You are on page 1of 6

Research Methods 1

RESEARCH METHODS (BASED ON SAUNDERS ET AL. (2016)

By Name

Name of Class

Professor

University

City

Date
Research Methods 2

Research Methods (Based on Saunders et al. (2016)

Researchers face many challenges while trying to gain access to organizational data.

These challenges depend on whether the scholar is an internal researcher or an external

researcher. Therefore, it is important to understand ways through which various researchers may

overcome the challenges they face. This paper discusses research scenarios that various research

may encounter while looking for data.

Part One: Strategies to Gain Access Based on Given Scenarios

a) An external researcher seeking direct access to managers who will be the research

participants:

The external researcher will need to ensure that he or she is familiar with the

organization. Besides, Saunders, Thornhill, and Lewis (2016, 229) note that external researchers

may use suitable language and facilitate replies to gain access to managers as participants.

Therefore, an external researcher will have to familiarize with the organization and use

appropriate language as well as facilitate replies to access organizational managers as

participants.

b) An external researcher seeking access through an organizational gatekeeper/broker to

their intended participants or respondents:

The researcher may consider developing access incrementally, establishing credibility,

and overcoming organizational concerns to gain access to organizational gatekeepers. Besides, it

would be appropriate for the researcher to provide a clear account of purpose (Saunders et al.,

2016, 229). Therefore, external researchers have huge responsibilities while seeking access to

organizational gatekeepers.
Research Methods 3

c) An internal researcher planning to undertake a research project within their employing

organization:

An internal researcher may use existing contacts to gain access to information within an

organization. Besides, the researcher may find it necessary to establish credibility when dealing

with unfamiliar individuals (Saunders et al., 2016, 271). Luckily, internal researchers have a

significant advantage over external researchers due to prior knowledge and familiarity with the

organization.

What Strategy I Will Need

I will need to employ a variety of strategies to gain access in my research. Since I will be

investigating whether alpha exists for either active or passive management, my research will be

carried out externally. Therefore, I will need to use suitable language, overcome organizational

concerns, provide a clear account of the purpose of the research, and develop new contacts while

seeking access to organizational information.

Part Two: Strategies for Collecting Primary and Secondary Data

Various techniques can be employed to collect primary and secondary data. The main

techniques for collecting primary data include observation, administration of questionnaires, and

group interviews. On the other hand, secondary techniques include searching online databases

and locating published secondary data.

Advantages and Disadvantages of the Techniques

Table 1: Advantages and disadvantages of the techniques

Technique Advantages Disadvantages

Structured observation  It can be useful for  Data may be difficult

anyone upon training. to collect.


Research Methods 4

 It can yield reliable  The researcher must

results be in the research

setting in case virtual

observation may not

be used.

Structured interviews  The researcher has the  The researcher may

freedom to seek for not be in control of

information of the responses.

interest.

Questionnaires  They are easy to  Respondents may be

administer. unreliable as sources

of credible

information.

Online databases  They provide  They may be collected

comparative and for unintended

contextual data. purposes.

 They can also lead to  They may contain

unforeseen unsuitable

discoveries. aggregations.

Published secondary data  Longitudinal studies  Some data may be

may be feasible. difficult to access.

 There is no control

over data quality.


Research Methods 5

 They may have fewer

resource

requirements.

The Data I Will Be Using

My research will exploit secondary data to investigate performance of portfolios

managed using active and passive management strategies. The most useful technique would be to

search the information in published databases both online and in physical libraries. Therefore, it

is anticipated that secondary sources would be useful in developing the study.


Research Methods 6

Reference

Saunders, M., Thornhill, A., & Lewis, P, 2016. Research methods for business students, 7th ed.

Pearson Education Limited.

You might also like