Research Methods


 

 

 

 

 

Quantitative Study of Privacy Protection Overseas as Perceived by USA based IT professional

Ekta Gupta

The College of St. Scholastica

May 7, 2013

 

 

 


The Internet has promoted direct interactions between businesses and their customers, irrespective of their locations around the world. Existing privacy laws do not seem to adequately address the privacy issues across geographical boundaries. Due to differences in culture, values and, government types it may not be possible establishing global standards to ensure privacy. Transmitting data around the world has become necessary for international business (Oz, 1994).In their paper, Privacy Protection Overseas as Perceived by USA – based IT Professionals, Shah, White and Cook (2007) study how USA based multi-national companies (MNC) and domestic companies respond to privacy laws, and what is the perception of MNC to deal with internet privacy at global level. The primary purpose of this research is to answer how multinational companies deal with and perceive the patchwork of privacy laws that exist across the various countries of their operations. 

Literature

The literature review begins with explaining threats to privacy from the increased use of the Internet and e-commerce. A major issue for global e-traders is privacy (Chandran, Phatak, & Sambharya, 1987; Zuckerman, 2001). Authors apprehend such issue can threaten the growth of e-commerce. As data flows across international boundaries, the use and collection of personal data may have different restrictions in different countries along the path of the data flow. The authors conclude by proposing two possible alternatives for developing and implementing a corporate privacy policy: First, develop and implement different privacy policies based on the privacy laws in the various countries of operations. Second, develop and implement a single privacy policy by adopting the strictest elements of privacy laws across the countries of operations as the company’s corporate privacy policy.

Authors then have explained how different kinds of governments in different countries pose a challenge in creating a global privacy legislations. They make a point, lack of uniformity among various countries’ privacy and data protection laws have created a legal and regulatory challenge for companies operating across multiple countries, which is the crux of the issue. They conclude that privacy policies should comply with the privacy laws of the countries in which they operate, as any violation of a country’s privacy laws could result in financial and/or criminal penalties.

Sample

3,772 professional members of Association of Information technology professionals (AICTP) organization are selected for the survey. It seems AICTPA used a purposive sampling method and provided a reasonable cross section of IT professionals. Response rate was 9.6 % (365 valid responses).  This indicates high numbers in drop outs which raises immediate concern on the survey result. Quantitative study with such a small response seems to less effective and reliable. Authors have well defined the composition of the proportion. Reason of selection of AICTPA and legality and authentication of this organization should have been mentioned to add robustness in the source of the data.

Data collection method

Self-Administering computer assisted data collection (CADAC) survey with closed-ended questions is used as data collection instrument to supply data for the study. Yes, No or ‘Don’t Know’ were the available options for close ended questionnaires. CADAC considered to be a powerful tool that gives access to many more people with less cost, survey questions can be well structured and responses can be easily collected and survey can be easily anonymous. Authors describe the data collection procedure in great detail which strengthens the transparency of the processes undertaken. Emails sent to respondents, seems to be designed with great care and contained brief message explaining the purpose of the study and a hyperlink to access the Web-based electronic survey instrument. They designed the electronic survey instrument with the intention of ensuring that it was easy to access, contained clearly stated questions, and required a minimal amount of time to complete. Authors’ keen attention in addressing the challenges of CADAC is really appreciable which also enhances the validity and reliability of the result of survey. The Web site survey was made available to the respondents for ten days. There is no information whether any reminders were sent to respondents which could had been used to get a higher response rate. The survey instrument consisted of eleven survey questions and two demographic questions. Five special set of questions were prepared to get specific data from the respondents who were involved in business with foreign firms. Some demographic information are also captured. Authors maintained the confidentiality by making the survey anonymous that might had helped them in getting honest responses.

Data Analysis

Data collected from this survey were analyzed for frequencies using SPSS statistical software. Data were very well represented as frequency/percent in tables. National and international modes are represented in bold which enhances the readability of data. For responses of few questions Chi-Square analyses were performed. Chi Square which is a non-parametric test seems to be well suited here as research carries the nominal data. Degree of freedom is two and with different probability values, values of chi-square which is a strength of the relationship in the variables, are calculated.


Results

Result of each of the survey-question is discussed in detail. The results of the survey illustrate the attitude of the USA IT professionals toward privacy laws, national and international. A large proportion of IT professionals selected ‘Don’t know” for knowing the privacy policies of the company. The study conclude by noting that majority of the international companies develop and implement uniform corporate privacy policies across all countries in which they operate. These privacy policies are usually based on the most restrictive privacy laws of the countries in which they operate. This is a better suggestive alternative than implementing different privacy policies in different countries, due to it its efficacy and cost-effectiveness. International companies also tend to adopt the most restrictive policy, a “one size fits all” approach.

Personal Analytic Statement

 As a whole the study is really enjoyable and current. The tone of documents is unbiased and it has stated privacy policies of different countries with all due respect. A good description about sampling and survey process was mentioned which evident the directness of the research. Sometime email survey suffers with participant error where for some reason correct responses are not selected. Giving a neutral option like ‘don’t know’, considers to be part of good design but as authors reported that maximum participants responded with ‘don’t know’, it gives a concern to me whether respondents really selected a good answer or opted a convenient option where they didn’t have to introspect a lot. Unfortunately, there are also some gaps and deficiencies in the study that undermine its results and validity.  The small response rate is a problem and is further compounded by narrowness of demography. It is not specified why only some specific questions were analyzed with chi square. Moreover the result of chi square is only shown and were not discussed anywhere in their study which give a pause of concern on the transparency of the paper. Overall, the survey was interesting and seeks to answer a very important question in the study of internet privacy, but the results need to be viewed cautiously given the concerns raised in the critique.


 

References

Chandran, R., Phatak, A., & Sambharya, R. (1987). Transborder data flows: Implications

for multinational corporations. Business Horizons, 30(6), 74-83.

Oz, E. (1994). Barriers to international data transfer. Journal of Global Information

            Management, 2(2), 22-29.

Shah, J. R., White, G. L., & Cook, J. R. (2007, January). Privacy Protection Overseas as

Perceived by USA-Based IT Professionals. Journal of Global Information Management (JGIM), 15(1), 68-81. doi:10.4018/jgim.2007010104

 
==========================================================================




           

Value Creation Process: A Managerial Perspective

The College of St. Scholastica

Ekta Gupta

 

            Aron O’Cass and Mgo ( 2011), in their paper “Examining the Firm’s Value Creation Process: A Managerial Perspective of the Firm’s Value Oering Strategy and Performance” talked on the importance of value creation and how to create them keeping customers in mind. The authors stated, “The primary pursuit of any business is to understand what customers value and to create that value for them”. In context of firm’s perspective on value creations, authors adopted two issues from Bowman and Ambrosini’s theoretical framework and the work of DeSarbo, Jedidi and Sinha, The first is the strategic emphasis firms place on the design and delivery of their value oering. The second is the extent the firm’s value oering explains performance dierentials at the customer-centric performance level. Value creation is exogenously determined via perceived use value or customer-perceived value (Christopher, 1996; Zeithaml, 1988), exchange value (Bowman and Ambrosini, 2000) and relationship value (Payne and Holt, 2001; Ravald and Gronroos, 1996; Ulaga and Eggert, 2006). From the firm’s perspective, value creation begins by identifying what value to provide to customers (Payne and Frow, 2005; Sirmon, Hitt and Ireland, 2007). DeSarbo, Jedidi and Sinha (2001) state that creating superior value for the customer is a strategic issue that ‘should be of interest to strategy researchers and practitioners’. Payne and Holt (2001) indicated that value creation is part of the strategic process.

Customer value analysis should be incorporated in devising firm strategy because the success of a firm’s dierentiation strategy depends on the extent to which firms identify what value customers are looking for in their value oerings (DeSarbo, Jedidi and Sinha, 2001). From a managerial perspective, the strategic role of value creation at the point of proposition becomes essential in achieving superior positional advantage. This is because, when viewed through a managerial lens, understanding what constitutes the value oering provides managers with guidelines to developing, delivering and managing what is of value to customers which, as Bowman and Ambrosini (2000) identify, will manifest perceived use value and eventually help realize exchange value. The continued success of companies such as Google, Sony, Intel, 3M, FedEx, Merck, Caterpillar, UPS, SYSCO, and Samsung is based on their ability to create superior value oerings for the customer (Gourville, 2006; Kumar, Scheer and Kotler, 2000; Mittal and Sheth, 2001).

Understanding the extent to which the value oering contributes to firm performance, specifically customer-centric performance outcomes, is essential. While much of the strategic management literature has emphasized financial performance in the form of profit, sales and the like, authors contend that customer-associated performance should be given a greater priority. Indeed, customers are one of the most important stakeholder groups and intangible assets for firms as they create revenue streams (Walsh et al., 2009). Focus on customer-centric performance reflects the fact that managers are increasingly turning their attention to linking their actions to the realizations of various non- financial performance indicators such as employee satisfaction, customer satisfaction, customer loyalty and the like (Dye, 2004; Ittner and Larcker, 2003; Kaplan and Norton, 2006; Nagar and Rajan, 2005).

Authors propose that the value oering is a composite construct that captures a firm’s eorts (1) to deliver superior performance that customers are seeking in the oering, (2) to exercise pricing practices that customers are willing and happy to pay for the oering, (3) to provide customers with hassle-free purchase experience and beneficial relationships, and (4) to interact with customers to co-create the consumption experience.

  • Performance value. Customers look for products and services that deliver performance superiority to meet their explicit and latent requirements (Afuah, 2002; Day and Wensley, 1988). Performance value, however, is more than just product quality, as customers also look for oerings which possess innovative features and well-matched personal preferences that contribute to their utility or pleasure (Afuah, 2002; Mittal and Sheth, 2001).
  • Pricing value. Customers not only look for performance superiority in oerings, but also aordable and reasonable prices (Mittal and Sheth, 2001). Surprisingly, pricing has largely been neglected by managers and received little attention by academics although the impact of price on business success is substantial (Hinter- huber, 2004). Indeed, pricing is an important means by which firms appropriate value through market-based exchange (Dutta, Zbaracki and Bergen, 2003; Hinterhuber, 2004). Customers with a reference price in mind look for oerings they are willing to pay (fair price and value price). Fair price is a price that customers believe is fair and reasonable, while value price is the price that customers consider more than justified by the total benefits received (Hinterhuber, 2004; Mittal and Sheth, 2001).
  • Relationship building value. Customers also look for benefits beyond those associated with features, functions and pricing. They increasingly demand a much more holistic oering including everything from easy access to the business at any time, to rapid response with any enquiry (Mittal and Sheth, 2001). Relationship building value could be conceptualize as a firm’s eorts to create and deliver to customers a hassle-free purchase experience and beneficial relationships.
  • Co-creation value Strong relationships are not the sole aspect of value creation within the context of positional advantage theory. Customers may seek and find it beneficial to exercise their influence in various parts of the business system to co-create their own unique personalized purchase and consumption experiences (Prahalad and Ramaswamy, 2004). Value is not added into the oering by the firm in isolation, but can also be mutually co-created among firms and customers via working together. Co-creation is increasingly seen as a firm’s response to customers’ changing needs (Ramirez, 1999). The customer is a co-producer of value according to DeSarbo, Jedidi and Sinha (2001) and Ramirez (1999) and ‘the goal is not to create value for customers but to mobilize customers to create their own value from the firm’s various oerings’ (Normann and Ramirez, 1993, p. 69) in conjunction with the firm. That is, co-creation value rests on the premise of firm–customer working together to create a consumption experience. There is no value created until the proposed value oering is consumed. Although customers produce value themselves independently, firms decide how they will engage with the customer and can provide support and assist the co-creation of value (Prahalad, 2004; Storbacka and Lehtinen, 2001).

Overall, this study provides new insights into a theory of value creation set within the domain of the firm value oering and customer-centric performance. In the pursuit of opening up opportunities for the firm we contend here that potential opportunities revolve around creating and delivering value at superior levels to competitors. On this point, Teece (2007) argues that to identify and shape opportunities firms must constantly scan, search and explore. This activity not only involves investment in research activity and the probing and re-probing of customer needs; it also involves understanding latent demand, the structural evolution of industries and markets, and likely supplier and competitor responses.

 

 

 

 

 

 

 


References

O'Cass, A., & Ngo, L. (2011). Examining the Firm's Value Creation Process: A Managerial

            Perspective of the Firm's Value Offering Strategy and Performance. British Journal Of

            Management, 22(4), 646-671. doi:10.1111/j.1467-8551.2010.00694.x

 

Permalink

https://akin.css.edu/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=keh&AN=67133110&site=eds-live


========================================================================




 

 

 

 

 

 

 

 

 

Qualitative Critique: Women Smoking Habits

Ekta Gupta

Research Methods

The college of St. Scholastica

 


Qualitative Research Article Critique

In their article Smoking cessation in college-aged women: A qualitative analysis of factors important to this population, Nademin, Napolitano, Xanthopoulos, Fava, Richardson and Marcus (2010) outline an exploratory study undertaken during the course of the November 2006 to April 2007. This study is a qualitative examination of college-aged women’s views on smoking. Authors described the reasons for choosing such subject and populations as: Scarcity of research on successful smoking cessation among younger populations, and the need for effective cessation interventions among women who tend to be near child- bearing years during young adulthood. Research focused on women from age 18 – 21 to extend the existing researches. This study provided the reasons for which college females’ smoke and preferences for smoking cessation interventions for this population. The purpose of research was providing a more comprehensive review of women’s reasons for smoking and exploring a group-based cognitive-behavioral smoking cessation intervention. On the basis of previous studies, researchers inductively generated following hypotheses to be examined in this qualitative research:

1)      Population of young women would report stress management, appetite suppression and weight, interaction effects with substance use, and peer influences as reasons for smoking

2)      Exercise was expected to emerge as a beneficial aid in smoking cessation efforts, particularly given its comparable benefits for mood and stress management

3)      Young women would prefer the social nature of a group-based treatment as well as the integration of technology into any treatment approach

Literature

In qualitative research it is important to review pertinent literature on the subject of study in an effort to provide a logical background for the efforts undertaken by the researcher in a given context. Researches indeed draw on some relevant literature to contextualize her research, as background to her research, this is particularly useful in that it provides evidence which suggests that an analysis of how such testing affects some participants and their colleagues reminding the need to quitting smoking.  Researches have mentioned relevant theme related to the abstract of research. They discussed few findings such as reasons for young adults smoke, patterns of smoking by age and gender, reasons for quitting smoking.

Methodology

Sampling

Sample included 43 women, recruited from a campus of 26,294 undergraduate students, ranging in age from 18 to 21 (M 19.2). Though sample seems to be low but it’s hard to conclude anything unless we know the target population in the college. The race/ethnicity of the sample was predominately Caucasian (77%), African-American (16%), Asian (2%), mixed race/ethnicity (2%) students, and no Racial Designation (3%) which is comparative to the campus student body, which is composed of 58% Caucasian, 17% African-American, 10% Asian/Pacific Islander, and 15% Other. Researchers did not mention whether this composition of ethnicity of sample were planned or random. Ethnicity could had added a different angle to look out the things and questions might had been framed differently per se. Authors indicate that, while the school as a whole is somewhat ideal for this research, a smaller than ideal number of participants agreed to take part.  This could introduce an element of invalidity into the research as the sample which volunteered may not be representative of those who declined participation.  All participants endorsed having smoked in the past month but frequency of tobacco use was not recorded. Fewer than three of the focus group members endorsed only monthly smoking behavior. Its questions the reliability of survey. Frequency of smoking could have made a specific case for particular group.  Each participant attended one of five initial survey completion and engaged in audio-taped discussions that lasted between 45 and 60min. All data pertinent to interview were kept confidential which seems to be ethically fair and must had increased the confidence level of participants.

Procedures

While it is comparatively enjoyable to read a narrative approach to research reporting, researchers went into real detail about the procedures that they followed during the course of the case study.  Focus group were formed after putting various efforts in advertisement included publication of advertisements placed in various venues, including Craigslist.com and the university newspaper, Information booths on campus, direct face-to-face recruitment, and ‘‘word of mouth’’ referrals. The fact that all clinical investigators and key personnel involved in this study underwent education in human research subjects’ protection, confirms that participants were handled with care and with high emotional intelligence. Participants were well guided for the purpose of the study before signing consent form, this enhances the validity of the responses and feedback from participants.  For research subjects such as smoking which doesn’t bring any pride with it, it is important to make participants comfortable with the kind of question might be coming to them, is important. And Researchers did prepare women for the questions to be asked, such as what they think about smoking, exercise, weight, preferred physical activities, and reasons young women smoke or do not smoke as well as variables that might motivate them to quit smoking and/or to start exercising. Interview was semi – structured and open-ended questions were emphasized. No evidence of semi - structured interview questions or checklists/check sheets is offered in the report.  For all intents and purposes, the reader is expected to assume that proper procedures are undertaken.

To make sure benefits were not overstated, participants were clearly informed, what this research is not about. They have been clearly told that this research is not being conducted in an effort to influence their respective smoking behaviors. Any overstatement or misunderstanding about the research may cause cognitive dissonance in participants, which could diminish the probability of proper responses. Participants got the reward of $20 for participating in the research with luxury of leaving it any point of research. I think participants tend to give more trustworthy information if they get some return benefits. This does not at all mean that survey without benefits are not reliable. Consent form were signed off and participants completed a set of four questionnaires, followed by group discussion. Details regarding questionnaires were also given.  It seems to be good approach recording some quantitative data to supplement the qualitative data. Follow-up questions in interviews were asked based on the responses of participants and themes that surfaced in each group. Readers has to trust on the competency level of the interviewers as follow up questions were not planned, however as mentioned earlier that all clinical investigators and key personnel involved in this study underwent education in human research subjects’ protection, increases the trust worthiness of these interviews. Procedure seems to be in the boundaries of business ethics and fine details of the research are mentioned which make the reading pleasurable.

Analysis

As the procedures where well described, analysis of the data collected seems to be clear and explicit.  The themes are emergent throughout the report and arise directly out of excerpted commentary on the part of the participants themselves. Audio- taped sessions got reviewed and transcript. Overt keywords and phrases relevant to themes of interest, were reviewed. Open coding and axial coding (Vaughn et al. 1996; Strauss and Corbin 1998b) were also used to analyze the students’ interview data .Open coding served to identify concepts and categories from the data, and axial coding aided in the determination of any relationships among the categories. Initial coding of transcripts was conducted by experts i.e. a PhD candidate in clinical psychology with an extensive background and training in management of qualitative data. Reliability and validity of the coding scheme were assessed through review by several content experts.

Validity

Researchers had involved highly qualified personnel in analysis of the initial coding which lays out the base for manipulations of interview and hence add high level of validity in the result. Content experts reviewed the reliability and validity of coding scheme, adds strength in the research, however competency of content expert can be challenged due to missing detail info about them.

By mentioning openly, how discrepancies of opinion with regard to categorical distinctions and coding procedures were handled and corrected to reflect mutual agreement of all parties, proves keen attention pursued for the study. Most of the emergent themes were straightforward though.

Additionally, by providing continuous excerpts from interviews, allowing the participants to speak for themselves, the researcher reduces the possibility that the reader may perceive that researchers have become too subjective in their efforts to understand participants’ situations… thus introducing a level of conformability into their work. Beyond this, as noted above, through reference to other literature composed on similar topics and in similar contexts, researchers suggest a level of transferability in her research.


Results

Summary of the themes that emerged from this study seems to be both complete and actually based on the contexts of participants. That is, the themes emerged from the participants and are not super-imposed on their situation by the researchers.  A number of themes emerged, including reasons for smoking, smoking initiation, triggers related to smoking, maintaining aspects of smoking, costs and benefits of smoking, image and weight related issues relevant to smoking, thoughts on quitting, and successful cessation intervention strategies. Major emergent themes were described with the excerpts of interviews which totally supported it.

Personal Analytic Statement

Generally speaking, I found that this particular case study was a satisfactory example of what I understand to be acceptable for qualitative case study research. A very few elements of the study were disappointing, such as the lack of description regarding data collection procedures, samples of questions asked during group discussion, but on the whole, I enjoyed reading this article and the subject matter. 

What perhaps struck me the most was the fact women even being well aware of the all the negative impacts of smoking, are less willing to quit it. Use of tobacco is a major preventable cause in mortality among US adults. Though tobacco consumption is reduced, it is surprising to know that average smoking prevalence among 18–24-year-olds has remained stable since 1993, with approximately 22% of adolescents smoking (Centers for Disease Control and Prevention 2000b, 2002a). Some women mentioned smoking as a substitute for diet to save money which seems to be a matter of concern. This study has taken a small but important step to address the addiction problem of adolescent which is harder to quit. Small sample size make it difficult to generalize the result, hence a larger and longitudinal study is recommended.


References

Strauss AL. 1987. Qualitative analysis for social scientists. New York: Cambridge University

Press.

Strauss AL, Corbin J. 1998a. Basics of qualitative research: Techniques and procedures for           developing grounded theory. 2nd ed. Thousand Oaks: Sage.

Strauss AL, Corbin J. 1998b. Grounded theory methodology: An overview. In: Denzin NK,         Lincoln YS, editors. Strategies of qualitative inquiry. Thousand Oaks: Sage Publications.

            pp 158–183.
===========================================================================


 

 

 

 

 

 

 

 

 

Perceived Risk as Barrier to Internet and E-commerce Usage

Ekta Gupta

April 7, 2013

The College of St. Scholastica


This paper is an academic critique of a research article written by Liebermann and Stashevsky (2002): Perceived risks as barriers to Internet and e-commerce usage. Authors are MBA directors at Graduate School of Business Administration, Bar-Ilan University, Ramat Gan, Israel. The conceptual framework of this thesis is: Perceived risk is a long rooted central concept in consumer behavior Literature. Authors state that earlier studies considered a limited scope of perceived risk elements, especially only security and privacy and they did not suggest any model to understand the influencing factors. In this study a detailed nine elements perceived risks map are researched. Furthermore, a model is suggested with the factors affecting the perceived risk elements. The purpose of the present study is to investigate the role of perceived risks as potential barriers to Internet and e-commerce usage. A research design of three stages has been applied.

1)      First, using a qualitative research approach a detailed map of perceived risks has been produced. 465 employed adult Israelis from a variety of organizations have been interviewed.

2)      Second, a model describing factors affecting perceived risks has been constructed, using a qualitative scheme of analyzing inter-relationships between given variables.

3)      Finally, the model has been tested empirically against field data. T- Test is adopted for the data analysis.

Liebermann and Samuel Stashevsky (2002) outline a non-participatory case study. They have identified nine different risk components, which have been empirically tested in this research. Authors suggest in order to expand Internet usage, suppliers should first learn what are the potential obstacles faced by potential users and non-users and only then attempt to design creative marketing suggestions.

Literature

Authors have reviewed pertinent literature on the subject of study in an effort to provide a logical background for the efforts undertaken by the researcher in a given context. They indeed draw on some relevant literature to contextualize their research, as background to her research. Literature begins with exploring long rooted concept of risk. Batman (1973) had divided all traditional risk into different species as financial, physical, psychological (or mental) and social. Dekimpe, Parker and Sarvary ( 2000) suggested adding technological risk in this group now. Authors have made a point that accurate identification of these perceived risks will enable suppliers to design creative solutions and those solutions will enable potential customers to handle perceived risk more effectively and ultimately reduce it to acceptable levels. The referenced data of other researches clearly indicates that privacy and security are one of those concerns impacting the revenue of E-commerce. Implication of the literature directly pushes the need of exploring different internet risks perceived by consumers.

Methodology

Authors have used mixed method to identify and understand the risk factors. Under Qualitative research method, they reviewed scientific literature and interviewed Internet experts and consumers to identify following nine different risk components.

 (1) Internet credit card stealing

(2) Supplying personal information

(3) Pornography and violence

(4) Vast Internet advertising

(5) Information reliability

(6) Lack of physical contact

(7) Not supplying Internet products purchased

(8) Missing the human side in Internet purchases

 (9) Internet usage addiction.

Depending on degree of usage of Internet, distinction is made between users and non – users of Internet and data is captured how usage activity volume effects the perceived risk elements. I believe capturing and analyzing this attribute (usage activity volume) suggests that researchers paid keen attention to details.

Absence of any information regarding who these experts are, how researchers got access to them and what qualified interviewees for this interview, puts the validity and reliability of these risk components at stake. Moreover, no information is uncovered about what type of interview was taken, what questions were asked in the interview. Interview is the primary data collection technique for gathering the data in qualitative methodologies and this paper mentioned so vaguely about this which reduces the overall reliance of this research paper. This demerit could have been compensated if paper would have talked on if interview  was individual, in depth or conducted in group, whether interview was semi- structured, unstructured or a structured and if interviewer was trained enough for the job, whether any interview or discussion guide was there for the interviewees? I think a trained interviewer can better extract information from the participants who sometime are not consciously aware that they possesses the information desired. Trained interviewer would have strengthened the interview process.

Few measurements are used to establish connection between empirical observation and mathematical expression. Mean, which is considered to be most powerful measure of center tendency, has been used. Standard deviation is calculated to measure the variability in those risks.

Following descriptive model was used to analyze the variables that effect perceived risk elements.


Figure 1

As shown in above figure 1, this study explores the effect of independent variables on the dependent variable of Perceived risk elements.   

Hypotheses

A Hypothesis is a researcher’s prediction, derived from theory or speculation about how two or more measured variables will be related to each other. Following nine hypotheses are made and which empirically supported by the data of the study also.

  • H1. The two main perceived risk elements are Internet credit card stealing and supplying

                    personal information.

  • H2. Internet users are likely to perceive higher risks in the Internet than non-users  

       concerning technical elements.

  • H3.  Females are likely to perceive higher risks in the Internet than males.
  • H4. Older people are likely to perceive higher risks in the Internet than younger ones.
  •  H5. Married people are likely to perceive higher risks in the Internet than unmarried   

         people.

  • H6. People with low education level are likely to perceive higher risks in the Internet than

       high-educated people.

  • H7.Internet users that never bought online are likely to perceive higher risks in the

                    Internet than Internet users that actually bought online.

  • H8. Light Internet users are likely to perceive higher risks in the Internet than heavy

                   Internet users.

Sampling

Sampling design method is not mentioned. Authors should have specified if it was probability sampling or non-probability sample. Unavailability of the sample selection process makes reader skeptical about precision and accuracy of the sample. The respondents were 465 employed adult Israelis from a variety of organizations, chosen for the survey. Response rate was quiet high, 85 percent. A total of 372 Internet users (80 per cent) were distinguished from 93 non-users (20 per cent).

Authors further explained the make-up of the sample as 58 per cent were male and 42 per cent female. The majority of the sample (68 per cent) was married, 25 percent was single, 6 percent divorced and 1 per cent widowed. Mean age is 37. Education: elementary school: 1 percent, high school: 22 percent, partial higher education: 17 per cent, BA degree: 36 per cent, MA or PhD degree: 24 percent. The majority of the sample (87 per cent) has a computer at home. The majority of the sample (80 per cent) consists of Internet users. Out of the Internet users 80 percent use the Internet at home, 79 per cent use the Internet at work, and 13 per cent use the Internet at an educational institute. Sample seems to have a good variation of participants. It appears method of random sampling were chosen.


Measures

Authors have mentioned respondents were interviewed by written questionnaires consisting of 76 questions covering different aspects of Internet. Sufficient information regarding interview is again missing from the paper. Noticeably missing is any description of how interviewees were approached for interview. Users were asked   to document their usage behavior then their level of satisfaction of various service attributes and finally their various usage channels. Non-users were asked as to the reasons for their refraining from use. Both users and non-users were asked jointly two sets of questions regarding their general attitudes to Internet and their socio-demographic traits. Except for the usage behavior and demographic parts all answers were closed form measured on a six-point Likert scale. The main variables that were analyzed in this study are these nine perceived risk elements: Internet credit card stealing, supplying personal information, pornography and violence, vast Internet advertising, information reliability, lack of physical contact, not+ supplying Internet products purchased, missing the human side in Internet purchases, Internet usage addiction. The answer scale for the perceived risk elements was: 1=strongly disagree, 2=disagree, 3=slightly disagree, 4=slightly agree, 5=agree, 6=strongly agree. The four demographic traits that were analyzed in this study and their scales are: (1) Gender: 1=male, 2=female. (2) Younger/older age: 1=age up to 35, 2=age above 35. (3) Married/unmarried: 1=married, 2=unmarried. (4) High/low education: 1=high education (at least BA degree), 2=low education. The three usage behavior variables that were analyzed in this study and their scales are: (1) Internet user/non-user: 1=Internet user, 2=Internet non-user. (2) Bought online: 1=Internet user who bought online at least once, 2=Internet user who never bought online. (3) Heavy/light Internet user: 1=heavy user (above mean Internet usage hours), 2=light user. It has been mentioned that Internet service providers (ISP) might have made operational decisions based on partial information only which cause the deterioration of  the reliability of data. Descriptive statistics and correlation coefficients are given. SPSS Statistics is a software package used for statistical analysis.

Data analysis

The mean of different perceived risk elements are analyzed using independent samples T-test . The t-test is a probability test and is an excellent choice for this type of analysis where standard deviation is not known and sample size is low, it is used to assess whether the means of two groups are statistically different from each other. Two- tailed T test is performed with confidence level of 95 percent. Those data are marked separately which came out as statically significantly difference. SPSS tool is used to calculate all the mathematical values and analyzing them. As number of sample is greater than 120, Z-test could also have been an alternate choice.

Result

Results are well presented in tabular and graphical form which is precise and clear. Hypothesis is well supported by the data and stealing of credit card and personal information, emerged as two most concerned risk elements of customers. Authors have clearly stated that hypothesis three (H3) is partially supported with the data which reveals the transparency of the research. The study concludes by noting that perceived risk are key elements in customers purchasing behavior. Hence these multi-attribute findings can be used by marketers along the personalization process. Thereby each individual can be approached more efficiently according to his or her expected specific perceived risk structure. This way, personalized advertising messages and promotional offers can be adopted to reduce perceived risk by Internet users. More study with different cultural study is recommended before generalizing the findings. Authors suggested more research is needed to identify additional influencing factors, such as personality traits. Another aspect that is recommended for future research, is investigating, in a longitudinal study, the effects of perceived risk elements on actual buying behavior of the online consumers in the time to come.

Personal Analytic Statement

Generally speaking, I found this article interesting with satisfactory data. Authors described the population well and include a number of charts to help the reader visualize the data. Their analysis of the data is well reasoned and complete. Variation in respondents is noteworthy and adds value in the research and its usability in competitive marketing. With interval scale and independent sample, T- test seems to be appropriate choice. Likert scale had even number of options which force the respondents not to be neutral about the situations asked. I consider this to be acceptable to get some useful data out of respondents’ minds rather, otherwise neutral could have been more comfortable choice which certainly might not been true all the time. Gender should have included more liberal options (other than male, female). Unfortunately, there are also some gaps and deficiencies in the study that undermine its results and validity.  The small sample size along with missing details of sampling moots transparency and biasness of research. Sufficient information about Qualitative methodology is not provided. Moreover, no details were given how interviewees were selected and approached and how documents prepared by respondents were used and analyzed. This make reader skeptical about their data collection processes. Overall, the survey was interesting and seeks to answer a very important question in the study of perceived risk factors for e-commerce, but the results need to be viewed cautiously given the concerns raised in the critique.


References

Bettman, J. (1973). Percieved Risk and its components- a model and empirical test. Journal

            Of Marketing Research, 10, 90-184.

 

Dekimpe, M. G., Parker, P. M., & Sarvary, M. (2000). Global diffusion of technological

            innovations - a couple-hazard approach. Journal of Marketing Research, 37, 47-59.

 

Liebermann, Y., & Stashevsky, S. (2002, November 4). Perceived risks as barriers to Internet

and e-commerce usage. Qualitative Market Research: An International Journal, 5(4), 291-300. doi:10.1108/13522750210443245
======================================================================
 

 

 

 

 

 

 

 

 

Critique of Business Ethics in China

Ekta Gupta

Research Methods

The college of St. Scholastica

 


Qualitative Research Article Critique

This paper is an academic critique of a qualitative research article written by Nademin, Brand and Slater (2003) entitled: Gain Insights into the Business Ethics Experiences of Australian managers in China. This study is a qualitative examination of 31 Australian managers who spent average of 8.7 years working in business connected to china. Managers participated in in- depth interviews. Cultural differences and different level of corruption in countries involved in business, attributes to research in this area. Researches stated that qualitative study of business ethics has been a recently adopted concept. Scarcity of study around the problem faces by Australian or any western manager operating in china or how these managers responds to such situations, aspired author to pick this issue of understanding the impact on a foreign manager of working in a very different business ethics culture. Authors preference to qualitative methodology over quantitative for such topics seems reasonable as it records more detailed experiences. As a qualitative study, generally researches involves a certain level of subjectivity and reflexivity, but nothing has been mentioned regarding any predisposed notions, shows the ignorance of the matter.

Literature

In qualitative research it is important to review pertinent literature on the subject of study in an effort to provide a logical background for the efforts undertaken by the researchers in a given context.  Researches indeed draw on some relevant literature to contextualize her research. Researches mentioned that previous quantitative researches focused upon the prevalence of business issues in Eastern cultures compare to western but not equivalent attention was given on identifying the type of issues which come up for business practitioners in foreign environment. A particular important aspect of this research was its consideration of the ways in which Chinese culture may define the acceptable business practices differently from the western models and what the convergent ways between western and Chinese models are.

Methodology

In depth interviews were taken which addressed a range of issues related to the managers’ experiences of living and working in china:  frequency and importance of business ethics problems, examples of issues and the response of managers. Interviews were held in 1999 with 31 Australian managers located predominately in Australia with the exception of one manager who was interviewed by telephone in china). It has not been mentioned whether these managers were gone through some training to handle cultural differences or not, which could have added a detailed insight in the study. In absence of this data it is highly skeptical to generalize the different problems stated by managers.

Method

Participants

Managers were located through government directories dealing with Australian companies operating in China and snowball sampling technique is used with the help of managers working in the same field. Authors confirmed that direct approach to contact managers has increased the likelihood of participants agreeing to be involved and get more informal introduction of interviewer. Out of 59 approached mangers, 31 agreed to participate, hence response rate is 52 percent which though is not as exciting. Some managers requested to make them anonymous and mention that disclosing their name could lead to career threat. 27 respondents were male and four were female. Male to female ratio is pretty acceptable thinking that not much female designates at such higher executive level. Average year of experience of managers is 8.7. Managers are picked from various firms of different industries which means researchers tried to bring great variation in the experience of participants. Mentioned turnovers of the firms suggested, they are pretty big in size. I am sure business ethics and practices followed in smaller size industries would add a similar but more intense findings.

Data Collection

Data collection process was described with the details. In – Depth interview appears to a good choice for sensitive issues like ethics. Authors followed an appropriate process of developing and distributing statement of confidentiality and interview guide containing open ended questions together with some general background data questions, before the interviews. Researchers planned his best to make the interview much effective by providing the copy of guide ahead of time so that busy managers could get time to prepare for the best inputs for the interviews. Meeting managers before the interviews would have helped both the parties establish a good connection between them which is an important factor to a qualitative data collection methods such as in depth interviews. Five Key questions outlined in the guide were mentioned in the paper. Some clarifying and probing questions also were asked to gather more detailed and accurate responses. Researchers took good alternative approach of taking contemporaneous notes of the interviews where managers requested not to audio taped their interviews. All other interviews were audio taped. All interviews were taken by Mr. Brand and transcribed by an independent party.

Analysis

Slater reviewed and transcript audio- taped sessions and assigned axial codes to particular idea or reactions. Subcategories of particular themes were also assigned a code. Mr. Slater education in phycology extends the reliability of axial coding. Coding was then cross checked and verified with Mr. Brand. The mentioned qualification of Mr. Brand doesn’t add much power in the review process of axial coding. Paper didn’t elaborate enough on transcript and neither axial coding is reviewed by experts, which reduces the reliability and validity of the coding scheme.

Validity

In absence of qualified personnel, analysis of the initial coding doesn’t seems to be very reliable. Authors mentioned that true random sampling was not possible due to the fact managers don’t get ready for interview unless it is through any contact which could have reduced the validity and reliability. I think with less random sample, reliability could be questioned but validity should remain intact if best effort is made to get most out of interviewees. Authors stated that like all other qualitative studies, this study also suffers from the assumption about accuracy of the respondent’ recollections, introspection and candor. Social desirability bias could had made managers to give such statement which were more acceptable in society than what their true perception was. The sensitive nature of the ethics, may bring some social desirability bias to reduce the validity of this research. I agree with author that quantitative study is more prone to such biases than qualitative study. In depth interview probing questionnaires hold an opportunity to make study free from some cognitive dissonance behavior of interviewees and can attempt to elicit more details in responses. Authors claimed that audio recording and transcript conversion might cause loss of some validity in this sensitive issue of ethics and this is due to incapability of registering feelings, facial expression, physical movement, pauses and other emotions indicators. I agree that these nonverbal communicators which convey crucial information could not be registered but author could have adopted some way to register them in manual notes. Body language expert should have been included in the team taking contemporaneous notes.

I see scarcity of  references to other literature composed on similar topics and in similar contexts, which may questions the level of transferability in this research; But the fact that qualitative research on business ethics is a lately developed concept, could be a reason for less references.

Results

Summary of the themes that emerge from this study seems to be both complete and actually based on the contexts of participants.  That is, the themes emerge from the participants and are not super-imposed on their situation by the researcher.  Two overall themes emerged from analysis is : First , Despite of variations in experiences of different managers, certain type of business ethics issues like visa issues, bribery spectrum etc. predominates in their discussion and were discussed in the paper. Second, four major forms of reaction to business ethics issues were identified. Authors mentioned that there was inconsistencies in managers declining the value of business ethics in china but wide range of issues emerged during the course of interviews. Authors think positioning of questions had made a difference in the answers from managers. I think, more sensitive questions should be asked later in the interview, after establishing some relation with interviewee. Author also stated that respondents might hold different definition of business ethics than interviewer’s definition and that bring certain level of invalidity in the results. Authors concluded with suggesting four coping strategies which are : First, insistence of not compromising one’s own moral; Second, understanding the motivation of Chinese counterparts and making allowances accordingly, this includes cross cultural training to managers. Third, mentoring by more experience offshore managers; fourth, sticking to company policy which should have clear code of conducts. I think authors made a strong conclusions which will help any cross cultural business dealings. A large number of interviews are suggested to test the themes emergent from this qualitative research.


Personal Analytic Statement

Generally speaking, I found that this particular case study was a satisfactory example of what I understand to be acceptable for qualitative case study research. Some elements of the study were disappointing, such as the lack of description regarding data collection procedures, samples of questions asked during interview, transcript were not coded and reviewed by experts, whether moderator was well trained in taking interviews, but on the whole, I enjoyed reading this article and the subject matter. The coping strategies seems to be helpful in dealing with cross cultural aspects. Small sample size make it difficult to generalize the result. I think people at such higher level knows manipulating the data very well and I personally would recommend a longitudinal study for such survey to confirm the validity. Paper didn’t not talk about how content analysis of the transcripts had been performed. Study could have been more transferable with inclusion on more details in interview and data analysis process.


References

Strauss AL. 1987. Qualitative analysis for social scientists. New York: Cambridge University

Press.

Strauss AL, Corbin J. 1998a. Basics of qualitative research: Techniques and procedures for           developing grounded theory. 2nd ed. Thousand Oaks: Sage.

Strauss AL, Corbin J. 1998b. Grounded theory methodology: An overview. In: Denzin NK,         Lincoln YS, editors. Strategies of qualitative inquiry. Thousand Oaks: Sage Publications.

            pp 158–183.

 

No comments:

Post a Comment