SlideShare una empresa de Scribd logo
1 de 10
Research Methods

 The 2 main methodologies are quantitative and
  Qualitative.
 Operational Definition: what you are measuring.
 Sample: Target group you are studying.
     Ex-Domestic violence counselors.
 
Qualitative Methodology

 Qualitative Methodology is used to uncover patterns
  within text.
 Qualitative Methods look at social patterns and
  social settings.
 Instead of numbers, qualitative methodology takes a
  look at a personal experiences. For example:
Examples of Qualitative Data

 Debbie (blog): I'm glad to visit with people experiencing compassion
  fatigue. I first had this thought as a child about my mother, who was
  usually having some physical complaint. Looking back, I think I just got
  tired of hearing about it all the time, and frustrated because there was
  nothing I could do to fix her. And I chastised myself then, and over the
  years since then, for not being more compassionate. Now I notice that I was
  doing the best I could, and so was my Mother. And I now question my
  belief that I should be more compassionate, when I'm not! It has given me
  some peace to honor my reality.

 frozenfaerie: I am going to be starting a position as a court appointed
  advocate, and I am very nervouse [nervous] about not having anywhere to
  vent. I mean You can't share any details with anyone, and I know that this
  could really bring a person down, so I have been in search of resources.
Examples of Qualitative Data continued…

 Counselor #7: Ummm…a little bit, it got kind of tiring if I
  talked to the same person over and over again and they just
  didn’t get it. I felt a little less compassion for them if they
  continued to put themselves and their children in harm’s way.
 Counselor #9: No. Well let’s see. Do you mean towards people
  who weren’t abused or clients? (Interviewer-It [people who
  weren’t abused or clients] can mean anything you want it to
  mean). As you know the women goes back 5 to 7 times to the
  abuser before she leaves. Maybe a little callousness toward the
  abuser, but not towards people in society. Not everyone is
  going to be an abuser. I would like to believe the abuser will
  change. I am more hopeful than callous I think. It’s not my
  choice. I have to have faith in her choice. Hopeful that we gave
  her the tools to make a good choice.
Participant Observation

 One way to collect qualitative data is Participant
  Observation.
 This is a method where the researcher is a part
  of, and participates in, the activities of the group.
Secondary Research Analysis

 Another way to collect qualitative data is through
    Secondary Research Analysis.
    SRA is analyzing documents that already exist, such

    as:
    Political Speeches

    Agency Reports

    Insurance Claims

Why Research is a Valuable Skill to Have

 Builds critical thinking skills.
 Companies love it.
 Looks good on a resume or for a grad school
 application.
Know Your Ethics

 Make sure you have approval from the company(and
  school if needed) that you are working for BEFORE
  you begin your study.
 Make sure your participants have informed consent.
 Know participants rights.
Example of a Consent Statement

    Dear Participant,

    My name is Terra Ryan. I am a Graduate student at the University of Northern Colorado. I am currently working on a thesis for my Masters degree in Social

    Science with an emphasis in Clinical Sociology. The topic for my thesis is the role that virtual communities might play in providing social support and reducing
    compassion fatigue among domestic violence counselors.

    For this project, I am partnering with the a nonprofit called the HealthBridge Alliance, whose mission is to improve the effectiveness of helping professions by

    providing training, tools and support to those at risk of or experiencing secondary trauma.

    If you choose to be a part of this study, you will a create screen name (or alias), one that does not reveal anything about you personally. You will also need to

    create a fictitious email address. No attempt will be made to send email to you. Only screen names will appear in the study. Please know that participation in the
    board implies consent. I will do my best to protect the confidentiality of statements made, but I cannot guarantee full anonymity given the nature of today’s
    internet transmissions.

    Please know that clarifying questions may be asked by the Interviewer (i.e. what a technical term means).


    Your real name will never appear in any section of the final paper. Please be aware that the HealthBridge Alliance will use the results of the study to promote

    new programs to their funders and the public.

    Your participation will probably not result in any direct benefits to you as an individual; however, your participation will contribute to uncovering factors that

    cause a domestic violence counselor to experience compassion fatigue as well as to see if virtual communities may benefit counselors by alleviating compassion
    fatigue and offering social support. Your participation will not affect your position, job status, or employment in any way.

    Due to the restrictions of federal research guidelines, if you are pregnant please DO NOT participate in the blog.


    Authorization: I have read the above and understand the nature of the study and agree to participate. I understand that by agreeing to participate in this study, I

    have not waived any legal or human rights. I also understand that I have the right to refuse to participate and that I have the right to withdraw from the study at
    any time and I understand that my decision to withdraw will be respected with no coercion or prejudice.

    If you have any concerns about your selection or treatment as a research participant, please contact the Sponsored Programs and Academic Research Center,

    Kepner Hall, University of Northern Colorado Greeley, CO 80639; 970-351-1907

    Thank you so much for your time.

    Sincerely,

    Terra Ryan

What To Expect…

 Go with the flow.
 Expect changes.
• Expect to make changes to methodology, theories
  etc.
• Be as clear as you can with your instructions or be
  ready to change them if need be.
  Know that it is OK to let projects go if they don’t
  work.
  Think publication.

Más contenido relacionado

Similar a It Is Possible To Blend Both Quantative And

Sm module a part 4 self advocacy (2)
Sm module a part 4 self advocacy (2)Sm module a part 4 self advocacy (2)
Sm module a part 4 self advocacy (2)Robyn Cook-Ritchie
 
Now you're asking for it! A Culture of Continuous Feedback
Now you're asking for it! A Culture of Continuous FeedbackNow you're asking for it! A Culture of Continuous Feedback
Now you're asking for it! A Culture of Continuous FeedbackJason Schreuder
 
Dystopias Definition and Characteristics Utopia A place, s
Dystopias Definition and Characteristics Utopia A place, sDystopias Definition and Characteristics Utopia A place, s
Dystopias Definition and Characteristics Utopia A place, sAlyciaGold776
 
FO611 Unit 2 Written Assignment Details Instructions
FO611 Unit 2 Written Assignment Details Instructions FO611 Unit 2 Written Assignment Details Instructions
FO611 Unit 2 Written Assignment Details Instructions ShainaBoling829
 
Invest in Yourself
Invest in YourselfInvest in Yourself
Invest in YourselfStephen Deas
 
5 tips for achieving a career you love
5 tips for achieving a career you love5 tips for achieving a career you love
5 tips for achieving a career you loveumarus5257
 
What makes me tick
What makes me tickWhat makes me tick
What makes me tickBrenna Hill
 
Au Psy492 E Portfolio Template For Slide Share
Au Psy492 E Portfolio Template For Slide ShareAu Psy492 E Portfolio Template For Slide Share
Au Psy492 E Portfolio Template For Slide Shareraygoodsell
 
Running Head LASA 1 Final Project Early Methods Section .docx
Running Head LASA 1 Final Project Early Methods Section        .docxRunning Head LASA 1 Final Project Early Methods Section        .docx
Running Head LASA 1 Final Project Early Methods Section .docxcharisellington63520
 
Levi Essay. Online assignment writing service.
Levi Essay. Online assignment writing service.Levi Essay. Online assignment writing service.
Levi Essay. Online assignment writing service.Erica Wright
 
How (Un)Ethical Are YouMost of us believe that we are ethi
How (Un)Ethical Are YouMost of us believe that we are ethiHow (Un)Ethical Are YouMost of us believe that we are ethi
How (Un)Ethical Are YouMost of us believe that we are ethiLizbethQuinonez813
 
Web quest: Take a stand
Web quest: Take a standWeb quest: Take a stand
Web quest: Take a standelavolet
 

Similar a It Is Possible To Blend Both Quantative And (16)

Sm module a part 4 self advocacy (2)
Sm module a part 4 self advocacy (2)Sm module a part 4 self advocacy (2)
Sm module a part 4 self advocacy (2)
 
Now you're asking for it! A Culture of Continuous Feedback
Now you're asking for it! A Culture of Continuous FeedbackNow you're asking for it! A Culture of Continuous Feedback
Now you're asking for it! A Culture of Continuous Feedback
 
Dystopias Definition and Characteristics Utopia A place, s
Dystopias Definition and Characteristics Utopia A place, sDystopias Definition and Characteristics Utopia A place, s
Dystopias Definition and Characteristics Utopia A place, s
 
FO611 Unit 2 Written Assignment Details Instructions
FO611 Unit 2 Written Assignment Details Instructions FO611 Unit 2 Written Assignment Details Instructions
FO611 Unit 2 Written Assignment Details Instructions
 
Career Portfolio
Career PortfolioCareer Portfolio
Career Portfolio
 
Invest in Yourself
Invest in YourselfInvest in Yourself
Invest in Yourself
 
Peer Reflection
Peer ReflectionPeer Reflection
Peer Reflection
 
5 tips for achieving a career you love
5 tips for achieving a career you love5 tips for achieving a career you love
5 tips for achieving a career you love
 
What makes me tick
What makes me tickWhat makes me tick
What makes me tick
 
Au Psy492 E Portfolio Template For Slide Share
Au Psy492 E Portfolio Template For Slide ShareAu Psy492 E Portfolio Template For Slide Share
Au Psy492 E Portfolio Template For Slide Share
 
Running Head LASA 1 Final Project Early Methods Section .docx
Running Head LASA 1 Final Project Early Methods Section        .docxRunning Head LASA 1 Final Project Early Methods Section        .docx
Running Head LASA 1 Final Project Early Methods Section .docx
 
Human beings being human
Human beings being humanHuman beings being human
Human beings being human
 
Levi Essay. Online assignment writing service.
Levi Essay. Online assignment writing service.Levi Essay. Online assignment writing service.
Levi Essay. Online assignment writing service.
 
How (Un)Ethical Are YouMost of us believe that we are ethi
How (Un)Ethical Are YouMost of us believe that we are ethiHow (Un)Ethical Are YouMost of us believe that we are ethi
How (Un)Ethical Are YouMost of us believe that we are ethi
 
Web quest: Take a stand
Web quest: Take a standWeb quest: Take a stand
Web quest: Take a stand
 
Presentation4
Presentation4Presentation4
Presentation4
 

Último

How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 

Último (20)

How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 

It Is Possible To Blend Both Quantative And

  • 1. Research Methods  The 2 main methodologies are quantitative and Qualitative.  Operational Definition: what you are measuring.  Sample: Target group you are studying. Ex-Domestic violence counselors. 
  • 2. Qualitative Methodology  Qualitative Methodology is used to uncover patterns within text.  Qualitative Methods look at social patterns and social settings.  Instead of numbers, qualitative methodology takes a look at a personal experiences. For example:
  • 3. Examples of Qualitative Data  Debbie (blog): I'm glad to visit with people experiencing compassion fatigue. I first had this thought as a child about my mother, who was usually having some physical complaint. Looking back, I think I just got tired of hearing about it all the time, and frustrated because there was nothing I could do to fix her. And I chastised myself then, and over the years since then, for not being more compassionate. Now I notice that I was doing the best I could, and so was my Mother. And I now question my belief that I should be more compassionate, when I'm not! It has given me some peace to honor my reality.  frozenfaerie: I am going to be starting a position as a court appointed advocate, and I am very nervouse [nervous] about not having anywhere to vent. I mean You can't share any details with anyone, and I know that this could really bring a person down, so I have been in search of resources.
  • 4. Examples of Qualitative Data continued…  Counselor #7: Ummm…a little bit, it got kind of tiring if I talked to the same person over and over again and they just didn’t get it. I felt a little less compassion for them if they continued to put themselves and their children in harm’s way.  Counselor #9: No. Well let’s see. Do you mean towards people who weren’t abused or clients? (Interviewer-It [people who weren’t abused or clients] can mean anything you want it to mean). As you know the women goes back 5 to 7 times to the abuser before she leaves. Maybe a little callousness toward the abuser, but not towards people in society. Not everyone is going to be an abuser. I would like to believe the abuser will change. I am more hopeful than callous I think. It’s not my choice. I have to have faith in her choice. Hopeful that we gave her the tools to make a good choice.
  • 5. Participant Observation  One way to collect qualitative data is Participant Observation.  This is a method where the researcher is a part of, and participates in, the activities of the group.
  • 6. Secondary Research Analysis  Another way to collect qualitative data is through Secondary Research Analysis. SRA is analyzing documents that already exist, such  as: Political Speeches  Agency Reports  Insurance Claims 
  • 7. Why Research is a Valuable Skill to Have  Builds critical thinking skills.  Companies love it.  Looks good on a resume or for a grad school application.
  • 8. Know Your Ethics  Make sure you have approval from the company(and school if needed) that you are working for BEFORE you begin your study.  Make sure your participants have informed consent.  Know participants rights.
  • 9. Example of a Consent Statement Dear Participant,  My name is Terra Ryan. I am a Graduate student at the University of Northern Colorado. I am currently working on a thesis for my Masters degree in Social  Science with an emphasis in Clinical Sociology. The topic for my thesis is the role that virtual communities might play in providing social support and reducing compassion fatigue among domestic violence counselors.  For this project, I am partnering with the a nonprofit called the HealthBridge Alliance, whose mission is to improve the effectiveness of helping professions by  providing training, tools and support to those at risk of or experiencing secondary trauma.  If you choose to be a part of this study, you will a create screen name (or alias), one that does not reveal anything about you personally. You will also need to  create a fictitious email address. No attempt will be made to send email to you. Only screen names will appear in the study. Please know that participation in the board implies consent. I will do my best to protect the confidentiality of statements made, but I cannot guarantee full anonymity given the nature of today’s internet transmissions.  Please know that clarifying questions may be asked by the Interviewer (i.e. what a technical term means).   Your real name will never appear in any section of the final paper. Please be aware that the HealthBridge Alliance will use the results of the study to promote  new programs to their funders and the public.  Your participation will probably not result in any direct benefits to you as an individual; however, your participation will contribute to uncovering factors that  cause a domestic violence counselor to experience compassion fatigue as well as to see if virtual communities may benefit counselors by alleviating compassion fatigue and offering social support. Your participation will not affect your position, job status, or employment in any way.  Due to the restrictions of federal research guidelines, if you are pregnant please DO NOT participate in the blog.   Authorization: I have read the above and understand the nature of the study and agree to participate. I understand that by agreeing to participate in this study, I  have not waived any legal or human rights. I also understand that I have the right to refuse to participate and that I have the right to withdraw from the study at any time and I understand that my decision to withdraw will be respected with no coercion or prejudice.  If you have any concerns about your selection or treatment as a research participant, please contact the Sponsored Programs and Academic Research Center,  Kepner Hall, University of Northern Colorado Greeley, CO 80639; 970-351-1907  Thank you so much for your time.  Sincerely,  Terra Ryan 
  • 10. What To Expect…  Go with the flow.  Expect changes. • Expect to make changes to methodology, theories etc. • Be as clear as you can with your instructions or be ready to change them if need be. Know that it is OK to let projects go if they don’t work. Think publication.