Management Research Report: Tools, Data, Ethics, and Findings

Verified

Added on  2022/08/12

|5
|938
|26
Report
AI Summary
This report addresses key aspects of applied research, including tools and methods. It begins by providing examples of applied research tools such as observation checklists and questionnaires, detailing their application in research. The report then describes technologies supporting data collection and analysis, emphasizing the importance of both primary and secondary data. Presentation techniques and reporting methods for effectively communicating research findings are also discussed. Furthermore, the report outlines legal requirements, policies, procedures, and guidelines to ensure the secure storage and privacy of collected data. Finally, it explains the core principles of research ethics and code of conduct, covering topics such as minimizing harm, obtaining informed consent, protecting privacy, avoiding deception, and the right to withdraw from the study. References are provided for further reading.
Document Page
Running head: MANAGEMENT
MANAGEMENT
Name of the Student:
Name of the University:
Author’s Note:
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
1MANAGEMENT
Question 1:-
Provide examples of applied research tools and methods. Describe any two research tools and
methods and explain how they can be applied to research?
Answer:-
Quantitative approaches involve the analysis and collection of objective data, frequently
in mathematical form. Observation checklists, questionnaires, performance-based instruments
are some examples of applied research tools.
Observation Checklists:-
It is the tool used for arranged observation. The checklist contains pre-determined
individual classes of behaviors or arrangements or processes or procedures that will be detected
(Alshenqeeti, 2014). Learners must realize the utility of the witness and are pre-notified about
the observation. If not, the witness may threaten the class, and the information collected may not
be correct.
Questionnaires:-
It can be applying for structured conferences, online or offline self-administered
information collection, and mobile interviews. In a survey, the themes are compulsory to reply to
questions in writing or, more usually, by marking a response sheet. Applied research is planning
to answer the exact questions intended at answering practical complications.
Question 2:-
Describe the technologies that can be used to support data collection and analysis?
Document Page
2MANAGEMENT
Answer:-
It is a systematic procedure of analyzing and gathering exact information to offer
explanations to appropriate questions and estimate the outcomes. Secondary and primary data
collection methods are the two types of data collection, and it is essential to complete any data
analysis of the research (Johnston, 2017). There are different technology can be used to collect
any data like face to face interviews, data reporting, Thorough observation, and questionnaires.
Mainly the technology of data collection is described as a series of maps, charts, and figures
designed to gather, interpret, and current data for an extensive range of applications and
businesses.
Question 3:-
Explain the presentation techniques and reporting methods to present the research findings?
Answer:-
Proper presentation techniques of research findings are must be essential for applied
research. This unique regulation seems clear, but writers who have occupied in their records
sometimes fail to recognize that bibliophiles are losing in the quantity of represented data
(Burns, Bush & Sinha, 2014). Mainly the researcher should know their viewers, and then they
must highlight the research context among their audience. The researcher should include practice
recommendation for assists their audience. Simple data must help visualize readers.
Question 4:-
Explain the legal requirements, policies, procedures, and guidelines to store, secure, and
maintain the privacy of collected data?
Document Page
3MANAGEMENT
Answer:-
Data is a vital asset an organization has. With the increase of the data budget, businesses
find massive value in gathering, distributing, and using data. Data protection is the vital legal
requirements for any research (Martínez-Pérez, De La Torre-Díez & López-Coronado, 2015).
Many third-party services are trying to use the collected data illegally, and that is the reason the
collected data must be protected by security software and passwords. Apart from the proper data
security, the collected data can be misused by unethical people, and it is very much risky for the
future of any research.
Question 5:-
Explain research ethics and code of conduct
Answer:-
Five principles are must applying in any research. At first, minimizing the danger of harm
like social difficulty and physical damage to participants. The next principles are that finding
informed agreement. These must also be responsive that there are examples informed agreement
is not automatically desirable or wants to be relaxed (Harriss & Atkinson, 2015). These contain
certain informative, organizational, and realistic research situations. The third ethical code is
protecting privacy and confidentiality. Fourth and fifth ethical code of research is escaping
deceptive practices and providing the exact to withdraw. When a contributor selects to remove
from the investigation process, they should not be stressed or pressured in any way to attempt
and break them from retreating.
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
4MANAGEMENT
References:-
Alshenqeeti, H. (2014). Interviewing as a data collection method: A critical review. English
linguistics research, 3(1), 39-45.
Burns, A. C., Bush, R. F., & Sinha, N. (2014). Marketing research (Vol. 7). Harlow: Pearson.
Harriss, D. J., & Atkinson, G. (2015). Ethical standards in sport and exercise science research:
2016 update. International journal of sports medicine, 36(14), 1121-1124.
Johnston, M. P. (2017). Secondary data analysis: A method of which the time has come.
Qualitative and quantitative methods in libraries, 3(3), 619-626.
Martínez-Pérez, B., De La Torre-Díez, I., & López-Coronado, M. (2015). Privacy and security in
mobile health apps: a review and recommendations. Journal of medical systems, 39(1),
181.
chevron_up_icon
1 out of 5
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]