RESEARCH METHODS (BASED ON
SAUNDERS ET AL. (2016)
By Name
Name of Class
Professor
University
City
Date
Research Methods (Based on
Saunders et al. (2016)
Researchers face many challenges while trying
to gain access to organizational data. These challenges depend on whether the
scholar is an internal researcher or an external researcher. Therefore, it is
important to understand ways through which various researchers may overcome the
challenges they face. This paper discusses research scenarios that various
research may encounter while looking for data.
Part One: Strategies to
Gain Access Based on Given Scenarios
a)
An external researcher seeking direct access to managers who will be the
research participants:
The external researcher will need to ensure that he or
she is familiar with the organization. Besides, Saunders, Thornhill, and Lewis
(2016, 229) note that external researchers may use suitable language and
facilitate replies to gain access to managers as participants. Therefore, an
external researcher will have to familiarize with the organization and use
appropriate language as well as facilitate replies to access organizational
managers as participants.
b)
An external researcher seeking access through an organizational
gatekeeper/broker to their intended participants or respondents:
The researcher may consider developing access
incrementally, establishing credibility, and overcoming organizational concerns
to gain access to organizational gatekeepers. Besides, it would be appropriate
for the researcher to provide a clear account of purpose (Saunders et al., 2016,
229). Therefore, external researchers have huge responsibilities while seeking
access to organizational gatekeepers.
c)
An internal researcher planning to undertake a research project within
their employing organization:
An internal researcher may use existing
contacts to gain access to information within an organization. Besides, the
researcher may find it necessary to establish credibility when dealing with
unfamiliar individuals (Saunders et al., 2016, 271). Luckily, internal
researchers have a significant advantage over external researchers due to prior
knowledge and familiarity with the organization.
What Strategy I Will Need
I will need to employ a variety of strategies
to gain access in my research. Since I will be investigating whether alpha
exists for either active or passive management, my research will be carried out
externally. Therefore, I will need to use suitable language, overcome organizational
concerns, provide a clear account of the purpose of the research, and develop
new contacts while seeking access to organizational information.
Part Two: Strategies for
Collecting Primary and Secondary Data
Various techniques can be employed to collect
primary and secondary data. The main techniques for collecting primary data
include observation, administration of questionnaires, and group interviews. On
the other hand, secondary techniques include searching online databases and
locating published secondary data.
Advantages and
Disadvantages of the Techniques
Table 1: Advantages and disadvantages of the
techniques
|
Technique
|
Advantages
|
Disadvantages
|
|
Structured observation
|
·
It can be useful for anyone upon training.
·
It can yield reliable results
|
·
Data may be difficult to collect.
·
The researcher must be in the research setting in case
virtual observation may not be used.
|
|
Structured interviews
|
·
The researcher has the freedom to seek for information
of interest.
|
·
The researcher may not be in control of the responses.
|
|
Questionnaires
|
·
They are easy to administer.
|
·
Respondents may be unreliable as sources of credible
information.
|
|
Online databases
|
·
They provide comparative and contextual data.
·
They can also lead to unforeseen discoveries.
|
·
They may be collected for unintended purposes.
·
They may contain unsuitable aggregations.
|
|
Published secondary data
|
·
Longitudinal studies may be feasible.
·
They may have fewer resource requirements.
|
·
Some data may be difficult to access.
·
There is no control over data quality.
|
The Data I Will Be Using
My research will exploit secondary data to
investigate performance of portfolios managed using active and passive
management strategies. The most useful technique would be to search the
information in published databases both online and in physical libraries. Therefore,
it is anticipated that secondary sources would be useful in developing the
study.
Reference
No comments:
Post a Comment