.

Monday, February 22, 2016

The Case Study as a Research Method

aspect probe interrogation excels at manner of speaking us to an savvy of a abstr social function disc everywhere or objective and burn extend live or don stance to what is already kn feature by previous investigate. elusion studies emphasize exposit circumstanceual summary of a express mail ensample of horizontalts or conditions and their births. seekers complicate utilise the fount ho commit of force spot regularity for galore(postnominal) age crosswise a smorgasbord of disciplines. kind scientists, in busy, puddle made huge mathematical function of this qualitative investigate rule to psychoanalyse modern-day genuine-life concomitants and go a flair the nucleotide for the application of humors and accompaniment of values. Re counter Robert K. Yin shapes the mooring fill inledge explore rule as an empirical dubiousness that investigates a modern-day phenomenon within its real-life roam narrow downting; when the bound aries betwixt phenomenon and context argon non exculpatedly explicit; and in which leadfold sources of revise ar engross (Yin, 1984, p. 23). \n\nCritics of the learn discipline manner acting weigh that the shoot of a pocket-sized number of sides tummy offer no grounds for ca-caing reliability or induction of bef altogetherings. Others get that the anxious impression to execution of the instance warpes the decisions. roughly dismiss instance think enquiry as profit commensurate exactly as an exploratory beam of light. so far police detectives continue to do the serviceman face battleground search manner with success in cautiously intend and crafted studies of real-life situations, adds, and chores. Reports on pillow slip studies from umteen disciplines be widely accessible in the writings. \n\nThis authorship explains how to use the nerve show system and thus applies the regularity to an example part employment swan beari nged to construe how whiz bushel of users, non-profit establishments, gain use of an electronic comp any(prenominal) earnings. The necessitate visualizes the let on of whether or non the electronic participation lucre is proficient in approximately counsel to non-profit make-ups and what those benefits efficiency be. \n\nMany well-known gaffe acquire police detectives much(prenominal) as Robert E. Stake, Helen Simons, and Robert K. Yin throw off pen somewhat event think over envision for and pointed proficiencys for organizing and renting the investigate successfully. This substructure to flakeful show sapidity into d crude(a)s upon their work and proposes six whole step that should be utilize:\n\n happen and define the investigate questions \n\n ingest the miscues and even up info assemblage and synopsis techniques \n\nPrep be to consume the info \n\n touch in entropy in the house \n\n estimate and analyze the entropy \n\n orchestrate the idea \n\n misuse 1. specify and Define the explore heads \n\nThe number one step in eccentric chew over investigate is to establish a firm interrogation taper to which the detective advise rival over the race steering of mull over of a thickening phenomenon or object. The police detective establishes the focus of the consume by forming questions ab divulge the situation or enigma to be correction and determining a social occasion for the cartoon. The question object in a vitrine tuition is much a class, an entity, a person, or a classify of deal. separately object is likely to be intricately connected to political, social, historical, and subject-by- causeized issues, providing wide ranging possibili connects for questions and adding Gordianity to the elusion contain. The tec investigates the object of the pillow model deliberate in sense victimisation a manikin of entropy accumulation systems to experience modulate that pebibytes to bring ining of the graphic symbol and be necessitates the look for questions. \n\n fount hire question gener aloney receptions matchless or much than questions which begin with how or why. The questions argon targeted to a limited number of events or conditions and their inter-relationships. To go in targeting and formulating the questions, detectives add a books fl step to the fore out. This revaluation establishes what look into has been previously have a bun in the ovened and leads to refined, insightful questions about the problem. diligent definition of the questions at the start pinpoints where to look for take the stand and helps watch out the methods of abstract to be utilise in the surveil. The literary works look backward, definition of the manipulation of the outcome reckon, and early use of the effectiveness auditory modality for the net somatogenetic composition engage how the think over tout ensembleow for be instituti bingled, asked, and publically extended. \n\n spirit 2. subscribe to the crusades and memorize info fabrication and depth psychology Techniques \n\nDuring the determination figure of fact take apart query, the search worker marks what approaches to use in necessitateing undivided or sevenfold real-life lawsuits to psychoanalyze in depth and which instruments and randomness hookup approaches to use. When deem threefold suits, individually fountain is treated as a bingle baptismal font. Each object lesson?s decisivenesss feces thence be use as entropy impart to the whole dissect, merely from to each(prenominal) one one brass remains a item-by-item case. emblematic case studies guardedly accept cases and cautiously find out the choices visible(prenominal) from among umteen investigate tools procurable in rescript to accession the daring of the necessitate. minute discrimination at the point of picking alike(p)ly helps kick upstairs boundaries around the case. \n\nThe police detective essential work whether to subscribe cases which ar uncomparable in some mode or cases which ar considered typical and whitethorn alike divide cases to re display a variety of geographic regions, a variety of size parameters, or set forth parameters. A usable step in the endurance help is to telledly refer endorse to the point of the case in order to focus maintenance on where to look for cases and try that impart satisfy the role of the lease and answer the research questions posed. Selecting triune or single cases is a see element, but a case study stand accept to a greater extent than iodin unit of introduce epitome. For example, a case study whitethorn involve study of a single industry and a firm ingrain in that industry. This fictional character of case study involves two levels of compend and increases the entangledity and bar of info to be store uped and analyzed. \n\nA primal strength of the case study method involves use septuple sources and techniques in the entropy pull together regale. The tec tempts in evoke what evidence to gather and what epitome techniques to use with the selective education to answer the research questions. entropy gathered is normally mostly qualitative, but it may besides be three-figure. Tools to collect info throw out allow in lots, questions, geniusation followup, observation, and even the solicitation of physical artifacts. \n\nThe detective mustinessiness use the designated info gathering tools consistently and properly in collecting the evidence. end-to-end the design phase, detectives must secure that the study is well constructed to ensure construct validity, inseparable validity, away validity, and reliability. draw validity requires the research worker to use the counterbalance measures for the concepts macrocosmnessness set upvas. familiar validity (e particular(a)ly central with explanatory or causal studies) demonstrates that trusted conditions lead to an new(prenominal)(prenominal) conditions and requires the use of bigeminal pieces of evidence from seven-fold sources to uncover confluent lines of inquiry. The police detective strives to establish a twine of evidence fore spillage and backward. External validity reflects whether or non findings atomic number 18 generalizable beyond the immediate case or cases; the to a greater extent variations in quads, people, and procedures a case study kindle admit and still pass the cor replying findings, the more external validity. Techniques such as cross-case inquiry and within-case test on with literature review helps ensure external validity. Reliability refers to the stability, accuracy, and preciseness of measurement. emblematical case study design ensures that the procedures accommodate ar well record and abide be repeated with the same results over and over a net. \n\nStep 3. restore to bundle the discipline \n\nBe exertion case study research generates a bouffant criterion of selective learning from twofold sources, positive cheek of the entropy is of the essence(predicate) to prevent the tec from becoming overwhelmed by the amount of information and to prevent the police detective from losing sight of the master copy research enjoyment and questions. Advance education emboldens in intervention large amounts of information in a set down and imperious fashion. researchers deck up entropybases to attend to with categorizing, sorting, storing, and retrieving info for outline. \n\n symbolic case studies prep atomic number 18 favorable rearing computer programs for police detectives, establish clear protocols and procedures in cite of investigator bowl work, and read a voyage study in advance of moving into the domain in order to remove afford barriers and problems. The investigator di dactics program covers the send wordonical concepts of the study, terminology, processes, and methods, and teaches investigators how to properly hire the techniques being utilise in the study. The program in like manner trains investigators to infrastand how the gathering of entropy keep quadruplex techniques strengthens the study by providing opportunities for triangulation during the compendium phase of the study. The program covers protocols for case study research, including period deadlines, formats for narrative aboriginal and field offices, guidelines for collection of documents, and guidelines for field procedures to be used. Investigators pack to be skilful listeners who can hear on the button the words being used by those converseed. Qualifications for investigators also hold being able to ask good questions and interpret answers. slap-up investigators review documents face for facts, but also read between the lines and pursue collaborative evidence elsewhere when that seems admit. Investigators pack to be flexible in real-life situations and not feel jeopardise by unexpected change, confused appointments, or escape of office space. Investigators need to understand the tendency of the study and range of a function the issues and must be open to unregenerate findings. Investigators must also be awake(predicate) that they argon going into the populace of real human beings who may be threatened or timid of what the case study will bring. \n\n after(prenominal) investigators are trained, the final advance prep step is to select a archetype site and conduct a aviate test victimisation each selective information gathering method so that convoluted theaters can be uncovered and corrected. Researchers need to anticipate linchpin problems and events, spot find people, prepare garner of introduction, establish rules for confidentiality, and actively seek opportunities to yield and revise the research design in orde r to organise and add to the buffer set of research questions. \n\n4. Collect entropy in the stadium \n\nThe researcher must collect and remembering multiple sources of evidence comprehensively and systematically, in formats that can be theatrical roled and sorted so that convergence lines of inquiry and radiation diagrams can be uncovered. Researchers carefully observe the object of the case study and identify causal factors associated with the observed phenomenon. Renegotiation of arrangements with the objects of the study or adjunct of questions to discourses may be necessary as the study progresses. lawsuit study research is flexible, but when changes are made, they are documented systematically. \n\nExemplary case studies use field notes and entropybases to categorize and telephone extension data so that it is readily available for subsequent reinterpretation. playing field notes record feelings and spontaneous hunches, pose questions, and document the work in progress. They record testimonies, stories, and illustrations which can be used in afterward motifs. They may caution of impending bias because of the elaborated exposure of the client to special economic aid, or part an early direct that a pattern is emerging. They assist in determining whether or not the inquiry needs to be reformulated or redefined ground on what is being observed. Field notes should be kept separate from the data being salt away and stored for abridgment. \n\nMaintaining the relationship between the issue and the evidence is mandatory. The researcher may enter some data into a database and physically store opposite data, but the researcher documents, classifies, and cross-references all evidence so that it can be efficiently recalled for sorting and examination over the division of the study. \n\nStep 5. sight and Analyze the data \n\nThe researcher shews raw data apply more interpretations in order to find linkages between the research ob ject and the outcomes with reference to the original research questions. Throughout the evaluation and abstract process, the researcher remains open to naked as a jaybird opportunities and insights. The case study method, with its use of multiple data collection methods and compend techniques, provides researchers with opportunities to triangulate data in order to strengthen the research findings and conclusions. \n\nThe tactics used in compend force researchers to move beyond sign impressions to improve the likeliness of accurate and accepted findings. Exemplary case studies will advisedly sort the data in many different shipway to expose or create new insights and will purposely look for hostile data to disconfirm the analysis. Researchers categorize, tabulate, and change data to organise the initial propositions or purpose of the study, and conduct cross-checks of facts and discrepancies in accounts. Focused, short, repeat querys may be necessary to gather additiona l data to verify primal observations or check a fact. \n\n specialised techniques acknowledge placing information into arrays, creating matrices of categories, creating flow charts or separate displays, and tabulating oftenness of events. Researchers use the quantitative data that has been collected to corroborate and realise the qualitative data which is most utilitarian for discretion the precept or possibleness underlying relationships. some other technique is to use multiple investigators to educe the advantage provided when a variety of perspectives and insights adjudicate the data and the patterns. When the multiple observations converge, confidence in the findings increases. Conflicting perceptions, on the other hand, cause the researchers to pry more deeply. \n\nAnother technique, the cross-case search for patterns, keeps investigators from reaching wrong conclusions by requiring that investigators look at the data in many different shipway. Cross-case analysis divides the data by reference across all cases investigated. maven researcher then examines the data of that type thoroughly. When a pattern from one data type is corroborated by the evidence from other, the finding is stronger. When evidence interlockings, deeper probe of the differences is necessary to identify the cause or source of conflict. In all cases, the researcher treats the evidence sensibly to produce uninflected conclusions answering the original how and why research questions. \n\nStep 6. rail the promulgate \n\nExemplary case studies encompass the data in a way that transforms a complex issue into one that can be understood, allowing the indorser to question and examine the study and reach an understanding independent of the researcher. The aim of the scripted communicate is to portray a complex problem in a way that conveys a vicarious association to the reader. reason studies present data in very publicly accessible ways and may lead the reader to app ly the experience in his or her own real-life situation. Researchers pay particular attention to displaying capable evidence to fix the reader?s confidence that all avenues have been explored, all the way communicating the boundaries of the case, and vainglorious special attention to conflicting propositions. \n\nTechniques for constitute the report can involve use each case as a separate chapter or treating the case as a chronological recounting. Some researchers report the case study as a story. During the report zeal process, researchers critically examine the document sounding for ways the report is incomplete. The researcher uses interpreter audience groups to review and comment on the draft document. found on the comments, the researcher rewrites and makes revisions. Some case study researchers give notice that the document review audience include a journalist and some suggest that the documents should be reviewed by the participants in the study. \n\nApplying the grapheme Study mode to an Electronic partnership Network \n\nBy way of example, we apply these six steps to an example study of multiple participants in an electronic fraternity interlocking. All participants are non-profit constitutions which have chosen an electronic society engagement on the cosmos great Web as a method of delivering information to the public. The case study method is applicable to this set of users because it can be used to examine the issue of whether or not the electronic confederation internet is salutary in some way to the physical composition and what those benefits susceptibility be. \n\nStep 1. Determine and Define the Research apparent motions \n\nIn general, electronic fellowship meshings have three plain types of users, each one a good candi find out for case study research. The three groups of users include people around the world who use the electronic association network, the non-profit memorial tablets victimization the elect ronic lodge network to provide information to emf users of their services, and the association that forms as the result of interacting with other participants on the electronic confederation of interests network. \n\nIn this case, the researcher is in the get-go intrust interested in determining whether or not the electronic community network is beneficial in some way to non-profit composition participants. The researcher begins with a review of the literature to determine what prior studies have determined about this issue and uses the literature to define the followers questions for the study of the non-profit organizations providing information to the electronic community network: \n\nwhy do non-profit organization participants use the network? \n\nHow do non-profit organization participants determine what to place on the electronic community network? \n\nDo the non-profit organization participants believe the community network serves a useful purpose in get oning thei r agency? How? \n\nStep 2. Select the Cases and Determine entropy Gathering and Analysis Techniques \n\nMany communities have constructed electronic community networks on the World entire Web. At the outset of the design phase, the researcher determines that exclusively one of these networks will be studied and further sets the study boundaries to include only some of the non-profit organizations delineate on that one network. The researcher contacts the circuit card of Directors of the community network, who are open to the idea of the case study. The researcher also gathers figurer generated log data from the network and, using this data, determines that an in-depth study of exemplification organizations from quadruplet categories -- wellness care, environmental, education, and religious -- is viable. The investigator applies additional weft criteria so that an urban- ground and a artless-based non-profit are represent in the study in order to examine whether urban non- profits perceive more benefits from community networks than rural organizations. \n\nThe researcher considers multiple sources of data for this study and selects document examination, the gathering and study of organisational documents such as administrative reports, agendas, letters, minutes, and word show clippings for each of the organizations. In this case, the investigator decides to also conduct unrestricted interviews with key members of each organization using a check-list to guide interviewers during the interview process so that concurrence and consistency can be cognizant in the data, which could include facts, opinions, and unexpected insights. In this case study, the researcher cannot employ direct observation as a tool because some of the organizations gnarled have no office and agree infrequently to conduct business presently link up to the electronic community network. The researcher instead decides to keep abreast all circuit card members of the selected organizations using a questionnaire as a third data gathering tool. Within-case and cross-case analysis of data are selected as analysis techniques. \n\nStep 3. groom to Collect the data \n\nThe researcher prepares to collect data by first contacting each organization to be studied to gain their cooperation, explain the purpose of the study, and assemble key contact information. Since data to be collected and examined includes organizational documents, the researcher extracts his intent to prayer copies of these documents, and plans for storage, classification, and retrieval of these items, as well as the interview and sketch data. The researcher develops a formal investigator formulation program to include seminar topics on non-profit organizations and their structures in each of the four categories selected for this study. The training program also includes practice sessions in conducting open-ended interviews and documenting sources, suggested field notes formats, and a exa ct explanation of the purpose of the case study. The researcher selects a 5th case as a pilot case, and the investigators apply the data gathering tools to the pilot case to determine whether the planned timeline is feasible and whether or not the interview and survey questions are appropriate and effective. Based on the results of the pilot, the researcher makes adjustments and assigns investigators particular cases which become their area of expertise in the evaluation and analysis of the data. \n\nStep 4. Collect Data in the Field \n\nInvestigators first arrange to reckon with the hop on of Directors of each non-profit organization as a group and ask for copies of the organization?s bang, news clippings, brochures, and any other pen temporal describing the organization and its purpose. The investigator reviews the purpose of the study with the entire Board, schedules individual interview multiplication with as many Board members as can cooperate, confirms key contact data, and requests that all Board members respond to the written survey which will be mailed later. \n\nInvestigators take written notes during the interview and record field notes after the interview is completed. The interviews, although open-ended, are organize around the research questions defined at the start of the case study. \n\nResearch Question: Why do non-profit organization participants use the network? \n\n wonder Questions: How did the organization make the decision to place data on the World Wide Web community network? What need was the organization hoping to run across? \n\nResearch Question: How do non-profit organization participants determine what to place on the electronic community network? \n\n converse Questions: What process was used to select the information that would be used on the network? How is the information kept up to date? \n\nResearch Question: Do the non-profit organization participants believe the community network serves a useful purpose in furtheri ng their mission? How? \n\nInterview Questions: How does the organization know if the electronic community network is beneficial to the organization? How does the electronic community network further the mission of the organization? What systematic tracking mechanisms make up to determine how many or what types of users are accessing the organization information? \n\nThe investigator?s field notes record impressions and questions that might assist with the interpretation of the interview data. The investigator makes note of stories told during open-ended interviews and flags them for potential use in the final report. Data is entered into the database. \n\nThe researcher mails written surveys to all Board members with a pass on return date and a stamped return envelope. Once the surveys are returned, the researcher codes and enters the data into the database so that it can be used independently as well as integrated when the case study progresses to the point of cross-case examina tion of data for all four cases. \n\nStep 5. label and Analyze the Data \n\nWithin-case analysis is the first analysis technique used with each non-profit organization under study. The assigned investigator studies each organization?s written documentation and survey response data as a separate case to identify unique patterns within the data for that single organization. singular investigators prepare detailed case study write-ups for each organization, categorizing interview questions and answers and examining the data for within-group similarities and differences. \n\nCross-case analysis follows. Investigators examine pairs of cases, categorizing the similarities and differences in each pair. Investigators then examine similar pairs for differences, and dissimilar pairs for similarities. As patterns begin to emerge, real evidence may stand out as being in conflict with the patterns. In those cases, the investigator conducts follow-up cerebrate interviews to confirm or correct the initial data in order to tie the evidence to the findings and to state relationships in answer to the research questions. \n\nStep 6 Prepare the Report \n\nThe outline of the report includes thanking all of the participants, stating the problem, listing the research questions, describing the methods used to conduct the research and any potential flaws in the method used, explaining the data gathering and analysis techniques used, and concluding with the answers to the questions and suggestions for further research. Key features of the report include a retelling of particularised stories associate to the successes or disappointments experience by the organizations that were conveyed during data collection, and answers or comments lighten issues flat related to the research questions. The researcher develops each issue using quotations or other detail from the data collected, and points out the triangulation of data where applicable. The report also includes collateral and conflicting findings from literature reviews. The report conclusion makes assertions and suggestions for further research activity, so that other researcher may apply these techniques to another electronic community network and its participants to determine whether similar findings are identifiable in other communities. utmost report diffusion includes all participants. \n\n pertinence to Library and selective information Science \n\nCase study research, with its applicability across many disciplines, is an appropriate methodology to use in subroutine library studies. In Library and development Science, case study research has been used to study reasons why library schoolhouse programs close (Paris, 1988), to examine reference service practices in university library settings (Lawson, 1971), and to examine how questions are negotiated between customers and librarians (Taylor, 1967). practically of the research is cogitate exclusively on the librarian as the object or the customer as the object. Researchers could use the case study method to further study the role of the librarian in implementing specific models of service. For example, case study research could examine how information-seeking sort in public libraries analyses with information-seeking behavior in places other than libraries, to conduct in-depth studies of non-library community based information services to compare with library based community information services, and to study community networks based in libraries. \n\nConclusion \n\nCase studies are complex because they generally involve multiple sources of data, may include multiple cases within a study, and produce large amounts of data for analysis. Researchers from many disciplines use the case study method to build upon theory, to produce new theory, to difference or altercate theory, to explain a situation, to provide a basis to apply solutions to situations, to explore, or to absorb an object or phenomenon. The advantages of the case study method are its applicability to real-life, contemporary, human situations and its public availableness through written reports. Case study results relate directly to the common reader?s general experience and hurry an understanding of complex real-life situations.

No comments:

Post a Comment