Discuss About The Qualitative Research Applications Education?
Research management is the process, procedure and principles used to identify a problem and find a problem that will assist in finding a solution to the problem identified.
RESEARCH PROBLEM |
SUB-PROBLEM |
COLLECTED LITERATURE |
Problem 1 Internet censorship is one of the major control parts in the internet world. Different stakeholders use internet censorship to help them secure their information and data when they use the internet. The internet provides necessary information as well as educating users. Despite internet bearing many benefits to its users, it also has different challenges associated to it that renders it reliable. This study aims at determining the different issues related to internet censorship in the world (Romano, 2009) |
Internet censorship as part of the control mechanism in the cyber world is affected by different challenges. Sub-problem 1 Censorship leads to users’ rights being violated. Many networks have been banned thus decreasing the number of internet users. This decreases educational resources for students. Sub-problem 2 Censorship leads to problem of internet security and privacy of information and data. Cyber bullying is an issue related to internet censorship. This can harass the user either physically or mentally (Sina, 2014). Sub-problem 3 Censorship has led to information and data resistance in the process of transfer. In the process of transaction, data breaching may occur (State, 2013). This causes theft of property and copy right violation |
Literature tries to review what other people did or said before. Literature 1 MacKinnon (2010, p. 125), gives tactics used to control internet. This strategies include cyber-attacks, network and device control, control of domain name and localized restriction and disconnection. This has reduced ability by users to complain about political issues and social problems. Literature 2 Feng & Guo (2013, p. 234), in their study examining control strategies of internet censorship in China; they identified an online blocking system used (Toepfl, 2011). The Chinese government used this included URL blocking, hijack domain names, block main passwords and BGP hijacking. The government of China use internet censorship in a hierarchical system and internet carried out by operators in different region Literature 3 Hearns-Branaman, (2009, p. 134), some websites give false information to divert the views and thoughts of common people. The increased number of users has increased internet censorship. Many internet transaction leads to data breaching. The hacking causes huge financial loses theft and violation of networks and copyright. Therefore, various countries of various companies have employed data mining for security purposes |
Problem 2 The number of internet users is growing rapidly in the day-to-day operations. The life of each individual has improved due to use of internet to provide a large amount of information and knowledge in different fields and social interaction. Despite all these benefits, different issues arise questioning the reliability and credibility of the use of internet. Therefore, the research aims at examining internet security and effects of social media in internet censorship. |
Sub-problem 4 Social media has enhanced communication and connection among millions of persons together. Different challenges arise Sub-problem 5 Social media has led to many illegal websites that brings social harm. This gives rise to pornographic images and videos. Some other websites provide procedures of bomb making and drug making. This causes major harm to the society. There is the problem of cyber-attacks |
Literature 4 In the literature of Deibert & Rohozinski,( 2010), the educational resources for students has reduced the websites used by students provide reduced information for information and data. Government and other parties are therefore responsible for internet censorship. Literature 5 Many studies examine the risks of interaction between cyber-censorship and online activism. In the study by Leibold, (2011, p. 126) showed a struggle between cyber-censorship and online activism as the evil versus good. The study by MacKinnon , (2010, p. 126) analyzed the public discourse on online activism and censorship in China. He noted that single, open and free internet brings democracy and freedom. China’s network authoritarianism is the main control feature. |
Research involves different types depending on methodology of research used, knowledge, user group and the type of problem investigated. This gives rise to the different types of methodology identified as qualitative, quantitative, basic, applied and problem-oriented and Problem solving. Qualitative and quantitative forms our major concern (Brennen, 2013, p. 26).
Quantitative methodology puts emphasis on numbers or numeric figures. This method aim to measure the amount or quantity compares past records and project the future. It also refers to systematic investigation of the phenomena and quantitative properties as well as their relationships. Its goal is to employ and develop mathematical theories, hypothesis and models of the phenomena.it gives an important connection between mathematical expression and empirical observation to quantitative relationships. Here, statistical methods are used and in the field of commerce and economics (Merriam, 1998, p. 67).
This method provides a non-quantitative analysis. This method collects, analyses, and interprets data through observation of what people say and do. It also involves meanings, characteristics, definitions, symbols, description and metaphors of things. It is subjective and use various ways of collecting data and information e.g. focus groups and in-depth interviews. This type of methodology is open-ended and exploratory.
In this study I, will use qualitative method because it will help me collect, analyze and interpret data through observation of what people say and do. In addition, it is open and exploratory to provide me an opportunity to use various methods to collect data and information e.g. Focus groups and in-depth interviews to get and understand more information.
Literature tries to review what other people did or said before
LITERATURE |
RESEARCH PROBLEM |
METHODOLOGY |
YOUR SUB-PROBLEM |
RELEVANCE |
Literature 1 MacKinnon , (2010, p. 125), gives tactics used to control internet. This strategies include cyber-attacks, network and device control, control of domain name and localized restriction and disconnection. This has reduced ability by users to complain about political issues and social problems. Literature 2 According to Feng & Guo, (2013, p. 234), in their study examining control strategies of internet censorship in China, they identified an online blocking system used. The Chinese government used this included URL blocking, hijack domain names, block main passwords and BGP hijacking (BBC, 2010). The government of China use internet censorship in a hierarchical system and internet carried out by operators in different region. Literature 3 From Hearns-Branaman, (2009, p. 134), some websites give false information to divert the views and thoughts of common people. The increased number of users has increased internet censorship. Many internet transaction leads to data breaching. The hacking causes huge financial loses theft and violation of networks and copyright. Therefore, various countries of various companies have employed data mining for security purposes. |
Problem1 Internet in China has appositive impact on politics and individual growth. Despite media growth and commercialization, internet remains under government contro Problem 2 Continuous use of internet leads to lack of internet security and privacy of information and data. In addition, cyber bullying is another challenge. Problem3 Data breaching and illegal websites. |
Method 1 The methodology used was qualitative to enable researcher collect, analyze and interpret data and information collected (Alexa, 2014). Method 2 Empirical study was used to determine the control strategy used by China. Method3 The exploratory and quantitative study was used to determine the number of financial transactions and financial loses that accrue from use of internet. |
Sub problem Social media has led to many illegal websites that brings social harm. This gives rise to pornographic images and videos. Some other websites provide procedures of bomb making and drug making. This causes major harm to the society. There is the problem of cyber-attacks |
Relevance 1 The study has helped me determine the tactics that a country may employ in order to reduce the number of internet users who violate the rights and copyrights of other Relevance 2 Since the internet use has many challenges, the review on the study of control mechanism will assist me in determining the strategies used to control insecurities in the internet and ways to improve privacy. Relevance 3 Having the idea of false information and data breaching over the internet, this will enable the users of the internet to be careful on the type of information to share as well as knowing the importance of data mining in securing data. |
Literature 4 In the study Deibert & Rohozinski, (2010), content rating system, the educational resources for students has reduced the websites used by students provide reduced information for information and data. Government and other parties are therefore responsible for internet censorship. |
Problem 4 Education and internet |
Method 4 Quantitative study to examine the percentage of information that has reduced from the internet as well as the number of students affected |
Relevance 4 Reviewing the literature will help me to suggest more educational resources for students. In addition, it will assist the students to concentrate in their studies. |
Based on the existing research methodologies I will propose Survey as a method of data collection. This is because developing it is easy by use of survey software. Survey can be in form of online, mobile, paper survey or any of the combination. It allows a wide coverage.
This is the initial stage of survey and begins with plans on who to participate, which mode to use, where to go and how results will be analyzed.
The surveyor delivers the survey form to the participants for the response about the research topic.
The researcher collects data and information to be used for analysis.
Data is analyzed and a full report generated for further implementation.
The results and findings are interpreted so that future actions are planned.
The actions are implemented a monitoring takes place to identify the successes and challenges for feedback.
The feedback is sent back on challenges and achievements for further recommendations and solutions
References List
Alexa, 2014. Top Sites in China.. [Online]
Available at: https://www.alexa.com/topsites/countries/CN
[Accessed 5 June 2014].
Anon., 2011. BBC. (2011, December 15). Wukan Search. Retrieved from BBC:. [Online]
Available at: https://www.bbc.co.uk/search/news/?page=2&q=WUKAN&dir=fd&news=20&news_av=2
[Accessed 15 December 2011].
Anon., n.d. s.l.:s.n.
BBC, 2010. Nobel: China blocks foreign websites ahead of ceremony.. [Online]
Available at: https://www.bbc.com/news/world-asia-pacific-11962520
[Accessed 9 December 2010].
Boyd-Barret, J. & Xie, S., 2008. Al-Jazeera, Phoenix Satellite Television and the Return of the State. International Journal of Communication.
Brennen, B., 2013. Qualitative research methods fo rmdia studies. New York: Routeledge.
Deibert, R. & Rohozinski, R., 2010. Cyber Wars. taxation-law on Censorship,. s.l.:s.n.
Feng, G. .. & Guo, S., 2013. Tracing the route of China’s Internet censorship:An empirical study. Telematics and Informatics. s.l.:s.n.
Hearns-Branaman, J., 2009. A Political Economy of News Media in the People’s Republic of China. Westminster Papers in Communication and Culture,. China: s.n.
Leibold, J., 2011. Blogging Alone: China, the internet, and the Democratic Illusion?. The Journal of Asian Studies,.
MacKinnon , R., 2010. Networked Authoritarianism. Journal of Democracy,.
Merriam, S., 1998. Qualitative research and case study applications in education. s.l.:s.n.
Romano, A., 2009. Public Sentinel: News Media and Governance Reform. (P. Norris, Ed.). Ed ed. P. Norris: World Bank Publications..
Sina, 2014. Company Profile. [Online]
Available at: https://corp.sina.com.cn/eng/sina_rela_eng.html
[Accessed 5 June 2014].
State, I., 2013. About Iowa State. Retrieved from iastate. [Online]
Available at: https://web.iastate.edu/about/
[Accessed 12 12 2013].
Tianya, 2014. Tianya. (2014, June 5). Introduction of Tianya. Retrieved from tianya:. [Online]
Available at: https://help.tianya.cn/about/history/2011/06/02/166666.shtml
[Accessed 5 June 2014].
Toepfl, F., 2011. Managing public outrage: Power, psychology, and new media in contemporary Rossian. new media & society,. s.l.:s.n
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download