0% found this document useful (0 votes)
5K views

Chapter 2

This chapter outlines the methodology used for a qualitative study. It describes a phenomenological research design that involves exploring the lived experiences of students from broken families through in-depth interviews and a focus group. The chapter discusses selecting participants purposively from students who have experienced family issues. It describes obtaining consent and conducting the interviews and focus group to gather detailed perspectives. The chapter also covers ensuring trustworthiness through establishing credibility, transferability, and dependability of the study's findings and methods.

Uploaded by

pototding25
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
5K views

Chapter 2

This chapter outlines the methodology used for a qualitative study. It describes a phenomenological research design that involves exploring the lived experiences of students from broken families through in-depth interviews and a focus group. The chapter discusses selecting participants purposively from students who have experienced family issues. It describes obtaining consent and conducting the interviews and focus group to gather detailed perspectives. The chapter also covers ensuring trustworthiness through establishing credibility, transferability, and dependability of the study's findings and methods.

Uploaded by

pototding25
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 7

Chapter 2

Methodology

This chapter covers the methodology use in a qualitative research. This


includes the research method and design used, role of the researcher in the
conduct of the study. The description of research participants and cited data
gathering procedures and data collection. This chapter explores the issue on
the credibility; confirm ability, transfer ability, trustworthiness, and
dependability, ethical considerations and lastly, the analysis of the research
data.

Research Design

In desire to have a better knowledge, understanding and in-depth analysis


of the problems, coping strategies and the insights of the student informants,
we utilize a phenomenological study research. This phenomenological study
belongs to a qualitative approach in which the investigators or we as the
researchers will going to explore the real life and the untold stories behind by
using single case or multiple cases, through detailed and in-depth collection of
data involving multiple sources of information such as interviews,
observations, audio or visual materials, documents and reports that can
generate a case description and case themes (Creswell, 2013).

This phenomenological study states the lived experiences (Creswell,


2009) of the children who’s experiencing a problem such as a broken family. It
focused into what common experiences the participants had encountered in
their daily challenges in the part that they were part of a broken family, the
said phenomenon is under our investigation. We used the phenomenology
because a group of individuals such as these children experienced the said
problems and difficulties that they encountered in being one of the child who’d
been part of a broken family. We we’re able to explore every single idea
(Creswell, 2012) about the lived difficult experiences of the children into more
composite description based on “what and how” they experience the said
phenomenon (Moustakas, 1994 & Creswell, 2012).
Research Participants

This section describes the participants and stipulates their criteria for
selection and number of participants, type of sampling, and the recruitment
strategy. One of the most important tasks in the study design phase is to
identify appropriate participants because informants are the very important
who can best provide information on their lived experiences, culture,
awareness, knowledge and expertise regarding the phenomenon under
inquiry. Decision about selection will be based on their research question and
theoretical perspective. Moreover, my informants were chosen through
purpose sampling technique.Creswell explains, purposive sampling considers
a particular group of people or when the described population for their study is
rare or very difficult to locate,it maybe the only of option (Albert, Lavinson, and
Lanyard, 2008, Creswell, 2007, 2013).

We followed some criteria for selection of participants like the


phenomenon, suitable characteristics of the subject, and theoretical
perspective. The participants of the study are students with a broken family
residing in Barangay Binancian, Camansa, Buan and Sonlon. The informants
experienced the difficulties. We intentionally preferred these participants
regardless of gender and age because they have enough knowledge,
experiences and ideas that can share about their experiences of having a
broken family. Moreover, keen section of participants for interviews is vital and
that one should utilize various types of sampling strategies. It is also
suggested that the participants must be willingly to openly and honestly share
their story ( Creswell, 2007).

Focus Group Discussion is a research technique that collects data


through group interactions on a topic determined by the researchers. It is the
researchers interest which provides the focus while themselves come from
the group interactions (Morgan, 1996). The in-depth interview, on the other
hand is a qualitative research technique that involves individual to explore
ones’ perspective on a particular topic ( Boyce 2006).
As researchers, we sought referrals from the adviser and further identified
appropriate participants for the Focus Group Discussion (FGD) and In-Depth
Interview (IDI). The Focus Group Discussion (FGD) was participated by seven
(7) students with a broken family and another seven (7) students with a
broken family for In-Depth Interview (IDI). The table one shows key informants
or participants’ profile where pseudonym, gender and place of each one
learner for In-depth and Focus Group Discussion respectively.

The Focus Group Discussion (FGD) and In-Depth Interviews (IDI) were
conducted in a sound setting preferred by the participants. We had also made
it sure that works and schedules where not disrupted during the conduct of
the discussion and interviews.

Data Gathering Procedure

The most common sources of data collection in qualitative research are


interviews, observations and review of documents. The data-collecting is
placed in these four categories: observations, interviews, documents and
audio visual materials. The methodology is planned in the research questions
are validated before the conduct of the study (Creswell 2003). The advisers,
and community should help the researchers in identifying in appropriate
informants. They referred seven participants for the Focus Group Discussion
(FGD) and another seven for In-Depth Interviews (IDI).With the endorsement
if their practical research adviser, letter of permission to conduct study will be
sent to the office of the school administrator.

The research methodology and the corresponding questionnaires will be


attach to the letter for approval when approved. Upon approval, the
researchers personally approach the informants and explain the process of
collecting data. Letters and Informed Consents will also handed to them and
will be signed signifying approval of their participation in the study.

Everyone who participates in a study should have voluntarily consented


to participate, without being force or unfairly pressured. This means that they
should be well-informed about what participation entails, and reassured that
the declining will not cause negative effect on their part. While written
concerns may, in some situations frighten the individuals, verbal consents
should be obtain at the very least (Patton, 2002).

The researchers must have interviewing techniques in order to elicit


everything there was to learn from the experience of participants. The
researchers have engaged with the participants by posing question whenever
the need aroused and probed by tailoring additional questions whenever
necessary. The In-Depth Interviews will be done individually through face to
face interviews which involved one interviewer, one digital recorder and
secretariat to ensure the validity and credibility of the study. The referred
place and on dates prescribed by the informants, In-depth Interviews will be
conducted where it takes at around one and half hours to finish each
interview. The same process will be done by the group discussion. However,
before the interview takes place, respondents will be inform about the details
if the study will be given assurance of the ethical principles so as to give them
ideas what expect from the interview. Honestly is uphold in the uniform
consent (Gill, 2008).

Finally, a summary of the responses for both the IDI and FGD will be
forwarded to the analyst to determined the thematic statements.

Trustworthiness

By conducting this qualitative research, we will be put account the responses


of the informants. We will also meticulously consider all the details of the data.
We will check and recheck all the transcriptions and the importance of the
data that relate to each other on their theme. To established trustworthiness
and credibility in the study.Creswell and Miller (2000) suggested the choice of
legitimacy of the procedures. The discussion about trustworthiness are govern
by the research lens and its paradigm assumptions that can help the
procedures in the study. We will be contented in this study, the plausibility will
be determine by the responses of the informants. Silverman (2007) posed the
questions on “Does it matter?” and “How the credibility is being sustain and
recognize?”.

Credibility is an evaluation of whether or not the research findings


represent a “credible” conceptual interpretation of the data drawn from the
participants original data according to Lincoln and Guba (1985). To address
credibility, we will use three techniques. First, we will present the credibility of
the experiences as an in intent of truthfully illustrating and knowing the facts
which are phenomenon in which the participants are included. Second, we will
designing the research procedure, we will conduct a focus group discussion
which extracted ideas on the experiences of the students with a broken family
in the matter of similarities and differences. Third, we will use probe questions
to elicit detail iterative or repetitive questioning, in which we will return to
matters next by an informants and extracted related tough rephrase questions
in order to detect falsehood.

Transferability is the degree to which the findings of this inquiry could


apply or transfer beyond the bounds of the project according to Lincoln and
Guns, (1985), to address transferability in this study will have included
appendix about several of the data analysis documents use to give answer to
the research questions in order to gain access to the possible inquiry. This will
give other researchers the facility to transfer the conclusions or
recommendations as basis for further study.

Dependability is an assessment of the quality of the integrated process


of data collection, data analysis and phenomenal explanation. Confirmability
is a measure of how will the inquiries’ findings are supported according to
Lincoln and Guba (1985). To address the issue of dependability and
confirmabilty in this study, we bank on an audit trail of the participants
responses wherein their identity will be confidentially. After the gather data will
transcribed, the text will given back to the respondents for authentication and
will be ask to sign a verification form. For confirmabilty, after the completion of
our data analysis, the results in chapter three, and the discussion in chapter
four, of our adviser have assessed carefully to the audit trail with original
transcripts from the interview, data analysis documents.

Ethical Considerations

The main concerns of our study will be individuals who custody on the
code of ethics. Therefore, we have to ensure their safety, give full protection
so that they will not lose their trust to us. We followed ethical standards in
conducting this study as pointed by (Boyatzis, 1998, Mack , 2005) These are
the following respect for persons, beneficence, justice, consents and
confidentiality.
Respect for persons needs an obligation if the researchers not to exploit
the weakness of the research participants. Self-sufficiency will avoided in
order to maintain friendship, trust, and confidence among the participants and
the researchers. Before hand, we will ask permission from the School Head of
Sonlon National High School, Sonlon Asuncion Davao Del Norte where data
collection belongs to. Next, we also sought permission from the advisers if the
research participants before conducting the research (Creswell, 2012). This
was done to pay respects for the individuals concerned in the study.

Consent is another most important way of showing respect to persons


during research (Creswell, 2012). This is to let all participants become aware
on the purpose and objectives of the research study that they are going to
involve. Written consent will be provided for them to get approval. After getting
their nod, they have to actively participate the In-depth Interviews and Focus
Group Discussions. Of course, they will be inform on the results and findings
of the study.

Beneficence requires a commitment of minimizing risks to the research


participants rather than. Maximizing the profits that are due to them.
Anonymity of the interviewee was kept in order to put in each participant into
risks. At all times, participants were protected, so every files of information will
be not left unattended or unprotected (Bricki and Green, 2007).
Confidentially towards the results and findings including the safety of the
participants, coding system were used. Meaning, the participants’ identities
will be hidden (Maree and Westhuizen, 2007). As recommended by Marie et
al., (2007), all materials including videotapes, excited transcripts, notes, and
others should be destroyed after the data will be analyze. Some of the
informants should hesitant to be interview, at first because they will be afraid
what to say but because of reassurance to them in regard to the confidentially
of their responses, they later gave the chance and show comfort and
answering the interviewer’s questions. We will have extra careful with the
questions and due respect will be given importance to this study.

Justice requires a reasonable allocation of the risks and benefits as a


result of the research. It is very important to acknowledge the contributions of
all the participants as they generally part of the success of the research. They
must be given due credits all their endeavors (Bloom and Crabtree, 2006).
They will not be able to spend any amount during the interview. Sensible
tokens will be given to them as a sign of recognition to their efforts on the
study. We are hoping that through this study, they will be set free into
whatever negatives experiences and expectations of they had as they teach
non-readers and maintain a good name into what positive contributions they
could offer in this study.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy