Presentation is loading. Please wait.

Presentation is loading. Please wait.

ITEC6310 Research Methods in Information Technology Instructor: Prof. Z. Yang Course Website: c6310.htm Office:

Similar presentations


Presentation on theme: "ITEC6310 Research Methods in Information Technology Instructor: Prof. Z. Yang Course Website: c6310.htm Office:"— Presentation transcript:

1 ITEC6310 Research Methods in Information Technology Instructor: Prof. Z. Yang Course Website: http://people.math.yorku.ca/~zyang/ite c6310.htm Office: Tel 3049

2 2 Factor analysis Factor analysis is a form of exploratory multivariate analysis that is used to either reduce the number of variables in a model or to detect relationships among variables. The goal of the analysis is to try to identify factors which underlie the variables. We do factor analysis on the four variables: write, math, science and socst.

3 3 Factor analysis in-class exercise The data set is about the functionalities and the usefulness of the commercial websites. Likert scales were used to measure functionalities and usefulness of the commercial websites. F1: Identify potential suppliers F2: Acquire product information from different suppliers F3: Evaluate product offerings F4: Compare seller prices F5: Select a supplier F6: Make bids F7: Place orders F8: Make payments F9: Track the status of orders F10: Track the status of shipments U1: Accomplish my tasks more quickly U2: Improve the quality of my work U3: Enhance my effectiveness on the job U4: Make my job easier The researcher is interested to apply factor analysis to refine the commercial websites' functionalities and usefulness.

4 4 Secondary Data Data that were collected for other studies. Evaluating secondary data is similar to doing a critique of a published research report. Why use secondary data –It can be less expensive than gathering the data all over again. –It may allow the researcher to cover a wider geographic or temporal range. –It can allow for larger scale studies on a small budget.

5 5 Potential Drawbacks of Secondary Data Secondary data are only as good as the research that produced them Must assume what the author(s) meant by the terms they used; Data may be neither valid nor reliable Instruments or data collection methods may have changed over time Data may have been modified by the researcher already (e.g., weighted) Poor documentation of the secondary data set Electronic format incompatibilities Limited access to the data, e.g., on-site only Confidentiality considerations that lessen its usefulness

6 6 Data Coding Data analysis begins with the labeling of data. Data coding allows the researcher to reduce large quantities of information into a form that can be more easily handled, especially by computer programs Not all data need to be coded.

7 7 Steps in Data Management Prepare the data collection instrument and collect the data; Prepare the data dictionary or codebook; Prepare the data matrix worksheets; Prepare instructions for data entry and data analysis.

8 8 Tips on Data Coding Use numbers to represent response categories. Use zero and one to code variables with binary response categories One question on a questionnaire can yield more than one variable.

9 9 Final Exam Review Research Design –Experimental design Between-Subjects Design, Within-Subjects Design and Single-Subject Design Internal and external validity –Survey Sample techniques –Observational methods –Case study method –Archival method –Measurement and scale Descriptive and inferential statistics


Download ppt "ITEC6310 Research Methods in Information Technology Instructor: Prof. Z. Yang Course Website: c6310.htm Office:"

Similar presentations


Ads by Google