SlideShare a Scribd company logo
Chinese Censorship, at Home,
          Abroad
      A Continuation or a Break in a new
                  country?

 Daniel Murray
 Róisín Tangney
 Betty Maguire
 Justin Ahern
Introduction
Daniel Murray
Introduction
• A gap in the study of Chinese immigrants in
  Ireland: censorship
• Few countries as thorough in its censorship as
  China.
• ‘The Great Firewall’
• Wide range of topics taboo
• Censorship leading to self-censorship
Public Security Bureau mascots
Google incident
• Google versus Chinese government earlier this
  year over refusal to censor further.
• Principled or trouble-making? Opinions of
  Chinese servers differ.
Research Question

• Do Chinese in Ireland take advantage of non-
   censored internet to access information denied
   to them at home?
(a) What kind of sites do they access in Ireland?
(b) Which Internet sources do they find to be more
reliable - Irish or Chinese?
(c) Does their use of Internet in Ireland influence
their attitude towards censorship at home?
Target Group

• Chinese students in Ireland, as they would
  have experiences with both China and Ireland.
• Chinese community in Ireland since 1950s but
  many would have limited contact with China.
Literature
 Review
Róisín Tangney
• OpenNet Initiative. (2009, June 15). Internet
  Filtering in China. Retrieved November 14,
  2010, from OpenNet:
  http://opennet.net/sites/opennet.net/files/O
  NI_China_2009.pdf
Internet use in China
• 420 million internet users

• 162 million blogs

• 30 million daily Kaixin users

• 583.5 million mobile phone subscribers
What’s Blocked?
What’s Censored?
Taiwan, Tibet, Tiananmen
North Korea
Falun Gong
Religion
Pornography
News Stories
Do they want more information?

• Anti-CNN movement following clashes in Tibet
  in 2008

• Race traitors targeted

• Google controversy

                       BUT …
Online discussion forums suggest many
Chinese people want to end Internet censorship.
Chinese Community in Ireland

Wang, Y. Y., & King-O'Riain, R. C. (2006). Chinese
Students in Ireland. National University of
Ireland, Maynooth, Dept. of Sociology. National
Consultative Committee on Racism and
Interculturalism.
Profile Study
• 30,000 Chinese people living in Ireland
• 3,000 3rd level Students
Co-Ethnic Researcher – Why?
•   Relates to target population
•   Body Language/Cultural differences
•   Communication
•   Comprehension
•   Participants’ rights
•   Recruitment
• “Most of the interviewees do not use the Irish
   media often. They find the programmes are
   quite different from those in China …In the
   Chinese community they have their own
   media”
  (Wang and King-O’Riain, p.49)
Research
 Design
Betty Maguire
Mixed Methods Approach
• ‘an approach to inquiry that combines or
  associates both qualitative and quantitative
  forms. It involves philosophical assumptions,
  the use of qualitative and quantitative
  approaches and the mixing of both
  approaches in a study’

Cresswell, P. 4
‘Mixed Method Approaches involves the use of
 both quantitative and qualitative approaches
 in tandem so that the overall strength of a
 study is greater than either qualitative or
 quantitative Research’

Creswell&Plano Clark, 2007
Quantitative survey
30 Qualitative face-to-face interviews
Paradigm
Social Constructivist Paradigm
participants’ views of the situation being
 studied
broad, open-ended questions
• ‘Researchers realize that their own
  background shapes their interpretation, and
  they position themselves in the research to
  acknowledge how their interpretation flows
  from their personal, cultural and historical
  experiences’
Cresswell, p. 8.
Sampling
Snowball sampling
Snow-probability sampling technique
subjects are hard to locate
http://www.experiment-resources.com/snowball-sampling.html
2 Approaches
                First Approach
make initial contact with key informants

information rich cases
Pickard, A.J. Research Methods in information, Facet
  Publishing, 2007, p. 65
Second Approach
an initial participant
interview and observation
characteristics and issues that need further
 inquiry
Pickard, A.J. Research Methods in information, Facet
  Publishing, 2007, p. 65
According to Erlandson et al, 1993,82
“Purposive and directed sampling through
  human instrumentation increases the range
  of data exposed and maximises the
  Researcher’s ability to identify emerging
  themes”
Linear Snowball Sampling
http://www.experiment-resources.com/snowball-sampling.html
Exponential non-discriminative sampling
http://www.experiment-resources.com/snowball-sampling.html
Interview Questions Examples
• Their opinions on broad issues, e.g. Taiwan,
  Tibet, etc
• Opinions on recent incidents, e.g. Google v.s.
  Chinese government, 2008 food poisoning
  scandal, etc
• Opinions on internet access in Ireland, as
  opposed to China?
• Which would they trust more? Why?
Interview Focus

• Emphasis on letting the responses of the focus
  group guide us during the interviews
Limitations
 Small sample


Students only (3,000 out of total population of
 30,000)
Dr. O’Leary,R., Dr. Li, L.,
“Mainland Chinese Students and Immigrants in Ireland
  and their Engagement with Christianity, Churches&
  Society”, p. 3.
 Costs
Phone credit
iPod as questionnaire incentive
Transcription costs
Funding
National Immigration Council of Ireland
Atlantic Philanthropies
Confucius Institute
 Sensitive Issue

Perception of Preconceived Bias of Westerners

Co-Ethnic Researcher
Time Management
Ethics
Ethics


 Sensitive Issue

 Make Research Overt

 Code of ethics

 Informed Consent

 Letter of request
Limitations

 Team Bias

 Small Sample Size

 Controversial Subject Matter

 Timeframe
Chinese Censorship, at Home,
          Abroad
   A Continuation or a Break in a new
               country?
Introduction
• A gap in the study of Chinese immigrants in
  Ireland: censorship
• Few countries as thorough in its censorship as
  China.
• ‘The Great Firewall’
• Wide range of topics taboo
• Censorship leading to self-censorship
Public Security Bureau mascots
Google incident
• Google versus Chinese government earlier this
  year over refusal to censor further.
• Principled or trouble-making? Opinions of
  Chinese servers differ.
Research Question

• Do Chinese in Ireland take advantage of non-
  censored internet to access information
  denied to them at home?
Focus Group

• Chinese students in Ireland, as they would
  have experiences with both China and Ireland.
• Chinese community in Ireland since 1950s but
  many would have limited contact with China.
Research Approach

• Mixed Methods: Qualitative and quantitative
  studies, with use of online questionnaires and
  interviews with volunteers
Interview Questions Examples
• Their opinions on broad issues, e.g. Taiwan,
  Tibet, etc
• Opinions on recent incidents, e.g. Google v.s.
  Chinese government, 2008 food poisoning
  scandal, etc
• Opinions on internet access in Ireland, as
  opposed to China?
• Which would they trust more? Why?
Interview Focus

• Emphasis on letting the responses of the focus
  group guide us during the interviews
Literature
 Review
Róisín Tangney
• OpenNet Initiative. (2009, June 15). Internet
  Filtering in China. Retrieved November 14,
  2010, from OpenNet:
  http://opennet.net/sites/opennet.net/files/O
  NI_China_2009.pdf
Internet use in China
• 420 million internet users

• 162 million blogs

• 30 million daily Kaixin users

• 583.5 million mobile phone subscribers
What’s Blocked?
What’s Censored?
Taiwan, Tibet, Tiananmen
North Korea
Falun Gong
Religion
Pornography
News Stories
Do they want more information?

• Anti-CNN movement following clashes in Tibet
  in 2008

• Race traitors targeted

• Google controversy

                       BUT …
Online discussion forums suggest many
Chinese people want to end Internet censorship.
Chinese Community in Ireland

Wang, Y. Y., & King-O'Riain, R. C. (2006). Chinese
Students in Ireland. National University of
Ireland, Maynooth, Dept. of Sociology. National
Consultative Committee on Racism and
Interculturalism.
Profile Study
• 30,000 Chinese people living in Ireland
• 3,000 3rd level Students
Co-Ethnic Researcher – Why?
•   Relates to target population
•   Body Language/Cultural differences
•   Communication
•   Comprehension
•   Participants’ rights
•   Recruitment
• “Most of the interviewees do not use the Irish
   media often. They find the programmes are
   quite different from those in China …In the
   Chinese community they have their own
   media”
  (Wang and King-O’Riain, p.49)
Research
 Design
Betty Maguire
Mixed Methods Approach
• ‘an approach to inquiry that combines or
  associates both qualitative and quantitative
  forms. It involves philosophical assumptions,
  the use of qualitative and quantitative
  approaches and the mixing of both
  approaches in a study’

Cresswell, P. 4
‘Mixed Method Approaches involves the use of
 both quantitative and qualitative approaches
 in tandem so that the overall strength of a
 study is greater than either qualitative or
 quantitative Research’

Creswell&Plano Clark, 2007
Quantitative survey
30 Qualitative face-to-face interviews
Paradigm
Social Constructivist Paradigm
participants’ views of the situation being
 studied
broad, open-ended questions
• ‘Researchers realize that their own
  background shapes their interpretation, and
  they position themselves in the research to
  acknowledge how their interpretation flows
  from their personal, cultural and historical
  experiences’
Cresswell, p. 8.
Sampling
Snowball sampling
Snow-probability sampling technique
subjects are hard to locate
http://www.experiment-resources.com/snowball-sampling.html
2 Approaches
                First Approach
make initial contact with key informants

information rich cases
Pickard, A.J. Research Methods in information, Facet
  Publishing, 2007, p. 65
Second Approach
an initial participant
interview and observation
characteristics and issues that need further
 inquiry
Pickard, A.J. Research Methods in information, Facet
  Publishing, 2007, p. 65
According to Erlandson et al, 1993,82
“Purposive and directed sampling through
  human instrumentation increases the range
  of data exposed and maximises the
  Researcher’s ability to identify emerging
  themes”
Linear Snowball Sampling
http://www.experiment-resources.com/snowball-sampling.html
Exponential non-discriminative sampling
http://www.experiment-resources.com/snowball-sampling.html
Limitations
 Small sample


Students only (3,000 out of total population of
 30,000)
Dr. O’Leary,R., Dr. Li, L.,
“Mainland Chinese Students and Immigrants in Ireland
  and their Engagement with Christianity, Churches&
  Society”, p. 3.
 Costs
Phone credit
iPod as questionnaire incentive
Transcription costs
Funding
National Immigration Council of Ireland
Atlantic Philanthropies
Confucius Institute
 Sensitive Issue

Perception of Preconceived Bias of Westerners

Co-Ethnic Researcher
Time Management
Ethics
Ethics


 Sensitive Issue

 Make Research Overt

 Code of ethics

 Informed Consent

 Letter of request
Limitations

 Team Bias

 Small Sample Size

 Controversial Subject Matter

 Timeframe

More Related Content

What's hot

The Modernization of Media and Its Effect on Academic Performance of Grade 12...
The Modernization of Media and Its Effect on Academic Performance of Grade 12...The Modernization of Media and Its Effect on Academic Performance of Grade 12...
The Modernization of Media and Its Effect on Academic Performance of Grade 12...
Brix Badar
 
Summary of my research
Summary of my researchSummary of my research
Summary of my research
Paul Reilly
 
Problematizing Digital Research Evaluation and Emerging Practices in Practice...
Problematizing Digital Research Evaluation and Emerging Practices in Practice...Problematizing Digital Research Evaluation and Emerging Practices in Practice...
Problematizing Digital Research Evaluation and Emerging Practices in Practice...
ORCID, Inc
 
ANZCA_lucypower_2009
ANZCA_lucypower_2009ANZCA_lucypower_2009
ANZCA_lucypower_2009
Lucy Power
 
UCWI-Safety & Security Final Presentation-5
UCWI-Safety & Security Final Presentation-5UCWI-Safety & Security Final Presentation-5
UCWI-Safety & Security Final Presentation-5
晰 王
 
Bridging Communities 2009
Bridging Communities 2009Bridging Communities 2009
Bridging Communities 2009
ElizabethSITPS
 
Introduction To Critical Enquiry Research
Introduction To Critical Enquiry ResearchIntroduction To Critical Enquiry Research
Introduction To Critical Enquiry Research
Terry Flew
 
Methodology and Proposed Thesis Topics 7/1/13
Methodology and Proposed Thesis Topics 7/1/13Methodology and Proposed Thesis Topics 7/1/13
Methodology and Proposed Thesis Topics 7/1/13
etaurisani
 
Methodology: Research & Production / 3 Thesis Subjects
Methodology: Research & Production / 3 Thesis SubjectsMethodology: Research & Production / 3 Thesis Subjects
Methodology: Research & Production / 3 Thesis Subjects
etaurisani
 
English as foreign language learning on social networking site? An action res...
English as foreign language learning on social networking site? An action res...English as foreign language learning on social networking site? An action res...
English as foreign language learning on social networking site? An action res...
Broadreach Services
 
Public Understanding of Science - Lecture 2 #SciCommLSU
Public Understanding of Science - Lecture 2 #SciCommLSUPublic Understanding of Science - Lecture 2 #SciCommLSU
Public Understanding of Science - Lecture 2 #SciCommLSU
Paige Jarreau
 
Transitions of digital practices and development of digital literacy skills a...
Transitions of digital practices and development of digital literacy skills a...Transitions of digital practices and development of digital literacy skills a...
Transitions of digital practices and development of digital literacy skills a...
Mengjie Jiang
 
Literacy, Technology, and Society
Literacy, Technology, and SocietyLiteracy, Technology, and Society
Literacy, Technology, and Society
Queen's University Belfast
 
Researching Digital Literacy From The Ground Up
Researching Digital Literacy From The Ground UpResearching Digital Literacy From The Ground Up
Researching Digital Literacy From The Ground Up
Queen's University Belfast
 
A study of sixth graders’ critical evaluation of Internet sources
A study of sixth graders’ critical evaluation of Internet sourcesA study of sixth graders’ critical evaluation of Internet sources
A study of sixth graders’ critical evaluation of Internet sources
aj6785
 
Research Methodology & Thesis Topic Proposals
Research Methodology & Thesis Topic ProposalsResearch Methodology & Thesis Topic Proposals
Research Methodology & Thesis Topic Proposals
etaurisani
 
Thesis topic & research methodology (draft 1)
Thesis topic & research methodology (draft 1)Thesis topic & research methodology (draft 1)
Thesis topic & research methodology (draft 1)
Hannah Li
 
The Domestication of the Internet in Germany (1997-2007). Online Access and I...
The Domestication of the Internet in Germany (1997-2007). Online Access and I...The Domestication of the Internet in Germany (1997-2007). Online Access and I...
The Domestication of the Internet in Germany (1997-2007). Online Access and I...
Cocoloris
 

What's hot (18)

The Modernization of Media and Its Effect on Academic Performance of Grade 12...
The Modernization of Media and Its Effect on Academic Performance of Grade 12...The Modernization of Media and Its Effect on Academic Performance of Grade 12...
The Modernization of Media and Its Effect on Academic Performance of Grade 12...
 
Summary of my research
Summary of my researchSummary of my research
Summary of my research
 
Problematizing Digital Research Evaluation and Emerging Practices in Practice...
Problematizing Digital Research Evaluation and Emerging Practices in Practice...Problematizing Digital Research Evaluation and Emerging Practices in Practice...
Problematizing Digital Research Evaluation and Emerging Practices in Practice...
 
ANZCA_lucypower_2009
ANZCA_lucypower_2009ANZCA_lucypower_2009
ANZCA_lucypower_2009
 
UCWI-Safety & Security Final Presentation-5
UCWI-Safety & Security Final Presentation-5UCWI-Safety & Security Final Presentation-5
UCWI-Safety & Security Final Presentation-5
 
Bridging Communities 2009
Bridging Communities 2009Bridging Communities 2009
Bridging Communities 2009
 
Introduction To Critical Enquiry Research
Introduction To Critical Enquiry ResearchIntroduction To Critical Enquiry Research
Introduction To Critical Enquiry Research
 
Methodology and Proposed Thesis Topics 7/1/13
Methodology and Proposed Thesis Topics 7/1/13Methodology and Proposed Thesis Topics 7/1/13
Methodology and Proposed Thesis Topics 7/1/13
 
Methodology: Research & Production / 3 Thesis Subjects
Methodology: Research & Production / 3 Thesis SubjectsMethodology: Research & Production / 3 Thesis Subjects
Methodology: Research & Production / 3 Thesis Subjects
 
English as foreign language learning on social networking site? An action res...
English as foreign language learning on social networking site? An action res...English as foreign language learning on social networking site? An action res...
English as foreign language learning on social networking site? An action res...
 
Public Understanding of Science - Lecture 2 #SciCommLSU
Public Understanding of Science - Lecture 2 #SciCommLSUPublic Understanding of Science - Lecture 2 #SciCommLSU
Public Understanding of Science - Lecture 2 #SciCommLSU
 
Transitions of digital practices and development of digital literacy skills a...
Transitions of digital practices and development of digital literacy skills a...Transitions of digital practices and development of digital literacy skills a...
Transitions of digital practices and development of digital literacy skills a...
 
Literacy, Technology, and Society
Literacy, Technology, and SocietyLiteracy, Technology, and Society
Literacy, Technology, and Society
 
Researching Digital Literacy From The Ground Up
Researching Digital Literacy From The Ground UpResearching Digital Literacy From The Ground Up
Researching Digital Literacy From The Ground Up
 
A study of sixth graders’ critical evaluation of Internet sources
A study of sixth graders’ critical evaluation of Internet sourcesA study of sixth graders’ critical evaluation of Internet sources
A study of sixth graders’ critical evaluation of Internet sources
 
Research Methodology & Thesis Topic Proposals
Research Methodology & Thesis Topic ProposalsResearch Methodology & Thesis Topic Proposals
Research Methodology & Thesis Topic Proposals
 
Thesis topic & research methodology (draft 1)
Thesis topic & research methodology (draft 1)Thesis topic & research methodology (draft 1)
Thesis topic & research methodology (draft 1)
 
The Domestication of the Internet in Germany (1997-2007). Online Access and I...
The Domestication of the Internet in Germany (1997-2007). Online Access and I...The Domestication of the Internet in Germany (1997-2007). Online Access and I...
The Domestication of the Internet in Germany (1997-2007). Online Access and I...
 

Similar to Research methods slide show

Introduction to online ethnography
Introduction to online ethnographyIntroduction to online ethnography
Introduction to online ethnography
Anna E. Haverinen
 
Various Types of Qualitative Research.pptx
Various Types of Qualitative Research.pptxVarious Types of Qualitative Research.pptx
Various Types of Qualitative Research.pptx
MonojitGope
 
What is Extreme Citizen Science? Volunteerism & Publicly Initiated Scientific...
What is Extreme Citizen Science? Volunteerism & Publicly Initiated Scientific...What is Extreme Citizen Science? Volunteerism & Publicly Initiated Scientific...
What is Extreme Citizen Science? Volunteerism & Publicly Initiated Scientific...
Cindy Regalado
 
Qualitative research
Qualitative researchQualitative research
Qualitative research
NadeemShoukat3
 
Internet Research Ethics CSSWS2015 Tutorial
Internet Research Ethics CSSWS2015 TutorialInternet Research Ethics CSSWS2015 Tutorial
Internet Research Ethics CSSWS2015 Tutorial
Ka_Kinder
 
The ethics of involvement
The ethics of involvementThe ethics of involvement
The ethics of involvement
Louca-Mai Brady
 
Citizen Science - Insights, opportunities and approaches for biomedical research
Citizen Science - Insights, opportunities and approaches for biomedical researchCitizen Science - Insights, opportunities and approaches for biomedical research
Citizen Science - Insights, opportunities and approaches for biomedical research
Erinma Ochu
 
Writing-Chapter-1.pptx
Writing-Chapter-1.pptxWriting-Chapter-1.pptx
Writing-Chapter-1.pptx
ronel Dayo
 
Netnography and Research Ethics: From ACR 2015 Doctoral Symposium
Netnography and Research Ethics: From ACR 2015 Doctoral SymposiumNetnography and Research Ethics: From ACR 2015 Doctoral Symposium
Netnography and Research Ethics: From ACR 2015 Doctoral Symposium
University of Southern California
 
Netnography webinar
Netnography webinarNetnography webinar
Netnography webinar
suresh sood
 
Yimei zhu poster for methods fair 2012
Yimei zhu poster for methods fair 2012Yimei zhu poster for methods fair 2012
Yimei zhu poster for methods fair 2012
University Of Manchester
 
Emerging trends for Libraries
Emerging trends for LibrariesEmerging trends for Libraries
Emerging trends for Libraries
H Anil Kumar
 
Day 1 - Quisumbing and Davis - Moving Beyond the Qual-Quant Divide
Day 1 - Quisumbing and Davis - Moving Beyond the Qual-Quant DivideDay 1 - Quisumbing and Davis - Moving Beyond the Qual-Quant Divide
Day 1 - Quisumbing and Davis - Moving Beyond the Qual-Quant Divide
Ag4HealthNutrition
 
Mm ch 02
Mm ch 02Mm ch 02
Mm ch 02
Jason Nix
 
Blurred roles; social media research and ethics 2018
Blurred roles; social media research and ethics  2018Blurred roles; social media research and ethics  2018
Blurred roles; social media research and ethics 2018
Sarah Quinton
 
The Networked Creativity in the Censored Web 2.0
The Networked Creativity in the Censored Web 2.0The Networked Creativity in the Censored Web 2.0
The Networked Creativity in the Censored Web 2.0
Weiai Wayne Xu
 
Michael Pocock: Citizen Science Project Design
Michael Pocock: Citizen Science Project DesignMichael Pocock: Citizen Science Project Design
Michael Pocock: Citizen Science Project Design
Alice Sheppard
 
Use of PLEs by security and investigation professionals
Use of PLEs by security and investigation professionalsUse of PLEs by security and investigation professionals
Use of PLEs by security and investigation professionals
Tony Ratcliffe
 
EDRD 6000 Qualitative Research with Indigenous Communities of Canada: Issues,...
EDRD 6000 Qualitative Research with Indigenous Communities of Canada: Issues,...EDRD 6000 Qualitative Research with Indigenous Communities of Canada: Issues,...
EDRD 6000 Qualitative Research with Indigenous Communities of Canada: Issues,...
Rachel deHaan
 
ETHNOGRAPHY I: What It Is, Where It Came From & How To Do It
ETHNOGRAPHY I: What It Is, Where It Came From & How To Do ItETHNOGRAPHY I: What It Is, Where It Came From & How To Do It
ETHNOGRAPHY I: What It Is, Where It Came From & How To Do It
Dr Igor Calzada, MBA, FeRSA
 

Similar to Research methods slide show (20)

Introduction to online ethnography
Introduction to online ethnographyIntroduction to online ethnography
Introduction to online ethnography
 
Various Types of Qualitative Research.pptx
Various Types of Qualitative Research.pptxVarious Types of Qualitative Research.pptx
Various Types of Qualitative Research.pptx
 
What is Extreme Citizen Science? Volunteerism & Publicly Initiated Scientific...
What is Extreme Citizen Science? Volunteerism & Publicly Initiated Scientific...What is Extreme Citizen Science? Volunteerism & Publicly Initiated Scientific...
What is Extreme Citizen Science? Volunteerism & Publicly Initiated Scientific...
 
Qualitative research
Qualitative researchQualitative research
Qualitative research
 
Internet Research Ethics CSSWS2015 Tutorial
Internet Research Ethics CSSWS2015 TutorialInternet Research Ethics CSSWS2015 Tutorial
Internet Research Ethics CSSWS2015 Tutorial
 
The ethics of involvement
The ethics of involvementThe ethics of involvement
The ethics of involvement
 
Citizen Science - Insights, opportunities and approaches for biomedical research
Citizen Science - Insights, opportunities and approaches for biomedical researchCitizen Science - Insights, opportunities and approaches for biomedical research
Citizen Science - Insights, opportunities and approaches for biomedical research
 
Writing-Chapter-1.pptx
Writing-Chapter-1.pptxWriting-Chapter-1.pptx
Writing-Chapter-1.pptx
 
Netnography and Research Ethics: From ACR 2015 Doctoral Symposium
Netnography and Research Ethics: From ACR 2015 Doctoral SymposiumNetnography and Research Ethics: From ACR 2015 Doctoral Symposium
Netnography and Research Ethics: From ACR 2015 Doctoral Symposium
 
Netnography webinar
Netnography webinarNetnography webinar
Netnography webinar
 
Yimei zhu poster for methods fair 2012
Yimei zhu poster for methods fair 2012Yimei zhu poster for methods fair 2012
Yimei zhu poster for methods fair 2012
 
Emerging trends for Libraries
Emerging trends for LibrariesEmerging trends for Libraries
Emerging trends for Libraries
 
Day 1 - Quisumbing and Davis - Moving Beyond the Qual-Quant Divide
Day 1 - Quisumbing and Davis - Moving Beyond the Qual-Quant DivideDay 1 - Quisumbing and Davis - Moving Beyond the Qual-Quant Divide
Day 1 - Quisumbing and Davis - Moving Beyond the Qual-Quant Divide
 
Mm ch 02
Mm ch 02Mm ch 02
Mm ch 02
 
Blurred roles; social media research and ethics 2018
Blurred roles; social media research and ethics  2018Blurred roles; social media research and ethics  2018
Blurred roles; social media research and ethics 2018
 
The Networked Creativity in the Censored Web 2.0
The Networked Creativity in the Censored Web 2.0The Networked Creativity in the Censored Web 2.0
The Networked Creativity in the Censored Web 2.0
 
Michael Pocock: Citizen Science Project Design
Michael Pocock: Citizen Science Project DesignMichael Pocock: Citizen Science Project Design
Michael Pocock: Citizen Science Project Design
 
Use of PLEs by security and investigation professionals
Use of PLEs by security and investigation professionalsUse of PLEs by security and investigation professionals
Use of PLEs by security and investigation professionals
 
EDRD 6000 Qualitative Research with Indigenous Communities of Canada: Issues,...
EDRD 6000 Qualitative Research with Indigenous Communities of Canada: Issues,...EDRD 6000 Qualitative Research with Indigenous Communities of Canada: Issues,...
EDRD 6000 Qualitative Research with Indigenous Communities of Canada: Issues,...
 
ETHNOGRAPHY I: What It Is, Where It Came From & How To Do It
ETHNOGRAPHY I: What It Is, Where It Came From & How To Do ItETHNOGRAPHY I: What It Is, Where It Came From & How To Do It
ETHNOGRAPHY I: What It Is, Where It Came From & How To Do It
 

Recently uploaded

Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
Jason Packer
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
Tatiana Kojar
 
AWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptxAWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptx
HarisZaheer8
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
SitimaJohn
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
Hiroshi SHIBATA
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
Ivanti
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
Zilliz
 
dbms calicut university B. sc Cs 4th sem.pdf
dbms  calicut university B. sc Cs 4th sem.pdfdbms  calicut university B. sc Cs 4th sem.pdf
dbms calicut university B. sc Cs 4th sem.pdf
Shinana2
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Alpen-Adria-Universität
 
Trusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process MiningTrusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process Mining
LucaBarbaro3
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
DanBrown980551
 
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStrDeep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
saastr
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
saastr
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Azure API Management to expose backend services securely
Azure API Management to expose backend services securelyAzure API Management to expose backend services securely
Azure API Management to expose backend services securely
Dinusha Kumarasiri
 

Recently uploaded (20)

Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
 
AWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptxAWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptx
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
 
dbms calicut university B. sc Cs 4th sem.pdf
dbms  calicut university B. sc Cs 4th sem.pdfdbms  calicut university B. sc Cs 4th sem.pdf
dbms calicut university B. sc Cs 4th sem.pdf
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
 
Trusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process MiningTrusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process Mining
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
 
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStrDeep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
Deep Dive: Getting Funded with Jason Jason Lemkin Founder & CEO @ SaaStr
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Azure API Management to expose backend services securely
Azure API Management to expose backend services securelyAzure API Management to expose backend services securely
Azure API Management to expose backend services securely
 

Research methods slide show