Skip to main content

Researchers consider validity and reliability with each new study they design.

Discussion: Designing Quantitative Research
Researchers consider validity and reliability with each new study they design. This is because validity and reliability are not fixed but rather reflect a particular study’s unique variables, research design, instruments, and participants.
In the context of research design, two types of validity, which speak to the quality of different features of the research process, are considered: internal validity and external validity. Assuming that the findings of a research study are internally valid—i.e., the researcher has used controls to determine that the outcome is indeed due to manipulation of the independent variable or the treatment—external validity refers to the extent to which the findings can be generalized from the sample to the population or to other settings and groups. Reliability refers to the replicability of the findings.
For this Discussion, you will consider threats to internal and external validity in quantitative research and the strategies used to mitigate these threats. You will also consider the ethical implications of designing quantitative research.
**Please use the learning resources and media
With these thoughts in mind:
 An explanation of a threat to internal validity and a threat to external validity in quantitative research. Next, explain a strategy to mitigate each of these threats. Then, identify a potential ethical issue in quantitative research and explain how it might influence design decisions. Finally, explain what it means for a research topic to be amenable to scientific study using a quantitative approach.
Be sure to support your Main Issue Post and Response Post with reference to the week’s Learning Resources and other scholarly evidence in APA Style.
Learning Resources Required Readings
Babbie, E. (2017) Basics of social research (7th ed.). Boston, MA: Cengage Learning.
·         Chapter 3, “The Ethics and Politics of Social Research”
Burkholder, G. J., Cox, K. A., & Crawford, L. M. (2016). The scholar-practitioner’s guide to research design. Baltimore, MD: Laureate Publishing.
·         Chapter 7, “Quality Considerations”
Threats to Internal Validity
(Shadish, Cook, & Campbell, 2002)
1. Ambiguous temporal precedence. Based on the design, unable to determine with certainty which variable occurred first or which variable caused the other. Thus, unable to conclude with certainty cause-effect relationship. Correlation of two variables does not prove causation.
2. Selection. The procedures for selecting participants (e.g., self-selection or researcher sampling and assignment procedures) result in systematic differences across conditions (e.g., experimental-control). Thus, unable to conclude with certainty that the “intervention” caused the effect; could be due to way in which participants are selected.
3. History. Other events occur during the course of treatment that can interfere with treatment effects and could account for outcomes. Thus, unable to conclude with certainty that the “intervention” caused the effect; could be due to some other event to which the participants were exposed.
4. Maturation. Natural changes that participants experience (e.g., grow older, get tired) during the course of the intervention could account for the outcomes. Thus, unable to conclude with certainty that the “intervention” caused the effect; could be due to the natural change/maturation of the participants.
5. Regression artifacts. Participants who are at extreme ends of the measure (score higher or lower than average) are likely to “regress” toward the mean (scores get lower or higher, respectively) on other measures or retest on same measure. Thus, regression can be confused with treatment effect.
6. Attrition (mortality). Refers to dropout or failure to complete the treatment/study activities. If differential dropout across groups (e.g., experimental-control) occurs, could confound the results. Thus, effects may be due to dropout rather than treatment.
7. Testing. Experience with test/measure influences scores on retest. For example, familiarity with testing procedures, practice effects, or reactivity can influence subsequent performance on the same test.
8. Instrumentation. The measure changes over time (e.g., from pretest to posttest), thus making it difficult to determine if effects or outcomes are due to instrument vs. treatment. For example, observers change definitions of behaviors they are tracking, or the researcher alters administration of test items from pretest to posttest.
9. Additive and interactive effects of threats to validity. Single threats interact, such that the occurrence of multiple threats has an additive effect. For example, selection can interact with history, maturation, or instrumentation.
Reference
 Shadish, W. R., Cook, T. D., & Campbell, D. T. (2002). Experimental and quasiexperimental designs for generalized causal inference. Boston, MA: Houghton-Mifflin.
Required Media 

Comments

Popular posts from this blog

Identify and discuss a key milestone in the history of computers that interests you and why.

  Part 1Title: Lab ResponseDiscuss one feature of MS Word and one feature of MS Excel that you found challenging within the lab and why. Examples are WordArt, inserting shapes, adding borders, cell styles, etc. This response should be at least one paragraph in length. Part 2Title: History of Computers Identify and discuss a key milestone in the history of computers that interests you and why. This section should be at least one paragraph. Part 3Title: System Software vs. Application Software In your words, explain the difference between application software and system software as if to another coworker who has limited technical knowledge. Use examples to support your rationalization. This section should be at least two paragraphs. Part 4Title: Blockchain and Cryptocurrency In a minimum of one paragraph each: 1. Conduct some research on the internet and discuss one underlying technology of cryptocurrencies like blockchain, cryptography, distributed ledger technol...

Cybersecurity and Infrastructure Security (CISA)

 Develop a research paper that identifies a specific Department of Homeland Security (DHS) operating agency. Fully describe 1 DHS operating agency from the following list: Cybersecurity and Infrastructure Security (CISA) U.S. Customs and Border Protection (CBP) U.S. Citizenship and Immigration Services (USCIS) Federal Emergency Management Agency (FEMA) U.S. Coast Guard (USCG) U.S. Immigration and Customs Enforcement (ICE) U.S. Secret Service (USSS) Transportation Security Administration (TSA) The information must include a discussion of the selected DHS agency. Identify the agency’s mission, goals, objectives, and metrics. Conduct an analysis of how these mission areas address the threats or challenges. Recommend agency program priorities among the current set of goals, objectives, metrics, or budget items. Justification of all choices is an essential element of this assignment. Reference all source material and citations using APA format. WE OFF...

Discuss how the project

ord count : no idea 1. You are required to write a report on all project activities involved in all the 10 knowledge areas of project management for the entire project life cycle. You should also include a list of the respective PM documents, for example PM Plan, PM Quality Management Plan, Risk management, Procurement, etc. The report must include the activities that are considered before the project is closed out. 2. Discuss how the project quality management plan can provide adequate standards and controls in managing global teams in projects. Your discussion must provide adequate arguments for the need of cultural awareness and legal issues. Regards, The post Discuss how the project appeared first on My Assignment Tutor . Assignment status :  Resolved by our Writing Team Source@ PrimeWritersBay.com GET THIS PAPER COMPLETED FOR YOU FROM THE WRITING EXPERTS   CLICK HERE TO ORDER 100% ORIGINAL PAPERS AT PrimeWritersBay.com NO PLAGIARISM