SlideShare a Scribd company logo
1 of 19
APPROACHES TO
QUALITATIVE DATA ANALYSIS
© LOUIS COHEN, LAWRENCE
MANION & KEITH MORRISON
STRUCTURE OF THE CHAPTER
• Data analysis, thick description and reflexivity
• Ethics in qualitative data analysis
• Computer assisted qualitative data analysis
(CAQDAS)
QUALITATIVE DATA
• There is no one single or correct way to analyze
and present qualitative data
– Abide by fitness for purpose.
• Qualitative data analysis is often heavy on
interpretation, with multiple interpretations
possible.
• Data analysis and interpretation may often merge.
• Data analysis often commences early.
• Results of the analysis also constitute data for
further analysis.
 
TO TRANSCRIBE OR NOT TO
TRANSCRIBE INTERVIEWS
• Transcriptions can provide important detail
and an accurate verbatim record of the
interview.
• Transcriptions may omit non-verbal aspects,
and contextual features of the interview.
Transcriptions are very time consuming to
prepare.
• Transcriptions must clarify conventions used.
DATA ANALYSIS, THICK
DESCRIPTION AND REFLEXIVITY
• Fitness for purpose:
– To describe;
– To portray;
– to summarize;
– to interpret;
– to discover patterns;
– to generate themes;
– to understand individuals and idiographic
features;
– to understand groups and nomothetic features.
DATA ANALYSIS, THICK
DESCRIPTION AND REFLEXIVITY
• Fitness for purpose:
– to raise issues;
– to prove or demonstrate;
– to explain and seek causality;
– to explore;
– to test;
– to discover commonalities, differences and
similarities;
– to examine the application and operation of
the same issues in different contexts.
QUALITATIVE DATA ANALYSIS
• The movement is from description to
explanation and theory generation.
• Problems of data overload: data reduction and
display become important.
• Double hermeneutic: the researcher interprets
and already-interpreted world.
• The researcher is part of the world that is being
interpreted, therefore reflexivity is required.
• Subjectivity is inescapable.
• The researcher’s own memory may be fallible,
selective and over-interpreting a situation.
QUALITATIVE DATA ANALYSIS
• Use a range of data and to ensure that these
data include the views of other participants in a
situation.
• Address reflexivity.
• The analysis becomes data in itself, for further
analysis (e.g. for reflexivity).
RESPONDENT VALIDATION
• Respondent validation may be problematic as participants:
– May change their minds as to what they wished to say,
or meant, or meant to say but did not say, or wished to
have included or made public;
– May have faulty memories and recall events over-
selectively, or incorrectly, or not at all;
– May disagree with the researcher’s interpretations;
– May wish to withdraw comments made in light of
subsequent events in their lives;
– May have said what they said in the heat of the moment
or because of peer pressure or authority pressure;
– May feel embarrassed by, or nervous about, what they
said.
ETHICS IN QUALITATIVE DATA
ANALYSIS
• Identifiability, confidentiality and privacy of
individuals
• Non-maleficence, loyalties (and to whom),
and beneficence
COMPUTER ASSISTED QUALITATIVE
DATA ANALYSIS (CAQDAS)
• To make notes
• To transcribe field notes and audio data
• To manage and store data in an ordered and
organized way
• For search and retrieval of text, data and categories
• To edit, extend or revise field notes
• To code and arrange codes into hierarchies (trees)
and nodes (key codes)
• To conduct content analysis
• To store and check data
• To collate, segment and copy data
COMPUTER ASSISTED QUALITATIVE
DATA ANALYSIS (CAQDAS)
• To enable memoing, with details of the
circumstances in which the memos were written
• To attach identification labels to units of text
• To annotate and append text
• To partition data into units
• To sort, re-sort, collate, classify and reclassify pieces
of data to facilitate constant comparison and to refine
schemas of classification
• To assemble, re-assemble, recall data into
categories
• To display data in different ways
COMPUTER ASSISTED QUALITATIVE
DATA ANALYSIS (CAQDAS)
• To cross-check data to see if they can be coded
into more than one category, enabling linkages
between categories and data to be found
• To establish the incidence of data that are
contained in more than one category
• To search for pieces of data which appear in a
certain sequence
• To filter, assemble and relate data according to
preferred criteria
• To establish linkages between coding categories
COMPUTER ASSISTED QUALITATIVE
DATA ANALYSIS (CAQDAS)
• To display relationships of categories
• To draw and verify conclusions and hypotheses
• To quote data in the final report
• To generate and test theory
• To communicate with other researchers or
participants
TYPES OF CAQDAS SOFTWARE
• Those that act as word processors
• Those that code and retrieve text
• Those that manage text
• Those that enable theory building
• Those that enable conceptual networks to be
plotted and visualized
• Those that work with text only
• Those that work with images, video and sound
SOFTWARE FUNCTIONS
• Search for and return text, codes, nodes and
categories;
• Search for specific terms and codes, singly or
in combination;
• Filter text;
• Return counts;
• Present the grouped data according to the
selection criterion desired, both within and
across texts;
SOFTWARE FUNCTIONS
• Perform the qualitative equivalent of statistical
analyzes, such as:
─ Boolean searches
─ Proximity searches
─ Restrictions, trees, crosstabs
• Construct dendrograms of related nodes and
codes;
• Present data in sequences and locate the text
in surrounding material in order to provide the
necessary context;
SOFTWARE FUNCTIONS
• Locate and return similar passages of text;
• Look for negative cases;
• Look for terms in context (lexical searching);
• Select text on combined criteria;
• Enable analyzes of similarities, differences
and relationships between texts and passages
of text;
• Annotate text and enable memos to be written
about text.
CONCERNS ABOUT CAQDAS
• Researchers may feel distanced from their data
• Software is too strongly linked to grounded theory
rather than other forms of qualitative data analysis
• Software is best suited to data which require coding
and categorization for developing grounded theory
• Too heavy a focus on coding and retrieving
• Removes data from context
• The software drives the analysis rather than vice
versa
• Relegates the real task of hermeneutic understanding

More Related Content

What's hot

Introduction of search databases
Introduction of search databases Introduction of search databases
Introduction of search databases Youssef2000
 
Content analysis
Content analysisContent analysis
Content analysisAtul Thakur
 
Methodology & Content analysis
Methodology & Content analysisMethodology & Content analysis
Methodology & Content analysisFlorence Paisey
 
Sustainable agriculture library orientation 2022
Sustainable agriculture library orientation 2022Sustainable agriculture library orientation 2022
Sustainable agriculture library orientation 2022Elizabeth Moll-Willard
 
Information searching & retrieving techniques khalid
Information searching & retrieving techniques khalidInformation searching & retrieving techniques khalid
Information searching & retrieving techniques khalidKhalid Mahmood
 
Literature search PPT Dr Mathew Joseph
Literature search PPT Dr Mathew JosephLiterature search PPT Dr Mathew Joseph
Literature search PPT Dr Mathew JosephMathew Joseph
 
Tips for searching for information
Tips for searching for informationTips for searching for information
Tips for searching for informationKatie Wiese
 
Shrinking the Haystack" using Solr and OpenNLP
Shrinking the Haystack" using Solr and OpenNLPShrinking the Haystack" using Solr and OpenNLP
Shrinking the Haystack" using Solr and OpenNLPlucenerevolution
 
Database searching b&h
Database searching   b&hDatabase searching   b&h
Database searching b&hwendy0315
 
 Creating Effective Research Assignments: Bridging the Gap Between Students ...
	Creating Effective Research Assignments: Bridging the Gap Between Students ...	Creating Effective Research Assignments: Bridging the Gap Between Students ...
 Creating Effective Research Assignments: Bridging the Gap Between Students ...Anthony Holderied
 
Data analysis – using computers
Data analysis – using computersData analysis – using computers
Data analysis – using computersNoonapau
 

What's hot (18)

Introduction of search databases
Introduction of search databases Introduction of search databases
Introduction of search databases
 
Content analysis
Content analysisContent analysis
Content analysis
 
Content analysis
Content analysisContent analysis
Content analysis
 
Methodology & Content analysis
Methodology & Content analysisMethodology & Content analysis
Methodology & Content analysis
 
Sustainable agriculture library orientation 2022
Sustainable agriculture library orientation 2022Sustainable agriculture library orientation 2022
Sustainable agriculture library orientation 2022
 
REFRENCING
REFRENCINGREFRENCING
REFRENCING
 
Content analysis
Content analysisContent analysis
Content analysis
 
Content analysis
Content analysisContent analysis
Content analysis
 
Choosing the right journal
Choosing the right journalChoosing the right journal
Choosing the right journal
 
Information searching & retrieving techniques khalid
Information searching & retrieving techniques khalidInformation searching & retrieving techniques khalid
Information searching & retrieving techniques khalid
 
How to do a literature search?
How to do a literature search?How to do a literature search?
How to do a literature search?
 
Literature search PPT Dr Mathew Joseph
Literature search PPT Dr Mathew JosephLiterature search PPT Dr Mathew Joseph
Literature search PPT Dr Mathew Joseph
 
Tips for searching for information
Tips for searching for informationTips for searching for information
Tips for searching for information
 
Shrinking the Haystack" using Solr and OpenNLP
Shrinking the Haystack" using Solr and OpenNLPShrinking the Haystack" using Solr and OpenNLP
Shrinking the Haystack" using Solr and OpenNLP
 
Database searching b&h
Database searching   b&hDatabase searching   b&h
Database searching b&h
 
 Creating Effective Research Assignments: Bridging the Gap Between Students ...
	Creating Effective Research Assignments: Bridging the Gap Between Students ...	Creating Effective Research Assignments: Bridging the Gap Between Students ...
 Creating Effective Research Assignments: Bridging the Gap Between Students ...
 
Researching: PSY4115
Researching: PSY4115Researching: PSY4115
Researching: PSY4115
 
Data analysis – using computers
Data analysis – using computersData analysis – using computers
Data analysis – using computers
 

Similar to Approaches to Qualitative Data Analysis Techniques

Qualitative Analysis- Dr Ryan Thomas Williams
Qualitative Analysis- Dr Ryan Thomas WilliamsQualitative Analysis- Dr Ryan Thomas Williams
Qualitative Analysis- Dr Ryan Thomas WilliamsRyan Williams
 
Analysing_quantitative_data.ppt
Analysing_quantitative_data.pptAnalysing_quantitative_data.ppt
Analysing_quantitative_data.pptteweldemezigebu
 
Analyzing observational data during qualitative research
Analyzing observational data during qualitative researchAnalyzing observational data during qualitative research
Analyzing observational data during qualitative researchWafa Iqbal
 
Analysing qualitative data from information organizations
Analysing qualitative data from information organizationsAnalysing qualitative data from information organizations
Analysing qualitative data from information organizationsAleeza Ahmad
 
Text analysis
Text analysisText analysis
Text analysisshahidzac
 
CONTENT ANALYSIS AND Q-SORT
CONTENT ANALYSIS AND Q-SORTCONTENT ANALYSIS AND Q-SORT
CONTENT ANALYSIS AND Q-SORTANCYBS
 
Data analysis – qualitative data presentation 2
Data analysis – qualitative data   presentation 2Data analysis – qualitative data   presentation 2
Data analysis – qualitative data presentation 2Azura Zaki
 
e3_chapter__5_evaluation_technics_HCeVpPLCvE.ppt
e3_chapter__5_evaluation_technics_HCeVpPLCvE.ppte3_chapter__5_evaluation_technics_HCeVpPLCvE.ppt
e3_chapter__5_evaluation_technics_HCeVpPLCvE.pptappstore15
 
[AIIM17] Data Categorization You Can Live With - Monica Crocker
[AIIM17]  Data Categorization You Can Live With - Monica Crocker [AIIM17]  Data Categorization You Can Live With - Monica Crocker
[AIIM17] Data Categorization You Can Live With - Monica Crocker AIIM International
 
Chapter 4 common features of qualitative data analysis
Chapter 4 common features of qualitative data analysisChapter 4 common features of qualitative data analysis
Chapter 4 common features of qualitative data analysisMohd. Noor Abdul Hamid
 
Grounded theory
Grounded theoryGrounded theory
Grounded theoryAamiruvas
 
615900072
615900072615900072
615900072picktru
 

Similar to Approaches to Qualitative Data Analysis Techniques (20)

Content analysis
Content analysisContent analysis
Content analysis
 
Qualitative Analysis- Dr Ryan Thomas Williams
Qualitative Analysis- Dr Ryan Thomas WilliamsQualitative Analysis- Dr Ryan Thomas Williams
Qualitative Analysis- Dr Ryan Thomas Williams
 
Analysing_quantitative_data.ppt
Analysing_quantitative_data.pptAnalysing_quantitative_data.ppt
Analysing_quantitative_data.ppt
 
Analysing_quantitative_data.ppt
Analysing_quantitative_data.pptAnalysing_quantitative_data.ppt
Analysing_quantitative_data.ppt
 
Analyzing observational data during qualitative research
Analyzing observational data during qualitative researchAnalyzing observational data during qualitative research
Analyzing observational data during qualitative research
 
Analysing qualitative data from information organizations
Analysing qualitative data from information organizationsAnalysing qualitative data from information organizations
Analysing qualitative data from information organizations
 
Text analysis
Text analysisText analysis
Text analysis
 
CONTENT ANALYSIS AND Q-SORT
CONTENT ANALYSIS AND Q-SORTCONTENT ANALYSIS AND Q-SORT
CONTENT ANALYSIS AND Q-SORT
 
Data analysis – qualitative data presentation 2
Data analysis – qualitative data   presentation 2Data analysis – qualitative data   presentation 2
Data analysis – qualitative data presentation 2
 
data analysis.ppt
data analysis.pptdata analysis.ppt
data analysis.ppt
 
data analysis.pptx
data analysis.pptxdata analysis.pptx
data analysis.pptx
 
Chapter Nine Qualitative Methods
Chapter Nine Qualitative MethodsChapter Nine Qualitative Methods
Chapter Nine Qualitative Methods
 
e3_chapter__5_evaluation_technics_HCeVpPLCvE.ppt
e3_chapter__5_evaluation_technics_HCeVpPLCvE.ppte3_chapter__5_evaluation_technics_HCeVpPLCvE.ppt
e3_chapter__5_evaluation_technics_HCeVpPLCvE.ppt
 
LEAD 901 Chapter 8
LEAD 901 Chapter 8LEAD 901 Chapter 8
LEAD 901 Chapter 8
 
[AIIM17] Data Categorization You Can Live With - Monica Crocker
[AIIM17]  Data Categorization You Can Live With - Monica Crocker [AIIM17]  Data Categorization You Can Live With - Monica Crocker
[AIIM17] Data Categorization You Can Live With - Monica Crocker
 
Chapter 4 common features of qualitative data analysis
Chapter 4 common features of qualitative data analysisChapter 4 common features of qualitative data analysis
Chapter 4 common features of qualitative data analysis
 
Grounded theory
Grounded theoryGrounded theory
Grounded theory
 
615900072
615900072615900072
615900072
 
Qualitative data analysis
Qualitative data analysisQualitative data analysis
Qualitative data analysis
 
Grounded theory new
Grounded theory newGrounded theory new
Grounded theory new
 

More from Ying Liu

首尔大韩国语语法Topik考试语法合集 刘赢整理
首尔大韩国语语法Topik考试语法合集 刘赢整理首尔大韩国语语法Topik考试语法合集 刘赢整理
首尔大韩国语语法Topik考试语法合集 刘赢整理Ying Liu
 
Chapter36b
Chapter36bChapter36b
Chapter36bYing Liu
 
Chapter36a
Chapter36aChapter36a
Chapter36aYing Liu
 

More from Ying Liu (20)

首尔大韩国语语法Topik考试语法合集 刘赢整理
首尔大韩国语语法Topik考试语法合集 刘赢整理首尔大韩国语语法Topik考试语法合集 刘赢整理
首尔大韩国语语法Topik考试语法合集 刘赢整理
 
Chapter38
Chapter38Chapter38
Chapter38
 
Chapter36b
Chapter36bChapter36b
Chapter36b
 
Chapter36a
Chapter36aChapter36a
Chapter36a
 
Chapter35
Chapter35Chapter35
Chapter35
 
Chapter34
Chapter34Chapter34
Chapter34
 
Chapter33
Chapter33Chapter33
Chapter33
 
Chapter32
Chapter32Chapter32
Chapter32
 
Chapter31
Chapter31Chapter31
Chapter31
 
Chapter29
Chapter29Chapter29
Chapter29
 
Chapter27
Chapter27Chapter27
Chapter27
 
Chapter26
Chapter26Chapter26
Chapter26
 
Chapter25
Chapter25Chapter25
Chapter25
 
Chapter24
Chapter24Chapter24
Chapter24
 
Chapter23
Chapter23Chapter23
Chapter23
 
Chapter22
Chapter22Chapter22
Chapter22
 
Chapter21
Chapter21Chapter21
Chapter21
 
Chapter20
Chapter20Chapter20
Chapter20
 
Chapter19
Chapter19Chapter19
Chapter19
 
Chapter18
Chapter18Chapter18
Chapter18
 

Recently uploaded

Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 

Recently uploaded (20)

Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 

Approaches to Qualitative Data Analysis Techniques

  • 1. APPROACHES TO QUALITATIVE DATA ANALYSIS © LOUIS COHEN, LAWRENCE MANION & KEITH MORRISON
  • 2. STRUCTURE OF THE CHAPTER • Data analysis, thick description and reflexivity • Ethics in qualitative data analysis • Computer assisted qualitative data analysis (CAQDAS)
  • 3. QUALITATIVE DATA • There is no one single or correct way to analyze and present qualitative data – Abide by fitness for purpose. • Qualitative data analysis is often heavy on interpretation, with multiple interpretations possible. • Data analysis and interpretation may often merge. • Data analysis often commences early. • Results of the analysis also constitute data for further analysis.  
  • 4. TO TRANSCRIBE OR NOT TO TRANSCRIBE INTERVIEWS • Transcriptions can provide important detail and an accurate verbatim record of the interview. • Transcriptions may omit non-verbal aspects, and contextual features of the interview. Transcriptions are very time consuming to prepare. • Transcriptions must clarify conventions used.
  • 5. DATA ANALYSIS, THICK DESCRIPTION AND REFLEXIVITY • Fitness for purpose: – To describe; – To portray; – to summarize; – to interpret; – to discover patterns; – to generate themes; – to understand individuals and idiographic features; – to understand groups and nomothetic features.
  • 6. DATA ANALYSIS, THICK DESCRIPTION AND REFLEXIVITY • Fitness for purpose: – to raise issues; – to prove or demonstrate; – to explain and seek causality; – to explore; – to test; – to discover commonalities, differences and similarities; – to examine the application and operation of the same issues in different contexts.
  • 7. QUALITATIVE DATA ANALYSIS • The movement is from description to explanation and theory generation. • Problems of data overload: data reduction and display become important. • Double hermeneutic: the researcher interprets and already-interpreted world. • The researcher is part of the world that is being interpreted, therefore reflexivity is required. • Subjectivity is inescapable. • The researcher’s own memory may be fallible, selective and over-interpreting a situation.
  • 8. QUALITATIVE DATA ANALYSIS • Use a range of data and to ensure that these data include the views of other participants in a situation. • Address reflexivity. • The analysis becomes data in itself, for further analysis (e.g. for reflexivity).
  • 9. RESPONDENT VALIDATION • Respondent validation may be problematic as participants: – May change their minds as to what they wished to say, or meant, or meant to say but did not say, or wished to have included or made public; – May have faulty memories and recall events over- selectively, or incorrectly, or not at all; – May disagree with the researcher’s interpretations; – May wish to withdraw comments made in light of subsequent events in their lives; – May have said what they said in the heat of the moment or because of peer pressure or authority pressure; – May feel embarrassed by, or nervous about, what they said.
  • 10. ETHICS IN QUALITATIVE DATA ANALYSIS • Identifiability, confidentiality and privacy of individuals • Non-maleficence, loyalties (and to whom), and beneficence
  • 11. COMPUTER ASSISTED QUALITATIVE DATA ANALYSIS (CAQDAS) • To make notes • To transcribe field notes and audio data • To manage and store data in an ordered and organized way • For search and retrieval of text, data and categories • To edit, extend or revise field notes • To code and arrange codes into hierarchies (trees) and nodes (key codes) • To conduct content analysis • To store and check data • To collate, segment and copy data
  • 12. COMPUTER ASSISTED QUALITATIVE DATA ANALYSIS (CAQDAS) • To enable memoing, with details of the circumstances in which the memos were written • To attach identification labels to units of text • To annotate and append text • To partition data into units • To sort, re-sort, collate, classify and reclassify pieces of data to facilitate constant comparison and to refine schemas of classification • To assemble, re-assemble, recall data into categories • To display data in different ways
  • 13. COMPUTER ASSISTED QUALITATIVE DATA ANALYSIS (CAQDAS) • To cross-check data to see if they can be coded into more than one category, enabling linkages between categories and data to be found • To establish the incidence of data that are contained in more than one category • To search for pieces of data which appear in a certain sequence • To filter, assemble and relate data according to preferred criteria • To establish linkages between coding categories
  • 14. COMPUTER ASSISTED QUALITATIVE DATA ANALYSIS (CAQDAS) • To display relationships of categories • To draw and verify conclusions and hypotheses • To quote data in the final report • To generate and test theory • To communicate with other researchers or participants
  • 15. TYPES OF CAQDAS SOFTWARE • Those that act as word processors • Those that code and retrieve text • Those that manage text • Those that enable theory building • Those that enable conceptual networks to be plotted and visualized • Those that work with text only • Those that work with images, video and sound
  • 16. SOFTWARE FUNCTIONS • Search for and return text, codes, nodes and categories; • Search for specific terms and codes, singly or in combination; • Filter text; • Return counts; • Present the grouped data according to the selection criterion desired, both within and across texts;
  • 17. SOFTWARE FUNCTIONS • Perform the qualitative equivalent of statistical analyzes, such as: ─ Boolean searches ─ Proximity searches ─ Restrictions, trees, crosstabs • Construct dendrograms of related nodes and codes; • Present data in sequences and locate the text in surrounding material in order to provide the necessary context;
  • 18. SOFTWARE FUNCTIONS • Locate and return similar passages of text; • Look for negative cases; • Look for terms in context (lexical searching); • Select text on combined criteria; • Enable analyzes of similarities, differences and relationships between texts and passages of text; • Annotate text and enable memos to be written about text.
  • 19. CONCERNS ABOUT CAQDAS • Researchers may feel distanced from their data • Software is too strongly linked to grounded theory rather than other forms of qualitative data analysis • Software is best suited to data which require coding and categorization for developing grounded theory • Too heavy a focus on coding and retrieving • Removes data from context • The software drives the analysis rather than vice versa • Relegates the real task of hermeneutic understanding