• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Gray's research methodology adapted for analyzing Romania's economic and cultural transformation - challenges and benefits

Extracts from this document...

Introduction

Gray’s research methodology adapted for analyzing Romania’s economic and cultural transformation – challenges and benefits

East European societies represent a rich research field for ethnography. Once the constraints of  censorship and totalitarian systems removed, the ethnographic researcher has an almost unexplored ground at his horizon.

There is an active debate regarding the question if  researcher’s empathy within a culture could positively contribute to the research work or it is preferably being “an outsider” who sees the research field through different lenses. I would choose the former and apply the research methodology and analytical strategies presented by Ann Gray adapted on “Romania’s actual economic transformation towards society of consumption in relation with socio-cultural identity change”, having in mind at least couple of reasons:

  • To better understand the cultural layers one has to live or had lived within   that culture. Beside the outer layer represented by symbols, rituals, heroes whose meanings are accessible to an outsider as well, there are values, practices which are invisible to outsiders (Hofstede, 1997).

  • To better respond to the ethical questions such as be aware of researcher’s own biases that could impact data, requires an introspective attitude assuming that researcher is familiar with cultural dimensions under study.  Researcher must also retain the power of interpretation where constraints related to language could enter loss of sense.

As Ann Gray (2003) suggests the most fruitful ethnographic method is field research.

...read more.

Middle

It is a common research practice to distinguish between primary data (never published, usually gathered by researcher) and secondary data (books, articles). The scope of this example will be the former, mostly because in Romania’s case secondary data could be outdated due to its rapid evolution of market and identities.

Once the qualitative techniques are chosen, one of the most important benefits of the ethnography is the depth of observations. Frustrations, opinions, beliefs and behaviors of everyday life are brought to light to determine the characteristics of actual Romanian society of consumption in parallel with the change of identity.

In-depth interviews include both individual interviews as well as group interviews (most recommended  would be focus groups due to its applicability to market research). Individual interviews will be applied as ethnographic, elites interviews and life history. In Romania’s case study individual interviews are going to reflect possibly the differentiation of new social categories. Focus group interviews gives the opportunity to combine qualitative and quantitative methods, an additional benefit to reflect the transformation of Romanian society towards consumption. The data can be recorded in a wide variety of ways including stenography, audio recording, video recording or written notes.   The purpose of the interviews is to probe the ideas of the interviewees about the phenomenon of interest. An ethical question regarding the anonymity will determine the acceptance of recording (audio and/or video)

...read more.

Conclusion

One objective of Ann Gray’s book, according to the editor is “to offer practical guidance on the craft of research from formulating a topic to presenting it in written form”. This goal has been achieved and the two chapters studied not only bring the “taste and flavor” of ethnographic research but presented methodology adapted to specific cases may represent  a constructivist powerful tool for the cultural area studies research. As Ernst Von Glasersfeld  (1996) quoted: “the human activity of knowing cannot lead to certain and true picture…[but] creating the keys with whose help man unlock paths toward the goals he chooses”.

Bibliography:

Gray A., 2003. Research Practice for Cultural Studies : Ethnographic Methods and Lived Cultures. Thousand Oaks, California: Sage Publications.

Hofstede G., 1997. Cultures and Organizations. Software of the mind. 2nd edition. New York: McGraw-Hill.

Kaplan, B. and Maxwell, J.A., 1994. Qualitative Research Methods for Evaluating Computer Information Systems. In: Anderson, J.G., Aydin C.E. and Jay S.J.  Evaluating Health Care Information Systems: Methods and Applications. Thousand Oaks, California: Sage Publications, pp. 45-68.

Lewis, I.M., 1985. Social Anthropology in Perspective. Cambridge: Cambridge University Press.

Taylor, C., 1976. Hermeneutics and Politics. In: Connerton P., Critical Sociology: Selected  Readings, Harmondsworth: Penguin Books Ltd, pp. 153-193.

Von Glasersfeld E., 1996.  Radical Constructivism: A Way of Knowing and Learning. New York: RoutledgeFalmer.

Maria-Cristina Marin, Montréal, 21st of December 2003

...read more.

This student written piece of work is one of many that can be found in our University Degree Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related University Degree Computer Science essays

  1. Information systems development literature review. Since the 1960s Methodologies, Frameworks, Approaches and CASE ...

    Critical Evaluation Trustworthiness: This paper has been written in a structured, coherent, comprehensible format, published within the Information Technology & People. A number of reference have been provided to support the explanation of the Multiview frame. This paper has identified Multiview as a methodology, again this may confuse readers who don't have much knowledge within this subject area.

  2. The project explains various algorithms that are exercised to recognize the characters present on ...

    //******************************************************* // Global variables used by detection algorithm unsigned char I[480][720]; unsigned char I_temp[480][720]; int row_width, col_width; int start, stop; //******************************************************* /* * ======== main ======== */ void main() { printf("Video Preview Application\n"); fflush(stdout); /* Initialize BSL library to read jumper switches: */ EVMDM6437_DIP_init(); sysModuleRegs -> PINMUX0 &= (0x005482A3u); sysModuleRegs

  1. A Research Proposal on "Identity Theft in Internet Technology"

    Why do I chosen Identity Theft in Internet Technology? As stated earlier Identity theft in Internet Technology is increasing throughout the world. The reason why that I selected this topic is to make aware of in depth knowledge of what is Identity theft?

  2. Implementation of Path Finding Techniques in Homeland Security Robots

    2.2.1 General Search Algorithm In case of the general search algorithm the agent does not know the full search space. Instead the agent knows the initial state, and it knows operators. An operator is a function which expands a node.

  1. The Learning Benefits of Hypermedia Environments.

    This orientation aligns with adult learning theory, in which the notion of self-directed learning is fundamental to the design of learning contexts. Hypermedia environments support self-directed, life-long learning if structured to stimulate and motivate learners to be able to independently locate the resources necessary to continue learning (Diaz, 1998).

  2. So in order to understand what the main areas where organisation should be aware ...

    Open Source Footprinting is the easiest and safest way to go about finding information about a company. Information that is available to the public, such as phone numbers, addresses, etc. Performing whois requests, searching through DNS tables, and scanning certain IP addresses for open ports, are other forms of open source footprinting.

  1. This assignment's subject is about footprinting, scanning and enumeration

    Referenced connection means the connection specified by the destination IP address and port number, and the source IP address and the port number 5. With the TCP Sweep technique, instead of sending ICMP ECHO request packets we send TCP ACK or TCK SYN packets to the target network.

  2. Avon, which began its operations in 1886, is a global manufacturer and marketer of ...

    By the very nature of our products and our customer base, Avon has always had a special loyalty to women. The company is proud to dedicate itself to a number of global initiatives to further the women's movement, including: Products of Avon Behind the scenes at Avon, world-class scientists and designers are masterminding Avon's latest product innovations.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work