Professional Documents
Culture Documents
CHAPTER 3 Atta Mimi Aulia
CHAPTER 3 Atta Mimi Aulia
2022. The majority of the references are from a variety of books and
though.
to recognize text and photo data (Cresswell, 2014, p. 245). In short, the
text and image data are so dense and rich, not all of the information can
researchers need to examine the data, in this case is the text in source
Bone".
steps, it comes to the procedure of the research. The steps are listed as
follows:
1. Preparation
The author advances to the next level after the advisor approves the
research. The first step is to control the data source that will become the
research's target, as well as to establish a set title and select the novel that
will be used for the study, which is "Shadow and Bone." The following
2. Implementation
The author read " Shadow and Bone " novel for the
implementation. The author read both version of the novel English and
Indonesian. After reading for several times, the author then marked each
previous phase to make sure the data is already correct. Finally, the author
gathered data of modulation in data description. After that, the data was
3. Finishing
Finally, the author must persuade the reader that the paper is
complete, including reporting and consulting with the adviser until the
research findings are complete. To achieve the best outcome, the error
must still be fixed, after which the study findings must be typed and
printed.
paper. As a result, the author has identified the problem and the study's
The next step is to seek advice from an expert. In order for the
researcher to gather the necessary data for this study, these items must
be discussed with the first and second advisors for each chapter. After
the discussion, the author revises what has been discussed and makes
any flaws in the research while editing the results for omitting
The final stage of making the major easy to understand for the
the research. From this step the author can take the lead and clarify each
Choosing the data collection technique to use is the next step. The data
collecting technique refers to the process the researcher uses to gather the
study's data. In this study, the researcher uses certain methods. Data
collecting techniques, according to Sidiq and Choiri (2019, p. 57), are a way
of gathering information in the field so that study findings may be useful and
evolve into a new idea or creation. Because the data collection process was
question involve observation. In a certain sense, this is a study that will yield
For this study, the author employs a number of different tactics. The
novel and the Indonesian version and then compares them, whether the
sentence can be said to be modulation or not. The author uncovers all of the
modulation phrases in the novel "Shadow and Bone" in the second step. The
According to Creswell, there are six processes to data analysis (2014, pp.
247-249), which includes reading or looking at all of the data, starting coding
all of the data, utilizing the coding process to develop a description of the
The first step is to analyze after observing the data obtained from the
novel Shadow and Bone, the author puts the data or sentences that have
modulations and their translations in the Indonesian novel. After that, the
author analyzed how finally it could be called modulation. Then after that the
author analyzed the sentence that had been approved as a modulation into
which type of modulation was using Newmark's theory. Finally, the author
concludes the results of the analysis. Then the writer discussed with the
supervisor.
E. Data Sources
The source of the primary data, according to Kothari (2004, p. 95)
the primary data are those that are gathered fresh and for the first time,
making them unique by nature. In this research, the author uses Leigh
Bardugo's novel "Shadow and Bone" as the data source. The author is looking
kingdom is at war and there is a problem setting where the Shadow Fold is
formed in the area around the Sea or a small strait that separates several areas
in Ravka and is used to hide monsters. This book is about Grisha, who is a
human with special abilities that they are born with and can control certain
elements. There are three of them. Corporalki can affect the human body,
Etheralki can control natural elements, and Materialki can manipulate solid
objects, to name a few. This book also includes maps to help us visualize and
project. This series premiered on Netflix yesterday, April 23, 2021, and
received generally excellent feedback and reviews. The author uses the
modulation included in the data source as a data object. The author then
looked at the classification and pattern to figure out what was causing it.
there, information that has already been received and examined by another
party. When a researcher uses secondary data, they must search through other
sources to gather it. When faced with the challenges often associated with
obtaining original data in this situation, Kothari (2004, p. 111). The author's
theories in the book that the author can use to develop translation strategies
F. Qualitative Validity
1. Credibility
Guba and Lincoln (1985) identifies five key techniques that should
analyze the facts for credibility, the author also conducts peer debriefings
with friends, then the author makes continuous observations and consults
2. Transferability
The degree of relationship between the sending and receiving (or earlier
and later) events will decide whether they hold in a different context or
even the same context at a different time. The author needs a concise and
3. Dependability
the author often consults with the advisors and reviews every aspect of the
4. Confirmability
Since the confirmability test and the dependability test in qualitative
not pretend that a method doesn't exist just because a product does in
in the final phase. The author will be required to defend their thesis in front
of examiners and they will be held accountable for all of the claims they
make.