SlideShare uma empresa Scribd logo
1 de 36
Business
        Research Methods

               William G. Zikmund


     Chapter 10:
Survey Research: Basic
Communication Methods
Copyright © 2000 by Harcourt, Inc.

   All rights reserved. Requests for
permission to make copies of any part
 of the work should be mailed to the
   following address: Permissions
Department, Harcourt, Inc., 6277 Sea
   Harbor Drive, Orlando, Florida
              32887-6777.
SURVEYS

SURVEYS ASK A RESPONDENT FOR
INFORMATION USING VERBAL OR
WRITTEN QUESTIONING




                   Copyright © 2000 by Harcourt, Inc. All rights reserved.
COMMUNICATING WITH
           RESPONDENTS
• PERSONAL INTERVIEWS
   • DOOR-TO-DOOR
   • SHOPPING MALL INTERCEPTS
• TELEPHONE INTERVIEWS
• SELF-ADMINISTERED
  QUESTIONNAIRES



                           Copyright © 2000 by Harcourt, Inc. All rights reserved.
PERSONAL INTERVIEWS




           Copyright © 2000 by Harcourt, Inc. All rights reserved.
Good Afternoon, my name is
 _________. I am with _________
survey research company. We are
conducting a survey on_________.


                       Copyright © 2000 by Harcourt, Inc. All rights reserved.
Door-to-Door Personal Interview




Speed of Data Collection       Moderate to fast

Geographical Flexibility       Limited to moderate

Respondent Cooperation         Excellent

Versatility of Questioning     Quite versatile




                                  Copyright © 2000 by Harcourt, Inc. All rights reserved.
Door-to-Door Personal Interview




Questionnaire Length          Long

Item Nonresponse              Low

Possibility of Respondent     Lowest
Misunderstanding

Degree of Interviewer         High
Influence of Answer

Supervision of Interviewers   Moderate

                               Copyright © 2000 by Harcourt, Inc. All rights reserved.
Door-to-Door Personal Interview




Anonymity of Respondent          Low

Ease of Call Back or Follow-up   Difficult

Cost                             Highest

Special Features                 Visual materials may be
                                 shown or demonstrated;
                                 extended probing possible



                                         Copyright © 2000 by Harcourt, Inc. All rights reserved.
Mall Intercept Personal Interview

 Speed of Data Collection         Fast

Geographical Flexibility          Confined, urban bias

Respondent Cooperation            Moderate to low

Versatility of Questioning        Extremely versatile

Questionnaire Length              Moderate to Long




                                    Copyright © 2000 by Harcourt, Inc. All rights reserved.
Mall Intercept Personal Interview




Item Nonresponse                  Medium

Possibility of Respondent         Lowest
Misunderstanding

Degree of Interviewer             Highest
Influence of Answers

Supervision of Interviewers       Moderate to high

                                    Copyright © 2000 by Harcourt, Inc. All rights reserved.
Mall Intercept Personal Interview




Anonymity of Respondent        Low

Ease of Call Back or           Difficult
Follow-up

Cost                           Moderate to high

Special Features               Taste test, viewing
                               of TV Commercials
                               possible
                                   Copyright © 2000 by Harcourt, Inc. All rights reserved.
Telephone Surveys




       Copyright © 2000 by Harcourt, Inc. All rights reserved.
Telephone Surveys




Speed of Data Collection                     Very fast

Geographical Flexibility                     High

Respondent Cooperation                       Good

Versatility of Questioning                   Moderate



                             Copyright © 2000 by Harcourt, Inc. All rights reserved.
Telephone Surveys



Questionnaire Length          Moderate

Item Nonresponse              Medium

Possibility of Respondent     Average
Misunderstanding

Degree of Interviewer         Moderate
Influence of Answer

Supervision of Interviewers   High, especially with
                              central location WATS
                              interviewing
                                Copyright © 2000 by Harcourt, Inc. All rights reserved.
Telephone Surveys



Anonymity of Respondent          Moderate

Ease of Call Back or Follow-up   Easy

Cost                             Low to moderate

Special Features                 Fieldwork and supervision
                                 of data collection are
                                 simplified; quite adaptable
                                 to computer technology



                                        Copyright © 2000 by Harcourt, Inc. All rights reserved.
TELEPHONE SURVEYS

• Central Location Interviewing
• Computer-Assisted Telephone Interviewing
• Computerized Voice-Activated Interviews




                            Copyright © 2000 by Harcourt, Inc. All rights reserved.
MOST UNLISTED MARKETS

•   Sacramento, CA
•   Oakland, CA
•   Fresno, CA
•   Los Angeles/Long Beach, CA




                             Copyright © 2000 by Harcourt, Inc. All rights reserved.
MAIL SURVEYS




    Copyright © 2000 by Harcourt, Inc. All rights reserved.
Mail Survey




Speed of Data Collection Researcher has no control
                         over return of questionnaire; slow

Geographical Flexibility    High

Respondent Cooperation Moderate--poorly designed
                       questionnaire will have low
                       response rate

Versatility of Questioning Highly standardized format


                                         Copyright © 2000 by Harcourt, Inc. All rights reserved.
Mail Survey




Questionnaire Length            Varies depending on incentive

Item Nonresponse                High

Possibility of Respondent       Highest--no interviewer
Misunderstanding                present for clarification

Degree of Interviewer           None--interviewer absent
Influence of Answer

Supervision of Interviewers     Not applicable

                                       Copyright © 2000 by Harcourt, Inc. All rights reserved.
Mail Survey




Anonymity of Respondent                High

Ease of Call Back or Follow-up         Easy, but takes
time

Cost                                   Lowest




                                       Copyright © 2000 by Harcourt, Inc. All rights reserved.
How to Increase Response Rates for Mail Surveys




• Write a “Sales Oriented” Cover Letter
• Money Helps
       - As a token of appreciation
       - For a charity
• Stimulate Respondents’ Interest with Interesting Questions
• Follow Up
       - Keying questionnaires with codes
• Advanced Notification
• Sponsorship by a Well-known and Prestigious Institution



                                        Copyright © 2000 by Harcourt, Inc. All rights reserved.
Increasing Response Rates



• Effective Cover Letter

• Money Helps

• Interesting Questions

• Follow-Ups

• Advanced Notification

• Survey Sponsorship

• Keying Questionnaires    Copyright © 2000 by Harcourt, Inc. All rights reserved.
SELF-ADMINISTERED
              QUESTIONNAIRES
•   MAIL
•   PLACE OF BUSINESS
•   DROP-OFF
•   COMPUTERIZED
•   E-MAIL
•   INTERNET
•   OTHER VARIATIONS
                        Copyright © 2000 by Harcourt, Inc. All rights reserved.
INTERNET SURVEYS

• Speed of Data Collection
  – instantaneous
• Geographic Flexibility
  – worldwide
• Respondent Cooperation
  – varies depending on web site



                                   Copyright © 2000 by Harcourt, Inc. All rights reserved.
INTERNET SURVEYS

• Versatility of questioning
  – extremely versatile
• Questionnaire Length
  – modest
• Item Nonresponse
  – software can assure none



                               Copyright © 2000 by Harcourt, Inc. All rights reserved.
INTERNET SURVEYS

• Possibility for Respondent
  misunderstanding
  – high
• Interviewer Influence of Answers
  – none
• Supervision of Interviewers
  – none


                                Copyright © 2000 by Harcourt, Inc. All rights reserved.
INTERNET SURVEYS

• Anonymity of Respondent
  – Respondent can be anonymous or known
• Ease of Callback or Follow-up
  – difficult
• Cost
  – low
• Special Features
  – allows graphics and motion
                                 Copyright © 2000 by Harcourt, Inc. All rights reserved.
INTERNET SURVEYS

• Item Nonresponse
     software can assure none
• Possibility for Respondent
  misunderstanding
  – high
• Degree of Interviewer Influence of Answers
  – none
• Supervision of Interviewers
  – none
                                Copyright © 2000 by Harcourt, Inc. All rights reserved.
INTERNET SURVEYS

• Anonymity of Respondent
     •     Respondent can be anonymous or known
• Ease of Callback or Follow-up
  – difficult
• Cost
  – low
• Special Features
  – allows graphics and motion
                                  Copyright © 2000 by Harcourt, Inc. All rights reserved.
There is no best form of
survey; each has advantages
    and disadvantages.


                   Copyright © 2000 by Harcourt, Inc. All rights reserved.
Selected Questions to determine the
         appropriate technique:

• Is the assistance of an interviewer
  necessary?
• Are respondents interested in the issues
  being investigated?
• Will cooperation be easily attained?



                               Copyright © 2000 by Harcourt, Inc. All rights reserved.
Selected Questions to determine the
         appropriate technique:

• How quickly is the information needed?
• Will the study require a long and complex
  questionnaire?
• How large is the budget?




                              Copyright © 2000 by Harcourt, Inc. All rights reserved.
Pre-testing

• A trial run with a group of
  respondents to iron out
  fundamental problems in the
  instructions or survey design




                     Copyright © 2000 by Harcourt, Inc. All rights reserved.
“Practice is the best
of all instructors.”

      Publilius Syrus

              Copyright © 2000 by Harcourt, Inc. All rights reserved.

Mais conteúdo relacionado

Semelhante a Ch10 1

Voxeo Summit Day 1 - Communications-enabled Business Processes (CEBP)
Voxeo Summit Day 1 - Communications-enabled Business Processes (CEBP)Voxeo Summit Day 1 - Communications-enabled Business Processes (CEBP)
Voxeo Summit Day 1 - Communications-enabled Business Processes (CEBP)Voxeo Corp
 
Home Based Agents The Crown Jewels of Customer Service Sally Hurley VIPdesk_J...
Home Based Agents The Crown Jewels of Customer Service Sally Hurley VIPdesk_J...Home Based Agents The Crown Jewels of Customer Service Sally Hurley VIPdesk_J...
Home Based Agents The Crown Jewels of Customer Service Sally Hurley VIPdesk_J...VIPdesk
 
32 Speech to Text Phone Based Translation
32 Speech to Text Phone Based Translation32 Speech to Text Phone Based Translation
32 Speech to Text Phone Based TranslationChief Innovation
 
Save Your Network – Protecting Manufacturing Data from Deadly Breaches
Save Your Network – Protecting Manufacturing Data from Deadly BreachesSave Your Network – Protecting Manufacturing Data from Deadly Breaches
Save Your Network – Protecting Manufacturing Data from Deadly BreachesLancope, Inc.
 
Save Your Network – Protecting Healthcare Data from Deadly Breaches
Save Your Network – Protecting Healthcare Data from Deadly BreachesSave Your Network – Protecting Healthcare Data from Deadly Breaches
Save Your Network – Protecting Healthcare Data from Deadly BreachesLancope, Inc.
 
Roundtable: Best Practices in IVR & Self Service
Roundtable:  Best Practices in IVR & Self ServiceRoundtable:  Best Practices in IVR & Self Service
Roundtable: Best Practices in IVR & Self ServiceSheri Greenhaus
 
How To Stop Targeted Attacks And Avoid “Expense In Depth” With Strong Authent...
How To Stop Targeted Attacks And Avoid “Expense In Depth” With Strong Authent...How To Stop Targeted Attacks And Avoid “Expense In Depth” With Strong Authent...
How To Stop Targeted Attacks And Avoid “Expense In Depth” With Strong Authent...Duo Security
 
How To Stop Targeted Attacks And Avoid “Expense In Depth” With Strong Authent...
How To Stop Targeted Attacks And Avoid “Expense In Depth” With Strong Authent...How To Stop Targeted Attacks And Avoid “Expense In Depth” With Strong Authent...
How To Stop Targeted Attacks And Avoid “Expense In Depth” With Strong Authent...Brian Kelly
 
Identify and Fight Fraudulent Impressions, Clicks, and Leads
Identify and Fight Fraudulent Impressions, Clicks, and Leads Identify and Fight Fraudulent Impressions, Clicks, and Leads
Identify and Fight Fraudulent Impressions, Clicks, and Leads LeadiD
 
081915-Capturing Real-Time Customer Insights via Mobile Research
081915-Capturing Real-Time Customer Insights via Mobile Research081915-Capturing Real-Time Customer Insights via Mobile Research
081915-Capturing Real-Time Customer Insights via Mobile ResearchAMA_SanAntonio
 
PPT of Communication in Business
PPT of Communication in BusinessPPT of Communication in Business
PPT of Communication in BusinessHanuwantSingh Dewal
 
Phybridge Polre customer presentation
Phybridge Polre customer presentationPhybridge Polre customer presentation
Phybridge Polre customer presentationRichard Kasslack
 
3rd Party Risk: Practical Considerations for Privacy & Security Due Diligence
3rd Party Risk: Practical Considerations for Privacy & Security Due Diligence3rd Party Risk: Practical Considerations for Privacy & Security Due Diligence
3rd Party Risk: Practical Considerations for Privacy & Security Due DiligenceResilient Systems
 
Multi-Factor Authentication - "Moving Towards the Enterprise"
Multi-Factor Authentication - "Moving Towards the Enterprise" Multi-Factor Authentication - "Moving Towards the Enterprise"
Multi-Factor Authentication - "Moving Towards the Enterprise" mycroftinc
 
marketing research process
 marketing research process marketing research process
marketing research processdubeym
 
Anup Bootstrapping Feb9th
Anup Bootstrapping Feb9thAnup Bootstrapping Feb9th
Anup Bootstrapping Feb9thClubExpress
 
Declarative security-oes
Declarative security-oesDeclarative security-oes
Declarative security-oesOracleIDM
 
Using Monetization to Sell Hosted UC
Using Monetization to Sell Hosted UCUsing Monetization to Sell Hosted UC
Using Monetization to Sell Hosted UCOnvoy
 
Insider threats webinar 01.28.15
Insider threats webinar 01.28.15Insider threats webinar 01.28.15
Insider threats webinar 01.28.15Lancope, Inc.
 

Semelhante a Ch10 1 (20)

Voxeo Summit Day 1 - Communications-enabled Business Processes (CEBP)
Voxeo Summit Day 1 - Communications-enabled Business Processes (CEBP)Voxeo Summit Day 1 - Communications-enabled Business Processes (CEBP)
Voxeo Summit Day 1 - Communications-enabled Business Processes (CEBP)
 
Home Based Agents The Crown Jewels of Customer Service Sally Hurley VIPdesk_J...
Home Based Agents The Crown Jewels of Customer Service Sally Hurley VIPdesk_J...Home Based Agents The Crown Jewels of Customer Service Sally Hurley VIPdesk_J...
Home Based Agents The Crown Jewels of Customer Service Sally Hurley VIPdesk_J...
 
32 Speech to Text Phone Based Translation
32 Speech to Text Phone Based Translation32 Speech to Text Phone Based Translation
32 Speech to Text Phone Based Translation
 
Save Your Network – Protecting Manufacturing Data from Deadly Breaches
Save Your Network – Protecting Manufacturing Data from Deadly BreachesSave Your Network – Protecting Manufacturing Data from Deadly Breaches
Save Your Network – Protecting Manufacturing Data from Deadly Breaches
 
Save Your Network – Protecting Healthcare Data from Deadly Breaches
Save Your Network – Protecting Healthcare Data from Deadly BreachesSave Your Network – Protecting Healthcare Data from Deadly Breaches
Save Your Network – Protecting Healthcare Data from Deadly Breaches
 
Roundtable: Best Practices in IVR & Self Service
Roundtable:  Best Practices in IVR & Self ServiceRoundtable:  Best Practices in IVR & Self Service
Roundtable: Best Practices in IVR & Self Service
 
How To Stop Targeted Attacks And Avoid “Expense In Depth” With Strong Authent...
How To Stop Targeted Attacks And Avoid “Expense In Depth” With Strong Authent...How To Stop Targeted Attacks And Avoid “Expense In Depth” With Strong Authent...
How To Stop Targeted Attacks And Avoid “Expense In Depth” With Strong Authent...
 
How To Stop Targeted Attacks And Avoid “Expense In Depth” With Strong Authent...
How To Stop Targeted Attacks And Avoid “Expense In Depth” With Strong Authent...How To Stop Targeted Attacks And Avoid “Expense In Depth” With Strong Authent...
How To Stop Targeted Attacks And Avoid “Expense In Depth” With Strong Authent...
 
Identify and Fight Fraudulent Impressions, Clicks, and Leads
Identify and Fight Fraudulent Impressions, Clicks, and Leads Identify and Fight Fraudulent Impressions, Clicks, and Leads
Identify and Fight Fraudulent Impressions, Clicks, and Leads
 
081915-Capturing Real-Time Customer Insights via Mobile Research
081915-Capturing Real-Time Customer Insights via Mobile Research081915-Capturing Real-Time Customer Insights via Mobile Research
081915-Capturing Real-Time Customer Insights via Mobile Research
 
The Level 3 Story
The Level 3 StoryThe Level 3 Story
The Level 3 Story
 
PPT of Communication in Business
PPT of Communication in BusinessPPT of Communication in Business
PPT of Communication in Business
 
Phybridge Polre customer presentation
Phybridge Polre customer presentationPhybridge Polre customer presentation
Phybridge Polre customer presentation
 
3rd Party Risk: Practical Considerations for Privacy & Security Due Diligence
3rd Party Risk: Practical Considerations for Privacy & Security Due Diligence3rd Party Risk: Practical Considerations for Privacy & Security Due Diligence
3rd Party Risk: Practical Considerations for Privacy & Security Due Diligence
 
Multi-Factor Authentication - "Moving Towards the Enterprise"
Multi-Factor Authentication - "Moving Towards the Enterprise" Multi-Factor Authentication - "Moving Towards the Enterprise"
Multi-Factor Authentication - "Moving Towards the Enterprise"
 
marketing research process
 marketing research process marketing research process
marketing research process
 
Anup Bootstrapping Feb9th
Anup Bootstrapping Feb9thAnup Bootstrapping Feb9th
Anup Bootstrapping Feb9th
 
Declarative security-oes
Declarative security-oesDeclarative security-oes
Declarative security-oes
 
Using Monetization to Sell Hosted UC
Using Monetization to Sell Hosted UCUsing Monetization to Sell Hosted UC
Using Monetization to Sell Hosted UC
 
Insider threats webinar 01.28.15
Insider threats webinar 01.28.15Insider threats webinar 01.28.15
Insider threats webinar 01.28.15
 

Mais de Ali Kamran

Mais de Ali Kamran (20)

Training and development
Training and developmentTraining and development
Training and development
 
Teacher
Teacher Teacher
Teacher
 
Style textile
Style textileStyle textile
Style textile
 
Sme's
Sme'sSme's
Sme's
 
Section 1 back ground (2)
Section 1 back ground (2)Section 1 back ground (2)
Section 1 back ground (2)
 
Research
ResearchResearch
Research
 
Ptcl
PtclPtcl
Ptcl
 
Pso
PsoPso
Pso
 
Pizza hut presentation
Pizza hut presentationPizza hut presentation
Pizza hut presentation
 
Pia1
Pia1Pia1
Pia1
 
Wah nobel ltd.
Wah nobel ltd.Wah nobel ltd.
Wah nobel ltd.
 
Paktel
PaktelPaktel
Paktel
 
Paktel
PaktelPaktel
Paktel
 
Outsourceing
OutsourceingOutsourceing
Outsourceing
 
Nestle
NestleNestle
Nestle
 
Motorola
MotorolaMotorola
Motorola
 
Mobilink
MobilinkMobilink
Mobilink
 
Marriott
MarriottMarriott
Marriott
 
Marriot questioinnaire
Marriot questioinnaireMarriot questioinnaire
Marriot questioinnaire
 
Management report..furguson
Management report..furgusonManagement report..furguson
Management report..furguson
 

Último

08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 

Último (20)

08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 

Ch10 1

  • 1. Business Research Methods William G. Zikmund Chapter 10: Survey Research: Basic Communication Methods
  • 2. Copyright © 2000 by Harcourt, Inc. All rights reserved. Requests for permission to make copies of any part of the work should be mailed to the following address: Permissions Department, Harcourt, Inc., 6277 Sea Harbor Drive, Orlando, Florida 32887-6777.
  • 3. SURVEYS SURVEYS ASK A RESPONDENT FOR INFORMATION USING VERBAL OR WRITTEN QUESTIONING Copyright © 2000 by Harcourt, Inc. All rights reserved.
  • 4. COMMUNICATING WITH RESPONDENTS • PERSONAL INTERVIEWS • DOOR-TO-DOOR • SHOPPING MALL INTERCEPTS • TELEPHONE INTERVIEWS • SELF-ADMINISTERED QUESTIONNAIRES Copyright © 2000 by Harcourt, Inc. All rights reserved.
  • 5. PERSONAL INTERVIEWS Copyright © 2000 by Harcourt, Inc. All rights reserved.
  • 6. Good Afternoon, my name is _________. I am with _________ survey research company. We are conducting a survey on_________. Copyright © 2000 by Harcourt, Inc. All rights reserved.
  • 7. Door-to-Door Personal Interview Speed of Data Collection Moderate to fast Geographical Flexibility Limited to moderate Respondent Cooperation Excellent Versatility of Questioning Quite versatile Copyright © 2000 by Harcourt, Inc. All rights reserved.
  • 8. Door-to-Door Personal Interview Questionnaire Length Long Item Nonresponse Low Possibility of Respondent Lowest Misunderstanding Degree of Interviewer High Influence of Answer Supervision of Interviewers Moderate Copyright © 2000 by Harcourt, Inc. All rights reserved.
  • 9. Door-to-Door Personal Interview Anonymity of Respondent Low Ease of Call Back or Follow-up Difficult Cost Highest Special Features Visual materials may be shown or demonstrated; extended probing possible Copyright © 2000 by Harcourt, Inc. All rights reserved.
  • 10. Mall Intercept Personal Interview Speed of Data Collection Fast Geographical Flexibility Confined, urban bias Respondent Cooperation Moderate to low Versatility of Questioning Extremely versatile Questionnaire Length Moderate to Long Copyright © 2000 by Harcourt, Inc. All rights reserved.
  • 11. Mall Intercept Personal Interview Item Nonresponse Medium Possibility of Respondent Lowest Misunderstanding Degree of Interviewer Highest Influence of Answers Supervision of Interviewers Moderate to high Copyright © 2000 by Harcourt, Inc. All rights reserved.
  • 12. Mall Intercept Personal Interview Anonymity of Respondent Low Ease of Call Back or Difficult Follow-up Cost Moderate to high Special Features Taste test, viewing of TV Commercials possible Copyright © 2000 by Harcourt, Inc. All rights reserved.
  • 13. Telephone Surveys Copyright © 2000 by Harcourt, Inc. All rights reserved.
  • 14. Telephone Surveys Speed of Data Collection Very fast Geographical Flexibility High Respondent Cooperation Good Versatility of Questioning Moderate Copyright © 2000 by Harcourt, Inc. All rights reserved.
  • 15. Telephone Surveys Questionnaire Length Moderate Item Nonresponse Medium Possibility of Respondent Average Misunderstanding Degree of Interviewer Moderate Influence of Answer Supervision of Interviewers High, especially with central location WATS interviewing Copyright © 2000 by Harcourt, Inc. All rights reserved.
  • 16. Telephone Surveys Anonymity of Respondent Moderate Ease of Call Back or Follow-up Easy Cost Low to moderate Special Features Fieldwork and supervision of data collection are simplified; quite adaptable to computer technology Copyright © 2000 by Harcourt, Inc. All rights reserved.
  • 17. TELEPHONE SURVEYS • Central Location Interviewing • Computer-Assisted Telephone Interviewing • Computerized Voice-Activated Interviews Copyright © 2000 by Harcourt, Inc. All rights reserved.
  • 18. MOST UNLISTED MARKETS • Sacramento, CA • Oakland, CA • Fresno, CA • Los Angeles/Long Beach, CA Copyright © 2000 by Harcourt, Inc. All rights reserved.
  • 19. MAIL SURVEYS Copyright © 2000 by Harcourt, Inc. All rights reserved.
  • 20. Mail Survey Speed of Data Collection Researcher has no control over return of questionnaire; slow Geographical Flexibility High Respondent Cooperation Moderate--poorly designed questionnaire will have low response rate Versatility of Questioning Highly standardized format Copyright © 2000 by Harcourt, Inc. All rights reserved.
  • 21. Mail Survey Questionnaire Length Varies depending on incentive Item Nonresponse High Possibility of Respondent Highest--no interviewer Misunderstanding present for clarification Degree of Interviewer None--interviewer absent Influence of Answer Supervision of Interviewers Not applicable Copyright © 2000 by Harcourt, Inc. All rights reserved.
  • 22. Mail Survey Anonymity of Respondent High Ease of Call Back or Follow-up Easy, but takes time Cost Lowest Copyright © 2000 by Harcourt, Inc. All rights reserved.
  • 23. How to Increase Response Rates for Mail Surveys • Write a “Sales Oriented” Cover Letter • Money Helps - As a token of appreciation - For a charity • Stimulate Respondents’ Interest with Interesting Questions • Follow Up - Keying questionnaires with codes • Advanced Notification • Sponsorship by a Well-known and Prestigious Institution Copyright © 2000 by Harcourt, Inc. All rights reserved.
  • 24. Increasing Response Rates • Effective Cover Letter • Money Helps • Interesting Questions • Follow-Ups • Advanced Notification • Survey Sponsorship • Keying Questionnaires Copyright © 2000 by Harcourt, Inc. All rights reserved.
  • 25. SELF-ADMINISTERED QUESTIONNAIRES • MAIL • PLACE OF BUSINESS • DROP-OFF • COMPUTERIZED • E-MAIL • INTERNET • OTHER VARIATIONS Copyright © 2000 by Harcourt, Inc. All rights reserved.
  • 26. INTERNET SURVEYS • Speed of Data Collection – instantaneous • Geographic Flexibility – worldwide • Respondent Cooperation – varies depending on web site Copyright © 2000 by Harcourt, Inc. All rights reserved.
  • 27. INTERNET SURVEYS • Versatility of questioning – extremely versatile • Questionnaire Length – modest • Item Nonresponse – software can assure none Copyright © 2000 by Harcourt, Inc. All rights reserved.
  • 28. INTERNET SURVEYS • Possibility for Respondent misunderstanding – high • Interviewer Influence of Answers – none • Supervision of Interviewers – none Copyright © 2000 by Harcourt, Inc. All rights reserved.
  • 29. INTERNET SURVEYS • Anonymity of Respondent – Respondent can be anonymous or known • Ease of Callback or Follow-up – difficult • Cost – low • Special Features – allows graphics and motion Copyright © 2000 by Harcourt, Inc. All rights reserved.
  • 30. INTERNET SURVEYS • Item Nonresponse software can assure none • Possibility for Respondent misunderstanding – high • Degree of Interviewer Influence of Answers – none • Supervision of Interviewers – none Copyright © 2000 by Harcourt, Inc. All rights reserved.
  • 31. INTERNET SURVEYS • Anonymity of Respondent • Respondent can be anonymous or known • Ease of Callback or Follow-up – difficult • Cost – low • Special Features – allows graphics and motion Copyright © 2000 by Harcourt, Inc. All rights reserved.
  • 32. There is no best form of survey; each has advantages and disadvantages. Copyright © 2000 by Harcourt, Inc. All rights reserved.
  • 33. Selected Questions to determine the appropriate technique: • Is the assistance of an interviewer necessary? • Are respondents interested in the issues being investigated? • Will cooperation be easily attained? Copyright © 2000 by Harcourt, Inc. All rights reserved.
  • 34. Selected Questions to determine the appropriate technique: • How quickly is the information needed? • Will the study require a long and complex questionnaire? • How large is the budget? Copyright © 2000 by Harcourt, Inc. All rights reserved.
  • 35. Pre-testing • A trial run with a group of respondents to iron out fundamental problems in the instructions or survey design Copyright © 2000 by Harcourt, Inc. All rights reserved.
  • 36. “Practice is the best of all instructors.” Publilius Syrus Copyright © 2000 by Harcourt, Inc. All rights reserved.