Describe the features of qualitative research that most distinguish it from quantitative research.

What will be an ideal response?


With these points in mind, let us review the ways in which qualitative data analysis differs from quantitative analysis (Denzin & Lincoln, 2000; Patton 2002). Qualitative analysis features the following:
• A focus on meanings rather than on quantifiable phenomena
• Collection of many data on a few cases rather than few data on many cases
• In-depth study and attention to detail, without predetermined categories or directions, rather than emphasis on analyses and categories determined in advance
• A conception of the researcher as an instrument rather than as the designer of objective instruments to measure particular variables
• Sensitivity to context rather than a seeking of universal generalizations
• Attention to the impact of the researcher’s and others’ values on the course of the analysis rather than presuming the possibility of value-free inquiry
• A goal of rich descriptions of the world rather than measurement of specific variables
You will also want to keep in mind features of qualitative data analysis that are shared with those of quantitative data analysis. Both qualitative and quantitative data analysis can involve making distinctions about textual data. You also know that textual data can be transposed to quantitative data through a process of categorization and counting. Some qualitative analysts also share with quantitative researchers a positivist goal of describing the world as it really is, but others have adopted a postmodern goal of trying to understand how different people see and make sense of the world without believing that there is any correct description.

Criminal Justice

You might also like to view...

Directed patrol is also referred to as ______________________

a. random patrol b. focused patrol c. indirect patrol d. off-hours patrol

Criminal Justice

Was Hacker's actions the behavior of a private person or state action?

A computer hacker ("Hacker") in Turkey sent an untraceable e-mail to the Montgomery, Alabama Police Department (MPD), saying that he discovered evidence of child sexual abuse on a computer in Montgomery; he said that the victimizer "is a doctor or a paramedic." The anonymous hacker attached an electronic image file of a white male sexually abusing a young white female approximately five years old. MPD officers replied by e-mail, asking Hacker for more information. He sent attached images of a adult white male nude from the waist down fondling the young girl, exposing her genitalia, and depicting "clamps connected to a chain attached to the child's labia." Hacker identified the molester's name and provided identifying information including Steiger's Internet service account information with AT&T WorldNet. MPD officers e-mailed Hacker and in response Hacker provided the Internet Protocol ("IP") address (a unique address assigned to a particular computer connected to the Internet). An investigator corroborated identifying information about Steiger. Based on this information investigators prepared a search warrant affidavit without mentioning that the source of information was a hacker. A search of Steiger's home produced incriminating evidence that was used to convict him. What will be an ideal response?

Criminal Justice

The Supreme Court has permitted government officials to open incoming international mail without a warrant to do so

a. True b. False

Criminal Justice

______ believed that criminal data sources failed to reflect the true extent of female crime.

A. Hirschi B. Manson C. Lomroso D. Pollak

Criminal Justice