Professional Documents
Culture Documents
By Name
Name of Class
Professor
University
City
Date
Research Methods 2
Researchers face many challenges while trying to gain access to organizational data.
researcher. Therefore, it is important to understand ways through which various researchers may
overcome the challenges they face. This paper discusses research scenarios that various research
a) An external researcher seeking direct access to managers who will be the research
participants:
The external researcher will need to ensure that he or she is familiar with the
organization. Besides, Saunders, Thornhill, and Lewis (2016, 229) note that external researchers
may use suitable language and facilitate replies to gain access to managers as participants.
Therefore, an external researcher will have to familiarize with the organization and use
participants.
would be appropriate for the researcher to provide a clear account of purpose (Saunders et al.,
2016, 229). Therefore, external researchers have huge responsibilities while seeking access to
organizational gatekeepers.
Research Methods 3
organization:
An internal researcher may use existing contacts to gain access to information within an
organization. Besides, the researcher may find it necessary to establish credibility when dealing
with unfamiliar individuals (Saunders et al., 2016, 271). Luckily, internal researchers have a
significant advantage over external researchers due to prior knowledge and familiarity with the
organization.
I will need to employ a variety of strategies to gain access in my research. Since I will be
investigating whether alpha exists for either active or passive management, my research will be
carried out externally. Therefore, I will need to use suitable language, overcome organizational
concerns, provide a clear account of the purpose of the research, and develop new contacts while
Various techniques can be employed to collect primary and secondary data. The main
techniques for collecting primary data include observation, administration of questionnaires, and
group interviews. On the other hand, secondary techniques include searching online databases
be used.
interest.
of credible
information.
unforeseen unsuitable
discoveries. aggregations.
There is no control
resource
requirements.
managed using active and passive management strategies. The most useful technique would be to
search the information in published databases both online and in physical libraries. Therefore, it
Reference
Saunders, M., Thornhill, A., & Lewis, P, 2016. Research methods for business students, 7th ed.