SlideShare a Scribd company logo
SOC2002: Sociological Analysis and Research Methods LECTURE 6: Data Collection (2) Secondary data Lecturer: Bonnie Green [email_address]
The research process: today… Reporting Topic/Object 1 2 3 4 5 6 LECTURES 5, 6, 7, 9 & 10 Research question Research design Data collection Data analysis Interpretation Literature review, and/or field reconnaissance Choosing indicators & Project Planning Ethics Quality
Data Collection (2):  Overview ,[object Object],[object Object],[object Object]
Secondary data ,[object Object],[object Object],[object Object],[object Object],[object Object]
Secondary data ,[object Object],[object Object],[object Object],[object Object]
Secondary data ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What do the data mean? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What do the data mean? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
What do the data mean? ,[object Object],[object Object],[object Object],[object Object]
Collecting secondary data ,[object Object],[object Object],[object Object],[object Object]
Collecting secondary data ,[object Object],[object Object],[object Object],[object Object],[object Object]
Which dataset(s) could I use? ,[object Object],[object Object],[object Object],[object Object],[object Object]
ESDS Government ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
ESDS Longitudinal & Qualidata ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Collecting secondary data ,[object Object],[object Object],[object Object],[object Object],[object Object]
Accessing secondary data ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Collecting secondary data ,[object Object],[object Object],[object Object],[object Object],[object Object]
Data formats & explanatory notes ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Collecting secondary data ,[object Object],[object Object],[object Object],[object Object],[object Object]
Ethics, data protection and storage for secondary data ,[object Object],[object Object],[object Object],[object Object]
Data Collection (2):  Summary ,[object Object],[object Object],[object Object]
Data Collection (2):  Some advice… ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]

More Related Content

What's hot

Research Data in an Open Science World - Prof. Dr. Eva Mendez, uc3m
Research Data in an Open Science World - Prof. Dr. Eva Mendez, uc3mResearch Data in an Open Science World - Prof. Dr. Eva Mendez, uc3m
Research Data in an Open Science World - Prof. Dr. Eva Mendez, uc3m
LEARN Project
 
Research Data Management and the brave new world, By Paul Ayris
Research Data Management and the brave new world, By Paul AyrisResearch Data Management and the brave new world, By Paul Ayris
Research Data Management and the brave new world, By Paul Ayris
LEARN Project
 
How can we ensure research data is re-usable? The role of Publishers in Resea...
How can we ensure research data is re-usable? The role of Publishers in Resea...How can we ensure research data is re-usable? The role of Publishers in Resea...
How can we ensure research data is re-usable? The role of Publishers in Resea...
LEARN Project
 
Liberating facts from the scientific literature - Jisc Digifest 2016
Liberating facts from the scientific literature - Jisc Digifest 2016Liberating facts from the scientific literature - Jisc Digifest 2016
Liberating facts from the scientific literature - Jisc Digifest 2016
Jisc
 
SUNCAT: the next steps for the UK’s national serials catalogue
SUNCAT: the next steps for the UK’s national serials catalogueSUNCAT: the next steps for the UK’s national serials catalogue
SUNCAT: the next steps for the UK’s national serials catalogue
EDINA, University of Edinburgh
 
20130805 Activating Linked Open Data in Libraries Archives and Museums
20130805 Activating Linked Open Data in Libraries Archives and Museums20130805 Activating Linked Open Data in Libraries Archives and Museums
20130805 Activating Linked Open Data in Libraries Archives and Museums
andrea huang
 
Open by default: the challenges of research data in Europe
Open by default: the challenges of research data in EuropeOpen by default: the challenges of research data in Europe
Open by default: the challenges of research data in Europe
LEARN Project
 
Why we care about research data? Why we share?
Why we care about research data? Why we share?Why we care about research data? Why we share?
Why we care about research data? Why we share?
Richard Ferrers
 
LEARN Final Conference: Tutorial Group | Implementing the LEARN RDM Toolkit
LEARN Final Conference: Tutorial Group | Implementing the LEARN RDM ToolkitLEARN Final Conference: Tutorial Group | Implementing the LEARN RDM Toolkit
LEARN Final Conference: Tutorial Group | Implementing the LEARN RDM Toolkit
LEARN Project
 
From Open Data to Open Science, by Geoffrey Boulton
 From Open Data to Open Science, by Geoffrey Boulton From Open Data to Open Science, by Geoffrey Boulton
From Open Data to Open Science, by Geoffrey Boulton
LEARN Project
 
Research Data Management: a gentle introduction
Research Data Management: a gentle introductionResearch Data Management: a gentle introduction
Research Data Management: a gentle introduction
Martin Donnelly
 
2013 DataCite Summer Meeting - Out of Cite, Out of Mind: Report of the CODATA...
2013 DataCite Summer Meeting - Out of Cite, Out of Mind: Report of the CODATA...2013 DataCite Summer Meeting - Out of Cite, Out of Mind: Report of the CODATA...
2013 DataCite Summer Meeting - Out of Cite, Out of Mind: Report of the CODATA...
datacite
 
The Challenges of Making Data Travel, by Sabina Leonelli
The Challenges of Making Data Travel, by Sabina LeonelliThe Challenges of Making Data Travel, by Sabina Leonelli
The Challenges of Making Data Travel, by Sabina Leonelli
LEARN Project
 
Linked Open Data Approaches within the ARIADNE Project
Linked Open Data Approaches within the ARIADNE ProjectLinked Open Data Approaches within the ARIADNE Project
Linked Open Data Approaches within the ARIADNE Project
ariadnenetwork
 
Winning the Tour de France, Research Data and Data Stewardship
Winning the Tour de France, Research Data and Data StewardshipWinning the Tour de France, Research Data and Data Stewardship
Winning the Tour de France, Research Data and Data Stewardship
Alastair Dunning
 
The Importance of Metadata - EUDAT Summer School (Shaun de Witt, CCFE)
The Importance of Metadata - EUDAT Summer School (Shaun de Witt, CCFE)The Importance of Metadata - EUDAT Summer School (Shaun de Witt, CCFE)
The Importance of Metadata - EUDAT Summer School (Shaun de Witt, CCFE)
EUDAT
 
LEARN Final Conference: Tutorial Group | How To Engage Early Career Researchers
LEARN Final Conference: Tutorial Group | How To Engage Early Career ResearchersLEARN Final Conference: Tutorial Group | How To Engage Early Career Researchers
LEARN Final Conference: Tutorial Group | How To Engage Early Career Researchers
LEARN Project
 
Now we are six: Integrating Edinburgh DataShare into local and internet in...
Now we are six: Integrating Edinburgh DataShare into local and internet in...Now we are six: Integrating Edinburgh DataShare into local and internet in...
Now we are six: Integrating Edinburgh DataShare into local and internet in...
Robin Rice
 

What's hot (18)

Research Data in an Open Science World - Prof. Dr. Eva Mendez, uc3m
Research Data in an Open Science World - Prof. Dr. Eva Mendez, uc3mResearch Data in an Open Science World - Prof. Dr. Eva Mendez, uc3m
Research Data in an Open Science World - Prof. Dr. Eva Mendez, uc3m
 
Research Data Management and the brave new world, By Paul Ayris
Research Data Management and the brave new world, By Paul AyrisResearch Data Management and the brave new world, By Paul Ayris
Research Data Management and the brave new world, By Paul Ayris
 
How can we ensure research data is re-usable? The role of Publishers in Resea...
How can we ensure research data is re-usable? The role of Publishers in Resea...How can we ensure research data is re-usable? The role of Publishers in Resea...
How can we ensure research data is re-usable? The role of Publishers in Resea...
 
Liberating facts from the scientific literature - Jisc Digifest 2016
Liberating facts from the scientific literature - Jisc Digifest 2016Liberating facts from the scientific literature - Jisc Digifest 2016
Liberating facts from the scientific literature - Jisc Digifest 2016
 
SUNCAT: the next steps for the UK’s national serials catalogue
SUNCAT: the next steps for the UK’s national serials catalogueSUNCAT: the next steps for the UK’s national serials catalogue
SUNCAT: the next steps for the UK’s national serials catalogue
 
20130805 Activating Linked Open Data in Libraries Archives and Museums
20130805 Activating Linked Open Data in Libraries Archives and Museums20130805 Activating Linked Open Data in Libraries Archives and Museums
20130805 Activating Linked Open Data in Libraries Archives and Museums
 
Open by default: the challenges of research data in Europe
Open by default: the challenges of research data in EuropeOpen by default: the challenges of research data in Europe
Open by default: the challenges of research data in Europe
 
Why we care about research data? Why we share?
Why we care about research data? Why we share?Why we care about research data? Why we share?
Why we care about research data? Why we share?
 
LEARN Final Conference: Tutorial Group | Implementing the LEARN RDM Toolkit
LEARN Final Conference: Tutorial Group | Implementing the LEARN RDM ToolkitLEARN Final Conference: Tutorial Group | Implementing the LEARN RDM Toolkit
LEARN Final Conference: Tutorial Group | Implementing the LEARN RDM Toolkit
 
From Open Data to Open Science, by Geoffrey Boulton
 From Open Data to Open Science, by Geoffrey Boulton From Open Data to Open Science, by Geoffrey Boulton
From Open Data to Open Science, by Geoffrey Boulton
 
Research Data Management: a gentle introduction
Research Data Management: a gentle introductionResearch Data Management: a gentle introduction
Research Data Management: a gentle introduction
 
2013 DataCite Summer Meeting - Out of Cite, Out of Mind: Report of the CODATA...
2013 DataCite Summer Meeting - Out of Cite, Out of Mind: Report of the CODATA...2013 DataCite Summer Meeting - Out of Cite, Out of Mind: Report of the CODATA...
2013 DataCite Summer Meeting - Out of Cite, Out of Mind: Report of the CODATA...
 
The Challenges of Making Data Travel, by Sabina Leonelli
The Challenges of Making Data Travel, by Sabina LeonelliThe Challenges of Making Data Travel, by Sabina Leonelli
The Challenges of Making Data Travel, by Sabina Leonelli
 
Linked Open Data Approaches within the ARIADNE Project
Linked Open Data Approaches within the ARIADNE ProjectLinked Open Data Approaches within the ARIADNE Project
Linked Open Data Approaches within the ARIADNE Project
 
Winning the Tour de France, Research Data and Data Stewardship
Winning the Tour de France, Research Data and Data StewardshipWinning the Tour de France, Research Data and Data Stewardship
Winning the Tour de France, Research Data and Data Stewardship
 
The Importance of Metadata - EUDAT Summer School (Shaun de Witt, CCFE)
The Importance of Metadata - EUDAT Summer School (Shaun de Witt, CCFE)The Importance of Metadata - EUDAT Summer School (Shaun de Witt, CCFE)
The Importance of Metadata - EUDAT Summer School (Shaun de Witt, CCFE)
 
LEARN Final Conference: Tutorial Group | How To Engage Early Career Researchers
LEARN Final Conference: Tutorial Group | How To Engage Early Career ResearchersLEARN Final Conference: Tutorial Group | How To Engage Early Career Researchers
LEARN Final Conference: Tutorial Group | How To Engage Early Career Researchers
 
Now we are six: Integrating Edinburgh DataShare into local and internet in...
Now we are six: Integrating Edinburgh DataShare into local and internet in...Now we are six: Integrating Edinburgh DataShare into local and internet in...
Now we are six: Integrating Edinburgh DataShare into local and internet in...
 

Similar to SOC2002 Lecture 6

S2
S2S2
S2
kimsee
 
Research Data Management
Research  Data ManagementResearch  Data Management
Research Data Management
Mahmoud91Tx
 
Research Evaluation And Data Collection Methods
Research Evaluation And Data Collection MethodsResearch Evaluation And Data Collection Methods
Research Evaluation And Data Collection Methods
Jessica Robles
 
Finding and Using Secondary Data and Resources for Research
Finding and Using Secondary Data  and Resources for ResearchFinding and Using Secondary Data  and Resources for Research
Finding and Using Secondary Data and Resources for Research
Dr. Karen Whiteman
 
Behavioral Big Data & Healthcare Research
Behavioral Big Data & Healthcare ResearchBehavioral Big Data & Healthcare Research
Behavioral Big Data & Healthcare Research
Galit Shmueli
 
Project Estimation Techniques And Methods For The Data...
Project Estimation Techniques And Methods For The Data...Project Estimation Techniques And Methods For The Data...
Project Estimation Techniques And Methods For The Data...
Jennifer Baker
 
Surfing a Great Wave: Data Science and Global Health
Surfing a Great Wave: Data Science and Global HealthSurfing a Great Wave: Data Science and Global Health
Surfing a Great Wave: Data Science and Global Health
MEASURE Evaluation
 
Methods of data collection
Methods of data collectionMethods of data collection
Methods of data collection
Chintan Trivedi
 
Sdal air health and social development (jan. 27, 2014) final
Sdal air health and social development (jan. 27, 2014) finalSdal air health and social development (jan. 27, 2014) final
Sdal air health and social development (jan. 27, 2014) final
kimlyman
 
Principles of data_science
Principles of data_sciencePrinciples of data_science
Principles of data_science
tvk66866
 
Behavioral Big Data & Healthcare Research: Talk at WiDS Taipei
Behavioral Big Data & Healthcare Research: Talk at WiDS TaipeiBehavioral Big Data & Healthcare Research: Talk at WiDS Taipei
Behavioral Big Data & Healthcare Research: Talk at WiDS Taipei
Galit Shmueli
 
Managing Confidential Information – Trends and Approaches
Managing Confidential Information – Trends and ApproachesManaging Confidential Information – Trends and Approaches
Managing Confidential Information – Trends and Approaches
Micah Altman
 
Community profiling presenting your infomation
Community profiling  presenting your infomationCommunity profiling  presenting your infomation
Community profiling presenting your infomation
Tim Curtis
 
La ricerca scientifica nell'era dei Big Data - Sabina Leonelli
La ricerca scientifica nell'era dei Big Data - Sabina LeonelliLa ricerca scientifica nell'era dei Big Data - Sabina Leonelli
La ricerca scientifica nell'era dei Big Data - Sabina Leonelli
Ismel - Istituto per la Memoria e la Cultura del Lavoro, dell'Impresa e dei Diritti Sociali
 
Health Data Innovation (Wolfram Data Summit)
Health Data Innovation (Wolfram Data Summit)Health Data Innovation (Wolfram Data Summit)
Health Data Innovation (Wolfram Data Summit)
Peter Speyer
 
S4 pn
S4 pnS4 pn
Chapter 11 Survey DataOverview Identify the different ty.docx
Chapter 11 Survey DataOverview Identify the different ty.docxChapter 11 Survey DataOverview Identify the different ty.docx
Chapter 11 Survey DataOverview Identify the different ty.docx
cravennichole326
 
Economics Class 11 Model Paper Study Well
Economics Class 11 Model Paper Study WellEconomics Class 11 Model Paper Study Well
Economics Class 11 Model Paper Study Well
AvinAsisMiranda1
 
Adler clark 4e ppt 12
Adler clark 4e ppt 12Adler clark 4e ppt 12
Adler clark 4e ppt 12
arpsychology
 
Finding statistics2
Finding statistics2Finding statistics2
Finding statistics2
lmk7
 

Similar to SOC2002 Lecture 6 (20)

S2
S2S2
S2
 
Research Data Management
Research  Data ManagementResearch  Data Management
Research Data Management
 
Research Evaluation And Data Collection Methods
Research Evaluation And Data Collection MethodsResearch Evaluation And Data Collection Methods
Research Evaluation And Data Collection Methods
 
Finding and Using Secondary Data and Resources for Research
Finding and Using Secondary Data  and Resources for ResearchFinding and Using Secondary Data  and Resources for Research
Finding and Using Secondary Data and Resources for Research
 
Behavioral Big Data & Healthcare Research
Behavioral Big Data & Healthcare ResearchBehavioral Big Data & Healthcare Research
Behavioral Big Data & Healthcare Research
 
Project Estimation Techniques And Methods For The Data...
Project Estimation Techniques And Methods For The Data...Project Estimation Techniques And Methods For The Data...
Project Estimation Techniques And Methods For The Data...
 
Surfing a Great Wave: Data Science and Global Health
Surfing a Great Wave: Data Science and Global HealthSurfing a Great Wave: Data Science and Global Health
Surfing a Great Wave: Data Science and Global Health
 
Methods of data collection
Methods of data collectionMethods of data collection
Methods of data collection
 
Sdal air health and social development (jan. 27, 2014) final
Sdal air health and social development (jan. 27, 2014) finalSdal air health and social development (jan. 27, 2014) final
Sdal air health and social development (jan. 27, 2014) final
 
Principles of data_science
Principles of data_sciencePrinciples of data_science
Principles of data_science
 
Behavioral Big Data & Healthcare Research: Talk at WiDS Taipei
Behavioral Big Data & Healthcare Research: Talk at WiDS TaipeiBehavioral Big Data & Healthcare Research: Talk at WiDS Taipei
Behavioral Big Data & Healthcare Research: Talk at WiDS Taipei
 
Managing Confidential Information – Trends and Approaches
Managing Confidential Information – Trends and ApproachesManaging Confidential Information – Trends and Approaches
Managing Confidential Information – Trends and Approaches
 
Community profiling presenting your infomation
Community profiling  presenting your infomationCommunity profiling  presenting your infomation
Community profiling presenting your infomation
 
La ricerca scientifica nell'era dei Big Data - Sabina Leonelli
La ricerca scientifica nell'era dei Big Data - Sabina LeonelliLa ricerca scientifica nell'era dei Big Data - Sabina Leonelli
La ricerca scientifica nell'era dei Big Data - Sabina Leonelli
 
Health Data Innovation (Wolfram Data Summit)
Health Data Innovation (Wolfram Data Summit)Health Data Innovation (Wolfram Data Summit)
Health Data Innovation (Wolfram Data Summit)
 
S4 pn
S4 pnS4 pn
S4 pn
 
Chapter 11 Survey DataOverview Identify the different ty.docx
Chapter 11 Survey DataOverview Identify the different ty.docxChapter 11 Survey DataOverview Identify the different ty.docx
Chapter 11 Survey DataOverview Identify the different ty.docx
 
Economics Class 11 Model Paper Study Well
Economics Class 11 Model Paper Study WellEconomics Class 11 Model Paper Study Well
Economics Class 11 Model Paper Study Well
 
Adler clark 4e ppt 12
Adler clark 4e ppt 12Adler clark 4e ppt 12
Adler clark 4e ppt 12
 
Finding statistics2
Finding statistics2Finding statistics2
Finding statistics2
 

More from Bonnie Green

SOC2002 Lecture 11
SOC2002 Lecture 11SOC2002 Lecture 11
SOC2002 Lecture 11
Bonnie Green
 
SOC2002 Lecture 1
SOC2002 Lecture 1SOC2002 Lecture 1
SOC2002 Lecture 1
Bonnie Green
 
SOC2002 Lecture 7
SOC2002 Lecture 7SOC2002 Lecture 7
SOC2002 Lecture 7
Bonnie Green
 
SOC2002 Lecture 3
SOC2002 Lecture 3SOC2002 Lecture 3
SOC2002 Lecture 3
Bonnie Green
 
SOC2002 Lecture 5
SOC2002 Lecture 5SOC2002 Lecture 5
SOC2002 Lecture 5
Bonnie Green
 
SOC2002 Lecture 4
SOC2002 Lecture 4SOC2002 Lecture 4
SOC2002 Lecture 4
Bonnie Green
 
SOC2002 Lecture 10
SOC2002 Lecture 10SOC2002 Lecture 10
SOC2002 Lecture 10
Bonnie Green
 
SOC2002 Lecture 13
SOC2002 Lecture 13SOC2002 Lecture 13
SOC2002 Lecture 13
Bonnie Green
 
SOC2002 Lecture 12
SOC2002 Lecture 12SOC2002 Lecture 12
SOC2002 Lecture 12
Bonnie Green
 
SOC2002 Lecture 9
SOC2002 Lecture 9SOC2002 Lecture 9
SOC2002 Lecture 9
Bonnie Green
 
SOC2002 Lecture 2
SOC2002 Lecture 2SOC2002 Lecture 2
SOC2002 Lecture 2
Bonnie Green
 
SOC2002 Lecture 8
SOC2002 Lecture 8SOC2002 Lecture 8
SOC2002 Lecture 8
Bonnie Green
 

More from Bonnie Green (12)

SOC2002 Lecture 11
SOC2002 Lecture 11SOC2002 Lecture 11
SOC2002 Lecture 11
 
SOC2002 Lecture 1
SOC2002 Lecture 1SOC2002 Lecture 1
SOC2002 Lecture 1
 
SOC2002 Lecture 7
SOC2002 Lecture 7SOC2002 Lecture 7
SOC2002 Lecture 7
 
SOC2002 Lecture 3
SOC2002 Lecture 3SOC2002 Lecture 3
SOC2002 Lecture 3
 
SOC2002 Lecture 5
SOC2002 Lecture 5SOC2002 Lecture 5
SOC2002 Lecture 5
 
SOC2002 Lecture 4
SOC2002 Lecture 4SOC2002 Lecture 4
SOC2002 Lecture 4
 
SOC2002 Lecture 10
SOC2002 Lecture 10SOC2002 Lecture 10
SOC2002 Lecture 10
 
SOC2002 Lecture 13
SOC2002 Lecture 13SOC2002 Lecture 13
SOC2002 Lecture 13
 
SOC2002 Lecture 12
SOC2002 Lecture 12SOC2002 Lecture 12
SOC2002 Lecture 12
 
SOC2002 Lecture 9
SOC2002 Lecture 9SOC2002 Lecture 9
SOC2002 Lecture 9
 
SOC2002 Lecture 2
SOC2002 Lecture 2SOC2002 Lecture 2
SOC2002 Lecture 2
 
SOC2002 Lecture 8
SOC2002 Lecture 8SOC2002 Lecture 8
SOC2002 Lecture 8
 

Recently uploaded

Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Zilliz
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Zilliz
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Vladimir Iglovikov, Ph.D.
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 

Recently uploaded (20)

Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 

SOC2002 Lecture 6

  • 1. SOC2002: Sociological Analysis and Research Methods LECTURE 6: Data Collection (2) Secondary data Lecturer: Bonnie Green [email_address]
  • 2. The research process: today… Reporting Topic/Object 1 2 3 4 5 6 LECTURES 5, 6, 7, 9 & 10 Research question Research design Data collection Data analysis Interpretation Literature review, and/or field reconnaissance Choosing indicators & Project Planning Ethics Quality
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.