Sunday, April 12, 2020
Frederick James - The Limites Of Post Modern Theory Essays
Frederick James - The Limites of Post Modern Theory The impetus behind this paper has been the recent publication of Fredric Jameson's 1991 Welleck Lectures, The Seeds of Time.1 As these lectures were delivered a decade after Jameson's initial attempts to map the terrain of postmodernity it appeared to me to provide an occasion to reflect upon the current status of Jameson's highly influential and much criticised theory of postmodernism as the cultural logic of late capitalism. It also enables me to return to, what I consider to be, one of the most troubling aspects of Jameson's writing on postmodernism, that is to say, the "waning", to use Jameson's term, of the political imagination. As Jameson is probably the foremost Marxist theorist writing on postmodernism and one of the most influential of contemporary cultural critics, I find this paralysis of the political imagination in the face of postmodernism deeply problematic. As most of you are probably aware postmodernism is inherently paradoxical and playful. There is, suggests Jameson a kind of winner loses logic about it, the more one tries to define what is characteristically postmodern the less characteristic it turns out to be. Postmodernism, by definition resists definition. Theoretically, postmodernism can only theorise its own conditions of impossibility; with neither a fixed subject nor object there can be no theory of postmodernism as such. This paradoxicality is what Jameson now identifies as the antinomies of postmodernity, the aporia or theoretical impasses which mesmerise postmodern theory and unlike the older (modernist) discourse of dialectical contradiction remain unresolvable at a higher level of abstraction. Jameson identifies four fundamental antinomies of postmodernism: time and space, subject and object, nature and human nature, and finally the concept of Utopia. Today I will focus on just the first of these antinomies, what Jameso n describes as the foundational antinomy of postmodernism, that is, time and space, and suggest that the failure to think beyond the antinomy is symptomatic of a more general failing in Jameson's theory as a whole. I shall also venture to suggest that a more dialectical understanding of temporality and spatiality may enable us to move beyond what Jameson sees as the limits of the postmodern. Before engaging with this debate, however, I will briefly recapitulate Jameson's original thesis and what I still consider to be the importance of his theoretical endeavour. Jameson's initial intervention in the postmodern debate, in a 1982 essay `The Politics of Theory',2 was primarily an attempt to map the ideological landscape of postmodernism, however, the article concluded on a characteristic Jamesonian note, insisting on `the need to grasp the present as history'. Jameson, then, initially seemed to suggest the possibility of a way through the impasse of the two most influential strains of thought emerging at that time in relation to postmodernism. On the one hand, one encountered an uncritical celebration of the concept by the postmodernists themselves, and, on the other, the charge of cultural degeneracy was being levelled by more traditional critics and older modernists. We must avoid, argued Jameson, adopting either of these essentially moralising positions, and rather develop a more fully historical and dialectical analysis of the situation. Whether we like it or not there was a perception that culturally something had changed, we may disagree on what that change entails but the perception itself has a reality that must be accounted for. To repudiate such a cultural change was simply facile, to thoughtlessly celebrate it was complacent and corrupt; what was required was an assessment of this `new cultural production within the working hypothesis of a general modification of culture itself within the social restructuration of late capitalism as a system'. It was this promise to historically situate postmodernism in relation to transformations in the capitalist system and the development of global multinational capital that, for many like myself who at once embraced aspects of postmodern theory whilst remaining critical of its often ambiguous political stance, was probably the single most significant aspect of Jameson's theory. At the same time, however, the precise nature of the relationship between postmodernism as a cultural phenomenon and late capitalism as a system was left somewhat under-theorised and, for myself at least, this has remained one of the most
Tuesday, March 10, 2020
Phone Tapping Essays
Phone Tapping Essays Phone Tapping Paper Phone Tapping Paper A Characteristic of Orwellââ¬â¢s Big Brother? Communication makes the world what it is. Without communication, people would virtually be in total isolation from one another and with events around the world. Telephones play an integral role in providing this much-needed communication. Telephones also permit people the freedom to say what they wish to others on a confidential basis, without any risk of witnesses. This freedom allows releases that many people believe no one can take away. Most people take this freedom for granted and overlook the fact that the government can, under certain restricted conditions, take it away by phone tapping. Phone tapping is the secret monitoring of a conversation by a third party. Where some may argue that phone tapping is necessary, that argument is misleading and incorrect in many aspects. Many argue that phone tapping is an invasion of privacy. Nowhere in the Constitution is the word privacy mentioned, implying that, ââ¬Å"Privacy is a value or ideal in society,â⬠(McCloskey) but not a right. This is one argument in support of phone tapping. While some claim that the Constitution supports this argument, sections of the Constitution actually provide reasons why this argument is incorrect (Browne). Those guidelines imply that Americans have the right to privacy, because there would be no point for laws to protect privacy if privacy was not a right. However, the Bill of Rights does not explicitly say the word privacy but it implies and defends privacy within multiple amendments including the Fourth and the Tenth. The Fourth Amendment clearly states, ââ¬Å"Without probable cause and a search warrant, the government cannot search or seize your house or belongings. â⬠(United States Constitution. ). The right to not to have oneââ¬â¢s personal property and belongings searched, is a guideline that defines privacy. The Tenth Amendment states, ââ¬Å"The powers not delegated to the United States by the Constitution, nor prohibited by it to the states, are reserved to the states, or to the people. â⬠(United States Constitution. ). This means the government has no power or right to invade our privacy or do anything that it not specifically sanctioned in the Constitution (Browne). Therefore, concerning the invasion of privacy by phone tapping, the government has no right under any circumstances to tap any phone for any means without probable cause. Government phone tapping is said to be a key approach to staying one-step ahead of criminals and terrorists (ââ¬Å"Bush Defends. â⬠). The major problem with this argument is the enemy usually is too smart for phone tapping! Most often, terrorists and criminals are able to devise huge schemes to break the law without being caught. It is rather naive to assume that simple phone tapping will put roadblocks in their plans. Criminals and terrorists sometimes know the governmentââ¬â¢s plans and often they are aware of what the government is trying to do to discover their criminal acts and terroristic plots (Levy). For example, most terrorists and criminals assume their home phones are tapped and therefore they do not use them to plan their attacks or crimes (Finder). If phone calls need to be made, they normally are made off the premises or in public places. Therefore, phone tapping is too elementary to counteract their plans. Getting a court order to phone tap every public phone, for the possibility that a terrorist may use it, is quite trivial because that possibility is hardly probable enough to gain multiple phone tapping warrants (Hollingsworth and Mayes). When a phone is tapped, someone has to listen to every conversation, carefully listening for suspicious details or plans. This takes bodies away from more promising and pressing leads that quite possibly could uncover corrupt and illegal plans. In turn this actually results in phone tapping possibly aiding in criminal acts as opposed to hindering them (Levy). This idea that phone tapping aids in staying ahead of the criminals is too nominal to be considered an argument. It seems that the government is desperate to defend phone tapping so it devised this argument. Furthermore, the results that government sponsored phone-tapping produce are so marginal, it seems that spending time and money on it is futile (Levy). The government taps phones to discover evidence about a certain topic. Data mining is a system that aids in phone tapping: once a phone is tapped, all the conversations are data-mined to show trends which the government analyzes to decipher which phone records to dissect (Levy). The evidence discovered by data-mining and phone tapping only leads to more leads, meaning that intercepting evidence may identify a criminal or a suspect but most often does not lead any to incriminating evidence (Morgan and Padley). This poses a major problem. The government cannot risk picking which lead to pursue or not to pursue, and consequently they have to pursue every lead. This is extremely time consuming and if the lead turns out to be a dead end, all that time and money was wasted (Levy). Government phone tapping has so many drawbacks, is it not worth the trouble when the results barely ever produce incriminating evidence. The only legal way for the government to tap a phone is to obtain judicial authorization through a warrant (Gittlen). This system mandates collaboration between the National Security Agency and the federal courts, and forces the agency to have reasonable, coherent evidence to obtain the warrant as stated in a law developed in 1978 (Ashenfelter). Besides the National Security Agency and the judicial branch, communication companies are also involved in phone tapping. Legally, communication companies must aid in government phone taps when presented with a warrant (Ashenfelter). While communication companies are required by law to assist in warranted phone tapping, some phone companies have been assisting in phone tapping regardless of the presence of a warrant, claiming it is better to help them then to let the government do the tapping themselves (Gittlen). A serious question arises when an issue of national security is involved as to whether the government should be allowed to tap a telephone without first getting judicial authorization. The governmentââ¬â¢s most simple, but most crucial job is to protect its people and their rights at all costs. Currently, the United States is fighting a war on terrorism which threatens those rights. If the government is fighting to preserve those rights, how can the government rationalize encroaching or even suspending our basic rights for periods of time to guarantee their survival (Stephen)? The governmentââ¬â¢s own actions are conflicting with our basic rights which is what our country is supposedly fighting to defend (Finder). How can the government fight actions that threaten national security, when they themselves are doing the same things? The freedoms promised by the Constitution need to be present and permitted at all times. Subsequently, phone tapping encroaches on those freedoms making it unconstitutional. The claim that the suspension of our basic rights to ensure their survival is pure fabrication. Government phone tapping is an issue that has numerous aspects to it. As with all arguments, many people quickly judge without looking at the big picture. However, experts on the subject can see that phone tapping is both unnecessary and unconstitutional. Phone conversations are something that are held sacred to the public and are a basic right according to the Constitution. Under no circumstance, even desperation is the government allowed to break its laws. Ashenfelter, David, comp. Bushs Wiretap Program Gets a Weeks Reprieve. Detroit Free Press 28 Sept. 2006, sec. DN. LexisNexis Academic. McClatchy-Tribune News Service. Marywood University, Scranton, PA. 22 Mar. 2007. Browne, Harry. Does the Constitution Contain a Right to Privacy? 9 May 2003. Google Scholar. Marywood University, Scranton, PA. 22 Mar. 2007. Keyword: Phone tapping Privacy. Bush Defends Phone-Tapping Policy. BBC News. 19 Dec. 2005. 27 Mar. 2007 . Finder, Joseph. Tap Dance. The New Republic os 215 (1996): 14+. Wilson Web. Marywood University, Scranton, PA. 22 Mar. 2007. Keyword: government phone tapping. Gittlen, Sandra. How Do the Feds Tap Phone Lines? Network World 13 Feb. 2006. Google Scholar. Marywood University, Scranton, PA. 25 Mar. 2007. Keyword: federal phone tapping. Hollingsworth, Mark, and Tessa Mayes, comps. The Case is Notable for One Thing He Got Caught. The Guardian (London) 19 Mar. 2007, Final ed. : 8. LexisNexis Academic. Marywood University, Scranton, PA. Levy, Stephen. Only the Beginning? Newsweek 22 May 2006: 33. Wilson Web. Marywood University, Scranton, PA. 25 Mar. 2007. Keyword: Phone Tapping National Security. McCloskey, H J. The Political Ideal of Privacy. The Philosophical Quarterly 21 (1971): 303- 314. JSTOR. Marywood University, Scranton, PA. 24 Mar. 2007. Keyword: phone tapping. Morgan, Vivienne, and Ben Padley, comps. Using Phone-Tap Evidence Would Increase Convictions' The Press Association Limited 16 Mar. 2007, sec. PN. LexisNexis Academic. Marywood University, Scranton, PA. 22 Mar. 2007. Keyword: government phone tapping. Stephen, Andrew. A Nation Left Unprotected. New Statesman 5 Nov. 2001: 13-14. Wilson Web. Marywood University. 22 Mar. 2007. Keyword: Federal Phone Tapping. United States Constitution. Legal Information Institute. 2006. Cornell Law School. 25 Mar. 2007.
Sunday, February 23, 2020
Reflective Paper (BUS 303) Essay Example | Topics and Well Written Essays - 2000 words
Reflective Paper (BUS 303) - Essay Example The work of HRM is therefore, to oversee that employees have the resources and determination to work towards the organizational goals. HRM deals with a wide range of interrelated activities but they are all geared towards creating performance through people. It is important to understand how the various aspects of HRM work together to assist employees in achieving organizational goals, clarify new areas of human resource, and understand future implications of HRM in a specific company (Randhawa, 2007). In the continually changing area of business, through competition, product changes and increased globalization, it is necessary for organizations to realize ways to achieve a competitive edge. According to (Melkonyan, 2013), the human resource (HR) of an organization is crucial in assisting employees grow and develop their skills. Employees are the most important aspect of a business with the potential to enable a business achieve, competitive edge over the others. The HRM is necessary in ensuring that Equal Employment Opportunities (EEO) laws are followed to eliminate discrimination in employment. The HR within the organization has the mandate to ensure that jobs are advertised with required job description and expectations so that people apply for the position. HRM then influences organizational performance by ensuring that qualified, skilled, educated and talented staff members join the company. When employees with the necessary skills are recruited it is evident that the organization gets to enhance its performance in a bid to accomplish the organizational goals and objectives. For instance, Lufthansa Company has a vigorous employee selection process that involves sending a resume, taking an online test, a telephone interview, and then an oral interview. The candidate also has to undergo analytical thinking, vocabulary, arithmetic, and behavior specific tests depending on job position. In this regard, a thorough selection process ensures that an all-round can didate is chosen for the job (Randhawa, 2007). Human Resource Development (HRD) is another important aspect of HRM functions to nurture employees in their various areas of work. This is a strategy that involves offering employeesââ¬â¢ enhanced training and development programs that enhance their level of work. The whole idea is to invest in training and workforce growth to generate beneficial results. For instance, the field of technology is constantly changing and therefore, employee need to be brought up to date with current technological advancements as a way of giving the organization a competitive edge. HRD is a concept that ensures employees get opportunities in areas of training, mentorship, career growth, performance management, succession preparation, coaching, and overall organization development (Youssef, 2012). The HRM also encourages employeesââ¬â¢ performance through effective compensation and rewards programs. For instance, when there are changes to pay and prom otion in the workplace, employees are motivated to enhance their responsibilities to be considered for such incentives. It is important for incentives and compensation to be offered equally and with fairness because discrimination can easily reduce employee morale. The other important aspect of HRM is recognizing efforts among employees and rewarding them for their work. Employees not only require good salary and rewards,
Friday, February 7, 2020
Vocabulary Strategies with ELL Students Essay Example | Topics and Well Written Essays - 1000 words
Vocabulary Strategies with ELL Students - Essay Example Studentsââ¬â¢ usage of first language for learning second language is the best practice for vocabulary learning as students can relate the words with one another. Students should be well equipped with knowledge of basic words as it is essential to excel with prior basic knowledge and for that purpose, transfer of cognate knowledge is required. It can be best implemented by allowing the students of ELL to find similarities and contrasts between their vocabulary of the words of their language and vocabulary of the second language. August, et al. (2005) informs that less efforts are done towards researching the best strategies for ELL students. However, transference of cognate knowledge is effective strategy for learning vocabulary. The second article that is taken for study is ââ¬Å"Effective Instructional Strategies for English Language Learners in Mainstream Classroomsâ⬠by Susan (2004). According to Susan (2004), SIOP that can be abbreviated as Sheltered Instruction Observa tion Protocol is the best model that can be used for teaching students about English vocabulary. Susan (2004) explains that vocabulary plays an important role in language acquisition but lack of vocabulary appears as an obstruction for students of ELL in reading. There should be a vocabulary program setup for the vocabulary improvement of the English language learners. There are various stages that are described by Susan (2004) in the lieu of SIOP model. The whole exercise of planning and developing a program comes under the category of SIOP model. Word choice, allowance to students to use new words and new combinations and asking students to describe and explain words according to their own understanding, all are employed to teach the students of ELL to learn vocabulary. While using the approach of SIOP, the teachers should not use jargons or difficult words to teach students in order to facilitate them to learn in a comprehensible and easy manner.
Wednesday, January 29, 2020
Prince of Wales Essay Example for Free
Prince of Wales Essay With close reference to Shakespeares language discuss how the characters of the Prince of Wales and Hotspur are portrayed in Henry IV Part 1. In Henry IV, Part 1; Shakespeare contrasts the two characters, Prince Henry and Hotspur. The characters are complete opposites but have a common goal. They both want to be respected. Hotspur signals his intentions from the start but it is only as you get further on in the play that you realise that Hal has the same ambitions. This play chronicles the rise and fall of Hotspur and Hals rise from being the innocuous prince to a heroic heir in one play. In Act One, Scene One, the king says: Yea, there thou makst me sin in envy, that my Northumberland should be a father to so blest a son. Since this is said in the very first scene of the play we are immediately given the impression that the kings son is not as respectable or as honourable as Hotspur. We can also see how highly regarded Hotspur is as the king gives him such warm glowing compliments with a touch of jealousy in his voice. He is not contented with his own son as he goes on to say: See riot and dishonour stain the brow of my young Harry. This indicates to the audience that Prince Hal might not be living the life that a prince would be expected to live. We get the feeling that Harry is seen as the black sheep of the family and not the successor to the throne that the king desired. Shakespeare give us this impression by not including Prince Hal in the very important meeting that took place in Act one, scene one. The king even goes as far as suggesting that some night-tripping fairy had exchanged in cradle clothes our children where they lie. This statement backs up the idea that the king is jealous of Hotspur. Shakespeare allows the kings feelings towards Hotspur and Hal to be known to the audience before we even meet the two men later in the play. The kings feelings register unconsciously in the audiences mind and we may then prejudice our opinions of Hal and Hotspur before meeting them. In Scene One, Hotspur is described as being basically the opposite of Prince Hal. We may see this when Westmoreland calls him gallant Hotspur. This statement is proof that people show Hotspur the greatest respect and indicates to us that he is brave and noble. We should note how Shakespeare uses the language to build up Hotspurs character. This lets the audience form an impression of him before they meet him. In Act One, Scene 2, the audiences opinion of Prince Hal becomes increasingly worse as we find out that he keeps company with a man by the name of Sir John Falstaff. Falstaff is fat, lazy, a drunkard and a thief. Is this the type of man that a prince would normally be friends with? The prince, laughing and joking, takes up the first part of the scene. When Fallstaff asks Hal for the time, Hal says: I see no reason why thou shouldst be so superfluous to demand the time of day. We are given the impression that Hal spends a lot of his time messing and having a name calling contest with Falstaff by the relaxed manner by which they give each other abuse. In the midst of the name-calling, we find out that some members of the Council are very angry with Hal because of his behaviour, as Fallstaff says: an old Lord of the Council rated me the other day in the street about you Sir, but I marked him not. This could suggest that Fallstaff has respect for Hal or does not want to lose such an important benefactor.
Monday, January 20, 2020
Gunslinger: Battle Between Good and Evil :: essays research papers
The dilemma between good and evil began long before our time, and itââ¬â¢s been chronicled since man could write. Stephen King, one of the controversial writers of our time, brings his characters to life by giving them peculiar attributes, individual and bold attitudes, and places them in unusual predicaments. The Gunslinger series by Stephen King is a sequence of books that show the internal struggle between good and evil. His character are presented with obstacles, and readers observe how each one responds to the challenges presented to them, waiting to see how far they will go to achieve what they believe is the greater good. King realistically conveys to his readers that although his characters put forth their best efforts to do what they feel is upright, their actions are not always in their best interests. The author clearly shows readers that no amount of good a person does can prevent them from getting hurt. In books one, two, and four King puts his characters through cer tain situations to create certain outcomes. King makes an effort to show readers how people arrive at the right, or wrong choice, in different situations. This is, of course, the classic struggle between good and evil. à à à à à King introduces Roland, the protagonist, in ââ¬Å"Gunslingerâ⬠. Roland is crucial in Kingââ¬â¢s endeavor to present to his readers how people make the choice between good and evil. In ââ¬Å"Gunslingerâ⬠, Roland is presented with an option; he can either save a boyââ¬â¢s life, or he can let the boy plunge to his death and not deviate from his plan. Roland loves the boy, Jake, and is torn between saving him and pursuing his target, the man in black. Roland decides to sacrifice his friendââ¬â¢s life in order to hound the man in black. Rolandââ¬â¢s goal is to reach the Dark Tower, and he feels that he must make sacrifices and forgo the sentimental, in order to achieve his goal. His ultimate goal is what he believes is the greater good, and he will go to any length to reach it. Society has sacrificed of innocence to achieve their definitive purpose, history is proof of this. King simply brings this to light. Roland has love for the boy; however, in not saving his life he saves more lives in the end. Saving Jakeââ¬â¢s life might be in Jakeââ¬â¢s best interest, but in doing so Roland will be affected negatively.
Sunday, January 12, 2020
Qualitative research Essay
Abstract This paper is the first of a series of three articles relating to a case study conducted at Fairfield University to assess aspects of the rapid introduction of Information Technology at the institution. This article deals with the nature of the problem faced by Fairfield University, the characteristics of the case methodology, and lays the foundation for the selection of this research technique for the current study. The paper begins with an Introduction section to familiarize the reader with the case organization. The following section on Case Methodology explores the history, and some of the applications of the technique. The section ends with specific research protocols for researchers. Introduction Fairfield University is a private liberal arts institution of about 3,000 full time undergraduate students and about 1,000 graduate school students. The undergraduate students are distributed through the College of Arts and Sciences, the School of Business, and the School of Nursing. The graduate students are in the Graduate School of Education, the School of Business, and the School of Nursing. There are also part time students in the School of Continuing Education and the BEI School of Engineering. As with many other private institutions of higher education, Fairfield University faces many challenges. These challenges come from the declining population of college age students and the growing cost of running the institution. The literature will support the preceding statement (Crossland, 1980), but provide little comfort to the institution. One of the areas of greatest concern to college managers is the continuing cost of information technology. With the constant need to increase staff salaries, it is like salaries, inadvisable to reduce the outlay on information technology. Interviews that were conducted by this researcher with the deans and managers indicated that some of the peer institutions of Fairfield University are in fact doing as much if not more in this area. Hence any interruption in the effort to maintain technological currency would result in a competitive disadvantage for the institution. Therein lies the administrative financial challenge. The expense on information technology must be maintained at a time of declining revenues (Nicklin, 1992). The field of information technology at a university is very broad and could encompass many technologies hitherto not considered within its purview. However, there has been a relentless and indeed accelerating pace of convergence of the technologies in telecommunications, library services, and video services. The current study is concerned only with the aspects of information technology as it relates to academic computing and will focus on instructional and research computing. The goals of this study include an examination of the (a) managerial and (b) economic aspects of the rapid acquisition of information technology. The objectives deriving from those goals are: An assessment of the categories of computer use in higher education. An evaluation of the managerial issues of computing, including the centralization/decentralization of computing, client/server computing and the aspects of the Internet and the World Wide Web (WWW) Establish a basis for understanding the current and future economic aspects of information technology acquisition. The research questions arising from the above objectives were as follows: Objective 1 above is addressed by the question: ââ¬Å"What patterns of acquisition emerge from the current computing environment and the perceived needs for computing? â⬠Objective 2 is addressed by the question: ââ¬Å"What characteristics of the categories of computing use contribute to the patterns of acquisition? â⬠The five categories developed by King and Kraemer (1985) and adapted for use by Levy (1988) in his study at the University of Arizona, are used in this study, to examine the computing use at Fairfield University. Objective 3 is addressed by the question: ââ¬Å"What managerial issues arise from the rapid acquisition of information technology and how important have those technologies become to the organization? â⬠Objective 4 is addressed by the question: ââ¬Å"How will the institution balance the need for technological changes with the need to continue the accomplishment of routine tasks?. â⬠Samuel Levy (1988) conducted a study of instructional and research computing at the University of Arizona. This study replicates and extends the Levy (1988) study, and was conducted at Fairfield University. The current study extends the Levy (1988) study in its examination of aspects of the Internet, the World Wide Web, and Client/Server computing. Levy (1988) established the use of the case study as appropriate for the research project, and this researcher also used the literature to confirm the use of case methodology in the study at Fairfield University. The history and development of case methodology is reviewed, in support of the current case study at Fairfield University. There have been periods of intense use followed by periods of disuse of this technique, as documented by Hamel, Dufour, and Fortin (1993) as well as others. The relevance of that history to this study is important in that it establishes the known advantages and disadvantages of the methodology. The particular technique of a single-case study is reviewed, since that is the specific implementation of a case study at Fairfield University and was also used by Levy (1988). Case Study Methodology The history of case study research is marked by periods of intense use and periods of disuse. The earliest use of this form of research can be traced to Europe, predominantly to France. The methodology in the United States was most closely associated with The University of Chicago Department of Sociology. From the early 1900ââ¬â¢s until 1935, The Chicago School was preeminent in the field and the source of a great deal of the literature. There was a wealth of material in Chicago, since it was a period of immigration to the United States and various aspects of immigration of different national groups to the city were studied and reported on (Hamel et al. , 1993). Issues of poverty, unemployment, and other conditions deriving from immigration were ideally suited to the case study methodology. Zonabend (1992) stated that case study is done by giving special attention to completeness in observation, reconstruction, and analysis of the cases under study. Case study is done in a way that incorporates the views of the ââ¬Å"actorsâ⬠in the case under study. The field of sociology is associated most strongly with case study research, and during the period leading up to 1935, several problems were raised by researchers in other fields. This coincided with a movement within sociology, to make it more scientific. This meant providing some quantitative measurements to the research design and analysis. Since The Chicago School was most identified with this methodology, there were serious attacks on their primacy. This resulted in the denigration of case study as a methodology. In 1935, there was a public dispute between Columbia University professors, who were championing the scientific method, and The Chicago School and its supporters. The outcome was a victory for Columbia University and the consequent decline in the use of case study as a research methodology. Hamel (Hamel et al. , 1993) was careful to reject the criticisms of case study as poorly founded, made in the midst of methodological conflict. He asserted that the drawbacks of case study were not being attacked, rather the immaturity of sociology as a discipline was being displayed. As the use of quantitative methods advanced, the decline of the case study hastened. However, in the 1960s, researchers were becoming concerned about the limitations of quantitative methods. Hence there was a renewed interest in case study. Strauss and Glaser (1967) developed the concept of ââ¬Å"grounded theory. â⬠This along with some well regarded studies accelerated the renewed use of the methodology. A frequent criticism of case study methodology is that its dependence on a single case renders it incapable of providing a generalizing conclusion. Yin (1993) presented Giddensââ¬â¢ view that considered case methodology ââ¬Å"microscopicâ⬠because it ââ¬Å"lacked a sufficient numberâ⬠of cases. Hamel (Hamel et al. , 1993) and Yin (1984, 1989a, 1989b, 1993, 1994) forcefully argued that the relative size of the sample whether 2, 10, or 100 cases are used, does not transform a multiple case into a macroscopic study. The goal of the study should establish the parameters, and then should be applied to all research. In this way, even a single case could be considered acceptable, provided it met the established objective. The literature provides some insight into the acceptance of an experimental prototype to perceive the singularity of the object of study. This ensures the transformation from the local to the global for explanation. Hamel (Hamel et al. , 1993) characterized such singularity as a concentration of the global in the local. Yin (1989a) stated that general applicability results from the set of methodological qualities of the case, and the rigor with which the case is constructed. He detailed the procedures that would satisfy the required methodological rigor. Case study can be seen to satisfy the three tenets of the qualitative method: describing, understanding, and explaining. The literature contains numerous examples of applications of the case study methodology. The earliest and most natural examples are to be found in the fields of Law and Medicine, where ââ¬Å"casesâ⬠make up the large body of the student work. However, there are some areas that have used case study techniques extensively, particularly in government and in evaluative situations. The government studies were carried out to determine whether particular programs were efficient or if the goals of a particular program were being met. The evaluative applications were carried out to assess the effectiveness of educational initiatives. In both types of investigations, merely quantitative techniques tended to obscure some of the important information that the researchers needed to uncover. The body of literature in case study research is ââ¬Å"primitive and limitedâ⬠(Yin, 1994), in comparison to that of experimental or quasi-experimental research. The requirements and inflexibility of the latter forms of research make case studies the only viable alternative in some instances. It is a fact that case studies do not need to have a minimum number of cases, or to randomly ââ¬Å"selectâ⬠cases. The researcher is called upon to work with the situation that presents itself in each case. Case studies can be single or multiple-case designs, where a multiple design must follow a replication rather than sampling logic. When no other cases are available for replication, the researcher is limited to single-case designs. Yin (1994) pointed out that generalization of results, from either single or multiple designs, is made to theory and not to populations. Multiple cases strengthen the results by replicating the pattern-matching, thus increasing confidence in the robustness of the theory. Applications of case study methodology have been carried out in High-Risk Youth Programs (Yin, 1993) by several researchers. The effects of community-based prevention programs have been widely investigated using case methodology. Where the high risk youth studies assumed a single case evaluation, these studies have typically used a collection of cases as a multiple-case study. This has been true in the various substance abuse prevention programs that are community-based (Holder, 1987; Sabol, 1990; Yin, 1993). Numerous such studies sponsored by the U. S. General Accounting Office are distributed in the literature between Evans (1976) and Gopelrud (1990). These studies have gone beyond the quantitative statistical results and explained the conditions through the perspective of the ââ¬Å"actors. â⬠Thus case study evaluations can cover both process and outcomes, because they can include both quantitative and qualitative data. There are several examples of the use of case methodology in the literature. Yin (1993) listed several examples along with the appropriate research design in each case. There were suggestions for a general approach to designing case studies, and also recommendations for exploratory, explanatory, and descriptive case studies. Each of those three approaches can be either single or multiple-case studies, where multiple-case studies are replicatory, not sampled cases. There were also specific examples in education, and management information systems. Education has embraced the case method for instructional use. Some of the applications are reviewed in this paper. In exploratory case studies, fieldwork, and data collection may be undertaken prior to definition of the research questions and hypotheses. This type of study has been considered as a prelude to some social research. However, the framework of the study must be created ahead of time. Pilot projects are very useful in determining the final protocols that will be used. Survey questions may be dropped or added based on the outcome of the pilot study. Selecting cases is a difficult process, but the literature provides guidance in this area (Yin, 1989a). Stake (1995) recommended that the selection offers the opportunity to maximize what can be learned, knowing that time is limited. Hence the cases that are selected should be easy and willing subjects. A good instrumental case does not have to defend its typicality. Explanatory cases are suitable for doing causal studies. In very complex and multivariate cases, the analysis can make use of pattern-matching techniques. Yin and Moore (1988) conducted a study to examine the reason why some research findings get into practical use. They used a funded research project as the unit of analysis, where the topic was constant but the project varied. The utilization outcomes were explained by three rival theories: a knowledge-driven theory, a problem-solving theory, and a social-interaction theory. Knowledge-driven theory means that ideas and discoveries from basic research eventually become commercial products. Problem-solving theory follows the same path, but originates not with a researcher, but with an external source identifying a problem. The social-interaction theory claims that researchers and users belong to overlapping professional networks and are in frequent communication. Descriptive cases require that the investigator begin with a descriptive theory, or face the possibility that problems will occur during the project. Pyecha (1988) used this methodology to study special education, using a pattern-matching procedure. Several states were studied and the data about each stateââ¬â¢s activities were compared to another, with idealized theoretic patterns. Thus what is implied in this type of study is the formation of hypotheses of cause-effect relationships. Hence the descriptive theory must cover the depth and scope of the case under study. The selection of cases and the unit of analysis is developed in the same manner as the other types of case studies. Case studies have been increasingly used in education. While law and medical schools have been using the technique for an extended period, the technique is being applied in a variety of instructional situations. Schools of business have been most aggressive in the implementation of case based learning, or ââ¬Å"active learningâ⬠(Boisjoly & DeMichiell, 1994). Harvard University has been a leader in this area, and cases developed by the faculty have been published for use by other institutions. The School of Business at Fairfield University has revised the curriculum so that in place of the individual longitudinal courses in the areas of Management, Marketing, Operations, Finance, and Information Systems, students take one course. That course is designed around cases that encompass those disciplines, but are presented in an integrated manner. The students are therefore made aware of the interrelatedness of the various disciplines and begin to think in terms of wider problems and solutions. Later courses add the international dimension to the overall picture. Case studies have been used to develop critical thinking (Alvarez, et al. , 1990). There are also interactive language courses (Carney, 1995), courses designed to broaden the studentsââ¬â¢ horizons (Brearley, 1990), and even for technical courses (Greenwald, 1991), and philosophical ones (Garvin, 1991). This investigation is a case study of the aspects of Information Technology that are related to client/server computing, the Internet, and the World Wide Web, at Fairfield University. Thus this paper examines issues that will expand the readerââ¬â¢s knowledge of case study methodology as it relates to the design and execution of such a study. Yin (1994) recommended the use of case-study protocol as part of a carefully designed research project that would include the following sections: Overview of the project (project objectives and case study issues) Field procedures (credentials and access to sites) Questions (specific questions that the investigator must keep in mind during data collection) Guide for the report (outline, format for the narrative) (Yin, 1994, p.64) The quintessential characteristic of case studies is that they strive towards a holistic understanding of cultural systems of action (Feagin, Orum, & Sjoberg, 1990). Cultural systems of action refer to sets of interrelated activities engaged in by the actors in a social situation. The case studies must always have boundaries (Stake, 1995). Case study research is not sampling research, which is a fact asserted by all the major researchers in the field, including Yin, Stake, Feagin and others. However, selecting cases must be done so as to maximize what can be learned, in the period of time available for the study. The unit of analysis is a critical factor in the case study. It is typically a system of action rather than an individual or group of individuals. Case studies tend to be selective, focusing on one or two issues that are fundamental to understanding the system being examined. Case studies are multi-perspectival analyses. This means that the researcher considers not just the voice and perspective of the actors, but also of the relevant groups of actors and the interaction between them. This one aspect is a salient point in the characteristic that case studies possess. They give a voice to the powerless and voiceless. When sociological studies present many studies of the homeless and powerless, they do so from the viewpoint of the ââ¬Å"eliteâ⬠(Feagin, Orum, & Sjoberg, 1991). Case study is known as a triangulated research strategy. Snow and Anderson (cited in Feagin, Orum, & Sjoberg, 1991) asserted that triangulation can occur with data, investigators, theories, and even methodologies. Stake (1995) stated that the protocols that are used to ensure accuracy and alternative explanations are called triangulation. The need for triangulation arises from the ethical need to confirm the validity of the processes. In case studies, this could be done by using multiple sources of data (Yin, 1984). The problem in case studies is to establish meaning rather than location. Designing Case Studies Yin (1994) identified five components of research design that are important for case studies: A studyââ¬â¢s questions Its propositions, if any Its unit(s) of analysis The logic linking the data to the propositions The criteria for interpreting the findings (Yin, 1994, p. 20). The studyââ¬â¢s questions are most likely to be ââ¬Å"howâ⬠and ââ¬Å"whyâ⬠questions, and their definition is the first task of the researcher. The studyââ¬â¢s propositions sometimes derive from the ââ¬Å"howâ⬠and ââ¬Å"whyâ⬠questions, and are helpful in focusing the studyââ¬â¢s goals. Not all studies need to have propositions. An exploratory study, rather than having propositions, would have a stated purpose or criteria on which the success will be judged. The unit of analysis defines what the case is. This could be groups, organizations or countries, but it is the primary unit of analysis. Linking the data to propositions and the criteria for interpreting the findings are the least developed aspects in case studies (Yin, 1994). Campbell (1975) described ââ¬Å"pattern-matchingâ⬠as a useful technique for linking data to the propositions. Campbell (1975) asserted that pattern-matching is a situation where several pieces of information from the same case may be related to some theoretical proposition. His study showed, through pattern-matching, that the observed drop in the level of traffic fatalities in Connecticut was not related to the lowering of the speed limit. His study also illustrated some of the difficulties in establishing the criteria for interpreting the findings. Construct validity is especially problematic in case study research. It has been a source of criticism because of potential investigator subjectivity. Yin (1994) proposed three remedies to counteract this: using multiple sources of evidence, establishing a chain of evidence, and having a draft case study report reviewed by key informants. Internal validity is a concern only in causal (explanatory) cases. This is usually a problem of ââ¬Å"inferencesâ⬠in case studies, and can be dealt with using pattern-matching, which has been described above. External validity deals with knowing whether the results are generalizable beyond the immediate case. Some of the criticism against case studies in this area relate to single-case studies. However, that criticism is directed at the statistical and not the analytical generalization that is the basis of case studies. Reliability is achieved in many ways in a case study. One of the most important methods is the development of the case study protocol. Case studies can be either single or multiple-case designs. Single cases are used to confirm or challenge a theory, or to represent a unique or extreme case (Yin, 1994). Single-case studies are also ideal for revelatory cases where an observer may have access to a phenomenon that was previously inaccessible. Single-case designs require careful investigation to avoid misrepresentation and to maximize the investigatorââ¬â¢s access to the evidence. These studies can be holistic or embedded, the latter occurring when the same case study involves more than one unit of analysis. Multiple-case studies follow a replication logic. This is not to be confused with sampling logic where a selection is made out of a population, for inclusion in the study. This type of sample selection is improper in a case study. Each individual case study consists of a ââ¬Å"wholeâ⬠study, in which facts are gathered from various sources and conclusions drawn on those facts. Yin (1994) asserted that a case study investigator must be able to operate as a senior investigator during the course of data collection. There should be a period of training which begins with the examination of the definition of the problem and the development of the case study design. If there is only a single investigator, this might not be necessary. The training would cover aspects that the investigator needs to know, such as: the reason for the study, the type of evidence being sought, and what variations might be expected. This could take the form of discussion rather than formal lectures. A case study protocol contains more than the survey instrument, it should also contain procedures and general rules that should be followed in using the instrument. It is to be created prior to the data collection phase. It is essential in a multiple-case study, and desirable in a single-case study. Yin (1994) presented the protocol as a major component in asserting the reliability of the case study research. A typical protocol should have the following sections: An overview of the case study project (objectives, issues, topics being investigated) Field procedures (credentials and access to sites, sources of information) Case study questions (specific questions that the investigator must keep in mind during data collection) A guide for case study report (outline, format for the narrative) (Yin, 1994, p. 64). The overview should communicate to the reader the general topic of inquiry and the purpose of the case study. The field procedures mostly involve data collection issues and must be properly designed. The investigator does not control the data collection environment (Yin, 1994) as in other research strategies; hence the procedures become all the more important. During interviews, which by nature are open ended, the subjectââ¬â¢s schedule must dictate the activity (Stake, 1995). Gaining access to the subject organization, having sufficient resources while in the field, clearly scheduling data collection activities, and providing for unanticipated events, must all be planned for. Case study questions are posed to the investigator, and must serve to remind that person of the data to be collected and its possible sources. The guide for the case study report is often neglected, but case studies do not have the uniform outline, as do other research reports. It is essential to plan this report as the case develops, to avoid problems at the end. Stake (1995), and Yin (1994) identified at least six sources of evidence in case studies. The following is not an ordered list, but reflects the research of both Yin (1994) and Stake (1995): Documents Archival records Interviews Direct observation Participant-observation Physical artifacts Documents could be letters, memoranda, agendas, administrative documents, newspaper articles, or any document that is germane to the investigation. In the interest of triangulation of evidence, the documents serve to corroborate the evidence from other sources. Documents are also useful for making inferences about events. Documents can lead to false leads, in the hands of inexperienced researchers, which has been a criticism of case study research. Documents are communications between parties in the study, the researcher being a vicarious observer; keeping this in mind will help the investigator avoid being misled by such documents. Archival documents can be service records, organizational records, lists of names, survey data, and other such records. The investigator has to be careful in evaluating the accuracy of the records before using them. Even if the records are quantitative, they might still not be accurate. Interviews are one of the most important sources of case study information. There are several forms of interviews that are possible: Open-ended, Focused, and Structured or survey. In an open-ended interview, key respondents are asked to comment about certain events. They may propose solutions or provide insight into events. They may also corroborate evidence obtained from other sources. The researcher must avoid becoming dependent on a single informant, and seek the same data from other sources to verify its authenticity. The focused interview is used in a situation where the respondent is interviewed for a short period of time, usually answering set questions. This technique is often used to confirm data collected from another source. The structured interview is similar to a survey, and is used to gather data in cases such as neighborhood studies. The questions are detailed and developed in advance, much as they are in a survey. Direct observation occurs when a field visit is conducted during the case study. It could be as simple as casual data collection activities, or formal protocols to measure and record behaviors. This technique is useful for providing additional information about the topic being studied. The reliability is enhanced when more than one observer is involved in the task. Glesne and Peshkin (1992) recommended that researchers should be as unobtrusive as the wallpaper. Participant-observation makes the researcher into an active participant in the events being studied. This often occurs in studies of neighborhoods or groups. The technique provides some unusual opportunities for collecting data, but could face some major problems as well. The researcher could well alter the course of events as part of the group, which may not be helpful to the study. Physical artifacts can be tools, instruments, or some other physical evidence that may be collected during the study as part of a field visit. The perspective of the researcher can be broadened as a result of the discovery. It is important to keep in mind that not all sources are relevant for all case studies (Yin, 1994). The investigator should be capable of dealing with all of them, should it be necessary, but each case will present different opportunities for data collection. There are some conditions that arise when a case researcher must start data collection before the study questions have been defined and finalized (Yin, 1994). This is likely to be successful only with an experienced investigator. Another important point to review is the benefit of using rival hypotheses and theories as a means of adding quality control to the case study. This improves the perception of the fairness and serious thinking of the researcher. Analyzing Case Study Evidence This aspect of the case study methodology is the least developed and hence the most difficult. As a result, some researchers have suggested that if the study were made conducive to statistical analysis, the process would be easier and more acceptable. This quantitative approach would be appealing to some of the critics of the case study methodology. However not all case studies lend themselves to this type of analysis. Miles and Huberman (1984) suggested analytic techniques such as rearranging the arrays, placing the evidence in a matrix of categories, creating flowcharts or data displays, tabulating the frequency of different events, using means, variances and cross tabulations to examine the relationships between variables, and other such techniques to facilitate analysis. There must first be an analytic strategy, that will lead to conclusions. Yin (1994) presented two strategies for general use: One is to rely on theoretical propositions of the study, and then to analyze the evidence based on those propositions. The other technique is to develop a case description, which would be a framework for organizing the case study. Lynd conducted a widely cited ââ¬Å"Middletownâ⬠study in 1929, and used a formal chapter construct to guide the development of the analysis. In other situations, the original objective of the case study may help to identify some causal links that could be analyzed. Pattern-matching is another major mode of analysis. This type of logic compares an empirical pattern with a predicted one. Internal validity is enhanced when the patterns coincide. If the case study is an explanatory one, the patterns may be related to the dependent or independent variables. If it is a descriptive study, the predicted pattern must be defined prior to data collection. Yin (1994) recommended using rival explanations as pattern-matching when there are independent variables involved. This requires the development of rival theoretical propositions, but the overall concern remains the degree to which a pattern matches the predicted one. Yin (1994) encouraged researchers to make every effort to produce an analysis of the highest quality. In order to accomplish this, he presented four principles that should attract the researcherââ¬â¢s attention: Show that the analysis relied on all the relevant evidence Include all major rival interpretations in the analysis Address the most significant aspect of the case study Use the researcherââ¬â¢s prior, expert knowledge to further the analysis Stake (1995) recommended categorical aggregation as another means of analysis and also suggested developing protocols for this phase of the case study to enhance the quality of the research. He also presented ideas on pattern-matching along the lines that Yin (1994) presented. Runkel (1990) used aggregated measures to obtain relative frequencies in a multiple-case study. Stake (1995) favored coding the data and identifying the issues more clearly at the analysis stage. Eisner and Peshkin (1990) placed a high priority on direct interpretation of events, and lower on interpretation of measurement data, which is another viable alternative to be considered.
Subscribe to:
Posts (Atom)