SlideShare une entreprise Scribd logo
1  sur  12
Chapter 14
Qualitative Studies
Qualitative Study Methods
A qualitative study looks for the themes and meanings
that emerge from the observation and evaluation of a
situation or context.
Researchers have intense contact with a selected group
of informants.
Examples of Approaches
• Phenomenology: seeks to understand how
participants understand, interpret, and find meaning
in their own unique life experiences and feelings
• Grounded theory: an inductive reasoning process that
uses observations to develop general theories that
explain human behavior
• Ethnography: aims to develop an insider’s view (an
emic perspective) of how members of a particular
cultural group see their world
Examples of Techniques
• In-depth and semi-structured interviews of
individuals use open-ended questions to explore
viewpoints. The interviewer is allowed to probe for
more details about any response in order to gain fuller
understanding of the participant’s experiences and
perspectives.
• Interviews are often supplemented by other methods,
such as participant diaries or journals.
Examples of Techniques
• Focus groups of about 4 to 12 people are moderated
discussions led by a facilitator from the research
team. The facilitator encourages participants to
interact with one another and to clarify their
individual and shared perspectives.
Examples of Analytic Techniques
• The analysis of qualitative data usually involves
coding and classifying observations and deriving
major and minor themes from the groups of
observations.
• Reports of the findings of qualitative studies often
incorporate quotations that express participants’
perspectives and experiences in their own words.
Consensus Methods
The goal of some studies is to identify areas of
consensus and areas of contention among individuals
who are experts on a particular topic and/or a particular
community or organization.
Delphi Method
The Delphi method is a structured decision-making and
forecasting process in which participants engage in
several rounds of:
•Completing individual questionnaires
•A facilitator summarizing and sharing the responses
•Panelists reconsidering their perspectives after
reflecting on the opinions expressed by others
The goal is for each iteration to move the panel of
experts closer to agreement.
Program Evaluation
• Program evaluation includes a variety of approaches
for provide feedback about what is working well and
what can and should be improved
• The evaluation approach must match the goals of the
assessment
• After gathering evidence from a variety of sources,
practical suggestions are made based on the
conclusions of the assessment
Program Evaluation
Evidence is reviewed and categorized using a
framework like SWOT:
•Strengths (internal organizational strengths)
•Weaknesses (internal organizational limitations)
•Opportunities (external strengths)
•Threats (external limitations, which might be political,
economic, sociocultural, technological, environmental,
or legal)
Program Evaluation
A similar process can be used as a component of other
forms of evaluative research, such as:
•Needs assessment.
•Cost-effectiveness analysis
•Health services research

Contenu connexe

Tendances

Literature search for systematic literature review
Literature search for systematic literature reviewLiterature search for systematic literature review
Literature search for systematic literature reviewKhalid Mahmood
 
Group4 present3 3-15
Group4 present3 3-15Group4 present3 3-15
Group4 present3 3-15gsu3eagle
 
Data extraction in systematic literature review
Data extraction in systematic literature reviewData extraction in systematic literature review
Data extraction in systematic literature reviewKhalid Mahmood
 
Research protocol template
Research protocol templateResearch protocol template
Research protocol templateElaine Chen
 
Chapter 1 - Introduction to Research
Chapter 1 - Introduction to Research Chapter 1 - Introduction to Research
Chapter 1 - Introduction to Research Abolfazl Ghanbary
 
Literature review - Dr. Faisal Al-Allaf
Literature review - Dr. Faisal Al-AllafLiterature review - Dr. Faisal Al-Allaf
Literature review - Dr. Faisal Al-AllafMoayad Alserihi
 
Instrument in research
Instrument in researchInstrument in research
Instrument in researchAnn GHie
 
Problems Encountered By Researcher in Bangladesh.pptx
Problems Encountered By Researcher in Bangladesh.pptxProblems Encountered By Researcher in Bangladesh.pptx
Problems Encountered By Researcher in Bangladesh.pptxMd Fahimuzzaman
 
Unit 7 : Training Others in Student Supervision
Unit 7 : Training Others in Student Supervision Unit 7 : Training Others in Student Supervision
Unit 7 : Training Others in Student Supervision Zainab Noor
 
5 analyzing and synthesizing findings-khalid
5 analyzing and synthesizing findings-khalid5 analyzing and synthesizing findings-khalid
5 analyzing and synthesizing findings-khalidKhalid Mahmood
 
MGT Report Assessment Sheet 2010
MGT Report Assessment Sheet 2010MGT Report Assessment Sheet 2010
MGT Report Assessment Sheet 2010Niki Taylor
 
Writing of Research protocol
Writing of Research protocol Writing of Research protocol
Writing of Research protocol kopalsharma85
 
Protocol for systematic literature review
Protocol for systematic literature reviewProtocol for systematic literature review
Protocol for systematic literature reviewKhalid Mahmood
 

Tendances (20)

Nzare2008
Nzare2008Nzare2008
Nzare2008
 
Literature search for systematic literature review
Literature search for systematic literature reviewLiterature search for systematic literature review
Literature search for systematic literature review
 
Data gathering tools and uses
Data gathering tools and usesData gathering tools and uses
Data gathering tools and uses
 
Group4 present3 3-15
Group4 present3 3-15Group4 present3 3-15
Group4 present3 3-15
 
Data extraction in systematic literature review
Data extraction in systematic literature reviewData extraction in systematic literature review
Data extraction in systematic literature review
 
Research protocol template
Research protocol templateResearch protocol template
Research protocol template
 
Research proposal
Research proposalResearch proposal
Research proposal
 
Module 02
Module 02   Module 02
Module 02
 
Chapter 1 - Introduction to Research
Chapter 1 - Introduction to Research Chapter 1 - Introduction to Research
Chapter 1 - Introduction to Research
 
Making sense out of your data
Making sense out of your dataMaking sense out of your data
Making sense out of your data
 
Literature review - Dr. Faisal Al-Allaf
Literature review - Dr. Faisal Al-AllafLiterature review - Dr. Faisal Al-Allaf
Literature review - Dr. Faisal Al-Allaf
 
Instrument in research
Instrument in researchInstrument in research
Instrument in research
 
Problems Encountered By Researcher in Bangladesh.pptx
Problems Encountered By Researcher in Bangladesh.pptxProblems Encountered By Researcher in Bangladesh.pptx
Problems Encountered By Researcher in Bangladesh.pptx
 
Unit 7 : Training Others in Student Supervision
Unit 7 : Training Others in Student Supervision Unit 7 : Training Others in Student Supervision
Unit 7 : Training Others in Student Supervision
 
5 analyzing and synthesizing findings-khalid
5 analyzing and synthesizing findings-khalid5 analyzing and synthesizing findings-khalid
5 analyzing and synthesizing findings-khalid
 
MGT Report Assessment Sheet 2010
MGT Report Assessment Sheet 2010MGT Report Assessment Sheet 2010
MGT Report Assessment Sheet 2010
 
Elicitation
ElicitationElicitation
Elicitation
 
Qualitative
QualitativeQualitative
Qualitative
 
Writing of Research protocol
Writing of Research protocol Writing of Research protocol
Writing of Research protocol
 
Protocol for systematic literature review
Protocol for systematic literature reviewProtocol for systematic literature review
Protocol for systematic literature review
 

En vedette

Chapter 7: Physical & Environmental Security
Chapter 7: Physical & Environmental Security Chapter 7: Physical & Environmental Security
Chapter 7: Physical & Environmental Security Nada G.Youssef
 
Chapter 13: Regulatory Compliance for Financial Institutions
Chapter 13: Regulatory Compliance for Financial InstitutionsChapter 13: Regulatory Compliance for Financial Institutions
Chapter 13: Regulatory Compliance for Financial InstitutionsNada G.Youssef
 
Chapter 14: Regulatory Compliance for the Healthcare Sector
Chapter 14: Regulatory Compliance for the Healthcare SectorChapter 14: Regulatory Compliance for the Healthcare Sector
Chapter 14: Regulatory Compliance for the Healthcare SectorNada G.Youssef
 
INTRODUCTION TO HEALTHCARE RESEARCH METHODS: Correlational Studies, Case Seri...
INTRODUCTION TO HEALTHCARE RESEARCH METHODS: Correlational Studies, Case Seri...INTRODUCTION TO HEALTHCARE RESEARCH METHODS: Correlational Studies, Case Seri...
INTRODUCTION TO HEALTHCARE RESEARCH METHODS: Correlational Studies, Case Seri...Dr. Khaled OUANES
 
Chapter 15: PCI Compliance for Merchants
Chapter 15: PCI Compliance for Merchants Chapter 15: PCI Compliance for Merchants
Chapter 15: PCI Compliance for Merchants Nada G.Youssef
 

En vedette (14)

83341 ch06 jacobsen
83341 ch06 jacobsen83341 ch06 jacobsen
83341 ch06 jacobsen
 
83341 ch07 jacobsen
83341 ch07 jacobsen83341 ch07 jacobsen
83341 ch07 jacobsen
 
83341 ch09 jacobsen
83341 ch09 jacobsen83341 ch09 jacobsen
83341 ch09 jacobsen
 
83341 ch10 jacobsen
83341 ch10 jacobsen83341 ch10 jacobsen
83341 ch10 jacobsen
 
83341 ch13 jacobsen
83341 ch13 jacobsen83341 ch13 jacobsen
83341 ch13 jacobsen
 
83341 ch11 jacobsen
83341 ch11 jacobsen83341 ch11 jacobsen
83341 ch11 jacobsen
 
83341 ch12 jacobsen
83341 ch12 jacobsen83341 ch12 jacobsen
83341 ch12 jacobsen
 
83341 ch08 jacobsen
83341 ch08 jacobsen83341 ch08 jacobsen
83341 ch08 jacobsen
 
Chapter 7: Physical & Environmental Security
Chapter 7: Physical & Environmental Security Chapter 7: Physical & Environmental Security
Chapter 7: Physical & Environmental Security
 
Chapter 13: Regulatory Compliance for Financial Institutions
Chapter 13: Regulatory Compliance for Financial InstitutionsChapter 13: Regulatory Compliance for Financial Institutions
Chapter 13: Regulatory Compliance for Financial Institutions
 
Chapter 12
Chapter 12Chapter 12
Chapter 12
 
Chapter 14: Regulatory Compliance for the Healthcare Sector
Chapter 14: Regulatory Compliance for the Healthcare SectorChapter 14: Regulatory Compliance for the Healthcare Sector
Chapter 14: Regulatory Compliance for the Healthcare Sector
 
INTRODUCTION TO HEALTHCARE RESEARCH METHODS: Correlational Studies, Case Seri...
INTRODUCTION TO HEALTHCARE RESEARCH METHODS: Correlational Studies, Case Seri...INTRODUCTION TO HEALTHCARE RESEARCH METHODS: Correlational Studies, Case Seri...
INTRODUCTION TO HEALTHCARE RESEARCH METHODS: Correlational Studies, Case Seri...
 
Chapter 15: PCI Compliance for Merchants
Chapter 15: PCI Compliance for Merchants Chapter 15: PCI Compliance for Merchants
Chapter 15: PCI Compliance for Merchants
 

Similaire à 83341 ch14 jacobsen

Rsi 26 5-solooooooo
Rsi 26 5-soloooooooRsi 26 5-solooooooo
Rsi 26 5-soloooooooDilshad Shah
 
Qualitative Methods Course: Moving from Afterthought to Forethought
Qualitative Methods Course: Moving from Afterthought to ForethoughtQualitative Methods Course: Moving from Afterthought to Forethought
Qualitative Methods Course: Moving from Afterthought to ForethoughtMEASURE Evaluation
 
Qualitative Methods Course: Moving from Afterthought to Forethought
Qualitative Methods Course: Moving from Afterthought to ForethoughtQualitative Methods Course: Moving from Afterthought to Forethought
Qualitative Methods Course: Moving from Afterthought to ForethoughtMEASURE Evaluation
 
Introduction to Qualitative Research-Week 1.pptx
Introduction to Qualitative Research-Week 1.pptxIntroduction to Qualitative Research-Week 1.pptx
Introduction to Qualitative Research-Week 1.pptxkiranhashmi
 
Lecture 1 - Qualitative - Introduction.pdf
Lecture 1 - Qualitative - Introduction.pdfLecture 1 - Qualitative - Introduction.pdf
Lecture 1 - Qualitative - Introduction.pdfSaubanAhmed1
 
Class 6 research quality in qualitative methods 3 2-17
Class 6 research quality in qualitative methods 3 2-17Class 6 research quality in qualitative methods 3 2-17
Class 6 research quality in qualitative methods 3 2-17tjcarter
 
Marketing research lecture-7-qualitative research-1
Marketing research lecture-7-qualitative research-1Marketing research lecture-7-qualitative research-1
Marketing research lecture-7-qualitative research-1Ravi K Singh
 
Bmgt 311 chapter_6
Bmgt 311 chapter_6Bmgt 311 chapter_6
Bmgt 311 chapter_6Chris Lovett
 
The-ASSURE-Model (1).pptx
The-ASSURE-Model (1).pptxThe-ASSURE-Model (1).pptx
The-ASSURE-Model (1).pptxHanelynDZAmudio
 
Qualitative Procedure
Qualitative Procedure Qualitative Procedure
Qualitative Procedure zahraa Aamir
 
Research methodology
Research methodologyResearch methodology
Research methodologyPriya Nigan
 
Od 1 - Organisation Development
Od 1 - Organisation DevelopmentOd 1 - Organisation Development
Od 1 - Organisation DevelopmentNaresh Sukhani
 
Qualitative research by Dr. Subraham Pany
Qualitative research by Dr. Subraham PanyQualitative research by Dr. Subraham Pany
Qualitative research by Dr. Subraham PanySubraham Pany
 
Training Delivery Modes and Methods(Report-ProfEd 5)OLAGUERA Mary Ann.pptx
Training Delivery Modes and Methods(Report-ProfEd 5)OLAGUERA Mary Ann.pptxTraining Delivery Modes and Methods(Report-ProfEd 5)OLAGUERA Mary Ann.pptx
Training Delivery Modes and Methods(Report-ProfEd 5)OLAGUERA Mary Ann.pptxOPS
 

Similaire à 83341 ch14 jacobsen (20)

Rsi 26 5-solooooooo
Rsi 26 5-soloooooooRsi 26 5-solooooooo
Rsi 26 5-solooooooo
 
Qualitative Methods Course: Moving from Afterthought to Forethought
Qualitative Methods Course: Moving from Afterthought to ForethoughtQualitative Methods Course: Moving from Afterthought to Forethought
Qualitative Methods Course: Moving from Afterthought to Forethought
 
Qualitative Methods Course: Moving from Afterthought to Forethought
Qualitative Methods Course: Moving from Afterthought to ForethoughtQualitative Methods Course: Moving from Afterthought to Forethought
Qualitative Methods Course: Moving from Afterthought to Forethought
 
BRM Chapter 7.ppt
BRM Chapter 7.pptBRM Chapter 7.ppt
BRM Chapter 7.ppt
 
Introduction to Qualitative Research-Week 1.pptx
Introduction to Qualitative Research-Week 1.pptxIntroduction to Qualitative Research-Week 1.pptx
Introduction to Qualitative Research-Week 1.pptx
 
Lecture 1 - Qualitative - Introduction.pdf
Lecture 1 - Qualitative - Introduction.pdfLecture 1 - Qualitative - Introduction.pdf
Lecture 1 - Qualitative - Introduction.pdf
 
Class 6 research quality in qualitative methods 3 2-17
Class 6 research quality in qualitative methods 3 2-17Class 6 research quality in qualitative methods 3 2-17
Class 6 research quality in qualitative methods 3 2-17
 
Focus Groups
Focus GroupsFocus Groups
Focus Groups
 
Chapter 11
Chapter 11Chapter 11
Chapter 11
 
Chapter 11
Chapter 11Chapter 11
Chapter 11
 
Marketing research lecture-7-qualitative research-1
Marketing research lecture-7-qualitative research-1Marketing research lecture-7-qualitative research-1
Marketing research lecture-7-qualitative research-1
 
Bmgt 311 chapter_6
Bmgt 311 chapter_6Bmgt 311 chapter_6
Bmgt 311 chapter_6
 
The-ASSURE-Model (1).pptx
The-ASSURE-Model (1).pptxThe-ASSURE-Model (1).pptx
The-ASSURE-Model (1).pptx
 
qualmethods.pdf
qualmethods.pdfqualmethods.pdf
qualmethods.pdf
 
Qualitative Procedure
Qualitative Procedure Qualitative Procedure
Qualitative Procedure
 
Methods of teaching
Methods of teachingMethods of teaching
Methods of teaching
 
Research methodology
Research methodologyResearch methodology
Research methodology
 
Od 1 - Organisation Development
Od 1 - Organisation DevelopmentOd 1 - Organisation Development
Od 1 - Organisation Development
 
Qualitative research by Dr. Subraham Pany
Qualitative research by Dr. Subraham PanyQualitative research by Dr. Subraham Pany
Qualitative research by Dr. Subraham Pany
 
Training Delivery Modes and Methods(Report-ProfEd 5)OLAGUERA Mary Ann.pptx
Training Delivery Modes and Methods(Report-ProfEd 5)OLAGUERA Mary Ann.pptxTraining Delivery Modes and Methods(Report-ProfEd 5)OLAGUERA Mary Ann.pptx
Training Delivery Modes and Methods(Report-ProfEd 5)OLAGUERA Mary Ann.pptx
 

Plus de Nada G.Youssef

Chapter 12: Business Continuity Management
Chapter 12: Business Continuity ManagementChapter 12: Business Continuity Management
Chapter 12: Business Continuity ManagementNada G.Youssef
 
Chapter 11: Information Security Incident Management
Chapter 11: Information Security Incident ManagementChapter 11: Information Security Incident Management
Chapter 11: Information Security Incident ManagementNada G.Youssef
 
Chapter 10: Information Systems Acquisition, Development, and Maintenance
			Chapter 10:  Information  Systems Acquisition, Development, and Maintenance			Chapter 10:  Information  Systems Acquisition, Development, and Maintenance
Chapter 10: Information Systems Acquisition, Development, and MaintenanceNada G.Youssef
 
Chapter 9: Access Control Management
Chapter 9: Access Control ManagementChapter 9: Access Control Management
Chapter 9: Access Control ManagementNada G.Youssef
 
Chapter 8: Communications and Operations Security
Chapter 8: Communications and Operations SecurityChapter 8: Communications and Operations Security
Chapter 8: Communications and Operations SecurityNada G.Youssef
 
Chapter 6: Human Resources Security
Chapter 6: Human Resources SecurityChapter 6: Human Resources Security
Chapter 6: Human Resources SecurityNada G.Youssef
 
Chapter 5: Asset Management
Chapter 5: Asset ManagementChapter 5: Asset Management
Chapter 5: Asset ManagementNada G.Youssef
 

Plus de Nada G.Youssef (20)

مجلة 1
مجلة 1مجلة 1
مجلة 1
 
Chapter Tewlve
Chapter TewlveChapter Tewlve
Chapter Tewlve
 
Chapter Eleven
Chapter ElevenChapter Eleven
Chapter Eleven
 
Chapter Ten
Chapter TenChapter Ten
Chapter Ten
 
Chapter Nine
Chapter NineChapter Nine
Chapter Nine
 
Chapter Eight
Chapter Eight Chapter Eight
Chapter Eight
 
Chapter Seven
Chapter SevenChapter Seven
Chapter Seven
 
Chapter Six
Chapter SixChapter Six
Chapter Six
 
Chapter Five
Chapter FiveChapter Five
Chapter Five
 
Chapter Four
Chapter FourChapter Four
Chapter Four
 
Chapter Three
Chapter ThreeChapter Three
Chapter Three
 
Chapter Two
Chapter TwoChapter Two
Chapter Two
 
Chapter one
Chapter oneChapter one
Chapter one
 
Chapter 12: Business Continuity Management
Chapter 12: Business Continuity ManagementChapter 12: Business Continuity Management
Chapter 12: Business Continuity Management
 
Chapter 11: Information Security Incident Management
Chapter 11: Information Security Incident ManagementChapter 11: Information Security Incident Management
Chapter 11: Information Security Incident Management
 
Chapter 10: Information Systems Acquisition, Development, and Maintenance
			Chapter 10:  Information  Systems Acquisition, Development, and Maintenance			Chapter 10:  Information  Systems Acquisition, Development, and Maintenance
Chapter 10: Information Systems Acquisition, Development, and Maintenance
 
Chapter 9: Access Control Management
Chapter 9: Access Control ManagementChapter 9: Access Control Management
Chapter 9: Access Control Management
 
Chapter 8: Communications and Operations Security
Chapter 8: Communications and Operations SecurityChapter 8: Communications and Operations Security
Chapter 8: Communications and Operations Security
 
Chapter 6: Human Resources Security
Chapter 6: Human Resources SecurityChapter 6: Human Resources Security
Chapter 6: Human Resources Security
 
Chapter 5: Asset Management
Chapter 5: Asset ManagementChapter 5: Asset Management
Chapter 5: Asset Management
 

83341 ch14 jacobsen

  • 1.
  • 3. Qualitative Study Methods A qualitative study looks for the themes and meanings that emerge from the observation and evaluation of a situation or context. Researchers have intense contact with a selected group of informants.
  • 4. Examples of Approaches • Phenomenology: seeks to understand how participants understand, interpret, and find meaning in their own unique life experiences and feelings • Grounded theory: an inductive reasoning process that uses observations to develop general theories that explain human behavior • Ethnography: aims to develop an insider’s view (an emic perspective) of how members of a particular cultural group see their world
  • 5. Examples of Techniques • In-depth and semi-structured interviews of individuals use open-ended questions to explore viewpoints. The interviewer is allowed to probe for more details about any response in order to gain fuller understanding of the participant’s experiences and perspectives. • Interviews are often supplemented by other methods, such as participant diaries or journals.
  • 6. Examples of Techniques • Focus groups of about 4 to 12 people are moderated discussions led by a facilitator from the research team. The facilitator encourages participants to interact with one another and to clarify their individual and shared perspectives.
  • 7. Examples of Analytic Techniques • The analysis of qualitative data usually involves coding and classifying observations and deriving major and minor themes from the groups of observations. • Reports of the findings of qualitative studies often incorporate quotations that express participants’ perspectives and experiences in their own words.
  • 8. Consensus Methods The goal of some studies is to identify areas of consensus and areas of contention among individuals who are experts on a particular topic and/or a particular community or organization.
  • 9. Delphi Method The Delphi method is a structured decision-making and forecasting process in which participants engage in several rounds of: •Completing individual questionnaires •A facilitator summarizing and sharing the responses •Panelists reconsidering their perspectives after reflecting on the opinions expressed by others The goal is for each iteration to move the panel of experts closer to agreement.
  • 10. Program Evaluation • Program evaluation includes a variety of approaches for provide feedback about what is working well and what can and should be improved • The evaluation approach must match the goals of the assessment • After gathering evidence from a variety of sources, practical suggestions are made based on the conclusions of the assessment
  • 11. Program Evaluation Evidence is reviewed and categorized using a framework like SWOT: •Strengths (internal organizational strengths) •Weaknesses (internal organizational limitations) •Opportunities (external strengths) •Threats (external limitations, which might be political, economic, sociocultural, technological, environmental, or legal)
  • 12. Program Evaluation A similar process can be used as a component of other forms of evaluative research, such as: •Needs assessment. •Cost-effectiveness analysis •Health services research