SlideShare a Scribd company logo
HVPM COETConfidential
HVPM COET
Selecting a Method of
Data Collection
Research Scholar: Guided by:
Mr. P. D. Kaware Dr. A. B. Raut
Date: 15/07/2020
HVPM COETConfidential
HVPM COET
Contents
 Differences in methods of data collection in quantitative
and qualitative research
 Major approaches to information gathering
 Collecting data using primary sources
 Observation
 The interview
 The questionnaire
 Collecting data using secondary sources
HVPM COETConfidential
HVPM COET
Differences in the methods of data collection in
quantitative and qualitative research
 Data collection can be used in both qualitative and
quantitative research.
 Difference is mainly due to the restrictions imposed on
flexibility, structure, sequential order, depth and
freedom
HVPM COETConfidential
HVPM COET
Major approaches to information gathering
Information
Gathering Data
Primary Data
Primary Sources
Fresh Copy
Secondary Data
Secondary
Sources
Already
Collected
HVPM COETConfidential
HVPM COET
Collecting Data Using Primary Sources
 Several methods can be used to collect primary data
 Sometimes the objectives of a study cannot be used
because of constraints
 In selecting a method of data collection, the
socioeconomic characteristics of the study population
play an important role
 To maintain quality of data, the purpose and relevance
of the study are explained to respondents
HVPM COETConfidential
HVPM COET
Observation
 Used in studies relating to behavioral sciences
 Observation is a purposeful, systematic and selective
way of watching and listening
 Observation becomes a scientific tool and the method
of data collection
HVPM COETConfidential
HVPM COET
Types of Observation
Types of
observation
Participant
Observation
Non-Participant
Observation
HVPM COETConfidential
HVPM COET
Participant & Non-Participant Observation
 Participant observation
is when we as a
researcher, participate in
the activities
 Non-Participant
observation when we as a
researcher, do not get
involved in the activities
HVPM COETConfidential
HVPM COET
Advantages of Observation Method
 Data collected at the time of occurrence of the event
 Observation is done in natural surroundings
 Sometimes, the respondents may not like to part with
some of the information. Such information can be
obtained by the researcher through observation.
 Observation can also be done on those who cannot
articulate.
HVPM COETConfidential
HVPM COET
Limitations of Observation Method
 Observer might wait for longer period.
 Training of observers is required.
 This is an expensive method.
 External observation provides only superficial
indications.
 Two observers may observe the same event, but may
draw different inferences.
 Difficult to gather information on opinions & intentions.
 When individuals or groups become aware that they are
being observed, they may change their behaviour.
HVPM COETConfidential
HVPM COET
The interview
 Commonly used method of collecting information
 It involves presentation of oral-verbal talks and reply in
terms of oral-verbal responses.
 Researcher have the freedom to decide questions
HVPM COETConfidential
HVPM COET
Different categories of interview
Interviews
Unstructured
Interviews
Flexible Interview Structure
Flexible Interview Contents
Flexible Interview Questions
Structured
interviews
Rigid Interview Structure
Rigid Interview Contents
Rigid Interview Questions
HVPM COETConfidential
HVPM COET
Advantages of the interview
 It is useful for collecting in-depth information.
 Information can be supplemented.
 Questions can be explained.
 Interviewing has a wider application.
 The interview is more appropriate for complex
situations.
HVPM COETConfidential
HVPM COET
Disadvantages of the interview
 Interviewing is time consuming and expensive.
 The quality of data depends upon the quality of the
interaction.
 The quality of data depends upon the quality of the
interviewer.
 The quality of data may vary when many interviewers
are used.
HVPM COETConfidential
HVPM COET
The questionnaire
 Quite popular and particularly used in big enquiries
 A questionnaire is a written list of questions.
 It is important that the questions are clear and easy to
understand.
 Questionnaire developed in an interactive style.
HVPM COETConfidential
HVPM COET
Ways of administering a questionnaire
 The mailed questionnaire
 Send the questionnaire to prospective respondents by mail
 Collective administration
 Best ways of managing a questionnaire is to obtain a captive
audience
 Administration in a public place
 Public place such as a shopping centre, health centre,
hospital, school or pub
HVPM COETConfidential
HVPM COET
Advantages of a questionnaire
 It is less expensive.
 It offers greater anonymity.
HVPM COETConfidential
HVPM COET
Disadvantages of a questionnaire
 Application is limited.
 The response rate is low.
 There is a self-selecting bias.
 Opportunity to clarify issues is lacking.
 The response to a question may be influenced by the
response to other questions.
 It is possible to consult others.
 A response cannot be supplemented with other
information.
HVPM COETConfidential
HVPM COET
Collecting data using secondary sources
 Secondary data means data that are already available.
 Both qualitative and quantitative research studies use
secondary sources as a method of data collection.
HVPM COETConfidential
HVPM COET
Published data are available in:
 Government or semi-government publications
 Earlier research
 Personal records
 Mass media
HVPM COETConfidential
HVPM COET
Problems with using data from secondary sources
 Validity and reliability
 Personal bias
 Availability of data
 Format
HVPM COETConfidential
HVPM COET
Literature Review Submitted on:
Research Field : Computer Science & Engineering
Research Area : Natural Language Processing (NLP)
Research Topic: Sentiment Analysis On Social Networking Site
 In today’s world, sentiment analysis (SA) stands as the prominent research
topic in demand under the Natural Language Processing (NLP).
 The fundamental objective of this research topic is to spot out the emotions
and opinions of the users via a text basis.
 Sentiment analysis is nontrivial task, many challenges still not addressed and
resolve efficiently. Sentiment analysis highlight the most important challenges
that are faced by sentiment Analysis (SA) are Language-oriented Issues,
Detection of spam and fake reviews, Negation handling, Spam and Fake
Opinions on Social Sites etc.
 So, we need to develop the appropriate techniques and advance algorithms
for detecting and filtering out the faked opinions in the collected dataset, build
robust method for negation handling, building language-oriented lexicons and
dictionaries, solve language related issues etc.
HVPM COETConfidential
HVPM COET
References
 Ranjit Kumar, "Research Methodology: A Step by Step
Guide for Beginners", SAGE Publications Ltd., 2011.
 C. R. Kothari ,"Research Methodology: Methods and
Trends", New Age International,2004
HVPM COETConfidential
HVPM COET
HVPM COETConfidential
HVPM COET
H.V.P.M’s
College of Engineering & Technology,
Amravati-444605,
Maharashtra, India.
Thank You !!!

More Related Content

Similar to Seminar Course Work.pptx

Survey Resaerch
Survey ResaerchSurvey Resaerch
Survey Resaerch
Tehreem Ansari
 
Data Collection biostats BJ revised 2021.ppt
Data Collection biostats BJ revised 2021.pptData Collection biostats BJ revised 2021.ppt
Data Collection biostats BJ revised 2021.ppt
prisy544
 
data collection methods
data collection methodsdata collection methods
data collection methods
KingMajanga
 
Method of data collection
Method of data collectionMethod of data collection
Method of data collection
Balaji P
 
Research and advocacy by Seetal Daas
Research and advocacy by Seetal DaasResearch and advocacy by Seetal Daas
Research and advocacy by Seetal DaasSeetal Daas
 
Research: Data Collection methods, tools and techniques.pdf
Research: Data Collection methods, tools and techniques.pdfResearch: Data Collection methods, tools and techniques.pdf
Research: Data Collection methods, tools and techniques.pdf
Dr. Mahesh Koltame
 
DATA COLLECTION METHODS PRESENTATION ( EMMANUEL SIAW OKAI).pdf
DATA COLLECTION METHODS  PRESENTATION ( EMMANUEL SIAW OKAI).pdfDATA COLLECTION METHODS  PRESENTATION ( EMMANUEL SIAW OKAI).pdf
DATA COLLECTION METHODS PRESENTATION ( EMMANUEL SIAW OKAI).pdf
emmanuelsokai
 
Quantitative search and_qualitative_research by mubarak
Quantitative search and_qualitative_research by mubarakQuantitative search and_qualitative_research by mubarak
Quantitative search and_qualitative_research by mubarak
Hafiza Abas
 
Different Methods of Collection of Data
Different Methods of Collection of DataDifferent Methods of Collection of Data
Different Methods of Collection of Data
P. Veeresha
 
Data Collection Techniques.ppt
Data Collection Techniques.pptData Collection Techniques.ppt
Data Collection Techniques.ppt
PapuKumarNaik1
 
data collection
data collection data collection
data collection
KingMajanga
 
Research Methodology Module-04
Research Methodology Module-04Research Methodology Module-04
Research Methodology Module-04
Kishor Ade
 
qualitative research DR. MADHUR VERMA PGIMS ROHTAK
 qualitative research DR. MADHUR VERMA PGIMS ROHTAK qualitative research DR. MADHUR VERMA PGIMS ROHTAK
qualitative research DR. MADHUR VERMA PGIMS ROHTAKMADHUR VERMA
 
Adler clark 4e ppt 09
Adler clark 4e ppt 09Adler clark 4e ppt 09
Adler clark 4e ppt 09arpsychology
 
Methods of data collection
Methods of data collectionMethods of data collection
Business Research Methods. primary data collection_survey_observation_and_exp...
Business Research Methods. primary data collection_survey_observation_and_exp...Business Research Methods. primary data collection_survey_observation_and_exp...
Business Research Methods. primary data collection_survey_observation_and_exp...
Ahsan Khan Eco (Superior College)
 
Question 1
Question 1Question 1
Research Methodology For A Researcher
Research Methodology For A ResearcherResearch Methodology For A Researcher
Research Methodology For A Researcher
Renee Wardowski
 
How to design questionnaire
How to design questionnaireHow to design questionnaire
How to design questionnaire
sukesh gowda
 

Similar to Seminar Course Work.pptx (20)

Survey Resaerch
Survey ResaerchSurvey Resaerch
Survey Resaerch
 
Data Collection biostats BJ revised 2021.ppt
Data Collection biostats BJ revised 2021.pptData Collection biostats BJ revised 2021.ppt
Data Collection biostats BJ revised 2021.ppt
 
data collection methods
data collection methodsdata collection methods
data collection methods
 
Method of data collection
Method of data collectionMethod of data collection
Method of data collection
 
Research and advocacy by Seetal Daas
Research and advocacy by Seetal DaasResearch and advocacy by Seetal Daas
Research and advocacy by Seetal Daas
 
Research: Data Collection methods, tools and techniques.pdf
Research: Data Collection methods, tools and techniques.pdfResearch: Data Collection methods, tools and techniques.pdf
Research: Data Collection methods, tools and techniques.pdf
 
DATA COLLECTION METHODS PRESENTATION ( EMMANUEL SIAW OKAI).pdf
DATA COLLECTION METHODS  PRESENTATION ( EMMANUEL SIAW OKAI).pdfDATA COLLECTION METHODS  PRESENTATION ( EMMANUEL SIAW OKAI).pdf
DATA COLLECTION METHODS PRESENTATION ( EMMANUEL SIAW OKAI).pdf
 
Quantitative search and_qualitative_research by mubarak
Quantitative search and_qualitative_research by mubarakQuantitative search and_qualitative_research by mubarak
Quantitative search and_qualitative_research by mubarak
 
Different Methods of Collection of Data
Different Methods of Collection of DataDifferent Methods of Collection of Data
Different Methods of Collection of Data
 
Data collection methods
Data collection methodsData collection methods
Data collection methods
 
Data Collection Techniques.ppt
Data Collection Techniques.pptData Collection Techniques.ppt
Data Collection Techniques.ppt
 
data collection
data collection data collection
data collection
 
Research Methodology Module-04
Research Methodology Module-04Research Methodology Module-04
Research Methodology Module-04
 
qualitative research DR. MADHUR VERMA PGIMS ROHTAK
 qualitative research DR. MADHUR VERMA PGIMS ROHTAK qualitative research DR. MADHUR VERMA PGIMS ROHTAK
qualitative research DR. MADHUR VERMA PGIMS ROHTAK
 
Adler clark 4e ppt 09
Adler clark 4e ppt 09Adler clark 4e ppt 09
Adler clark 4e ppt 09
 
Methods of data collection
Methods of data collectionMethods of data collection
Methods of data collection
 
Business Research Methods. primary data collection_survey_observation_and_exp...
Business Research Methods. primary data collection_survey_observation_and_exp...Business Research Methods. primary data collection_survey_observation_and_exp...
Business Research Methods. primary data collection_survey_observation_and_exp...
 
Question 1
Question 1Question 1
Question 1
 
Research Methodology For A Researcher
Research Methodology For A ResearcherResearch Methodology For A Researcher
Research Methodology For A Researcher
 
How to design questionnaire
How to design questionnaireHow to design questionnaire
How to design questionnaire
 

Recently uploaded

Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
Vlad Stirbu
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 

Recently uploaded (20)

Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 

Seminar Course Work.pptx

  • 1. HVPM COETConfidential HVPM COET Selecting a Method of Data Collection Research Scholar: Guided by: Mr. P. D. Kaware Dr. A. B. Raut Date: 15/07/2020
  • 2. HVPM COETConfidential HVPM COET Contents  Differences in methods of data collection in quantitative and qualitative research  Major approaches to information gathering  Collecting data using primary sources  Observation  The interview  The questionnaire  Collecting data using secondary sources
  • 3. HVPM COETConfidential HVPM COET Differences in the methods of data collection in quantitative and qualitative research  Data collection can be used in both qualitative and quantitative research.  Difference is mainly due to the restrictions imposed on flexibility, structure, sequential order, depth and freedom
  • 4. HVPM COETConfidential HVPM COET Major approaches to information gathering Information Gathering Data Primary Data Primary Sources Fresh Copy Secondary Data Secondary Sources Already Collected
  • 5. HVPM COETConfidential HVPM COET Collecting Data Using Primary Sources  Several methods can be used to collect primary data  Sometimes the objectives of a study cannot be used because of constraints  In selecting a method of data collection, the socioeconomic characteristics of the study population play an important role  To maintain quality of data, the purpose and relevance of the study are explained to respondents
  • 6. HVPM COETConfidential HVPM COET Observation  Used in studies relating to behavioral sciences  Observation is a purposeful, systematic and selective way of watching and listening  Observation becomes a scientific tool and the method of data collection
  • 7. HVPM COETConfidential HVPM COET Types of Observation Types of observation Participant Observation Non-Participant Observation
  • 8. HVPM COETConfidential HVPM COET Participant & Non-Participant Observation  Participant observation is when we as a researcher, participate in the activities  Non-Participant observation when we as a researcher, do not get involved in the activities
  • 9. HVPM COETConfidential HVPM COET Advantages of Observation Method  Data collected at the time of occurrence of the event  Observation is done in natural surroundings  Sometimes, the respondents may not like to part with some of the information. Such information can be obtained by the researcher through observation.  Observation can also be done on those who cannot articulate.
  • 10. HVPM COETConfidential HVPM COET Limitations of Observation Method  Observer might wait for longer period.  Training of observers is required.  This is an expensive method.  External observation provides only superficial indications.  Two observers may observe the same event, but may draw different inferences.  Difficult to gather information on opinions & intentions.  When individuals or groups become aware that they are being observed, they may change their behaviour.
  • 11. HVPM COETConfidential HVPM COET The interview  Commonly used method of collecting information  It involves presentation of oral-verbal talks and reply in terms of oral-verbal responses.  Researcher have the freedom to decide questions
  • 12. HVPM COETConfidential HVPM COET Different categories of interview Interviews Unstructured Interviews Flexible Interview Structure Flexible Interview Contents Flexible Interview Questions Structured interviews Rigid Interview Structure Rigid Interview Contents Rigid Interview Questions
  • 13. HVPM COETConfidential HVPM COET Advantages of the interview  It is useful for collecting in-depth information.  Information can be supplemented.  Questions can be explained.  Interviewing has a wider application.  The interview is more appropriate for complex situations.
  • 14. HVPM COETConfidential HVPM COET Disadvantages of the interview  Interviewing is time consuming and expensive.  The quality of data depends upon the quality of the interaction.  The quality of data depends upon the quality of the interviewer.  The quality of data may vary when many interviewers are used.
  • 15. HVPM COETConfidential HVPM COET The questionnaire  Quite popular and particularly used in big enquiries  A questionnaire is a written list of questions.  It is important that the questions are clear and easy to understand.  Questionnaire developed in an interactive style.
  • 16. HVPM COETConfidential HVPM COET Ways of administering a questionnaire  The mailed questionnaire  Send the questionnaire to prospective respondents by mail  Collective administration  Best ways of managing a questionnaire is to obtain a captive audience  Administration in a public place  Public place such as a shopping centre, health centre, hospital, school or pub
  • 17. HVPM COETConfidential HVPM COET Advantages of a questionnaire  It is less expensive.  It offers greater anonymity.
  • 18. HVPM COETConfidential HVPM COET Disadvantages of a questionnaire  Application is limited.  The response rate is low.  There is a self-selecting bias.  Opportunity to clarify issues is lacking.  The response to a question may be influenced by the response to other questions.  It is possible to consult others.  A response cannot be supplemented with other information.
  • 19. HVPM COETConfidential HVPM COET Collecting data using secondary sources  Secondary data means data that are already available.  Both qualitative and quantitative research studies use secondary sources as a method of data collection.
  • 20. HVPM COETConfidential HVPM COET Published data are available in:  Government or semi-government publications  Earlier research  Personal records  Mass media
  • 21. HVPM COETConfidential HVPM COET Problems with using data from secondary sources  Validity and reliability  Personal bias  Availability of data  Format
  • 22. HVPM COETConfidential HVPM COET Literature Review Submitted on: Research Field : Computer Science & Engineering Research Area : Natural Language Processing (NLP) Research Topic: Sentiment Analysis On Social Networking Site  In today’s world, sentiment analysis (SA) stands as the prominent research topic in demand under the Natural Language Processing (NLP).  The fundamental objective of this research topic is to spot out the emotions and opinions of the users via a text basis.  Sentiment analysis is nontrivial task, many challenges still not addressed and resolve efficiently. Sentiment analysis highlight the most important challenges that are faced by sentiment Analysis (SA) are Language-oriented Issues, Detection of spam and fake reviews, Negation handling, Spam and Fake Opinions on Social Sites etc.  So, we need to develop the appropriate techniques and advance algorithms for detecting and filtering out the faked opinions in the collected dataset, build robust method for negation handling, building language-oriented lexicons and dictionaries, solve language related issues etc.
  • 23. HVPM COETConfidential HVPM COET References  Ranjit Kumar, "Research Methodology: A Step by Step Guide for Beginners", SAGE Publications Ltd., 2011.  C. R. Kothari ,"Research Methodology: Methods and Trends", New Age International,2004
  • 24. HVPM COETConfidential HVPM COET HVPM COETConfidential HVPM COET H.V.P.M’s College of Engineering & Technology, Amravati-444605, Maharashtra, India. Thank You !!!