How to Start a Compare and Contrast Essay?. A-Z Guide for Writing a Compare and Contrast Essay. 014 Essay Example Compare Contrast Essays ~ Thatsnotus. ⚡ A compare and contrast essay. 101 Compare and Contrast Essay Ideas .... Compare and Contrast Essay II | Secondary School | Lecture. Compare and Contrast Essay: Definition, Outline and Useful Examples • 7ESL. Strong Compare and Contrast Essay Examples. Compare And Contrast Essay Examples (+FAQ) | Pro Essay Help. Surprising Comparison Contrast Essay Examples ~ Thatsnotus.
Running Head PRESENCE OF MASCULINITY IN INTERNATIONAL RELATIONS1.docxcharisellington63520
Running Head: PRESENCE OF MASCULINITY IN INTERNATIONAL RELATIONS 1
Presence of Masculinity in International Relations 2
Presence of Masculinity in International Relations
INTS 2235 Gender in International Relations
University of Denver
Introduction
In recent years, there has been an increased focus on gender in international relations. The introduction of feminism has led to attention on the marginalization of feminist and gender concerns. The lack of recognition of women in international politics provides evidence of men being the central concern in global relations by default. Various feminist scholars have looked at the gendered nature of international studies, each arguing that masculinity plays various levels of importance in the study. This literature review addresses various works involving masculinity in international relations, arguing that masculinity has become an inherent default in global politics, and this needs to be understood in order to properly bring women and feminine concerns to the forefront. The presence of masculinity in international relations is first addressed, followed by the legitimization of it and the presence of privilege in understanding masculinity. Finally, proposed changes to the current structure of IR in order to make women more important will be analyzed.
Places of masculinity in international relations
The presence of masculinity in international relations can be seen in both the masculine characteristics of theories, as well as the focus on mainly masculine actors. According to Kimberly Hutchings (2008), a key reason for the ongoing invisibility of women and gender in the theoretical frames through which post-cold war international politics is looked at is that masculinity operates as a resource for thought in theorizing international politics. Characteristics that are considered masculine are being aggressive, dominant, and power driven, which can be seen in theories of international relations. For example, realism looks at states as actors and argues that states focus on power. This characterizes states as masculine. Liberalism also embodies certain masculine traits, as it looks at democracy and cooperation, which are Western ideals. Western ideals fall under ‘hegemonic masculinity,’ as it is generally the Western perception of ‘what it means to be a man’ that is generally accepted.
Masculinity can be seen in international relations due to a lack of recognition of women, which is largely why the feminist theory began to unfold in the first place. As a contemporary field of study, international relations looks at stereotypically masculine subjects, such as conflicts, wars, and diplomacy, and thus the actors studied are overpoweringly male (Carver, 2014). The most popular theory of international relations is realism, which focuses on the state as an actor, looking at issues of power in terms of military. By looking at global relations through military, the theories are placing importance .
Love Marriage vs Arranged Marriage Argumentative Essay Example. love marriage vs arranged marriage advantages and disadvantages. Arranged vs Love Marriages in India - PHDessay.com.
How to Start a Compare and Contrast Essay?. A-Z Guide for Writing a Compare and Contrast Essay. 014 Essay Example Compare Contrast Essays ~ Thatsnotus. ⚡ A compare and contrast essay. 101 Compare and Contrast Essay Ideas .... Compare and Contrast Essay II | Secondary School | Lecture. Compare and Contrast Essay: Definition, Outline and Useful Examples • 7ESL. Strong Compare and Contrast Essay Examples. Compare And Contrast Essay Examples (+FAQ) | Pro Essay Help. Surprising Comparison Contrast Essay Examples ~ Thatsnotus.
Running Head PRESENCE OF MASCULINITY IN INTERNATIONAL RELATIONS1.docxcharisellington63520
Running Head: PRESENCE OF MASCULINITY IN INTERNATIONAL RELATIONS 1
Presence of Masculinity in International Relations 2
Presence of Masculinity in International Relations
INTS 2235 Gender in International Relations
University of Denver
Introduction
In recent years, there has been an increased focus on gender in international relations. The introduction of feminism has led to attention on the marginalization of feminist and gender concerns. The lack of recognition of women in international politics provides evidence of men being the central concern in global relations by default. Various feminist scholars have looked at the gendered nature of international studies, each arguing that masculinity plays various levels of importance in the study. This literature review addresses various works involving masculinity in international relations, arguing that masculinity has become an inherent default in global politics, and this needs to be understood in order to properly bring women and feminine concerns to the forefront. The presence of masculinity in international relations is first addressed, followed by the legitimization of it and the presence of privilege in understanding masculinity. Finally, proposed changes to the current structure of IR in order to make women more important will be analyzed.
Places of masculinity in international relations
The presence of masculinity in international relations can be seen in both the masculine characteristics of theories, as well as the focus on mainly masculine actors. According to Kimberly Hutchings (2008), a key reason for the ongoing invisibility of women and gender in the theoretical frames through which post-cold war international politics is looked at is that masculinity operates as a resource for thought in theorizing international politics. Characteristics that are considered masculine are being aggressive, dominant, and power driven, which can be seen in theories of international relations. For example, realism looks at states as actors and argues that states focus on power. This characterizes states as masculine. Liberalism also embodies certain masculine traits, as it looks at democracy and cooperation, which are Western ideals. Western ideals fall under ‘hegemonic masculinity,’ as it is generally the Western perception of ‘what it means to be a man’ that is generally accepted.
Masculinity can be seen in international relations due to a lack of recognition of women, which is largely why the feminist theory began to unfold in the first place. As a contemporary field of study, international relations looks at stereotypically masculine subjects, such as conflicts, wars, and diplomacy, and thus the actors studied are overpoweringly male (Carver, 2014). The most popular theory of international relations is realism, which focuses on the state as an actor, looking at issues of power in terms of military. By looking at global relations through military, the theories are placing importance .
Love Marriage vs Arranged Marriage Argumentative Essay Example. love marriage vs arranged marriage advantages and disadvantages. Arranged vs Love Marriages in India - PHDessay.com.
1 Network Analysis and Design This assignment is.docxoswald1horne84988
1
Network Analysis and Design
This assignment is worth 30%.
Deadline: Mon, Week 12
Part A: HQ LAN Upgrade (35%)
Background:
ABC is a big company in the US. ABC has employed you as the IT officer of the company.
Your job is to analyse the performance of the HQ LAN, suggest changes to improve the
network performance and provide a report to your boss.
Settings:
Run all simulations for 30 minutes to simulate a working day.
The graphs should be time averaged
Duplicate scenario for each possible setup
Tasks:
1. Analyse the current performance of the HQ LAN for each level and comment on it.
You are required to show all relevant graphs. The graphs for each level can be
overlaid. (10%)
2. Some staffs are unhappy about the speed of the network. Anything that takes more
than 1 second is not desirable. You have decided to try the following to improve the
network performance. Show the relevant graphs and comment on the results: (5%)
a. Increase the link speeds of
i. HQ_Router1 to HQ_Router3 from 1 Gbps to 10 Gbps and
ii. HQ_Router2 to HQ_Router3 from 1 Gbps to 10 Gbps
b. Increase the LANs for level 1, 2 and 3 from 100 Mbps to 1 Gbps
c. Try out 1 other way that meets the requirement.
3. After meeting the requirement, the company has decided to purchase an Ethernet
Server and placed it in the HQ LAN. (10%)
a. Rename it to HQ Server
b. Use a 1Gbps link
c. Set Application: Supported Services to All
d. Set statistics to view the following:
i. Server DB Task Processing Time (Heavy)
ii. Server Email Task Processing Time (Heavy)
iii. Server HTTP Task Processing Time (Heavy)
iv. Server Performance Task Processing Time
e. Show the performance of the HQ Server with the required graphs and
comment on the results
f. Justify the location of the server
g. State at least 3 security measures you will take to protect the HQ LAN from
malicious attacks
4. What would you do so that all the 4 statistics of the HQ server are less than 0.025 s?
Show all relevant graphs. (3 marks)
2
5. Prepare a report and state the additional amount of money that is needed for the
changes you have made to meet the additional requirements. Refer to the given price
list in the Appendix. (7%)
a. Your report should include a content page, a summary of the addressed issues,
objectives, budgeting, proposed solutions and conclusion.
Part B: Network Design (65%)
Background:
Due to your excellent work in the analysis of the HQ LAN, you are now assigned the new
task of designing the LAN for one of ABC’s client, XYZ. The company XYZ is made up of 4
sections and the number of people in each section is as shown below.
1. Research – 20
2. Technical – 10
3. Guests – 4
4. Executives – 2
Set up the following staff profile:
1. Research: file transfer (light), web browsing (heavy) and file print (light)
2. Technical: Database Access (heavy), telnet (heavy) and email (light)
3. Guests: Em.
1 Name _____________________________ MTH129 Fall .docxoswald1horne84988
1
Name: _____________________________
MTH129 Fall 2018 - FINAL EXAM A
Show all work neatly on paper provided. Label all work. Place final answers on the answer sheet.
PART I: Omit 1 complete question. Place an “X” on the problems & answer space you are omitting.
1. Find the inverse of the following functions:
a. 𝑓(𝑥) = 2𝑥 − 3
b. 𝑓(𝑥) =
3𝑥 +1
𝑥−2
2. If 𝑓(𝑥) = 𝑥 2 − 2𝑥 + 3 and 𝑔(𝑥) = −3𝑥 + 4, find the following:
a. (𝑓°𝑔)(𝑥) b. (𝑓°𝑔)(2)
3. Find the domain for the following expression:
a) √𝑥 + 5 𝑏) 7𝑥 2 + 3𝑥 − 1 𝑐)
𝑥 2+4
𝑥 2−9
4. Find the radian measures of the angles with the given degree measures.
a) 81°
Find the degree measures of the angles with the given radian measures.
b)
13𝜋
6
5. Solve the following equations:
a) (5t) = 20
b) 6000 = 40(15)t
6. Expand the following logarithmic expressions:
a. log(𝐴𝐵2 )
b. ln(
4
√3
)
7. Describe how the graph of each function can be obtained from the graph f
a. 𝑦 = 𝑓(𝑥) − 8
b. 𝑦 = 𝑓(𝑥 + 4) − 5
8. A real number t is given 𝑡 =
2𝜋
3
a. Find the reference number for t.
b. Find the terminal point P(x,y) on the unit circle determined by t
c. The unit circle is centered at __________________ and has a radius of _________________
PART II: Omit 1 complete question. Place an “X” on the problems & answer space you are omitting.
2
1. A sum of $7,000 is invested at an interest rate of 4
1
2
% per year, compounding monthly. (round all answers to
the nearest cent)
a. Find the amount of the investment after 2
1
2
years.
b. How long will it take for the investment to amount to $12,000?
c. Using the information in part (a), find the amount of the investment if compounded quarterly.
2. When a company charges price p dollars for one of its products, its revenue is given by
𝑅 = 𝑓(𝑝) = 500𝑝(30 − 𝑝)
a. Create a quadratic function for price with respect to revenue.
b. What price should they charge in order to maximize their revenue?
c. What is the maximum revenue?
d. What would be the revenue if the price was set at $10?
e. Sketch a rough graph – indicate the intercepts and the maximum coordinates.
3. The charges for a taxi ride are an initial charge of $2.50 and $0.85 for each mile driven.
a. Write a function for the charge of a taxi ride as a linear function of the distance traveled.
b. What is the cost of a 12 mile trip?
c. Find the equation of a line that passes through the following points: (1,-2) , (2,5) Express in 𝑦 =
𝑚𝑥 + 𝑏 form
d. Graph part ( c )
4. a. Divide the following polynomial and factor completely.
𝑃(𝑥) = 3𝑥 4 − 9𝑥 3 − 2𝑥 2 + 5𝑥 + 3; 𝑐 = 3
b. Given polynomial−𝑥 2 + 5𝑥 − 6, state the end behavior of its graph.
c. Using the polynomial on part ( c ), would this g
1 Lab 8 -Ballistic Pendulum Since you will be desig.docxoswald1horne84988
1
Lab 8 -Ballistic Pendulum
Since you will be designing your own procedure you will have two
class periods to take the required data.
The goal of this lab is to measure the speed of a ball that is fired
from a projectile launcher using two different methods. The
Projectile launcher has three different settings, “Short Range,”
“Medium Range” and “Long Range,” however you will only need to
determine the speed for any ONE of these Range settings.
Method 1 involves firing the ball directly into the “Ballistic
Pendulum” shown below in Figure 2 for which limited instructions will be provided. Method 2
is entirely up to your group. While you have significant freedom to design your own procedure,
you will need to worry about the random and systematic uncertainties you are introducing
based on your procedure. This manual will provide a few hints to help reduce a few of those
uncertainties.
The ballistic pendulum pictured in Figure 2 is important canonical problem students study to
explore the conservation of momentum and energy. The ball is fired by the projectile launcher
into a “perfectly inelastic collision” with the pendulum. The pendulum then swings to some
maximum angle which is measured by an Angle Indicator.
Caution: The pendulum has a plastic hinge and Angle Indicator which are both fragile. Be
gentle.
Study the ballistic pendulum carefully. Before we begin, here are a few things to consider and
be aware of in Figure 2:
Projectile launcher
Angle indicator (curved
black bar)
Clamp
Pendulum (can be removed
for measurements)
Figure 2: Ballistic Pendulum
Plumb bob
Firing string
Release
point
Figure 1: Projectile Launcher
Bolt for removing pendulum
2
A. Clamping the ballistic pendulum to the table will reduce random uncertainties in the
speed with which the projectile launcher releases the ball. Similarly, you should check
that the various bolts are snug and that the ball is always fully inside the launcher (not
rolling around inside the barrel of launcher).
B. If the lab bench is not perfectly horizontal the plumb bob and angle indicator will not
read zero degrees before you begin your experiment. You should fix AND/OR account
for these discrepancies.
C. In Figure 3 you will notice a tiny gap between the launcher and the pendulum. This
important gap prevents the launcher from contacting the pendulum directly as the ball
is fired. Without this gap an unknown amount of momentum is transferred from the
launcher directly to the pendulum (in addition to the momentum transferred by the
ball) significantly complicating our experiment.
Figure 3: Important gap between Launcher and Pendulum
Equipment
1 Ballistic Pendulum (shown in Figure 2)
A bag with three balls
1 loading rod
1 Clamp
1 triple beam balance scale
Safety goggles for each group member
Any equipment found in your equipment drawer.
Reasonable equipment reque.
1 I Samuel 8-10 Israel Asks for a King 8 When S.docxoswald1horne84988
1
I Samuel 8-10
Israel Asks for a King
8 When Samuel grew old, he appointed his sons as Israel’s leaders.[a]2 The
name of his firstborn was Joel and the name of his second was Abijah, and
they served at Beersheba. 3 But his sons did not follow his ways. They turned
aside after dishonest gain and accepted bribes and perverted justice.
4 So all the elders of Israel gathered together and came to Samuel at
Ramah. 5 They said to him, “You are old, and your sons do not follow your
ways; now appoint a king to lead[b] us, such as all the other nationshave.”
6 But when they said, “Give us a king to lead us,” this displeasedSamuel; so
he prayed to the LORD. 7 And the LORD told him: “Listen to all that the people
are saying to you; it is not you they have rejected, but they have rejected
me as their king. 8 As they have done from the day I brought them up out of
Egypt until this day, forsaking me and serving other gods, so they are doing
to you. 9 Now listen to them; but warn them solemnly and let them
know what the king who will reign over them will claim as his rights.”
10 Samuel told all the words of the LORD to the people who were asking him
for a king. 11 He said, “This is what the king who will reign over you will claim
as his rights: He will take your sons and make them serve with his chariots
and horses, and they will run in front of his chariots. 12 Some he will assign to
be commanders of thousands and commanders of fifties, and others to plow
his ground and reap his harvest, and still others to make weapons of war
and equipment for his chariots. 13 He will take your daughters to be
perfumers and cooks and bakers. 14 He will take the best of your fields and
vineyards and olive groves and give them to his attendants. 15 He will take a
tenth of your grain and of your vintage and give it to his officials and
attendants. 16 Your male and female servants and the best of your cattle[c] and
donkeys he will take for his own use. 17 He will take a tenth of your flocks,
and you yourselves will become his slaves. 18 When that day comes, you will
cry out for relief from the king you have chosen, but the LORD will not
answer you in that day.”
https://www.biblegateway.com/passage/?search=1%20Samuel+8&version=NIV#fen-NIV-7371a
https://www.biblegateway.com/passage/?search=1%20Samuel+8&version=NIV#fen-NIV-7375b
https://www.biblegateway.com/passage/?search=1%20Samuel+8&version=NIV#fen-NIV-7386c
2
19 But the people refused to listen to Samuel. “No!” they said. “We wanta
king over us. 20 Then we will be like all the other nations, with a king to lead
us and to go out before us and fight our battles.”
21 When Samuel heard all that the people said, he repeated it before
the LORD. 22 The LORD answered, “Listen to them and give them a king.”
Then Samuel said to the Israelites, “Everyone go back to your own town.”
Samuel Anoints Saul
9 There was a Benjamite, a man of standing, whose n.
1 Journal Entry #9 What principle did you select .docxoswald1horne84988
1
Journal Entry #9
What principle did you select?
I selected principle 1 of part 1, “Don’t criticize, condemn or complain”.
Who did you interact with?
For this assignment I interacted with my younger cousin.
What was the context?
I had visited my Aunty and she and her husband asked me to stay a while as I was on school
break. They accommodated me and I decided in return to help look after my cousin in the period
when he got out of school and before they got back from work. He is 5 years old and can be quite
the handful.
What did you expect?
I expected that an authoritative approach would easily compel him to follow my instructions so
that the transition from school life into home life would be easy.
What happened?
At first, I used commanding language to get him to change out of his uniform or properly store
his back pack and books before stepping out to play. The first day was difficult and the way I
deal with him were not getting through. On the 2nd day, the same was observed. On the 3rd day,
before he could drop his back pack and run out, I offered to make him a sandwich to eat before
he left to play if he would change and clean up. He rushed up stairs and freshened up. On the
next day, he came home and rushed up to change and freshen up all on his own. I had not
initially offered; but I made him a sandwich regardless.
How did it make you feel?
It made me feel good to be able to get through to my cousin. After this, if I ever needed him to
do something in a better way than previously, I would encourage him onto a different way of
accomplishing the same. I would often offer praise after adoption of the new suggested method
was adopted or offered incentive.
2
What did you learn?
I learnt that in criticizing a person’s action, it is difficult to deter their belief in their methods,
values or beliefs. This usually just gives them the will to justify or defend their positions. It is
almost an exercise in futility to attempt to effect change by complaining, condemning or
criticizing.
What surprised you?
I was surprised by how fast the change was effected after the shift in direction I took to approach
my cousin. In not criticizing his way of doing things any longer and employing a different tactic,
I was able to influence his routine as well as build good rapport with him.
Going forward, how can you apply what you learnt?
Going forward I will attempt to understand that everyone has a belief or image of their own that I
should respect. These beliefs, systems and values are crucial to their inherent dignity and to
criticize or attack this will only fuel conflict.
Running head: Physical activity project 1
Physical activity project:
A 7-day analysis and action plans
Student Name
National University
Physical activity project 2
Introduction
Physical activity (PA) has been a major component of public health since the rise of
chronic illnesses .
1
HCA 448 Case 2 for 10/04/2018
Recently, a patient was transferred to a cardiac intensive care unit (CICU) at Methodist Hospital.
Methodist is a 250-bed hospital, which is one of five hospitals in the University Health System.
The patient was a retired 72-year-old man, who recently (i.e., 25 days ago) had a mild heart
attack and was treated and released from a sister hospital, which is in the same system as
Methodist Hospital. An otherwise health individual, Mr. Charlie Johnson (a husband, father of 4,
and grandfather of 12) is in now need or lots of medication and a battery of tests. To the nurses
on shift, it appears that the entire Johnson family is in patient’s room watching the clinical staff
treated Mr. Johnson. The family overhears everything and they want to know what is being done
to (and for) their loved one. In addition, they want to know the meaning behind the various beeps
coming from the many machines attached to Mr. Johnson.
Over the past 10 years, the latest U.S. News and World report has ranked Methodist Hospital as
one of the Best Hospitals for Cardiology & Heart Surgery. However, it is important to note that
over the past few years, the unit has dropped in the rankings.
Katherine Ross RN, the patient care director of the CICU, which has 14 beds, has held this post
for two years. (See Figure) The unit has a $20 million budget. Ms. Ross has worked at Methodist
Hospital for 16 years. She spends 50 percent of her time on patient safety, 25 percent on staffing
and recruitment, and 20 percent with nurses in relation to their satisfaction with the work and
with families relative to their satisfaction with care. Ten percent of Ms. Ross’s time is spent on
administrative duties. According to Ms. Ross, “I like is working with exceptional nurses who are
very smart and do what it takes with limited resources. However, we don’t always feel
empowered, despite the existence of shared governance, a structure I help to coordinate.”
2
Relationship with Nurses on the Unit:
Nurses on the unit work a three day a week, 12 hours a shift. Ms. Ross says, “we did an
employee opinion survey that went to all employees on the unit, 50 people in all, but only 13
responded. Some of them weren’t sure who their supervisor was. The employees aren’t happy
but our patients are happy.” She adds that “my name is on the unit, not the medical director’s. If
anything goes wrong with the unit, they blame it on nursing. Yet I’m brushed off by people
whom I have to deal with outside of the unit. For example, we have a problem with machines
that analyze blood gases. I spoke with the people there about the technology. This was four
weeks ago. It’s a patient safety issue. I sent them e-mails. I need the work to get done, the staff
don’t feel empowered if I’m not empowered. This goes for other departments as well. For
example, respiratory therapy starts using a new ventilator witho.
1
HC2091: Finance for Business
Trimester 2 2018
Group Assignment
Assessment Value: 20%
Due Date: Sunday 23:59 pm, Week 10
Group: 2- 4 students
Length: Min 2500 words
INSTRUCTIONS
Students are required to form a group to study, undertake research, analyse and conduct academic
work within the areas of business finance covered in learning materials Topics 1 to 10 inclusive.
The assignment should examine the main issues, including underlying theories, implement
performance measures used and explain the firm financial performance. Your group is strongly
advised to reference professional websites, journal articles and text books in this assignment (case
study).
Tasks
This assessment task is a written report and analysis of the financial performance of a selected
listed company on the ASX in order to provide financial and investment advice to a wealthy
investor. This assignment requires your group to undertake a comprehensive examination of a
firm’s financial performance based on update financial statements of the chosen companies.
Group Arrangement
This assignment must be completed IN Group. Each group can be from 2 to maximum 4 student
members. Each group will choose 1 company and once the company has been chosen, the other
group cannot choose the same company. First come first served rule applies here, it means you
need to form your group, choose on company from the list of ASX and register them with your
lecturer as soon as possible. Once your lecturer registers your chosen company, it cannot be
chosen by any other group. Your lecturer then will put your group on Black Board to enable you
to interact and discuss on the issues of your group assignment using Black Board environment.
However, face to face meeting, discussion and other methods of communication are needed to
ensure quality of group work. Each group needs to have your own arrangement so that all the
group members will contribute equally in the group work. If not, a Contribution Statement,
which clearly indicated individual contribution (in terms of percentage) of each member, should
be submitted as a separate item in your assignment. Your individual contribution then will be
assessed based on contribution statement to avoid any free riders.
2
Submission
Please make sure that your group member’s name and surname, student ID, subject name, and
code and lecture’s name are written on the cover sheet of the submitted assignment.
When you submit your assignment electronically, please save the file as ‘Group Assignment-
your group name .doc’. You are required to submit the assignment at Group Assignment
Final Submission, which is under Group Assignment and Due Dates on Black Board.
Submitted work should be your original work showing your creativity. Please ensure the self-
check for plagiarism to be done before final submission (plagiarism check is not over 30% .
1 ECE 175 Computer Programming for Engineering Applica.docxoswald1horne84988
1
ECE 175: Computer Programming for Engineering Applications
Homework Assignment 6
Due: Tuesday March 12, 2019 by 11.59 pm
Conventions: Name your C programs as hwxpy.c where x corresponds to the homework number and y
corresponds to the problem number. For example, the C program for homework 6, problem 1 should be
named as hw6p1.c.
Write comments to your programs. Programs with no comments will receive PARTIAL credit. For each
program that you turn in, at least the following information should be included at the top of the C file:
- Author and Date created
- Brief description of the program:
- input(s) and output(s)
- brief description or relationship between inputs and outputs
Submission Instructions: Use the designated Dropbox on D2L to submit your homework.
Submit only the .c files.
Problem 1 (15 points) Write a program that returns the minimum value and its location, max
value and its location and average value of an array of integers. Your program should call a
single function that returns that min and its location, max and its location and mean value of
the array. Print the results in the main function (not within the array_func function).
See sample code execution below. The declaration of this function is given below:
void array_func (int *x, int size, int *min_p, int *minloc_p, int *max_p, int *maxloc_p, double *mean_p)
/* x is a pointer to the first array element
size is the array size
min_p is a pointer to a variable min in the main function that holds the minimum
minloc_p is a pointer to a variable minloc in the main function that holds the location where the
minimum is.
max_p is a pointer to a variable max in the main function that holds the maximum
maxloc_p is a pointer to a variable maxloc in the main function that holds the location where the
maximum is.
mean_p is a pointer to a variable mean in the main function that holds the mean */
Declare the following array of integers within the main function:
Sample code execution:
int data_ar[] = { -3, 5, 6, 7, 12, 3, 4, 6, 19, 23, 100, 3, 4, -2, 9, 43, 32, 45,
32, 2, 3, 2, -1, 8 };
int data_ar2[] = { -679,-758,-744,-393,-656,-172,-707,-32,-277,-47,-98,-824,-695,
-318,-951,-35,-439,-382,-766,-796,-187,-490,-446,-647};
int data_ar3[] = {-142, -2, -56, -60, 114, -249, 45, -139, -25, 17, 75, -27, 158,
-48, 33, 67, 9, 89, 33, -78, -180, 186, 218, -274};
2
Problem 2 (20 points): A barcode scanner verifies the 12-digit code scanned by comparing the
code’s last digit to its own computation of the check digit calculated from the first 11 digits as
follows:
1. Calculate the sum of the digits in the odd-numbered indices (the first, third, …, ninth
digits) and multiply this sum by 3.
2. Calculate the sum of the digits in the even-numbered indices (the 0th, second, … tenth
digits).
3. Add the results from step 1 and 2. If the last digit of the addition result is 0, then 0 is the
check digit. .
1 Cinemark Holdings Inc. Simulated ERM Program .docxoswald1horne84988
1
Cinemark Holdings Inc.: Simulated ERM Program
Ben Li, Assistant Vice President of Compliance, is assigned the responsibility of developing an ERM
program at Cinemark Holdings Inc. (CHI). Over the past year, Ben has put in place the following ERM
activities:
Risk Identification and Assessment
The risk identification and assessment process steps are as follows:
1) Conduct online surveys of the heads of the 10 business segments and their 1-2 direct reports (15
people) and their mid-level managers (80 people). Exhibit 1 shows the instructions that are
included in the online survey. Exhibit 2 shows samples of the information collected from the
online survey.
2) Each of the 10 business segments separately organizes and compiles the results of the online
survey. They typically compile a robust list of 70-80 potential key risks. Each business segment
then prioritizes their top-5 risks and reports them to Ben Li, resulting in a total of 50 key risks (a
partial sample of the top-50 risk list is shown in Exhibit 3).
3) A consensus meeting is conducted where the 50 risks are shared with the top 10 members of
senior management in an open-group setting at an offsite one-day event. The 50 risks are each
discussed one at a time, after which the facilitator has the group collectively discuss and score
them for likelihood and severity. The risk ranking is calculated as the likelihood score plus the
severity score; the control effectiveness score is used to determine if there is room to improve
the controls and is used in the risk decision making process step. The top-20 risks are identified
as the key risks to CHI and are selected for additional mitigation and advanced to the risk
decision making stage. A Heat Map (see Exhibit 4) is provided to assist in this effort.
4) The 30 risks remaining from the 50 discussed at the consensus meeting are considered the non-
key risks, and these are monitored with key risk indicators to see if, over time, either the
likelihood and/or severity is increasing to the level which would result in one of these being
elevated to a key risk.
Risk Decision Making
Ben Li formed a Risk Committee to look at the risk identification and assessment information and to
define CHI’s risk appetite and risk limits, which were defined as follows:
Risk Appetite
CHI will maintain its overall risk profile in a manner consistent with our mission and vision and with the
expectations of our shareholders.
Risk Limits
CHI will also avoid any individual risk exposures deemed excessive by its Risk Committee; the individual
risk exposures will be determined separately for each key risk. CHI has zero tolerance for risks related to
internal fraud or violations of the employee code of conduct.
2
Ben Li expanded the role of the Risk Committee to also select and implement the risk mitigation for each
of the 20 key risks, at the same time as the committee determines the risk limits. .
1 Figure 1 Picture of Richard Selzer Richard Selz.docxoswald1horne84988
1
Figure 1 Picture of Richard Selzer
Richard Selzer
What I Saw at the Abortion
I am a surgeon. Sick flesh is everyday news. Escaping blood, all the outpourings of
disease, meaty tumors that terrify–I touch these to destroy them. But I do not make symbols of
them.
What I am saying is that I have seen and I am used to seeing. I am a man who has a
trade, who has practiced it long enough to see no news in any of it. Picture me, then. A
professional in his forties, three children, living in a university town—so, necessarily, well—
enlightened? Enough, anyhow. Successful in my work, yes. No overriding religious posture.
Nothing special, then, your routine fellow, trying to do his work and doing it well enough. Picture
me, this professional, a sort of scientist, if you please, in possession of the standard admirable
opinions, positions, convictions, and so on–on this and that matter–on abortion, for example.
All right. Now listen.
It is the western wing of the fourth floor of a great university hospital. I am present
because I asked to be present. I wanted to see what I had never seen: an abortion.
The patient is Jamaican. She lies on the table in that state of notable submissiveness I
have always seen in patients. Now and then she smiles at one of the nurses as though
acknowledging a secret.
A nurse draws down the sheet, lays bare the abdomen. The belly mounds gently in the
twenty-fourth week of pregnancy. The chief surgeon paints it with a sponge soaked in red
antiseptic. He does this three times, each time a fresh sponge. He covers the area with a sterile
sheet, an aperture in its center. He is a kindly man who teaches as he works, who pauses to
reassure the woman.
He begins.
“A little pinprick,” he says to the woman. He inserts the point of a tiny needle at the
midline of the lower portion of her abdomen, on the downslope. He infiltrates local anesthetic into
the skin, where it forms a small white bubble.
The woman grimaces. “That is all you will feel,” the doctor says, “except for a little
pressure. But no more pain.” She smiles again. She seems to relax. She settles comfortably on
the table. The worst is over.
The doctor selects a three-and-one-half-inch needle bearing a central stylet. He places
the point at the site of the previous injection. He aims it straight up and down, perpendicular.
Next he takes hold of her abdomen with his left hand, palming the womb, steadying it. He thrusts
with his right hand. The needle sinks into the abdominal wall.
“Oh,” says the woman quietly.
But I guess it is not pain she feels. It is more a recognition that the deed is being done. Another
thrust and he has speared the uterus.
“We are in,” he says. He has felt the muscular wall of the organ gripping the shaft of his
needle. A further slight pressure on the needle advances it a bit more. He takes his left hand
2
from the woman’s abdomen. He retracts the filament of the stylet from the bar.
1 Films on Africa 1. A star () next to a film i.docxoswald1horne84988
1
Films on Africa
1. A star (*) next to a film indicates that portions of that film might be shown in class in the course of
the semester.
2. All films are in DVD format, unless indicated otherwise.
3. Available: at the Madden and Fresno County Public Libraries, via Netflix, Blackboard or on-line.
4. For the on-line films, you can click on the link and this will lead you directly to the film.
5. Please be advised that a few films have the following notice: Warning: Contains scenes which some
viewers may find disturbing. You decide whether you want to watch them or not.
6. Some films are available on-line via VOD.
7. Let your instructor know if a link is no longer working.
The Africans (9 VHS films – each 60 min or 5 DVDs – each 120 min): Co-
production of WETA-TV and BBC-TV. Presented by Ali A. Mazrui. 1986.
Available at Madden Media & Fresno Public Libraries
Vol. 1 – The Nature of a continent*
Summary: Examines Africa as the birthplace of humankind and discusses
the impact of geography on African history, including the role of the Nile
in the origin of civilization and the introduction of Islam to Africa through its Arabic borders.
Vol. 2 – A Legacy of lifestyles*
Summary: This program explores how African contemporary lifestyles are influenced by
indigenous, Islamic and Western factors. It compares simple African societies with those that
are more complex and centralized, and examines the importance of family life.
Vol. 3 – New gods
Summary: This program examines the factors that influence religion in Africa, paying particular
attention to how traditional religions, Islam, and Christianity co-exist and influence each other.
Vol. 4 – Tools of exploitation
Summary: The impact of the West on Africa and the impact of Africa on the development of the
West are contrasted with an emphasis on the manner in which Africa's human and natural
resources have been exploited before, during, and after the colonial period.
Vol. 5 – New conflicts
Summary: Explores the tensions inherent in the juxtaposition of 3 African heritages, looking at
the ways in which these conflicts have contributed to the rise of the nationalist movement, the
warrior tradition of indigenous Africa, the jihad tradition of Islam, and modern guerilla warfare.
Vol. 6 – In search of stability
Summary: Gives an overview of the several means of governing in Africa. Examines new social
orders to illustrate an Africa in search of a viable form of government in the post-independence
period.
1.
2
Vol. 7 – A Garden of Eden in decay?
Summary: Identifies the problems of a continent that produces what it does not consume and
consumes what it does not produce. Shows Africa's struggle between economic dependence
and decay.
Vol. 8 – A Clash of cultures*
Summary: Discusses the conflicts and compromises which emerge from the coexistence of
many African traditions and modern life. Explores the question of whet.
1 Contemporary Approaches in Management of Risk in .docxoswald1horne84988
1
Contemporary Approaches in Management of Risk in Engineering Organizations
Assignment-1
Literature review
Student name: Hari Kiran Penumudi
student id: 217473484
Table of Contents
2
INTRODUCTION………………………………………………………………………3-4
OBJECTIVES & DELIVERABLES…………………………………………………....4
REVIEW OF LITERATURE…………………………………………………………....5-13
Risk and Risk Management………………………………………………………5-6
Risk Management Frameworks……………………………………………….....6-10
Importance of Risk Management in Engineering………………………….........10-13
GENERAL PROBLEM STATEMENT…………………………………………………13-14
RESEARH STRATEGY…………………………………………………………………14-15
RESOURCES REQUIREMENTS……………………………………………………….16
PROJECT PLANNING…………………………………………………………………..16
REFERNCES…………………………………………………………………………….17-19
Contemporary Approaches in Management of Risk in Engineering Organizations
3
Introduction
The term, ‘risk’ as defined by the Oxford English dictionary is a possibility to meet with any
kind of danger or suffer harm. Risk is a serious issue that every organization has to deal with in
their everyday operations. However, nature and magnitude of risks largely vary from
organization to organization and often depend on the type of the organization. Therefore,
organizations irrespective of their type of operations keep a risk management team that looks
after every risk to which an organization is vulnerable. Organizations in the field of engineering
also have to come across some inherent risks that negatively impact their operations. Engineering
may be defined as the process of applying science to practical purposes of designing structures,
systems, machines and similar things. Therefore, like every other organization, risk assessment
and management is also an integral part of engineering organizations. Since the task of
engineering is mostly complex, the risks in this area are also very complicated. If risks in
engineering field are not mitigated effectively it may produce long-term danger that may affect
both the organizational services and the society in whole. Hence, the activity of risk management
within engineering organizations must be undertaken seriously and measured thoroughly in order
to reduce the threat of risks. Amyotte et al., (2006) simply puts it like within the engineering
practice, an inbuilt risk is always present. Studies have found that despite the knowledge of
inherent risks within the field and activity of engineering, organizations are not very aware in
imparting knowledge about risk management to their engineers. From this the need of education
regarding the risk management approaches arises. Therefore, this paper tries to find out
approaches to management of risks and importance of these approaches within the area of
engineering. Bringing on the contemporary evidence from the literature review related to risk
management approaches, the paper examines how those approaches can be helpful for
4 .
1
Assignment front Sheet
Qualification Unit number and title
Pearson BTEC Levels 4 and 5 Higher
Nationals in Health and Social Care (RQF)
HNHS 17: Effective Reporting and Record-keeping in
Health and Social Care Services
Student name Assessor name Internal Verifier
B. Maher F. Khan
Date issued: Final Submission:
12/10/2018 18/01/2019
Assignment title
Effective Reporting and Record-keeping in Health and Social
Care services
Submission Format
This work will be submitted in 2 different formats:
Assessment 1 should be submitted as a word-processed report document in a standard report
style, which requires the use of headings, titles and appropriate captions. You may also choose
to include pictures, graphs and charts where relevant to support your work. The recommended
word count for this assignment is 1500–2000 words, though you will not be penalised for
exceeding this total.
Assessment 2 requires the submission of evidence from a mock training event on record-
keeping. This will include a set of materials used in the event, to include an electronic
presentation, evidence of your own record-keeping across a range of types of records, as well as
where you will demonstrate you have evaluated the effectiveness of your own completion of
relevant records. The recommended word count for the presentation is 1000–1500 words
(including speaker notes), though you will not be penalised for exceeding this total.
For both assessments, any material that is derived from other sources must be suitably
referenced using a standard form of citation. Provide a bibliography using the Harvard
referencing system.
Unit Learning Outcomes
LO1 Describe the legal and regulatory aspects of reporting and record keeping in a care setting
LO2 Explore the internal and external recording requirements in a care setting
Assignment Brief and Guidance
2
Purpose of this assignment:
The purpose of the assignment is to assess the learner firstly in relation to both the legal and
regulatory aspects of reporting and record keeping in a care setting through producing an internal
evaluative review of record keeping in their own care setting. Secondly, the learner will be
assessed on the internal and external recording requirements in a care setting. Thirdly, the learner
will be assessed on Review the use of technology in reporting and recording service user care in a
care setting and fourthly the learner will demonstrate how to keep and maintain records in own care
setting in line with national and local policies.
Breakdown of assignment:
Assignment:
You need to produce one written piece of work of 2,500 words (+/- 10%) covering all the
assessment criterion in LO1-LO4 as one document.
Unit Learning Outcomes
LO1 Describe the legal and regulatory aspects of reporting and record keeping in a care
setting
LO2 Explore the internal and external recording.
1 BBS300 Empirical Research Methods for Business .docxoswald1horne84988
1
BBS300 Empirical Research Methods for Business
TSA, 2018
Assignment 1
Due: Sunday, 7 October 2018,
23:55 PM
This assignment covers material from Sessions 1-4 and is worth 20% of your total mark
of BBS300. Your solutions should be properly presented, and it is important that you
double-check your spelling and grammar and thoroughly proofread your assignment
before submitting. Instructions for assignment submission are presented in
the “Assignment 1” link and must be strictly adhered to. No marks will be
awarded to assignments that are submitted after the due date and time.
All analyses must be carried out using SPSS, and no marks will be awarded
for assignment questions where SPSS output supporting your answer is not
provided in your Microsoft Word file submitted for the Assignment.
Questions
In this assignment, we will examine the “Real Estate Market” dataset (described at the
end of the assignment ) and “Employee Satisfaction” dataset. Before beginning the
assignment, read through the descriptions of these dataset and their variables carefully.
The “Real Estate Market” dataset can be found in the file “realestatemarket.sav,” and
the “Employee Satisfaction” dataset can be found in the file “employeesatisfaction.sav.”
You will need to carefully inspect both SPSS data files to be sure that the
specification of variable types is correct and, where appropriate, value
labels are entered.
1. (12 marks)
2
Use appropriate graphical displays and measures of centrality and dispersion
to summarise the following four variables in the “Real Estate Market” dataset. For
graphical displays for numeric data, be sure to comment on not only the shape of
the distribution but also compliance with a normal distribution. Be sure to
include relevant SPSS output (graphs, tables) to support your answers.
(a) Price.
(b) Lot Size.
(c) Material.
(d) Condition.
2. (8 marks)
Again consider the variable Price, which records the property price (in AUD). It
is of interest to know if this is associated with the distance of the property is
located to the train station. It i s al so of i nter e st t o kn o w if th e p rop ert y
pri ce s are a sso ciate d with di st an ce to t h e ne ar e st b u s sto p. Carry out
appropriate statistical techniques to assess whether there is a significant
association between the property price and distance to the nearest train (To train)
station and the nearest bus stop (To bus). Be sure to thoroughly assess the
assumptions of your particular analysis, and be sure to include relevant SPSS
output (graphs, tables) to support your answers.
3. (7 marks)
Consider the “Employee Satisfaction” dataset, which asked participants to provide their
level of regularity to a series of thirteen statements. Conduct an appropriate analysis
to assess the reliability of responses to these statements. If the reliability will
increa.
1 ASSIGNMENT 7 C – MERGING DATA FILES IN STATA Do.docxoswald1horne84988
1
ASSIGNMENT 7 C – MERGING DATA FILES IN STATA
Download the world development data covering the years 2000-2016 from the website
“http://databank.worldbank.org/data/reports.aspx?source=World-Governance-Indicators” for the
following upper-middle-income countries.
Countries of Interest:
Albania Ecuador Montenegro
Algeria Equatorial Guinea Namibia
American Samoa Fiji Nauru
Argentina Gabon Panama
Azerbaijan Grenada Paraguay
Belarus Guyana Peru
Belize Iran, Islamic Rep. Romania
Bosnia and Herzegovina Iraq Russian Federation
Botswana Jamaica Samoa
Brazil Kazakhstan Serbia
Bulgaria Lebanon South Africa
China Libya St. Lucia
Colombia Macedonia, FYR St. Vincent and the Grenadines
Costa Rica Malaysia Suriname
Croatia Maldives Thailand
Cuba Marshall Islands Tonga
Dominica Mauritius Turkey
Dominican Republic Mexico Turkmenistan
Tuvalu
Venezuela, RB
Variables of Interest
Control of Corruption: Estimate
Government Effectiveness: Estimate
Political Stability and Absence of Violence/Terrorism:
Estimate
Regulatory Quality: Estimate
Rule of Law: Estimate
Voice and Accountability: Estimate
2
STEP 1 - Download the data from the World-Governance-Indicators database as shown below
STEP 2 - Check the variables of interest
3
Please make sure you are checking the variables with “Estimates”.
TO VIEW THE DEFINITIONS OF THE VARIABLES
4
Step 3 – Select countries of interest
5
Step 4 – Click on “Time” and select the “year range” you are interested in (2000-2016)
6
Step 5 – Click on the “Layout” as shown below
Change the time layout to “Row,” series to “Column” and Country to “Row.”
Next, click on the “apply changes.”
Step 6 – Click on the “Download option” and select “Excel” as shown below
7
STEP 7: Using Excel, Replace the Missing Values With “.” (See previous assignments)
STEP 8: SAVE THE EXCEL DATA FILE ON YOUR COMPUTER PREFERABLY IN A
FOLDER
STEP 9: IMPORT YOUR DATA INTO STATA AND NAME YOUR DATA SET
“WORLD_GOVERNANCE_INDICATORS.” (See previous assignments for steps)
8
STEP 10; RENAME THE VARIABLES AS SHOWN BELOW (See previous assignments for
steps)
Using stata, merge the data set from “ASSIGNMENT 3B” with this dataset
VERY IMPORTANT Note: Merging two datasets requires that both have at least one variable in
common (either string or numeric).
This statement requires that the variable name for “Time” and “Country” should be the same in the two
data set
MERGING THE DATASET FROM “ASSIGNMENT 3” WITH THE DATA FROM THE
WORLD GOVERNANCE INDICATORS
Merging data files in stata
https://www.youtube.com/watch?v=EV-5PztbHs0
https://www.youtube.com/watch?v=Uh7C0mlhB3g&t=54s
https://www.youtube.com/watch?v=2etG_34ODoc
I will strongly encourage you to watch these videos before merging
I will also strongly recommend you read the notes in the link below before you star.
1 Assessment details for ALL students Assessment item.docxoswald1horne84988
1
Assessment details for ALL students
Assessment item 3 - Individual submission
Due date: Week 12 Monday (1 Oct 2018) 11:55 pm AEST
Weighting:
Length:
50% (or 50 marks)
There is no word limit for this report
Objectives
This assessment item relates to the unit learning outcomes as stated in the unit profile.
Enabling objectives
1. Analyse a case study and identify issues associated with the business;
2. Develop and deploy the application in IBM Bluemix;
3. Evaluate existing and new functionalities to address business problems;
4. Prepare a document to report your activities using text and multimedia (for example screenshots, videos).
General Information
The purpose of this assignment is to create a cloud based simulating environment which will help to
identify/understand the problem stated in the given case study using analysis tools available in IBM
Bluemix. In assignment three, you are working individually. By doing this assignment, you will
learn to use skills and knowledge of emerging technologies like cloud computing, IoT, to simulate a
business scenario to capture operational data and share with a visualization tool. You will acquire a
good understanding of smart application design in a cloud environment for efficient application
configuration and deployment.
What do you need to do?
The assignment requires you to do the following -
• Download the ‘Starter_Code_For_Assignment_Three.rar’ given in week 8 to
configure, and deploy a cloud based smart/IoT (Internet of Things) application to
simulate the business case.
• Choose a case study out of given two below and analyse the case study to
understand the business problem and design a solution for those problems.
• Deploy the starter source code in your Bluemix account and modify it to address
all required milestones mentioned in your chosen case study.
• Finally prepare a report according to given format and specifications below and
submit it in Moodle.
2
Report format and specifications -
You are required to submit a written report in a single Microsoft Word (.doc or .docx)
document. There is no word limit but any unnecessary information included in the report
may result in reduced marks.
The report must contain the following content (feel free to define your own sections,
as long as you include all the required content):
o Cover page/title page and Table of contents
o URL of the app and login details of the IBM Bluemix account
o Introduction
o Case study analysis which will report –
o Business problems you have identified in the case study
o Possible solutions for each and how do these solutions address the
business problems?
o What are the solutions you implemented in the application?
o The step by step process you have followed to configure and deploy the smart app
for business case simulation. You may choose to use screenshots and notes to
enrich your report but you must have a video of the pr.
1
CDU APA 6th
Referencing Style Guide
(February 2019 version)
2
Contents
APA Fundamentals .......................................................................................... 3
Reference List ................................................................................................... 3
Citing in the text ............................................................................................... 5
Paraphrase ................................................................................................... 5
Direct quotes................................................................................................. 5
Secondary source .......................................................................................... 6
Personal communications............................................................................. 6
Examples .......................................................................................................... 7
Book .............................................................................................................. 7
eBook ............................................................................................................ 7
Journal article with doi ................................................................................ 7
Journal article without doi ........................................................................... 7
Web page ...................................................................................................... 7
Books - print and online ................................................................................... 8
Single author ................................................................................................ 8
eBook/electronic book ................................................................................ 11
Journal articles, Conference papers and Newspaper articles ........................ 13
Multimedia ..................................................................................................... 16
YouTube or Streaming video ..................................................................... 16
Online images ................................................................................................. 17
Web sources and online documents ................................................................ 20
Web page .................................................................................................... 20
Document from a website ........................................................................... 21
Legislation and cases ...................................................................................... 23
Common abbreviations .................................................................................. 24
Appendix 1: How to write an APA reference when information is missing .. 25
Appendix 2: Author layout.
1
BIOL 102: Lab 9
Simulated ABO and Rh Blood Typing
Objectives:
After completing this laboratory assignment, students will be able to:
• explain the biology of blood typing systems ABO and Rh
• explain the genetics of blood types
• determine the blood types of several patients
Introduction:
Before Karl Landsteiner discovered the ABO human blood groups in 1901, it was thought that all blood was the
same. This misunderstanding led to fatal blood transfusions. Later, in 1940, Landsteiner was part of a team
who discovered another blood group, the Rh blood group system. There are many blood group systems known
today, but the ABO and the Rh blood groups are the most important ones used for blood transfusions. The
designation Rh is derived from the Rhesus monkey in which the existence of the Rh blood group was
discovered.
Although all blood is made of the same basic elements, not all blood is alike. In fact, there are eight different
common blood types, which are determined by the presence or absence of certain antigens – substances that
can trigger an immune response if they are foreign to the body – on the surface of the red blood cells (RBCs
also known as erythrocytes).
ABO System:
The antigens on RBCs are agglutinating antigens or agglutinogens. They have been designated as A and B.
Antibodies against antigens A and B begin to build up in the blood plasma shortly after birth. A person
normally produces antibodies (agglutinins) against those antigens that are not present on his/her erythrocytes
but does not produce antibodies against those antigens that are present on his/her erythrocytes.
• A person who is blood type A will have A antigens on the surface of her/his RBCs and will have
antibodies against B antigens (anti-B antibodies). See picture below.
• A person with blood type B will have B antigens on the surface of her/his RBCs and will have antibodies
against antigen A (anti-A antibodies).
• A person with blood type O will have neither A nor B antigens on the surface of her/his RBCs and has
BOTH anti-A and anti-B antibodies.
• A person with blood type AB will have both A and B antigens on the surface of her/his RBCs and has
neither anti-A nor anti-B antibodies.
The individual’s blood type is based on the antigens (not the antibodies) he/she has. The four blood groups
are known as types A, B, AB, and O. Blood type O, characterized by an absence of A and B agglutinogens, is
the most common in the United States (45% of the population). Type A is the next in frequency, found in 39%
of the population. The incidences of types B and AB are 12% and 4%, respectively.
2
Table 1: The ABO System
Blood
Type
Antigens on
RBCs
Antibodies
in the Blood
Can GIVE Blood
to Groups:
Can RECEIVE
Blood from Groups:
A A Anti-B A, AB O, A
B B Anti-A B, AB O, B
AB A and B
Neither anti-A
nor anti-B
AB O, A, B, AB
O
Neither A nor
B
Both anti-A.
1
Business Intelligence Case
Project Background
Mell Industries is a national manufacturing firm that specializes in textiles based out of
Chicago. Starting out as a small factory in Warrenville, Illinois, the firm experienced a period of steady
growth over the past twenty-four years. Steadily opening new warehouses and factories in the
surrounding areas in Michigan and Indianapolis until eventually moving their base of operations to
Chicago. Due to this expansion, Mell Industries is at the height of its production and hopes to avoid any
interferences or deceleration of growth.
In recent years, the firm has been under heavy media scrutiny for supposedly compensating its
female staff unfairly lower compared to male counterparts. This was initiated when a disgruntled
employee leaked the company payroll allegedly showcasing an unjust gap of income between the
female employee and her male counterpart. This type of gender pay gap is highly criticized and as a
precaution, Mell Industries has hired Cal Poly Pomona to conduct research to determine the validity of
these claims. Mell Industries has provided Cal Poly Pomona with a data set of a sample population of
747 employees. Mell Industries has also offered Cal Poly Pomona compensation for any promising
information gathered. Mell Industries may use information gathered from this project in future
employee compensation decisions.
The initial dataset has been given to you in the form of an excel spreadsheet titled
Case_dataset.xlsx consisting of 12 columns labeled:
● Column A - Employee ID
● Column B - Gender
● Column C - Date of Birth
● Column D - Date of Hire
● Column E - Termination Date
● Column F - Occupation
● Column G - Salary
● Column H to L - Employee Evaluation Metrics
In addition, Mell Industries provided the latest annual employee performance review evaluation
results rating each employee in various performance categories. They have turned over this information
separately and as a consultant, it is your task to provide Mell Industries with the most accurate and
relevant information in a digestible form. Furthermore, using excel skills learned during the course, you
will manipulate and analyze the data set in order to make appropriate managerial decisions. You will
utilize excel functions highlighted in this project as well as a pivot table and chart to form a decision
support system in order to answer the critical thinking questions.
Project Objective
The purpose of this project is to perform a methodical data analysis to assist the company make
an informed decision. This could also serve as a basis for implementing critical adjustments to certain
business aspects if necessary. Illustrate the business process by condensing a large set of data, to
present relevant information with data visualization. We will be utilizing Microsoft Excel 2016 to
complete this project.
2
TA.
1 Network Analysis and Design This assignment is.docxoswald1horne84988
1
Network Analysis and Design
This assignment is worth 30%.
Deadline: Mon, Week 12
Part A: HQ LAN Upgrade (35%)
Background:
ABC is a big company in the US. ABC has employed you as the IT officer of the company.
Your job is to analyse the performance of the HQ LAN, suggest changes to improve the
network performance and provide a report to your boss.
Settings:
Run all simulations for 30 minutes to simulate a working day.
The graphs should be time averaged
Duplicate scenario for each possible setup
Tasks:
1. Analyse the current performance of the HQ LAN for each level and comment on it.
You are required to show all relevant graphs. The graphs for each level can be
overlaid. (10%)
2. Some staffs are unhappy about the speed of the network. Anything that takes more
than 1 second is not desirable. You have decided to try the following to improve the
network performance. Show the relevant graphs and comment on the results: (5%)
a. Increase the link speeds of
i. HQ_Router1 to HQ_Router3 from 1 Gbps to 10 Gbps and
ii. HQ_Router2 to HQ_Router3 from 1 Gbps to 10 Gbps
b. Increase the LANs for level 1, 2 and 3 from 100 Mbps to 1 Gbps
c. Try out 1 other way that meets the requirement.
3. After meeting the requirement, the company has decided to purchase an Ethernet
Server and placed it in the HQ LAN. (10%)
a. Rename it to HQ Server
b. Use a 1Gbps link
c. Set Application: Supported Services to All
d. Set statistics to view the following:
i. Server DB Task Processing Time (Heavy)
ii. Server Email Task Processing Time (Heavy)
iii. Server HTTP Task Processing Time (Heavy)
iv. Server Performance Task Processing Time
e. Show the performance of the HQ Server with the required graphs and
comment on the results
f. Justify the location of the server
g. State at least 3 security measures you will take to protect the HQ LAN from
malicious attacks
4. What would you do so that all the 4 statistics of the HQ server are less than 0.025 s?
Show all relevant graphs. (3 marks)
2
5. Prepare a report and state the additional amount of money that is needed for the
changes you have made to meet the additional requirements. Refer to the given price
list in the Appendix. (7%)
a. Your report should include a content page, a summary of the addressed issues,
objectives, budgeting, proposed solutions and conclusion.
Part B: Network Design (65%)
Background:
Due to your excellent work in the analysis of the HQ LAN, you are now assigned the new
task of designing the LAN for one of ABC’s client, XYZ. The company XYZ is made up of 4
sections and the number of people in each section is as shown below.
1. Research – 20
2. Technical – 10
3. Guests – 4
4. Executives – 2
Set up the following staff profile:
1. Research: file transfer (light), web browsing (heavy) and file print (light)
2. Technical: Database Access (heavy), telnet (heavy) and email (light)
3. Guests: Em.
1 Name _____________________________ MTH129 Fall .docxoswald1horne84988
1
Name: _____________________________
MTH129 Fall 2018 - FINAL EXAM A
Show all work neatly on paper provided. Label all work. Place final answers on the answer sheet.
PART I: Omit 1 complete question. Place an “X” on the problems & answer space you are omitting.
1. Find the inverse of the following functions:
a. 𝑓(𝑥) = 2𝑥 − 3
b. 𝑓(𝑥) =
3𝑥 +1
𝑥−2
2. If 𝑓(𝑥) = 𝑥 2 − 2𝑥 + 3 and 𝑔(𝑥) = −3𝑥 + 4, find the following:
a. (𝑓°𝑔)(𝑥) b. (𝑓°𝑔)(2)
3. Find the domain for the following expression:
a) √𝑥 + 5 𝑏) 7𝑥 2 + 3𝑥 − 1 𝑐)
𝑥 2+4
𝑥 2−9
4. Find the radian measures of the angles with the given degree measures.
a) 81°
Find the degree measures of the angles with the given radian measures.
b)
13𝜋
6
5. Solve the following equations:
a) (5t) = 20
b) 6000 = 40(15)t
6. Expand the following logarithmic expressions:
a. log(𝐴𝐵2 )
b. ln(
4
√3
)
7. Describe how the graph of each function can be obtained from the graph f
a. 𝑦 = 𝑓(𝑥) − 8
b. 𝑦 = 𝑓(𝑥 + 4) − 5
8. A real number t is given 𝑡 =
2𝜋
3
a. Find the reference number for t.
b. Find the terminal point P(x,y) on the unit circle determined by t
c. The unit circle is centered at __________________ and has a radius of _________________
PART II: Omit 1 complete question. Place an “X” on the problems & answer space you are omitting.
2
1. A sum of $7,000 is invested at an interest rate of 4
1
2
% per year, compounding monthly. (round all answers to
the nearest cent)
a. Find the amount of the investment after 2
1
2
years.
b. How long will it take for the investment to amount to $12,000?
c. Using the information in part (a), find the amount of the investment if compounded quarterly.
2. When a company charges price p dollars for one of its products, its revenue is given by
𝑅 = 𝑓(𝑝) = 500𝑝(30 − 𝑝)
a. Create a quadratic function for price with respect to revenue.
b. What price should they charge in order to maximize their revenue?
c. What is the maximum revenue?
d. What would be the revenue if the price was set at $10?
e. Sketch a rough graph – indicate the intercepts and the maximum coordinates.
3. The charges for a taxi ride are an initial charge of $2.50 and $0.85 for each mile driven.
a. Write a function for the charge of a taxi ride as a linear function of the distance traveled.
b. What is the cost of a 12 mile trip?
c. Find the equation of a line that passes through the following points: (1,-2) , (2,5) Express in 𝑦 =
𝑚𝑥 + 𝑏 form
d. Graph part ( c )
4. a. Divide the following polynomial and factor completely.
𝑃(𝑥) = 3𝑥 4 − 9𝑥 3 − 2𝑥 2 + 5𝑥 + 3; 𝑐 = 3
b. Given polynomial−𝑥 2 + 5𝑥 − 6, state the end behavior of its graph.
c. Using the polynomial on part ( c ), would this g
1 Lab 8 -Ballistic Pendulum Since you will be desig.docxoswald1horne84988
1
Lab 8 -Ballistic Pendulum
Since you will be designing your own procedure you will have two
class periods to take the required data.
The goal of this lab is to measure the speed of a ball that is fired
from a projectile launcher using two different methods. The
Projectile launcher has three different settings, “Short Range,”
“Medium Range” and “Long Range,” however you will only need to
determine the speed for any ONE of these Range settings.
Method 1 involves firing the ball directly into the “Ballistic
Pendulum” shown below in Figure 2 for which limited instructions will be provided. Method 2
is entirely up to your group. While you have significant freedom to design your own procedure,
you will need to worry about the random and systematic uncertainties you are introducing
based on your procedure. This manual will provide a few hints to help reduce a few of those
uncertainties.
The ballistic pendulum pictured in Figure 2 is important canonical problem students study to
explore the conservation of momentum and energy. The ball is fired by the projectile launcher
into a “perfectly inelastic collision” with the pendulum. The pendulum then swings to some
maximum angle which is measured by an Angle Indicator.
Caution: The pendulum has a plastic hinge and Angle Indicator which are both fragile. Be
gentle.
Study the ballistic pendulum carefully. Before we begin, here are a few things to consider and
be aware of in Figure 2:
Projectile launcher
Angle indicator (curved
black bar)
Clamp
Pendulum (can be removed
for measurements)
Figure 2: Ballistic Pendulum
Plumb bob
Firing string
Release
point
Figure 1: Projectile Launcher
Bolt for removing pendulum
2
A. Clamping the ballistic pendulum to the table will reduce random uncertainties in the
speed with which the projectile launcher releases the ball. Similarly, you should check
that the various bolts are snug and that the ball is always fully inside the launcher (not
rolling around inside the barrel of launcher).
B. If the lab bench is not perfectly horizontal the plumb bob and angle indicator will not
read zero degrees before you begin your experiment. You should fix AND/OR account
for these discrepancies.
C. In Figure 3 you will notice a tiny gap between the launcher and the pendulum. This
important gap prevents the launcher from contacting the pendulum directly as the ball
is fired. Without this gap an unknown amount of momentum is transferred from the
launcher directly to the pendulum (in addition to the momentum transferred by the
ball) significantly complicating our experiment.
Figure 3: Important gap between Launcher and Pendulum
Equipment
1 Ballistic Pendulum (shown in Figure 2)
A bag with three balls
1 loading rod
1 Clamp
1 triple beam balance scale
Safety goggles for each group member
Any equipment found in your equipment drawer.
Reasonable equipment reque.
1 I Samuel 8-10 Israel Asks for a King 8 When S.docxoswald1horne84988
1
I Samuel 8-10
Israel Asks for a King
8 When Samuel grew old, he appointed his sons as Israel’s leaders.[a]2 The
name of his firstborn was Joel and the name of his second was Abijah, and
they served at Beersheba. 3 But his sons did not follow his ways. They turned
aside after dishonest gain and accepted bribes and perverted justice.
4 So all the elders of Israel gathered together and came to Samuel at
Ramah. 5 They said to him, “You are old, and your sons do not follow your
ways; now appoint a king to lead[b] us, such as all the other nationshave.”
6 But when they said, “Give us a king to lead us,” this displeasedSamuel; so
he prayed to the LORD. 7 And the LORD told him: “Listen to all that the people
are saying to you; it is not you they have rejected, but they have rejected
me as their king. 8 As they have done from the day I brought them up out of
Egypt until this day, forsaking me and serving other gods, so they are doing
to you. 9 Now listen to them; but warn them solemnly and let them
know what the king who will reign over them will claim as his rights.”
10 Samuel told all the words of the LORD to the people who were asking him
for a king. 11 He said, “This is what the king who will reign over you will claim
as his rights: He will take your sons and make them serve with his chariots
and horses, and they will run in front of his chariots. 12 Some he will assign to
be commanders of thousands and commanders of fifties, and others to plow
his ground and reap his harvest, and still others to make weapons of war
and equipment for his chariots. 13 He will take your daughters to be
perfumers and cooks and bakers. 14 He will take the best of your fields and
vineyards and olive groves and give them to his attendants. 15 He will take a
tenth of your grain and of your vintage and give it to his officials and
attendants. 16 Your male and female servants and the best of your cattle[c] and
donkeys he will take for his own use. 17 He will take a tenth of your flocks,
and you yourselves will become his slaves. 18 When that day comes, you will
cry out for relief from the king you have chosen, but the LORD will not
answer you in that day.”
https://www.biblegateway.com/passage/?search=1%20Samuel+8&version=NIV#fen-NIV-7371a
https://www.biblegateway.com/passage/?search=1%20Samuel+8&version=NIV#fen-NIV-7375b
https://www.biblegateway.com/passage/?search=1%20Samuel+8&version=NIV#fen-NIV-7386c
2
19 But the people refused to listen to Samuel. “No!” they said. “We wanta
king over us. 20 Then we will be like all the other nations, with a king to lead
us and to go out before us and fight our battles.”
21 When Samuel heard all that the people said, he repeated it before
the LORD. 22 The LORD answered, “Listen to them and give them a king.”
Then Samuel said to the Israelites, “Everyone go back to your own town.”
Samuel Anoints Saul
9 There was a Benjamite, a man of standing, whose n.
1 Journal Entry #9 What principle did you select .docxoswald1horne84988
1
Journal Entry #9
What principle did you select?
I selected principle 1 of part 1, “Don’t criticize, condemn or complain”.
Who did you interact with?
For this assignment I interacted with my younger cousin.
What was the context?
I had visited my Aunty and she and her husband asked me to stay a while as I was on school
break. They accommodated me and I decided in return to help look after my cousin in the period
when he got out of school and before they got back from work. He is 5 years old and can be quite
the handful.
What did you expect?
I expected that an authoritative approach would easily compel him to follow my instructions so
that the transition from school life into home life would be easy.
What happened?
At first, I used commanding language to get him to change out of his uniform or properly store
his back pack and books before stepping out to play. The first day was difficult and the way I
deal with him were not getting through. On the 2nd day, the same was observed. On the 3rd day,
before he could drop his back pack and run out, I offered to make him a sandwich to eat before
he left to play if he would change and clean up. He rushed up stairs and freshened up. On the
next day, he came home and rushed up to change and freshen up all on his own. I had not
initially offered; but I made him a sandwich regardless.
How did it make you feel?
It made me feel good to be able to get through to my cousin. After this, if I ever needed him to
do something in a better way than previously, I would encourage him onto a different way of
accomplishing the same. I would often offer praise after adoption of the new suggested method
was adopted or offered incentive.
2
What did you learn?
I learnt that in criticizing a person’s action, it is difficult to deter their belief in their methods,
values or beliefs. This usually just gives them the will to justify or defend their positions. It is
almost an exercise in futility to attempt to effect change by complaining, condemning or
criticizing.
What surprised you?
I was surprised by how fast the change was effected after the shift in direction I took to approach
my cousin. In not criticizing his way of doing things any longer and employing a different tactic,
I was able to influence his routine as well as build good rapport with him.
Going forward, how can you apply what you learnt?
Going forward I will attempt to understand that everyone has a belief or image of their own that I
should respect. These beliefs, systems and values are crucial to their inherent dignity and to
criticize or attack this will only fuel conflict.
Running head: Physical activity project 1
Physical activity project:
A 7-day analysis and action plans
Student Name
National University
Physical activity project 2
Introduction
Physical activity (PA) has been a major component of public health since the rise of
chronic illnesses .
1
HCA 448 Case 2 for 10/04/2018
Recently, a patient was transferred to a cardiac intensive care unit (CICU) at Methodist Hospital.
Methodist is a 250-bed hospital, which is one of five hospitals in the University Health System.
The patient was a retired 72-year-old man, who recently (i.e., 25 days ago) had a mild heart
attack and was treated and released from a sister hospital, which is in the same system as
Methodist Hospital. An otherwise health individual, Mr. Charlie Johnson (a husband, father of 4,
and grandfather of 12) is in now need or lots of medication and a battery of tests. To the nurses
on shift, it appears that the entire Johnson family is in patient’s room watching the clinical staff
treated Mr. Johnson. The family overhears everything and they want to know what is being done
to (and for) their loved one. In addition, they want to know the meaning behind the various beeps
coming from the many machines attached to Mr. Johnson.
Over the past 10 years, the latest U.S. News and World report has ranked Methodist Hospital as
one of the Best Hospitals for Cardiology & Heart Surgery. However, it is important to note that
over the past few years, the unit has dropped in the rankings.
Katherine Ross RN, the patient care director of the CICU, which has 14 beds, has held this post
for two years. (See Figure) The unit has a $20 million budget. Ms. Ross has worked at Methodist
Hospital for 16 years. She spends 50 percent of her time on patient safety, 25 percent on staffing
and recruitment, and 20 percent with nurses in relation to their satisfaction with the work and
with families relative to their satisfaction with care. Ten percent of Ms. Ross’s time is spent on
administrative duties. According to Ms. Ross, “I like is working with exceptional nurses who are
very smart and do what it takes with limited resources. However, we don’t always feel
empowered, despite the existence of shared governance, a structure I help to coordinate.”
2
Relationship with Nurses on the Unit:
Nurses on the unit work a three day a week, 12 hours a shift. Ms. Ross says, “we did an
employee opinion survey that went to all employees on the unit, 50 people in all, but only 13
responded. Some of them weren’t sure who their supervisor was. The employees aren’t happy
but our patients are happy.” She adds that “my name is on the unit, not the medical director’s. If
anything goes wrong with the unit, they blame it on nursing. Yet I’m brushed off by people
whom I have to deal with outside of the unit. For example, we have a problem with machines
that analyze blood gases. I spoke with the people there about the technology. This was four
weeks ago. It’s a patient safety issue. I sent them e-mails. I need the work to get done, the staff
don’t feel empowered if I’m not empowered. This goes for other departments as well. For
example, respiratory therapy starts using a new ventilator witho.
1
HC2091: Finance for Business
Trimester 2 2018
Group Assignment
Assessment Value: 20%
Due Date: Sunday 23:59 pm, Week 10
Group: 2- 4 students
Length: Min 2500 words
INSTRUCTIONS
Students are required to form a group to study, undertake research, analyse and conduct academic
work within the areas of business finance covered in learning materials Topics 1 to 10 inclusive.
The assignment should examine the main issues, including underlying theories, implement
performance measures used and explain the firm financial performance. Your group is strongly
advised to reference professional websites, journal articles and text books in this assignment (case
study).
Tasks
This assessment task is a written report and analysis of the financial performance of a selected
listed company on the ASX in order to provide financial and investment advice to a wealthy
investor. This assignment requires your group to undertake a comprehensive examination of a
firm’s financial performance based on update financial statements of the chosen companies.
Group Arrangement
This assignment must be completed IN Group. Each group can be from 2 to maximum 4 student
members. Each group will choose 1 company and once the company has been chosen, the other
group cannot choose the same company. First come first served rule applies here, it means you
need to form your group, choose on company from the list of ASX and register them with your
lecturer as soon as possible. Once your lecturer registers your chosen company, it cannot be
chosen by any other group. Your lecturer then will put your group on Black Board to enable you
to interact and discuss on the issues of your group assignment using Black Board environment.
However, face to face meeting, discussion and other methods of communication are needed to
ensure quality of group work. Each group needs to have your own arrangement so that all the
group members will contribute equally in the group work. If not, a Contribution Statement,
which clearly indicated individual contribution (in terms of percentage) of each member, should
be submitted as a separate item in your assignment. Your individual contribution then will be
assessed based on contribution statement to avoid any free riders.
2
Submission
Please make sure that your group member’s name and surname, student ID, subject name, and
code and lecture’s name are written on the cover sheet of the submitted assignment.
When you submit your assignment electronically, please save the file as ‘Group Assignment-
your group name .doc’. You are required to submit the assignment at Group Assignment
Final Submission, which is under Group Assignment and Due Dates on Black Board.
Submitted work should be your original work showing your creativity. Please ensure the self-
check for plagiarism to be done before final submission (plagiarism check is not over 30% .
1 ECE 175 Computer Programming for Engineering Applica.docxoswald1horne84988
1
ECE 175: Computer Programming for Engineering Applications
Homework Assignment 6
Due: Tuesday March 12, 2019 by 11.59 pm
Conventions: Name your C programs as hwxpy.c where x corresponds to the homework number and y
corresponds to the problem number. For example, the C program for homework 6, problem 1 should be
named as hw6p1.c.
Write comments to your programs. Programs with no comments will receive PARTIAL credit. For each
program that you turn in, at least the following information should be included at the top of the C file:
- Author and Date created
- Brief description of the program:
- input(s) and output(s)
- brief description or relationship between inputs and outputs
Submission Instructions: Use the designated Dropbox on D2L to submit your homework.
Submit only the .c files.
Problem 1 (15 points) Write a program that returns the minimum value and its location, max
value and its location and average value of an array of integers. Your program should call a
single function that returns that min and its location, max and its location and mean value of
the array. Print the results in the main function (not within the array_func function).
See sample code execution below. The declaration of this function is given below:
void array_func (int *x, int size, int *min_p, int *minloc_p, int *max_p, int *maxloc_p, double *mean_p)
/* x is a pointer to the first array element
size is the array size
min_p is a pointer to a variable min in the main function that holds the minimum
minloc_p is a pointer to a variable minloc in the main function that holds the location where the
minimum is.
max_p is a pointer to a variable max in the main function that holds the maximum
maxloc_p is a pointer to a variable maxloc in the main function that holds the location where the
maximum is.
mean_p is a pointer to a variable mean in the main function that holds the mean */
Declare the following array of integers within the main function:
Sample code execution:
int data_ar[] = { -3, 5, 6, 7, 12, 3, 4, 6, 19, 23, 100, 3, 4, -2, 9, 43, 32, 45,
32, 2, 3, 2, -1, 8 };
int data_ar2[] = { -679,-758,-744,-393,-656,-172,-707,-32,-277,-47,-98,-824,-695,
-318,-951,-35,-439,-382,-766,-796,-187,-490,-446,-647};
int data_ar3[] = {-142, -2, -56, -60, 114, -249, 45, -139, -25, 17, 75, -27, 158,
-48, 33, 67, 9, 89, 33, -78, -180, 186, 218, -274};
2
Problem 2 (20 points): A barcode scanner verifies the 12-digit code scanned by comparing the
code’s last digit to its own computation of the check digit calculated from the first 11 digits as
follows:
1. Calculate the sum of the digits in the odd-numbered indices (the first, third, …, ninth
digits) and multiply this sum by 3.
2. Calculate the sum of the digits in the even-numbered indices (the 0th, second, … tenth
digits).
3. Add the results from step 1 and 2. If the last digit of the addition result is 0, then 0 is the
check digit. .
1 Cinemark Holdings Inc. Simulated ERM Program .docxoswald1horne84988
1
Cinemark Holdings Inc.: Simulated ERM Program
Ben Li, Assistant Vice President of Compliance, is assigned the responsibility of developing an ERM
program at Cinemark Holdings Inc. (CHI). Over the past year, Ben has put in place the following ERM
activities:
Risk Identification and Assessment
The risk identification and assessment process steps are as follows:
1) Conduct online surveys of the heads of the 10 business segments and their 1-2 direct reports (15
people) and their mid-level managers (80 people). Exhibit 1 shows the instructions that are
included in the online survey. Exhibit 2 shows samples of the information collected from the
online survey.
2) Each of the 10 business segments separately organizes and compiles the results of the online
survey. They typically compile a robust list of 70-80 potential key risks. Each business segment
then prioritizes their top-5 risks and reports them to Ben Li, resulting in a total of 50 key risks (a
partial sample of the top-50 risk list is shown in Exhibit 3).
3) A consensus meeting is conducted where the 50 risks are shared with the top 10 members of
senior management in an open-group setting at an offsite one-day event. The 50 risks are each
discussed one at a time, after which the facilitator has the group collectively discuss and score
them for likelihood and severity. The risk ranking is calculated as the likelihood score plus the
severity score; the control effectiveness score is used to determine if there is room to improve
the controls and is used in the risk decision making process step. The top-20 risks are identified
as the key risks to CHI and are selected for additional mitigation and advanced to the risk
decision making stage. A Heat Map (see Exhibit 4) is provided to assist in this effort.
4) The 30 risks remaining from the 50 discussed at the consensus meeting are considered the non-
key risks, and these are monitored with key risk indicators to see if, over time, either the
likelihood and/or severity is increasing to the level which would result in one of these being
elevated to a key risk.
Risk Decision Making
Ben Li formed a Risk Committee to look at the risk identification and assessment information and to
define CHI’s risk appetite and risk limits, which were defined as follows:
Risk Appetite
CHI will maintain its overall risk profile in a manner consistent with our mission and vision and with the
expectations of our shareholders.
Risk Limits
CHI will also avoid any individual risk exposures deemed excessive by its Risk Committee; the individual
risk exposures will be determined separately for each key risk. CHI has zero tolerance for risks related to
internal fraud or violations of the employee code of conduct.
2
Ben Li expanded the role of the Risk Committee to also select and implement the risk mitigation for each
of the 20 key risks, at the same time as the committee determines the risk limits. .
1 Figure 1 Picture of Richard Selzer Richard Selz.docxoswald1horne84988
1
Figure 1 Picture of Richard Selzer
Richard Selzer
What I Saw at the Abortion
I am a surgeon. Sick flesh is everyday news. Escaping blood, all the outpourings of
disease, meaty tumors that terrify–I touch these to destroy them. But I do not make symbols of
them.
What I am saying is that I have seen and I am used to seeing. I am a man who has a
trade, who has practiced it long enough to see no news in any of it. Picture me, then. A
professional in his forties, three children, living in a university town—so, necessarily, well—
enlightened? Enough, anyhow. Successful in my work, yes. No overriding religious posture.
Nothing special, then, your routine fellow, trying to do his work and doing it well enough. Picture
me, this professional, a sort of scientist, if you please, in possession of the standard admirable
opinions, positions, convictions, and so on–on this and that matter–on abortion, for example.
All right. Now listen.
It is the western wing of the fourth floor of a great university hospital. I am present
because I asked to be present. I wanted to see what I had never seen: an abortion.
The patient is Jamaican. She lies on the table in that state of notable submissiveness I
have always seen in patients. Now and then she smiles at one of the nurses as though
acknowledging a secret.
A nurse draws down the sheet, lays bare the abdomen. The belly mounds gently in the
twenty-fourth week of pregnancy. The chief surgeon paints it with a sponge soaked in red
antiseptic. He does this three times, each time a fresh sponge. He covers the area with a sterile
sheet, an aperture in its center. He is a kindly man who teaches as he works, who pauses to
reassure the woman.
He begins.
“A little pinprick,” he says to the woman. He inserts the point of a tiny needle at the
midline of the lower portion of her abdomen, on the downslope. He infiltrates local anesthetic into
the skin, where it forms a small white bubble.
The woman grimaces. “That is all you will feel,” the doctor says, “except for a little
pressure. But no more pain.” She smiles again. She seems to relax. She settles comfortably on
the table. The worst is over.
The doctor selects a three-and-one-half-inch needle bearing a central stylet. He places
the point at the site of the previous injection. He aims it straight up and down, perpendicular.
Next he takes hold of her abdomen with his left hand, palming the womb, steadying it. He thrusts
with his right hand. The needle sinks into the abdominal wall.
“Oh,” says the woman quietly.
But I guess it is not pain she feels. It is more a recognition that the deed is being done. Another
thrust and he has speared the uterus.
“We are in,” he says. He has felt the muscular wall of the organ gripping the shaft of his
needle. A further slight pressure on the needle advances it a bit more. He takes his left hand
2
from the woman’s abdomen. He retracts the filament of the stylet from the bar.
1 Films on Africa 1. A star () next to a film i.docxoswald1horne84988
1
Films on Africa
1. A star (*) next to a film indicates that portions of that film might be shown in class in the course of
the semester.
2. All films are in DVD format, unless indicated otherwise.
3. Available: at the Madden and Fresno County Public Libraries, via Netflix, Blackboard or on-line.
4. For the on-line films, you can click on the link and this will lead you directly to the film.
5. Please be advised that a few films have the following notice: Warning: Contains scenes which some
viewers may find disturbing. You decide whether you want to watch them or not.
6. Some films are available on-line via VOD.
7. Let your instructor know if a link is no longer working.
The Africans (9 VHS films – each 60 min or 5 DVDs – each 120 min): Co-
production of WETA-TV and BBC-TV. Presented by Ali A. Mazrui. 1986.
Available at Madden Media & Fresno Public Libraries
Vol. 1 – The Nature of a continent*
Summary: Examines Africa as the birthplace of humankind and discusses
the impact of geography on African history, including the role of the Nile
in the origin of civilization and the introduction of Islam to Africa through its Arabic borders.
Vol. 2 – A Legacy of lifestyles*
Summary: This program explores how African contemporary lifestyles are influenced by
indigenous, Islamic and Western factors. It compares simple African societies with those that
are more complex and centralized, and examines the importance of family life.
Vol. 3 – New gods
Summary: This program examines the factors that influence religion in Africa, paying particular
attention to how traditional religions, Islam, and Christianity co-exist and influence each other.
Vol. 4 – Tools of exploitation
Summary: The impact of the West on Africa and the impact of Africa on the development of the
West are contrasted with an emphasis on the manner in which Africa's human and natural
resources have been exploited before, during, and after the colonial period.
Vol. 5 – New conflicts
Summary: Explores the tensions inherent in the juxtaposition of 3 African heritages, looking at
the ways in which these conflicts have contributed to the rise of the nationalist movement, the
warrior tradition of indigenous Africa, the jihad tradition of Islam, and modern guerilla warfare.
Vol. 6 – In search of stability
Summary: Gives an overview of the several means of governing in Africa. Examines new social
orders to illustrate an Africa in search of a viable form of government in the post-independence
period.
1.
2
Vol. 7 – A Garden of Eden in decay?
Summary: Identifies the problems of a continent that produces what it does not consume and
consumes what it does not produce. Shows Africa's struggle between economic dependence
and decay.
Vol. 8 – A Clash of cultures*
Summary: Discusses the conflicts and compromises which emerge from the coexistence of
many African traditions and modern life. Explores the question of whet.
1 Contemporary Approaches in Management of Risk in .docxoswald1horne84988
1
Contemporary Approaches in Management of Risk in Engineering Organizations
Assignment-1
Literature review
Student name: Hari Kiran Penumudi
student id: 217473484
Table of Contents
2
INTRODUCTION………………………………………………………………………3-4
OBJECTIVES & DELIVERABLES…………………………………………………....4
REVIEW OF LITERATURE…………………………………………………………....5-13
Risk and Risk Management………………………………………………………5-6
Risk Management Frameworks……………………………………………….....6-10
Importance of Risk Management in Engineering………………………….........10-13
GENERAL PROBLEM STATEMENT…………………………………………………13-14
RESEARH STRATEGY…………………………………………………………………14-15
RESOURCES REQUIREMENTS……………………………………………………….16
PROJECT PLANNING…………………………………………………………………..16
REFERNCES…………………………………………………………………………….17-19
Contemporary Approaches in Management of Risk in Engineering Organizations
3
Introduction
The term, ‘risk’ as defined by the Oxford English dictionary is a possibility to meet with any
kind of danger or suffer harm. Risk is a serious issue that every organization has to deal with in
their everyday operations. However, nature and magnitude of risks largely vary from
organization to organization and often depend on the type of the organization. Therefore,
organizations irrespective of their type of operations keep a risk management team that looks
after every risk to which an organization is vulnerable. Organizations in the field of engineering
also have to come across some inherent risks that negatively impact their operations. Engineering
may be defined as the process of applying science to practical purposes of designing structures,
systems, machines and similar things. Therefore, like every other organization, risk assessment
and management is also an integral part of engineering organizations. Since the task of
engineering is mostly complex, the risks in this area are also very complicated. If risks in
engineering field are not mitigated effectively it may produce long-term danger that may affect
both the organizational services and the society in whole. Hence, the activity of risk management
within engineering organizations must be undertaken seriously and measured thoroughly in order
to reduce the threat of risks. Amyotte et al., (2006) simply puts it like within the engineering
practice, an inbuilt risk is always present. Studies have found that despite the knowledge of
inherent risks within the field and activity of engineering, organizations are not very aware in
imparting knowledge about risk management to their engineers. From this the need of education
regarding the risk management approaches arises. Therefore, this paper tries to find out
approaches to management of risks and importance of these approaches within the area of
engineering. Bringing on the contemporary evidence from the literature review related to risk
management approaches, the paper examines how those approaches can be helpful for
4 .
1
Assignment front Sheet
Qualification Unit number and title
Pearson BTEC Levels 4 and 5 Higher
Nationals in Health and Social Care (RQF)
HNHS 17: Effective Reporting and Record-keeping in
Health and Social Care Services
Student name Assessor name Internal Verifier
B. Maher F. Khan
Date issued: Final Submission:
12/10/2018 18/01/2019
Assignment title
Effective Reporting and Record-keeping in Health and Social
Care services
Submission Format
This work will be submitted in 2 different formats:
Assessment 1 should be submitted as a word-processed report document in a standard report
style, which requires the use of headings, titles and appropriate captions. You may also choose
to include pictures, graphs and charts where relevant to support your work. The recommended
word count for this assignment is 1500–2000 words, though you will not be penalised for
exceeding this total.
Assessment 2 requires the submission of evidence from a mock training event on record-
keeping. This will include a set of materials used in the event, to include an electronic
presentation, evidence of your own record-keeping across a range of types of records, as well as
where you will demonstrate you have evaluated the effectiveness of your own completion of
relevant records. The recommended word count for the presentation is 1000–1500 words
(including speaker notes), though you will not be penalised for exceeding this total.
For both assessments, any material that is derived from other sources must be suitably
referenced using a standard form of citation. Provide a bibliography using the Harvard
referencing system.
Unit Learning Outcomes
LO1 Describe the legal and regulatory aspects of reporting and record keeping in a care setting
LO2 Explore the internal and external recording requirements in a care setting
Assignment Brief and Guidance
2
Purpose of this assignment:
The purpose of the assignment is to assess the learner firstly in relation to both the legal and
regulatory aspects of reporting and record keeping in a care setting through producing an internal
evaluative review of record keeping in their own care setting. Secondly, the learner will be
assessed on the internal and external recording requirements in a care setting. Thirdly, the learner
will be assessed on Review the use of technology in reporting and recording service user care in a
care setting and fourthly the learner will demonstrate how to keep and maintain records in own care
setting in line with national and local policies.
Breakdown of assignment:
Assignment:
You need to produce one written piece of work of 2,500 words (+/- 10%) covering all the
assessment criterion in LO1-LO4 as one document.
Unit Learning Outcomes
LO1 Describe the legal and regulatory aspects of reporting and record keeping in a care
setting
LO2 Explore the internal and external recording.
1 BBS300 Empirical Research Methods for Business .docxoswald1horne84988
1
BBS300 Empirical Research Methods for Business
TSA, 2018
Assignment 1
Due: Sunday, 7 October 2018,
23:55 PM
This assignment covers material from Sessions 1-4 and is worth 20% of your total mark
of BBS300. Your solutions should be properly presented, and it is important that you
double-check your spelling and grammar and thoroughly proofread your assignment
before submitting. Instructions for assignment submission are presented in
the “Assignment 1” link and must be strictly adhered to. No marks will be
awarded to assignments that are submitted after the due date and time.
All analyses must be carried out using SPSS, and no marks will be awarded
for assignment questions where SPSS output supporting your answer is not
provided in your Microsoft Word file submitted for the Assignment.
Questions
In this assignment, we will examine the “Real Estate Market” dataset (described at the
end of the assignment ) and “Employee Satisfaction” dataset. Before beginning the
assignment, read through the descriptions of these dataset and their variables carefully.
The “Real Estate Market” dataset can be found in the file “realestatemarket.sav,” and
the “Employee Satisfaction” dataset can be found in the file “employeesatisfaction.sav.”
You will need to carefully inspect both SPSS data files to be sure that the
specification of variable types is correct and, where appropriate, value
labels are entered.
1. (12 marks)
2
Use appropriate graphical displays and measures of centrality and dispersion
to summarise the following four variables in the “Real Estate Market” dataset. For
graphical displays for numeric data, be sure to comment on not only the shape of
the distribution but also compliance with a normal distribution. Be sure to
include relevant SPSS output (graphs, tables) to support your answers.
(a) Price.
(b) Lot Size.
(c) Material.
(d) Condition.
2. (8 marks)
Again consider the variable Price, which records the property price (in AUD). It
is of interest to know if this is associated with the distance of the property is
located to the train station. It i s al so of i nter e st t o kn o w if th e p rop ert y
pri ce s are a sso ciate d with di st an ce to t h e ne ar e st b u s sto p. Carry out
appropriate statistical techniques to assess whether there is a significant
association between the property price and distance to the nearest train (To train)
station and the nearest bus stop (To bus). Be sure to thoroughly assess the
assumptions of your particular analysis, and be sure to include relevant SPSS
output (graphs, tables) to support your answers.
3. (7 marks)
Consider the “Employee Satisfaction” dataset, which asked participants to provide their
level of regularity to a series of thirteen statements. Conduct an appropriate analysis
to assess the reliability of responses to these statements. If the reliability will
increa.
1 ASSIGNMENT 7 C – MERGING DATA FILES IN STATA Do.docxoswald1horne84988
1
ASSIGNMENT 7 C – MERGING DATA FILES IN STATA
Download the world development data covering the years 2000-2016 from the website
“http://databank.worldbank.org/data/reports.aspx?source=World-Governance-Indicators” for the
following upper-middle-income countries.
Countries of Interest:
Albania Ecuador Montenegro
Algeria Equatorial Guinea Namibia
American Samoa Fiji Nauru
Argentina Gabon Panama
Azerbaijan Grenada Paraguay
Belarus Guyana Peru
Belize Iran, Islamic Rep. Romania
Bosnia and Herzegovina Iraq Russian Federation
Botswana Jamaica Samoa
Brazil Kazakhstan Serbia
Bulgaria Lebanon South Africa
China Libya St. Lucia
Colombia Macedonia, FYR St. Vincent and the Grenadines
Costa Rica Malaysia Suriname
Croatia Maldives Thailand
Cuba Marshall Islands Tonga
Dominica Mauritius Turkey
Dominican Republic Mexico Turkmenistan
Tuvalu
Venezuela, RB
Variables of Interest
Control of Corruption: Estimate
Government Effectiveness: Estimate
Political Stability and Absence of Violence/Terrorism:
Estimate
Regulatory Quality: Estimate
Rule of Law: Estimate
Voice and Accountability: Estimate
2
STEP 1 - Download the data from the World-Governance-Indicators database as shown below
STEP 2 - Check the variables of interest
3
Please make sure you are checking the variables with “Estimates”.
TO VIEW THE DEFINITIONS OF THE VARIABLES
4
Step 3 – Select countries of interest
5
Step 4 – Click on “Time” and select the “year range” you are interested in (2000-2016)
6
Step 5 – Click on the “Layout” as shown below
Change the time layout to “Row,” series to “Column” and Country to “Row.”
Next, click on the “apply changes.”
Step 6 – Click on the “Download option” and select “Excel” as shown below
7
STEP 7: Using Excel, Replace the Missing Values With “.” (See previous assignments)
STEP 8: SAVE THE EXCEL DATA FILE ON YOUR COMPUTER PREFERABLY IN A
FOLDER
STEP 9: IMPORT YOUR DATA INTO STATA AND NAME YOUR DATA SET
“WORLD_GOVERNANCE_INDICATORS.” (See previous assignments for steps)
8
STEP 10; RENAME THE VARIABLES AS SHOWN BELOW (See previous assignments for
steps)
Using stata, merge the data set from “ASSIGNMENT 3B” with this dataset
VERY IMPORTANT Note: Merging two datasets requires that both have at least one variable in
common (either string or numeric).
This statement requires that the variable name for “Time” and “Country” should be the same in the two
data set
MERGING THE DATASET FROM “ASSIGNMENT 3” WITH THE DATA FROM THE
WORLD GOVERNANCE INDICATORS
Merging data files in stata
https://www.youtube.com/watch?v=EV-5PztbHs0
https://www.youtube.com/watch?v=Uh7C0mlhB3g&t=54s
https://www.youtube.com/watch?v=2etG_34ODoc
I will strongly encourage you to watch these videos before merging
I will also strongly recommend you read the notes in the link below before you star.
1 Assessment details for ALL students Assessment item.docxoswald1horne84988
1
Assessment details for ALL students
Assessment item 3 - Individual submission
Due date: Week 12 Monday (1 Oct 2018) 11:55 pm AEST
Weighting:
Length:
50% (or 50 marks)
There is no word limit for this report
Objectives
This assessment item relates to the unit learning outcomes as stated in the unit profile.
Enabling objectives
1. Analyse a case study and identify issues associated with the business;
2. Develop and deploy the application in IBM Bluemix;
3. Evaluate existing and new functionalities to address business problems;
4. Prepare a document to report your activities using text and multimedia (for example screenshots, videos).
General Information
The purpose of this assignment is to create a cloud based simulating environment which will help to
identify/understand the problem stated in the given case study using analysis tools available in IBM
Bluemix. In assignment three, you are working individually. By doing this assignment, you will
learn to use skills and knowledge of emerging technologies like cloud computing, IoT, to simulate a
business scenario to capture operational data and share with a visualization tool. You will acquire a
good understanding of smart application design in a cloud environment for efficient application
configuration and deployment.
What do you need to do?
The assignment requires you to do the following -
• Download the ‘Starter_Code_For_Assignment_Three.rar’ given in week 8 to
configure, and deploy a cloud based smart/IoT (Internet of Things) application to
simulate the business case.
• Choose a case study out of given two below and analyse the case study to
understand the business problem and design a solution for those problems.
• Deploy the starter source code in your Bluemix account and modify it to address
all required milestones mentioned in your chosen case study.
• Finally prepare a report according to given format and specifications below and
submit it in Moodle.
2
Report format and specifications -
You are required to submit a written report in a single Microsoft Word (.doc or .docx)
document. There is no word limit but any unnecessary information included in the report
may result in reduced marks.
The report must contain the following content (feel free to define your own sections,
as long as you include all the required content):
o Cover page/title page and Table of contents
o URL of the app and login details of the IBM Bluemix account
o Introduction
o Case study analysis which will report –
o Business problems you have identified in the case study
o Possible solutions for each and how do these solutions address the
business problems?
o What are the solutions you implemented in the application?
o The step by step process you have followed to configure and deploy the smart app
for business case simulation. You may choose to use screenshots and notes to
enrich your report but you must have a video of the pr.
1
CDU APA 6th
Referencing Style Guide
(February 2019 version)
2
Contents
APA Fundamentals .......................................................................................... 3
Reference List ................................................................................................... 3
Citing in the text ............................................................................................... 5
Paraphrase ................................................................................................... 5
Direct quotes................................................................................................. 5
Secondary source .......................................................................................... 6
Personal communications............................................................................. 6
Examples .......................................................................................................... 7
Book .............................................................................................................. 7
eBook ............................................................................................................ 7
Journal article with doi ................................................................................ 7
Journal article without doi ........................................................................... 7
Web page ...................................................................................................... 7
Books - print and online ................................................................................... 8
Single author ................................................................................................ 8
eBook/electronic book ................................................................................ 11
Journal articles, Conference papers and Newspaper articles ........................ 13
Multimedia ..................................................................................................... 16
YouTube or Streaming video ..................................................................... 16
Online images ................................................................................................. 17
Web sources and online documents ................................................................ 20
Web page .................................................................................................... 20
Document from a website ........................................................................... 21
Legislation and cases ...................................................................................... 23
Common abbreviations .................................................................................. 24
Appendix 1: How to write an APA reference when information is missing .. 25
Appendix 2: Author layout.
1
BIOL 102: Lab 9
Simulated ABO and Rh Blood Typing
Objectives:
After completing this laboratory assignment, students will be able to:
• explain the biology of blood typing systems ABO and Rh
• explain the genetics of blood types
• determine the blood types of several patients
Introduction:
Before Karl Landsteiner discovered the ABO human blood groups in 1901, it was thought that all blood was the
same. This misunderstanding led to fatal blood transfusions. Later, in 1940, Landsteiner was part of a team
who discovered another blood group, the Rh blood group system. There are many blood group systems known
today, but the ABO and the Rh blood groups are the most important ones used for blood transfusions. The
designation Rh is derived from the Rhesus monkey in which the existence of the Rh blood group was
discovered.
Although all blood is made of the same basic elements, not all blood is alike. In fact, there are eight different
common blood types, which are determined by the presence or absence of certain antigens – substances that
can trigger an immune response if they are foreign to the body – on the surface of the red blood cells (RBCs
also known as erythrocytes).
ABO System:
The antigens on RBCs are agglutinating antigens or agglutinogens. They have been designated as A and B.
Antibodies against antigens A and B begin to build up in the blood plasma shortly after birth. A person
normally produces antibodies (agglutinins) against those antigens that are not present on his/her erythrocytes
but does not produce antibodies against those antigens that are present on his/her erythrocytes.
• A person who is blood type A will have A antigens on the surface of her/his RBCs and will have
antibodies against B antigens (anti-B antibodies). See picture below.
• A person with blood type B will have B antigens on the surface of her/his RBCs and will have antibodies
against antigen A (anti-A antibodies).
• A person with blood type O will have neither A nor B antigens on the surface of her/his RBCs and has
BOTH anti-A and anti-B antibodies.
• A person with blood type AB will have both A and B antigens on the surface of her/his RBCs and has
neither anti-A nor anti-B antibodies.
The individual’s blood type is based on the antigens (not the antibodies) he/she has. The four blood groups
are known as types A, B, AB, and O. Blood type O, characterized by an absence of A and B agglutinogens, is
the most common in the United States (45% of the population). Type A is the next in frequency, found in 39%
of the population. The incidences of types B and AB are 12% and 4%, respectively.
2
Table 1: The ABO System
Blood
Type
Antigens on
RBCs
Antibodies
in the Blood
Can GIVE Blood
to Groups:
Can RECEIVE
Blood from Groups:
A A Anti-B A, AB O, A
B B Anti-A B, AB O, B
AB A and B
Neither anti-A
nor anti-B
AB O, A, B, AB
O
Neither A nor
B
Both anti-A.
1
Business Intelligence Case
Project Background
Mell Industries is a national manufacturing firm that specializes in textiles based out of
Chicago. Starting out as a small factory in Warrenville, Illinois, the firm experienced a period of steady
growth over the past twenty-four years. Steadily opening new warehouses and factories in the
surrounding areas in Michigan and Indianapolis until eventually moving their base of operations to
Chicago. Due to this expansion, Mell Industries is at the height of its production and hopes to avoid any
interferences or deceleration of growth.
In recent years, the firm has been under heavy media scrutiny for supposedly compensating its
female staff unfairly lower compared to male counterparts. This was initiated when a disgruntled
employee leaked the company payroll allegedly showcasing an unjust gap of income between the
female employee and her male counterpart. This type of gender pay gap is highly criticized and as a
precaution, Mell Industries has hired Cal Poly Pomona to conduct research to determine the validity of
these claims. Mell Industries has provided Cal Poly Pomona with a data set of a sample population of
747 employees. Mell Industries has also offered Cal Poly Pomona compensation for any promising
information gathered. Mell Industries may use information gathered from this project in future
employee compensation decisions.
The initial dataset has been given to you in the form of an excel spreadsheet titled
Case_dataset.xlsx consisting of 12 columns labeled:
● Column A - Employee ID
● Column B - Gender
● Column C - Date of Birth
● Column D - Date of Hire
● Column E - Termination Date
● Column F - Occupation
● Column G - Salary
● Column H to L - Employee Evaluation Metrics
In addition, Mell Industries provided the latest annual employee performance review evaluation
results rating each employee in various performance categories. They have turned over this information
separately and as a consultant, it is your task to provide Mell Industries with the most accurate and
relevant information in a digestible form. Furthermore, using excel skills learned during the course, you
will manipulate and analyze the data set in order to make appropriate managerial decisions. You will
utilize excel functions highlighted in this project as well as a pivot table and chart to form a decision
support system in order to answer the critical thinking questions.
Project Objective
The purpose of this project is to perform a methodical data analysis to assist the company make
an informed decision. This could also serve as a basis for implementing critical adjustments to certain
business aspects if necessary. Illustrate the business process by condensing a large set of data, to
present relevant information with data visualization. We will be utilizing Microsoft Excel 2016 to
complete this project.
2
TA.
How to Make a Field invisible in Odoo 17Celine George
It is possible to hide or invisible some fields in odoo. Commonly using “invisible” attribute in the field definition to invisible the fields. This slide will show how to make a field invisible in odoo 17.
Acetabularia Information For Class 9 .docxvaibhavrinwa19
Acetabularia acetabulum is a single-celled green alga that in its vegetative state is morphologically differentiated into a basal rhizoid and an axially elongated stalk, which bears whorls of branching hairs. The single diploid nucleus resides in the rhizoid.
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdfTechSoup
In this webinar you will learn how your organization can access TechSoup's wide variety of product discount and donation programs. From hardware to software, we'll give you a tour of the tools available to help your nonprofit with productivity, collaboration, financial management, donor tracking, security, and more.
The Roman Empire A Historical Colossus.pdfkaushalkr1407
The Roman Empire, a vast and enduring power, stands as one of history's most remarkable civilizations, leaving an indelible imprint on the world. It emerged from the Roman Republic, transitioning into an imperial powerhouse under the leadership of Augustus Caesar in 27 BCE. This transformation marked the beginning of an era defined by unprecedented territorial expansion, architectural marvels, and profound cultural influence.
The empire's roots lie in the city of Rome, founded, according to legend, by Romulus in 753 BCE. Over centuries, Rome evolved from a small settlement to a formidable republic, characterized by a complex political system with elected officials and checks on power. However, internal strife, class conflicts, and military ambitions paved the way for the end of the Republic. Julius Caesar’s dictatorship and subsequent assassination in 44 BCE created a power vacuum, leading to a civil war. Octavian, later Augustus, emerged victorious, heralding the Roman Empire’s birth.
Under Augustus, the empire experienced the Pax Romana, a 200-year period of relative peace and stability. Augustus reformed the military, established efficient administrative systems, and initiated grand construction projects. The empire's borders expanded, encompassing territories from Britain to Egypt and from Spain to the Euphrates. Roman legions, renowned for their discipline and engineering prowess, secured and maintained these vast territories, building roads, fortifications, and cities that facilitated control and integration.
The Roman Empire’s society was hierarchical, with a rigid class system. At the top were the patricians, wealthy elites who held significant political power. Below them were the plebeians, free citizens with limited political influence, and the vast numbers of slaves who formed the backbone of the economy. The family unit was central, governed by the paterfamilias, the male head who held absolute authority.
Culturally, the Romans were eclectic, absorbing and adapting elements from the civilizations they encountered, particularly the Greeks. Roman art, literature, and philosophy reflected this synthesis, creating a rich cultural tapestry. Latin, the Roman language, became the lingua franca of the Western world, influencing numerous modern languages.
Roman architecture and engineering achievements were monumental. They perfected the arch, vault, and dome, constructing enduring structures like the Colosseum, Pantheon, and aqueducts. These engineering marvels not only showcased Roman ingenuity but also served practical purposes, from public entertainment to water supply.
Operation “Blue Star” is the only event in the history of Independent India where the state went into war with its own people. Even after about 40 years it is not clear if it was culmination of states anger over people of the region, a political game of power or start of dictatorial chapter in the democratic setup.
The people of Punjab felt alienated from main stream due to denial of their just demands during a long democratic struggle since independence. As it happen all over the word, it led to militant struggle with great loss of lives of military, police and civilian personnel. Killing of Indira Gandhi and massacre of innocent Sikhs in Delhi and other India cities was also associated with this movement.
2. figure on the right? We don’t go
through whichever door we go through because we look like the
figures on the signs, we go through the
doors because we understand what the signs mean. They may
bear no relevance to the way we look,
today or ever, but they order the way we behave in the world.
This is not, however, an article about how to avoid
embarrassment when dining out. So what has the
issue of where you wash your hands got to do with International
Relations (IR)? I would suggest that the
political salience (that is, importance) of identity, particularly
gender identity, should not be
underestimated in the study and practice of international
relations. There is a range of ways to
conceptualise ‘gender’ (to think about how our gendered bodies
come to have meaning in socio-political
situations) and to conceive of the relationship between sex and
gender: essentialist accounts,
constructivist accounts and poststructural accounts are perhaps
the most commonly
identified.[2]Typically, feminist IR scholars working within any
of these frameworks ask different
questions about different aspects of gender and global politics
and use different methods to go about
answering the questions they pose. This makes it difficult to
provide an overview of gender and global
politics in one short article. However, ideas about appropriate
and inappropriate gendered behaviours
are wide-ranging, influential and sometimes unconscious, but
because they affect (and effect) how we
behave in the world, they are of interest to the scholar of global
politics, as global politics is practised
and studied by gendered individuals. Whether the issue at hand
is security,[3] global
governance,[4] nuclear proliferation,[5] peacebuilding[6] or
3. international law,[7] feminist scholars have
written extensively about (how) gender matters in global
politics and, further, argued that paying
analytical attention to gender allows us a range of insights that
‘gender-blind’ approaches do not access.
Most introductory IR texts include a chapter on gender and/or
feminism[8] and anyone seeking an
overview of feminist IR would be well advised to read these.
However, to conclude this short article, I
will provide two examples of feminist insights to illustrate the
claims made above. First, feminists have
critiqued the fact that the internal logic of a realist IR
framework demands that security refers to the
‘national’, which is assumed to be congruent with the state.[9]
Nations – or rather, the people
comprising the nations – do not tend to feature further in
conventional theorizing of IR. International
http://www.e-ir.info/2010/02/20/gender-matters-in-
international-relations/
http://creativecommons.org/licenses/by-nc-sa/3.0/
http://creativecommons.org/licenses/by-nc-sa/3.0/
http://creativecommons.org/licenses/by-nc-sa/3.0/
2
Relations as a discipline, narrowly conceived, is not concerned
with activities that occur within the state,
as is evidenced in the act of naming: IR is self-consciously
concerned with relations inter (between)
states. Minimally, feminist IR seeks to correct this disciplinary
myopia. While classical realism theorises
the political actor, in order to construct the state as actor, the
4. now dominant neo-realism abstracts the
human subject from its disciplinary musings, leading to the
infamous ‘black box’ model of the
state. Feminist IR challenges this assumption, arguing that
individuals, as human subjects in all their
messy complexity, are an integral part of international relations
and, further, that international relations
are constituted by and constitutive of other types of relations:
power relations and gender
relations.[10] In studying the peace camps at Greenham
Common, for example, feminist scholars
challenged the notion that state negotiations between the United
Kingdom and the United States over
the location of nuclear armaments were simply a matter of
military security and diplomacy. The
individuals at Greenham, who were exercising agency through
the use of their bodies in protest against
the fact that nuclear ‘security’ didn’t make them feel secure,
‘subverted the security-based strategic
vision of international relations by showing … acts of everyday
insecurity’.[11]
By cutting the fences, dancing on the missile silos, challenging
charges of trespassing in court, the
Greenham women managed to transform the very meaning of a
base and of public security. A military
base easily penetrated by a group of non-violent women was no
longer a military base.[12]
The very articulation of ‘acts of everyday insecurity’ challenges
conventional logic as represented within
the conceptualisation of ‘national security’, and demands that
the relationship between individuals and
the state be examined and problematised.
Politicising the everyday, or rather, demanding that the
5. everyday be recognized as political, is a central
priority of feminist IR, exemplified in the work of Cynthia
Enloe. In the early 1980s, Enloe began asking
the questions for which she has become rightly acknowledged as
a key figure in feminist IR, including
Does Khaki Become You? (1983) and ‘where are the
women?’.[13] The groundbreaking analysis of the
gendered politics of militarism presented in Khaki laid the
foundations for a generation of feminist
scholarship engaged in unpicking the complex tangle of
industrial development, economics, masculinism
and mythology that characterises militarisation. Inspired by her
own curiosity about the roles played by
women and the functions performed by gender in the
militarisation of civilian life, Enloe explores
prostitution, marriage, welfare and war-making with an eye to
the representation (both political and
symbolic) of women. In Bananas, Beaches and Bases: Making
Feminist Sense of International Politics,
Enloe puts her ‘feminist curiosity’ to work,[14] providing the
reader with a series of vignettes that
function to complicate easy readings of everyday situations,
from the beaches central to tourist industry
to the diplomatic wives stationed on military bases. All these
activities, she argues, constitute
international relations, and she concludes that ‘the personal is
international’.[15] This fundamental
insight underpins much contemporary feminist IR scholarship,
as it seeks to understand just how the
presumed ‘personal’ realm of gendered bodies and the
relationships between them is inextricably
intertwined with the ‘international’ realm of high politics.
—
6. 3
Laura J. Shepherd is Lecturer in International Relations at the
University of Birmingham, UK. Laura is the
editor of Gender Matters in Global Politics: A Feminist
Introduction to International Relations (2009,
London: Routledge) and the author of Gender, Violence and
Security: Discourse as Practice (2008,
London: Zed), as well as many scholarly articles in peer-
reviewed journals, including International Studies
Quarterly, Review of International Studies and Journal of
Gender Studies.
Email:[email protected]
[2] For a full discussion of these divisions see Laura J.
Shepherd, ‘Sex or Gender? Bodies in World Politics
and Why Gender Matters’ in Laura J. Shepherd (ed.) Gender
Matters in Global Politics: A Feminist
Introduction to International Relations (London and New York,
NY: Routledge, 2010).
[3] See, for example, Laura J. Shepherd, Gender, Violence and
Security, Discourse as Practice, (London,
Zed, 2008); Laura Sjoberg and Caron Gentry, Mothers,
Monsters, Whores: Women’s Violence in Global
Politics (London: Zed, 2007); Sandra Whitworth, Men,
Militarism and UN Peacekeeping(London and
Boulder, CO: Lynne Rienner, 2004).
[4] See, for example, Penny Griffin, Gendering the World Bank:
Neoliberalism and the Gendered
Foundations of Global Governance (Basingstoke and New York,
NY: Palgrave Macmillan, 2009); Shirin
Rai, The Gender Politics of Development: Essays in Hope and
7. Despair (London: Zed, 2008); Shirin Rai and
Georgina Waylen (eds), Global Governance: Feminist
Perspectives (Basingstoke and New York, NY:
Palgrave Macmillan, 2008).
[5] See, for example, Carol Cohn, ‘Sex and Death in the
Rational World of Defense
Intellectuals’ Signs12(4), 687-718 (1987); Carol Cohn and Sara
Ruddick, ‘A feminist ethical perspective on
weapons of mass destruction’ in Sohail H. Hashmi (ed.) Ethics
and Weapons of Mass
Destruction: Religious and Secular Perspectives (Cambridge:
Cambridge University Press, 2004); Carol
Cohn with Felicity Hill and Sara Ruddick, ‘The Relevance of
Gender for Eliminating Weapons of Mass
Destruction’, commissioned by the Weapons of Mass
Destruction Commission, available
athttp://www.genderandsecurity.umb.edu/Cohn%20WMD%20Co
mmision%20paper%20NO38.pdf (200
6).
[6] See, for example, H. Afshar and D. Eade (eds) Development,
Women and War: Feminist Perspectives,
(Oxford: Oxfam GB, 2004); Elisabeth Porter, ‘Women, Political
Decision-Making, and Peace-
Building’, Global Change, Peace and Security, 15(3), 245 – 262,
(2003); Caroline Sweetman (ed.), Gender,
Peacebuilding and Reconstruction, (Oxford: Oxfam GB, 2005).
[7] See, for example, Charlesworth, Hilary, Chinkin, Christine
and Wright, Shelley, ‘Feminist Approaches
to International Law’, American Journal of International Law,
85(4), 613-645 (1991); Hilary Charlesworth,
and Christine Chinkin, The Boundaries of International Law: A
Feminist Analysis (Manchester:
Manchester University Press, 2000); Kelly D. Askin,
8. ‘Prosecuting Wartime Rape and Other Gender-
Related Crimes under International Law: Extraordinary
Advances, Enduring Obstacles’ Berkeley Journal
of International Law 21, 288-349, (2003).
4
[8] See, for example, J. Ann Tickner, ‘Gender in World
Politics’, in John Baylis, Steve Smith, and Patricia
Owens (eds) The Globalization of World Politics: An
Introduction to International Relations, 4th edn,
(Oxford, Oxford University Press, 2007); J. Ann Ticker and
Laura Sjoberg, ‘Feminism’ in Tim Dunne, Milja
Kurki and Steve Smith (eds.) 2007, International Relations
Theories: Discipline and Diversity, (Oxford:
Oxford University Press, 2007); Jacqui True, ‘Feminism’ in
Scott Burchill et al. Theories of International
Relations, 4th edn, (Basingstoke and New York, NY: Palgrave
Macmillan, 2009).
[9] V. Spike Peterson, ‘Security and Sovereign States: What is
at Stake in Taking Feminism Seriously?’, in
V.Spike Peterson (ed.) Gendered States: Feminist (Re)Visions
of International Relations Theory, (London
and Boulder, CO: Lynne Rienner, 1992); J. Ann Tickner,
Gendering World Politics: Issues and Approaches
in the Post-Cold War Era (New York: Columbia University
Press, 2001); Katrina Lee-Koo ‘Confronting a
Disciplinary Blindness: Women, War and Rape in the
International Politics of Security’Australian Journal
of Political Science, 37(3), 525-536 (2002).
[10] Christine Sylvester, Feminist Theory and International
9. Relations in a Postmodern Era, (Cambridge:
Cambridge University Press, 1994), 6; see also Cynthia Enloe,
‘Margins, Silences and Bottom Rungs: How
to Overcome the Underestimation of Power in International
Relations’, in Ken Booth, Steve Smith and
Marysia Zalewski (eds) International Theory: Positivism and
Beyond, (Cambridge: Cambridge University
Press, 1996).
[11] Christine Sylvester, Feminist Theory and International
Relations, 193.
[12] Cynthia Enloe, Bananas, Beaches and Bases: Making
Feminist Sense of International Politics 2ndedn
(London and Berkeley, CA: University of California Press,
2000), 79.
[13] In Enloe, Bananas Beaches and Bases, op. cit. Note 12.
[14] Cynthia Enloe, The Curious Feminist: Searching for
Women in a New Age of Empire, (London and
Berkeley, CA, 2004), 3-4 ; see also Cynthia Enloe,
Globalization and Militarism: Feminists Make the
Link(Plymouth and Lanham, MD: Rowman and Littlefield,
2007).
[15] Enloe, Bananas, Beaches and Bases, 195.
University of South Florida
Scholar Commons
10. Textbooks Collection USF Tampa Library Open Access
Collections
2012
Social Science Research: Principles, Methods, and
Practices
Anol Bhattacherjee
University of South Florida, [email protected]
Follow this and additional works at:
http://scholarcommons.usf.edu/oa_textbooks
Part of the American Studies Commons, Education Commons,
Public Health Commons, and
the Social and Behavioral Sciences Commons
This Book is brought to you for free and open access by the
USF Tampa Library Open Access Collections at Scholar
Commons. It has been accepted
for inclusion in Textbooks Collection by an authorized
administrator of Scholar Commons. For more information,
please contact
[email protected]
Recommended Citation
Bhattacherjee, Anol, "Social Science Research: Principles,
Methods, and Practices" (2012). Textbooks Collection. 3.
http://scholarcommons.usf.edu/oa_textbooks/3
http://scholarcommons.usf.edu/?utm_source=scholarcommons.u
sf.edu%2Foa_textbooks%2F3&utm_medium=PDF&utm_campai
gn=PDFCoverPages
http://scholarcommons.usf.edu/?utm_source=scholarcommons.u
sf.edu%2Foa_textbooks%2F3&utm_medium=PDF&utm_campai
gn=PDFCoverPages
http://scholarcommons.usf.edu?utm_source=scholarcommons.us
f.edu%2Foa_textbooks%2F3&utm_medium=PDF&utm_campaig
13. mailto:[email protected]
Social Science Research: Principles, Methods, and Practices,
2nd edition
By Anol Bhattacherjee
First published 2012
ISBN-13: 978-1475146127
ISBN-10: 1475146124
15. i
Preface
This book is designed to introduce doctoral and graduate
students to the process of
scientific research in the social sciences, business, education,
public health, and related
disciplines. This book is based on my lecture materials
developed over a decade of teaching the
doctoral-level class on Research Methods at the University of
South Florida. The target
audience for this book includes Ph.D. and graduate students,
junior researchers, and professors
teaching courses on research methods, although senior
researchers can also use this book as a
handy and compact reference.
The first and most important question potential readers should
have about this book is
how is it different from other text books on the market? Well,
there are four key differences.
First, unlike other text books, this book is not just about
“research methods” (empirical data
collection and analysis) but about the entire “research process”
from start to end. Research
method is only one phase in that research process, and possibly
the easiest and most structured
one. Most text books cover research methods in depth, but
leave out the more challenging, less
structured, and probably more important issues such as
theorizing and thinking like a
researcher, which are often prerequisites of empirical research.
16. In my experience, most
doctoral students become fairly competent at research methods
during their Ph.D. years, but
struggle to generate interesting or useful research questions or
build scientific theories. To
address this deficit, I have devoted entire chapters to topics
such as “Thinking Like a
Researcher” and “Theories in Scientific Research”, which are
essential skills for a junior
researcher.
Second, the book is succinct and compact by design. While
writing the book, I decided
to focus only on essential concepts, and not fill pages with
clutter that can divert the students’
attention to less relevant or tangential issues. Most doctoral
seminars include a fair
complement of readings drawn from the respective discipline.
This book is designed to
complement those readings by summarizing all important
concepts in one compact volume,
rather than burden students with a voluminous text on top of
their assigned readings.
Third, this book is free in its download version. Not just the
current edition but all
future editions in perpetuity. The book will also be available in
Kindle e-Book, Apple iBook, and
on-demand paperback versions at a nominal cost. Many people
have asked why I’m giving
away something for free when I can make money selling it?
Well, not just to stop my students
from constantly complaining about the high price of text books,
but also because I believe that
scientific knowledge should not be constrained by access
barriers such as price and availability.
17. Scientific progress can occur only if students and academics
around the world have affordable
access to the best that science can offer, and this free book is
my humble effort to that cause.
However, free should not imply “lower quality.” Some of the
best things in life such as air,
water, and sunlight are free. Many of Google’s resources are
free too, and one can well imagine
where we would be in today’s Internet age without Google.
Some of the most sophisticated
software programs available today, like Linux and Apache, are
also free, and so is this book.
Fourth, I plan to make local-language versions of this book
available in due course of
time, and those translated versions will also be free. So far, I
have had commitments to
ii
translate thus book into Chinese, French, Indonesian, Korean,
Portuguese, Spanish versions
(which will hopefully be available in 2012), and I’m looking for
qualified researchers or
professors to translate it into Arabic, German, and other
languages where there is sufficient
demand for a research text. If you are a prospective translator,
please note that there will be no
financial gains or royalty for your translation services, because
the book must remain free, but
I’ll gladly include you as a coauthor on the local-language
version.
18. The book is structured into 16 chapters for a 16-week semester.
However, professors
or instructors can add, drop, stretch, or condense topics to
customize the book to the specific
needs of their curriculum. For instance, I don’t cover Chapters
14 and 15 in my own class,
because we have dedicated classes on statistics to cover those
materials and more. Instead, I
spend two weeks on theories (Chapter 3), one week to
discussing and conducting reviews for
academic journals (not in the book), and one week for a finals
exam. Nevertheless, I felt it
necessary to include Chapters 14 and 15 for academic programs
that may not have a dedicated
class on statistical analysis for research. A sample syllabus that
I use for my own class in the
business Ph.D. program is provided in the appendix.
Lastly, I plan to continually update this book based on emerging
trends in scientific
research. If there are any new or interesting content that you
wish to see in future editions,
please drop me a note, and I will try my best to accommodate
them. Comments, criticisms, or
corrections to any of the existing content will also be gratefully
appreciated.
Anol Bhattacherjee
E-mail: [email protected]
mailto:[email protected]
19. iii
Table of Contents
Introduction to Research
1. Science and Scientific
Research.................................................................................
................... 1
2. Thinking Like a Researcher
...............................................................................................
............ 9
3. The Research Process
...............................................................................................
.................. 17
4. Theories in Scientific Research
...............................................................................................
.... 25
Basics of Empirical Research
5. Research Design
...............................................................................................
.......................... 35
6. Measurement of
Constructs...............................................................................
........................ 43
7. Scale Reliability and Validity
20. ...............................................................................................
........ 55
8. Sampling
...............................................................................................
...................................... 65
Data Collection
9. Survey Research
...............................................................................................
.......................... 73
10. Experimental Research
...............................................................................................
............... 83
11. Case Research
...............................................................................................
............................. 93
12. Interpretive Research
...............................................................................................
................ 103
Data Analysis
13. Qualitative Analysis
...............................................................................................
................... 113
14. Quantitative Analysis: Descriptive Statistics
............................................................................ 119
15. Quantitative Analysis: Inferential Statistics
............................................................................. 129
21. Epilogue
16. Research Ethics
...............................................................................................
......................... 137
Appendix
........................................................................................ .......
.............................................. 143
1
Chapter 1
Science and Scientific Research
What is research? Depending on who you ask, you will likely
get very different answers
to this seemingly innocuous question. Some people will say
that they routinely research
different online websites to find the best place to buy goods or
services they want. Television
news channels supposedly conduct research in the form of
viewer polls on topics of public
interest such as forthcoming elections or government-funded
projects. Undergraduate students
22. research the Internet to find the information they need to
complete assigned projects or term
papers. Graduate students working on research projects for a
professor may see research as
collecting or analyzing data related to their project. Businesses
and consultants research
different potential solutions to remedy organizational problems
such as a supply chain
bottleneck or to identify customer purchase patterns. However,
none of the above can be
considered “scientific research” unless: (1) it contributes to a
body of science, and (2) it follows
the scientific method. This chapter will examine what these
terms mean.
Science
What is science? To some, science refers to difficult high
school or college-level courses
such as physics, chemistry, and biology meant only for the
brightest students. To others,
science is a craft practiced by scientists in white coats using
specialized equipment in their
laboratories. Etymologically, the word “science” is derived
from the Latin word scientia
meaning knowledge. Science refers to a systematic and
organized body of knowledge in any
area of inquiry that is acquired using “the scientific method”
(the scientific method is described
further below). Science can be grouped into two broad
categories: natural science and social
science. Natural science is the science of naturally occurring
objects or phenomena, such as
light, objects, matter, earth, celestial bodies, or the human
body. Natural sciences can be further
classified into physical sciences, earth sciences, life sciences,
23. and others. Physical sciences
consist of disciplines such as physics (the science of physical
objects), chemistry (the science of
matter), and astronomy (the science of celestial objects). Earth
sciences consist of disciplines
such as geology (the science of the earth). Life sciences
include disciplines such as biology (the
science of human bodies) and botany (the science of plants). In
contrast, social science is the
science of people or collections of people, such as groups,
firms, societies, or economies, and
their individual or collective behaviors. Social sciences can be
classified into disciplines such as
psychology (the science of human behaviors), sociology (the
science of social groups), and
economics (the science of firms, markets, and economies).
The natural sciences are different from the social sciences in
several respects. The
natural sciences are very precise, accurate, deterministic, and
independent of the person
2 | S o c i a l S c i e n c e R e s e a r c h
making the scientific observations. For instance, a scientific
experiment in physics, such as
measuring the speed of sound through a certain media or the
refractive index of water, should
always yield the exact same results, irrespective of the time or
place of the experiment, or the
person conducting the experiment. If two students conducting
the same physics experiment
24. obtain two different values of these physical properties, then it
generally means that one or
both of those students must be in error. However, the same
cannot be said for the social
sciences, which tend to be less accurate, deterministic, or
unambiguous. For instance, if you
measure a person’s happiness using a hypothetical instrument,
you may find that the same
person is more happy or less happy (or sad) on different days
and sometimes, at different times
on the same day. One’s happiness may vary depending on the
news that person received that
day or on the events that transpired earlier during that day.
Furthermore, there is not a single
instrument or metric that can accurately measure a person’s
happiness. Hence, one instrument
may calibrate a person as being “more happy” while a second
instrument may find that the
same person is “less happy” at the same instant in time. In
other words, there is a high degree
of measurement error in the social sciences and there is
considerable uncertainty and little
agreement on social science policy decisions. For instance, you
will not find many
disagreements among natural scientists on the speed of light or
the speed of the earth around
the sun, but you will find numerous disagreements among social
scientists on how to solve a
social problem such as reduce global terrorism or rescue an
economy from a recession. Any
student studying the social sciences must be cognizant of and
comfortable with handling higher
levels of ambiguity, uncertainty, and error that come with such
sciences, which merely reflects
the high variability of social objects.
25. Sciences can also be classified based on their purpose. Basic
sciences, also called pure
sciences, are those that explain the most basic objects and
forces, relationships between them,
and laws governing them. Examples include physics,
mathematics, and biology. Applied
sciences, also called practical sciences, are sciences that apply
scientific knowledge from basic
sciences in a physical environment. For instance, engineering is
an applied science that applies
the laws of physics and chemistry for practical applications
such as building stronger bridges or
fuel efficient combustion engines, while medicine is an applied
science that applies the laws of
biology for solving human ailments. Both basic and applied
sciences are required for human
development. However, applied sciences cannot stand on their
own right, but instead relies on
basic sciences for its progress. Of course, the industry and
private enterprises tend to focus
more on applied sciences given their practical value, while
universities study both basic and
applied sciences.
Scientific Knowledge
The purpose of science is to create scientific knowledge.
Scientific knowledge refers to
a generalized body of laws and theories to explain a
phenomenon or behavior of interest that
are acquired using the scientific method. Laws are observed
patterns of phenomena or
behaviors, while theories are systematic explanations of the
underlying phenomenon or
behavior. For instance, in physics, the Newtonian Laws of
Motion describe what happens when
26. an object is in a state of rest or motion (Newton’s First Law),
what force is needed to move a
stationary object or stop a moving object (Newton’s Second
Law), and what happens when two
objects collide (Newton’s Third Law). Collectively, the three
laws constitute the basis of
classical mechanics – a theory of moving objects. Likewise, the
theory of optics explains the
properties of light and how it behaves in different media,
electromagnetic theory explains the
properties of electricity and how to generate it, quantum
mechanics explains the properties of
subatomic particles, and thermodynamics explains the
properties of energy and mechanical
S c i e n c e a n d S c i e n t i f i c R e s e a r c h | 3
work. An introductory college level text book in physics will
likely contain separate chapters
devoted to each of these theories. Similar theories are also
available in social sciences. For
instance, cognitive dissonance theory in psychology explains
how people react when their
observations of an event is different from what they expected of
that event, general deterrence
theory explains why some people engage in improper or
criminal behaviors, such as illegally
download music or commit software piracy, and the theory of
planned behavior explains how
people make conscious reasoned choices in their everyday lives.
The goal of scientific research is to discover laws and postulate
27. theories that can explain
natural or social phenomena, or in other words, build scientific
knowledge. It is important to
understand that this knowledge may be imperfect or even quite
far from the truth. Sometimes,
there may not be a single universal truth, but rather an
equilibrium of “multiple truths.” We
must understand that the theories, upon which scientific
knowledge is based, are only
explanations of a particular phenomenon, as suggested by a
scientist. As such, there may be
good or poor explanations, depending on the extent to which
those explanations fit well with
reality, and consequently, there may be good or poor theories.
The progress of science is
marked by our progression over time from poorer theories to
better theories, through better
observations using more accurate instruments and more
informed logical reasoning.
We arrive at scientific laws or theories through a process of
logic and evidence. Logic
(theory) and evidence (observations) are the two, and only two,
pillars upon which scientific
knowledge is based. In science, theories and observations are
interrelated and cannot exist
without each other. Theories provide meaning and significance
to what we observe, and
observations help validate or refine existing theory or construct
new theory. Any other means
of knowledge acquisition, such as faith or authority cannot be
considered science.
Scientific Research
Given that theories and observations are the two pillars of
28. science, scientific research
operates at two levels: a theoretical level and an empirical
level. The theoretical level is
concerned with developing abstract concepts about a natural or
social phenomenon and
relationships between those concepts (i.e., build “theories”),
while the empirical level is
concerned with testing the theoretical concepts and
relationships to see how well they reflect
our observations of reality, with the goal of ultimately building
better theories. Over time, a
theory becomes more and more refined (i.e., fits the observed
reality better), and the science
gains maturity. Scientific research involves continually moving
back and forth between theory
and observations. Both theory and observations are essential
components of scientific
research. For instance, relying solely on observations for
making inferences and ignoring
theory is not considered valid scientific research.
Depending on a researcher’s training and interest, scientific
inquiry may take one of two
possible forms: inductive or deductive. In inductive research,
the goal of a researcher is to
infer theoretical concepts and patterns from observed data. In
deductive research, the goal of
the researcher is to test concepts and patterns known from
theory using new empirical data.
Hence, inductive research is also called theory-building
research, and deductive research is
theory-testing research. Note here that the goal of theory-
testing is not just to test a theory, but
possibly to refine, improve, and extend it. Figure 1.1 depicts
the complementary nature of
inductive and deductive research. Note that inductive and
29. deductive research are two halves of
the research cycle that constantly iterates between theory and
observations. You cannot do
inductive or deductive research if you are not familiar with both
the theory and data
4 | S o c i a l S c i e n c e R e s e a r c h
components of research. Naturally, a complete researcher is
one who can traverse the entire
research cycle and can handle both inductive and deductive
research.
It is important to understand that theory-building (inductive
research) and theory-
testing (deductive research) are both critical for the
advancement of science. Elegant theories
are not valuable if they do not match with reality. Likewise,
mountains of data are also useless
until they can contribute to the construction to meaningful
theories. Rather than viewing these
two processes in a circular relationship, as shown in Figure 1.1,
perhaps they can be better
viewed as a helix, with each iteration between theory and data
contributing to better
explanations of the phenomenon of interest and better theories.
Though both inductive and
deductive research are important for the advancement of
science, it appears that inductive
(theory-building) research is more valuable when there are few
prior theories or explanations,
while deductive (theory-testing) research is more productive
30. when there are many competing
theories of the same phenomenon and researchers are interested
in knowing which theory
works best and under what circumstances.
Figure 1.1. The Cycle of Research
Theory building and theory testing are particularly difficult in
the social sciences, given
the imprecise nature of the theoretical concepts, inadequate
tools to measure them, and the
presence of many unaccounted factors that can also influence
the phenomenon of interest. It is
also very difficult to refute theories that do not work. For
instance, Karl Marx’s theory of
communism as an effective means of economic production
withstood for decades, before it was
finally discredited as being inferior to capitalism in promoting
economic growth and social
welfare. Erstwhile communist economies like the Soviet Union
and China eventually moved
toward more capitalistic economies characterized by profit-
maximizing private enterprises.
However, the recent collapse of the mortgage and financial
industries in the United States
demonstrates that capitalism also has its flaws and is not as
effective in fostering economic
growth and social welfare as previously presumed. Unlike
theories in the natural sciences,
social science theories are rarely perfect, which provides
numerous opportunities for
researchers to improve those theories or build their own
alternative theories.
31. Conducting scientific research, therefore, requires two sets of
skills – theoretical and
methodological – needed to operate in the theoretical and
empirical levels respectively.
Methodological skills ("know-how") are relatively standard,
invariant across disciplines, and
easily acquired through doctoral programs. However,
theoretical skills ("know-what") is
considerably harder to master, requires years of observation and
reflection, and are tacit skills
that cannot be “taught” but rather learned though experience.
All of the greatest scientists in
the history of mankind, such as Galileo, Newton, Einstein, Neils
Bohr, Adam Smith, Charles
S c i e n c e a n d S c i e n t i f i c R e s e a r c h | 5
Darwin, and Herbert Simon, were master theoreticians, and they
are remembered for the
theories they postulated that transformed the course of science.
Methodological skills are
needed to be an ordinary researcher, but theoretical skills are
needed to be an extraordinary
researcher!
Scientific Method
In the preceding sections, we described science as knowledge
acquired through a
scientific method. So what exactly is the “scientific method”?
Scientific method refers to a
32. standardized set of techniques for building scientific
knowledge, such as how to make valid
observations, how to interpret results, and how to generalize
those results. The scientific
method allows researchers to independently and impartially test
preexisting theories and prior
findings, and subject them to open debate, modifications, or
enhancements. The scientific
method must satisfy four key characteristics:
principles of reasoning.
evidence.
ists should be able to independently
replicate or repeat a
scientific study and obtain similar, if not identical, results.
derived must withstand critical
scrutiny (peer review) by other scientists.
Any branch of inquiry that does not allow the scientific method
to test its basic laws or
theories cannot be called “science.” For instance, theology (the
study of religion) is not science
because theological ideas (such as the presence of God) cannot
be tested by independent
observers using a logical, confirmable, repeatable, and
scrutinizable. Similarly, arts, music,
literature, humanities, and law are also not considered science,
even though they are creative
and worthwhile endeavors in their own right.
33. The scientific method, as applied to social sciences, includes a
variety of research
approaches, tools, and techniques, for collecting and analyzing
qualitative or quantitative data.
These methods include laboratory experiments, field surveys,
case research, ethnographic
research, action research, and so forth. Much of this book is
devoted to learning about these
different methods. However, recognize that the scientific
method operates primarily at the
empirical level of research, i.e., how to make observations and
analyze these observations. Very
little of this method is directly pertinent to the theoretical level,
which is really the more
challenging part of scientific research.
Types of Scientific Research
Depending on the purpose of research, scientific research
projects can be grouped into
three types: exploratory, descriptive, and explanatory.
Exploratory research is often
conducted in new areas of inquiry, where the goals of the
research are: (1) to scope out the
magnitude or extent of a particular phenomenon, problem, or
behavior, (2) to generate some
initial ideas (or “hunches”) about that phenomenon, or (3) to
test the feasibility of undertaking
a more extensive study regarding that phenomenon. For
instance, if the citizens of a country
are generally dissatisfied with governmental policies regarding
during an economic recession,
6 | S o c i a l S c i e n c e R e s e a r c h
34. exploratory research may be directed at measuring the extent of
citizens’ dissatisfaction,
understanding how such dissatisfaction is manifested, such as
the frequency of public protests,
and the presumed causes of such dissatisfaction, such as
ineffective government policies in
dealing with inflation, interest rates, unemployment, or higher
taxes. Such research may
include examination of publicly reported figures, such as
estimates of economic indicators, such
as gross domestic product (GDP), unemployment, and consumer
price index, as archived by
third-party sources, obtained through interviews of experts,
eminent economists, or key
government officials, and/or derived from studying historical
examples of dealing with similar
problems. This research may not lead to a very accurate
understanding of the target problem,
but may be worthwhile in scoping out the nature and extent of
the problem and serve as a
useful precursor to more in-depth research.
Descriptive research is directed at making careful observations
and detailed
documentation of a phenomenon of interest. These observations
must be based on the
scientific method (i.e., must be replicable, precise, etc.), and
therefore, are more reliable than
casual observations by untrained people. Examples of
descriptive research are tabulation of
demographic statistics by the United States Census Bureau or
employment statistics by the
Bureau of Labor, who use the same or similar instruments for
35. estimating employment by sector
or population growth by ethnicity over multiple employment
surveys or censuses. If any
changes are made to the measuring instruments, estimates are
provided with and without the
changed instrumentation to allow the readers to make a fair
before-and-after comparison
regarding population or employment trends. Other descriptive
research may include
chronicling ethnographic reports of gang activities among
adolescent youth in urban
populations, the persistence or evolution of religious, cultural,
or ethnic practices in select
communities, and the role of technologies such as Twitter and
instant messaging in the spread
of democracy movements in Middle Eastern countries.
Explanatory research seeks explanations of observed
phenomena, problems, or
behaviors. While descriptive research examines the what,
where, and when of a phenomenon,
explanatory research seeks answers to why and how types of
questions. It attempts to “connect
the dots” in research, by identifying causal factors and
outcomes of the target phenomenon.
Examples include understanding the reasons behind adolescent
crime or gang violence, with
the goal of prescribing strategies to overcome such societal
ailments. Most academic or
doctoral research belongs to the explanation category, though
some amount of exploratory
and/or descriptive research may also be needed during initial
phases of academic research.
Seeking explanations for observed events requires strong
theoretical and interpretation skills,
along with intuition, insights, and personal experience. Those
36. who can do it well are also the
most prized scientists in their disciplines.
History of Scientific Thought
Before closing this chapter, it may be interesting to go back in
history and see how
science has evolved over time and identify the key scientific
minds in this evolution. Although
instances of scientific progress have been documented over
many centuries, the terms
“science,” “scientists,” and the “scientific method” were coined
only in the 19th century. Prior to
this time, science was viewed as a part of philosophy, and
coexisted with other branches of
philosophy such as logic, metaphysics, ethics, and aesthetics,
although the boundaries between
some of these branches were blurred.
S c i e n c e a n d S c i e n t i f i c R e s e a r c h | 7
In the earliest days of human inquiry, knowledge was usually
recognized in terms of
theological precepts based on faith. This was challenged by
Greek philosophers such as Plato,
Aristotle, and Socrates during the 3rd century BC, who
suggested that the fundamental nature of
being and the world can be understood more accurately through
a process of systematic logical
reasoning called rationalism. In particular, Aristotle’s classic
work Metaphysics (literally
meaning “beyond physical [existence]”) separated theology (the
37. study of Gods) from ontology
(the study of being and existence) and universal science (the
study of first principles, upon
which logic is based). Rationalism (not to be confused with
“rationality”) views reason as the
source of knowledge or justification, and suggests that the
criterion of truth is not sensory but
rather intellectual and deductive, often derived from a set of
first principles or axioms (such as
Aristotle’s “law of non-contradiction”).
The next major shift in scientific thought occurred during the
16th century, when British
philosopher Francis Bacon (1561-1626) suggested that
knowledge can only be derived from
observations in the real world. Based on this premise, Bacon
emphasized knowledge
acquisition as an empirical activity (rather than as a reasoning
activity), and developed
empiricism as an influential branch of philosophy. Bacon’s
works led to the popularization of
inductive methods of scientific inquiry, the development of the
“scientific method” (originally
called the “Baconian method”), consisting of systematic
observation, measurement, and
experimentation, and may have even sowed the seeds of atheism
or the rejection of theological
precepts as “unobservable.”
Empiricism continued to clash with rationalism throughout the
Middle Ages, as
philosophers sought the most effective way of gaining valid
knowledge. French philosopher
Rene Descartes sided with the rationalists, while British
philosophers John Locke and David
Hume sided with the empiricists. Other scientists, such as
38. Galileo Galilei and Sir Issac Newton,
attempted to fuse the two ideas into natural philosophy (the
philosophy of nature), to focus
specifically on understanding nature and the physical universe,
which is considered to be the
precursor of the natural sciences. Galileo (1564-1642) was
perhaps the first to state that the
laws of nature are mathematical, and contributed to the field of
astronomy through an
innovative combination of experimentation and mathematics.
In the 18th century, German philosopher Immanuel Kant sought
to resolve the dispute
between empiricism and rationalism in his book Critique of
Pure Reason, by arguing that
experience is purely subjective and processing them using pure
reason without first delving
into the subjective nature of experiences will lead to theoretical
illusions. Kant’s ideas led to the
development of German idealism, which inspired later
development of interpretive techniques
such as phenomenology, hermeneutics, and critical social
theory.
At about the same time, French philosopher Auguste Comte
(1798–1857), founder of
the discipline of sociology, attempted to blend rationalism and
empiricism in a new doctrine
called positivism. He suggested that theory and observations
have circular dependence on
each other. While theories may be created via reasoning, they
are only authentic if they can be
verified through observations. The emphasis on verification
started the separation of modern
science from philosophy and metaphysics and further
development of the “scientific method” as
39. the primary means of validating scientific claims. Comte’s
ideas were expanded by Emile
Durkheim in his development of sociological positivism
(positivism as a foundation for social
research) and Ludwig Wittgenstein in logical positivism.
8 | S o c i a l S c i e n c e R e s e a r c h
In the early 20th century, strong accounts of positivism were
rejected by interpretive
sociologists (antipositivists) belonging to the German idealism
school of thought. Positivism
was typically equated with quantitative research methods such
as experiments and surveys and
without any explicit philosophical commitments, while
antipositivism employed qualitative
methods such as unstructured interviews and participant
observation. Even practitioners of
positivism, such as American sociologist Paul Lazarsfield who
pioneered large-scale survey
research and statistical techniques for analyzing survey data,
acknowledged potential problems
of observer bias and structural limitations in positivist inquiry.
In response, antipositivists
emphasized that social actions must be studied though
interpretive means based upon an
understanding the meaning and purpose that individuals attach
to their personal actions, which
inspired Georg Simmel’s work on symbolic interactionism, Max
Weber’s work on ideal types,
and Edmund Husserl’s work on phenomenology.
40. In the mid-to-late 20th century, both positivist and antipositivist
schools of thought were
subjected to criticisms and modifications. British philosopher
Sir Karl Popper suggested that
human knowledge is based not on unchallengeable, rock solid
foundations, but rather on a set
of tentative conjectures that can never be proven conclusively,
but only disproven. Empirical
evidence is the basis for disproving these conjectures or
“theories.” This metatheoretical
stance, called postpositivism (or postempiricism), amends
positivism by suggesting that it is
impossible to verify the truth although it is possible to reject
false beliefs, though it retains the
positivist notion of an objective truth and its emphasis on the
scientific method.
Likewise, antipositivists have also been criticized for trying
only to understand society
but not critiquing and changing society for the better. The roots
of this thought lie in Das
Capital, written by German philosophers Karl Marx and
Friedrich Engels, which critiqued
capitalistic societies as being social inequitable and inefficient,
and recommended resolving this
inequity through class conflict and proletarian revolutions.
Marxism inspired social revolutions
in countries such as Germany, Italy, Russia, and China, but
generally failed to accomplish the
social equality that it aspired. Critical research (also called
critical theory) propounded by
Max Horkheimer and Jurgen Habermas in the 20th century,
retains similar ideas of critiquing
and resolving social inequality, and adds that people can and
should consciously act to change
their social and economic circumstances, although their ability
41. to do so is constrained by
various forms of social, cultural and political domination.
Critical research attempts to uncover
and critique the restrictive and alienating conditions of the
status quo by analyzing the
oppositions, conflicts and contradictions in contemporary
society, and seeks to eliminate the
causes of alienation and domination (i.e., emancipate the
oppressed class). More on these
different research philosophies and approaches will be covered
in future chapters of this book.
9
Chapter 2
Thinking Like a Researcher
Conducting good research requires first retraining your brain to
think like a researcher.
This requires visualizing the abstract from actual observations,
mentally “connecting the dots”
to identify hidden concepts and patterns, and synthesizing those
patterns into generalizable
laws and theories that apply to other contexts beyond the
domain of the initial observations.
Research involves constantly moving back and forth from an
empirical plane where
observations are conducted to a theoretical plane where these
42. observations are abstracted into
generalizable laws and theories. This is a skill that takes many
years to develop, is not
something that is taught in graduate or doctoral programs or
acquired in industry training, and
is by far the biggest deficit amongst Ph.D. students. Some of
the mental abstractions needed to
think like a researcher include unit of analysis, constructs,
hypotheses, operationalization,
theories, models, induction, deduction, and so forth, which we
will examine in this chapter.
Unit of Analysis
One of the first decisions in any social science research is the
unit of analysis of a
scientific study. The unit of analysis refers to the person,
collective, or object that is the target
of the investigation. Typical unit of analysis include
individuals, groups, organizations,
countries, technologies, objects, and such. For instance, if we
are interested in studying people’s
shopping behavior, their learning outcomes, or their attitudes to
new technologies, then the
unit of analysis is the individual. If we want to study
characteristics of street gangs or teamwork
in organizations, then the unit of analysis is the group. If the
goal of research is to understand
how firms can improve profitability or make good executive
decisions, then the unit of analysis
is the firm. In this case, even though decisions are made by
individuals in these firms, these
individuals are presumed to represent their firm’s decision
rather than their personal decisions.
If research is directed at understanding differences in national
cultures, then the unit of analysis
43. becomes a country. Even inanimate objects can serve as units
of analysis. For instance, if a
researcher is interested in understanding how to make web
pages more attractive to its users,
then the unit of analysis is a web page (and not users). If we
wish to study how knowledge
transfer occurs between two firms, then our unit of analysis
becomes the dyad (the combination
of firms that is sending and receiving knowledge).
Understanding the units of analysis can sometimes be fairly
complex. For instance, if we
wish to study why certain neighborhoods have high crime rates,
then our unit of analysis
becomes the neighborhood, and not crimes or criminals
committing such crimes. This is
because the object of our inquiry is the neighborhood and not
criminals. However, if we wish to
compare different types of crimes in different neighborhoods,
such as homicide, robbery,
10 | S o c i a l S c i e n c e R e s e a r c h
assault, and so forth, our unit of analysis becomes the crime. If
we wish to study why criminals
engage in illegal activities, then the unit of analysis becomes
the individual (i.e., the criminal).
Like, if we want to study why some innovations are more
successful than others, then our unit
of analysis is an innovation. However, if we wish to study how
some organizations innovate
more consistently than others, then the unit of analysis is the
44. organization. Hence, two related
research questions within the same research study may have two
entirely different units of
analysis.
Understanding the unit of analysis is important because it
shapes what type of data you
should collect for your study and who you collect it from. If
your unit of analysis is a web page,
you should be collecting data about web pages from actual web
pages, and not surveying people
about how they use web pages. If your unit of analysis is the
organization, then you should be
measuring organizational-level variables such as organizational
size, revenues, hierarchy, or
absorptive capacity. This data may come from a variety of
sources such as financial records or
surveys of Chief Executive Officers (CEO), who are presumed
to be representing their
organization (rather than themselves). Some variables such as
CEO pay may seem like
individual level variables, but in fact, it can also be an
organizational level variable because each
organization has only one CEO pay at any time. Sometimes, it
is possible to collect data from a
lower level of analysis and aggregate that data to a higher level
of analysis. For instance, in
order to study teamwork in organizations, you can survey
individual team members in different
organizational teams, and average their individual scores to
create a composite team-level
score for team-level variables like cohesion and conflict. We
will examine the notion of
“variables” in greater depth in the next section.
Concepts, Constructs, and Variables
45. We discussed in Chapter 1 that although research can be
exploratory, descriptive, or
explanatory, most scientific research tend to be of the
explanatory type in that they search for
potential explanations of observed natural or social phenomena.
Explanations require
development of concepts or generalizable properties or
characteristics associated with objects,
events, or people. While objects such as a person, a firm, or a
car are not concepts, their specific
characteristics or behavior such as a person’s attitude toward
immigrants, a firm’s capacity for
innovation, and a car’s weight can be viewed as concepts.
Knowingly or unknowingly, we use different kinds of concepts
in our everyday
conversations. Some of these concepts have been developed
over time through our shared
language. Sometimes, we borrow concepts from other
disciplines or languages to explain a
phenomenon of interest. For instance, the idea of gravitation
borrowed from physics can be
used in business to describe why people tend to “gravitate” to
their preferred shopping
destinations. Likewise, the concept of distance can be used to
explain the degree of social
separation between two otherwise collocated individuals.
Sometimes, we create our own
concepts to describe a unique characteristic not described in
prior research. For instance,
technostress is a new concept referring to the mental stress one
may face when asked to learn a
new technology.
Concepts may also have progressive levels of abstraction. Some
46. concepts such as a
person’s weight are precise and objective, while other concepts
such as a person’s personality
may be more abstract and difficult to visualize. A construct is
an abstract concept that is
specifically chosen (or “created”) to explain a given
phenomenon. A construct may be a simple
concept, such as a person’s weight, or a combination of a set of
related concepts such as a
T h i n k i n g L i k e a R e s e a r c h e r | 11
person’s communication skill, which may consist of several
underlying concepts such as the
person’s vocabulary, syntax, and spelling. The former instance
(weight) is a unidimensional
construct, while the latter (communication skill) is a multi-
dimensional construct (i.e., it
consists of multiple underlying concepts). The distinction
between constructs and concepts are
clearer in multi-dimensional constructs, where the higher order
abstraction is called a construct
and the lower order abstractions are called concepts. However,
this distinction tends to blur in
the case of unidimensional constructs.
Constructs used for scientific research must have precise and
clear definitions that
others can use to understand exactly what it means and what it
does not mean. For instance, a
seemingly simple construct such as income may refer to
monthly or annual income, before-tax
47. or after-tax income, and personal or family income, and is
therefore neither precise nor clear.
There are two types of definitions: dictionary definitions and
operational definitions. In the
more familiar dictionary definition, a construct is often defined
in terms of a synonym. For
instance, attitude may be defined as a disposition, a feeling, or
an affect, and affect in turn is
defined as an attitude. Such definitions of a circular nature are
not particularly useful in
scientific research for elaborating the meaning and content of
that construct. Scientific research
requires operational definitions that define constructs in terms
of how they will be
empirically measured. For instance, the operational definition
of a construct such as
temperature must specify whether we plan to measure
temperature in Celsius, Fahrenheit, or
Kelvin scale. A construct such as income should be defined in
terms of whether we are
interested in monthly or annual income, before-tax or after-tax
income, and personal or family
income. One can imagine that constructs such as learning,
personality, and intelligence can be
quite hard to define operationally.
Figure 2.1. The theoretical and empirical planes of research
A term frequently associated with, and sometimes used
interchangeably with, a
construct is a variable. Etymologically speaking, a variable is a
quantity that can vary (e.g., from
low to high, negative to positive, etc.), in contrast to constants
48. that do not vary (i.e., remain
constant). However, in scientific research, a variable is a
measurable representation of an
abstract construct. As abstract entities, constructs are not
directly measurable, and hence, we
look for proxy measures called variables. For instance, a
person’s intelligence is often measured
as his or her IQ (intelligence quotient) score, which is an index
generated from an analytical and
pattern-matching test administered to people. In this case,
intelligence is a construct, and IQ
score is a variable that measures the intelligence construct.
Whether IQ scores truly measures
one’s intelligence is anyone’s guess (though many believe that
they do), and depending on
12 | S o c i a l S c i e n c e R e s e a r c h
whether how well it measures intelligence, the IQ score may be
a good or a poor measure of the
intelligence construct. As shown in Figure 2.1, scientific
research proceeds along two planes: a
theoretical plane and an empirical plane. Constructs are
conceptualized at the theoretical
(abstract) plane, while variables are operationalized and
measured at the empirical
(observational) plane. Thinking like a researcher implies the
ability to move back and forth
between these two planes.
Depending on their intended use, variables may be classified as
independent,
49. dependent, moderating, mediating, or control variables.
Variables that explain other variables
are called independent variables, those that are explained by
other variables are dependent
variables, those that are explained by independent variables
while also explaining dependent
variables are mediating variables (or intermediate variables),
and those that influence the
relationship between independent and dependent variables are
called moderating variables.
As an example, if we state that higher intelligence causes
improved learning among students,
then intelligence is an independent variable and learning is a
dependent variable. There may be
other extraneous variables that are not pertinent to explaining a
given dependent variable, but
may have some impact on the dependent variable. These
variables must be controlled for in a
scientific study, and are therefore called control variables.
Figure 2.2. A nomological network of constructs
To understand the differences between these different variable
types, consider the
example shown in Figure 2.2. If we believe that intelligence
influences (or explains) students’
academic achievement, then a measure of intelligence such as
an IQ score is an independent
variable, while a measure of academic success such as grade
point average is a dependent
variable. If we believe that the effect of intelligence on
academic achievement also depends on
the effort invested by the student in the learning process (i.e.,
50. between two equally intelligent
students, the student who puts is more effort achieves higher
academic achievement than one
who puts in less effort), then effort becomes a moderating
variable. Incidentally, one may also
view effort as an independent variable and intelligence as a
moderating variable. If academic
achievement is viewed as an intermediate step to higher earning
potential, then earning
potential becomes the dependent variable for the independent
variable academic achievement,
and academic achievement becomes the mediating variable in
the relationship between
intelligence and earning potential. Hence, variable are defined
as an independent, dependent,
moderating, or mediating variable based on their nature of
association with each other. The
overall network of relationships between a set of related
constructs is called a nomological
network (see Figure 2.2). Thinking like a researcher requires
not only being able to abstract
constructs from observations, but also being able to mentally
visualize a nomological network
linking these abstract constructs.
T h i n k i n g L i k e a R e s e a r c h e r | 13
Propositions and Hypotheses
Figure 2.2 shows how theoretical constructs such as
intelligence, effort, academic
achievement, and earning potential are related to each other in a
51. nomological network. Each of
these relationships is called a proposition. In seeking
explanations to a given phenomenon or
behavior, it is not adequate just to identify key concepts and
constructs underlying the target
phenomenon or behavior. We must also identify and state
patterns of relationships between
these constructs. Such patterns of relationships are called
propositions. A proposition is a
tentative and conjectural relationship between constructs that is
stated in a declarative form.
An example of a proposition is: “An increase in student
intelligence causes an increase in their
academic achievement.” This declarative statement does not
have to be true, but must be
empirically testable using data, so that we can judge whether it
is true or false. Propositions are
generally derived based on logic (deduction) or empirical
observations (induction).
Because propositions are associations between abstract
constructs, they cannot be
tested directly. Instead, they are tested indirectly by examining
the relationship between
corresponding measures (variables) of those constructs. The
empirical formulation of
propositions, stated as relationships between variables, is called
hypotheses (see Figure 2.1).
Since IQ scores and grade point average are operational
measures of intelligence and academic
achievement respectively, the above proposition can be
specified in form of the hypothesis: “An
increase in students’ IQ score causes an increase in their grade
point average.” Propositions are
specified in the theoretical plane, while hypotheses are
specified in the empirical plane. Hence,
52. hypotheses are empirically testable using observed data, and
may be rejected if not supported
by empirical observations. Of course, the goal of hypothesis
testing is to infer whether the
corresponding proposition is valid.
Hypotheses can be strong or weak. “Students’ IQ scores are
related to their academic
achievement” is an example of a weak hypothesis, since it
indicates neither the directionality of
the hypothesis (i.e., whether the relationship is positive or
negative), nor its causality (i.e.,
whether intelligence causes academic achievement or academic
achievement causes
intelligence). A stronger hypothesis is “students’ IQ scores are
positively related to their
academic achievement”, which indicates the directionality but
not the causality. A still better
hypothesis is “students’ IQ scores have positive effects on their
academic achievement”, which
specifies both the directionality and the causality (i.e.,
intelligence causes academic
achievement, and not the reverse). The signs in Figure 2.2
indicate the directionality of the
respective hypotheses.
Also note that scientific hypotheses should clearly specify
independent and dependent
variables. In the hypothesis, “students’ IQ scores have positive
effects on their academic
achievement,” it is clear that intelligence is the independent
variable (the “cause”) and academic
achievement is the dependent variable (the “effect”). Further, it
is also clear that this
hypothesis can be evaluated as either true (if higher intelligence
leads to higher academic
53. achievement) or false (if higher intelligence has no effect on or
leads to lower academic
achievement). Later on in this book, we will examine how to
empirically test such cause-effect
relationships. Statements such as “students are generally
intelligent” or “all students can
achieve academic success” are not scientific hypotheses because
they do not specify
independent and dependent variables, nor do they specify a
directional relationship that can be
evaluated as true or false.
14 | S o c i a l S c i e n c e R e s e a r c h
Theories and Models
A theory is a set of systematically interrelated constructs and
propositions intended to
explain and predict a phenomenon or behavior of interest,
within certain boundary conditions
and assumptions. Essentially, a theory is a systemic collection
of related theoretical
propositions. While propositions generally connect two or three
constructs, theories represent
a system of multiple constructs and propositions. Hence,
theories can be substantially more
complex and abstract and of a larger scope than propositions or
hypotheses.
I must note here that people not familiar with scientific research
54. often view a theory as
a speculation or the opposite of fact. For instance, people often
say that teachers need to be less
theoretical and more practical or factual in their classroom
teaching. However, practice or fact
are not opposites of theory, but in a scientific sense, are
essential components needed to test
the validity of a theory. A good scientific theory should be well
supported using observed facts
and should also have practical value, while a poorly defined
theory tends to be lacking in these
dimensions. Famous organizational research Kurt Lewin once
said, “Theory without practice is
sterile; practice without theory is blind.” Hence, both theory
and facts (or practice) are
essential for scientific research.
Theories provide explanations of social or natural phenomenon.
As emphasized in
Chapter 1, these explanations may be good or poor. Hence,
there may be good or poor theories.
Chapter 3 describes some criteria that can be used to evaluate
how good a theory really is.
Nevertheless, it is important for researchers to understand that
theory is not “truth,” there is
nothing sacrosanct about any theory, and theories should not be
accepted just because they
were proposed by someone. In the course of scientific progress,
poorer theories are eventually
replaced by better theories with higher explanatory power. The
essential challenge for
researchers is to build better and more comprehensive theories
that can explain a target
phenomenon better than prior theories.
A term often used in conjunction with theory is a model. A
55. model is a representation of
all or part of a system that is constructed to study that system
(e.g., how the system works or
what triggers the system). While a theory tries to explain a
phenomenon, a model tries to
represent a phenomenon. Models are often used by decision
makers to make important
decisions based on a given set of inputs. For instance,
marketing managers may use models to
decide how much money to spend on advertising for different
product lines based on
parameters such as prior year’s advertising expenses, sales,
market growth, and competing
products. Likewise, weather forecasters can use models to
predict future weather patterns
based on parameters such as wind speeds, wind direction,
temperature, and humidity. While
these models are useful, they may not necessarily explain
advertising expenditure or weather
forecasts. Models may be of different kinds, such as
mathematical models, network models, and
path models. Models can also be descriptive, predictive, or
normative. Descriptive models are
frequently used for representing complex systems, for
visualizing variables and relationships in
such systems. An advertising expenditure model may be a
descriptive model. Predictive
models (e.g., a regression model) allow forecast of future
events. Weather forecasting models
are predictive models. Normative models are used to guide our
activities along commonly
accepted norms or practices. Models may also be static if it
represents the state of a system at
one point in time, or dynamic, if it represents a system’s
evolution over time.
56. The process of theory or model development may involve
inductive and deductive
reasoning. Recall from Chapter 1 that deduction is the process
of drawing conclusions about a
T h i n k i n g L i k e a R e s e a r c h e r | 15
phenomenon or behavior based on theoretical or logical reasons
and an initial set of premises.
As an example, if a certain bank enforces a strict code of ethics
for its employees (Premise 1)
and Jamie is an employee at that bank (Premise 2), then Jamie
can be trusted to follow ethical
practices (Conclusion). In deduction, the conclusions must be
true if the initial premises and
reasons are correct.
In contrast, induction is the process of drawing conclusions
based on facts or observed
evidence. For instance, if a firm spent a lot of money on a
promotional campaign (Observation
1), but the sales did not increase (Observation 2), then possibly
the promotion campaign was
poorly executed (Conclusion). However, there may be rival
explanations for poor sales, such as
economic recession or the emergence of a competing product or
brand or perhaps a supply
chain problem. Inductive conclusions are therefore only a
hypothesis, and may be disproven.
Deductive conclusions generally tend to be stronger than
inductive conclusions, but a deductive
conclusion based on an incorrect premise is also incorrect.
57. As shown in Figure 2.3, inductive and deductive reasoning go
hand in hand in theory
and model building. Induction occurs when we observe a fact
and ask, “Why is this happening?”
In answering this question, we advance one or more tentative
explanations (hypotheses). We
then use deduction to narrow down the tentative explanations to
the most plausible
explanation based on logic and reasonable premises (based on
our understanding of the
phenomenon under study). Researchers must be able to move
back and forth between
inductive and deductive reasoning if they are to post extensions
or modifications to a given
model or theory, or built better ones, which are the essence of
scientific research.
Figure 2.3. The model-building process
17
Chapter 3
The Research Process
58. In Chapter 1, we saw that scientific research is the process of
acquiring scientific
knowledge using the scientific method. But how is such
research conducted? This chapter
delves into the process of scientific research, and the
assumptions and outcomes of the research
process.
Paradigms of Social Research
Our design and conduct of research is shaped by our mental
models or frames of
references that we use to organize our reasoning and
observations. These mental models or
frames (belief systems) are called paradigms. The word
“paradigm” was popularized by
Thomas Kuhn (1962) in his book The Structure of Scientific
Revolutions, where he examined the
history of the natural sciences to identify patterns of activities
that shape the progress of
science. Similar ideas are applicable to social sciences as well,
where a social reality can be
viewed by different people in different ways, which may
constrain their thinking and reasoning
about the observed phenomenon. For instance, conservatives
and liberals tend to have very
different perceptions of the role of government in people’s
lives, and hence, have different
opinions on how to solve social problems. Conservatives may
believe that lowering taxes is the
best way to stimulate a stagnant economy because it increases
people’s disposable income and
spending, which in turn expands business output and
employment. In contrast, liberals may
believe that governments should invest more directly in job
59. creation programs such as public
works and infrastructure projects, which will increase
employment and people’s ability to
consume and drive the economy. Likewise, Western societies
place greater emphasis on
individual rights, such as one’s right to privacy, right of free
speech, and right to bear arms. In
contrast, Asian societies tend to balance the rights of
individuals against the rights of families,
organizations, and the government, and therefore tend to be
more communal and less
individualistic in their policies. Such differences in perspective
often lead Westerners to
criticize Asian governments for being autocratic, while Asians
criticize Western societies for
being greedy, having high crime rates, and creating a “cult of
the individual.” Our personal
paradigms are like “colored glasses” that govern how we view
the world and how we structure
our thoughts about what we see in the world.
Paradigms are often hard to recognize, because they are
implicit, assumed, and taken
for granted. However, recognizing these paradigms is key to
making sense of and reconciling
differences in people’ perceptions of the same social
phenomenon. For instance, why do
liberals believe that the best way to improve secondary
education is to hire more teachers, but
conservatives believe that privatizing education (using such
means as school vouchers) are
18 | S o c i a l S c i e n c e R e s e a r c h
60. more effective in achieving the same goal? Because
conservatives place more faith in
competitive markets (i.e., in free competition between schools
competing for education dollars),
while liberals believe more in labor (i.e., in having more
teachers and schools). Likewise, in
social science research, if one were to understand why a certain
technology was successfully
implemented in one organization but failed miserably in
another, a researcher looking at the
world through a “rational lens” will look for rational
explanations of the problem such as
inadequate technology or poor fit between technology and the
task context where it is being
utilized, while another research looking at the same problem
through a “social lens” may seek
out social deficiencies such as inadequate user training or lack
of management support, while
those seeing it through a “political lens” will look for instances
of organizational politics that
may subvert the technology implementation process. Hence,
subconscious paradigms often
constrain the concepts that researchers attempt to measure, their
observations, and their
subsequent interpretations of a phenomenon. However, given
the complex nature of social
phenomenon, it is possible that all of the above paradigms are
partially correct, and that a fuller
understanding of the problem may require an understanding and
application of multiple
paradigms.
Two popular paradigms today among social science researchers
are positivism and
61. post-positivism. Positivism, based on the works of French
philosopher Auguste Comte (1798-
1857), was the dominant scientific paradigm until the mid-20th
century. It holds that science or
knowledge creation should be restricted to what can be observed
and measured. Positivism
tends to rely exclusively on theories that can be directly tested.
Though positivism was
originally an attempt to separate scientific inquiry from religion
(where the precepts could not
be objectively observed), positivism led to empiricism or a
blind faith in observed data and a
rejection of any attempt to extend or reason beyond observable
facts. Since human thoughts
and emotions could not be directly measured, there were not
considered to be legitimate topics
for scientific research. Frustrations with the strictly empirical
nature of positivist philosophy
led to the development of post-positivism (or postmodernism)
during the mid-late 20th
century. Post-positivism argues that one can make reasonable
inferences about a phenomenon
by combining empirical observations with logical reasoning.
Post-positivists view science as
not certain but probabilistic (i.e., based on many contingencies),
and often seek to explore these
contingencies to understand social reality better. The post-
positivist camp has further
fragmented into subjectivists, who view the world as a
subjective construction of our subjective
minds rather than as an objective reality, and critical realists,
who believe that there is an
external reality that is independent of a person’s thinking but
we can never know such reality
with any degree of certainty.
62. Burrell and Morgan (1979), in their seminal book Sociological
Paradigms and
Organizational Analysis, suggested that the way social science
researchers view and study social
phenomena is shaped by two fundamental sets of philosophical
assumptions: ontology and
epistemology. Ontology refers to our assumptions about how
we see the world, e.g., does the
world consist mostly of social order or constant change.
Epistemology refers to our
assumptions about the best way to study the world, e.g., should
we use an objective or
subjective approach to study social reality. Using these two
sets of assumptions, we can
categorize social science research as belonging to one of four
categories (see Figure 3.1).
If researchers view the world as consisting mostly of social
order (ontology) and hence
seek to study patterns of ordered events or behaviors, and
believe that the best way to study
such a world is using objective approach (epistemology) that is
independent of the person
conducting the observation or interpretation, such as by using
standardized data collection
T h e R e s e a r c h P r o c e s s | 19
tools like surveys, then they are adopting a paradigm of
functionalism. However, if they
believe that the best way to study social order is though the
subjective interpretation of
63. participants involved, such as by interviewing different
participants and reconciling differences
among their responses using their own subjective perspectives,
then they are employing an
interpretivism paradigm. If researchers believe that the world
consists of radical change and
seek to understand or enact change using an objectivist
approach, then they are employing a
radical structuralism paradigm. If they wish to understand
social change using the subjective
perspectives of the participants involved, then they are
following a radical humanism
paradigm.
Figure 3.1. Four paradigms of social science research
(Source: Burrell and Morgan, 1979)
To date, the majority of social science research has emulated
the natural sciences, and
followed the functionalist paradigm. Functionalists believe that
social order or patterns can be
understood in terms of their functional components, and
therefore attempt to break down a
problem into small components and studying one or more
components in detail using
objectivist techniques such as surveys and experimental
research. However, with the
emergence of post-positivist thinking, a small but growing
number of social science researchers
are attempting to understand social order using subjectivist
techniques such as interviews and
ethnographic studies. Radical humanism and radical
structuralism continues to represent a
64. negligible proportion of social science research, because
scientists are primarily concerned with
understanding generalizable patterns of behavior, events, or
phenomena, rather than
idiosyncratic or changing events. Nevertheless, if you wish to
study social change, such as why
democratic movements are increasingly emerging in Middle
Eastern countries, or why this
movement was successful in Tunisia, took a longer path to
success in Libya, and is still not
successful in Syria, then perhaps radical humanism is the right
approach for such a study.
Social and organizational phenomena generally consists
elements of both order and change.
For instance, organizational success depends on formalized
business processes, work
procedures, and job responsibilities, while being simultaneously
constrained by a constantly
changing mix of competitors, competing products, suppliers,
and customer base in the business
environment. Hence, a holistic and more complete
understanding of social phenomena such as
why are some organizations more successful than others, require
an appreciation and
application of a multi-paradigmatic approach to research.
20 | S o c i a l S c i e n c e R e s e a r c h
Overview of the Research Process
So how do our mental paradigms shape social science research?
At its core, all scientific
65. research is an iterative process of observation, rationalization,
and validation. In the
observation phase, we observe a natural or social phenomenon,
event, or behavior that
interests us. In the rationalization phase, we try to make sense
of or the observed
phenomenon, event, or behavior by logically connecting the
different pieces of the puzzle that
we observe, which in some cases, may lead to the construction
of a theory. Finally, in the
validation phase, we test our theories using a scientific method
through a process of data
collection and analysis, and in doing so, possibly modify or
extend our initial theory. However,
research designs vary based on whether the researcher starts at
observation and attempts to
rationalize the observations (inductive research), or whether the
researcher starts at an ex ante
rationalization or a theory and attempts to validate the theory
(deductive research). Hence, the
observation-rationalization-validation cycle is very similar to
the induction-deduction cycle of
research discussed in Chapter 1.
Most traditional research tends to be deductive and
functionalistic in nature. Figure 3.2
provides a schematic view of such a research project. This
figure depicts a series of activities to
be performed in functionalist research, categorized into three
phases: exploration, research
design, and research execution. Note that this generalized
design is not a roadmap or flowchart
for all research. It applies only to functionalistic research, and
it can and should be modified to
fit the needs of a specific project.
66. Figure 3.2. Functionalistic research process
The first phase of research is exploration. This phase includes
exploring and selecting
research questions for further investigation, examining the
published literature in the area of
inquiry to understand the current state of knowledge in that
area, and identifying theories that
may help answer the research questions of interest.
T h e R e s e a r c h P r o c e s s | 21
The first step in the exploration phase is identifying one or
more research questions
dealing with a specific behavior, event, or phenomena of
interest. Research questions are
specific questions about a behavior, event, or phenomena of
interest that you wish to seek
answers for in your research. Examples include what factors
motivate consumers to purchase
goods and services online without knowing the vendors of these
goods or services, how can we
make high school students more creative, and why do some
people commit terrorist acts.
Research questions can delve into issues of what, why, how,
when, and so forth. More
interesting research questions are those that appeal to a broader
population (e.g., “how can
firms innovate” is a more interesting research question than
67. “how can Chinese firms innovate in
the service-sector”), address real and complex problems (in
contrast to hypothetical or “toy”
problems), and where the answers are not obvious. Narrowly
focused research questions
(often with a binary yes/no answer) tend to be less useful and
less interesting and less suited to
capturing the subtle nuances of social phenomena.
Uninteresting research questions generally
lead to uninteresting and unpublishable research findings.
The next step is to conduct a literature review of the domain of
interest. The purpose
of a literature review is three-fold: (1) to survey the current
state of knowledge in the area of
inquiry, (2) to identify key authors, articles, theories, and
findings in that area, and (3) to
identify gaps in knowledge in that research area. Literature
review is commonly done today
using computerized keyword searches in online databases.
Keywords can be combined using
“and” and “or” operations to narrow down or expand the search
results. Once a shortlist of
relevant articles is generated from the keyword search, the
researcher must then manually
browse through each article, or at least its abstract section, to
determine the suitability of that
article for a detailed review. Literature reviews should be
reasonably complete, and not
restricted to a few journals, a few years, or a specific
methodology. Reviewed articles may be
summarized in the form of tables, and can be further structured
using organizing frameworks
such as a concept matrix. A well-conducted literature review
should indicate whether the initial
research questions have already been addressed in the literature
68. (which would obviate the
need to study them again), whether there are newer or more
interesting research questions
available, and whether the original research questions should be
modified or changed in light of
findings of the literature review. The review can also provide
some intuitions or potential
answers to the questions of interest and/or help identify theories
that have previously been
used to address similar questions.
Since functionalist (deductive) research involves theory-testing,
the third step is to
identify one or more theories can help address the desired
research questions. While the
literature review may uncover a wide range of concepts or
constructs potentially related to the
phenomenon of interest, a theory will help identify which of
these constructs is logically
relevant to the target phenomenon and how. Forgoing theories
may result in measuring a wide
range of less relevant, marginally relevant, or irrelevant
constructs, while also minimizing the
chances of obtaining results that are meaningful and not by pure
chance. In functionalist
research, theories can be used as the logical basis for
postulating hypotheses for empirical
testing. Obviously, not all theories are well-suited for studying
all social phenomena. Theories
must be carefully selected based on their fit with the target
problem and the extent to which
their assumptions are consistent with that of the target problem.
We will examine theories and
the process of theorizing in detail in the next chapter.
The next phase in the research process is research design. This
69. process is concerned
with creating a blueprint of the activities to take in order to
satisfactorily answer the research
22 | S o c i a l S c i e n c e R e s e a r c h
questions identified in the exploration phase. This includes
selecting a research method,
operationalizing constructs of interest, and devising an
appropriate sampling strategy.
Operationalization is the process of designing precise measures
for abstract
theoretical constructs. This is a major problem in social science
research, given that many of
the constructs, such as prejudice, alienation, and liberalism are
hard to define, let alone
measure accurately. Operationalization starts with specifying
an “operational definition” (or
“conceptualization”) of the constructs of interest. Next, the
researcher can search the literature
to see if there are existing prevalidated measures matching their
operational definition that can
be used directly or modified to measure their constructs of
interest. If such measures are not
available or if existing measures are poor or reflect a different
conceptualization than that
intended by the researcher, new instruments may have to be
designed for measuring those
constructs. This means specifying exactly how exactly the
desired construct will be measured
(e.g., how many items, what items, and so forth). This can
70. easily be a long and laborious
process, with multiple rounds of pretests and modifications
before the newly designed
instrument can be accepted as “scientifically valid.” We will
discuss operationalization of
constructs in a future chapter on measurement.
Simultaneously with operationalization, the researcher must
also decide what research
method they wish to employ for collecting data to address their
research questions of interest.
Such methods may include quantitative methods such as
experiments or survey research or
qualitative methods such as case research or action research, or
possibly a combination of both.
If an experiment is desired, then what is the experimental
design? If survey, do you plan a mail
survey, telephone survey, web survey, or a combination? For
complex, uncertain, and multi-
faceted social phenomena, multi-method approaches may be
more suitable, which may help
leverage the unique strengths of each research method and
generate insights that may not be
obtained using a single method.
Researchers must also carefully choose the target population
from which they wish to
collect data, and a sampling strategy to select a sample from
that population. For instance,
should they survey individuals or firms or workgroups within
firms? What types of individuals
or firms they wish to target? Sampling strategy is closely
related to the unit of analysis in a
research problem. While selecting a sample, reasonable care
should be taken to avoid a biased
sample (e.g., sample based on convenience) that may generate
71. biased observations. Sampling is
covered in depth in a later chapter.
At this stage, it is often a good idea to write a research proposal
detailing all of the
decisions made in the preceding stages of the research process
and the rationale behind each
decision. This multi-part proposal should address what research
questions you wish to study
and why, the prior state of knowledge in this area, theories you
wish to employ along with
hypotheses to be tested, how to measure constructs, what
research method to be employed and
why, and desired sampling strategy. Funding agencies typically
require such a proposal in
order to select the best proposals for funding. Even if funding
is not sought for a research
project, a proposal may serve as a useful vehicle for seeking
feedback from other researchers
and identifying potential problems with the research project
(e.g., whether some important
constructs were missing from the study) before starting data
collection. This initial feedback is
invaluable because it is often too late to correct critical
problems after data is collected in a
research study.
T h e R e s e a r c h P r o c e s s | 23
Having decided who to study (subjects), what to measure
(concepts), and how to collect
data (research method), the researcher is now ready to proceed
72. to the research execution
phase. This includes pilot testing the measurement instruments,
data collection, and data
analysis.
Pilot testing is an often overlooked but extremely important part
of the research
process. It helps detect potential problems in your research
design and/or instrumentation
(e.g., whether the questions asked is intelligible to the targeted
sample), and to ensure that the
measurement instruments used in the study are reliable and
valid measures of the constructs of
interest. The pilot sample is usually a small subset of the target
population. After a successful
pilot testing, the researcher may then proceed with data
collection using the sampled
population. The data collected may be quantitative or
qualitative, depending on the research
method employed.
Following data collection, the data is analyzed and interpreted
for the purpose of
drawing conclusions regarding the research questions of
interest. Depending on the type of
data collected (quantitative or qualitative), data analysis may be
quantitative (e.g., employ
statistical techniques such as regression or structural equation
modeling) or qualitative (e.g.,
coding or content analysis).
The final phase of research involves preparing the final research
report documenting
the entire research process and its findings in the form of a
research paper, dissertation, or
monograph. This report should outline in detail all the choices
73. made during the research
process (e.g., theory used, constructs selected, measures used,
research methods, sampling, etc.)
and why, as well as the outcomes of each phase of the research
process. The research process
must be described in sufficient detail so as to allow other
researchers to replicate your study,
test the findings, or assess whether the inferences derived are
scientifically acceptable. Of
course, having a ready research proposal will greatly simplify
and quicken the process of
writing the finished report. Note that research is of no value
unless the research process and
outcomes are documented for future generations; such
documentation is essential for the
incremental progress of science.
Common Mistakes in Research
The research process is fraught with problems and pitfalls, and
novice researchers often
find, after investing substantial amounts of time and effort into
a research project, that their
research questions were not sufficiently answered, or that the
findings were not interesting
enough, or that the research was not of “acceptable” scientific
quality. Such problems typically
result in research papers being rejected by journals. Some of
the more frequent mistakes are
described below.
Insufficiently motivated research questions. Often times, we
choose our “pet”
problems that are interesting to us but not to the scientific
community at large, i.e., it does not
generate new knowledge or insight about the phenomenon being