The aspect of social media comprises of two parameters, social and media. The parameter of social is complementary to the aspect of media, which reflects the corporate social responsibility of the media personnel (Borgatti, Everett and Johnson 2013). As a matter of specification, social media plays an important role in making the public aware of the events that is taking place in their surroundings. In view of the earlier sentence, the role of the media personnel gets highlighted. As a matter of specification, social media connects the people to the whole world. Typical examples of social media are Facebook, Twitter, Blogs, Website portals among others. According to (Kadushin 2012), social media attains a theoretical shade in terms of understanding the existence of humans within the society. The diagrammatic representation of the network chains in the cover page is an evidence of the addition to friend circle of the individuals.
Establishing connections with the friends, neighbours, relatives, and peers improves the stability in the relationship between the individuals. As argued by Borgatti, Everett and Johnson (2013), the nodes or the attributes dictates the individuals to engage into relationships, even the complex ones. Engaging into new relationships with friends, through the means of facebook, smoothens the complexity of the nodes in the network. These nodes attain the tag of “wires in the book entitled, Growing up wired: Social networking sites and adolescent psychosocial development. The action of growing up bears correlation with the enrichment of knowledge through the informative videos that are shared on the social networking sites. Surfing these sites by the adolescents have added a modern touch in their lives (Shapiro and Margolin 2014). The all round development of the adolescents, through the means of social media contradicts the limitation of psychological development.
According to the arguments of (Oh, Ozkaya and LaRose (2014), achieving the required information on the social networking sites is assistance in terms of completing the assigned projects. Getting online assistance from the teachers and team members make the individuals feel connected like a community, which provides satisfaction. The achievement of required support and assistance in completing the allocated tasks is the answer to the proposed question in the name of the book. Along with this, sharing of pictures, songs and videos also enlarges the friends’ circle of the individuals.
In spite of many benefits of social media, there are certain disadvantages, which aggravate the health issues of the individuals. Herein, lays the conjunction with the article entitled, The influence of social networking sites on health behaviour change: a systematic review and meta-analysis (Laranjo et al., 2014). Extra indulgence in the social networking sites destroys the balance in the life of the individuals. Having sleepless nights adversely affects the work pressure. Sleepless nights snatches away the much required rests from the individuals, which compels them to sleep during classes, office among others. Apart from this, one of the other disadvantages of social media is the friendship with unknown strangers, who intervene into the personal profiles of the individuals. For avoiding these kinds of situations, it is recommended not to accept friend requests from unknown persons (Laranjo et al., 2014).
Social media plays an important part for companies and organizations in terms of expanding the business. As a matter of specification, adopting search engine optimization enables the personnel to fulfil their requirements. This step establishes relevancy with the identified and specified business requirements. Putting the news of the newly launched products and services in the social media helps the personnel to enhance the brand awareness (Laroche, Habibi and Richard 2013). As a sequential step, carrying out target segmentation enhances the focus of the companies and organizations in terms of producing customer centric products. Along with this, reaction and development of portals help the personnel by making them aware of the customer reactions towards the levied products and services. However, regular surfing of these portals is required for bringing innovation within the products.
An uninterrupted internet connection helps the personnel of the companies and organizations to review the performance of the contemporary brands (Tiago and Veríssimo 2014). This is done through the means of search engine optimization, which open various sites before the personnel. From these various sites, selection of the most appropriate site ends the query of the personnel in terms of gaining an insight into the modern and technologically advanced machines. Putting the selected machine, on the social media, acts as a wise step for the personnel in terms of adding firmness and stability in the business activities. The action of optimization bears correlation with the capability of the individuals to identify and specify the target audience, which improves the focus of the business operations (Ngai, Tao and Moon 2015). Herein, lays the appropriateness of the action of target segmentation from the diversified audience trafficking towards the brand image.
Viewing it from other perspectives, social media is considered as one of the efficient communication channels for enhancing the stability in the relationship between the company personnel and the customers. Within this Consideration of the safety and security of the customers is one of the prime responsibilities of the personnel. A mentionable fact here is the adoption of security software for maintaining the safety and security of the personal data and belongings of the customers (Rapp et al., 2013). Typical example in this direction is the quick heal software, which helps the personnel to detect the presence of virus and hacker intervention within the important official data.
Apart from the adoption of security software, companies and organizations hire IT experts for detecting the presence of defects within the machines. This step proves beneficial in terms of bestowing quality products to the customers and the other agency partners. Exposure of conscious attitude in this direction is a gradual progression towards the achievement of customer loyalty (Leftheriotis and Giannakos 2014). Within this, most of the companies and organizations have adopted software, which directly transfers the data to the stakeholders and shareholders.
One of the other applications of the social media is loud computing, which supports the personnel to operate the server networks on the internet. The presence of sensors within these networks is assistance towards regulating and controlling the data, which is to be processed and sent to the customers. Security software is crucial here, as it comprises of the data transfer from one source to the other (Rapp et al., 2013).
Social media can be considered as an agent, which has revolutionized the traditionalism of the workplace culture. As a matter of specification, social media has reduced the stress of manual labour largely. Delving deep into the effects of the social media, it has altered the scenario of business within the companies and organizations. Pondering upon the parameter of social, introduction of website portals have compelled the companies and organizations to encounter dense trafficking of the audience (Ngai, Tao and Moon 2015). This has, in turn, enhanced the brand image. Seeking out innovative means for communicating with the customers has adversely influenced their purchasing decisions and power. Further, the facility of online shopping has increased the sales revenue, which is a central agent in pushing the maximum value to the profit margin.
Regulatory framework, act as a central doctrine for the companies and organizations in terms of adding a legal touch to the business operations. Effective adherence and compliance to the standard and norms of the regulations help the personnel to carry out the online deals, trades and transactions in an authentic manner (Tiago and Veríssimo 2014). On the contrary, non-compliance to the regulatory framework compels the personnel to loss official secrets and data. Typical examples in this direction are the Data Protection At (1998), computer Misuse At (1990) among others. Compliance to the norms of the Data Protection at helps the personnel to safeguard the personal data and belongings of the customers and the agency partners (Laroche, Habibi and Richard 2013). The action of protection in the name of the act is itself an indication of its functionality. Exposure of consciousness attitude by the personnel in this direction adds value to their roles and responsibilities.
Along with this, compliance to the standards and norms of the Computer Misutilization Act supports the personnel to make effective and judicious utilization of the computer devices. Moreover, this adherence reduces the instances of cyber crimes, which stalls the process of technological advancement for the companies and organizations (Laranjo et al., 2014). Installation of security software helps the personnel to detect the presence of virus within the devices. Attempting to repair these malfunctioning through self efforts aggravates the complexities of the companies and organizations. On the contrary, hiring IT experts for examining the status of the machines proves beneficial for the personnel in terms of achieving positive results. For hiring the experts, possession of financial flexibility is an essential component. Exposure of conscious attitude in maintaining the equilibrium between the supply and demand brings stability in the business processes (Oh, Ozkaya and LaRose 2014). On the contrary, absence of measures for dealing with the financial crisis, such as, inflation, fluctuating prices, make it difficult for the personnel to plan lucrative discounts, offers and schemes for the customers and agency partners.
The urge to expand the business reflects the importance of social media in businesses. Bearing in mind, the safety and security of the stakeholders and shareholders adds value to the duties of the personnel. On the contrary, exposure of negligence in this direction brings compels the personnel to encounter losses in terms of enjoying competitive advantage. Herein, lays the appropriateness of the question, “why bother?” (Tiago and Veríssimo 2014). This botheration relates to the approach of the personnel towards adding efficiency in the business processes. Exposure of conscious and wise approach in this direction enhances the stability in the relationship with the customers for the personnel. Effective utilization of the portals makes the personnel aware of the customers towards the levied services. Herein, lays the correlation with the article, To be or not to be in social media: How brand loyalty is affected by social media? (Laroche, Habibi and Richard 2013) The exposure of lackadaisical attitude in terms of achieving customer loyalty attaches an interrogative tone to the utilization of social media by the personnel of the companies and organizations.
According to the arguments of (Tiago and Veríssimo 2014), digital marketing is one of the essential part of social media. Digitalization helps the companies and organizations to carry out the business activities automatically. Here also orientation is important, as undertaking wrong steps might result in the achievement of negative outcomes. Adding graphics in the products and service on the social media lures the customers. Adherence and compliance to the advertising legislations enables the personnel to advert the products and services in an authentic manner (Ngai, Tao and Moon 2015). Within this, consideration of the individual sentiments of the customers is one of the grounds, which influences their purchasing power.
Effective and judicious utilization of the means of social media, by the personnel of the companies and organizations, enhances their corporate social responsibility. Consideration of the maintenance of stability in the relationship between the company and the customers reflects the corporate attitude of the personnel, which is required for the attainment of professionalism in the workplace (Leftheriotis and Giannakos 2014). Making false promises by displaying vulgar advertisements adversely affects the mentality of the customers. This motive stains the personality of the personnel. Herein, the heaviness of the word “corporate” gets diminished.
Apart from this, misutilization of the computers for doing personal tasks detaches the personnel from attaining the identified and the specified requirements. Herein, lays the importance of copyrights, patents and design Act (Borgatti, Everett and Johnson 2013). Copyright authenticates and validates the online transactions, undertaken by the personnel. Absence of this copyright escalates the amount of cyber crimes. In order to avert this situation, assistance from the statutory bodies of law is required. Within this, adherence and compliance to the standards and norms of the competition policies enables the personnel to indulge into fair trades, deals and transactions with the contemporary brands (Laroche, Habibi and Richard 2013). This is also applicable for the data flows from the organization to the stakeholders and shareholders. Carrying out the online transactions, without the adherence to the legislations, omits the parameter of legal from the business procedures.
The second part of the assignment would present a research proposal, comprising of aims, objectives, questions, hypothesis and an in-depth insight into the methodology, which would help the researcher to carry out the research in an effective manner (Mackey and Gass 2015).
The aim of this research proposal would be to speculate the advantages and disadvantages of social media in the business workplace.
Based on the identified aim, the following objectives can be developed:
Based on the developed objected, the following questions seem relevant for covering both the positive and negative parameters of the research topic:
H0: There are no advantages and disadvantages that the companies and organizations face regarding the use of social media.
H1: There are some advantages and disadvantages that companies and organizations face while using social networking for the execution of the business activities.
Methodology is an important part of a research which highlights the process of data collection. This proves true in case of every research intending to bring out various shades of the subject matter. In the current research proposal, the researcher would perceive the research with a descriptive research design (Mackey and Gass 2015). The major drive behind this is to describe in detail the advantages and disadvantages of social network in businesses. Along with this, envisioning the research from a positivism philosophy would help the researcher to bring to the forefront the scientific and real facts related to social media in terms of its utilization in the businesses. Choosing deductive approach would prove beneficial for the researcher in terms of deducing relevant conclusions from the theoretical framework (Taylor, Bogdan and Vault 2015).
Data proves a crucial element in research, which helps the researcher to establish unknown facts about the subject matter. In a research, data is mainly collected through two methods, namely, primary and secondary data collection methods. In case of primary method, means such as survey and interviews are used for collecting data (Flick 2015). On the contrary, in secondary data collection method, relevant themes are developed through the utilization of tables, charts and graphs. These sources help in establishing relevancy with the requirements of the research. Apart from this, books, journals and online articles relevant to the subject matter of the research are referred by the researcher. This reflects the importance of the inclusion and exclusion criteria.
One of an important part of data collection process is the samples. Everyone directly or indirectly related to the subjected matter of the research are the samples; however, owing to the lack of sufficient time, a certain sample size is selected (Silverman 2016).
In case of this research proposal, the research would follow secondary data collection method. As a matter of specification, the researcher would refer to relevant sources, case studies for developing themes on the advantages and disadvantages of social networks in business. Along with this, taking into consideration the interview clippings of the managers would help the researcher to collect relevant data for the development of crucial themes related to the utilization of social media in business (Panneerselvam 2014).
Analysis of the collected data helps the researcher to deduce conclusions and suggest recommendations. Similar to data collection, the collected data is analysed through the primary and secondary methods. In case of the primary methods, the responses of the samples are analysed through the means of tables, charts and graphs. On the other hand, in case of the secondary methods, the collected data is analyzed through the means of themes. These themes are linked with the theories and models applied to the subject matter of the research in the literature review (Palinkas et al. 2015). Relevancy, authenticity and validity of the themes simultaneously results in the development of relevant conclusions and recommendations.
In case of this research, the data would be analyzed by linking the developed themes with the concepts highlighted in the literature review. The gathered points would help in deducing relevant conclusions and recommendations. Conjunction of the points of literature review, developed themes and concluded recommendations would reflect the quality of the collected data (Lewis 2015). Utilization of tables, charts and graphs for analyzing the collected data would add efficiency in the research. This would, in turn, broaden the scope and arena of the subject matter, that is, social networking.
In order to conduct a researcher, the researcher has to abide by certain ethics. Exposure of rational and conscious approach in this direction adds to the roles and responsibilities of the researcher as an individual. Along with this, it also bestows upon the researcher, the right to interplay with the already established facts (Chan, Fung and Chien 2013). The word “interplay” in the earlier sentence might raise question in the minds of the common people regarding the interplay with the individual sentiments of the samples selected. This can be linked with the parameter of “disadvantages” in the proposed topic of the research. However, effective adherence and compliance to Data Protection Act (1998) would contradict the motive highlighted in the previous sentence.
Complying with the provisions of Data Protection Act (1998) would help the researcher to safeguard the individual sentiments of the samples (Miles, Huberman and Saldana 2013). Achievement of success in this direction would add value to the action of protection in the name of the Act. In case of this research, there would be a provision for the samples, where they would be at liberty to withdraw the process of survey or interview if they feel uncomfortable. However, the selection of secondary analysis would nullify the presence of the samples. Utilising the interview clippings for the sole purpose of research would reflect effective adherence to the researcher ethics by the researcher (Lewis 2015). On the contrary, using the interview clippings from the archives for commercial purpose would act as a deviation from the ethics, within which the researchers are bounded for the execution of the researcher. The commerciality projected in the earlier sentence would reflect interplay with the individual sentiments and dignity of the samples, directly or indirectly related with the subject matter of the researcher. Attempting to safeguard the privacy of the related samples would result in the execution of the research on humanitarian grounds (Panneerselvam 2014).
Every researcher attempts to carry out a research with the best of his efforts. However, due to some constraints, researcher fails to cover every parameter of the subject matter. Mainly, there are two constraints, which act as an obstacle for the researcher in carrying out the research in an effective manner. These constraints are time and financial constraints. Due to absence of adequate time, the researcher fails to conduct both qualitative and qualitative research (Flick 2015). This is applicable even in this research. Inadequate time would compel the researcher to adopt only qualitative research, secondary data collection as well as secondary data analysis.
Apart from this, financial constraints limit the researcher’s scope in terms of penetrating into the unknown realms of the subject matter. Countering this, financial and time constraints are related to each other. Financial incapability, along with lack of adequate time compels the researcher to adopt one particular method for data collection and analysis (Mackey and Gass 2015). Exposure of conscious and rational approach well in advance would support the researcher in terms of averting these kinds of emergencies at the time of the research. Counter arguing this, financial flexibility also finds its importance in terms of safeguarding the sentiments and dignity of the samples. As a matter of specification, inability to consider the occurrence of risks, unwanted incidents contradicts the traditional conventions of the researcher as an individual (Taylor, Bogdan and Vault 2015).
Aiming high would add an extra feather in the role of the researcher. Keeping the conclusion open-ended would help the readers to interpret the outcome of the research. Along with this, it would act as a secondary source of information for the researchers intending to conduct further research on the topic of advantages and disadvantages in terms of using social network in business. The open-ended nature of research would broaden the scope, arena and perspectives towards social media (Silverman 2016).
In the first week, I attempted to achieve an understanding regarding the basic concepts related to the given research topic. For this, I referred to the relevant sources, such as books, journals, online articles among others. Apart from this, I also gained significant facts from my peers, relatives, friends, professors. Conjoining all the gathered facts, I could frame new concepts, which projected my independent progress to the research project. Self-sufficiency at the initial stage proved beneficial for me in terms of exposing the appropriate approach needed for carrying out the project (Rosseel, Carette and Anseel 2016).
In the second week, I drew a rough sketch as how to proceed with the project related tasks. Within this, I included the structure of the research. Diagrammatic representation of the project itinerary enhanced my clarity in terms of pursuing the right path for carrying out the research related tasks. Apart from this, I devoted a certain time to each task, which reflected my confidence in terms of carrying out the tasks within the stipulated time frame (Xiao and Carrol 2013). Taking more time for researching the facts about the subject matter of the research projected my patience towards submitting a well researched project.
Evaluation of the first and the second week indicated my progression at the right track. This provided motivation and encouraged me to initiate the actual tasks related to the research. As a sequential step, I started off with the first chapter, which is introduction. With the help of the collected facts, I was able to state the rationale behind the execution of the research project (Smit and Tremethick 2017). After stating the root cause, I moved on to the development of research aim, objectives, questions and hypothesis. Examination of the relevancy and appropriateness of these headings helped me to assess the alignment of my production with the requirements of the research.
By fourth week, I was able to indicate the significance of the study and complete the introductory chapter of the research. After this, I evaluated my performance in carrying out the introductory chapter. Delving deep into the evaluation process, I found out that I did the literature review portion first (Di Stefano et al. 2016). This is owing to the urgency of the draft on a priority basis. This negates the importance of the developed aims, objectives and questions. Countering this, keeping these things at hand proved useful for me in starting off with the second assessment without further delay.
The prior preparation in terms of aims, objectives, and questions helped me in directly starting off with the methodology portion in the second assessment. Regarding the aims, objectives and questions, I just framed out the key points, which I had highlighted during the literature review (Ramjan et al. 2016.). For methodology portion, I needed to do data collection. However, thorough review of the topic compelled me to put on thinking cap for the method of data collection. Thanks to the adequate time, I had devoted for the methodology portion.
Stressing on my thinking skills, I came to the conclusion of adopting secondary data collection process for the research on the advantages and disadvantages of social network in business (Ploderer et al. 2014). For this, I visited the libraries, online websites of different companies and organizations, which enhanced and upgraded my preconceived knowledge in this field. During the period of data collection, I took special care in terms of utilising these data only the research purpose and not for any commercial purpose. Coming to the sixth week, I realized that humanitarian terms have started developing within me. Evidence of this fact is the consideration of the privacy of the collected data (Miller and Maellaro 2016).
By the seventh week, I emerged successful in gathering relevant data in terms of the requirements of the research. Sufficiency in data collection helped me in analysing the collected data. Within this, utilizing of the materials such as charts, tables and graphs helped me in enlivening the extent to which social media is important in terms of carrying out the business processes. Apart from this, the development of relevant themes helped me in making effective utilization of the materials (Sim 2015). Linking these themes with the concepts of the literature review enhanced my capability to critique my own performance.
By the eighth week, I was able to come to the penultimate chapter of the research. Here, I took into consideration all the key areas that I have touched in the earlier chapters. At the initial stage, I gave a general conclusion regarding my understanding and deduction from the gathered facts. As a sequential step, I attempted to link the applied theories and concept with the identified and the specified objectives (Husebø, O’Regan and Nestel 2015). Emerging successful in this direction qualified me as prepared for carrying out research on any topic.
Ninth week took me closer to my targets. Linking the objectives and the anticipated outcomes helped me in exploring the unknown realms of social networking within business. Herein, lays the effectiveness and appropriateness of the recommendations. Within this, application of the SMART recommendations assisted me in evaluating the justification and feasibility in terms of the requirements of the research (Johns 2017).
As I was proceeding towards the final submission, I thought that application of theoretical framework would add value to my performance as a researcher. Without any delay, I applied Gibbs Reflective Cycle for reviewing my performance all through the five chapters of the research project (Travers, Morisano and Locke 2015).
During the phase of the theoretical application, I found similarity between the stages of Gibbs reflective cycle and my research as a whole. In the eleventh week, I focused on the first three stages. After gaining an insight into the research topic, I excavated the main reason behind the execution of the project. This enhancement resulted in the outpour of emotions at the intensity of the subject matter, which helped me in translating my thoughts into writings (Moon 2013).
The penultimate week went in evaluating the writings, deducing relevant conclusions, recommendations and finally submitting a thoroughly done research project on the advantages and disadvantages of social media in business (Johns 2017).
References
Borgatti, S.P., Everett, M.G. and Johnson, J.C., 2013. Analyzing social networks. SAGE Publications Limited.
Chan, Z.C., Fung, Y.L. and Chien, W.T., 2013. Bracketing in phenomenology: only undertaken in the data collection and analysis process?. The Qualitative Report, 18(30), p.1.
Di Stefano, G., Gino, F., Pisano, G.P. and Staats, B.R., 2016. Making experience count: The role of reflection in individual learning.
Flick, U., 2015. Introducing research methodology: A beginner’s guide to doing a research project. Sage.
Fusch, P.I. and Ness, L.R., 2015. Are we there yet? Data saturation in qualitative research. The Qualitative Report, 20(9), p.1408.
Husebø, S.E., O’Regan, S. and Nestel, D., 2015. Reflective practice and its role in simulation. Clinical Simulation in Nursing, 11(8), pp.368-375.
Johns, C., 2017. Becoming a reflective practitioner. John Wiley & Sons.
Kadushin, C. (2012). Understanding social networks: Theories, concepts, and findings. OUP USA.
Laranjo, L., Arguel, A., Neves, A.L., Gallagher, A.M., Kaplan, R., Mortimer, N., Mendes, G.A. and Lau, A.Y., 2014. The influence of social networking sites on health behavior change: a systematic review and meta-analysis. Journal of the American Medical Informatics Association, pp.amiajnl-2014.
Laroche, M., Habibi, M.R. and Richard, M.O., 2013. To be or not to be in social media: How brand loyalty is affected by social media?. International Journal of Information Management, 33(1), pp.76-82.
Leftheriotis, I. and Giannakos, M.N., 2014. Using social media for work: Losing your time or improving your work?. Computers in Human Behavior, 31, pp.134-142.
Lewis, S., 2015. Qualitative inquiry and research design: Choosing among five approaches. Health promotion practice, p.1524839915580941.
Mackey, A. and Gass, S.M., 2015. Second language research: Methodology and design. Routledge.
Miles, M.B., Huberman, A.M. and Saldana, J., 2013. Qualitative data analysis. Sage.
Miller, R.J. and Maellaro, R., 2016. Getting to the Root of the Problem in Experiential Learning: Using Problem Solving and Collective Reflection to Improve Learning Outcomes. Journal of Management Education, 40(2), pp.170-193.
Moon, J.A., 2013. Reflection in learning and professional development: Theory and practice. Routledge.
Ngai, E.W., Tao, S.S. and Moon, K.K., 2015. Social media research: Theories, constructs, and conceptual frameworks. International Journal of Information Management, 35(1), pp.33-44.
Oh, H.J., Ozkaya, E. and LaRose, R., 2014. How does online social networking enhance life satisfaction? The relationships among online supportive interaction, affect, perceived social support, sense of community, and life satisfaction. Computers in Human Behavior, 30, pp.69-78.
Palinkas, L.A., Horwitz, S.M., Green, C.A., Wisdom, J.P., Duan, N. and Hoagwood, K., 2015. Purposeful sampling for qualitative data collection and analysis in mixed method implementation research. Administration and Policy in Mental Health and Mental Health Services Research, 42(5), pp.533-544.
Panneerselvam, R., 2014. Research methodology. PHI Learning Pvt. Ltd..
Ploderer, B., Reitberger, W., Oinas-Kukkonen, H. and van Gemert-Pijnen, J., 2014. Social interaction and reflection for behaviour change.
Ramjan, L.M., Peters, K., Villarosa, A., Villarosa, A.R., Curmi, C. and Salamonson, Y., 2016. Debriefing as a form of reflection and catharsis for researchers. Nurse Researcher, 24(1), pp.20-25.
Rapp, A., Beitelspacher, L.S., Grewal, D. and Hughes, D.E., 2013. Understanding social media effects across seller, retailer, and consumer interactions. Journal of the Academy of Marketing Science, 41(5), pp.547-566.
Rosseel, J., Carette, B. and Anseel, F., 2016, January. Does Individual Reflection Enhance Creative Thinking?. In Academy of Management Proceedings (Vol. 2016, No. 1, p. 11426). Academy of Management.
Shapiro, L.A.S. and Margolin, G., 2014. Growing up wired: Social networking sites and adolescent psychosocial development. Clinical child and family psychology review, 17(1), pp.1-18.
Silverman, D. ed., 2016. Qualitative research. Sage.
Sim, J.H., 2015. Using written text-based approach to promote reflection: Does it work?. Medical teacher, 37(4), pp.405-406.
Smit, E.M. and Tremethick, M.J., 2017. Value of Online Group Reflection After International Service-Learning Experiences: I Never Thought of That. Nurse Educator.
Taylor, S.J., Bogdan, R. and DeVault, M., 2015. Introduction to qualitative research methods: A guidebook and resource. John Wiley & Sons.
Tiago, M.T.P.M.B. and Veríssimo, J.M.C., 2014. Digital marketing and social media: Why bother?. Business Horizons, 57(6), pp.703-708.
Travers, C.J., Morisano, D. and Locke, E.A., 2015. Self?reflection, growth goals, and academic outcomes: A qualitative study. British Journal of Educational Psychology, 85(2), pp.224-241.
Xiao, L. and Carrol, J.M., 2013. The effects of rationale awareness on individual reflection processes in virtual group activities. International Journal of e-Collaboration (IJeC), 9(2), pp.78-95.
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download