Introduction and Literature Review
Introduction and Literature Review
Introduction and Literature Review
John Q. Doe
October 17, 2007
EDST 750
2. What was the purpose of the study? Is the phenomenon to be studied clearly articulated
and delimited?
It was to improve the integration of technology in K-12 instruction thereby
meeting the national imperative in the United States. Numerous state and federal
governmental bodies have adopted legislation supporting the use of computers
and the Internet as a tool to improve academic achievement. Yes, it allows the
reader to either fully understand a support or not support the data. However, there
was one limiting factor, which is the constrained effective use of technology in
schools where teachers' limited expertise in the professional use of computers.
METHOD
1. Which purposeful sampling technique was used? What was the sample size? How
were people selected for interviews or observations?
A case study approach was used in this research to explore the participants'
experiences over time through detailed, in-depth data collection involving
multiple sources of information. The study incorporated three units of analysis:
(a) the program, (b) the general participants, and (c) the focus participants.
There were110 students enrolled in the three sections of an information
technology course required for the completion of the Multiple Subject Credential
and the Master of Arts in Teaching Programs in an accredited public research
university in the United States. Within the general participants' group, six students
were investigated as focus participants. The focus cases were used to generate
detailed observations and interviews intended to confirm themes that arose during
the broader data collection. These participants were placed in various elementary
schools that served a broad range of culturally, linguistically, and economically
diverse student populations. Furthermore, the schools varied considerably in their
academic accomplishments.
2. What was the research role assumed by the researcher? What was the person's training
and background?
Participant observation. The researcher observed student behaviors during class
time and student teaching through informal class observations. During the fall
quarter, the researcher observed three sections of the information technology
course that was designed to provide pre-service teachers with a foundational
understanding of technology use in the classroom. Observations were conducted
using the "full field note" method of data collection (Olson, 1976), which involves
taking extensive notes during or immediately after the events being observed. To
avoid unwarranted inferences made by the researcher, care was taken to make
field notes as factual and as concretely descriptive as possible, as recommended
by Schofield (1995). For example, instead of or in addition to stating that a
student was bored with a class, the researcher recorded behavioral manifestations
of student's internal state, such as looking at material from other classes rather
than at the instructor presenting the lecture. Approximately 85% of the survey
questions were adopted from the Teaching, Learning, and Computing (TLC)
National Survey of Schools and Teachers conducted by Dr. Henry Jay Becker and
Dr. Ronald E. Anderson in 1998.
1. What data collection strategies were used? Were multiple strategies employed?
There were multiple strategies used they are as follow: Online discussion groups,
Individual interviews, Group interviews, Participant observation, and Surveys.
2. What strategies did the researcher use to minimize potential bias and to help extend the
findings (internal and external validity)?
Qualitative data analysis was conducted in an ongoing fashion during the course
of the study. Participant observations and personal interviews were coded and
analyzed according to the recurring key themes, which in turn refined subsequent
observations and tailored the topics for personal interviews. All field notes were
coded using procedures similar to those described in Schofield (1995). The coding
consisted of an iterative process that began long before data collection was
completed. This process involved reading the notes numerous times, coding them
by topic and theme, studying, comparing, and contrasting the notes classified
under any given code, and finally looking for patterns and themes that integrated
separate codes.
3. Were the limitations of the study discussed? If yes, what were some of the recognized
limitations? If no, provide your own opinions as to any limitations of the study.
Yes, they include the limitations of how well each person was proficient on
computers. There should have been scale of how well people in this study could
use computers.
4. What ethical considerations were addressed? Did the researcher specify how informed
consent, confidentiality, etc. were handled in the field?
There were no considerations mentioned in this article. No, there was nothing that
I found that mentioned these.
5. What do you think of this study in general and why? That is, do you think the study is
good/bad, important/not important, and interesting/not interesting, makes sense/does not
make sense? Would you act based on this study? Why?
I thought this study was good, important, and interesting, made sense, and I would
act upon this article. Technology in any classroom no matter how much it is used is
very important in helping the students later in life whether they to use it in college
or in the workforce.