Survey Research Methods Approach Term Paper

PAGES
2
WORDS
619
Cite

¶ … measuring the variable of job satisfaction but not job performance. The survey is effective for the former because it is a measure of personal perception; the latter should be measured with FedEx's in-house performance appraisal systems. The disadvantage of the survey is that a worker is being asked his/her own perceptions of his/her own performance -- this is not the best way to measure performance. The Fort Wayne paper used the same approach, again introducing self-reflection bias to something that could have been measured objectively. FedEx in particular relies on objective data to evaluate its employees, so this was a missed opportunity on the part of the researcher. For questions about one's self, the survey method is strong, and thus ties directly to many of the research questions. The deduction approach to research uses the data to test the hypothesis, but then expands that out to more general conclusions. The advantage of this technique is that knowledge about greater truths can be gained. For example, the FedEx paper found that workers like the telecommuting arrangement. The survey allowed for an understanding of why, and it is believed that these reasons can be extrapolated to a broader population. Fort Wayne had a similar structure with different questions, but again seeks to extend its findings about empowerment to a broader population.

Both surveys relied on convenience sampling. This technique is easier to execute...

...

Another advantage of convenience sampling is that all the respondents come from the same organization, which makes it easier to compare their experiences. With different organizations, the empowerment or the telecommuting might be too different to allow for reasonable comparison. The downside of convenience sampling is that it is harder to extrapolate those results to the population at large. There might be, for example, firm-specific factors at FedEx may have influenced the results of that survey, such that its findings would not apply to other companies. Self-selection has its own problems, in that there may be biases in the types of people who self-select, and those biases can skew the results.
The survey design in the FedEx study used a Likert scale, which has value in rating non-discrete subjective responses. The survey design is also relatively easy to evaluate the results . The Fort Wayne paper did not outline the survey design. This scale is easy to work with, but also allows for fairly accurate reflection on the part of the survey respondents. They can easily understand the survey as well, which makes this a good technique when working with the average worker at either of these organizations.

With respect to my own paper, the Fort Wayne paper does not outline much about the research methodology. That paper tells what methodology was utilized, but does not provide specific details or rationale, so is…

Cite this Document:

"Survey Research Methods Approach" (2016, April 28) Retrieved April 16, 2024, from
https://www.paperdue.com/essay/survey-research-methods-approach-2155537

"Survey Research Methods Approach" 28 April 2016. Web.16 April. 2024. <
https://www.paperdue.com/essay/survey-research-methods-approach-2155537>

"Survey Research Methods Approach", 28 April 2016, Accessed.16 April. 2024,
https://www.paperdue.com/essay/survey-research-methods-approach-2155537

Related Documents

Today, social science researchers have a wide range of research methods available for criminology and criminal justice applications, divided generally between quantitative and qualitative methods. Although quantitative and qualitative research methods share some commonalities with respect to their overarching objectives, there are some fundamental differences involved that must be taken into account when selecting an optimal research strategy for a given research enterprise. The purpose of this paper was to

Steps in Content Analysis: There are ten steps in content analysis including: (1) copying and reading the transcript and making notes where pertinent information is located: (2) reviewing notes and making a list of the various information types located; (3) reading the list and categorizing each item and providing a description for what information has been identified; (4) identification of whether the categories are potentially linked and then listing the

Mixed methods research design is popular in many research settings because it offers a set of advantages as well as a flexibility that cannot be matched by other available methods. This method combines some of the features from both quantitative and qualitative research methods to create unique methods that can integrate many theoretical or conceptual frameworks. This analysis will use a case study form of a mixed methods approach from

Research Methods Literature Review A literature review on an identified research topic or issue is an important element when conducting a study regardless of whether the study employs qualitative, quantitative or mixed methods research design. The significance of conducting a literature review is attributable to the several functions and roles the review plays in the research process. Literature review is crucial when conducting a study because it’s a means of synthesizing

Descrptive Design Research Method and Design Proposal A research design is the approach utilized for a study used as a guide in gathering and analyzing data. There are two popular methods of research; qualitative and quantitative research methods. Qualitative research is an inductive, holistic, subjective, and process-oriented method technique employed to understand, interpret, describe, and establish a theory on a given topic, phenomena, or setting. Investigators employ this technique when their studies

Justifying Research Methods and Design Insider threats are one of the primary sources of risk to an enterprise network and to intellectual property. For decades, the internet security realm has been rather narrowly focused on pre-empting insider threats by mean of sophisticated architecture and conventional login identification barriers. More recently, internet communications and technology (ICT) experts have taken an active position by using technological capacity to identify risk patterns, and