13, no. 4 (2008).
Brown, G. “Spying and Fighting in Cyberspace: What is Which?” Journal of National Security Law & Policy 8, (2017).
Connell, M. & Vogler, S. “Russia’s Approach to Cyber Warfare.” CNA Analysis and Solutions, 2017. https://www.cna.org/CNA_files/PDF/DOP-2016-U-014231-1Rev.pdf
Creswell, J.W. Research design: Qualitative, quantitative, and mixed methods approaches, 4th ed. Thousand Oaks, CA: Sage Publications Inc.
Diplomacy Data. “Cyber Security and Cyber Espionage in International Relations.” Diplomacy Data, 2015. http://diplomacydata.com/cyber-security-and-cyber-espionage-in-international-relations/
Study Document
… and coworkers’ 2018 research work titled “The different perspectives of patients, informal caregivers, and professionals on patient involvement in primary care teams. A qualitative study”. This analysis will entail an evaluation of how the research work contributes to scientific knowledge and research theory, its dependability and credibility, approaches … generalizing beyond the specific is a long- term scientific objective. Science produces cumulative knowledge through developing, refining, and even sometimes replacing theories.
This study by Doekhie and colleagues (2018) will add significant value to healthcare practice as well as the relevant knowledge pool. It offers salient details … Vaiana, 2015). Instead, the main issue is how to reform the healthcare system and attain ideal results in accordance with stakeholder views.
The study involves a logical, orderly, and methodical set of procedures, raising readers’ level of thought, and reinforcing ideas through a critique and reflection of … of healthcare, by presenting……
References
Brook, R. H., & Vaiana, M. E. (2015). Using the knowledge base of health services research to redefine health care systems. Journal of general internal medicine, 30(10), 1547-1556.
Cutcliffe, J. R., & McKenna, H. P. (1999). Establishing the credibility of qualitative research findings: the plot thickens. Journal of advanced nursing, 30(2), 374-380.
Doekhie, K. D., Strating, M. M., Buljac?Samardzic, M., van de Bovenkamp, H. M., & Paauwe, J. (2018). The different perspectives of patients, informal caregivers, and professionals on patient involvement in primary care teams. A qualitative study. Health Expectations, 21(6), 1171-1182.
Eccles, M., Grimshaw, J., Walker, A., Johnston, M., & Pitts, N. (2005). Changing the behavior of healthcare professionals: the use of theory in promoting the uptake of research findings. Journal of clinical epidemiology, 58(2), 107-112.
Leedy, P.D. & Ormrod, J. E. (2019). Practical research: Planning and design, 12th edition. Pearson Education, Hudson Street, NY.
Sanjari, M., Bahramnezhad, F., Fomani, F. K., Shoghi, M., & Cheraghi, M. A. (2014). Ethical challenges of researchers in qualitative studies: The necessity to develop a specific guideline. Journal of medical ethics and history of medicine, 7.
Swan, J., Clarke, A., Nicolini, D., Powell, J., Scarbrough, H., Roginski, C., ... & Taylor-Phillips, S. (2012). Evidence in Management Decisions (EMD): advancing knowledge utilization in healthcare management.
Thomas, D. R. (2017). Feedback from research participants: are member checks useful in qualitative research?. Qualitative Research in Psychology, 14(1), 23-41.
Study Document
… at Middle East terrorism and the Muslim religion and the way nationality and the environment intersect to produce extremists, radicals or terrorists. This study will look at Western terrorism and the IRA as an opportunity to investigate the research question in a way that is more relatable … to oppose through a strategy of violence the oppression of Catholics and Catholic interests in the North (Bamford, 2005).
The purpose of this study is to understand the intersection of ideology, nationalism and environment with regard to why the IRA formed and what the group sought to … it did. By reviewing the literature available on the IRA and by conducting interviews using Zoom with different generations of Irish Catholics, this study will produce data that will be used to fill the gap in present literature regarding the IRA and why it came about whether … The co-founder of the IRA,……
References
Bamford, B. (2005). The Role and Effectiveness of Intelligence in Northern Ireland. Intelligence and National Security, 20(4), 581-607.
Bell, J. B. (2008). The Secret Army: The IRA. London: Transaction Publishers.
IRA Green Book. (1977). Accessed 14 Dec 2015 from https://tensmiths.files.wordpress.com/2012/08/15914572-ira-green-book-volumes-1-and-2.pdf
Maloney, E. (2010). Voices from the Grave: Two Men’s War in Ireland. NY: Faber, Faber.
O’Brien, B. (1999). The Long War: The IRA and Sinn Fein. NY: Syracuse University Press.
Rooney, N. (2007). Violent nationalism in catholic communities: The Provisional IRA and ETA. Studies in Ethnicity and Nationalism, 7(3), 64-77.
Shanahan, Timothy. (2008). The Provisional IRA and the Morality of Terrorism. UK: Edinburgh University Press.
Taylor, P. (2001). Brits. UK: Bloomsbury Publishing.
Study Document
… Introduction 4
1.1 Background 4
1.2 Significance of the Topic 4
1.3 Research Problem 5
1.4 Research Questions 5
1.5 Purpose of the study 5
1.6 Methodology 5
1.7 Good Title for study 5
2 Literature Review 6
2.1 Cloud Computing Definition 6
2.2 Types of Cloud Computing Services 6
2.2.1 Infrastructure as a Service (IaaS) … accounting organizations have sought to have a competitive advantage over their market rivals.
Research Questions
The following research questions will guide the research study:
1. What is the applicability of cloud computing in accounting organizations?
2. How do cloud computing services facilitate cost-effectiveness?
3. What are the … cloud computing services facilitate cost-effectiveness?
3. What are the various ways that cloud computing generates cost savings for accounting organizations?
Purpose of the study
This study’s purpose is to comprehensively examine the impact of implementing cloud computing services to an accounting organization in terms……
References
Bauer, E., & Adams, R. (2015). Reliability and availability of cloud computing. Hoboken: John Wiley & Sons.
Chang, W. Y., Abu-Amara, H., & Sanford, J. F. (2018). Transforming enterprise cloud services. New York: Springer Science & Business Media.
Chang, V. (Ed.). (2015). Delivery and adoption of cloud computing Services in Contemporary Organizations. IGI Global.
Hsien, W. F., Yang, C. C., & Hwang, M. S. (2016). A Survey of Public Auditing for Secure Data Storage in Cloud Computing. IJ Network Security, 18(1), 133-142.
Jamsa, K. (2016). Cloud computing. New York: Jones & Bartlett Publishers.
Maguire, M., & Delahunt, B. (2017). Doing a thematic analysis: A practical, step-by-step guide for learning and teaching scholars. AISHE-J: The All Ireland Journal of Teaching and Learning in Higher Education, 9(3).
Mehmood, R., Katib, S. S. I., & Chlamtac, I. (2020). Smart Infrastructure and Applications. New York: Springer International Publishing.
Prabhu, C. S. R. (2015). E-governance: concepts and case studies. New Delhi: PHI Learning Pvt. Ltd.
Study Document
… it is important to explore the perspectives of stakeholders and individuals who play a role in applying preventive strategies. For that reason, this study uses qualitative design to explore the perspectives of high school teachers toward successful teen substance abuse prevention program. This paper discusses the background of the … the issue before the epidemic of drug abuse takes an even greater toll on the nation’s youth.
Purpose Statement
The purpose of this qualitative study is to interview teachers who have some experience with substance abuse prevention programs for teens. The aim is to obtain information about what … applied in the development of a new prevention program to be used to address the problem.
Research Question
The research question for this qualitative study is: What are the perspectives of high school teachers toward successful teen substance abuse prevention programs?
Literature Review
Research
The study by Hicham et al.……
Study Document
… the researcher addresses the following four areas in the selected journal article (Introduction, Literature Review, Methodology and Data Analysis:
The purpose of the study is to support the World Health Organization hand hygiene campaign against healthcare associated infections (HAIs). The study aims to conduct an assessment of the perception towards hand hygiene amid healthcare professionals within the hospital. In particular, the study seeks to ascertain perceptions on HAIs and hand hygiene. The literature review conducted by the researcher was not quite extensive. Nonetheless, the previous … and gives rise to substantial compliance and knowledge enhancement amongst healthcare workers, supporting endorsement all over the globe.
In regard to methodology, the study employed a descriptive method by making use of a standardized survey questionnaire of the WHO. The main purpose of the descriptive research survey … elements of situation as it naturally takes place. In this regard, the perceptions regarding HAI……
References
Joshi, S. C., Diwan, V., Tamhankar, A. J., Joshi, R., Shah, H., Sharma, M., ... & Lundborg, C. S. (2012). Qualitative study on perceptions of hand hygiene among hospital staff in a rural teaching hospital in India. Journal of Hospital Infection, 80(4), 340-344.
Tan Jr, A. K., & Jeffrey Olivo, B. S. (2015). Assessing healthcare associated infections and hand hygiene perceptions amongst healthcare professionals. International Journal of Caring Sciences, 8(1), 108.
We have over 150,000+ study documents to help you.
Sign Up for FREE