30408432-MI0039
-
Upload
azimul-hasnain-zaidi -
Category
Documents
-
view
212 -
download
0
Transcript of 30408432-MI0039
-
7/27/2019 30408432-MI0039
1/14
Master of Business Administration-MBA Semester 4
ASSIGNMENT SET1
RESEARCH METHODOLOGY - MI0039
Question 1:Warigon is a retail company and they want to automate the payment system.
Assume that you are the design engineer of that company. What are thefactors that you would consider while designing the electronic paymentsystem?
Answer 1:
Designing Electronic Payment SystemsThe following factors like non technical in nature, that must be consider whiledesigning the electronic payment system for the retail company to automate the
payment system:
Privacy. A user expects to trust in a secure system; just as the telephone is a safeand private medium free of wiretaps and hackers, electronic communication mustmerit equal trust.
Security. A secure system verifies the identity of two-party transactions through"user authentication" and reserves flexibility to restrict information/services throughaccess control. Tomorrow's bank robbers will need no getaway cars-just a computerterminal, the price of a telephone call, and a little ingenuity. Millions of dollars have
been embezzled by computer fraud. No systems are yet fool-proof, althoughdesigners are concentrating closely on security.
Intuitive interfaces. The payment interface must be as easy to use as a telephone.Generally speaking, users value convenience more than anything.
Database integration. With home banking, for example, a customer wants to playwith all his accounts. To date, separate accounts have been stored on separatedatabases. The challenge before banks is to tie these databases together and toallow customers access to any of them while keeping the data up-to-date and errorfree.
Brokers. A "network banker" -someone to broker goods and services, settleconflicts, and facilitate financial transactions electronically-must be in place.
Pricing. One fundamental issue is how to price payment system service. Forexample, should subsidies be used to encourage users to shift from one form ofpayment to another, from cash to bank payments, from paper: based to e-cash. Theproblem with subsidies is the potential waste of resources, as money may beinvested in systems that will not be used. Thus investment in systems not only might
-
7/27/2019 30408432-MI0039
2/14
not be recovered but substantial ongoing operational subsidies will also benecessary. On the other hand, it must be recognized that without subsidies, it isdifficult to price all services affordably .
Standards. Without standards, the welding of different payment users in differentnetworks and different systems is impossible. Standards en at interoperability, giving
users the ability to buy and receive information, regardless of which bank ismanaging their money. None of these hurdles are insurmountable. Most will be
jumped within t next few years. These technical problems, experts hope, will besolved as technology is improved and experience is gained. The biggest questionconcern how customers will take to a paperless world.
Question 2:The four Ps concept in marketing are the four major ingredients of a
traditional marketing mix directed at the customer or target market. List and
explain the four Ps of marketing? Are the 4 Ps really applicable to Internetmarketing? How?
Answer 2:
4 Ps of marketing :1. Product
2. Place3. Price
4. Promotion
Explanation :
1. PriceThe price is the amount of money a customer pays for the product or service. The
price is very significant as it governs the companys profit and therefore existence.
Modifying the price has an intense impact on the marketing strategy and, contingent
on the price elasticity of the product, it will frequently affect the demand and sales aswell. The price that the marketer sets should balance the other elements of the
marketing mix.
2. Product
The product is the simplest idea. It is an item or service that fulfills what a consumerneeds or wants. Your product can literally be anything, even an idea. You must have aconcrete grasp on what the product is, however, before you can successfully market it.
3. Promotion
Promotion can be all of the methods of communication that a marketer may use to
deliver information to various people about the product. Promotion is made up ofthings like: advertising, public relations, personal selling, viral and word-of-mouth,
-
7/27/2019 30408432-MI0039
3/14
and sales promotion. Promotion is essentially how you get the word out about your
product or service.
4. Place
Place is all about providing the product at a location which is convenient for
consumers to access. Today, that is frequently online. Place also has a lot to do withdistribution, or getting the product to the customer. Several approaches such as
intensive distribution, selective distribution, exclusive distribution and franchising can
be applied by the marketer to match the other parts of the marketing mix.
The four Ps can help you become a better marketer by understanding the simplified balanceof marketing products or services. Once you have a good understanding of these four aspects,
you can have more success in marketing your products or services.
- See more at: http://netprofitstoday.com/blog/the-four-ps-of-marketing/#sthash.eegSfVWB.dpuf
Q4. Website is the most important front end tool in the online marketing. It provides the
interactive mode of operation to the user. Define what is a website? Analyze the
structure of a website.
(defining the website 1 mark, diagram- 2 marks, analyzing with the justification- 7
marks)
Answer : Website :
A webpage is a document, typically written in plain text interspersed with formatting
instructions of Hypertext Markup Language (HTML, XHTML). A webpage may incorporateelements from other websites with suitable markup anchors.
Analyzing the structure of Website :
Browsing and page creation are two fundamental forms of Web usage. The two activities areinherently related, in large part through the complex link topology of the WWW; patterns of
browsing and information discovery are based fundamentally on the ways in which pages areconnected through the construction of hyperlinks. Links carry considerable meaning: a link to
another page, especially on another site, encodes a valuable type of human judgement. We
have been investigating link structure as a way of understanding its relation to the process of
searching for information, its role in the implicit communities that page creators define, andits implications for the understanding of social behavior on the Web.
Hubs, Authorities, and Communities. There is, clearly, no explicit global scheme that
controls the construction of Web pages and hyperlinks; how then can we discern high-levelforms of structure from the link topology? In our work, we have found that the notion of
authority provides a valuable perspective from which to consider this issue. A topic withbroad representation on the WWW contains a number of prominent, authoritative pages, and
structure emerges from the way in which such authorities are implicitly ``endorsed'' through
hyperlinks. Modeling the mechanism by which authority is conferred on the WWW is itself achallenging problem. In many cases, authoritative pages on a common topic do not endorse
one another directly -- Microsoft and Netscape are both good authorities for the topic of ``web
-
7/27/2019 30408432-MI0039
4/14
browsers,'' but they do not link to one another -- and so often they can only be grouped
together through an intermediate layer of relatively anonymous hub pages, which link to
multiple, thematically related authorities. Thus, hubs and authorities are distinct types ofpages that exhibit a natural form of symbiosis: a good hub points to many good authorities,
while a good authority is pointed to by many good hubs. Note that a good hub may not even
be pointed to by any page; in other words, some of the most valuable structural contributions
to the Web are being made by relatively unrecognized individuals.
We feel that this two-level model of hubs and authorities is appropriate to a domain asheterogeneous as the Web, where individuals, organizations, and large commercial enterprises
create hyperlinked content with different (and often conflicting) objectives in a common
environment. The model also provides a natural way to expose structure among both the set ofhubs, who often do not know directly of one another's existence, and among the set of
authorities, who often do not directly acknowledge one another's existence. We refer to a
densely interconnected set of hubs and authorities as a community. Note that our use of the
term ``community'' is not meant to imply that these structures have been constructed in acentralized or planned fashion. Rather, our experiments with the Web's link structure suggest
that communities of hubs and authorities are a recurring consequence of the way in whichcreators of WWW pages link to one another in the context of topics of widespread interest.
The notion of using link information to define measures of ``importance,'' as we do in
identifying authoritative pages, has antecedents in the study of social networks, citation
analysis, and recent approaches to hypertext information retrieval. Two such approachesrelated to ours are the influence weightmethodology of Pinski and Narin, from the field of
citation analysis, and thePageRankalgorithm of Brin and Page for the WWW. The models
underlying these techniques form an interesting contrast to ours. They posit frameworks inwhich one's importance is determined by the extent to which one is referred to by other
importantsources; they do not incorporate a notion ofhubs. As discussed above, we feel that
our model for the interaction between authorities and hubs captures some of the crucialfeatures of the Web's social organization: authority very often ``flows'' between highly visiblenodes only through an intervening set of hub pages.
Styles of Linking and Community Formation. One can find densely linked collections of
hubs and authorities in a remarkably diverse range of settings on the WWW. Because such
collections have an intrinsic definition in terms of the link structure, we can identify themeven in the absence of a specific topic description. This suggests a promising approach to
WWW categorization: Rather than assuming an a priori collection of subjects, we can let the
link-based communities themselves define the prevailing topics, niches, and user populations
of interest on the WWW. It is important to bear in mind that the issue here is not simply to
partition the WWW into focused groups of this sort; the full representation of any such groupon the WWW is typically enormous, and our small set of related authorities must serve the
critical function of providing a compact yet informative representation of a much larger
underlying population.
In order to fully realize these possibilities, we need to further deepen our understanding of the
many styles in which users create hyperlinks. We see recurrent contrasts between thestructures of communities that have primarily academic, commercial, or governmental
-
7/27/2019 30408432-MI0039
5/14
representation on the Web; the style of linking in a structure such as a corporate intranet
stretches our basic notions even further. We also see that communities on the Web often exist
to extents disproportionate to their presence in the ``real'' world.
Inferring Global Structure through Sampling. Although our goals are to infer notions of
structure that apply in aglobalsense on the WWW, we have developed analysis techniques
that operate on carefully chosensamples of only a few thousand Web pages at a time. Indeed,we find that our techniques typically extract the greatest degree of orderly structure in the
context of topics for which the overall number of relevant pages, and the density ofhyperlinking, is the largest. As a means for better understanding some of these phenomena,
we believe it would be extremely valuable to develop probabilistic models of page and
hyperlink creation that contain enogh structure to capture certain global properties of theWWW, and yet are clean enough to allow for concrete analysis. Such models could serve as a
testbed for studying the effectiveness of link-based analysis on the WWW, and potentially for
suggesting new methods of using links to study the structure of hypertext.
Links, Traffic, and Browsing Patterns. We began by observing that the activities of
browsing and linking are tightly coupled, and that the way in which the link structure of theWeb has evolved has, in large part, determined the style in which people navigate it. Webelieve that browsing and search can be further enhanced by an awareness of Web
communities. A few search engines are beginning to use link information, but effective tools
can be built into browsers too. For example, simply presenting pages pointing to the page
being browsed can lead a user to good hub pages very quickly. Such a technique can also bean effective supplement to contrasting approaches based on collaborative filtering, which use
browsing logs in place of the quality judgments of hubs. In general, tools that incorporate
high-level information about the WWW link topology can naturally lead users to adopt more``link-aware'' browsing paradigms, and can aid in developing approaches to navigation that
make more effective use of global structural information.
Question 3: Mobile advertising has become a no-brainer for some brands to drive in-storetraffic and online revenue. This is possible only after the growth of Mcommerce. DefineMcommerce. Describe the areas of its potential growth and future of mCommerce
-
7/27/2019 30408432-MI0039
6/14
Answer 3:
M-commerce (mobile commerce) is the buying and selling of goods and services through
wireless handheld devices such ascellular telephoneand personal digital assistants (PDAs).
Known as next-generatione-commerce, m-commerce enables users to access the Internetwithout needing to find a place to plug in. The emerging technology behind m-commerce,
which is based on the Wireless Application Protocol (WAP), has made far greater strides in
Europe, where mobile devices equipped with Web-ready micro-browsers are much more
common than in the United States.
In order to exploit the m-commerce market potential, handset manufacturers such as Nokia,
Ericsson, Motorola, and Qualcomm are working with carriers such as AT&T Wireless andSprint to develop WAP-enabled smart phones, the industry's answer to the Swiss Army Knife,
and ways to reach them. UsingBluetoothtechnology, smart phones offer fax, e-mail, and
phone capabilities all in one, paving the way for m-commerce to be accepted by an
increasingly mobile workforce.
As content delivery over wireless devices becomes faster, more secure, and scalable, there iswide speculation that m-commerce will surpass wireline e-commerce as the method of choice
for digital commerce transactions. The industries affected by m-commerce include:
Financial services, which includes mobile banking (when customers use theirhandheld devices to access their accounts and pay their bills) as well as brokerage
services, in which stock quotes can be displayed and trading conducted from the same
handheld device
Telecommunications, in which service changes, bill payment and account reviews can
all be conducted from the same handheld device
Service/retail, as consumers are given the ability to place and pay for orders on-the-fly
Information services, which include the delivery of financial news, sports figures andtraffic updates to a single mobile device
IBM and other companies are experimenting with speech recognition software as a way to
ensure security for m-commerce transactions.
Question 4: Write an essay on the need for research design and explain the principles ofexperimental designs.
Answer 4:
The need for the methodologically designed research:
a)- In many a research inquiry, the researcher has no idea as to how accurate the results of his
study ought to be in order to be useful. Where such is the case, the researcher has to determinehow much inaccuracy may be tolerated. In a quite few cases he may be in a position to know
http://searchmobilecomputing.techtarget.com/definition/cellular-telephonehttp://searchmobilecomputing.techtarget.com/definition/cellular-telephonehttp://searchmobilecomputing.techtarget.com/definition/cellular-telephonehttp://searchcio.techtarget.com/definition/e-commercehttp://searchcio.techtarget.com/definition/e-commercehttp://searchcio.techtarget.com/definition/e-commercehttp://searchmobilecomputing.techtarget.com/definition/WAPhttp://searchmobilecomputing.techtarget.com/definition/WAPhttp://searchmobilecomputing.techtarget.com/definition/WAPhttp://searchmobilecomputing.techtarget.com/definition/Bluetoothhttp://searchmobilecomputing.techtarget.com/definition/Bluetoothhttp://searchmobilecomputing.techtarget.com/definition/Bluetoothhttp://searchmobilecomputing.techtarget.com/definition/Bluetoothhttp://searchmobilecomputing.techtarget.com/definition/WAPhttp://searchcio.techtarget.com/definition/e-commercehttp://searchmobilecomputing.techtarget.com/definition/cellular-telephone -
7/27/2019 30408432-MI0039
7/14
how much inaccuracy his method of research will produce. In either case he should design his
research if he wants to assure himself of useful results.
b)- In many research projects, the time consumed in trying to ascertain what the data mean
after they have been collected is much greater than the time taken to design a research whichyields data whose meaning is known as they are collected.
c)- The idealized design is concerned with specifying the optimum research procedure thatcould be followed were there no practical restrictions.
Professor Fisher has enumerated three principles of experimental designs:
1. The principle of replication:
The experiment should be reaped more than once. Thus, each treatment is applied in manyexperimental units instead of one. By doing so, the statistical accuracy of the experiments is
increased. For example, suppose we are to examine the effect of two varieties of rice. For this
purpose we may divide the field into two parts and grow one variety in one part and the other
variety in the other part. We can compare the yield of the two parts and draw conclusion onthat basis. But if we are to apply the principle of replication to this experiment, then we first
divide the field into several parts, grow one variety in half of these parts and the other varietyin the remaining parts. We can collect the data yield of the two varieties and draw conclusionby comparing the same. The result so obtained will be more reliable in comparison to the
conclusion we draw without applying the principle of replication. The entire experiment can
even be repeated several times for better results. Consequently replication does not present
any difficulty, but computationally it does. However, it should be remembered that replicationis introduced in order to increase the precision of a study; that is to say, to increase the
accuracy with which the main effects and interactions can be estimated.
2. The principle of randomization:
It provides protection, when we conduct an experiment, against the effect of extraneous
factors by randomization. In other words, this principle indicates that we should design orplan the experiment in such a way that the variations caused by extraneous factors can all be
combined under the general heading of chance. For instance if we grow one variety of rice
say in the first half of the parts of a field and the other variety is grown in the other half, thenit is just possible that the soil fertility may be different in the first half in comparison to the
other half. If this is so, our results would not be realistic.
In such a situation, we may assign the variety of rice to be grown in different parts of the
field on the basis of some random sampling technique i.e., we may apply randomization
principle and protect ourselves against the effects of extraneous factors. As such, through the
application of the principle of randomization, we can have a better estimate of theexperimental error.
3. Principle of local control:
It is another important principle of experimental designs. Under it the extraneous factors, theknown source of variability, is made to vary deliberately over as wide a range as necessary
and this needs to be done in such a way that the variability it causes can be measured and
-
7/27/2019 30408432-MI0039
8/14
hence eliminated from the experimental error. This means that we should plan the experiment
in a manner that we can perform a two-way analysis of variance, in which the total variability
of the data is divided into three components attributed to treatments, the extraneous factor andexperimental error. In other words, according to the principle of local control, we first divide
the field into several homogeneous parts, known as blocks, and then each such block is
divided into parts equal to the number of treatments. Then the treatments are randomly
assigned to these parts of a block. In general, blocks are the levels at which we hold anextraneous factors fixed, so that we can measure its contribution to the variability of the data
by means of a two-way analysis of variance. In brief, through the principle of local control we
can eliminate the variability due to extraneous factors from the experimental error.
Question 5: Distinguish between primary and secondary of data collection. Explain the
features, uses, advantages and limitations of secondary data. Which is the best way of
collecting the data for research primary or secondary? Support your answer.
Answer 5:
Primary Data:
Primary sources are original sources from which the researcher directly collects data that have
not been previously collected e.g.., collection of data directly by the researcher on brand
-
7/27/2019 30408432-MI0039
9/14
awareness, brand preference, brand loyalty and other aspects of consumer behaviour from a
sample of consumers by interviewing them,. Primary data are first hand information collected
through various methods such as observation, interviewing, mailing etc.
Secondary Data:
These are sources containing data which have been collected and compiled for another
purpose. The secondary sources consists of readily compendia and already compiledstatistical statements and reports whose data may be used by researchers for their studies e.g.,
census reports , annual reports and financial statements of companies, Statistical statement,Reports of Government Departments, Annual reports of currency and finance published by
the Reserve Bank of India, Statistical statements relating to Co-operatives and Regional
Banks, published by the NABARD, Reports of the National sample survey Organization,Reports of trade associations, publications of international organizations such as UNO, IMF,
World Bank, ILO, WHO, etc., Trade and Financial journals newspapers etc.
Secondary sources consist of not only published records and reports, but also unpublished
records. The latter category includes various records and registers maintained by the firms and
organizations, e.g., accounting and financial records, personnel records, register of members,minutes of meetings, inventory records etc.
Features of Secondary Sources
Though secondary sources are diverse and consist of all sorts of materials, they have certain
common characteristics.
First, they are readymade and readily available, and do not require the trouble of constructing
tools and administering them.
Second, they consist of data which a researcher has no original control over collection and
classification. Both the form and the content of secondary sources are shaped by others.
Clearly, this is a feature which can limit the research value of secondary sources.
Finally, secondary sources are not limited in time and space. That is, the researcher usingthem need not have been present when and where they were gathered.
Use of Secondary Data
The second data may be used in three ways by a researcher. First, some specific information
from secondary sources may be used for reference purpose. For example, the generalstatistical information in the number of co-operative credit societies in the country, theircoverage of villages, their capital structure, volume of business etc., may be taken from
published reports and quoted as background information in a study on the evaluation of
performance of cooperative credit societies in a selected district/state.
Second, secondary data may be used as bench marks against which the findings of researchmay be tested, e.g., the findings of a local or regional survey may be compared with the
-
7/27/2019 30408432-MI0039
10/14
national averages; the performance indicators of a particular bank may be tested against the
corresponding indicators of the banking industry as a whole; and so on.
Finally, secondary data may be used as the sole source of information for a research project.
Such studies as securities Market Behaviour, Financial Analysis of companies, Trade in creditallocation in commercial banks, sociological studies on crimes, historical studies, and the like,
depend primarily on secondary data. Year books, statistical reports of governmentdepartments, report of public organizations of Bureau of Public Enterprises, Censes Reportsetc, serve as major data sources for such research studies.
Advantages of Secondary Data
Secondary sources have some advantages:
1. Secondary data, if available can be secured quickly and cheaply. Once their source of
documents and reports are located, collection of data is just matter of desk work. Even the
tediousness of copying the data from the source can now be avoided, thanks to Xeroxingfacilities.
2. Wider geographical area and longer reference period may be covered without much cost.
Thus, the use of secondary data extends the researchers space and time reach.
3. The use of secondary data broadens the data base from which scientific generalizations can
be made.
4. Environmental and cultural settings are required for the study.
5. The use of secondary data enables a researcher to verify the findings bases on primary data.
It readily meets the need for additional empirical support. The researcher need not wait the
time when additional primary data can be collected.
Disadvantages of Secondary Data
The use of a secondary data has its own limitations.
1. The most important limitation is the available data may not meet our specific needs. Thedefinitions adopted by those who collected those data may be different; units of measure may
not match; and time periods may also be different.
2. The available data may not be as accurate as desired. To assess their accuracy we need to
know how the data were collected.
3. The secondary data are not up-to-date and become obsolete when they appear in print,because of time lag in producing them. For example, population census data are published
tow or three years later after compilation, and no new figures will be available for another ten
years.
4. Finally, information about the whereabouts of sources may not be available to all socialscientists. Even if the location of the source is known, the accessibility depends primarily on
proximity. For example, most of the unpublished official records and compilations are located
in the capital city, and they are not within the easy reach of researchers based in far off places.
-
7/27/2019 30408432-MI0039
11/14
Question 6: Describe interview method of collecting data. State the conditions under which it
is considered most suitable. You have been assigned to conduct a survey on the reading habits
of the house wife in the middle class family. Design a suitable questionnaire consisting of 20
questions you propose to use in the industry.
Answer 6:
1).Structured Directive Interview:
-
7/27/2019 30408432-MI0039
12/14
This is an interview made with a detailed standardized schedule. The same questions are put
to all the respondents and in the same order. Each question is asked in the same way in each
interview, promoting measurement reliability. This type of interview is used for large-scaleformalized surveys.
Advantages:
This interview has certain advantages. First, data from one interview to the next one are easilycomparable. Second, recording and coding data do not pose any problem, and greater
precision is achieved. Lastly, attention is not diverted to extraneous, irrelevant and timeconsuming conversation.
Limitation:
However, this type of interview suffers from some limitations. First, it tends to lose the
spontaneity of natural conversation. Second, the way in which the interview is structured may
be such that the respondents views are minimized and the investigators own biases regardingthe problem under study are inadvertent introduced. Lastly, the scope for exploration is
limited.
2).Unstructured or Non-Directive Interview:
This is the least structured one. The interviewer encourages the respondent to talk freely about
a give topic with a minimum of prompting or guidance. In this type of interview, a detailedpre-planned schedule is not used. Only a broad interview guide is used. The interviewer
avoids channelling the interview directions. Instead he develops a very permissive
atmosphere. Questions are not standardized and ordered in a particular way.
This interviewing is more useful in case studies rather than in surveys. It is particularly usefulin exploratory research where the lines of investigations are not clearly defined. It is also
useful for gathering information on sensitive topics such as divorce, social discrimination,
class conflict, generation gap, drug-addiction etc. It provides opportunity to explore the
various aspects of the problem in an unrestricted manner.
Advantages:
This type of interview has certain special advantages. It can closely approximate the
spontaneity of a natural conversation. It is less prone to interviewers bias. It provides greater
opportunity to explore the problem in an unrestricted manner.
Limitations:
Though the unstructured interview is a potent research instrument, it is not free fromlimitations. One of its major limitations is that the data obtained from one interview is not
comparable to the data from the next. Hence, it is not suitable for surveys. Time may be
wasted in unproductive conversations. By not focusing on one or another facet of a problem,the investigator may run the risk of being led up blind ally. As there is no particular order or
sequence in this interview, the classification of responses and coding may required more time.
This type of informal interviewing calls for greater skill than the formal survey interview.
-
7/27/2019 30408432-MI0039
13/14
3).Focused Interview:
This is a semi-structured interview where the investigator attempts to focus the discussion on
the actual effects of a given experience to which the respondents have been exposed. It takes
place with the respondents known to have involved in a particular experience, e.g, seeing aparticular film, viewing a particular program on TV., involved in a train/bus accident, etc. The
situation is analyzed prior to the interview. An interview guide specifying topics relating tothe research hypothesis used. The interview is focused on the subjective experiences of therespondent, i.e., his attitudes and emotional responses regarding the situation under study. The
focused interview permits the interviewer to obtain details of personal reactions, specific
emotions and the like.
Merits:
This type of interview is free from the inflexibility of formal methods, yet gives the interview
a set form and insured adequate coverage of all the relevant topics. The respondent is askedfor certain information, yet he has plenty of opportunity to present his views. The interviewer
is also free to choose the sequence of questions and determine the extent of probing,
4).Clinical Interview:
This is similar to the focused interview but with a subtle difference. While the focusedinterview is concerned with the effects of specific experience, clinical interview is concerned
with broad underlying feelings or motivations or with the course of the individuals life
experiences.
The personal history interview used in social case work, prison administration, psychiatric
clinics and in individual life history research is the most common type of clinical interview.The specific aspects of the individuals life history to be covered by the interview are
determined with reference to the purpose of the study and the respondent is encouraged to talk
freely about them.
5).Depth Interview:
This is an intensive and searching interview aiming at studying the respondents opinion,
emotions or convictions on the basis of an interview guide. This requires much more training
on inter-personal skills than structured interview. This deliberately aims to elicit unconscious
as well as extremely personal feelings and emotions.
This is generally a lengthy procedure designed to encourage free expression of affectively
charged information. It requires probing. The interviewer should totally avoid advising or
showing disagreement. Of course, he should use encouraging expressions like uh-huh or Isee to motivate the respondent to continue narration. Some times the interviewer has to facethe problem of affections, i.e. the respondent may hide expressing affective feelings. The
interviewer should handle such situation with great care.
1. Start the interview. Carry it on in an informal and natural conversational style.
2. Ask all the applicable questions in the same order as they appear on the schedule withoutany elucidation and change in the wording. Ask all the applicable questions listed in theschedule. Do not take answers for granted.
-
7/27/2019 30408432-MI0039
14/14
3. If interview guide is used, the interviewer may tailor his questions to each respondent,covering of course, the areas to be investigated.
4. Know the objectives of each question so as to make sure that the answers adequatelysatisfy the question objectives.
5. If a question is not understood, repeat it slowly with proper emphasis and appropriate
explanation, when necessary.
6. Talk all answers naturally, never showing disapproval or surprise. When the respondentdoes not meet the interruptions, denial, contradiction and other harassment, he may feel
free and may not try to withhold information. He will be motivated to communicate whenthe atmosphere is permissive and the listeners attitude is non judgmental and is genuinely
absorbed in the revelations.
7. Listen quietly with patience and humility. Give not only undivided attention, but alsopersonal warmth. At the same time, be alert and analytic to incomplete, non specific andinconsistent answers, but avoid interrupting the flow of information. If necessary, jot
down unobtrusively the points which need elaboration or verification for later and timelier
probing. The appropriate technique for this probing is to ask for further clarification insuch a polite manner as I am not sure, I understood fully, is this.what you meant?
8. Neither argue nor dispute.
9. Show genuine concern and interest in the ideas expressed by the respondent; at the sametime, maintain an impartial and objective attitude.
10.Should not reveal your own opinion or reaction. Even when you are asked of your views,laugh off the request, saying Well, your opinions are more important than mine.
11.At times the interview runs dry and needs re-stimulation. Then use such expressions asUh-huh or That interesting or I see can you tell me more about that? and the like.
12.When the interviewee fails to supply his reactions to related past experiences, representthe stimulus situation, introducing appropriate questions which will aid in revealing the
past. Under what circumstances did such and such a phenomenon occur? or How didyou feel about it and the like.
13.At times, the conversation may go off the track. Be alert to discover drifting, steer theconversation back to the track by some such remark as, you know, I was very much
interested in what you said a moment ago. Could you tell me more about it?
14.When the conversation turns to some intimate subjects, and particularly when it deals withcrises in the life of the individual, emotional blockage may occur. Then drop the subject
for the time being and pursue another line of conversation for a while so that a less direct
approach to the subject can be made later.15.When there is a pause in the flow of information, do not hurry the interview. Take it as a
matter of course with an interested look or a sympathetic half-smile. If the silence is tooprolonged, introduce a stimulus saying You mentioned that What happened then?