This document discusses data collection methods, including secondary and primary data. Secondary data refers to data that has already been collected for other purposes, and can help identify problems, define research questions, and interpret primary data. However, secondary data may not be directly relevant or accurate for the current research problem. Primary data is originally collected by the researcher specifically for the research problem and can be qualitative or quantitative. Common primary data collection methods include surveys, interviews, and observations. Surveys are a widely used quantitative method that involve distributing questionnaires via mail, email, telephone or online. They have advantages of being low-cost and allowing large samples, but suffer from low response rates.
Research Methodology: Data collection and processing MethodsSajad Ahmad Rather
The task of data collection begins after a research problem has been defined and research design/plan chalked out.
The term processing refers to the searching for patterns of relationship that exist among data-groups.
Processing
Formulation of Research problem
What is research problem?
A research problem is a specific issue, difficulty, contradiction, or gap in knowledge that we will aim to address in our research.
In other words, A research problem can be any question that we want to answer and any assumption or assertion that we want to challenge or investigate.
The formulation of a research problem is the most crucial part of the research journey as the quality and relevance of a research project entirely depends upon it.
The process of formulating a research problem consists of a number of steps. These are:
Step 1: Identify a broad field or subject area of interest.
Step 2: Dissect the broad areas into subareas
Step 3: Select what is of most interest to us.
Step 4: Raise research questions
Step 5: Formulate objectives
Step 6: Assess our objectives
Step 7: Double-check
Dear viewers Check Out my other piece of works at___ https://healthkura.com
Data Collection (Methods/ Tools/ Techniques), Primary & Secondary Data, Assessment of Qualitative Data, Qualitative & Quantitative Data, Data Processing
Presentation Contents:
- Introduction to data
- Classification of data
- Collection of data
- Methods of data collection
- Assessment of qualitative data
- Processing of data
- Editing
- Coding
- Tabulation
- Graphical representation
If anyone is really interested about research related topics particularly on data collection, this presentation will be the best reference.
For Further Reading
- Biostatistics by Prem P. Panta
- Fundamentals of Research Methodology and Statistics by Yogesh k. Singh
- Research Design by J. W. Creswell
- Internet
Different Methods of Collection of DataP. Veeresha
Data collection is a term used to describe a process of preparing and collecting data.
Data are the basic inputs to any decision making process in any fields like education, business, industries…. etc
The primary data are those which are collected afresh and for the first time, and thus happen to be original in character. It is real time data and which are collected by the researcher himself.
Secondary data means data that are already available i.e., they refer to the data which have already been collected and analyzed by someone else.
Research Methodology: Data collection and processing MethodsSajad Ahmad Rather
The task of data collection begins after a research problem has been defined and research design/plan chalked out.
The term processing refers to the searching for patterns of relationship that exist among data-groups.
Processing
Formulation of Research problem
What is research problem?
A research problem is a specific issue, difficulty, contradiction, or gap in knowledge that we will aim to address in our research.
In other words, A research problem can be any question that we want to answer and any assumption or assertion that we want to challenge or investigate.
The formulation of a research problem is the most crucial part of the research journey as the quality and relevance of a research project entirely depends upon it.
The process of formulating a research problem consists of a number of steps. These are:
Step 1: Identify a broad field or subject area of interest.
Step 2: Dissect the broad areas into subareas
Step 3: Select what is of most interest to us.
Step 4: Raise research questions
Step 5: Formulate objectives
Step 6: Assess our objectives
Step 7: Double-check
Dear viewers Check Out my other piece of works at___ https://healthkura.com
Data Collection (Methods/ Tools/ Techniques), Primary & Secondary Data, Assessment of Qualitative Data, Qualitative & Quantitative Data, Data Processing
Presentation Contents:
- Introduction to data
- Classification of data
- Collection of data
- Methods of data collection
- Assessment of qualitative data
- Processing of data
- Editing
- Coding
- Tabulation
- Graphical representation
If anyone is really interested about research related topics particularly on data collection, this presentation will be the best reference.
For Further Reading
- Biostatistics by Prem P. Panta
- Fundamentals of Research Methodology and Statistics by Yogesh k. Singh
- Research Design by J. W. Creswell
- Internet
Different Methods of Collection of DataP. Veeresha
Data collection is a term used to describe a process of preparing and collecting data.
Data are the basic inputs to any decision making process in any fields like education, business, industries…. etc
The primary data are those which are collected afresh and for the first time, and thus happen to be original in character. It is real time data and which are collected by the researcher himself.
Secondary data means data that are already available i.e., they refer to the data which have already been collected and analyzed by someone else.
Tools and techniques for data collection.pptxJuruJackline
These the tools and techniques used for data collection when carrying out community diagnosis in public health setting.
The slides looked into details the various tools and how they can be used in the data collection depending on the type of data you would like to collect.
Weakness and strength of Primary and secondary dataMfaume
Diagnosis is a critical process that involves data collection, interpretation and identification of problem area. Critically discuss the method of data collection and provide their strength and weakness in diagnosis process.
This presentation covers introduction,meaning,definition,characteristics,objectives,advantages,limitations,essential conditions for an effective system & methods of standard costing.
This presentation covers meaning,definiton,characteristics & types of enrepreneur & meaning of entrepreneurship,its dimensions,classification of corporate entrepreneurship & factors affecting development of entrepreneurship
This presentation covers factors affecting elasticity of demand, degree of elasticity, different types of elasticity such as total outlay method, point method and percentage method.
Levelwise PageRank with Loop-Based Dead End Handling Strategy : SHORT REPORT ...Subhajit Sahu
Abstract — Levelwise PageRank is an alternative method of PageRank computation which decomposes the input graph into a directed acyclic block-graph of strongly connected components, and processes them in topological order, one level at a time. This enables calculation for ranks in a distributed fashion without per-iteration communication, unlike the standard method where all vertices are processed in each iteration. It however comes with a precondition of the absence of dead ends in the input graph. Here, the native non-distributed performance of Levelwise PageRank was compared against Monolithic PageRank on a CPU as well as a GPU. To ensure a fair comparison, Monolithic PageRank was also performed on a graph where vertices were split by components. Results indicate that Levelwise PageRank is about as fast as Monolithic PageRank on the CPU, but quite a bit slower on the GPU. Slowdown on the GPU is likely caused by a large submission of small workloads, and expected to be non-issue when the computation is performed on massive graphs.
Adjusting primitives for graph : SHORT REPORT / NOTESSubhajit Sahu
Graph algorithms, like PageRank Compressed Sparse Row (CSR) is an adjacency-list based graph representation that is
Multiply with different modes (map)
1. Performance of sequential execution based vs OpenMP based vector multiply.
2. Comparing various launch configs for CUDA based vector multiply.
Sum with different storage types (reduce)
1. Performance of vector element sum using float vs bfloat16 as the storage type.
Sum with different modes (reduce)
1. Performance of sequential execution based vs OpenMP based vector element sum.
2. Performance of memcpy vs in-place based CUDA based vector element sum.
3. Comparing various launch configs for CUDA based vector element sum (memcpy).
4. Comparing various launch configs for CUDA based vector element sum (in-place).
Sum with in-place strategies of CUDA mode (reduce)
1. Comparing various launch configs for CUDA based vector element sum (in-place).
As Europe's leading economic powerhouse and the fourth-largest hashtag#economy globally, Germany stands at the forefront of innovation and industrial might. Renowned for its precision engineering and high-tech sectors, Germany's economic structure is heavily supported by a robust service industry, accounting for approximately 68% of its GDP. This economic clout and strategic geopolitical stance position Germany as a focal point in the global cyber threat landscape.
In the face of escalating global tensions, particularly those emanating from geopolitical disputes with nations like hashtag#Russia and hashtag#China, hashtag#Germany has witnessed a significant uptick in targeted cyber operations. Our analysis indicates a marked increase in hashtag#cyberattack sophistication aimed at critical infrastructure and key industrial sectors. These attacks range from ransomware campaigns to hashtag#AdvancedPersistentThreats (hashtag#APTs), threatening national security and business integrity.
🔑 Key findings include:
🔍 Increased frequency and complexity of cyber threats.
🔍 Escalation of state-sponsored and criminally motivated cyber operations.
🔍 Active dark web exchanges of malicious tools and tactics.
Our comprehensive report delves into these challenges, using a blend of open-source and proprietary data collection techniques. By monitoring activity on critical networks and analyzing attack patterns, our team provides a detailed overview of the threats facing German entities.
This report aims to equip stakeholders across public and private sectors with the knowledge to enhance their defensive strategies, reduce exposure to cyber risks, and reinforce Germany's resilience against cyber threats.
StarCompliance is a leading firm specializing in the recovery of stolen cryptocurrency. Our comprehensive services are designed to assist individuals and organizations in navigating the complex process of fraud reporting, investigation, and fund recovery. We combine cutting-edge technology with expert legal support to provide a robust solution for victims of crypto theft.
Our Services Include:
Reporting to Tracking Authorities:
We immediately notify all relevant centralized exchanges (CEX), decentralized exchanges (DEX), and wallet providers about the stolen cryptocurrency. This ensures that the stolen assets are flagged as scam transactions, making it impossible for the thief to use them.
Assistance with Filing Police Reports:
We guide you through the process of filing a valid police report. Our support team provides detailed instructions on which police department to contact and helps you complete the necessary paperwork within the critical 72-hour window.
Launching the Refund Process:
Our team of experienced lawyers can initiate lawsuits on your behalf and represent you in various jurisdictions around the world. They work diligently to recover your stolen funds and ensure that justice is served.
At StarCompliance, we understand the urgency and stress involved in dealing with cryptocurrency theft. Our dedicated team works quickly and efficiently to provide you with the support and expertise needed to recover your assets. Trust us to be your partner in navigating the complexities of the crypto world and safeguarding your investments.
Chatty Kathy - UNC Bootcamp Final Project Presentation - Final Version - 5.23...John Andrews
SlideShare Description for "Chatty Kathy - UNC Bootcamp Final Project Presentation"
Title: Chatty Kathy: Enhancing Physical Activity Among Older Adults
Description:
Discover how Chatty Kathy, an innovative project developed at the UNC Bootcamp, aims to tackle the challenge of low physical activity among older adults. Our AI-driven solution uses peer interaction to boost and sustain exercise levels, significantly improving health outcomes. This presentation covers our problem statement, the rationale behind Chatty Kathy, synthetic data and persona creation, model performance metrics, a visual demonstration of the project, and potential future developments. Join us for an insightful Q&A session to explore the potential of this groundbreaking project.
Project Team: Jay Requarth, Jana Avery, John Andrews, Dr. Dick Davis II, Nee Buntoum, Nam Yeongjin & Mat Nicholas
1. Pooja Luniya- G.D Rungta College of science & Technology, Bhilai.
(Asst. Prof.)
BBA V th Sem. Marketing Research
Topic: Data Collection Methods
2. Data Collection Methods
DATA SOURCES
SECONDARY METHODSPRIMARY METHODS
INTERNAL EXTERNAL
Fully
Processed
Need Further
Analysis
Syndicated
Sources
Electronic
Database
Published
2 Pooja luniya (Asst. Prof)
3. Secondary Data
Data that has already been collected for purposes other than the problem at
hand
• Advantages
- Identify the problem
- Better define the problem
- Develop an approach to the problem
- Formulate an appropriate design
- Answer certain research question and test some hypothesis
- Interpret primary data more significantly
• Disadvantages
- Usefulness to current problem may be limited in several important
ways, including relevance and accuracy
- The objectives, nature, and methods used to collected secondary
data may not be appropriate to the present situation
3 Pooja luniya (Asst. Prof)
4. Uses of secondary Data
Problem identification and formulation stage
Hypotheses designing
Sampling considerations
Primary base
Validation and authentication board
4 Pooja luniya (Asst. Prof)
5. Internal & External Data sources
INTERNAL
Company records
Employee records
Sales data
Other sources
EXTERNAL
Published data
Government Sources
Other Sources
5 Pooja luniya (Asst. Prof)
6. Primary Data
It is originated by the researcher for the specific purpose of addressing the problem at hand
Can be qualitative or quantitative in nature
Advantages
- It is pertinent to the problem at hand
- It is useful to get to a conclusive decision
Disadvantages
- Costly to obtain
- Time required to collect primary data is very large
- Difficult to get true responses from the respondents
- Largely based on the perception of the researcher
Methods
Surveys and Experiments
Interviews and Observation Studies
Other Methods –Warranty Cards, Distributor audits, pantry audits, consumer panels, using
mechanical devices, through projective techniques, depth interviews, content analysis
6 Pooja luniya (Asst. Prof)
7. Survey Methods
Basics
• Collection of data through
questionnaires and schedule14
• Very popular and widely used
method of gathering data
• Particularly used with quantitative
research
• Questionnaire is sent to
respondents by mail, e-mail, or
posted on Internet with
invitation to respondents for filling
the questionnaire
• Very widely employed in various
economic and business surveys
7 Pooja luniya (Asst. Prof)
9. Advantages & Disadvantages of Survey method
Advantages
• Economical method even for large geographic spread
• Free from interviewer bias
• Provides adequate time to respondents for answering
• Can reach even difficult to approach respondents
• Large samples can be made use of
• Results can be made more generalizable and reliable
Disadvantages
• Suffers from poor response rate
• Used only when respondents are educated and cooperative
• Control over questionnaires may be lost once it is sent
• Inflexible as questionnaires once sent cannot be amended
• Missing data / response is common
• True response is questionable
• Likely to be slowest of all?
9 Pooja luniya (Asst. Prof)
10. Survey Methods
Schedules
Schedules are filled in by the enumerators21
Specially appointed for the purpose rather than by the respondents
Enumerators may guide the respondents to fill the questionnaires
Very useful in extensive enquiries and can lead to fairly reliable results
Usually adopted by governmental agencies or by some big organizations
E.g., Population Census surveys
Questionnaires
This is the simplest and most often used method of primary data
collection.
There is a pre-determined set of questions in a sequential format.
Is designed to suit the respondent’s understanding and language command.
Can be conducted to collect useful data from a large population in a short
duration of time
10 Pooja luniya (Asst. Prof)
11. Comparison
Questionnaire Schedule
Administration Without assistance from the sender Without assistance from the
sender
Cost Relatively cheap and economical Expensive as field staff is to be
recruited
Response rate Low due to non-response Low due to non-response
Time Slow Well in Time
Contact Impersonal Personal
Respondent ability Must be literate & Cooperative Can be Illiterate
Distribution Wider and More Representative Not suited for wide distribution
Information risk Incomplete and Missing
Information
Generally Complete & Accurate
Research Success Lies in Quality of Questionnaire Depends upon Honesty and
Competency of Enumerator
Layout Must be attractive Not Required
11 Pooja luniya (Asst. Prof)