SlideShare una empresa de Scribd logo
1 de 36
Business
        Research Methods

               William G. Zikmund


     Chapter 10:
Survey Research: Basic
Communication Methods
Copyright © 2000 by Harcourt, Inc.

   All rights reserved. Requests for
permission to make copies of any part
 of the work should be mailed to the
   following address: Permissions
Department, Harcourt, Inc., 6277 Sea
   Harbor Drive, Orlando, Florida
              32887-6777.
SURVEYS

SURVEYS ASK A RESPONDENT FOR
INFORMATION USING VERBAL OR
WRITTEN QUESTIONING




                   Copyright © 2000 by Harcourt, Inc. All rights reserved.
COMMUNICATING WITH
           RESPONDENTS
• PERSONAL INTERVIEWS
   • DOOR-TO-DOOR
   • SHOPPING MALL INTERCEPTS
• TELEPHONE INTERVIEWS
• SELF-ADMINISTERED
  QUESTIONNAIRES



                           Copyright © 2000 by Harcourt, Inc. All rights reserved.
PERSONAL INTERVIEWS




           Copyright © 2000 by Harcourt, Inc. All rights reserved.
Good Afternoon, my name is
 _________. I am with _________
survey research company. We are
conducting a survey on_________.


                       Copyright © 2000 by Harcourt, Inc. All rights reserved.
Door-to-Door Personal Interview




Speed of Data Collection       Moderate to fast

Geographical Flexibility       Limited to moderate

Respondent Cooperation         Excellent

Versatility of Questioning     Quite versatile




                                  Copyright © 2000 by Harcourt, Inc. All rights reserved.
Door-to-Door Personal Interview




Questionnaire Length          Long

Item Nonresponse              Low

Possibility of Respondent     Lowest
Misunderstanding

Degree of Interviewer         High
Influence of Answer

Supervision of Interviewers   Moderate

                               Copyright © 2000 by Harcourt, Inc. All rights reserved.
Door-to-Door Personal Interview




Anonymity of Respondent          Low

Ease of Call Back or Follow-up   Difficult

Cost                             Highest

Special Features                 Visual materials may be
                                 shown or demonstrated;
                                 extended probing possible



                                         Copyright © 2000 by Harcourt, Inc. All rights reserved.
Mall Intercept Personal Interview

 Speed of Data Collection         Fast

Geographical Flexibility          Confined, urban bias

Respondent Cooperation            Moderate to low

Versatility of Questioning        Extremely versatile

Questionnaire Length              Moderate to Long




                                    Copyright © 2000 by Harcourt, Inc. All rights reserved.
Mall Intercept Personal Interview




Item Nonresponse                  Medium

Possibility of Respondent         Lowest
Misunderstanding

Degree of Interviewer             Highest
Influence of Answers

Supervision of Interviewers       Moderate to high

                                    Copyright © 2000 by Harcourt, Inc. All rights reserved.
Mall Intercept Personal Interview




Anonymity of Respondent        Low

Ease of Call Back or           Difficult
Follow-up

Cost                           Moderate to high

Special Features               Taste test, viewing
                               of TV Commercials
                               possible
                                   Copyright © 2000 by Harcourt, Inc. All rights reserved.
Telephone Surveys




       Copyright © 2000 by Harcourt, Inc. All rights reserved.
Telephone Surveys




Speed of Data Collection                     Very fast

Geographical Flexibility                     High

Respondent Cooperation                       Good

Versatility of Questioning                   Moderate



                             Copyright © 2000 by Harcourt, Inc. All rights reserved.
Telephone Surveys



Questionnaire Length          Moderate

Item Nonresponse              Medium

Possibility of Respondent     Average
Misunderstanding

Degree of Interviewer         Moderate
Influence of Answer

Supervision of Interviewers   High, especially with
                              central location WATS
                              interviewing
                                Copyright © 2000 by Harcourt, Inc. All rights reserved.
Telephone Surveys



Anonymity of Respondent          Moderate

Ease of Call Back or Follow-up   Easy

Cost                             Low to moderate

Special Features                 Fieldwork and supervision
                                 of data collection are
                                 simplified; quite adaptable
                                 to computer technology



                                        Copyright © 2000 by Harcourt, Inc. All rights reserved.
TELEPHONE SURVEYS

• Central Location Interviewing
• Computer-Assisted Telephone Interviewing
• Computerized Voice-Activated Interviews




                            Copyright © 2000 by Harcourt, Inc. All rights reserved.
MOST UNLISTED MARKETS

•   Sacramento, CA
•   Oakland, CA
•   Fresno, CA
•   Los Angeles/Long Beach, CA




                             Copyright © 2000 by Harcourt, Inc. All rights reserved.
MAIL SURVEYS




    Copyright © 2000 by Harcourt, Inc. All rights reserved.
Mail Survey




Speed of Data Collection Researcher has no control
                         over return of questionnaire; slow

Geographical Flexibility    High

Respondent Cooperation Moderate--poorly designed
                       questionnaire will have low
                       response rate

Versatility of Questioning Highly standardized format


                                         Copyright © 2000 by Harcourt, Inc. All rights reserved.
Mail Survey




Questionnaire Length            Varies depending on incentive

Item Nonresponse                High

Possibility of Respondent       Highest--no interviewer
Misunderstanding                present for clarification

Degree of Interviewer           None--interviewer absent
Influence of Answer

Supervision of Interviewers     Not applicable

                                       Copyright © 2000 by Harcourt, Inc. All rights reserved.
Mail Survey




Anonymity of Respondent                High

Ease of Call Back or Follow-up         Easy, but takes
time

Cost                                   Lowest




                                       Copyright © 2000 by Harcourt, Inc. All rights reserved.
How to Increase Response Rates for Mail Surveys




• Write a “Sales Oriented” Cover Letter
• Money Helps
       - As a token of appreciation
       - For a charity
• Stimulate Respondents’ Interest with Interesting Questions
• Follow Up
       - Keying questionnaires with codes
• Advanced Notification
• Sponsorship by a Well-known and Prestigious Institution



                                        Copyright © 2000 by Harcourt, Inc. All rights reserved.
Increasing Response Rates



• Effective Cover Letter

• Money Helps

• Interesting Questions

• Follow-Ups

• Advanced Notification

• Survey Sponsorship

• Keying Questionnaires    Copyright © 2000 by Harcourt, Inc. All rights reserved.
SELF-ADMINISTERED
              QUESTIONNAIRES
•   MAIL
•   PLACE OF BUSINESS
•   DROP-OFF
•   COMPUTERIZED
•   E-MAIL
•   INTERNET
•   OTHER VARIATIONS
                        Copyright © 2000 by Harcourt, Inc. All rights reserved.
INTERNET SURVEYS

• Speed of Data Collection
  – instantaneous
• Geographic Flexibility
  – worldwide
• Respondent Cooperation
  – varies depending on web site



                                   Copyright © 2000 by Harcourt, Inc. All rights reserved.
INTERNET SURVEYS

• Versatility of questioning
  – extremely versatile
• Questionnaire Length
  – modest
• Item Nonresponse
  – software can assure none



                               Copyright © 2000 by Harcourt, Inc. All rights reserved.
INTERNET SURVEYS

• Possibility for Respondent
  misunderstanding
  – high
• Interviewer Influence of Answers
  – none
• Supervision of Interviewers
  – none


                                Copyright © 2000 by Harcourt, Inc. All rights reserved.
INTERNET SURVEYS

• Anonymity of Respondent
  – Respondent can be anonymous or known
• Ease of Callback or Follow-up
  – difficult
• Cost
  – low
• Special Features
  – allows graphics and motion
                                 Copyright © 2000 by Harcourt, Inc. All rights reserved.
INTERNET SURVEYS

• Item Nonresponse
     software can assure none
• Possibility for Respondent
  misunderstanding
  – high
• Degree of Interviewer Influence of Answers
  – none
• Supervision of Interviewers
  – none
                                Copyright © 2000 by Harcourt, Inc. All rights reserved.
INTERNET SURVEYS

• Anonymity of Respondent
     •     Respondent can be anonymous or known
• Ease of Callback or Follow-up
  – difficult
• Cost
  – low
• Special Features
  – allows graphics and motion
                                  Copyright © 2000 by Harcourt, Inc. All rights reserved.
There is no best form of
survey; each has advantages
    and disadvantages.


                   Copyright © 2000 by Harcourt, Inc. All rights reserved.
Selected Questions to determine the
         appropriate technique:

• Is the assistance of an interviewer
  necessary?
• Are respondents interested in the issues
  being investigated?
• Will cooperation be easily attained?



                               Copyright © 2000 by Harcourt, Inc. All rights reserved.
Selected Questions to determine the
         appropriate technique:

• How quickly is the information needed?
• Will the study require a long and complex
  questionnaire?
• How large is the budget?




                              Copyright © 2000 by Harcourt, Inc. All rights reserved.
Pre-testing

• A trial run with a group of
  respondents to iron out
  fundamental problems in the
  instructions or survey design




                     Copyright © 2000 by Harcourt, Inc. All rights reserved.
“Practice is the best
of all instructors.”

      Publilius Syrus

              Copyright © 2000 by Harcourt, Inc. All rights reserved.

Más contenido relacionado

Similar a Ch10 1

Voxeo Summit Day 1 - Communications-enabled Business Processes (CEBP)
Voxeo Summit Day 1 - Communications-enabled Business Processes (CEBP)Voxeo Summit Day 1 - Communications-enabled Business Processes (CEBP)
Voxeo Summit Day 1 - Communications-enabled Business Processes (CEBP)Voxeo Corp
 
Home Based Agents The Crown Jewels of Customer Service Sally Hurley VIPdesk_J...
Home Based Agents The Crown Jewels of Customer Service Sally Hurley VIPdesk_J...Home Based Agents The Crown Jewels of Customer Service Sally Hurley VIPdesk_J...
Home Based Agents The Crown Jewels of Customer Service Sally Hurley VIPdesk_J...VIPdesk
 
32 Speech to Text Phone Based Translation
32 Speech to Text Phone Based Translation32 Speech to Text Phone Based Translation
32 Speech to Text Phone Based TranslationChief Innovation
 
Save Your Network – Protecting Manufacturing Data from Deadly Breaches
Save Your Network – Protecting Manufacturing Data from Deadly BreachesSave Your Network – Protecting Manufacturing Data from Deadly Breaches
Save Your Network – Protecting Manufacturing Data from Deadly BreachesLancope, Inc.
 
Save Your Network – Protecting Healthcare Data from Deadly Breaches
Save Your Network – Protecting Healthcare Data from Deadly BreachesSave Your Network – Protecting Healthcare Data from Deadly Breaches
Save Your Network – Protecting Healthcare Data from Deadly BreachesLancope, Inc.
 
Roundtable: Best Practices in IVR & Self Service
Roundtable:  Best Practices in IVR & Self ServiceRoundtable:  Best Practices in IVR & Self Service
Roundtable: Best Practices in IVR & Self ServiceSheri Greenhaus
 
How To Stop Targeted Attacks And Avoid “Expense In Depth” With Strong Authent...
How To Stop Targeted Attacks And Avoid “Expense In Depth” With Strong Authent...How To Stop Targeted Attacks And Avoid “Expense In Depth” With Strong Authent...
How To Stop Targeted Attacks And Avoid “Expense In Depth” With Strong Authent...Duo Security
 
How To Stop Targeted Attacks And Avoid “Expense In Depth” With Strong Authent...
How To Stop Targeted Attacks And Avoid “Expense In Depth” With Strong Authent...How To Stop Targeted Attacks And Avoid “Expense In Depth” With Strong Authent...
How To Stop Targeted Attacks And Avoid “Expense In Depth” With Strong Authent...Brian Kelly
 
Identify and Fight Fraudulent Impressions, Clicks, and Leads
Identify and Fight Fraudulent Impressions, Clicks, and Leads Identify and Fight Fraudulent Impressions, Clicks, and Leads
Identify and Fight Fraudulent Impressions, Clicks, and Leads LeadiD
 
081915-Capturing Real-Time Customer Insights via Mobile Research
081915-Capturing Real-Time Customer Insights via Mobile Research081915-Capturing Real-Time Customer Insights via Mobile Research
081915-Capturing Real-Time Customer Insights via Mobile ResearchAMA_SanAntonio
 
PPT of Communication in Business
PPT of Communication in BusinessPPT of Communication in Business
PPT of Communication in BusinessHanuwantSingh Dewal
 
Phybridge Polre customer presentation
Phybridge Polre customer presentationPhybridge Polre customer presentation
Phybridge Polre customer presentationRichard Kasslack
 
3rd Party Risk: Practical Considerations for Privacy & Security Due Diligence
3rd Party Risk: Practical Considerations for Privacy & Security Due Diligence3rd Party Risk: Practical Considerations for Privacy & Security Due Diligence
3rd Party Risk: Practical Considerations for Privacy & Security Due DiligenceResilient Systems
 
Multi-Factor Authentication - "Moving Towards the Enterprise"
Multi-Factor Authentication - "Moving Towards the Enterprise" Multi-Factor Authentication - "Moving Towards the Enterprise"
Multi-Factor Authentication - "Moving Towards the Enterprise" mycroftinc
 
marketing research process
 marketing research process marketing research process
marketing research processdubeym
 
Anup Bootstrapping Feb9th
Anup Bootstrapping Feb9thAnup Bootstrapping Feb9th
Anup Bootstrapping Feb9thClubExpress
 
Declarative security-oes
Declarative security-oesDeclarative security-oes
Declarative security-oesOracleIDM
 
Using Monetization to Sell Hosted UC
Using Monetization to Sell Hosted UCUsing Monetization to Sell Hosted UC
Using Monetization to Sell Hosted UCOnvoy
 
Insider threats webinar 01.28.15
Insider threats webinar 01.28.15Insider threats webinar 01.28.15
Insider threats webinar 01.28.15Lancope, Inc.
 

Similar a Ch10 1 (20)

Voxeo Summit Day 1 - Communications-enabled Business Processes (CEBP)
Voxeo Summit Day 1 - Communications-enabled Business Processes (CEBP)Voxeo Summit Day 1 - Communications-enabled Business Processes (CEBP)
Voxeo Summit Day 1 - Communications-enabled Business Processes (CEBP)
 
Home Based Agents The Crown Jewels of Customer Service Sally Hurley VIPdesk_J...
Home Based Agents The Crown Jewels of Customer Service Sally Hurley VIPdesk_J...Home Based Agents The Crown Jewels of Customer Service Sally Hurley VIPdesk_J...
Home Based Agents The Crown Jewels of Customer Service Sally Hurley VIPdesk_J...
 
32 Speech to Text Phone Based Translation
32 Speech to Text Phone Based Translation32 Speech to Text Phone Based Translation
32 Speech to Text Phone Based Translation
 
Save Your Network – Protecting Manufacturing Data from Deadly Breaches
Save Your Network – Protecting Manufacturing Data from Deadly BreachesSave Your Network – Protecting Manufacturing Data from Deadly Breaches
Save Your Network – Protecting Manufacturing Data from Deadly Breaches
 
Save Your Network – Protecting Healthcare Data from Deadly Breaches
Save Your Network – Protecting Healthcare Data from Deadly BreachesSave Your Network – Protecting Healthcare Data from Deadly Breaches
Save Your Network – Protecting Healthcare Data from Deadly Breaches
 
Roundtable: Best Practices in IVR & Self Service
Roundtable:  Best Practices in IVR & Self ServiceRoundtable:  Best Practices in IVR & Self Service
Roundtable: Best Practices in IVR & Self Service
 
How To Stop Targeted Attacks And Avoid “Expense In Depth” With Strong Authent...
How To Stop Targeted Attacks And Avoid “Expense In Depth” With Strong Authent...How To Stop Targeted Attacks And Avoid “Expense In Depth” With Strong Authent...
How To Stop Targeted Attacks And Avoid “Expense In Depth” With Strong Authent...
 
How To Stop Targeted Attacks And Avoid “Expense In Depth” With Strong Authent...
How To Stop Targeted Attacks And Avoid “Expense In Depth” With Strong Authent...How To Stop Targeted Attacks And Avoid “Expense In Depth” With Strong Authent...
How To Stop Targeted Attacks And Avoid “Expense In Depth” With Strong Authent...
 
Identify and Fight Fraudulent Impressions, Clicks, and Leads
Identify and Fight Fraudulent Impressions, Clicks, and Leads Identify and Fight Fraudulent Impressions, Clicks, and Leads
Identify and Fight Fraudulent Impressions, Clicks, and Leads
 
081915-Capturing Real-Time Customer Insights via Mobile Research
081915-Capturing Real-Time Customer Insights via Mobile Research081915-Capturing Real-Time Customer Insights via Mobile Research
081915-Capturing Real-Time Customer Insights via Mobile Research
 
The Level 3 Story
The Level 3 StoryThe Level 3 Story
The Level 3 Story
 
PPT of Communication in Business
PPT of Communication in BusinessPPT of Communication in Business
PPT of Communication in Business
 
Phybridge Polre customer presentation
Phybridge Polre customer presentationPhybridge Polre customer presentation
Phybridge Polre customer presentation
 
3rd Party Risk: Practical Considerations for Privacy & Security Due Diligence
3rd Party Risk: Practical Considerations for Privacy & Security Due Diligence3rd Party Risk: Practical Considerations for Privacy & Security Due Diligence
3rd Party Risk: Practical Considerations for Privacy & Security Due Diligence
 
Multi-Factor Authentication - "Moving Towards the Enterprise"
Multi-Factor Authentication - "Moving Towards the Enterprise" Multi-Factor Authentication - "Moving Towards the Enterprise"
Multi-Factor Authentication - "Moving Towards the Enterprise"
 
marketing research process
 marketing research process marketing research process
marketing research process
 
Anup Bootstrapping Feb9th
Anup Bootstrapping Feb9thAnup Bootstrapping Feb9th
Anup Bootstrapping Feb9th
 
Declarative security-oes
Declarative security-oesDeclarative security-oes
Declarative security-oes
 
Using Monetization to Sell Hosted UC
Using Monetization to Sell Hosted UCUsing Monetization to Sell Hosted UC
Using Monetization to Sell Hosted UC
 
Insider threats webinar 01.28.15
Insider threats webinar 01.28.15Insider threats webinar 01.28.15
Insider threats webinar 01.28.15
 

Más de Ali Kamran

Más de Ali Kamran (20)

Training and development
Training and developmentTraining and development
Training and development
 
Teacher
Teacher Teacher
Teacher
 
Style textile
Style textileStyle textile
Style textile
 
Sme's
Sme'sSme's
Sme's
 
Section 1 back ground (2)
Section 1 back ground (2)Section 1 back ground (2)
Section 1 back ground (2)
 
Research
ResearchResearch
Research
 
Ptcl
PtclPtcl
Ptcl
 
Pso
PsoPso
Pso
 
Pizza hut presentation
Pizza hut presentationPizza hut presentation
Pizza hut presentation
 
Pia1
Pia1Pia1
Pia1
 
Wah nobel ltd.
Wah nobel ltd.Wah nobel ltd.
Wah nobel ltd.
 
Paktel
PaktelPaktel
Paktel
 
Paktel
PaktelPaktel
Paktel
 
Outsourceing
OutsourceingOutsourceing
Outsourceing
 
Nestle
NestleNestle
Nestle
 
Motorola
MotorolaMotorola
Motorola
 
Mobilink
MobilinkMobilink
Mobilink
 
Marriott
MarriottMarriott
Marriott
 
Marriot questioinnaire
Marriot questioinnaireMarriot questioinnaire
Marriot questioinnaire
 
Management report..furguson
Management report..furgusonManagement report..furguson
Management report..furguson
 

Último

Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 

Último (20)

Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 

Ch10 1

  • 1. Business Research Methods William G. Zikmund Chapter 10: Survey Research: Basic Communication Methods
  • 2. Copyright © 2000 by Harcourt, Inc. All rights reserved. Requests for permission to make copies of any part of the work should be mailed to the following address: Permissions Department, Harcourt, Inc., 6277 Sea Harbor Drive, Orlando, Florida 32887-6777.
  • 3. SURVEYS SURVEYS ASK A RESPONDENT FOR INFORMATION USING VERBAL OR WRITTEN QUESTIONING Copyright © 2000 by Harcourt, Inc. All rights reserved.
  • 4. COMMUNICATING WITH RESPONDENTS • PERSONAL INTERVIEWS • DOOR-TO-DOOR • SHOPPING MALL INTERCEPTS • TELEPHONE INTERVIEWS • SELF-ADMINISTERED QUESTIONNAIRES Copyright © 2000 by Harcourt, Inc. All rights reserved.
  • 5. PERSONAL INTERVIEWS Copyright © 2000 by Harcourt, Inc. All rights reserved.
  • 6. Good Afternoon, my name is _________. I am with _________ survey research company. We are conducting a survey on_________. Copyright © 2000 by Harcourt, Inc. All rights reserved.
  • 7. Door-to-Door Personal Interview Speed of Data Collection Moderate to fast Geographical Flexibility Limited to moderate Respondent Cooperation Excellent Versatility of Questioning Quite versatile Copyright © 2000 by Harcourt, Inc. All rights reserved.
  • 8. Door-to-Door Personal Interview Questionnaire Length Long Item Nonresponse Low Possibility of Respondent Lowest Misunderstanding Degree of Interviewer High Influence of Answer Supervision of Interviewers Moderate Copyright © 2000 by Harcourt, Inc. All rights reserved.
  • 9. Door-to-Door Personal Interview Anonymity of Respondent Low Ease of Call Back or Follow-up Difficult Cost Highest Special Features Visual materials may be shown or demonstrated; extended probing possible Copyright © 2000 by Harcourt, Inc. All rights reserved.
  • 10. Mall Intercept Personal Interview Speed of Data Collection Fast Geographical Flexibility Confined, urban bias Respondent Cooperation Moderate to low Versatility of Questioning Extremely versatile Questionnaire Length Moderate to Long Copyright © 2000 by Harcourt, Inc. All rights reserved.
  • 11. Mall Intercept Personal Interview Item Nonresponse Medium Possibility of Respondent Lowest Misunderstanding Degree of Interviewer Highest Influence of Answers Supervision of Interviewers Moderate to high Copyright © 2000 by Harcourt, Inc. All rights reserved.
  • 12. Mall Intercept Personal Interview Anonymity of Respondent Low Ease of Call Back or Difficult Follow-up Cost Moderate to high Special Features Taste test, viewing of TV Commercials possible Copyright © 2000 by Harcourt, Inc. All rights reserved.
  • 13. Telephone Surveys Copyright © 2000 by Harcourt, Inc. All rights reserved.
  • 14. Telephone Surveys Speed of Data Collection Very fast Geographical Flexibility High Respondent Cooperation Good Versatility of Questioning Moderate Copyright © 2000 by Harcourt, Inc. All rights reserved.
  • 15. Telephone Surveys Questionnaire Length Moderate Item Nonresponse Medium Possibility of Respondent Average Misunderstanding Degree of Interviewer Moderate Influence of Answer Supervision of Interviewers High, especially with central location WATS interviewing Copyright © 2000 by Harcourt, Inc. All rights reserved.
  • 16. Telephone Surveys Anonymity of Respondent Moderate Ease of Call Back or Follow-up Easy Cost Low to moderate Special Features Fieldwork and supervision of data collection are simplified; quite adaptable to computer technology Copyright © 2000 by Harcourt, Inc. All rights reserved.
  • 17. TELEPHONE SURVEYS • Central Location Interviewing • Computer-Assisted Telephone Interviewing • Computerized Voice-Activated Interviews Copyright © 2000 by Harcourt, Inc. All rights reserved.
  • 18. MOST UNLISTED MARKETS • Sacramento, CA • Oakland, CA • Fresno, CA • Los Angeles/Long Beach, CA Copyright © 2000 by Harcourt, Inc. All rights reserved.
  • 19. MAIL SURVEYS Copyright © 2000 by Harcourt, Inc. All rights reserved.
  • 20. Mail Survey Speed of Data Collection Researcher has no control over return of questionnaire; slow Geographical Flexibility High Respondent Cooperation Moderate--poorly designed questionnaire will have low response rate Versatility of Questioning Highly standardized format Copyright © 2000 by Harcourt, Inc. All rights reserved.
  • 21. Mail Survey Questionnaire Length Varies depending on incentive Item Nonresponse High Possibility of Respondent Highest--no interviewer Misunderstanding present for clarification Degree of Interviewer None--interviewer absent Influence of Answer Supervision of Interviewers Not applicable Copyright © 2000 by Harcourt, Inc. All rights reserved.
  • 22. Mail Survey Anonymity of Respondent High Ease of Call Back or Follow-up Easy, but takes time Cost Lowest Copyright © 2000 by Harcourt, Inc. All rights reserved.
  • 23. How to Increase Response Rates for Mail Surveys • Write a “Sales Oriented” Cover Letter • Money Helps - As a token of appreciation - For a charity • Stimulate Respondents’ Interest with Interesting Questions • Follow Up - Keying questionnaires with codes • Advanced Notification • Sponsorship by a Well-known and Prestigious Institution Copyright © 2000 by Harcourt, Inc. All rights reserved.
  • 24. Increasing Response Rates • Effective Cover Letter • Money Helps • Interesting Questions • Follow-Ups • Advanced Notification • Survey Sponsorship • Keying Questionnaires Copyright © 2000 by Harcourt, Inc. All rights reserved.
  • 25. SELF-ADMINISTERED QUESTIONNAIRES • MAIL • PLACE OF BUSINESS • DROP-OFF • COMPUTERIZED • E-MAIL • INTERNET • OTHER VARIATIONS Copyright © 2000 by Harcourt, Inc. All rights reserved.
  • 26. INTERNET SURVEYS • Speed of Data Collection – instantaneous • Geographic Flexibility – worldwide • Respondent Cooperation – varies depending on web site Copyright © 2000 by Harcourt, Inc. All rights reserved.
  • 27. INTERNET SURVEYS • Versatility of questioning – extremely versatile • Questionnaire Length – modest • Item Nonresponse – software can assure none Copyright © 2000 by Harcourt, Inc. All rights reserved.
  • 28. INTERNET SURVEYS • Possibility for Respondent misunderstanding – high • Interviewer Influence of Answers – none • Supervision of Interviewers – none Copyright © 2000 by Harcourt, Inc. All rights reserved.
  • 29. INTERNET SURVEYS • Anonymity of Respondent – Respondent can be anonymous or known • Ease of Callback or Follow-up – difficult • Cost – low • Special Features – allows graphics and motion Copyright © 2000 by Harcourt, Inc. All rights reserved.
  • 30. INTERNET SURVEYS • Item Nonresponse software can assure none • Possibility for Respondent misunderstanding – high • Degree of Interviewer Influence of Answers – none • Supervision of Interviewers – none Copyright © 2000 by Harcourt, Inc. All rights reserved.
  • 31. INTERNET SURVEYS • Anonymity of Respondent • Respondent can be anonymous or known • Ease of Callback or Follow-up – difficult • Cost – low • Special Features – allows graphics and motion Copyright © 2000 by Harcourt, Inc. All rights reserved.
  • 32. There is no best form of survey; each has advantages and disadvantages. Copyright © 2000 by Harcourt, Inc. All rights reserved.
  • 33. Selected Questions to determine the appropriate technique: • Is the assistance of an interviewer necessary? • Are respondents interested in the issues being investigated? • Will cooperation be easily attained? Copyright © 2000 by Harcourt, Inc. All rights reserved.
  • 34. Selected Questions to determine the appropriate technique: • How quickly is the information needed? • Will the study require a long and complex questionnaire? • How large is the budget? Copyright © 2000 by Harcourt, Inc. All rights reserved.
  • 35. Pre-testing • A trial run with a group of respondents to iron out fundamental problems in the instructions or survey design Copyright © 2000 by Harcourt, Inc. All rights reserved.
  • 36. “Practice is the best of all instructors.” Publilius Syrus Copyright © 2000 by Harcourt, Inc. All rights reserved.