SlideShare a Scribd company logo
1 of 12
Chapter III: Methodology
As observed in recent years, large organizations are facing
multiple data breaches from hackers who are trying to steal
sensitive information. With the increase in technology, attackers
with malicious intent are finding advanced methods to breach
into the organization or even simple by exploiting known risks
that could have been avoided by the organization by updating
their systems on a regular basis (Alawneh, 2008). The most
recent breach that we all were aware off was the Equifax data
breach where it was reported that millions of its customers
personal identifiable information (PII) were stolen, information
such as social security number , an individual’s name, financial
record, driver’s license number, etcetera.. The purpose of this
paper is to how organizations can protect themselves from data
breaches. What are the ways in which their data can be exposed
and does employee awareness will help organizations protect
themselves from being attacked from various sources?
Design of the study:
The data collected in this paper was a mixed approach. The
collected data was both qualitative and quantitative in nature.
The researcher developed a questionnaire containing both open-
ended and close-ended questions and all of this was
administered through LimeSurvey. And most of the participants
response was recorded when they were trying to explain their
understanding of a breach and how data leaks can be classified
into intentional threats and inadvertent threats as these
recording were transliterated for further analysis using otter
A.I. And each session from the participant lasted from 45 – 90
minutes depending on the tasks being performed.
Data collection and participants:
All the participants involved in the sessions have worked or
currently working in financial organizations. Participants read
and signed a consent form explaining the purpose of the
research and were given the option to skip a question if they
feel uncomfortable in answering a question. Participants were
recruited through ads from social media and from known
contacts whose education and work experience are related to the
study that was being conducted. There were around 50
participants in total, 30 males and 20 females, they ranged in
age from 24 - 57. When asked about data breaches and do they
know who their organizations protect itself from data breaches
as part of employee awareness, 40 said yes and 10 said no. And
when asked about taking or participating in any data security
training conducted by the organizations, 35 said yes and 15 said
no. And when asked about recording their answers on a device
45 said yes and 5 said no, For the 5, we noted down their
answers on a paper with their consent.
Data analysis and Sampling procedures:
The participants responses were addressed in two sections
which are quantitative and qualitative. When analyzing the
qualitative data from the questionnaire we conducted a thematic
analysis in order to better analyze the participants response to
the open-ended questions (Namey, 2012). The researcher was
mostly focused on finding a pattern, a trend or an similar ideas
that will help in outlining the analysis. The researcher
developed some code to identify similar themes and patterns.
Then started to build an initial summary or view of these codes
to identify the patterns in which the participants talked about
how insider threats and data breaches and their choice of words
and simultaneously looking for the alternative where they had
different views/insights on a data breach. The top-level codes
were associated with our research questions as they were
primarily focused on (1) How many years have you been
working in financial sector? (2) What are some the standard
security measures that are in place? (3) How does your
organization handle data breaches? (4) What are the
consequences of a data breach? (5) How do you as an employee
protect yourself from being a victim of a data breach? Several
subcategories were created based on the response from the
participants but note that the above are all high-level categories
which are all clustered. Analysis were also conducted on the
questionnaire or the survey whereby aggregating the score from
positive minus to the negative ones. Each response to the
question were scored 1 - 5 where 1 is always 5 is never and 3 is
sometimes.
References:
Julisch K, Dacier M (2002). Mining intrusion detection alarms
for actionable knowledge. In: Proceedings of the Eighth ACM
SIGKDD International Conference on Knowledge Discovery and
Data Mining
Alawneh M, Abbadi IM (2008). Preventing information leakage
between collaborating organisations. In: Proceedings of the 10th
International Conference on Electronic Commerce , ICEC.
Identity theft resource center (2019). Retrieved from
https://www.idtheftcenter.org/ data-breaches/. Accessed: 2019-
04-1.
Namey E. Guest G., MacQueen K. M (2012). Introduction to
Applied Thematic Analysis. Applied Thematic Analysis. SAGE
Publications.
Meets ExpectationsChapter Three: Methodology
Meets Expectations
Introduction
Servant leadership has been studied in multiple contexts since it
was introduced as a leadership theory by Greenleaf (1970,
1977). This study sought to contextualize the servant leadership
of a college president and the diffusion of that leadership style
to other levels of the college administration by career
administrators in higher education. The primary research
question in this study was: To what extent does servant
leadership by a college president diffuse to other leaders at the
institution? Based on the literature (Liden et al., 2014; Newman
et al., 2018) one would expect to see some sort of conveyance
of servant leadership to lower echelons of the institutional
administration given that servant leaders attempt to empower
their followers as leaders (Jeyaraj & Gandolfi, 2019).
Research Paradigm
Using Liu’s (2019) methodology as a loose guide, this study
used a qualitative research paradigm. Qualitative research
attempts to understand how individuals or a group perceive,
experience, and engage with a phenomenon or problem
(Creswell & Creswell, 2018). Specifically, this study took a
phenomenological approach which allowed the participants to
expound upon their lived experiences of the phenomenon of
servant leadership and its diffusion through the administration
of an institution of higher education. Phenomenological
research seeks to explore the lived experiences of humans and
how they make sense of those experiences (Moustakas, 1994).
Research Design
In her study of servant leadership by one leader in a large
information technology company, Liu (2019) designed a
research project focused on the leader with additional
interviews of the members of his team. This study adopted a
similar approach with modifications given the difference in
studies and what is being studied. Liu (2019) was concerned
with the intersection of race, gender, and servant leadership
whereas this study focused on the conveyance of the principles
of servant leadership throughout an organization.
Phenomenological research considers the primary source of
information to be the perceptions and disclosures of the
participants (Moustakas, 1994). Two methods of data collection
were used: semi-structured interviews and observations.
Over the course of a month, four approximately two-hour
interviews were conducted with the president of Connelly
College (the principal subject). The initial interview was semi -
structured and sought to collect background information on and
thoughts about the subject’s background and his development as
a servant leader. Subsequent interviews were casual and
unstructured focusing on thoughts from previous interviews,
themes arising in other interviews (see below), and comments
on current events relevant to leadership in higher education.
Because of the informal nature of these interviews it was
impossible to present a formal interview protocol, however,
please refer to Appendix C for an informal protocol and guiding
thoughts.
In addition to interviews with the college president,
approximately 90-minute interviews were conducted with five
members of the president’s cabinet including administrators
responsible for finance, human resources, academics, ministry
and mission, and student affairs. These interviews were semi -
structured and focused on the administrator’s thoughts of the
president as a servant leader and if and how they in turn enact
servant leadership in their own areas. Please refer to Appendix
D for an informal interview protocol for these interviews.
A third and final category of interviews were conducted with
one administrator each of whom reports to one of the five
administrators identified above. These interviews were
approximately 90-minutes in length and followed a semi-
structured approach. The same informal interview protocol
found in Appendix D was used in these interviews. In addition
to interviews, field observations were gathered from attendance
at two president’s cabinet meetings.
Research Site and Data Collection Sources
The research and primary data collection site for this study was
Connelly College. Several interviews occurred at nearby
restaurants or cafes as needed to accommodate participant
schedules. Connelly College is a very small, coeducational, and
faith-based college classified as a masters two institution by the
Carnegie Classification (need citation). Located in a suburban
area of a Mid-Atlantic state, Connelly serves a diverse
population with a significant population of first-generation
college students. This site was selected because of its proximity
to the researcher’s place of employment and his familiarity with
both the institution and many of its administrators. Both
Connelly College and the researcher’s institution are members
of a consortium of institutions in the geographic region.
The primary subject in this study was Brian, who has served as
the president of Connelly for approximately one year. Prior to
arriving at Connelly, Brian was the president of a medium
sized, private, nonsectarian university in the Midwest. A career
administrator in higher education, Brian received his doctorate
in education only three years prior to becoming the president of
Connelly. Brian has spoken and written about his orientation as
a servant leader.
In addition to Brian, the following people were identified for
this study based on recommendations from Brian:
· Bruce – Executive-level administrator who holds a doctorate
· Betty – Mid-level administrator who holds a master’s degree
and reports to Bruce
· Debbie – Senior administrator who holds a master’s degree
· Anna – Mid-level administrator who holds a master’s degree
and reports to Debbie
· Madeline – Executive-level administrator who holds a
doctorate
· Cathy – Senior administrator who holds a master’s degree and
reports to Madeline
· Grace – Executive-level administrator who holds a master’s
degree and is a member of the founding religious order of the
college
· Evelyn – Mid-level administrator who holds a doctorate and
reports to Grace
· Wade – Senior administrator who holds a master’s degree
· Bridget – Mid-level administrator who holds a master’s degree
and reports to Wade
The names of all participants have been changed and limited
information is provided here in order to maintain their privacy.
All participants were provided with information regarding the
process of the study and what was involved. Each participant
completed an informed consent document before their interview
began. A copy of the informed consent document is available in
Appendix B.
Prior to the beginning of this study, all materials and plans were
submitted for review by the Institutional Review Board (IRB) of
the University of the Cumberlands and the IRB of Connelly
College. Both IRBs have approved this project and copies of
their approval can be found in Appendix A.
Each interview was recorded with both a digital recorder and a
cell phone-based recording application and transcribed using
Amazon Transcribe. Transcriptions of each interview was sent
to the respective participant and each participant was offered an
audio file of their interview.
Analysis
Phenomenological research generates a large amount of raw
data which must be analyzed. However, before any analysis was
conducted, the researcher reviewed his own notes and bracketed
his own assumptions and judgements. This step is recommended
by Moustakas (1994) in order to eliminate as much research bias
as possible before data is analyzed. Though it is impossible to
completely eliminate research bias in a qualitative and
phenomenological study, this step is very helpful in reducing
that bias. Moustakas (1994) identified four steps in analyzing
phenomenological data: reduction, horizontalization,
imaginative variation, and essence. The first step, reduction, is
achieved by reducing the data into common themes and
experiences as discussed by the participants. The second step,
horizontalization, requires the researcher to obtain a “30,000
foot” view of the data in hopes of viewing it equally. The third
step, imaginative variation, asks the researcher to view the data
from counter and congruent perspectives. The fourth and final
step, essence, draws the data and the other steps together to
form an essence of the phenomenon and the experiences of the
participants.
The researcher proceeded through the analysis process outlined
above. He opted for structural coding with a set of a priori
themes and references derived from the literature including
listening, imagination, acceptance, accountability, persuasion,
and conceptualization (Heyler & Martin, 2018); and
empowering, helping subordinates grow and succeed, and
behaving ethically (Liden et al., 2014). Emergent themes not
suggested by the literature were also noted and coded as part of
the process. The coding process and analysis was primarily
conducted manually, but NVivo qualitative research software
was used for data storage and assistance in identifying emergent
themes.
Other Considerations
While all studies admit of some limitations, this study was
potentially limited in the following ways. First, the sample
consisted of individuals, including the president and three
executive-level administrators, at a very small college. Though
every assurance was given and step taken to reasonably
guarantee the confidentiality of the data, some lower ranking
administrators may have felt less inclined to share their full
perspective. Second, Brian, the primary participant and
president of Connelly College has only served in this role for
one year. Once Brian has been in his position for more years
there may be further diffusion of servant leadership throughout
the administration.
References
Creswell, J. W. & Creswell, J. D. (2018). Research design:
Qualitative, quantitative, and mixed methods approaches. (5th
ed.). Sage.
Greenleaf, R. K. (1970). The servant as leader. The Robert K.
Greenleaf Center.
Greenleaf, R. K. (1977). Servant leader: A journey into the
nature of legitimate power and greatness. Paulist Press.
Heyler, S. G. & Martin, J. A. (2018). Servant leadership theory:
Opportunities for additional theoretical integration. Journal of
Managerial Issues, 30(2), 230-243.
Jeyaraj, J. J. & Gandolfi, F. (2019). Exploring trust, dialogue,
and empowerment in servant leadership: Insights from critical
pedagogy. Journal of Management Research, 19(4), 285-290.
Liden, R. C., Wayne, S. J., Liao, C., & Meuser, J. D. (2014).
Servant leadership and serving culture: Influence on individual
and unit performance. Academy of Management Journal, 57(5),
1434- 1452.
Liu, H. (2019). Just the servant: An intersectional critique of
servant leadership. Journal of Business Ethics, 156(4), 1099-
1112.
Moustakas, C. (1994). Phenomenological research methods.
Sage.
Newman, A., Neesham, C., Manville, G., & Tse, H. H. M.
(2018). Examining the influence of servant and entrepreneurial
leadership on the work outcomes of employees in social
enterprises. The International Journal of Human Resource
Management, 29(20), 2905-2926.
Step 2: Using the electronic databases, find an article published
in the last seven (7) years in an APA journal with a focus on
Personality (e.g., Journal of Personality and Social Psychology
or Personality and Personality Disorders). The article should
describe, specifically, an experiment or empirical study by the
researchers. This means that the researchers conducted a study
that contains easily identifiable independent and dependent
variables. (Do not select meta-analyses, summaries, editorials,
or theoretical articles. It is your responsibility to make sure
that the journal article you select is appropriate. If you are
unsure about the relevance of your article, contact your
instructor for approval.).
Step 3: Read the article starting with the Title and Abstract,
which will give you a quick preview of the purpose and results
of the article.
Step 4: Read the Introduction. Highlight the purpose of the
article and the author’s hypothesis (e.g., what was studied, what
the authors predicted, and why they found the topic worthy of
study). Pay attention to the context provided for the research
(i.e., what research has been done previously in the field? what
issue or problem is this study trying to address?)
Step 5: Read the Methods section. Note the description of the
participants and any tests, surveys, questionnaires, apparatus, or
other materials that were used. Pay particular attention to the
details involved in the experimental procedure. How were the
variables manipulated or measured? Recall that the Independent
Variable (IV) is the variable that is manipulated by the research
(i.e., whether the room is hot or cold (if that is the variable of
interest) or whether participants are given a placebo, shown any
type of media or other stimuli, given talk therapy, or instructed
to take medication (if that is the variable of interest). Remember
that the Independent Variable is what was different about the
experiences of the different groups. Recall also that the
Dependent Variable (DV) is that variable that is measured, or,
the outcome of the study (i.e., test performance or lessening of
depressive symptoms).
Step 6: Read the Results. Try not to get intimidated by complex
statistical analysis. Instead of focusing on the numbers, focus
on the short descriptions that accompany the findings
explaining what the researchers found (i.e., Did the researchers
find evidence that supports their hypothesis?)
Step 7: Read the Discussion. Pay special attention here to what
the authors say about the importance of their findings or the
lack of findings. Think about other things you could do to look
at this issue.
Step 8: Prepare a 2 to 5 page summary of the article in your
own words. Be sure to address the following questions in your
summary:
What is the purpose of the research? (Address specifics
regarding the overall purpose of the research in question.)
What hypothesis is tested? (Provide a clear statement of the
researchers’ prediction.)
How did the researchers investigate their research question?
(Provide details regarding the study methodology.)
What are the pertinent results of the manipulation? (What were
the findings and conclusions drawn?)
What is your personal opinion of the study conducted? Should it
be repeated? What could be improved?
What is your overall impression of the work? What are the
implications of the study for the practice of counseling
psychology?
Your summary should be written as a coherent essay (do not
format as a list of answers to these questions). You may include
additional insights in your analysis, but you must address these
key issues.
Step 9: Prepare your Article Review according to the following
guidelines:
Structure your paper utilizing APA style (7th Edition); this
includes title page, headings, in-text citations, reference page,
and general paper format (1-inch margins, double-spaced,
appropriately sized sans serif or serif fonts - e.g., 12 Times
Roman). An abstract is not required.
Apply sound writing mechanics: write with clarity, paying
attention to spelling, grammar, and syntax.
Submit to your Assignment Folder as a single document in
either Microsoft Word, PDF, or RTF format.

More Related Content

Similar to Chapter III: Methodology and Research Design for Studying Servant Leadership Diffusion

6SURVEY REPORT INTRODUCTIONManagement .docx
6SURVEY REPORT INTRODUCTIONManagement .docx6SURVEY REPORT INTRODUCTIONManagement .docx
6SURVEY REPORT INTRODUCTIONManagement .docxalinainglis
 
Qualitative And Quantitative Research Methodologies
Qualitative And Quantitative Research MethodologiesQualitative And Quantitative Research Methodologies
Qualitative And Quantitative Research MethodologiesMegan Jones
 
Levels Of Security Risks And Methods Of Mitigation
Levels Of Security Risks And Methods Of MitigationLevels Of Security Risks And Methods Of Mitigation
Levels Of Security Risks And Methods Of MitigationSusan Kennedy
 
During the past few weeks, you have considered the various elements .docx
During the past few weeks, you have considered the various elements .docxDuring the past few weeks, you have considered the various elements .docx
During the past few weeks, you have considered the various elements .docxshandicollingwood
 
Three Basic Job Evaluation Methods
Three Basic Job Evaluation MethodsThree Basic Job Evaluation Methods
Three Basic Job Evaluation MethodsAshley Lovato
 
Qualitative Data Analysis Paper
Qualitative Data Analysis PaperQualitative Data Analysis Paper
Qualitative Data Analysis PaperMichelle Love
 

Similar to Chapter III: Methodology and Research Design for Studying Servant Leadership Diffusion (11)

6SURVEY REPORT INTRODUCTIONManagement .docx
6SURVEY REPORT INTRODUCTIONManagement .docx6SURVEY REPORT INTRODUCTIONManagement .docx
6SURVEY REPORT INTRODUCTIONManagement .docx
 
Qualitative And Quantitative Research Methodologies
Qualitative And Quantitative Research MethodologiesQualitative And Quantitative Research Methodologies
Qualitative And Quantitative Research Methodologies
 
RESEARCH PROJECT .docx
RESEARCH PROJECT                                                  .docxRESEARCH PROJECT                                                  .docx
RESEARCH PROJECT .docx
 
Levels Of Security Risks And Methods Of Mitigation
Levels Of Security Risks And Methods Of MitigationLevels Of Security Risks And Methods Of Mitigation
Levels Of Security Risks And Methods Of Mitigation
 
Qualitative Research
Qualitative ResearchQualitative Research
Qualitative Research
 
During the past few weeks, you have considered the various elements .docx
During the past few weeks, you have considered the various elements .docxDuring the past few weeks, you have considered the various elements .docx
During the past few weeks, you have considered the various elements .docx
 
Three Basic Job Evaluation Methods
Three Basic Job Evaluation MethodsThree Basic Job Evaluation Methods
Three Basic Job Evaluation Methods
 
Essay Methods
Essay MethodsEssay Methods
Essay Methods
 
Qualitative Essay
Qualitative EssayQualitative Essay
Qualitative Essay
 
Qualitative Data Analysis Paper
Qualitative Data Analysis PaperQualitative Data Analysis Paper
Qualitative Data Analysis Paper
 
Examples Of Research Essays
Examples Of Research EssaysExamples Of Research Essays
Examples Of Research Essays
 

More from JinElias52

my professor ask me this question what should be answer(your resea.docx
my professor ask me this question what should be answer(your resea.docxmy professor ask me this question what should be answer(your resea.docx
my professor ask me this question what should be answer(your resea.docxJinElias52
 
My assignment is to create a 12-page argumentativepersuasive rese.docx
My assignment is to create a 12-page argumentativepersuasive rese.docxMy assignment is to create a 12-page argumentativepersuasive rese.docx
My assignment is to create a 12-page argumentativepersuasive rese.docxJinElias52
 
Myths in Neolithic Cultures Around the Globe Please respond to th.docx
Myths in Neolithic Cultures Around the Globe Please respond to th.docxMyths in Neolithic Cultures Around the Globe Please respond to th.docx
Myths in Neolithic Cultures Around the Globe Please respond to th.docxJinElias52
 
Myths in Neolithic Cultures Around the GlobePlease respond to .docx
Myths in Neolithic Cultures Around the GlobePlease respond to .docxMyths in Neolithic Cultures Around the GlobePlease respond to .docx
Myths in Neolithic Cultures Around the GlobePlease respond to .docxJinElias52
 
Mycobacterium tuberculosisYou must review the contents of your n.docx
Mycobacterium tuberculosisYou must review the contents of your n.docxMycobacterium tuberculosisYou must review the contents of your n.docx
Mycobacterium tuberculosisYou must review the contents of your n.docxJinElias52
 
My TopicI would like to do my case application on Helen Keller’s.docx
My TopicI would like to do my case application on Helen Keller’s.docxMy TopicI would like to do my case application on Helen Keller’s.docx
My TopicI would like to do my case application on Helen Keller’s.docxJinElias52
 
My topic is the terms a Congress person serves and debate on adding .docx
My topic is the terms a Congress person serves and debate on adding .docxMy topic is the terms a Congress person serves and debate on adding .docx
My topic is the terms a Congress person serves and debate on adding .docxJinElias52
 
My topic is anywhere, anytime information work, which means tele-wor.docx
My topic is anywhere, anytime information work, which means tele-wor.docxMy topic is anywhere, anytime information work, which means tele-wor.docx
My topic is anywhere, anytime information work, which means tele-wor.docxJinElias52
 
My topic for module-2 reaction paper was on news, data, and other me.docx
My topic for module-2 reaction paper was on news, data, and other me.docxMy topic for module-2 reaction paper was on news, data, and other me.docx
My topic for module-2 reaction paper was on news, data, and other me.docxJinElias52
 
My Topic for the paper I would like to do my case application on He.docx
My Topic for the paper I would like to do my case application on He.docxMy Topic for the paper I would like to do my case application on He.docx
My Topic for the paper I would like to do my case application on He.docxJinElias52
 
n a 2 page paper, written in APA format using proper spellinggramma.docx
n a 2 page paper, written in APA format using proper spellinggramma.docxn a 2 page paper, written in APA format using proper spellinggramma.docx
n a 2 page paper, written in APA format using proper spellinggramma.docxJinElias52
 
My research proposal is  on fall prevention WRTG 394 s.docx
My research proposal is  on fall prevention WRTG 394 s.docxMy research proposal is  on fall prevention WRTG 394 s.docx
My research proposal is  on fall prevention WRTG 394 s.docxJinElias52
 
My portion of the group assignment Must be done by Wednesday even.docx
My portion of the group assignment Must be done by Wednesday even.docxMy portion of the group assignment Must be done by Wednesday even.docx
My portion of the group assignment Must be done by Wednesday even.docxJinElias52
 
my project is about construcation houses for poor poeple in Denver .docx
my project is about construcation houses for poor poeple in Denver .docxmy project is about construcation houses for poor poeple in Denver .docx
my project is about construcation houses for poor poeple in Denver .docxJinElias52
 
my name is abdullah aljedanii am from saudi arabia i graduate fr.docx
my name is abdullah aljedanii am from saudi arabia i graduate fr.docxmy name is abdullah aljedanii am from saudi arabia i graduate fr.docx
my name is abdullah aljedanii am from saudi arabia i graduate fr.docxJinElias52
 
My hypothesis Being disconnected from social media (texting, Facebo.docx
My hypothesis Being disconnected from social media (texting, Facebo.docxMy hypothesis Being disconnected from social media (texting, Facebo.docx
My hypothesis Being disconnected from social media (texting, Facebo.docxJinElias52
 
My group is the Los Angeles Rams. We are looking to be sponsors with.docx
My group is the Los Angeles Rams. We are looking to be sponsors with.docxMy group is the Los Angeles Rams. We are looking to be sponsors with.docx
My group is the Los Angeles Rams. We are looking to be sponsors with.docxJinElias52
 
My Captain does not answer, his lips are pale and still;My father .docx
My Captain does not answer, his lips are pale and still;My father .docxMy Captain does not answer, his lips are pale and still;My father .docx
My Captain does not answer, his lips are pale and still;My father .docxJinElias52
 
My character is Phoenix Jackson from the story A Worn PathMLA Form.docx
My character is Phoenix Jackson from the story A Worn PathMLA Form.docxMy character is Phoenix Jackson from the story A Worn PathMLA Form.docx
My character is Phoenix Jackson from the story A Worn PathMLA Form.docxJinElias52
 
My assignment is to write an original essay of four to fivr parargra.docx
My assignment is to write an original essay of four to fivr parargra.docxMy assignment is to write an original essay of four to fivr parargra.docx
My assignment is to write an original essay of four to fivr parargra.docxJinElias52
 

More from JinElias52 (20)

my professor ask me this question what should be answer(your resea.docx
my professor ask me this question what should be answer(your resea.docxmy professor ask me this question what should be answer(your resea.docx
my professor ask me this question what should be answer(your resea.docx
 
My assignment is to create a 12-page argumentativepersuasive rese.docx
My assignment is to create a 12-page argumentativepersuasive rese.docxMy assignment is to create a 12-page argumentativepersuasive rese.docx
My assignment is to create a 12-page argumentativepersuasive rese.docx
 
Myths in Neolithic Cultures Around the Globe Please respond to th.docx
Myths in Neolithic Cultures Around the Globe Please respond to th.docxMyths in Neolithic Cultures Around the Globe Please respond to th.docx
Myths in Neolithic Cultures Around the Globe Please respond to th.docx
 
Myths in Neolithic Cultures Around the GlobePlease respond to .docx
Myths in Neolithic Cultures Around the GlobePlease respond to .docxMyths in Neolithic Cultures Around the GlobePlease respond to .docx
Myths in Neolithic Cultures Around the GlobePlease respond to .docx
 
Mycobacterium tuberculosisYou must review the contents of your n.docx
Mycobacterium tuberculosisYou must review the contents of your n.docxMycobacterium tuberculosisYou must review the contents of your n.docx
Mycobacterium tuberculosisYou must review the contents of your n.docx
 
My TopicI would like to do my case application on Helen Keller’s.docx
My TopicI would like to do my case application on Helen Keller’s.docxMy TopicI would like to do my case application on Helen Keller’s.docx
My TopicI would like to do my case application on Helen Keller’s.docx
 
My topic is the terms a Congress person serves and debate on adding .docx
My topic is the terms a Congress person serves and debate on adding .docxMy topic is the terms a Congress person serves and debate on adding .docx
My topic is the terms a Congress person serves and debate on adding .docx
 
My topic is anywhere, anytime information work, which means tele-wor.docx
My topic is anywhere, anytime information work, which means tele-wor.docxMy topic is anywhere, anytime information work, which means tele-wor.docx
My topic is anywhere, anytime information work, which means tele-wor.docx
 
My topic for module-2 reaction paper was on news, data, and other me.docx
My topic for module-2 reaction paper was on news, data, and other me.docxMy topic for module-2 reaction paper was on news, data, and other me.docx
My topic for module-2 reaction paper was on news, data, and other me.docx
 
My Topic for the paper I would like to do my case application on He.docx
My Topic for the paper I would like to do my case application on He.docxMy Topic for the paper I would like to do my case application on He.docx
My Topic for the paper I would like to do my case application on He.docx
 
n a 2 page paper, written in APA format using proper spellinggramma.docx
n a 2 page paper, written in APA format using proper spellinggramma.docxn a 2 page paper, written in APA format using proper spellinggramma.docx
n a 2 page paper, written in APA format using proper spellinggramma.docx
 
My research proposal is  on fall prevention WRTG 394 s.docx
My research proposal is  on fall prevention WRTG 394 s.docxMy research proposal is  on fall prevention WRTG 394 s.docx
My research proposal is  on fall prevention WRTG 394 s.docx
 
My portion of the group assignment Must be done by Wednesday even.docx
My portion of the group assignment Must be done by Wednesday even.docxMy portion of the group assignment Must be done by Wednesday even.docx
My portion of the group assignment Must be done by Wednesday even.docx
 
my project is about construcation houses for poor poeple in Denver .docx
my project is about construcation houses for poor poeple in Denver .docxmy project is about construcation houses for poor poeple in Denver .docx
my project is about construcation houses for poor poeple in Denver .docx
 
my name is abdullah aljedanii am from saudi arabia i graduate fr.docx
my name is abdullah aljedanii am from saudi arabia i graduate fr.docxmy name is abdullah aljedanii am from saudi arabia i graduate fr.docx
my name is abdullah aljedanii am from saudi arabia i graduate fr.docx
 
My hypothesis Being disconnected from social media (texting, Facebo.docx
My hypothesis Being disconnected from social media (texting, Facebo.docxMy hypothesis Being disconnected from social media (texting, Facebo.docx
My hypothesis Being disconnected from social media (texting, Facebo.docx
 
My group is the Los Angeles Rams. We are looking to be sponsors with.docx
My group is the Los Angeles Rams. We are looking to be sponsors with.docxMy group is the Los Angeles Rams. We are looking to be sponsors with.docx
My group is the Los Angeles Rams. We are looking to be sponsors with.docx
 
My Captain does not answer, his lips are pale and still;My father .docx
My Captain does not answer, his lips are pale and still;My father .docxMy Captain does not answer, his lips are pale and still;My father .docx
My Captain does not answer, his lips are pale and still;My father .docx
 
My character is Phoenix Jackson from the story A Worn PathMLA Form.docx
My character is Phoenix Jackson from the story A Worn PathMLA Form.docxMy character is Phoenix Jackson from the story A Worn PathMLA Form.docx
My character is Phoenix Jackson from the story A Worn PathMLA Form.docx
 
My assignment is to write an original essay of four to fivr parargra.docx
My assignment is to write an original essay of four to fivr parargra.docxMy assignment is to write an original essay of four to fivr parargra.docx
My assignment is to write an original essay of four to fivr parargra.docx
 

Recently uploaded

Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991RKavithamani
 
Micromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersMicromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersChitralekhaTherkar
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docxPoojaSen20
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 

Recently uploaded (20)

Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
 
Micromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersMicromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of Powders
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docx
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 

Chapter III: Methodology and Research Design for Studying Servant Leadership Diffusion

  • 1. Chapter III: Methodology As observed in recent years, large organizations are facing multiple data breaches from hackers who are trying to steal sensitive information. With the increase in technology, attackers with malicious intent are finding advanced methods to breach into the organization or even simple by exploiting known risks that could have been avoided by the organization by updating their systems on a regular basis (Alawneh, 2008). The most recent breach that we all were aware off was the Equifax data breach where it was reported that millions of its customers personal identifiable information (PII) were stolen, information such as social security number , an individual’s name, financial record, driver’s license number, etcetera.. The purpose of this paper is to how organizations can protect themselves from data breaches. What are the ways in which their data can be exposed and does employee awareness will help organizations protect themselves from being attacked from various sources? Design of the study: The data collected in this paper was a mixed approach. The collected data was both qualitative and quantitative in nature. The researcher developed a questionnaire containing both open- ended and close-ended questions and all of this was administered through LimeSurvey. And most of the participants response was recorded when they were trying to explain their understanding of a breach and how data leaks can be classified into intentional threats and inadvertent threats as these recording were transliterated for further analysis using otter A.I. And each session from the participant lasted from 45 – 90 minutes depending on the tasks being performed. Data collection and participants:
  • 2. All the participants involved in the sessions have worked or currently working in financial organizations. Participants read and signed a consent form explaining the purpose of the research and were given the option to skip a question if they feel uncomfortable in answering a question. Participants were recruited through ads from social media and from known contacts whose education and work experience are related to the study that was being conducted. There were around 50 participants in total, 30 males and 20 females, they ranged in age from 24 - 57. When asked about data breaches and do they know who their organizations protect itself from data breaches as part of employee awareness, 40 said yes and 10 said no. And when asked about taking or participating in any data security training conducted by the organizations, 35 said yes and 15 said no. And when asked about recording their answers on a device 45 said yes and 5 said no, For the 5, we noted down their answers on a paper with their consent. Data analysis and Sampling procedures: The participants responses were addressed in two sections which are quantitative and qualitative. When analyzing the qualitative data from the questionnaire we conducted a thematic analysis in order to better analyze the participants response to the open-ended questions (Namey, 2012). The researcher was mostly focused on finding a pattern, a trend or an similar ideas that will help in outlining the analysis. The researcher developed some code to identify similar themes and patterns. Then started to build an initial summary or view of these codes to identify the patterns in which the participants talked about how insider threats and data breaches and their choice of words and simultaneously looking for the alternative where they had different views/insights on a data breach. The top-level codes were associated with our research questions as they were primarily focused on (1) How many years have you been working in financial sector? (2) What are some the standard
  • 3. security measures that are in place? (3) How does your organization handle data breaches? (4) What are the consequences of a data breach? (5) How do you as an employee protect yourself from being a victim of a data breach? Several subcategories were created based on the response from the participants but note that the above are all high-level categories which are all clustered. Analysis were also conducted on the questionnaire or the survey whereby aggregating the score from positive minus to the negative ones. Each response to the question were scored 1 - 5 where 1 is always 5 is never and 3 is sometimes. References: Julisch K, Dacier M (2002). Mining intrusion detection alarms for actionable knowledge. In: Proceedings of the Eighth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining Alawneh M, Abbadi IM (2008). Preventing information leakage between collaborating organisations. In: Proceedings of the 10th International Conference on Electronic Commerce , ICEC. Identity theft resource center (2019). Retrieved from https://www.idtheftcenter.org/ data-breaches/. Accessed: 2019- 04-1. Namey E. Guest G., MacQueen K. M (2012). Introduction to Applied Thematic Analysis. Applied Thematic Analysis. SAGE Publications.
  • 4. Meets ExpectationsChapter Three: Methodology Meets Expectations Introduction Servant leadership has been studied in multiple contexts since it was introduced as a leadership theory by Greenleaf (1970, 1977). This study sought to contextualize the servant leadership of a college president and the diffusion of that leadership style to other levels of the college administration by career administrators in higher education. The primary research question in this study was: To what extent does servant leadership by a college president diffuse to other leaders at the institution? Based on the literature (Liden et al., 2014; Newman et al., 2018) one would expect to see some sort of conveyance of servant leadership to lower echelons of the institutional administration given that servant leaders attempt to empower their followers as leaders (Jeyaraj & Gandolfi, 2019). Research Paradigm Using Liu’s (2019) methodology as a loose guide, this study used a qualitative research paradigm. Qualitative research attempts to understand how individuals or a group perceive, experience, and engage with a phenomenon or problem (Creswell & Creswell, 2018). Specifically, this study took a phenomenological approach which allowed the participants to expound upon their lived experiences of the phenomenon of servant leadership and its diffusion through the administration of an institution of higher education. Phenomenological research seeks to explore the lived experiences of humans and how they make sense of those experiences (Moustakas, 1994). Research Design In her study of servant leadership by one leader in a large information technology company, Liu (2019) designed a
  • 5. research project focused on the leader with additional interviews of the members of his team. This study adopted a similar approach with modifications given the difference in studies and what is being studied. Liu (2019) was concerned with the intersection of race, gender, and servant leadership whereas this study focused on the conveyance of the principles of servant leadership throughout an organization. Phenomenological research considers the primary source of information to be the perceptions and disclosures of the participants (Moustakas, 1994). Two methods of data collection were used: semi-structured interviews and observations. Over the course of a month, four approximately two-hour interviews were conducted with the president of Connelly College (the principal subject). The initial interview was semi - structured and sought to collect background information on and thoughts about the subject’s background and his development as a servant leader. Subsequent interviews were casual and unstructured focusing on thoughts from previous interviews, themes arising in other interviews (see below), and comments on current events relevant to leadership in higher education. Because of the informal nature of these interviews it was impossible to present a formal interview protocol, however, please refer to Appendix C for an informal protocol and guiding thoughts. In addition to interviews with the college president, approximately 90-minute interviews were conducted with five members of the president’s cabinet including administrators responsible for finance, human resources, academics, ministry and mission, and student affairs. These interviews were semi - structured and focused on the administrator’s thoughts of the president as a servant leader and if and how they in turn enact servant leadership in their own areas. Please refer to Appendix D for an informal interview protocol for these interviews. A third and final category of interviews were conducted with one administrator each of whom reports to one of the five administrators identified above. These interviews were
  • 6. approximately 90-minutes in length and followed a semi- structured approach. The same informal interview protocol found in Appendix D was used in these interviews. In addition to interviews, field observations were gathered from attendance at two president’s cabinet meetings. Research Site and Data Collection Sources The research and primary data collection site for this study was Connelly College. Several interviews occurred at nearby restaurants or cafes as needed to accommodate participant schedules. Connelly College is a very small, coeducational, and faith-based college classified as a masters two institution by the Carnegie Classification (need citation). Located in a suburban area of a Mid-Atlantic state, Connelly serves a diverse population with a significant population of first-generation college students. This site was selected because of its proximity to the researcher’s place of employment and his familiarity with both the institution and many of its administrators. Both Connelly College and the researcher’s institution are members of a consortium of institutions in the geographic region. The primary subject in this study was Brian, who has served as the president of Connelly for approximately one year. Prior to arriving at Connelly, Brian was the president of a medium sized, private, nonsectarian university in the Midwest. A career administrator in higher education, Brian received his doctorate in education only three years prior to becoming the president of Connelly. Brian has spoken and written about his orientation as a servant leader. In addition to Brian, the following people were identified for this study based on recommendations from Brian: · Bruce – Executive-level administrator who holds a doctorate · Betty – Mid-level administrator who holds a master’s degree and reports to Bruce · Debbie – Senior administrator who holds a master’s degree · Anna – Mid-level administrator who holds a master’s degree
  • 7. and reports to Debbie · Madeline – Executive-level administrator who holds a doctorate · Cathy – Senior administrator who holds a master’s degree and reports to Madeline · Grace – Executive-level administrator who holds a master’s degree and is a member of the founding religious order of the college · Evelyn – Mid-level administrator who holds a doctorate and reports to Grace · Wade – Senior administrator who holds a master’s degree · Bridget – Mid-level administrator who holds a master’s degree and reports to Wade The names of all participants have been changed and limited information is provided here in order to maintain their privacy. All participants were provided with information regarding the process of the study and what was involved. Each participant completed an informed consent document before their interview began. A copy of the informed consent document is available in Appendix B. Prior to the beginning of this study, all materials and plans were submitted for review by the Institutional Review Board (IRB) of the University of the Cumberlands and the IRB of Connelly College. Both IRBs have approved this project and copies of their approval can be found in Appendix A. Each interview was recorded with both a digital recorder and a cell phone-based recording application and transcribed using Amazon Transcribe. Transcriptions of each interview was sent to the respective participant and each participant was offered an audio file of their interview. Analysis Phenomenological research generates a large amount of raw data which must be analyzed. However, before any analysis was conducted, the researcher reviewed his own notes and bracketed his own assumptions and judgements. This step is recommended
  • 8. by Moustakas (1994) in order to eliminate as much research bias as possible before data is analyzed. Though it is impossible to completely eliminate research bias in a qualitative and phenomenological study, this step is very helpful in reducing that bias. Moustakas (1994) identified four steps in analyzing phenomenological data: reduction, horizontalization, imaginative variation, and essence. The first step, reduction, is achieved by reducing the data into common themes and experiences as discussed by the participants. The second step, horizontalization, requires the researcher to obtain a “30,000 foot” view of the data in hopes of viewing it equally. The third step, imaginative variation, asks the researcher to view the data from counter and congruent perspectives. The fourth and final step, essence, draws the data and the other steps together to form an essence of the phenomenon and the experiences of the participants. The researcher proceeded through the analysis process outlined above. He opted for structural coding with a set of a priori themes and references derived from the literature including listening, imagination, acceptance, accountability, persuasion, and conceptualization (Heyler & Martin, 2018); and empowering, helping subordinates grow and succeed, and behaving ethically (Liden et al., 2014). Emergent themes not suggested by the literature were also noted and coded as part of the process. The coding process and analysis was primarily conducted manually, but NVivo qualitative research software was used for data storage and assistance in identifying emergent themes. Other Considerations While all studies admit of some limitations, this study was potentially limited in the following ways. First, the sample consisted of individuals, including the president and three executive-level administrators, at a very small college. Though every assurance was given and step taken to reasonably guarantee the confidentiality of the data, some lower ranking
  • 9. administrators may have felt less inclined to share their full perspective. Second, Brian, the primary participant and president of Connelly College has only served in this role for one year. Once Brian has been in his position for more years there may be further diffusion of servant leadership throughout the administration. References Creswell, J. W. & Creswell, J. D. (2018). Research design: Qualitative, quantitative, and mixed methods approaches. (5th ed.). Sage. Greenleaf, R. K. (1970). The servant as leader. The Robert K. Greenleaf Center. Greenleaf, R. K. (1977). Servant leader: A journey into the nature of legitimate power and greatness. Paulist Press. Heyler, S. G. & Martin, J. A. (2018). Servant leadership theory: Opportunities for additional theoretical integration. Journal of Managerial Issues, 30(2), 230-243. Jeyaraj, J. J. & Gandolfi, F. (2019). Exploring trust, dialogue, and empowerment in servant leadership: Insights from critical pedagogy. Journal of Management Research, 19(4), 285-290. Liden, R. C., Wayne, S. J., Liao, C., & Meuser, J. D. (2014). Servant leadership and serving culture: Influence on individual and unit performance. Academy of Management Journal, 57(5), 1434- 1452. Liu, H. (2019). Just the servant: An intersectional critique of servant leadership. Journal of Business Ethics, 156(4), 1099- 1112. Moustakas, C. (1994). Phenomenological research methods. Sage. Newman, A., Neesham, C., Manville, G., & Tse, H. H. M. (2018). Examining the influence of servant and entrepreneurial leadership on the work outcomes of employees in social enterprises. The International Journal of Human Resource Management, 29(20), 2905-2926.
  • 10. Step 2: Using the electronic databases, find an article published in the last seven (7) years in an APA journal with a focus on Personality (e.g., Journal of Personality and Social Psychology or Personality and Personality Disorders). The article should describe, specifically, an experiment or empirical study by the researchers. This means that the researchers conducted a study that contains easily identifiable independent and dependent variables. (Do not select meta-analyses, summaries, editorials, or theoretical articles. It is your responsibility to make sure that the journal article you select is appropriate. If you are unsure about the relevance of your article, contact your instructor for approval.). Step 3: Read the article starting with the Title and Abstract, which will give you a quick preview of the purpose and results of the article. Step 4: Read the Introduction. Highlight the purpose of the article and the author’s hypothesis (e.g., what was studied, what the authors predicted, and why they found the topic worthy of study). Pay attention to the context provided for the research (i.e., what research has been done previously in the field? what issue or problem is this study trying to address?) Step 5: Read the Methods section. Note the description of the participants and any tests, surveys, questionnaires, apparatus, or other materials that were used. Pay particular attention to the details involved in the experimental procedure. How were the variables manipulated or measured? Recall that the Independent Variable (IV) is the variable that is manipulated by the research (i.e., whether the room is hot or cold (if that is the variable of interest) or whether participants are given a placebo, shown any type of media or other stimuli, given talk therapy, or instructed to take medication (if that is the variable of interest). Remember that the Independent Variable is what was different about the
  • 11. experiences of the different groups. Recall also that the Dependent Variable (DV) is that variable that is measured, or, the outcome of the study (i.e., test performance or lessening of depressive symptoms). Step 6: Read the Results. Try not to get intimidated by complex statistical analysis. Instead of focusing on the numbers, focus on the short descriptions that accompany the findings explaining what the researchers found (i.e., Did the researchers find evidence that supports their hypothesis?) Step 7: Read the Discussion. Pay special attention here to what the authors say about the importance of their findings or the lack of findings. Think about other things you could do to look at this issue. Step 8: Prepare a 2 to 5 page summary of the article in your own words. Be sure to address the following questions in your summary: What is the purpose of the research? (Address specifics regarding the overall purpose of the research in question.) What hypothesis is tested? (Provide a clear statement of the researchers’ prediction.) How did the researchers investigate their research question? (Provide details regarding the study methodology.) What are the pertinent results of the manipulation? (What were the findings and conclusions drawn?) What is your personal opinion of the study conducted? Should it be repeated? What could be improved? What is your overall impression of the work? What are the implications of the study for the practice of counseling psychology? Your summary should be written as a coherent essay (do not format as a list of answers to these questions). You may include additional insights in your analysis, but you must address these
  • 12. key issues. Step 9: Prepare your Article Review according to the following guidelines: Structure your paper utilizing APA style (7th Edition); this includes title page, headings, in-text citations, reference page, and general paper format (1-inch margins, double-spaced, appropriately sized sans serif or serif fonts - e.g., 12 Times Roman). An abstract is not required. Apply sound writing mechanics: write with clarity, paying attention to spelling, grammar, and syntax. Submit to your Assignment Folder as a single document in either Microsoft Word, PDF, or RTF format.