Working With Data Sources: Selecting Research Participants and Forming Research Samples

Field Methods ◽  
2019 ◽  
Vol 32 (2) ◽  
pp. 131-139 ◽  
Author(s):  
Olivia C. Molden

This short take presents story-mapping as a research technique that incorporates multiple methods and data sources to build visual narratives of individual and collective experiences. The goals of story-mapping are the following: (1) iteratively synthesize the collection, analysis, and representation of spatial, visual, and textual information as a narrative; (2) enable meaningful participation of research participants; and (3) generate a visually compelling product that facilitates dissemination. This article details the motivation, methods, and procedures for story-mapping based on research from Nepal’s Kathmandu Valley, which investigated the water-related practices, feelings, and observations of people who secure water for their families.


Author(s):  
Ella Inglebret ◽  
Amy Skinder-Meredith ◽  
Shana Bailey ◽  
Carla Jones ◽  
Ashley France

The authors in this article first identify the extent to which research articles published in three American Speech-Language-Hearing Association (ASHA) journals included participants, age birth to 18 years, from international backgrounds (i.e., residence outside of the United States), and go on to describe associated publication patterns over the past 12 years. These patterns then provide a context for examining variation in the conceptualization of ethnicity on an international scale. Further, the authors examine terminology and categories used by 11 countries where research participants resided. Each country uses a unique classification system. Thus, it can be expected that descriptions of the ethnic characteristics of international participants involved in research published in ASHA journal articles will widely vary.


Author(s):  
I. D. Rudinskiy ◽  
D. Ya. Okolot

The article discusses aspects of the formation of information security culture of college students. The relevance of the work is due to the increasing threats to the information security of the individual and society due to the rapid increase in the number of information services used. Based on this, one of the important problems of the development of the information society is the formation of a culture of information security of the individual as part of the general culture in its socio-technical aspect and as part of the professional culture of the individual. The study revealed the structural components of the phenomenon of information security culture, identified the reasons for the interest in the target group of students. It justifies the need for future mid-level specialists to form an additional universal competency that ensures the individual’s ability and willingness to recognize the need for certain information, to identify and evaluate the reliability and reliability of data sources. As a result of the study, recommendations were formulated on the basis of which a culture of information security for college students can be formed and developed and a decomposition of this process into enlarged stages is proposed. The proposals on the list of disciplines are formulated, within the framework of the study of which a culture of information security can develop. The authors believe that the recommendations developed will help future mid-level specialists to master the universal competency, consisting in the ability and willingness to recognize the need for certain information, to identify and evaluate the reliability and reliability of data sources, as well as to correctly access the necessary information and its further legitimate use, which ultimately forms a culture of information security.


Sign in / Sign up

Export Citation Format

Share Document