Designing the Triangulation Approach to Address the Research Problem SLP
Module 4 – SLPSome of the words are clearly a part of their strategic mission and could be used to analyze transcripts from interviews later after you receive IRB approval.Here is an example using Dedoose to analyze transcripts on priorities in Information Security by Information Security Specialists. Here the scenario for this research is described to show you results from the Dedoose analysis.There were eleven propositions for insider threat for computer systems in an organization, and the propositions were evaluated in terms of importance and timing within an insider risk program. Seven volunteers participated in the research. The interviews were conducted over Zoom with the audio portion of the discussions recorded. Each of the participants was presented with the eleven propositions and discussed each in the interview. While the respondents are anonymous, Table 1 shows their demographics and role in setting up insider threat programs.Table 1Participant demographicsThe volunteers were recruited from the LinkedIn business networking platform. Over 70 individuals received invitations. Each invitation contained information about the purpose of the study, the fact that there would be a recorded interview, and that the research is carried out under applicable laws that govern research. The Informed Consent document was explained to prospective participants. Once they accepted the LinkedIn invitation, the respondents received a link to a Qualtrics survey containing the Informed Consent document. After they signed the Informed Consent form, it was possible to continue the research using the recorded interview. Of the 73 invitations sent, 25 of the individuals responded in the affirmative. Six withdrew their offer of participation, and others either did not sign the electronic copy of the Informed Consent or could not participate for some other reason. Seven volunteers were the final count of participants.The central discussion of the interviews was dictated by the research question and the eleven propositions. Those eleven propositions were predetermined as the overarching themes of the interviews. Each proposition was presented to the volunteers one at a time, and then the subject stated their judgments. By signing the informed consent, the subject agreed to the Zoom interview and to have the audio of the interview recorded. Recording the discussions allowed detailed analysis of the conversations using the Dedoose qualitative analysis tool.Transcription of audio data from the structured interviews occurred in three phases. In the first phase, the audio files underwent automatic transcription to text using a tool called Trint. The second transcription phase consisted of a transcriber listening to the MP3 audio files while reviewing the transcribed text and making corrections to inaccuracies. The third and final step was a second sweep of each text file to ensure that all the corrections had been made. The researcher and one assistant reviewed the transcribed text. The files underwent final validation by the researcher. After transcription of the audio and double-verification for accuracy, the text-based files were placed into Dedoose. Additionally, the demographic data regarding the participants was added as well.After putting the files into Dedoose, an inductive method was applied to the transcribed data for the data coding. The image below shows a visual example of the coding process. Each transcript was first open coded as the transcriber listens to the audio of the interview. Subsequent passes allowed for linking related ideas in the axial coding part of the analysis. Figure 5 shows an example of the coding process.Figure 5. Example of Open coding and Axial coding process in Dedoose.The responses to the 11 propositions were coded according to two criteria, the first criterion is the importance of the proposed practice, and the second criterion is the timeline of implementing the practice when setting up a new insider threat program. Coding of the remainder of the text files from each of the interviews consists of a three-step process. The steps were open coding, axial, and lastly selective coding.For this project, the 11 propositions provided a pre-existing framework of themes attached to each of the 11 propositions. One set deals with the importance of each proposition and another set deals with the timeliness of each proposition. These two frameworks were entered into Dedoose.Each of the codes for the two types or characteristics were weighted in a custom fashion. Because there are 11 proposed processes, each code got a weight range of 1 to 11. In Dedoose, the higher the number, the greater the weight. When coding the interview, the researcher can evaluate the mood, context, and emphasis when adding a code weight to an excerpt in the text of each discussion. Figure 6 shows a sample of how each code can be assigned a weight range.Figure 6. Weight range options set for coding in Dedoose, minimum weight 1, maximum weight 11. Analysis of the transcripts with the coding yielded these results in Dedoose in Table 2.Table 2These weights then can be used to interpret the interviews and to produce a graphical analysis.SLP Assignment ExpectationsFor your Background analysis, obtain a document from your firm such as a statement from the president, statement to the stockholders, strategic plan, or something of that sort. Then use the WordCloud addin for Word 2016. Here is a video to show you how to obtain the free Addin ProWordCloud: Now produce a WordCloud from the document you selected. Add to your Background a discussion of the results of the WordCloud and the areas identified. Discuss how these relate to the research question for your dissertation. You will NOT use Dedoose here because you can NOT collect any interviews until you have your IRB approval. If you want you can work on using Dedoose to analyze the document you just used to produce a WordCloud; however, this is not required.Add this to the growing work you have on the Background for the firm you are studying.Your assignment will be graded using the following criteria:Assignment-Driven Criteria: Student demonstrates mastery covering all key elements of the assignment.Critical Thinking/Application to Professional Practice: Student demonstrates mastery conceptualizing the problem and analyzing information. Conclusions are logically presented and applied to professional practice in an exceptional manner.Business Writing and Quality of References: Student demonstrates mastery and proficiency in written communication and use of appropriate and relevant literature at the doctoral level.Citing Sources: Student demonstrates mastery applying APA formatting standards to both in text citations and the reference list.Professionalism and Timeliness: Assignments are submitted on time.Module 4 – BackgroundDesigning the Triangulation Approach to Address the Research ProblemFarrell, S. (2016). Project Management for user research: The plan. Retrieved May 10, 2018, from the Neilson/Norman Group website at Moylan, W. A. (2002). Planning and scheduling: The yin and yang of managing a project. Paper presented at Project Management Institute Annual Seminars & Symposium, San Antonio, TX. Newtown Square, PA: Project Management Institute. Retrieved May 10, 2018, from Rose, S., Spinks, N., & Canhoto, A. (2015). Research project planner template. From Management research: Applying the principles. Retrieved May 10, 2018, from Research methods and processes. (n.d.). In Encyclopedia of Management at the Reference for Business website. Retrieved May 10, 2018, from Stockberger, D. (2016). Introductory statistics: Concepts, models, and applications. Missouri State. Retrieved from Video MaterialLiaison in management: Definition & explanation. (n.d.). Retrieved from the Study.com website at McBride, T. (2014, February 23). Planning research projects [Video file]. University of Technology Sydney. Retrieved from Bern, P. (2015, April 23). Planning your research [Video file]. Syracuse University Libraries. Retrieved from Gibbs, G. R. (2010, June 11). Grounded Theory – Core Elements. Part 1 [Video file]. Retrieved from Gibbs, G. R. (2011, October 24). Coding part 1: Alan Bryman’s 4 stages of qualitative analysis [Video file]. Retrieved from Gibbs, G. R. (2011, October 24). Coding part 2: Thematic coding [Video file]. Retrieved from Gibbs, G. R. (2011, November 21). Research interviewing part 1: Interviews and the Interview Society [Video file]. Retrieved from Gibbs, G. R. (2011, November 21). Research interviewing part 2: The pros and cons of interviewing [Video file]. Retrieved from Gibbs, G. R. (2011, November 21). Research interviewing part 3: Types of interviews [Video file]. Retrieved from Gibbs, G. R. (2011, November 21). Research interviewing part 4: The interview schedule [Video file]. Retrieved from