Chat with us, powered by LiveChat SCH8110 Walden Qualitative and Quantitative Methods in Language Paper | Abc Paper
+1(978)310-4246 credencewriters@gmail.com
  

2 differents tasks to do, so please separate it by headings:1-Assignment: Annotation of a Quantitative Research ArticleSubmit: Annotation of a Quantitative Research ArticleThis week, you will submit the annotation of a quantitative research article on a topic of your interest.An annotation consists of three separate paragraphs that cover three respective components: summary, analysis, and application. These three components convey the relevance and value of the source. As such, an annotation demonstrates your critical thinking about, and authority on, the source. This week’s annotation is a precursor to the annotated bibliography assignment due in Week 10.An annotated bibliography is a document containing selected sources accompanied by a respective annotation of each source. In preparation for your own future research, an annotated bibliography provides a background for understanding a portion of the existing literature on a particular topic. It is also a useful first step in gathering sources in preparation for writing a subsequent literature review as part of a dissertation.Please review the assignment instructions below and click on the underlined works for information about how to craft each component of an annotation.It is recommended that you use the grading rubric as a self-evaluation tool before submitting your assignment.Annotate one quantitative research article from a peer-reviewed journal on a topic of your interest.Provide the reference list entry for this article in APA Style followed by a three-paragraph annotation that includes:A summaryAn analysisAn application as illustrated in this exampleFormat your annotation in Times New Roman, 12-point font, double-spaced. A separate References list page is not needed for this assignment.Submit your annotation.2-Discussion: Designing Quantitative ResearchResearchers consider validity and reliability with each new study they design. This is because validity and reliability are not fixed but rather reflect a particular study’s unique variables, research design, instruments, and participants.In the context of research design, two types of validity, which speak to the quality of different features of the research process, are considered: internal validity and external validity. Assuming that the findings of a research study are internally valid—i.e., the researcher has used controls to determine that the outcome is indeed due to manipulation of the independent variable or the treatment—external validity refers to the extent to which the findings can be generalized from the sample to the population or to other settings and groups. Reliability refers to the replicability of the findings.For this Discussion, you will consider threats to internal and external validity in quantitative research and the strategies used to mitigate these threats. You will also consider the ethical implications of designing quantitative research.Post an explanation of a threat to internal validity and a threat to external validity in quantitative research. Next, explain a strategy to mitigate each of these threats. Then, identify a potential ethical issue in quantitative research and explain how it might influence design decisions. Finally, explain what it means for a research topic to be amenable to scientific study using a quantitative approach.RESOURCES:Babbie, E. (2017) Basics of social research (7th ed.). Boston, MA: Cengage Learning.Chapter 3, “The Ethics and Politics of Social Research”Burkholder, G. J., Cox, K. A., & Crawford, L. M. (2016). The scholar-practitioner’s guide to research design. Baltimore, MD: Laureate Publishing.Chapter 7, “Quality Considerations”https://academicguides.waldenu.edu/researchcenter/…Rubric Detail Select Grid View or List View to change the rubric’s layout.Name: RSCH_8110_Week6_Discussion_RubricDescription: RSCH 7110 Discussion Rubric – RSCH 6110 Discussion RubricGrid ViewList View Show DescriptionsDiscussion Posting Content–POOR 0 (0%) – 10.4 (34.67%)Discussion posting demonstrates poor or no understanding of the concepts and key points of the text(s) and Learning Resources. Posting is incorrect and/or shallow, and/or does not include any pertinent examples or provide sufficient evidence from the readings.FAIR 10.5 (35%) – 11.9 (39.67%)Discussion posting demonstrates a fair understanding of the concepts and key points as presented in the text(s) and Learning Resources. Posting may be lacking or incorrect in some area, or in detail and specificity, and/or may not include sufficient pertinent examples or provide sufficient evidence from the readings.GOOD 12 (40%) – 13.4 (44.67%)Discussion posting demonstrates a good understanding of most of the concepts and key points presented in the text(s) and Learning Resources. Posting provides moderate detail (including at least one pertinent example), evidence from the readings and other scholarly sources, and discerning ideas.EXCELLENT 13.5 (45%) – 15 (50%)Discussion posting demonstrates an excellent understanding of all of the concepts and key points presented in the text(s) and Learning Resources. Posting provides significant detail (including multiple relevant examples), evidence from the readings and other scholarly sources, and discerning ideas.Peer Feedback and Interaction–POOR 0 (0%) – 6.9 (23%)Student does not interact with peers (0 points) or the response posting does not contribute to the quality of interaction by offering any constructive critiques, suggestions, questions, or additional resources.FAIR 7 (23.33%) – 7.9 (26.33%)Response posting is fair and partially contributes to the quality of interaction but offers insufficient constructive critiques or suggestions, shallow questions, or provides poor quality additional resources.GOOD 8 (26.67%) – 8.9 (29.67%)Response posting is good and partially contributes to the quality of interaction by offering adequate constructive critiques, suggestions, in-depth questions, additional resources, and stimulating thoughts and/or probes that draw from the readings and other scholarly sources.EXCELLENT 9 (30%) – 10 (33.33%)Response posting is excellent and fully contributes to the quality of interaction by offering substantive constructive critiques, suggestions, in-depth questions, additional resources, and stimulating thoughts and/or probes that draw from the readings and other scholarly sources.Writing–POOR 0 (0%) – 3.4 (11.33%)Postings are well below graduate-level writing style expectations for organization, scholarly tone, APA Style, and writing, or show heavy reliance on quoting.FAIR 3.5 (11.67%) – 3.9 (13%)Postings are somewhat below graduate-level writing style. Postings may be lacking in organization, scholarly tone, APA Style, and/or contain many writing and/or spelling errors, or show moderate reliance on quoting versus original writing and paraphrasing.GOOD 4 (13.33%) – 4.4 (14.67%)Postings are mostly consistent with graduate-level writing style. Postings may have some small organization, scholarly tone, writing, or APA Style issues, and/or may contain a few writing and spelling errors.EXCELLENT 4.5 (15%) – 5 (16.67%)Postings are well organized, use scholarly tone, contain original writing and proper paraphrasing, follow APA Style, contain very few or no writing and/or spelling errors, and are fully consistent with graduate-level writing style.Total Points: 30Name: RSCH_8110_Week6_Discussion_RubricDescription: RSCH 7110 Discussion Rubric – RSCH 6110 Discussion Rubric
week06_threatstointernalvalidity.pdf

research_ethics_planning_worksheet.docx

litmus_test_questions_fin_aug11.docx

Unformatted Attachment Preview

Research Theory, Design, and Methods
Walden University
Threats to Internal Validity
(Shadish, Cook, & Campbell, 2002)
1. Ambiguous temporal precedence. Based on the design, unable to determine
with certainty which variable occurred first or which variable caused the other.
Thus, unable to conclude with certainty cause-effect relationship. Correlation
of two variables does not prove causation.
2. Selection. The procedures for selecting participants (e.g., self-selection or
researcher sampling and assignment procedures) result in systematic
differences across conditions (e.g., experimental-control). Thus, unable to
conclude with certainty that the “intervention” caused the effect; could be due
to way in which participants are selected.
3. History. Other events occur during the course of treatment that can interfere
with treatment effects and could account for outcomes. Thus, unable to
conclude with certainty that the “intervention” caused the effect; could be due
to some other event to which the participants were exposed.
4. Maturation. Natural changes that participants experience (e.g., grow older,
get tired) during the course of the intervention could account for the
outcomes. Thus, unable to conclude with certainty that the “intervention”
caused the effect; could be due to the natural change/maturation of the
participants.
5. Regression artifacts. Participants who are at extreme ends of the measure
(score higher or lower than average) are likely to “regress” toward the mean
(scores get lower or higher, respectively) on other measures or retest on
same measure. Thus, regression can be confused with treatment effect.
6. Attrition (mortality). Refers to dropout or failure to complete the
treatment/study activities. If differential dropout across groups (e.g.,
experimental-control) occurs, could confound the results. Thus, effects may
be due to dropout rather than treatment.
7. Testing. Experience with test/measure influences scores on retest. For
example, familiarity with testing procedures, practice effects, or reactivity can
influence subsequent performance on the same test.
8. Instrumentation. The measure changes over time (e.g., from pretest to
posttest), thus making it difficult to determine if effects or outcomes are due to
instrument vs. treatment. For example, observers change definitions of
behaviors they are tracking, or the researcher alters administration of test
items from pretest to posttest.
9. Additive and interactive effects of threats to validity. Single threats interact,
such that the occurrence of multiple threats has an additive effect. For
example, selection can interact with history, maturation, or instrumentation.
© 2016 Laureate Education, Inc.
Page 1 of 2
Research Theory, Design, and Methods
Walden University
Reference
Shadish, W. R., Cook, T. D., & Campbell, D. T. (2002). Experimental and quasiexperimental designs for generalized causal inference. Boston, MA:
Houghton-Mifflin.
© 2016 Laureate Education, Inc.
Page 2 of 2
RESEARCH ETHICS PLANNING WORKSHEET
This worksheet is designed to help a student researcher anticipate and manage possible ethical concerns
that are relevant to planning and executing a study. After proposal approval, the 40 ethical standards below
will be used by the IRB (Institutional Review Board) to evaluate your study.
INSTRUCTIONS: To ensure a smooth ethics review, build your proposal and your research design so that
the answer to each question below is “yes.” You should be as objective and self-critical as possible during
this self-evaluation in order to spot and resolve any potential ethical challenges in advance.
Researchers proposing to complete research in the following specialized areas should first review the
relevant research ethics FAQs on the IRB website:
Clinical or Intervention Research
Educational Research
International Research
Research in One’s Own Workplace
Research about Bullying or Other Potential Issues Related to Safety
If you don’t know how to address one of the ethical standards below, just email IRB@mail.waldenu.edu for
support or join the IRB office hours at one of the posted times.
Hover the mouse over the blue footnoted words to view tips
and definitions.
The first 13 questions apply to all studies (even when the researcher is not interacting with participants to
collect new data).
Answer each question below with yes, no, or N/A.
If you cannot easily answer “yes” or “N/A” to
each of the ethical standards below, then you
probably need to build extra protections into your
research procedures.
a
1. Has each data collection step been articulated in the
method section of the proposal?
2. Will the research procedures ensure privacyb during data
collection?
3. Will data be stored securelyc?
4. Will the data be stored for at least 5 years?
5. If participants’ names or contact info will be recorded in
the research records, are they absolutely necessaryd?
6. The research procedures and analysis/writeup plans must
include all possible measures to ensure that participant
identities are not directly or indirectlye disclosed.
a. For research topics that might involve some stigma
(i.e., workplace bullying): Can you confirm that the
volunteering and data collection process will not result
in others learning of your volunteers’ participation in
the study?
b. For all topics: If participant demographic details (i.e.,
age, ethnicity, number of years in a position) are going
to be shared in the final results, will they be shared in a
manner that will not render certain participants
identifiable?
c. For all topics: The standard for Walden capstones is
to NOT name the partner organization. Will you mask
the identity of any partner organizations that are
playing a role in data collection and/or identification of
potential participants?
Exceptions to the organization-masking practice must
be granted by the Program Director (via Prospectus
Review) and approved by the IRB.
7. Have confidentiality agreementsf been signed by anyoneg
who may view data that that contains identifiers? (e.g.,
transcriber, translator)
8. Has the researcher articulated a specific planh for sharing
results with the participants and community stakeholders?
9. Have all potential psychologicali, relationshipj, legalk,
economic/professionall, physicalm, and other risks been fully
acknowledgedn and described?
10. Have the above risks been minimized as much as
possible? Are measures in place to provide participants with
reasonable protection from loss of privacy, distress,
psychological harm, economic loss, damage to professional
reputation, and physical harm?
11. Has the researcher proactively managed any potential
conflicts of interesto?
12. Are the research risks and burdensp reasonable, in
consideration of the new knowledgeq that this research
design can offer?
13. Is the research site willingr to provide a Letter of
Cooperation and/or Data Use Agreement granting
permissions for all relevant datat access, access to
participants, facility use, and/or use of personnel time for
research purposes? IRB staff will advise which type of site
agreement is needed. State whether you will be obtaining
written site approval before or after Walden IRB approval.
The remaining questions only apply to studies that involve recruiting participants to collect new data.
14. Is participant recruitment coordinated in a manner that is
non-coerciveu? Coercive elements include: recruiting in a
groupv setting, extravagant compensation, recruiting
individuals in a context of their treatment or evaluationw,
etc. A researcher must disclose here whether/how the
researcher may already be known to the participants and
explain how perceptions of coerced research participation
will be minimizedx.
15. If vulnerabley individuals will be specifically sought out
as participants, is such targeted recruitment justifiedz by a
research design that will specifically benefit that vulnerable
group at large?
16. If vulnerableaa adults might happen to be included
(without the researcher’s knowledge), would their inclusion
be justifiedbb?
17. If anyone would be excluded from participating, is their
exclusion justified? Is their exclusion handled respectfully
and without stigmacc?
18. If the research procedures might reveal criminal activity
or child/elder abuse that necessitatesdd reporting, are there
suitable procedures in place for managing this?
19. If the research procedures might reveal or create an
acute psychological state that necessitates referral, are there
suitable procedures in place to manage this?
20. Does the research design ensure that all participants can
potentially benefit equallyee from the research?
21. Applicable for student researchers: Will this researcher
be appropriately qualifiedff and supervisedgg in all data
collection procedures?
22. If an existing survey or other data collection tool will be
used, has the researcher appropriately complied with the
requirementshh for legal usage?
Questions 23-40 pertain to the process of ensuring that potential participants make an informed decision
about the study, in accordance with the ethical principle of “respect for persons.”
23. Do the informed consentii procedures provide adequate
time to review the study information and ask questions
before giving consent?
24. Will informed consent be appropriatelyjj documented?
25. Is the consent form written using language that will be
understandablekk to the potential participants?
26. Does the consent form explain the sample’s inclusion
criteria in such a way that the participants can understand
how/why THEY are being asked to participate?
27. Does the consent form include an understandable
explanation of the research purpose?
28. Does the consent form include an understandable
description of the data collection procedures?
29. Does the consent form include an estimate of the time
commitmentll for participation?
30. Does the consent form clearly state that participation is
voluntary?
31. Does the consent form convey that the participant has
the right to decline or discontinue participation at any time?
When the researcher is already known to the participant, the
consent form must include written assurance that declining
or discontinuing will not negatively impact the participant’s
relationship with the researcher or (if applicable) the
participant’s access to services.
32. Does the consent form include a description of
reasonably foreseeable risksmm or discomforts?
33. Does the consent form include a description of
anticipated benefits to participantsnn and/or others?
34. Does the consent form describe any thank you gift(s),
compensation, or reimbursement (for travel costs, etc.) or
lack thereof?
35. Does the consent form describe how privacy will be
maintainedoo?
36. Does the consent form disclose all potential conflicts of
interest?
37. Does the consent document preserve the participant’s
legalpp rights?
38. Does the consent form explain how the participant can
contact the researcher and the university’s Research
Participant Advocate? (USA number 001-612-312-1210 or
email address irb@mail.waldenu.edu).
39. Does the consent form include a statement that the
participant should keep/print a copy of the consent form?
40. If any aspect of the study is experimental (unproven), is
that stated in the consent form?
FOOTNOTES:
a
In order to weigh potential risks against benefits, the researcher first needs to plan and clearly articulate all of the following that
apply:
how existing data or contact information of potential participants will be obtained,
format and context of the initial contact with potential participants,
informed consent procedures,
assignment to groups (if applicable),
description of any pilot activities,
data collection steps,
transcript review and/or membercheck (if applicable), and
how results will be shared with stakeholders.
b
Privacy risks might include unintended breach of confidential information (such as educational or medical records); being
observed/overheard by others while meeting researcher or providing data; or intrusion on the privacy of others who not involved in
study (e.g. participant’s family).
c
Secure data storage requires password protection on electronic files and locks for physical data.
d
Note that consent forms do not require signatures if the participant can indicate consent by some action such as clicking on a link,
returning a completed survey, etc.
e
Participant identities might be “indirectly” and unintentionally disclosed if a researcher’s final research report fails to withold
demographic details or site descriptions that might permit a reader to deduce the identity of a participant. So the researcher needs to
think about which demographic descriptors are most important to collect and report, while ensuring that the identity of individual
participants is protected. For example, readers would likely be able to deduce a participant’s identity if a qualitative analysis stated,
“One African-American vice-principal with 14 years of administrative experience described her professional development experience
as…” A general rule of thumb is to only include a particular demographic descriptor combination if at least 3 people have that
combination of demographic details. So if a district had 4 African-American vice-principals with 10+ years experience but only 2
were female, then an appropriate demographic description would be: “One African-American vice-principal with 10+ years of
administrative experience described the professional development experience as…”
f
A sample confidentiality agreement can be found on the IRB website.
g
Confidentiality agreements are required for transcribers or interpreters but not for the researcher or Walden faculty/staff who are
automatically bound to confidentiality. Some professional transcribers/statisticians/etc address confidentiality in their work agreement
and this is acceptable.
h
It is important that the format is audience-appropriate. Stakeholders may lack the time or inclination to digest a full research article
or dissertation. Typically a 1 to 2 page summary or verbal presentation is most appropriate.
i
Psychological risks include stress greater than what one would experience in daily life (e.g., materials or topics that could be
considered sensitive, offensive, threatening, degrading).
j
Relationship risks are present if the recruitment or data collection process are likely to alter the existing dynamics between the
researcher and participant (who may be coworkers or have some professional relationship), among participants (if they know one
another), or between the participant and the participant’s friends, coworkers, or family members.
k
Legal risks are present if data collection might result in a participant’s disclosure of violation of laws.
l
Economic/professional risks are present if data collection could result in the participant disclosing violation of workplace policies,
disagreement with leadership decisions, poor work performance, or anything else that could be damaging to the participant’s position,
professional reputation, promotability, or employability.
m
Physical risks are not common in social science research but would involve risk of serious physical injury.
n
Minimal risks are acceptable but must be identified upfront. Minimal risk is defined as when: “the probability and magnitude of
harm or discomfort anticipated in the research are not greater in and of themselves than those ordinarily encountered in daily life.”
o
A conflict of interest is caused when the researcher has some sort of dual role in the research context, such as being a teacher,
therapist, investor, business-owner, manager, etc. Conflict of interest must be managed to ensure that the research reveals “truth,” not
just the outcome that the researcher might desire to see due to their other role. The simplest way to ensure this impartiality is to
conduct research OUTSIDE of one’s own context but other methods are possible (e.g., using anonymous data collection to encourage
honest responses).
p
All research activities place some degree of burden on the participants by asking the participants to share personal information,
volunteer time, and assume risks.
q
Examples of “new knowledge” include: effectively addressing a gap in the literature, generating new theory, enhancing
understanding of a phenomenon, assessing effectiveness of a particular professional practice, addressing a local practical problem via
data analysis.
If a site requires the researcher to obtain Walden’s IRB approval before they can provide their written approval, that’s fine. (Walden can issue a “conditional IRB
approval” letter to the researcher and then Walden’s IRB approval will then be finalized once the Walden IRB receives the community partner’s letter of cooperation.)
s
No Letter of Cooperation is required (a) if the researcher will simply be asking organizations to distribute research invitations on the researcher’s behalf, or (b) if the
researcher is using only public means to identify/contact participants.
t
Note that when medical, educational, or business records would be analyzed or used to identify potential research participants, the site needs to explicitly approve
access to data for research purposes (even if the researcher normally has access to that data to perform their job).
r
u
For example, anonymous surveys and/or low-pressure communications such as email invitations permit potential participants to opt
out with minimal fear of retaliation or other negative consequences.
v
It is not ethically acceptable to invite a “captive audience” to participate in research on the spot (i.e., to ask an entire class or a group
of meeting attendees to complete a survey during their session). Such a dynamic would not provide sufficient privacy or respect for
their right to decline research participation. However, a researcher may use the last few minutes of a class session or meeting to
introduce a study and distribute materials, such that the potential participants can then take their time to decide later about
participation.
w
Generally, data collection cannot be approved during work hours or school hours unless a “free period” has been identified (e.g.,
lunch, study hall) so the research activities can be separated from the participants’ regular activities. It is important to maintain an “opt
in” dynamic rather than implying that employees/students/group members are expected to participate.
x
Doctoral research directly benefits the student (allowing him or her to obtain a degree), and so the researcher should minimize the
potential for either (a) conflict of interest or (b) perceived coercion to participate. Researchers who are in positions of authority or
familiarity must take extra precautions to ensure that potential participants are not pressured to take part in their study.
Examples:
-a professor researcher may recruit her students AFTER grades have been assigned
-a psychologist researcher may recruit clients from ANOTHER psychologist’s practice
-a manager researcher may conduct ANONYMOUS data collection so that subordinates do not perceive their responses or
[non]participation as being associated with their job standing
y
Vulnerable participants include students, patients, the researcher’s subordinates, children, prisoners, residents of any facility,
mentally/emotionally disabled individuals, crisis victims, or anyone else who might feel undue pressure to participate in the study or
be in any way limited in protecting their own best interests. Pregnant women (and their unborn children) are only considered a
vulnerable population when a study involves physically risky data collection.
z
Targetted recruitment of children as participants can only be approved when a majority of the IRB votes that the study’s benefits
justify its risks/costs (su …
Purchase answer to see full
attachment

error: Content is protected !!