Enviar búsqueda
Cargar
Ch10 1
•
Descargar como PPT, PDF
•
1 recomendación
•
458 vistas
Ali Kamran
Seguir
Tecnología
Empresariales
Vista de diapositivas
Denunciar
Compartir
Vista de diapositivas
Denunciar
Compartir
1 de 36
Descargar ahora
Recomendados
Dirty Little Secret - Mobile Applications Invading Your Privacy
Dirty Little Secret - Mobile Applications Invading Your Privacy
Tyler Shields
Case Study: Pita Pit
Case Study: Pita Pit
Rogers Communications
Contact center-datasheet
Contact center-datasheet
22129697
Empirix scrolling presentation for neccf event 052110
Empirix scrolling presentation for neccf event 052110
NorthEast Contact Center Forum
Approaches to CTMS Trip Report Approvals
Approaches to CTMS Trip Report Approvals
Perficient
Quacera Early Warning Report July 30th
Quacera Early Warning Report July 30th
Quacera L.L.C.
Ch12 2
Ch12 2
Ali Kamran
Ch03 1
Ch03 1
Ali Kamran
Recomendados
Dirty Little Secret - Mobile Applications Invading Your Privacy
Dirty Little Secret - Mobile Applications Invading Your Privacy
Tyler Shields
Case Study: Pita Pit
Case Study: Pita Pit
Rogers Communications
Contact center-datasheet
Contact center-datasheet
22129697
Empirix scrolling presentation for neccf event 052110
Empirix scrolling presentation for neccf event 052110
NorthEast Contact Center Forum
Approaches to CTMS Trip Report Approvals
Approaches to CTMS Trip Report Approvals
Perficient
Quacera Early Warning Report July 30th
Quacera Early Warning Report July 30th
Quacera L.L.C.
Ch12 2
Ch12 2
Ali Kamran
Ch03 1
Ch03 1
Ali Kamran
Voxeo Summit Day 1 - Communications-enabled Business Processes (CEBP)
Voxeo Summit Day 1 - Communications-enabled Business Processes (CEBP)
Voxeo Corp
Home Based Agents The Crown Jewels of Customer Service Sally Hurley VIPdesk_J...
Home Based Agents The Crown Jewels of Customer Service Sally Hurley VIPdesk_J...
VIPdesk
32 Speech to Text Phone Based Translation
32 Speech to Text Phone Based Translation
Chief Innovation
Save Your Network – Protecting Manufacturing Data from Deadly Breaches
Save Your Network – Protecting Manufacturing Data from Deadly Breaches
Lancope, Inc.
Save Your Network – Protecting Healthcare Data from Deadly Breaches
Save Your Network – Protecting Healthcare Data from Deadly Breaches
Lancope, Inc.
Roundtable: Best Practices in IVR & Self Service
Roundtable: Best Practices in IVR & Self Service
Sheri Greenhaus
How To Stop Targeted Attacks And Avoid “Expense In Depth” With Strong Authent...
How To Stop Targeted Attacks And Avoid “Expense In Depth” With Strong Authent...
Duo Security
How To Stop Targeted Attacks And Avoid “Expense In Depth” With Strong Authent...
How To Stop Targeted Attacks And Avoid “Expense In Depth” With Strong Authent...
Brian Kelly
Identify and Fight Fraudulent Impressions, Clicks, and Leads
Identify and Fight Fraudulent Impressions, Clicks, and Leads
LeadiD
081915-Capturing Real-Time Customer Insights via Mobile Research
081915-Capturing Real-Time Customer Insights via Mobile Research
AMA_SanAntonio
The Level 3 Story
The Level 3 Story
Jonathan Kirby
PPT of Communication in Business
PPT of Communication in Business
HanuwantSingh Dewal
Phybridge Polre customer presentation
Phybridge Polre customer presentation
Richard Kasslack
3rd Party Risk: Practical Considerations for Privacy & Security Due Diligence
3rd Party Risk: Practical Considerations for Privacy & Security Due Diligence
Resilient Systems
Multi-Factor Authentication - "Moving Towards the Enterprise"
Multi-Factor Authentication - "Moving Towards the Enterprise"
mycroftinc
marketing research process
marketing research process
dubeym
Anup Bootstrapping Feb9th
Anup Bootstrapping Feb9th
ClubExpress
Declarative security-oes
Declarative security-oes
OracleIDM
Using Monetization to Sell Hosted UC
Using Monetization to Sell Hosted UC
Onvoy
Insider threats webinar 01.28.15
Insider threats webinar 01.28.15
Lancope, Inc.
Training and development
Training and development
Ali Kamran
Teacher
Teacher
Ali Kamran
Más contenido relacionado
Similar a Ch10 1
Voxeo Summit Day 1 - Communications-enabled Business Processes (CEBP)
Voxeo Summit Day 1 - Communications-enabled Business Processes (CEBP)
Voxeo Corp
Home Based Agents The Crown Jewels of Customer Service Sally Hurley VIPdesk_J...
Home Based Agents The Crown Jewels of Customer Service Sally Hurley VIPdesk_J...
VIPdesk
32 Speech to Text Phone Based Translation
32 Speech to Text Phone Based Translation
Chief Innovation
Save Your Network – Protecting Manufacturing Data from Deadly Breaches
Save Your Network – Protecting Manufacturing Data from Deadly Breaches
Lancope, Inc.
Save Your Network – Protecting Healthcare Data from Deadly Breaches
Save Your Network – Protecting Healthcare Data from Deadly Breaches
Lancope, Inc.
Roundtable: Best Practices in IVR & Self Service
Roundtable: Best Practices in IVR & Self Service
Sheri Greenhaus
How To Stop Targeted Attacks And Avoid “Expense In Depth” With Strong Authent...
How To Stop Targeted Attacks And Avoid “Expense In Depth” With Strong Authent...
Duo Security
How To Stop Targeted Attacks And Avoid “Expense In Depth” With Strong Authent...
How To Stop Targeted Attacks And Avoid “Expense In Depth” With Strong Authent...
Brian Kelly
Identify and Fight Fraudulent Impressions, Clicks, and Leads
Identify and Fight Fraudulent Impressions, Clicks, and Leads
LeadiD
081915-Capturing Real-Time Customer Insights via Mobile Research
081915-Capturing Real-Time Customer Insights via Mobile Research
AMA_SanAntonio
The Level 3 Story
The Level 3 Story
Jonathan Kirby
PPT of Communication in Business
PPT of Communication in Business
HanuwantSingh Dewal
Phybridge Polre customer presentation
Phybridge Polre customer presentation
Richard Kasslack
3rd Party Risk: Practical Considerations for Privacy & Security Due Diligence
3rd Party Risk: Practical Considerations for Privacy & Security Due Diligence
Resilient Systems
Multi-Factor Authentication - "Moving Towards the Enterprise"
Multi-Factor Authentication - "Moving Towards the Enterprise"
mycroftinc
marketing research process
marketing research process
dubeym
Anup Bootstrapping Feb9th
Anup Bootstrapping Feb9th
ClubExpress
Declarative security-oes
Declarative security-oes
OracleIDM
Using Monetization to Sell Hosted UC
Using Monetization to Sell Hosted UC
Onvoy
Insider threats webinar 01.28.15
Insider threats webinar 01.28.15
Lancope, Inc.
Similar a Ch10 1
(20)
Voxeo Summit Day 1 - Communications-enabled Business Processes (CEBP)
Voxeo Summit Day 1 - Communications-enabled Business Processes (CEBP)
Home Based Agents The Crown Jewels of Customer Service Sally Hurley VIPdesk_J...
Home Based Agents The Crown Jewels of Customer Service Sally Hurley VIPdesk_J...
32 Speech to Text Phone Based Translation
32 Speech to Text Phone Based Translation
Save Your Network – Protecting Manufacturing Data from Deadly Breaches
Save Your Network – Protecting Manufacturing Data from Deadly Breaches
Save Your Network – Protecting Healthcare Data from Deadly Breaches
Save Your Network – Protecting Healthcare Data from Deadly Breaches
Roundtable: Best Practices in IVR & Self Service
Roundtable: Best Practices in IVR & Self Service
How To Stop Targeted Attacks And Avoid “Expense In Depth” With Strong Authent...
How To Stop Targeted Attacks And Avoid “Expense In Depth” With Strong Authent...
How To Stop Targeted Attacks And Avoid “Expense In Depth” With Strong Authent...
How To Stop Targeted Attacks And Avoid “Expense In Depth” With Strong Authent...
Identify and Fight Fraudulent Impressions, Clicks, and Leads
Identify and Fight Fraudulent Impressions, Clicks, and Leads
081915-Capturing Real-Time Customer Insights via Mobile Research
081915-Capturing Real-Time Customer Insights via Mobile Research
The Level 3 Story
The Level 3 Story
PPT of Communication in Business
PPT of Communication in Business
Phybridge Polre customer presentation
Phybridge Polre customer presentation
3rd Party Risk: Practical Considerations for Privacy & Security Due Diligence
3rd Party Risk: Practical Considerations for Privacy & Security Due Diligence
Multi-Factor Authentication - "Moving Towards the Enterprise"
Multi-Factor Authentication - "Moving Towards the Enterprise"
marketing research process
marketing research process
Anup Bootstrapping Feb9th
Anup Bootstrapping Feb9th
Declarative security-oes
Declarative security-oes
Using Monetization to Sell Hosted UC
Using Monetization to Sell Hosted UC
Insider threats webinar 01.28.15
Insider threats webinar 01.28.15
Más de Ali Kamran
Training and development
Training and development
Ali Kamran
Teacher
Teacher
Ali Kamran
Style textile
Style textile
Ali Kamran
Sme's
Sme's
Ali Kamran
Section 1 back ground (2)
Section 1 back ground (2)
Ali Kamran
Research
Research
Ali Kamran
Ptcl
Ptcl
Ali Kamran
Pso
Pso
Ali Kamran
Pizza hut presentation
Pizza hut presentation
Ali Kamran
Pia1
Pia1
Ali Kamran
Wah nobel ltd.
Wah nobel ltd.
Ali Kamran
Paktel
Paktel
Ali Kamran
Paktel
Paktel
Ali Kamran
Outsourceing
Outsourceing
Ali Kamran
Nestle
Nestle
Ali Kamran
Motorola
Motorola
Ali Kamran
Mobilink
Mobilink
Ali Kamran
Marriott
Marriott
Ali Kamran
Marriot questioinnaire
Marriot questioinnaire
Ali Kamran
Management report..furguson
Management report..furguson
Ali Kamran
Más de Ali Kamran
(20)
Training and development
Training and development
Teacher
Teacher
Style textile
Style textile
Sme's
Sme's
Section 1 back ground (2)
Section 1 back ground (2)
Research
Research
Ptcl
Ptcl
Pso
Pso
Pizza hut presentation
Pizza hut presentation
Pia1
Pia1
Wah nobel ltd.
Wah nobel ltd.
Paktel
Paktel
Paktel
Paktel
Outsourceing
Outsourceing
Nestle
Nestle
Motorola
Motorola
Mobilink
Mobilink
Marriott
Marriott
Marriot questioinnaire
Marriot questioinnaire
Management report..furguson
Management report..furguson
Último
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
Softradix Technologies
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
Puma Security, LLC
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
OnBoard
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
Malak Abu Hammad
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
carlostorres15106
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
Deakin University
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
soniya singh
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April Automation LPDG
MarianaLemus7
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Alan Dix
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions
Key Features Of Token Development (1).pptx
Key Features Of Token Development (1).pptx
LBM Solutions
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
Neo4j
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Patryk Bandurski
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
comworks
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
Delhi Call girls
The transition to renewables in India.pdf
The transition to renewables in India.pdf
Competition Advisory Services (India) LLP
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
Pixlogix Infotech
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
Padma Pradeep
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
Scott Keck-Warren
Último
(20)
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April Automation LPDG
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
Key Features Of Token Development (1).pptx
Key Features Of Token Development (1).pptx
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
The transition to renewables in India.pdf
The transition to renewables in India.pdf
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
Ch10 1
1.
Business
Research Methods William G. Zikmund Chapter 10: Survey Research: Basic Communication Methods
2.
Copyright © 2000
by Harcourt, Inc. All rights reserved. Requests for permission to make copies of any part of the work should be mailed to the following address: Permissions Department, Harcourt, Inc., 6277 Sea Harbor Drive, Orlando, Florida 32887-6777.
3.
SURVEYS SURVEYS ASK A
RESPONDENT FOR INFORMATION USING VERBAL OR WRITTEN QUESTIONING Copyright © 2000 by Harcourt, Inc. All rights reserved.
4.
COMMUNICATING WITH
RESPONDENTS • PERSONAL INTERVIEWS • DOOR-TO-DOOR • SHOPPING MALL INTERCEPTS • TELEPHONE INTERVIEWS • SELF-ADMINISTERED QUESTIONNAIRES Copyright © 2000 by Harcourt, Inc. All rights reserved.
5.
PERSONAL INTERVIEWS
Copyright © 2000 by Harcourt, Inc. All rights reserved.
6.
Good Afternoon, my
name is _________. I am with _________ survey research company. We are conducting a survey on_________. Copyright © 2000 by Harcourt, Inc. All rights reserved.
7.
Door-to-Door Personal Interview Speed
of Data Collection Moderate to fast Geographical Flexibility Limited to moderate Respondent Cooperation Excellent Versatility of Questioning Quite versatile Copyright © 2000 by Harcourt, Inc. All rights reserved.
8.
Door-to-Door Personal Interview Questionnaire
Length Long Item Nonresponse Low Possibility of Respondent Lowest Misunderstanding Degree of Interviewer High Influence of Answer Supervision of Interviewers Moderate Copyright © 2000 by Harcourt, Inc. All rights reserved.
9.
Door-to-Door Personal Interview Anonymity
of Respondent Low Ease of Call Back or Follow-up Difficult Cost Highest Special Features Visual materials may be shown or demonstrated; extended probing possible Copyright © 2000 by Harcourt, Inc. All rights reserved.
10.
Mall Intercept Personal
Interview Speed of Data Collection Fast Geographical Flexibility Confined, urban bias Respondent Cooperation Moderate to low Versatility of Questioning Extremely versatile Questionnaire Length Moderate to Long Copyright © 2000 by Harcourt, Inc. All rights reserved.
11.
Mall Intercept Personal
Interview Item Nonresponse Medium Possibility of Respondent Lowest Misunderstanding Degree of Interviewer Highest Influence of Answers Supervision of Interviewers Moderate to high Copyright © 2000 by Harcourt, Inc. All rights reserved.
12.
Mall Intercept Personal
Interview Anonymity of Respondent Low Ease of Call Back or Difficult Follow-up Cost Moderate to high Special Features Taste test, viewing of TV Commercials possible Copyright © 2000 by Harcourt, Inc. All rights reserved.
13.
Telephone Surveys
Copyright © 2000 by Harcourt, Inc. All rights reserved.
14.
Telephone Surveys Speed of
Data Collection Very fast Geographical Flexibility High Respondent Cooperation Good Versatility of Questioning Moderate Copyright © 2000 by Harcourt, Inc. All rights reserved.
15.
Telephone Surveys Questionnaire Length
Moderate Item Nonresponse Medium Possibility of Respondent Average Misunderstanding Degree of Interviewer Moderate Influence of Answer Supervision of Interviewers High, especially with central location WATS interviewing Copyright © 2000 by Harcourt, Inc. All rights reserved.
16.
Telephone Surveys Anonymity of
Respondent Moderate Ease of Call Back or Follow-up Easy Cost Low to moderate Special Features Fieldwork and supervision of data collection are simplified; quite adaptable to computer technology Copyright © 2000 by Harcourt, Inc. All rights reserved.
17.
TELEPHONE SURVEYS • Central
Location Interviewing • Computer-Assisted Telephone Interviewing • Computerized Voice-Activated Interviews Copyright © 2000 by Harcourt, Inc. All rights reserved.
18.
MOST UNLISTED MARKETS •
Sacramento, CA • Oakland, CA • Fresno, CA • Los Angeles/Long Beach, CA Copyright © 2000 by Harcourt, Inc. All rights reserved.
19.
MAIL SURVEYS
Copyright © 2000 by Harcourt, Inc. All rights reserved.
20.
Mail Survey Speed of
Data Collection Researcher has no control over return of questionnaire; slow Geographical Flexibility High Respondent Cooperation Moderate--poorly designed questionnaire will have low response rate Versatility of Questioning Highly standardized format Copyright © 2000 by Harcourt, Inc. All rights reserved.
21.
Mail Survey Questionnaire Length
Varies depending on incentive Item Nonresponse High Possibility of Respondent Highest--no interviewer Misunderstanding present for clarification Degree of Interviewer None--interviewer absent Influence of Answer Supervision of Interviewers Not applicable Copyright © 2000 by Harcourt, Inc. All rights reserved.
22.
Mail Survey Anonymity of
Respondent High Ease of Call Back or Follow-up Easy, but takes time Cost Lowest Copyright © 2000 by Harcourt, Inc. All rights reserved.
23.
How to Increase
Response Rates for Mail Surveys • Write a “Sales Oriented” Cover Letter • Money Helps - As a token of appreciation - For a charity • Stimulate Respondents’ Interest with Interesting Questions • Follow Up - Keying questionnaires with codes • Advanced Notification • Sponsorship by a Well-known and Prestigious Institution Copyright © 2000 by Harcourt, Inc. All rights reserved.
24.
Increasing Response Rates •
Effective Cover Letter • Money Helps • Interesting Questions • Follow-Ups • Advanced Notification • Survey Sponsorship • Keying Questionnaires Copyright © 2000 by Harcourt, Inc. All rights reserved.
25.
SELF-ADMINISTERED
QUESTIONNAIRES • MAIL • PLACE OF BUSINESS • DROP-OFF • COMPUTERIZED • E-MAIL • INTERNET • OTHER VARIATIONS Copyright © 2000 by Harcourt, Inc. All rights reserved.
26.
INTERNET SURVEYS • Speed
of Data Collection – instantaneous • Geographic Flexibility – worldwide • Respondent Cooperation – varies depending on web site Copyright © 2000 by Harcourt, Inc. All rights reserved.
27.
INTERNET SURVEYS • Versatility
of questioning – extremely versatile • Questionnaire Length – modest • Item Nonresponse – software can assure none Copyright © 2000 by Harcourt, Inc. All rights reserved.
28.
INTERNET SURVEYS • Possibility
for Respondent misunderstanding – high • Interviewer Influence of Answers – none • Supervision of Interviewers – none Copyright © 2000 by Harcourt, Inc. All rights reserved.
29.
INTERNET SURVEYS • Anonymity
of Respondent – Respondent can be anonymous or known • Ease of Callback or Follow-up – difficult • Cost – low • Special Features – allows graphics and motion Copyright © 2000 by Harcourt, Inc. All rights reserved.
30.
INTERNET SURVEYS • Item
Nonresponse software can assure none • Possibility for Respondent misunderstanding – high • Degree of Interviewer Influence of Answers – none • Supervision of Interviewers – none Copyright © 2000 by Harcourt, Inc. All rights reserved.
31.
INTERNET SURVEYS • Anonymity
of Respondent • Respondent can be anonymous or known • Ease of Callback or Follow-up – difficult • Cost – low • Special Features – allows graphics and motion Copyright © 2000 by Harcourt, Inc. All rights reserved.
32.
There is no
best form of survey; each has advantages and disadvantages. Copyright © 2000 by Harcourt, Inc. All rights reserved.
33.
Selected Questions to
determine the appropriate technique: • Is the assistance of an interviewer necessary? • Are respondents interested in the issues being investigated? • Will cooperation be easily attained? Copyright © 2000 by Harcourt, Inc. All rights reserved.
34.
Selected Questions to
determine the appropriate technique: • How quickly is the information needed? • Will the study require a long and complex questionnaire? • How large is the budget? Copyright © 2000 by Harcourt, Inc. All rights reserved.
35.
Pre-testing • A trial
run with a group of respondents to iron out fundamental problems in the instructions or survey design Copyright © 2000 by Harcourt, Inc. All rights reserved.
36.
“Practice is the
best of all instructors.” Publilius Syrus Copyright © 2000 by Harcourt, Inc. All rights reserved.
Descargar ahora