Saturday, December 28, 2019
The Theory Of Operant Conditioning - 1489 Words
Operant Conditioning Operant conditioning is a form of learning where people or animals change their behavior because of the reinforcement given after a desired response. A good example of operant conditioning is, a teacher giving five percent of the marks to students, who have good attendance. The theory is useful in teaching programmed instructions, where the information is given in small bits to reinforce the responses (Litow Pumroy, 1975). Additionally, the theory can help in shaping studentsââ¬â¢ performance, skills and management. B.F Skinner, who was a behavioral psychologist, is considered as the father of the operant conditioning theory. Although, the founder of the theory was Edward Thorndiken (Blumberg Wasserman, 1995).â⬠¦show more contentâ⬠¦To show how positive reinforcement works, Skinner placed a hungry rat inside the box. The Skinnerââ¬â¢s box had a lever on one side, and as the animal moved around, it would knock the lever accidentally. A food pellet dropped immediately in the container that was next to the lever. In a very short time, the rat learned to go directly to the lever each time it was put into the box (Litow Pumroy, 1975). The result of receiving food after pressing the lever, strengthened the repetition of the action again and again (Operant Conditioning | Introductory Psychology, 2017). The positive reinforcement strengthens a behavior given that the consequence is rewarding. For instance, every time a child completes an assignment on time, the parent gives a gift reward. Th ere is a high possibility that the child will repeat the behavior afterwards therefore reinforcing the completion of assignments in time. In the negative reinforcement, B.F Skinner tried to show that a behavior could also be strengthened by removing an unpleasant behavior. The unpleasant stimuliââ¬â¢s removal is rewarding to an individual or an animal. The theorist placed a rat in the box, forcing it to an electric shock that caused discomfort to it. As it paced around the box and accidentally hit the lever inside, the shock would be cut off. After a few times, the rat learned to go direct to the lever to avoid the electric current. The action was repeated by the animal since the consequence was escaping theShow MoreRelatedThe Theory Of Operant Conditioning869 Words à |à 4 Pagesthree and a half-year old Gertrude to whom I will apply the theory of operant conditioning to get her to meet a scheduled bed time. Her Mother is facing a steep learning curve with respect to; second language, new cultural, a newborn with a serious disease and isolated from her family (UK and Congo). It is of the utmost importance that we have Gertrudeââ¬â¢s behaviour changed to ease the transition to Canada. Discussion Operant conditioning is happening in our everyday lives, it can be found at workRead MoreTheory of Operant Conditioning933 Words à |à 4 PagesTheory of Operant Conditioning Instrumental conditioning, otherwise known as operant conditioning is a theory that B.F Skinner came up with and is defined as a learning process by which the consequence of an operant response affects the likelihood of the response recurring in the future. Basically, operant conditioning is a stimulus response prototype that when reinforced, conditions individuals or organisms response to a desired behavior (Huitt, W., Hummel, J., 1997) Our behaviors are shapedRead MoreThe Theory of Operant Conditioning1136 Words à |à 5 Pages The Theory of Operant Conditioning PSY390 October 6, 2014 Introduction The study of human behavior by psychologists such as B.F. Skinner, Edward Thorndike, Ivan Pavlov, and Watson is fascinating. These five psychologists each have different theories on human behavior. There are similarities and differences in each of the theories. Ivan Pavlovââ¬â¢s classical conditioning theory, studied animals and formed the basis for behavioral psychology (Cherry, 2013). Edward Thorndikeââ¬â¢s theory of connectionismRead MoreThe Theory Of Operant Conditioning989 Words à |à 4 PagesOperant Conditioning: Procrastination The principals of operant conditioning, teaches how having certain coping techniques can reward certain undesirable behaviors. Conditioning human behavior has been studied for many years, Psychologists Edward Thorndike and B.F. Skinner, have dedicated majority of their lives to the study. Thorndikeââ¬â¢s theory Law of effect. Thorndike suggest that certain stimuli and response become connected or dissociated from each other. His experiment worked by placing a catRead MoreThe Theory Of Operant Conditioning1792 Words à |à 8 PagesIn the textbook operant conditioning can be defined as ââ¬Å"the control of behavior through manipulation of rewards and punishments in the environment, particularly the laboratory environmentâ⬠(Cervone Pervin, 2013). B.F. skinner who created the operant conditioning procedure believed that all humans are controlled by the environments that they experience and that by changing the environment it is possible to reinforce a behavior that benefits e veryone (Cervone Pervin, 2013). Skinner also believedRead MoreThe Theory Of Operant Conditioning1934 Words à |à 8 Pagesat the theory of Operant Conditioning and all the many aspects that go along with it. This theory of Operant Conditioning by B. F. Skinner is a great guideline that can be used in the classroom. Operant Conditioning is definitely a theory that can change the way a classroom is ran. Throughout this paper we will see what behaviorism is and what operant conditioning is as a whole, along with the educational implications of this theory. Biographical Background of (Theorist) The theory of Operant ConditioningRead MoreThe Theory Of Operant Conditioning1212 Words à |à 5 PagesOperant conditioning (sometimes referred to as instrumental conditioning) is a method of learning that occurs through rewards and punishments for behavior. Through operant conditioning, an association is made between a behavior and a consequence for that behavior. For example, when a lab rat presses a blue button, he receives a food pellet as a reward, but when he presses the red button he receives a mild electric shock. As a result, he learns to press the blue button but avoid the red button. TheRead MoreThe Theory Of Operant Conditioning Theory Essay746 Words à |à 3 Pagescame up with the idea of what is known as operant conditioning (Rholetter, 2013). Operant conditioning is one of two theories in learning that illustrates behaviorism (Kretchmar, 2015). It is according to Rholetter (2013), ââ¬Å"the idea that behavior is the learned result of consequencesâ⬠. Skinner believed that learning during operant conditioning is done based upon the outcome of a given situation (Lefrancois, 2012, p. 91). His operant conditioning theory is constructed on reinforcements consistingRead MoreBehaviorism And The Operant Conditioning Theory Essay1415 Words à |à 6 Pagesalso. Learning theories are conceptualized frameworks which describe how individuals absorb, process and retain information. Behaviorists such as John B. Watson, B.F. Skinner, Edward L. Thorndike, Ivan Pavlov and Edwin R. Guthrie believed that all learners were passive in nature and only responded to extern al stimuli. Behaviorism, as explored by the before mentioned, is a biological basis of learning and focuses exclusively on observable behaviors. This includes Thorndikeââ¬â¢s theory of connectionismRead MoreThe Theory Of Behaviorism And Operant Conditioning895 Words à |à 4 Pages B.F Skinner Renowned American psychologist B.F. Skinner, well known for his theory on behaviorism and operant conditioning. He was the most influential 20th - century psychologist. His works includes ââ¬Å"The Behavior of Organismsâ⬠(1938) which was about the results in his experiment with operant conditioning, and a novel based on his theories ââ¬Å"Waldenâ⬠(1948). He was not only a psychologist he was a behaviorist, teacher, author, inventor, and a social philosopher as well. Born as Burrhus Frederic
Friday, December 20, 2019
System Integrity and Validation - Kudler Fine Foods
Individual Assignment: System Integrity and Validation - Kudler Fine Foods Over the past few weeks our team has looked into a number of aspects of Kudler Fine Foods and made recommendations as necessary in hopes of updating and replacing existing components of the companies IT systems in hopes of making the company more productive and profitable. Last week out team focused on the importance of audits and at a number of different types of audits that should be conducted to future evaluate the company as a whole. From our research we found that the most appropriate audits to employ are the SAS 94 and the Attestation audits (in particular, the data analytic review) (Cornwall, Sullivan, amp; Chandler, 2012). These types of audit systemsâ⬠¦show more contentâ⬠¦Since the scope of CAATs can change vastly depending on the project at hand. The company in charge of the design would have the task of determining the best way to utilize the CAAT so that it is proving the company with the best possible outcome. With that said CAATs have the capability of doing a n umber of things. Below is a list of possible ways that the productivity software can be used in the system design. Import clientââ¬â¢s raw data from legacy systems; * Automatically generate working papers and their references (i.e., lead and detail schedules); * Export to Excel amp; other file formats to facilitate sharing of information with the client amp; others; * Drill down and see underlying transactions from financial statements; * Enter adjusting journal entries; * Break down accounts into subcomponents; * Create consolidated financial statements; * Map accounts from lead and detail schedules to the clientââ¬â¢s general ledger accounts; * Populate report templates and risk assessments from findings sheets; * Calculate predefined ratios and other performance measures such as the Balanced Score Card; * Compare versions of a document and highlight differences or changes; * Generate risk analysis and business cycle analysis; * Conduct file interrogation; * Share files among other members of the audit engagementShow MoreRelatedEssay about System Integrity and Validation1055 Words à |à 5 Pageshead: System Integrity and Validation System Integrity and Validation Aaron Stewart University of Phoenix Accounting Information Systems ACC/542 MBAY0ZDVQ0 Yasin Dadabhoy September 19, 2011 Preface Kudler Finer Foods has a very strong accounting information system in place but there is room for improvement. Kudlerââ¬â¢s has taken the steps in the correct direction by implementing an industry specific system. ComputerRead MoreSystem Integrity and Validation1262 Words à |à 6 PagesSystem Integrity and Validation ACC 542 System Integrity and Validation In the past months, Jarowito Company has analyzed carefully Kudler Fine Foods accounting information system. It has explored the key business and the accounting information needed. It has analyzed strength and weaknesses of the systems and technology, suggesting some technology opportunities. It has evaluated the possible threats, suggesting how to avoid them.Read MoreSystem Integrity and Validation1083 Words à |à 5 Pages System Integrity and Validation ACC/542 March, 2 2014 Prof: Edgar Coronel Preface Kudler Fine Food is a specialty food store that caters their service to a variety of special clients. Providing great service has been a calling card for Kudler Fine Food. Since their first store was open back in 1998, they have enjoyed great success. This has also allowed them to open a few more locations. Having the ability to have a strong accounting information system and greatRead MoreSystem Integrity And Validation Of A Fine Foods1168 Words à |à 5 Pages System Integrity and Validation Christopher Gaten ACC/542 Anita Rodriguez January 25, 2016 Over the last several weeks, there have been several recommendations made to update and replace the current software of Kudler Fine Foods IT audit systems. These recommendations have been made in hopes of making the company more efficient and profitable. According to most recent research, there are several audit systems that seem to best suit all audit functions of Kudler Fine Foods. Having saidRead MoreSystem Integrity and Validation1007 Words à |à 5 Pagesprocesses, of Kudler Fine Foods, encouragement of ways to improve audit documentation and process, by using computer technology was addressed to Kudlerââ¬â¢s management team. As a result, Kudler Fine Foods management team is considering incorporating proposed computer assisted auditing techniques (CAATs) within its systems. CAATs will increase efficiency levels of an auditorââ¬â¢s personal productivity during analysis and data extraction of the audit which is beneficial to the performance of Kudler. CAAT willRead More System Integrity and Validation1049 Words à |à 5 PagesPreface Kudler Fine Foods located in San Diego, California is a specialty food store that is continuing to grow. Due to the companyââ¬â¢s growth, it is necessary for Kudler to make a better use of technology for all aspects of the business. Currently Kudler process a large amount of data through computer programs which is used between all three locations, but with upcoming expansions, Kudler needs the ability to track all of that information and also be confident that the information is reliable.Read MoreKudler - Information System Audit2543 Words à |à 11 PagesKudler Fine Foods - Information System Audit Information technology (IT) has become increasingly sophisticated and complex, escalating the ongoing change within Kudler Fine Foods. As IT information is adopted within the organization, automation controls many processes within the Kudlerââ¬â¢s environment. As Kudler has become more virtualized, a need for increased trust and assurance in the relationships with consumers, partners and suppliers. The swell of e-commerce business has created new ways ofRead MoreProtecting Customer Data Is Important For Integrity And Reputation Of Any Firm1474 Words à |à 6 PagesProtecting customer data is highly important for the integrity and reputation of any firm. Without securing customer information, a firm is destined to fail and possibly face harsh legal penalties in the process. Therefore, it is of utmost importance to the organization as well as the customers to identify and practice ways to keep it safe from internal and external threats. To do this, it is imperative to have stron g security architecture with sound policies in place and do business online safelyRead MoreKudler Security Report8340 Words à |à 34 PagesKudler Fine Foods IT Security Report and Presentation Security Considerations CMGT/400 Kudler Fine Foods IT Security Report and Presentation Security Considerations According to Whitman and Mattordà (2010),à The ISO 27000 series is one of the most widely referenced security models. Referencing ISO/IEC 27002 (17799:2005), the major process steps include: risk assessment and treatment, security policy, organization of information security, asset management, human resources security, physical
Thursday, December 12, 2019
Indexing and Query
Question: Write an essay on Efficient Indexing and Query Processing of Model-View Sensor Data in the Cloud ? Answer: Introduction: Advanced technologies are currently being used in widely in various transportation systems, solely depending upon the research interests. The sensor data management systems are built by a large number of sensors: the sensors being dependent upon the time and value available from the traditional systems. It is well known fact that the utilization of traditional system leads to a number of problems including the difficulties in the transportation of data across different platforms, thus, the utilization of modern sensor networks are encouraged by the domain experts (Kang 2013). The research subject presented in this paper has been conducted to analyze the factors on how sensor data management system and the techniques and models are being used in the structural explanation of the use of Model-View Sensor Data. This research has focused light upon the structural explanation and critical analysis by observing, gathering data, comparing previous research works to show efficiency in the fu rther period. Research Question: Through this research work, we intend to find answers to the following sets of questions: 1. How can the sensor data management systems increase the value offered by the information system to provide services to the consumers? 2. What are the techniques are being used to for the management of sensor data? Research Objective This research work is being conducted so as to meet the following objectives: 1. To conduct the detailed review of existing literary works base on the utilization of cloud based query processing and indexing of data generated by Model-View Sensors. 2. To conduct a detailed study on the various technologies that are used for the management of data collected from sensor networks. Literature review In the case of the project under consideration, time series management had been an important research problem. The researchers have provided a detailed discussion on two models that are currently being used for the management of data generated by Model View Sensor networks. In the following section of the report, has been provided on the models that have been identified by the researcher. Model View Sensor Data Management: According to Guo et al. (2014), model view sensor data management models are focused on some specific techniques for processing data queries- sensor time series segmentation. Yu and Korkmaz (2015), on the other hand, are of the opinion that Model View Sensor Data Management systems utilize a type of algorithm that fragment time series into disjoint segments and satisfy a series of mathematical functions or models for the storage of key values. HBase cluster, which is essentially a table region, stores a sequential range dividing of the row key space (Sathe et al. 2013). According to Yu, Sen and Jeong (2013) interval index in HBase depends on the key value store, the time of interval, the value range and model formula that can fulfill one data segment. Such different possibilities occur while organizing row key and columns for storing and querying data. Yu and Korkmaz (2015) invented time value and interval or model through the utilization of sensor data. Rows can be found out on the row key in the row value store where time range or point queries know the point to stop and need to start the scanning from the beginning of the table each time (Guo et al. 2015). Pleisch and Birman (2008) informed that the same thing happens in the case of value intervals as in the case of row keys stands, where the value ranges or the row keys are used to sort the boundaries of the sensor data. According to Pleisch and Birman (2008), while using the model of sensor data, four types of fundamental options are used for the purpose of querying: these include Time Point Query, Value Point Query, Time Range Query, Values Range Query. Model of KVI-index (Key Value Interval Index ): According to Keogh et al. (2001), KVI index consists of specific value range and time for the indexing purpose, in contrast to the process of indexing the mathematical functions of the time segments. KVI index is structured with a model index table and in-memory. The in-memory structure consists of a searching tree that operates virtually and is known as the vs-tree. It is a standardized binary search tree and a model index table is used to hold the key value store (Wang et al. 2013). The key value store generally is designed to be materialized with the secondary structures present in the nodes of the vs-tree (Rushinek and Rushinek 2015). Comparing the Querying View Model: Four basic standardized approaches have been reported that can be used for querying the data generated by the model view sensor. These approaches include MapReduce (MR), Interval Tree(IT), MapReduce+KVI (MRK) and Filter of Key Value Sore (FKV). These approaches depend upon the range query and point query. Analytical view of KVI-MapReduce (MR): MapReduce is based on a model that filters and grids with the effect of searching, finds depth as a means of the ratio of registered mode searching depth over the height of vs-tree in isearch+ (Guo et al. 2014). Rushinek and Rushinek (2015) have proposed a model named the Innovative Interval Index. This model has been proposed for Model View Sensor data management in a key-value stores referring as in the case of KVI- index (Acharya and Mark 2013). This composite index frame can interestingly accommodate the new sensor data segment in an effective manner. Cayirci et al. (2006) have, after inventing the KVI-index memory structure, introduced a new query processing approach known as the Hybrid model view query processing technique (Janowicz et al. 2013). This particular technique helps to integrate the range that can scan and process the segments accordingly. An algorithm (isearch+) search has been generated by Pleisch and Birman (2008) that gives consecutive results by intersection search. Yu and Korkmaz (2015) have introduced a framework that has been fully executed. The framework includes the online sensor data segmentation, KVI-indexing, hybrid data processing and modeling. Besides this, it has been compared with a large number of alternative techniques that are available and has been found to be of comparable efficiency. Research Process and Outcomes The entire research work that has been in this paper has been conducted by reviewing existing literary works and research articles that are based on the said research topic. The various models that have been proposed in the cited literary works have been studied diligently, and the information available from these data source has been analyzed. Through the above mentioned process we have been able to identify the following processes that can be used effectively for the management of data collected through sensor networks: 1. Key Value Interval Indexing 2. Querying View Model The utilities of these models have been provided in section 4 of this paper. Analyzing the data available from the cited literary articles and research papers has been helpful in reaching the conclusion that the efficiency of both the models are comparable when it comes to the management of data acquired through modern sensor networks. Conclusion In this project, the researcher has evaluated the key-value representation of an interval index for model view based sensor data management. It is different from the traditional external memory index framework in terms of complex mode merging and dual mechanism. The KVI index relies on two factors: the memory used to store the data and the materialized key value store. It helps to maintain the dynamic structure of sensor data generation in an easy manner. However, it has been analyzed that a Hybrid Query Processing approach named as KVI MapReduce. It contains KVI-index within a key value store. This research study has done extensive experiments on a raw database. The approach out-performs the former approach in terms of time and indexing efficiency. Limitation and constraints The entire research work has been based on data collected from exiting literary works: the authenticity of the secondary data being questionable. Therefore, specification of information is the major limitation in this study. Besides this, the entire research work was highly constrained in terms of the time and financial resources. The less tightly scheduled research work would have been more effective in collecting authentic information and arriving at effective conclusions. Apart from that, in terms of maintaining ethical rules and regulations, analysts have to avoid some criteria that is also a potential limitations for this study work. Future Research The research works reported in the reviewed literature have been of much help to the researcher in terms of comparing the efficiencies of the techniques used for the management of data collected through modern sensor networks. In the future, the research works can be conducted with the aim of developing a hybrid of the reported techniques. The objective of such research work being the development of a system with increased efficiency in terms of processing time and value retrieval by effective querying on the KVI-index. Since the absence of literary work on such topics indicates the lack of research works being conducted in this direction, it is expected that future works in this particular domain would facilitate the development of sensor data management system of higher efficiency. References Acharya, R. and Mark, D., 2014. Metadata Model, Resource Discovery, and Querying on large-scale Multidimensional Datasets. Guo, T., Papaioannou, T. and Aberer, K. 2014. Efficient Indexing and Query Processing of Model-View Sensor Data in the Cloud. Big Data Research, 1, pp.52-65. Janowicz, K., Brring, A., Stasch, C., Schade, S., Everding, T. and Llaves, A., 2013. A restful proxy and data model for linked sensor data.International Journal of Digital Earth,6(3), pp.233-254. Kang, D. 2013. Lightweight and Scalable Intrusion Trace Classification Using Interelement Dependency Models Suitable for Wireless Sensor Network Environment. International Journal of Distributed Sensor Networks, 2013, pp.1-10. Pleisch, S., and Birman, K. 2008. Scalable querying of sensor networks from mobile platforms using tracking-style queries. IJSNET, 3(4), p.266. Rushinek, A. and Rushinek, S., 2015. End-user satisfaction of data base management systems: An empirical assessment of mainframe, mini and micro-computer-based systems using an interactive model. ACM SIGMIS Database, 17(2), pp.17-27. Sathe, S., Papaioannou, T.G., Jeung, H. and Aberer, K., 2013. A survey of model-based sensor data acquisition and management. InManaging and Mining Sensor Data(pp. 9-50). Springer US. Wang, L., Tao, J., Ranjan, R., Marten, H., Streit, A., Chen, J. and Chen, D., 2013. G-Hadoop: MapReduce across distributed data centers for data-intensive computing.Future Generation Computer Systems,29(3), pp.739-750. Yu, B., Sen, R. and Jeong, D.H., 2013. An integrated framework for managing sensor data uncertainty using cloud computing.Information Systems,38(8), pp.1252-1268. Yu, X. and Korkmaz, T. 2015. Hypergraph querying using structural indexing and layer-related-closure verification. Knowl Inf Syst.
Wednesday, December 4, 2019
Annotated Bibliography Sudhir Venkatesh Essay Example For Students
Annotated Bibliography Sudhir Venkatesh Essay English 102 March 23, 2010 Annotated Bibliography Introduction: In Gang Leader for a Day, the author Sudhir Venkatesh has introduced himself to the culture of the Robert Taylor Homes of Chicago. In this experience Venkatesh meets his primary informant J. T. who shows Sudhir how the community operates. Sudhir is an ethnographer who is conducting qualitative research on the community that makes up the Robert Taylor Homes. J. T. is one of the many primary leaders for the Black Kings who has taken in Sudhir knowing his purpose for hanging around a treacherous community as an outsider. Venkatesh has spent several years in conducting research of the community and interviews of the residents. The process in which the ethnographer collects their information can be done in numerous ways. Some concerns do arise when looking at the how the researcher does interact with the subjects of the study. A particular concern that does come to mind is; how close is to close for the ethnographer? At what extent has the researcher gone beyond the legal limits of obtaining information? For example with Venkatesh in Gang Leader for a Day is it to far when Sudhir rides along while his key informant is conducting gang activity? Currently in Ethnography it is hard to define the way an ethnographer is supposed to interact with their subjects in their fieldwork process. Many ethnographers are expanding on the way they interact with individuals in who can provide information on the subject at hand. Currently ethnographyââ¬â¢s primary means of collecting information is still done through participant observation and conducting key informant interviews. Which still gives a generous deal of information to the researcher but another way to become informed of a culture is becoming immersed into their world. For an ethnographer to do this they may need to feel like they fit in, start doing activities that the ones being researched take part in. Also the researcher may change the way they look to be accepted into a foreign lifestyle to gain access to key information. The sources included provide multiple outlooks on the way ethnography is conducted. Some ethnographers like Katherine Irwin and Karen Lumsden took the approach of trying to get in deep with their sources to uncover the information they are looking for. While other professionals in the field of ethnography take a more stand back approach to see what takes place in there setting to reveal an understanding for the society they are observing. Blackman, Shane J. Hidden Ethnography: Crossing Emotional Borders in Qualitative Accounts of Young Peoples Lives. Sociology 41. 4 (2007): 699-716. Shane Blackman was a scholarship student at the Institute of Education, University of London where he received his PhD in 1990. Shane has conducted research into sociological and ethnographic aspects of young peopleââ¬â¢s culture. Blackman has written several books, his latest titled Chilling Out: the cultural politics of substance consumption, youth and drug policy. A major part of ethnography is hidden ethnography, which is empirical data that is not released because it may be considered to controversial. This article explores the aspect of how an ethnographer explores the environment of his subjects to reveal the truth of their lifestyles to gain a better understanding. In Blackmanââ¬â¢s fieldwork he explores low-income areas to understand what lead people to live in the conditions they currently do. He also studied a group of young woman named the new wave girls, who are aged between 16 to 17. Blackmanââ¬â¢s social skills allowed him to connect with his participants on an intimate level, which proved to be beneficial in his work. Professor Blackman used his own subjectivity, through cultural identity to create bonds with people, which allowed his participants to open up and expose themselves to his research. From this approach Blackman is able to ask questions for what he is looking for in his fieldwork. This approach by Blackman is a good approach to gain access to the information the researcher is looking for. But also goes against guidelines established by the British Sociological Association, which state to the researcher that the subject should be reminded that they are taking place in a study and are the subjects of the material. Blackman states in his article to be against this guideline saying it can limit the about of information the ethnographer can receive. This method goes against Julia Davidsonââ¬â¢s approach saying the subject can forget that they are objects to a study and that it is professional to ask for consent several time throughout the research and fieldwork. Davidson, Julia OConnell. If no means no, does yes mean yes? Consenting to research intimacies. History of the Human Sciences 21. 4 (2008): 49-67. In the article ââ¬Å"If no means no, does yes mean yes? â⬠by Julia Davidson she discusses the argument of people being studied by ethnographers are tuned in to objects and consumed by the readers. Julia Davidson is a Professor in Sociology at the University of Nottingham in the United Kingdom. Over the past 15 years she focused her attention at prostitution and the different aspects that surrounds this culture. In this article by Professor Davidson she was introduced to a lady Desiree that runs a brothel in the UK where the prostitution is not illegal. Over the period of nine months Professor Davidson spent one day a week at the brothel as a receptionist where she was able to interact with the customers and with Desiree the owner. The brothel is where her fieldwork was done, where she conducted interviews and interacted with clients. Professor Davidson focused on the aspect of the relationship she developed with her informant. Consent with the people being researched was very important to Davidson because she wanted the subjects to understand that being researched can change your life after it is published. With the complete understand from Desiree that she is now the subject of her study they formed an intimate relationship that lasted for several years. This qualitative research relates with Lumsdenââ¬â¢s fieldwork by addressing how to relate with the subjects. Both ethnographers were introduced in the their subjects culture from another person that was already linked to them. Over time they established themselves in the society to break past the fronts the subjects put up. This allowed for in-depth experience for the researcher to move in close to their subjects. The difference between Lumsden and Davidsonââ¬â¢s work is Davidson established consent with the subject over and over again while Lumsden was trying to fit in with the crowd. This allowed Davidson to obtain information easily from the source while Lumsden was struggling to get the information she was looking for. Emerson, Robert M. Ethnography, interaction and ordinary trouble. Ethnography 10. 4 (2009): 535-548. In ââ¬Å"Ethnography, interaction and ordinary troubleâ⬠, the author Robert Emerson questions if macro-issues can cause interference of the quality of fieldwork in ethnographic research. Robert Emerson is a Professor Emeritus of sociology at the University of California, Los Angeles. His primary focus is in the study of ethnography and field research methods. Emerson has written his own book titled Contemporary Field Research: Perspectives and Formulations (2001) also co-authored Writing Ethnographic Fieldnotes (1995). In this article Emerson looks at the relationship between two roommates in college and analyzes the ordinary issues that arise. According to Emerson students tend to focus on the big factors of the research and do not pay enough attention to detail on ordinary occurrences. Trifles EssayLumsden was curious about this culture and wanted to see what it was like for the woman involved with these car races and how woman interacted in a male dominate atmosphere. After spending over a year on the inside Karen has had multiple situations where because she was a woman she was discriminated against. One instance that stood out the most for Karen was when she was trying to park her car in a line for a photograph the group was trying to take. When she was backing into her spot for the photo she could not properly position her car. Another woman came to Karen asking if she would like some help parking. While others on the side started to comment on the situation one person said loud enough for Karen to overhear: donââ¬â¢t ask a woman to do another womanââ¬â¢s job. Lumsden discovers that since she is a woman she is open to opportunities of mistreatment from the males. The other female members of the group who were active participants in the culture also adopted the male traits and were no longer the subjects to scrutiny. It could be argued that ethnographers should not be worried about fitting in with the culture or the group being studied. However, conducting participant observation would be much more difficult for the researcher who could not build positive relationships with the subject or the group. Karen Lumsden study of boy racers relates strongly with Katherine Irwinââ¬â¢s study in the tattoo culture. Both cultures seem to be male dominant and being a woman studying the culture creates a more challenging situation for the researchers. Women have to be accepted into the group before others open up to the researcher. Being a female ethnographer can have many limitations placed on them in terms of behavior. A woman who engages in a culture in such ways could be seen as stepping out of line and could create socially uncomfortable situations. James F. Short, Jr, and Hughes Lorine A. Urban ethnography and research integrity: Empirical and theoretical dimensions. Ethnography 10. 4 (2009): 397-415 James Short is a professor at Washington State University and is currently Instructor to Professor Emeritus of Sociology, from 1951-present. Professor Short has held several academic positions to date after graduating from the University of Chicago with a PhD in 1951. In this article by Short and Hughes it is argued that quantitative data is more important then qualitative data because it has a more developed system of keeping accurate records then qualitative research. Professor Short looks at the work of others in the social science field of ethnography and the integrity of the work. Integrity is critical to the ethnographer in recording information from fieldwork because if a researcher only sees a bias view the work is more focused on interactions about an individual and not observing the culture and how they operate in society. Short and Hughes conducted a study with several gangs including adults and children also with non-gang members to view the integrity of quantitative research verses qualitative research. The three-year study included fieldwork of participant observation to interviews of the study group. The study concludes that ethnographic data integrity is critical to the development of social sciences. Both quantitative and qualitative research is important to ethnographers, but quantitative research when done properly is more universally recognized in the field. It has been recognized that ethnography is a very contentious field and that integrity to research is critical. When related to Katherine Irwinââ¬â¢s Into the Dark Heart of Ethnographyâ⬠she conducts qualitative research with her subjects. During the course of her study she was confronted with many situations that she did not know how to handle. Because of that she lost her marriage with her husband that she truly fell in love with during the course of the research. Qualitative and quantitative research are effective ways to conduct research and with both done correctly and professionally ethnography can reveal interesting aspects of society. Conclusion On one occasion J. T. lets Mr. Venkatesh get a taste of power and the problems that come with being a gang leader. He allows him to make the daily rounds of the platoons under his command, six-man crews that deal in crack cocaine and try to sort out the petty squabbles and mistakes endemic in a criminal enterprise comprising 250 underpaid, uneducated and violent soldiers. Without question, Venkatesh is dazzled by J. T. and seduced by the gang life. He maintains enough distance, however, to appraise the information he is given and to build up, through careful observation, a detailed picture of life at the projects. Venkatesh used participant observation to compile most of his information also conducting interviews with many of the residents. His proper use of observation gained him key interviews with informants that explained the story of the Robert Taylor Homes and the community that surrounds the homes. When comparing Sudhirââ¬â¢s style of ethnography to others in the field like Karen Lumsden, Sudhirââ¬â¢s approach was done well. Every so often he and J. T. would talk about his research project and J. T. understood that he was under observation for Sudhirââ¬â¢s school project. When Venkatesh introduced himself into the community he did not try to fit in like Lumsden. Sudhir kept his same personality and did not state that he changed his style of clothing to fit in with the gang. Lumsden did do this and it created a barier between her and her subjects limiting the amount of interaction that focused on her research. A valid point that Mr. Gans brings up is when a researcher becomes immersed into the fieldwork; some researchers try to turn the subjects of their study into friends. An example of this is when Katherine Irwin marries her key informant. She states that she truly loved him for who he was, Irwin still did not allow herself distance from her informant which caused problems while she was trying to conduct her research. When researchers fail to distance themselves from their informants the rules of qualitative reliability and validity are sidestepped, It becomes much harder for sociologists and the readers to trust their work that was completed. Works Cited Blackman, Shane J. Hidden Ethnography: Crossing Emotional Borders in Qualitative Accounts of Young Peoples Lives. Sociology 41. 4 (2007): 699-716. Academic Search Premier. EBSCO. Web. 4 Mar. 2010. Davidson, Julia OConnell. If no means no, does yes mean yes? Consenting to research intimacies. History of the Human Sciences 21. 4 (2008): 49-67. SocINDEX with Full Text. EBSCO. Web. 1 Mar. 2010. Emerson, Robert M. Ethnography, interaction and ordinary trouble. Ethnography 10. 4 (2009): 535-548. SocINDEX with Full Text. EBSCO. Web. 1 Mar. 2010. Gans, Herbert J. Participant Observation in the Era of `Ethnography. Journal of Contemporary Ethnography 28. 5 (1999): 540. Academic Search Premier. EBSCO. Web. 17 Mar. 2010. Irwin, Katherine. Into the Dark Heart of Ethnography: The Lived Ethics and Inequality of Intimate Field Relationships. Qualitative Sociology 29. 2 (2006): 155-175. SocINDEX with Full Text. EBSCO. Web. 16 Feb. 2010. Lumsden, Karen. Dont Ask a Woman to Do Another Womans Job: Gendered Interactions and the Emotional Ethnographer. Sociology 43. 3 (2009): 497-513. SocINDEX with Full Text. EBSCO. Web. 1 Mar. 2010. Short, James F. Jr, and Hughes Lor ine A. Urban ethnography and research integrity: Empirical and theoretical dimensions. Ethnography 10. 4 (2009): 397-415. SocINDEX with Full Text. EBSCO. Web. 1 Mar. 2010.
Subscribe to:
Posts (Atom)