Professional Documents
Culture Documents
Local Media8876550084122030654
Local Media8876550084122030654
Local Media8876550084122030654
METHODOLOGY
Research Design
This paper will use the phenomenological study as a design because this
approach is used to describe the phenomenon and not explain the phenomenon,
Phenomenological study as the research design of this study is find suited for it is
In this study, researchers aim to write this piece to provide insight into
and feelings of the participants in facing the issues and challenges in online and
traditional learning.
of the student. The study will benefit Parents, Students, and Stakeholders.
indicator, play a crucial role in student success. Students who study in a positive
learning environment with Parents facilitating are more motivated, engaged, and
The study will employ the interview method of data generation. Many
interviews is their ability to yield information that directly answers the research
questions. One benefit of using interviews is that they provide flexibility to the
researchers, who can prove and follow up on the interviewee’s answers to yield
deeper information. In a like manner, interviewees can also ask for clarification
from the interviewer if they do not understand the question. This way, the
researcher can gather more accurate information from the interviewees (Menter et
al., 2011).
However, Yin (2013) cites that one of the dangers of employing interviews
is the tendency for participants only to provide information that they think the
accurate information. To avoid this, the researcher must have a “good background
interpretation, and, if all else fails, to triangulate response through other interviews
feature that all qualitative interview formats share is that questions are usually
16
open-ended (Ary et al., 2014). It means that questions are not answerable by a
yes or a no, but they allow respondents to reveal more comprehensive answers.
flexibility to probe through these answers. The interviewer also has the
opportunity to tailor the questions to adapt to what the interviewee is saying. The
questions may have been formulated to guide the interviewer in covering the
whole topic, but the interviewer can modify the questions during the interview
Research Participants
enrolled in the public School of San Francisco, Agusan Del Sur. There will be 5
participants to be interviewed. Participants are selected who can best inform the
The interviews will be conducted thru face to face employing the necessary
interview protocol. However, the interview may take place outside the school,
number of participants was sought from the criteria set forth by Creswell (2003)
when he mentioned that the participants must not be less than one but more than
one method by which one’s study results reach data saturation Bernard (2012).
Data Collection
To start the data collection, the researchers will follow the steps:
17
data.
internet.
3. The researchers will interview the participants facing these issues and
4. The researchers will prepare all the essential things used in conducting a
Before the interview begins, prayer should be done, and it should be closed
with a thank message to the participants who volunteered and shared their time
Data collection will start with looking for the appropriate questionnaire for the
study and the appropriate questionnaire search from the internet. The items will
Data Analysis
The study will employ a data analysis procedure that involves coding and thematic
analysis.
observations will mean something once analyzed and evaluated (Bell, 2010).
18
Researchers point out that the complex nature of qualitative research entails a
rich repertoire of techniques that can be applied to data analysis (Burton &
Bartlett, 2005; King & Horrocks, 2010; Punch & Oancea, 2014).
In the study, managing data will begin with transcribing field interviews and
organizing field notes. It is done to help the researcher familiarize themselves and
engage with the data (Ary et al., 2014). Lochmiller and Lester (2017) suggest that
it is also better for researchers to listen and re-listen to audio recordings even
questions that they can refer to as they progress through the analysis. During
transcribing data, the researcher will simultaneously take notes to capture key
ideas and great thoughts in his head. This written reflection of the data is called a
memo or an ongoing conversation between herself and her data (Clarke, 2005;
Lochmiller & Lester, 2017). Besides memoing data, researchers also use codes,
labels, annotations, charts, and summaries to manage and organize data (Ary et
al., 2014; Blaxter, 2010). After familiarizing with and organizing data, Ary et al.
(2014) point out that the qualitative researcher’s next step is coding.
or patterns within the data are identified, analyzed, and reported (Braun & Clarke,
2006). Unlike codes, which refer directly to the data, themes are “almost entirely
based on the analytic interpretation of the data” (Lochmiller & Lester, 2017, p. 46).
King and Horrocks (2010) define themes as “the recurrent and distinctive features
which the researcher sees as relevant to the research question .”Aronson (1995)
argues that thematic analysis is the best way to understand the ideas that emerge
from the conversations for a study that uses ethnographic interviews for data
19
collection. With this in mind, the study utilizes thematic analysis to piece together
collective experience.”
Trustworthiness
readers that their research findings are worthy of attention (Lincoln & Guba,
confirmability.
will be determined and examined accurately. Guba & Lincoln (1989) claimed that
confronted with an experience they can recognize. Credibility addresses the "fit"
(Tobin & Begley, 2004 pg,88). Credibility will be employed as we gather data from
our participants. We will ensure that all findings from our participants' responses
are authentic and were not just made by us. Rest assured that the researcher will
are helpful to the person in other settings, differs from other research aspects in
that readers determine how applicable the findings are to their situations (Polit &
Beck, 2014). Our study will also assess how research findings can be applied to
research process is logical, traceable, and documented (Tobin & Begley, 2004).
When readers can examine the research process, they can better judge the
our findings or results must come from trustworthy sources. We must ensure that
all of the data we collect is consistent so that our investigation yields consistent
interpretations and findings are derived from the data, requiring the researcher to
demonstrate how conclusions and interpretations have been reached (Tobin &
Begley, 2004). Koch (1994) recommended that researchers include markers such
the study so that others can understand how and why decisions were made.
Aside from our recorded data, we shall keep a log of our entire study
with our data, conclusions, or results. The researcher will be objective and free of
prejudices.
essential (Whiteland, 2014). The term "validity" applies more to quantitative than
After the expert validation, the interview questionnaire will be revised, and
the final copy will be presented to the adviser. Upon approval, the researcher will
draft the letter of permission to conduct the study addressed to the concerned
institutions. After approval has been sought from the approving agencies, the
interview will commence. The researcher will personally conduct the interview.
data through the interview method. Ethical considerations mean that the
researcher is responsible for caring for the welfare of the participants participating
rapport between the researcher and participants are increased for the duration of
Ethical Considerations
This study was conducted with a firm adherence to the ethical protocols
and guidelines the school ethics committee set forth. The researchers will
religiously request and secure the corresponding permission from key school
officials to complete this research. Proper authorization and consent will also be
obtained from the sample of the study, in which they will be assured that all their
rights would be fully protected, specifically in handling the data such as, but not
limited to:
study were carefully explained and presented through formal consent to ensure
that the respondents fully understood how they could contribute to the study. Only
those who accepted the invitation to participate were given survey questionnaires.
22
Privacy and Confidentiality. In line with protecting the rights of the study
participants, all the information gathered from this study will be kept private and
confidential.
study will be clear and comprehensible, and the researcher will ensure that the
respondents are fully aware of the benefits the school may get from the study.
The survey will be conducted with the approval of the concerned school
Risks. This research will not involve high-risk situations that the population
will protect and secure the rights of the individuals in the study.
Benefits. The results of this study can help critical officials and
stakeholders since the findings will give them new information in planning and
guardians, caregivers, and students will better understand online and traditional
learning. Lastly, administrators can also gain new insight from this study since
they have long been exploring new mechanisms and factors in enhancing the
Plagiarism. The researchers will ensure that the correct and accurate way
of citing ideas from other writers and scholars is fully observed. To be able to do
23
this, this paper will undergo grammar and plagiarism checking via Grammarly and
Turnitin software.