Chapter: research methodology Essay

Chapter: research methodology Essay

The research was executed using forms as the key tool of information collection. Forms were employed for the research for the reason that the research focused on areas and questions that could not be placed across verbally through selection interviews. Advantages of applying questionnaires. Questionnaires have the benefit of privacy and secrecy. These people were chosen to get the research due to nature of the subject of research (Furedi 2007). Terrorism is a trend that does not go well with many people in Yemen especially after the 2006 attack. Through the use of forms, the investigator is able to always be guaranteed honest and accurate answers as opposed to other strategies of data collection. A total of 304 replies were received from the persons. This was a good number and confirmed that many participants appreciated the subject of research. Forms are also used since they are easy to be taken by the respondents. The type of terminology used in the questionnaires is straightforward and easy to understand. Many participants tend to prefer the usage of questionnaires as they provide them with ease in trying to response the questions posed to them (Toolis 2005). Additionally they enjoy the advantage of giving the respondent time for you to reflect on the actual had forgotten and give a solution that they think is right instead of being hurried into giving answers with no reflecting about them or without being given a chance to think. If the respondent is given time to analysis and reflect on what they had forgotten, chances are that he is likely to give informed answers, opinions and vies. Disadvantages of questionnaires. In some conditions, questionnaires could be of demerit to both the researcher plus the respondent. A few questions inside the questionnaires require explanations by researcher. This kind of explanations are normally not accessible as the researchers are not within reach. Such interruptions may cause the respondent to offer information that is not related to the questions asked as a result of misinterpretation of the queries. If this kind of a situation occurs, the researcher is likely to lose out inside the area where the question was asked and decide both to let it stay out or perhaps conduct the session once again. The other disadvantage of questionnaires is that, they want time for the exercise to be a success. Drafting of the questions, sending the forms to the participants, filing in the questionnaires and sending these people back to the researcher will take some time which usually would have been used in various other useful areas concerning the exploration. It is evident that respondents will tend to take some time prior to responding to the questionnaires posted or brought to them. The other drawback is that whenever using questionnaires, they are bound to fail to find a way out or enter into wring hands (Furedi 2007). When they are submitted by the participants, they might fail to find a way out along the way but not reach the researcher by any means. In some cases, they could get into wrong hands as a result exposing what was meant to be privateness between the researcher and the surveys takers. Such cases could lead to infringement of contract as the respondent has been promised that whatever he says will be confidential to the two of all of them. On the other hand, the knowledge contained in the questionnaires might also end up being distorted before it reaches the specialist. This could also lead to deceit of the info by the researcher thus bringing about wrong conclusions and bogus recommendations about the subject matter in debate. Secondary Types of data collection. A variety of resources were used in info collection pertaining to the research. Such sources included the CNY’s post-incidence report, documents which as educational in character, government press announcements and firms, the Internet, CNY intranet and other sources that have been deemed suit for your research (Cachon 2007). Secondary sources of data collection were used mainly to boost the outcomes with the literature assessment. The fear of crime and terrorist episodes were resolved partially by secondary resources rather than the main sources. There is certainly information that could not be found using primary sources of data collection. These details included the of terrorist attacks in Yemen and other relevant past accounts in as far as terrorism is concerned. Books and periodicals were used closely because they were seen as the most trustworthy and essential sources of data collection. The web came in especially where earlier researches were to be used in the writing of the literature review and other parts of the research. Educational materials had been used specifically where there was need to evaluate the sights of various other scholars against those in the research. This sort of views had been so helpful as they provided direction and focus for the research in situations where that thought to be moving away from way (Cachon 2007). Preventing terrorism, just how terrorism has become dealt with before, how additional countries react to terrorism, the effect of terrorism among other issues were addressed by the secondary data. It is therefore vital that you say that secondary data wasn't able to be overlooked in any way by the research. How a research was tackled. When ever determining on how th study was to end up being conducted, concerns such as interacting with the target, the price of the research as well as the time available for the research had been taken into consideration. The strategy of doing the research was one that was intended focus on the whole CNY’s employees employed in Yemen, along with direct contractors working for CNY. This offered an approximate target of about one thousand employees intended for the research. The operating composition in Yemen was broken into two field structured facilities, a storage fatal on Yemen’s coast and a head office situated in Sana’a (Lakdawalla 2004). The several locations were part of the human population that was targeted by research. Your research tackled the intended analysis problem through the use of survey analysis, reinforced simply by interviews and research that also in the archives. These kinds of a wide field allowed the researcher to gather information that was all inclusive getaways and representative. More and more study data was gathered through a CNY intranet, forms that were do it yourself completed, interviews that were one on one and other resources that were aimed at reinforcing the quantitative info gathered with qualitative info and info available. Because of the nature with the facilities as well as the number, it had been imperative to design an intranet based set of questions for the purposes of data collection and analysis. It was believed that all of the population in CNY experienced access to the company’s intranet, thus rendering it a more convenient and trusted tool to get data collection and research. It key advantage was that a large human population of people was able to be reached at a comparatively low cost. Customer survey design. Throughout the construction from the questionnaire, many elements had been taken into consideration by the researcher (Chapman 2000). The method was to decide the queries that were being asked, the wording and sequence with the questions in their precision an also the simplicity and complexity of the questions and wording. The questions had been phrased so that respondents found them straightforward and have an understanding of with the aim of them certainly not affecting the responses from the respondents. The questionnaires were also made private to the participants as a result of the cultural tenderness in Yemen. All the same, there was clearly a section to become completed with regards to whether the participants preferred to become interviewed of course, if so , data were finished by the researcher. It was however found out that respondents were more than willing to join the research especially after getting assured which the information they provided can be treated in confidence and that they would remain anonymous. Assortment and sample of the participants. Members by each office were picked and included both the Yemeni and the expatriates (Chapman 2000). They were equally asked separately if these people were willing to come with an interview that was face to face. A formal letter describing the objectives and the purpose of your research was mailed to those users that were chosen for the study. The rest of the targeted population was emailed while using same notification describing why the research had been conducted. Selection interviews were also done thereafter as they tend to provide you with the possibility of the researcher adjusting the line of questioning, then simply following up with interesting lines of investigation in a way that other forms of information collection methods cannot (Chapman 2000). A structured interview of around 45 minutes was conducted as part of the research collection procedure. The interviews were recorded to both mp3 and in note form. Due to the nature from the Yemeni traditions that discourages recording of interviews, take note had to be accepted as a safety net to the same. This was done for the Yemeni excellent and not intended for the expatriates. An email tip was give to the human population that was targeted fourteen days after the questionnaires had been given away. The simple guidelines were repeated after three weeks with the aim of making certain all the positions intended were covered. To avoid problems with the questionnaires as well as the interview style, the queries were operated on a little sample with the population that was just like the main studies respondents. Complications encountered inside the Research. There were various challenges encountered during the research. Problems included the ones that were found during the process of the research and others that came up during the system of data and analysis. Among the problems was your difficulty in effective people that the questionnaires and the interviews had been meant for exploration purposes but not any other hidden agenda (Pun 2002). Many of the targeted populace were a bit concerned about the intention of the research. Given that terrorism is a sensitive area of discussion especially in the public domain, it had been to be really hard to drive the actual home. The fear associated with terrorism made a large number of people shun away from the topic therefore leaving the researcher with very little option (Lowry 2002). There was as well the problem of finding the needed information. As a result of nature with the Yemeni tradition, many participants were not free of charge enough to offer information that they can thought was right. They will give details that they believed could match what the inquiries required but not the real and true position on the ground. This issue led to several information becoming discarded as it was vetted and found out it turned out unrealistic and never practical. The opinion in the respondents may change and in many cases contradict depending with the type of method collection tool employed. This was noticed in cases where both the forms and interviews were suited for one respondent at diverse times to get data collection. The problem of your energy was as well an issue. The research was to be achieved within a specific period of time. On this occasion was short considering the nature of the exploration that had been done. The respondents had been far from each other and this required time to have the ability to reach every one of them for the research. The process of data compilation and analysis took a lot of time because three hundred and 4 replys may be analysed. The analysis as well required a lot of data to be run using the SPSS system which was not familiar with the researcher. Consultations needed to be made with professionals in SPSS and other people who had a complete understanding of the actual program was all about (Lowry 2002). This kind of also got some time therefore affecting enough time scheduled for data examination. As a result, a few of the processes of information analysis had been crushed to ensure that some of the time could be employed for running of information and technology using the SPSS program (Kumar 2008). A defieicency of bureaucracy also posed a problem during the analysis. Getting authorization from the relevant authorities which included CPF, BAKPF, the head workplace at Sana’a and the airport terminal facility was so difficult. Characters had to be authored by the school time and again but nonetheless the supervision found it hard to allow the researcher to go ahead with the research. It had been only after several talks and pleading that finally the demand was approved. The top supervision feared the very fact that the analysis was aimed at inciting the employees in concerns related to terrorism. The effect with the 2006 assault by the terrorists was still new in people’s minds and it was feared that any mention of the term terrorism might trigger an atmosphere of fear and animosity. Examination and Results. The data accumulated was analysed independently for every single of the 4 CNY places in Yemen. Different procedures and concentrate on hardening pursuits were deployed at each area to meet the particular threat. Separate analysis of every location utilized to identify issues that were exceptional to each one as it would be easier to make specific tips for each site in terms of improvement (Lowry 2002). Data coming from national and expatriate employees also analysed independently with all the aim that separate analysis would make it easier to determine any ethnical and social differences that can arise between the employees and the fear of criminal offenses. The CNY information technology office will be utilized in moving data from the intranet for the analysis software. The specialist involved in this research was obviously a working for CNPY at this individual main discipline facility. The rotation was in five weeks’ work at Yemen and five weeks’ holiday in the United Kingdom. The rotation was meant for necessitating the almighty planning to make certain that all relevant data insight was complete and accessible during the responsibility. Al the employees in Yemen work in a similar rotation and thus it was essential to ensure that each of the back to back positions had access to the intranet with the purpose of enabling the completion of the questionnaires (Metz 2006). The job rotations as well had their own advantages including the lowering of the cost of vehicles as CNT transport and internal plane tickets would be employed by the investigator. There was as well the advantage of doing all the analysis on time and also the fact that data analysis, system and composing up of results would be carried out during the getaway. The researcher had a continual in Yemen who may assist with the sending from the late data from the questionnaires in the improbable event that it would be necessary.

Related Essays