Study Document
Phenomenology and Grounded Theory Approaches
Both phenomenology and grounded theory are commonly used approaches to qualitative research in the social sciences. While grounded theory and phenomenology can sometimes be used simultaneously in ways that “slur” or “blur” the distinction between … sciences. While grounded theory and phenomenology can sometimes be used simultaneously in ways that “slur” or “blur” the distinction between multiple qualitative methods, research in education should ultimately focus their attention on the best method for exploring single, focused research questions and their real-world applications (Baker, Wuest, & Stern, 1992, p. 1355). Grounded theory has been described as a “practical method for conducting research” that shows how people construct meaning about their social world (Suddaby, 2006, p. 633). Therefore, grounded theory is sociological in origin and linked … in origin and linked to the concept of symbolic interactionism (Starks & Brown Trinidad, 2007). The methods used for grounded theory……
References
Baker, C., Wuest, J., & Stern, P. N. (1992). Method slurring: the grounded theory/phenomenology example. Journal of Advanced Nursing, 17(11), 1355–1360.doi:10.1111/j.1365-2648.1992.tb01859.x
Creswell, J. W. (2013). Qualitative inquiry and research design: Choosing among five approaches. eBook.
Norton, S.M. (2013). A phenomenological investigation into the self-efficacy beliefs of teachers who have presisted in the teaching profession. Liberty University Dissertation.
Starks, H., & Brown Trinidad, S. (2007). Choose Your Method: A Comparison of Phenomenology, Discourse Analysis, and Grounded Theory. Qualitative Health Research, 17(10), 1372–1380.doi:10.1177/1049732307307031
Suddaby, R. (2006). From the Editors: What Grounded Theory is Not. Academy of Management Journal, 49(4), 633–642.doi:10.5465/amj.2006.22083020
Wimpenny, P. & Gass, J. (2001). Interviewing in phenomenology and grounded theory: is there a difference? Journal of Advanced Nursing 31(6): 1485-1492.
Yalof, B. (2014). Marshaling resources. The Grounded Theory Review 13(1).
Study Document
Abstract
Developing a research question is one of the challenging tasks a research encounters when initiating a project. In current clinical practice, both unanswered issues or when experiences dictate alternative therapies may provoke an investigator to … a project. In current clinical practice, both unanswered issues or when experiences dictate alternative therapies may provoke an investigator to formulate a clinical research question. This paper describes PICO (population, intervention, control, and outcomes) criteria in framing a research question. Finally, it assesses the characteristics of a peer-reviewed article on urinary tract infections.
Part 1
EBM, shorthand for Evidence-Based Medicine, is a … Evidence-Based Medicine, is a core aspect of the medical profession. EBM provides statistical analyses and matters of clinical concern. It is based on research, reading, analysis, and combining many papers generated within the medical fraternity. EBM applications based on research evidence and clinical knowledge and reviews of the system go……
References
Considine, J., Shaban, R. Z., Fry, M., & Curtis, K. (2017). Evidence-based emergency nursing: designing a research question and searching the literature. International emergency nursing, 32, 78-82.
Eriksen, M. B., & Frandsen, T. F. (2018). The impact of patient, intervention, comparison, outcome (PICO) as a search strategy tool on literature search quality: a systematic review. Journal of the Medical Library Association: JMLA, 106(4), 420.
Yuan, X., Xiaoli, L., Shilei, L., Qinwen, S., & Ke, L. (2019, May). Extracting PICO elements from RCT abstracts using 1-2gram analysis and multitask classification. In Proceedings of the third International Conference on Medical and Health Informatics 2019 (pp. 194-199).
Scells, H., Zuccon, G., Koopman, B., Deacon, A., Azzopardi, L., &Geva, S. (2017, November). Integrating the framing of clinical questions via PICO into the retrieval of medical literature for systematic reviews. In Proceedings of the 2017 ACM on Conference on Information and Knowledge Management (pp. 2291-2294).
Basmaci, R., Vazouras, K., Bielicki, J., Folgori, L., Hsia, Y., Zaoutis, T., &Sharland, M. (2017). Urinary tract infection antibiotic trial study design: a systematic review. Pediatrics, 140(6).
Misra, D. P., & Agarwal, V. (2018). Systematic reviews: challenges for their justification, related comprehensive searches, and implications. Journal of Korean medical science, 33(12).
Belcher, B. M., Rasmussen, K. E., Kemshaw, M. R., &Zornes, D. A. (2016). Defining and assessing research quality in a transdisciplinary context. Research Evaluation, 25(1), 1-17.
Fu, D. Y., & Hughey, J. J. (2019). Meta-Research: Releasing a preprint is associated with more attention and citations for the peer-reviewed article. Elife, 8, e52646.
Study Document
Background of the Issue
Parental involvement has long been established as an important variable in student achievement along various outcome parameters. Prior research has shown that parental involvement can lead to the cultivation of strong reading habits (Castro, Exposito-Casas, Lopez-Martin, et al., 2015), student self-esteem and … with other governmental, human service, and community organizations (Ma, Shen, Krenn, et al., 2015). Therefore, one of the most important subjects in educational research and educational administration is parental involvement. research need to learn how to increase parental involvement in meaningful ways, ways that yield desired outcomes for individual students and also for the … to increase parental involvement in meaningful ways, ways that yield desired outcomes for individual students and also for the school and community. Furthermore, research need to learn the best ways of increasing parental involvement while taking into account the socioeconomic and cultural diversity among the population.
Because ………
References
Benner, A.D., Boyle, A.E. & Sadler, S. (2016). Parental Involvement and Adolescents’ Educational Success: The Roles of Prior Achievement and Socioeconomic Status. Journal of Youth and Adolescence 45(6): 1053-1064.
Castro, M., Esposito-Casas, E., Lopez-Martin, E., et al. (2015). Parental involvement on student academic achievement: A meta-analysis. Educational Research Review 14(2015): 33-46.
Creswell, J.W. & Poth, C.N. (2018). Qualitative Inquiry Research Design. Los Angeles: SAGE.
Hill, N.E., Witherspoon, D.P. & Bartz, D. (2016). Parental involvement in education during middle school: Perspectives of ethnically diverse parents, teachers, and students. The Journal of Educational Research 111(1): 12-27.
Ma, X., Shen, J., Krenn, HY., et al. (2016). A meta-analysis of the relationship between learning outcomes and parental involvement. Educational Psychology Review 28(4): 771-801.
Park, S. & Holloway, S. (2018). Parental Involvement in Adolescents\\' Education: An Examination of the Interplay among School Factors, Parental Role Construction, and Family Income. School Community Journal 28(1): 9-36.
Ule, M., Zivoder, A. & duBois-Reymond, M. (2015). ‘Simply the best for my children’: patterns of parental involvement in education. International Journal of Qualitative Studies in Education 28(3): 329-348.
Study Document
research Article Chart
Criteria and Defining Characteristics
Article 1:
Abraham, R. P., Denton, D. A., Al?Assaf, A. S., Rutjes, A. W., Chong, L. Y., … study?
· What is the scope of the study?
· What is the rational for the study?
· What is the hypothesis or research question?
· What key concepts and terms are noted?
· Is a review of the literature provided?
The purpose of this study is … the incidence of dementia may have a significant impact on healthcare costs and the general encumbrance of dementia
There is no hypothesis or research question
The key concepts and terms noted include mild cognitive impairment and dementia
A review of the literature is provided
The purpose of …
The rationale of the study is that dietary factors have been linked to cognitive function in older individuals.
There is not hypothesis or research question delineated in the article……
References
Abraham, R. P., Denton, D. A., Al?Assaf, A. S., Rutjes, A. W., Chong, L. Y., Malik, M. A., & Tabet, N. (2015). Vitamin and mineral supplementation for prevention of dementia or delaying cognitive decline in people with mild cognitive impairment. Cochrane Database of Systematic Reviews, (10).
Kwok, T. C. Y., Lam, L. C. W., Sea, M. M. M., Goggins, W., & Woo, J. (2012). A randomized controlled trial of dietetic interventions to prevent cognitive decline in old age hostel residents. European journal of clinical nutrition, 66(10), 1135.
Dangour, A. D., Whitehouse, P. J., Rafferty, K., Mitchell, S. A., Smith, L., Hawkesworth, S., & Vellas, B. (2010). B-vitamins and fatty acids in the prevention and treatment of Alzheimer\\'s disease and dementia: a systematic review. Journal of Alzheimer\\'s disease, 22(1), 205-224.
Study Document
… provide the context for this study is discussed as well as a review of existing literature on the topic. A qualitative case study research design based on the Just War Theory will be utilized to conduct this research. Data will be collected from professionals in international relations and cyber security as well as existing publications on recent cyber espionage activities by … of professionals within this field and examine existing cases on cyber espionage by China and Russia.
To identify an appropriate representative sample, the research will utilize purposive sampling approach. Individuals within the research’s professional networks will be contacted and approached to participate in the study based on their knowledge and expertise on the phenomenon being studied. … based on their knowledge and expertise on the phenomenon being studied. Some of the potential ethical issues that could emerge include privacy of research participants and confidentiality. These issues will……
Bibliography
Agarwal A. & CERT-IN. “Cyber Espionage, Infiltration and Combating Techniques.” Indian Computer Emergency Response Team, 2013. https://www.cert-in.org.in/Downloader?pageid=5&type=2&fileName=CIPS-2013-0128.pdf
Banks, W.C. “Cyber Espionage and Electronic Surveillance: Beyond the Media Coverage.” Emory law Journal 66, (2017).
Georgieva, I. “The Unexpected Norm-Setters: Intelligence Agencies in Cyberspace.” Contemporary Security Policy (2019).
Hjortdal, M. “China’s Use of Cyber Warfare: Espionage Meets Strategic Deterrence.” Journal of Strategic Security 4, no. 2 (2011).
Libicki, M. “The Coming of Cyber Espionage Norms.” 9th International Conference on Cyber Conflict, 2017. https://ccdcoe.org/uploads/2018/10/Art-01-The-Coming-of-Cyber-Espionage-Norms.pdf " target="_blank" REL="NOFOLLOW">
Study Document
… of Cloud Computing within an Accounting Organization
Table of Contents
1 Introduction 4
1.1 Background 4
1.2 Significance of the Topic 4
1.3 research Problem 5
1.4 research questions 5
1.5 Purpose of the Study 5
1.6 Methodology 5
1.7 Good Title for Study 5
2 Literature Review 6
2.1 Cloud Computing …
2.4.1 Cost-Savings 9
2.4.2 Remote Accessibility 10
2.4.3 Scalability and Flexibility 11
2.4.4 Security 11
2.4.5 Energy Efficiency 11
3 Methodology 12
3.1 research Approach and Design 12
3.2 Data Collection Sources & Selection Plan 12
3.3 Proposed Interview questions 13
3.4 Sample Population 13
3.5 Ethical Considerations 14
3.6 Data Analysis Plan & Rationale 15
4 Contributions to Theory or Practice and … of day and from varying geographical areas. Ultimately, this provides the organization with a competitive advantage because the business operations continue running smoothly.
research Problem
In the present day, the advancement of……
References
Bauer, E., & Adams, R. (2015). Reliability and availability of cloud computing. Hoboken: John Wiley & Sons.
Chang, W. Y., Abu-Amara, H., & Sanford, J. F. (2018). Transforming enterprise cloud services. New York: Springer Science & Business Media.
Chang, V. (Ed.). (2015). Delivery and adoption of cloud computing Services in Contemporary Organizations. IGI Global.
Hsien, W. F., Yang, C. C., & Hwang, M. S. (2016). A Survey of Public Auditing for Secure Data Storage in Cloud Computing. IJ Network Security, 18(1), 133-142.
Jamsa, K. (2016). Cloud computing. New York: Jones & Bartlett Publishers.
Maguire, M., & Delahunt, B. (2017). Doing a thematic analysis: A practical, step-by-step guide for learning and teaching scholars. AISHE-J: The All Ireland Journal of Teaching and Learning in Higher Education, 9(3).
Mehmood, R., Katib, S. S. I., & Chlamtac, I. (2020). Smart Infrastructure and Applications. New York: Springer International Publishing.
Prabhu, C. S. R. (2015). E-governance: concepts and case studies. New Delhi: PHI Learning Pvt. Ltd.
Study Document
… quality of life, family burden, poorer psychological wellbeing, financial stress, under/unemployment, and poorer physical and mental health (Zuckerman, Lindly, Bethell & Kuhlthau, 2014).
research Context
As evident in the background information, families of children with autism face challenges relating to childcare patterns and issues brought by complexities … the study will be carried out among families of preschool children with ASD to understand their experiences, childcare patterns, and issues. Qualitative survey research is based on ethnography, which is the study of the behaviors, perceptions, and interactions that take place within organizations, teams, communities, and groups … the views and experiences of families of preschool children with ASD will provide rich, holistic insights on this issue, help in answering the research questions, and address the gap in existing literature.
For data collection, the research will conduct observations and interviews on a group of families of children with autism spectrum disorders.……
References
Coogle, C.G., Guerette, A.R. & Hanline, M.F 2013. Early Intervention Experiences of Families with an Autism Spectrum Disorder: A Qualitative Pilot Study. Early Childhood Research & Practice, vol. 15, no. 1. Viewed 7 August 2019, http://ecrp.uiuc.edu/v15n1/coogle.html
Forest, E.J., Horner, R.H., Lewis-Palmer, T. & Todd, A.W 2004. Transitions for Young Children with Autism from Preschool to Kindergarten. Journal of Positive Behavior Interventions, vol. 6, no. 2, pp.103-112.
Jansen, H 2010. The Logic of Qualitative Survey Research and its Position in the Field of Social Research Methods. Forum: Qualitative Social Research, vol. 11, no. 2, pp.1-21.
Ponto, J 2015. Understanding and Evaluating Survey Research. Journal of the Advanced Practitioner in Oncology, vol. 6, no. 2, pp.168-171.
Reeves, S., Kuper, A. & Hodges, B.D 2008. Qualitative Research Methodologies: Ethnography. BMJ, vol. 337. Doi: https://doi.org/10.1136/bmj.a1020
Reeves, S., Peller, J., Goldman, J. & Kitto, S 2013. Ethnography in Qualitative Educational Research: AMEE Guide No. 80. Medical Teacher, vol. 35, no. 8, pp.e1365-e1379.
Stahmer, A.C., Akshoomoff, N. & Cunningham, A.B 2011. Inclusion for Toddlers with Autism Spectrum Disorders. Autism, vol. 15, no. 5, pp. 625-641.
Stahmer, A.C., Collings, N.M. & Palinkas, L.A 2005. Early Intervention Practices for Children with Autism: Descriptions from Community Providers. Focus on Autism and Other Developmental Disabilities, vol. 20, no. 2, pp.66-79.
Study Document
… prevailing interest rates, the rate of inflation in the country, unemployment rates, the level of consumer consumption, and also gross domestic product (GDP). research conducted by Vazquez et al. (2012) establishes that here is a negative correlation between the GDP of a nation and non-performing or defaulting … of financial loans, negligence in credit evaluation, intrusion by the government, in addition to inadequate monitoring by the national monetary authority (Kithinki, 2010). research conducted by Das and Ghosh (2007) extensively examined the factors affecting credit risk in the Indian banking sector. The findings of the study … risk was largely impacted by different micro factors including the managerial competencies, institution capacity, institutional risk and also excessive loan growth.
Bank-Specific Factors
research has indicated that different bank-specific factors have an influence on the success of credit risk within the financial institution. The research study conducted by Garr (2013) identified a number……
References
Bhattarai, Y. R. (2016). Effect of credit risk on the performance of Nepalese commercial banks. NRB Economic Review, 28(1), 41-64.
Das, A. and Ghosh, S. (2007). Determinants of Credit Risk in Indian State-owned Banks: An Empirical Investigation. Economic Issues, 12(2): 48-66.
Derelio?lu, G., & Gürgen, F. (2011). Knowledge discovery using neural approach for SME’s credit risk analysis problem in Turkey. Expert Systems with Applications, 38(8), 9313-9318
Garr, D. K. (2013). Determinants of credit risk in the banking industry of Ghana. Developing Country Studies, 3(11), 64-77.
Gizaw, M., Kebede, M., & Selvaraj, S. (2015). The impact of credit risk on profitability performance of commercial banks in Ethiopia. African Journal of Business Management, 9(2), 59-66.
Johnson, B., & Christensen, L. (2008). Educational research: Quantitative, qualitative, and mixed approaches. New York: Sage.
Kithinji, A. M. (2010). Credit risk management and profitability of commercial banks in Kenya. (Doctoral dissertation, University of Nairobi).
Limam, I. (2001). Measuring technical efficiency of Kuwaiti banks. Kuwait: Arab Planning Institute.
Study Document
… provide the context for this study is discussed as well as a review of existing literature on the topic. A qualitative case study research design based on the Just War Theory will be utilized to conduct this research. Data will be collected from professionals in international relations and cyber security as well as existing publications on recent cyber espionage activities by … intelligence gathering approach and strategy for national security decisions. However, cyber espionage remains a form of cyberattack, which is legally and ethically unacceptable.
research Question
Is cyber espionage a method used by state for intelligence gathering a form of unacceptable cyberattack?
How is cyber espionage as an …
How is cyber espionage as an acceptable state behavior for intelligence gathering though it is a form of unacceptable…[break]…data. For this study, the research will adopt an exploratory approach to qualitative case study to gain a deeper understanding of……
Bibliography
Agarwal A. & CERT-IN. “Cyber Espionage, Infiltration and Combating Techniques.” Indian Computer Emergency Response Team, 2013. https://www.cert-in.org.in/Downloader?pageid=5&type=2&fileName=CIPS-2013-0128.pdf
Banks, W.C. “Cyber Espionage and Electronic Surveillance: Beyond the Media Coverage.” Emory law Journal 66, (2017).
Georgieva, I. “The Unexpected Norm-Setters: Intelligence Agencies in Cyberspace.” Contemporary Security Policy (2019).
Hjortdal, M. “China’s Use of Cyber Warfare: Espionage Meets Strategic Deterrence.” Journal of Strategic Security 4, no. 2 (2011).
Libicki, M. “The Coming of Cyber Espionage Norms.” 9th International Conference on Cyber Conflict, 2017. https://ccdcoe.org/uploads/2018/10/Art-01-The-Coming-of-Cyber-Espionage-Norms.pdf " target="_blank" REL="NOFOLLOW">
Study Document
The character of God as revealed in the Biblical text
Table of Contents
Introduction 1
Goal of this research 2
research question 2
Definition of terms 2
Literature review 2
Liberationist hermeneutics 2
Principles guiding hermeneutic liberationist 3
Methodology 4
Search procedure 4
Analysis … Bible Study' within biblical liberation hermeneutics and intercultural biblical hermeneutics." HTS Theological Studies 70, no. 1 (2014): 1-10.] [3: Genesis 9:20-27]
The goal of this research
This study is meant to determine the character of God as revealed in the biblical text, under the hermeneutic liberationist lenses of reading … meant to determine the character of God as revealed in the biblical text, under the hermeneutic liberationist lenses of reading the Bible. This research seeks to explore how contextual biblical hermeneutics, in general, can be put in conversation with the historical-critical (original context) of the approach.
research question
To help in meeting the study goal, this research……
References
Elliott, John E. \\\\\\"Oppression, Exploitation and Injustice in the Old Testament: The View from Liberation Theology.\\\\\\" International Journal of Social Economics, Vol. 19, No. 10/11/12 (1992): 15-52.
Hayes, John H., and Carl R. Holladay. Biblical exegesis: a beginner\\\\\\'s handbook. Westminster John Knox Press, 2007.
Klein, William W., Craig L. Blomberg, and Robert L. Hubbard Jr. Introduction to biblical interpretation. Zondervan Academic, 2017.
Pontifical Biblical Commission. The Interpretation of the Bible in the Church: Address of His Holiness Pope John Paul II and Document of the Pontifical Biblical Commission. Libreria Editrice Vaticana, 1993.
Thiselton, Anthony C. Hermeneutics: an introduction. Wm. B. Eerdmans Publishing, 2009.
Thomas, James, and Angela Harden. \\\\\\"Methods for the thematic synthesis of qualitative research in systematic reviews.\\\\\\" BMC medical research methodology 8, no. 1 (2008): 45.
Tikito, Iman, and Nissrine Souissi. \\\\\\"Meta-analysis of systematic literature review methods.\\\\\\" International Journal of Modern Education and Computer Science 11, no. 2 (2019): 17.
West, Gerald O. \\\\\\"Locating \\\\\\'Contextual Bible Study\\\\\\' within biblical liberation hermeneutics and intercultural biblical hermeneutics.\\\\\\" HTS Theological Studies 70, no. 1 (2014): 1-10.
We have over 150,000+ study documents to help you.
Sign Up for FREE