Reference no: EM13760048
identified the type of data, the frequency of collection, tools and have also explored topics related to ethical consideration of this information. You are in the process of collecting data for your action research in the field at this time.
Be reminded that you're the approved Action Research Informed Consent allows your implementation of this action research intervention or innovation in a specialized setting as follows:
Those currently employed in a classroom setting.
Those currently employed in a non-classroom or educational setting.
Those not employed but implementing the intervention or innovation with family members, yourself, or your own children.
You are also in the final week of your action research intervention. Through this process, your experience reinforces action research as being cyclical (Buczynski & Hansen, 2014; Mills, 2014) and for the best outcome we must engage in critical reflection of the data (Volante & Beckett, 2011).
Vital to the process of collecting data is the continual alignment to your research question(s). Equally important is how you will systematically collect multiple sources of data and present the finding to arise at comprehensive conclusions at the termination of your study. The quality of your data analysis is a strong predictor of the ease with which you can manage the data but how you can develop sound findings at the end of your study. Consider: How will you triangulate this information? How will you continue to build upon this information in order to make sense and correlate your data to your outcomes?
The focus of this assignment is to reflect on the data and to prepare for how to analyze in order to answer the research question. We want to answer the question of "So what?" (Mills, 2014, p.132) This is a critical stage of your action research! In this assignment, you evaluate the main themes emerging from your data thus far and how they are or are not supporting your research questions. For example, depending on what you are seeing in the data, you may have assessed that your research question should have been stated in a slightly different manner in order to more authentically capture the specific data. Or, perhaps the data tells you that one of your questions was irrelevant or that an additional question with a slightly different focus should have been asked.
Construct your assignment to meet the content and written communication expectations below.
Content Expectations
Themes: Describe the themes emerging from the data collection.
Personal Experiences: Analyze how the preliminary findings relate to your personal experiences using specific examples.
Implications: Describe the implications of your data that can be used to answer your research question(s).
Health services systems
: Research your own geographic region (town, city, county, or state) for data that is commonly used in health services systems.
|
Create resolutions/solutions for the threat or vulnerability
: In the organization, there is an insider threat. The employee who is the threat has been discussing a perceived vulnerability in the system. create resolutions/solutions for the threat or vulnerability
|
Write a paper that describes your findings and observations
: Write a paper that describes your findings and observations. Include additional resources that support, reinforce, or even challenge your findings and observations.
|
Assignment on internet hacking
: The topic is internet Hacking it should be at least 6 to 8 body pargraph, I just waana let you now that im not native english speaker so plese have easy vocabulary
|
How will you triangulate given information
: How will you triangulate this information? How will you continue to build upon this information in order to make sense and correlate your data to your outcomes?
|
Beat the hacker
: A honeypot can be a useful for discovering some of the hacking trends occurring within an organization. Of course, there have to be certain measures placed upon its operation, maintenance
|
Describe the reasons for disneys adoption of itil
: Describe the reasons for Disney's adoption of ITIL. Examine the results that were attained by Disney
|
Overview of network security fundamentals
: Overview of network security fundamentals, security threats, and issues (discuss from a company wide standpoint).
|
Write a book review on children of dust by ali eteraz
: Write a Book Review on "Children of Dust" by Ali Eteraz
|