Saturday, February 9, 2019

RESEARCH METHODS (BASED ON SAUNDERS ET AL. (2016)







RESEARCH METHODS (BASED ON SAUNDERS ET AL. (2016)
By Name










Name of Class
Professor
University
City
Date


Research Methods (Based on Saunders et al. (2016)
Researchers face many challenges while trying to gain access to organizational data. These challenges depend on whether the scholar is an internal researcher or an external researcher. Therefore, it is important to understand ways through which various researchers may overcome the challenges they face. This paper discusses research scenarios that various research may encounter while looking for data.
Part One: Strategies to Gain Access Based on Given Scenarios
a)      An external researcher seeking direct access to managers who will be the research participants:
The external researcher will need to ensure that he or she is familiar with the organization. Besides, Saunders, Thornhill, and Lewis (2016, 229) note that external researchers may use suitable language and facilitate replies to gain access to managers as participants. Therefore, an external researcher will have to familiarize with the organization and use appropriate language as well as facilitate replies to access organizational managers as participants.
b)      An external researcher seeking access through an organizational gatekeeper/broker to their intended participants or respondents:
The researcher may consider developing access incrementally, establishing credibility, and overcoming organizational concerns to gain access to organizational gatekeepers. Besides, it would be appropriate for the researcher to provide a clear account of purpose (Saunders et al., 2016, 229). Therefore, external researchers have huge responsibilities while seeking access to organizational gatekeepers.
c)      An internal researcher planning to undertake a research project within their employing organization:
An internal researcher may use existing contacts to gain access to information within an organization. Besides, the researcher may find it necessary to establish credibility when dealing with unfamiliar individuals (Saunders et al., 2016, 271). Luckily, internal researchers have a significant advantage over external researchers due to prior knowledge and familiarity with the organization.
What Strategy I Will Need
I will need to employ a variety of strategies to gain access in my research. Since I will be investigating whether alpha exists for either active or passive management, my research will be carried out externally. Therefore, I will need to use suitable language, overcome organizational concerns, provide a clear account of the purpose of the research, and develop new contacts while seeking access to organizational information.
Part Two: Strategies for Collecting Primary and Secondary Data
Various techniques can be employed to collect primary and secondary data. The main techniques for collecting primary data include observation, administration of questionnaires, and group interviews. On the other hand, secondary techniques include searching online databases and locating published secondary data.
Advantages and Disadvantages of the Techniques
Table 1: Advantages and disadvantages of the techniques
Technique
Advantages
Disadvantages
Structured observation
·         It can be useful for anyone upon training.
·         It can yield reliable results
·         Data may be difficult to collect.
·         The researcher must be in the research setting in case virtual observation may not be used.
Structured interviews
·         The researcher has the freedom to seek for information of interest.
·         The researcher may not be in control of the responses.
Questionnaires
·         They are easy to administer.
·         Respondents may be unreliable as sources of credible information.
Online databases
·         They provide comparative and contextual data.
·         They can also lead to unforeseen discoveries.
·         They may be collected for unintended purposes.
·         They may contain unsuitable aggregations.
Published secondary data
·         Longitudinal studies may be feasible.
·         They may have fewer resource requirements.
·         Some data may be difficult to access.
·         There is no control over data quality.

The Data I Will Be Using
My research will exploit secondary data to investigate performance of portfolios managed using active and passive management strategies. The most useful technique would be to search the information in published databases both online and in physical libraries. Therefore, it is anticipated that secondary sources would be useful in developing the study.


Reference
Saunders, M., Thornhill, A., & Lewis, P, 2016. Research methods for business students, 7th ed. Pearson Education Limited.

No comments:

Post a Comment