Answered You can buy a ready-made answer or pick a professional tutor to order an original one.

QUESTION

DOC 670 Module 4 - SLPDESIGNING THE TRIANGULATION APPROACH TO ADDRESS THE RESEARCH PROBLEM mediafire.com/file/o1ghbc54oyoc3f3/DOC_670module4_slp_Table_2.xlsx/file In DOC640 you discussed using Dedoose

DOC 670 Module 4 - SLPDESIGNING THE TRIANGULATION APPROACH TO ADDRESS THE RESEARCH PROBLEM

mediafire.com/file/o1ghbc54oyoc3f3/DOC_670module4_slp_Table_2.xlsx/file

In DOC640 you discussed using Dedoose to do content analysis on qualitative data such as interviews. Content analysis can also be done on reports, statements, etc., from secondary data. Using the Strategic Plan from the United Way of Orange County’s website this Word Cloud was produced showing the most frequent words used in the Strategic Plan (the Strategic Plan was posted on the Web and then the text was copied to a Word document).

Some of the words are clearly a part of their strategic mission and could be used to analyze transcripts from interviews later after you receive IRB approval.

Here is an example using Dedoose to analyze transcripts on priorities in Information Security by Information Security Specialists. Here the scenario for this research is described to show you results from the Dedoose analysis.

There were eleven propositions for insider threat for computer systems in an organization, and the propositions were evaluated in terms of importance and timing within an insider risk program. Seven volunteers participated in the research. The interviews were conducted over Zoom with the audio portion of the discussions recorded. Each of the participants was presented with the eleven propositions and discussed each in the interview. While the respondents are anonymous, Table 1 shows their demographics and role in setting up insider threat programs.

Table 1

Participant demographics

The volunteers were recruited from the LinkedIn business networking platform. Over 70 individuals received invitations. Each invitation contained information about the purpose of the study, the fact that there would be a recorded interview, and that the research is carried out under applicable laws that govern research. The Informed Consent document was explained to prospective participants. Once they accepted the LinkedIn invitation, the respondents received a link to a Qualtrics survey containing the Informed Consent document. After they signed the Informed Consent form, it was possible to continue the research using the recorded interview. Of the 73 invitations sent, 25 of the individuals responded in the affirmative. Six withdrew their offer of participation, and others either did not sign the electronic copy of the Informed Consent or could not participate for some other reason. Seven volunteers were the final count of participants.

The central discussion of the interviews was dictated by the research question and the eleven propositions. Those eleven propositions were predetermined as the overarching themes of the interviews. Each proposition was presented to the volunteers one at a time, and then the subject stated their judgments. By signing the informed consent, the subject agreed to the Zoom interview and to have the audio of the interview recorded. Recording the discussions allowed detailed analysis of the conversations using the Dedoose qualitative analysis tool.

Transcription of audio data from the structured interviews occurred in three phases. In the first phase, the audio files underwent automatic transcription to text using a tool called Trint. The second transcription phase consisted of a transcriber listening to the MP3 audio files while reviewing the transcribed text and making corrections to inaccuracies. The third and final step was a second sweep of each text file to ensure that all the corrections had been made. The researcher and one assistant reviewed the transcribed text. The files underwent final validation by the researcher. After transcription of the audio and double-verification for accuracy, the text-based files were placed into Dedoose. Additionally, the demographic data regarding the participants was added as well.

After putting the files into Dedoose, an inductive method was applied to the transcribed data for the data coding. The image below shows a visual example of the coding process. Each transcript was first open coded as the transcriber listens to the audio of the interview. Subsequent passes allowed for linking related ideas in the axial coding part of the analysis. Figure 5 shows an example of the coding process.

Figure 5. Example of Open coding and Axial coding process in Dedoose.

The responses to the 11 propositions were coded according to two criteria, the first criterion is the importance of the proposed practice, and the second criterion is the timeline of implementing the practice when setting up a new insider threat program. Coding of the remainder of the text files from each of the interviews consists of a three-step process. The steps were open coding, axial, and lastly selective coding.

For this project, the 11 propositions provided a pre-existing framework of themes attached to each of the 11 propositions. One set deals with the importance of each proposition and another set deals with the timeliness of each proposition. These two frameworks were entered into Dedoose.

Each of the codes for the two types or characteristics were weighted in a custom fashion. Because there are 11 proposed processes, each code got a weight range of 1 to 11. In Dedoose, the higher the number, the greater the weight. When coding the interview, the researcher can evaluate the mood, context, and emphasis when adding a code weight to an excerpt in the text of each discussion. Figure 6 shows a sample of how each code can be assigned a weight range.

Figure 6. Weight range options set for coding in Dedoose, minimum weight 1, maximum weight 11. Analysis of the transcripts with the coding yielded these results in Dedoose in Table 2.

Table 2

These weights then can be used to interpret the interviews and to produce a graphical analysis.

SLP Assignment Expectations

For your Background analysis, obtain a document from your firm such as a statement from the president, statement to the stockholders, strategic plan, or something of that sort. Then use the WordCloud addin for Word 2016. Here is a video to show you how to obtain the free Addin ProWordCloud: Create A Word Cloud In Microsoft Word - https://www.youtube.com/watch?v=my1JRX84tyc

Now produce a WordCloud from the document you selected. Add to your Background a discussion of the results of the WordCloud and the areas identified. Discuss how these relate to the research question for your DSP. You will NOT use Dedoose here because you can NOT collect any interviews until you have your IRB approval. If you want you can work on using Dedoose to analyze the document you just used to produce a WordCloud; however, this is not required.

Add this to the growing work you have on the Background for the firm you are studying.

Your assignment will be graded using the following criteria:

Assignment-Driven Criteria: Student demonstrates mastery covering all key elements of the assignment.

Critical Thinking/Application to Professional Practice: Student demonstrates mastery conceptualizing the problem and analyzing information. Conclusions are logically presented and applied to professional practice in an exceptional manner.

Business Writing and Quality of References: Student demonstrates mastery and proficiency in written communication and use of appropriate and relevant literature at the doctoral level.

Citing Sources: Student demonstrates mastery applying APA formatting standards to both in text citations and the reference list.

Professionalism and Timeliness: Assignments are submitted on time.

Show more
  • @
  • 5229 orders completed
ANSWER

Tutor has posted answer for $25.00. See answer's preview

$25.00

************************************************************************************************************

or Buy custom answer
LEARN MORE EFFECTIVELY AND GET BETTER GRADES!
Ask a Question