Search ResultsElectronic Resources 
by
Houston, Trisha Jane, author.
Format:
Excerpt:
Theory were used to discover common themes regarding accessibility problems and academic mobility in
by
Rabe, Karyn S., author.
Format:
Excerpt:
supports this study includes Bronfenbrenner's bioecological theory of human development, findings from the
by
Obi, Oke C., author.
Format:
Excerpt:
identifying reoccurring phenomena and coding meaningful and common keywords, phrases, and statements to form
by
Martin, Sarah E., author.
Format:
Excerpt:
coding, axial coding, theoretical coding, and emerging theory. Findings of the study indicate self
by
Johnston, Jamaal, author.
Format:
Excerpt:
more than 5 years. Entrepreneurship theory provided the conceptual framework for the study. A sample of
by
Nwabuzor, Nathaniel, author.
Format:
Excerpt:
-hygiene theory. The 4 cases were 4 different hotels in the midAtlantic region of the United States. Data were
by
Walls, Jedediah Logan, author.
Format:
Excerpt:
they are (Gouveia, Milfont, & Guerra, 2014). According to the functional theory of values, values guide
by
Blount, Angie H., author.
Format:
Excerpt:
) faith development theory provided the theoretical framework for the study. Data were collected at each
by
Thompson, Kimberly Dawn, author. (orcid)0000-0003-3483-4671
Format:
Excerpt:
/observations, and teacher interviews. Preliminary analysis, coding, cross-case synthesis, and naturalistic
by
Zylstra, John, author.
Format:
Excerpt:
methodology performs as the theory predicts and to evaluate privacy protection. Robustness studies are also
by
Quinn, Samantha Forbes, author.
Format:
Excerpt:
according to Braun and Clarke's (2006) six-step approach for thematic analysis. Narrative and in-vivo coding
by
Havlicek, Sarah, author.
Format:
Excerpt:
coding approach. The risk-benefit ratio, primarily oriented around relational consequences, was the most
by
Kazmierczak, Suasn M., author.
Format:
Excerpt:
program. Open coding was used to organize and analyze the data for the emergence of significant concepts
by
Starks, Ora, author.
Format:
Excerpt:
hiring post-incarcerated offenders in the Delta Region of Mississippi. Using Heider's attribution theory
by
Locust, Valencia, author.
Format:
Excerpt:
feminist theory were the conceptual frameworks used in this multiple case study. In-depth, semistructured
by
Gigliello, James John, author.
Format:
Excerpt:
stigma. The study contributes to the multidimensional theory of resilience and in practice, the ability
by
Ugwu, Malachy Ogbonna, author.
Format:
Excerpt:
-structured interview protocols, and other publicly available documents. The data were subjected to an inductive coding
by
Newton, Chad H., author.
Format:
Excerpt:
interpretation: (a) hermeneutics, (b) symbolic interactionism, (c) narratology, and (d) systems theory. The key
by
Ukorebi, Victor B., author.
Format:
Excerpt:
strategies. Using the human capital theory, the purpose of this multiple case study was to explore the
by
Zaldivar, Shelly D., author.
Format:
Excerpt:
phenomenological descriptive approach for the analysis. A combination of hand coding and coding software revealed
by
Ratcliff, Diana, author.
Format:
Excerpt:
third survived longer than 10 years. Grounded with the strategic contingency theory, the purpose of this
by
Henry, Joye E., author.
Format:
Excerpt:
informed by Krashen's second language acquisition theory, Cummins's language proficiency theory, and
by
Hopwood, Marsha, author.
Format:
Excerpt:
inductive coding of phrases, word frequency searches, and theme interpretation. Three themes emerged: vendor
by
Swingle, Casey Marie, author.
Format:
Excerpt:
's transformative learning theory were used to frame the study. Ten instructional coach/elementary teacher dyads
by
Martilik, Angela M., author.
Format:
Excerpt:
also explored. Feminist theory was used to illustrate the differences between male and female offenders
by
Planakis-Sajnani, Calliope, author.
Format:
Excerpt:
-production theory provided the theoretical foundation for the research questions, which examined the participants
by
Heyliger, Joseph Randolph, author.
Format:
Excerpt:
achieving their trade goals. This study was guided by the theory of comparative advantage propounded by
by
Peters, Charnell, author.
Format:
Excerpt:
This study used communication theory of identity (CTI) and critical race theory (CRT) to
by
Moss, Chelsea, author.
Format:
Excerpt:
according to social cognitive theory (Bandura, 1989). Therefore, changes in paternal social support
by
Connell, Donna, author.
Format:
Excerpt:
using survey analysis, interviews, and focus groups. I analyzed the data using coding then synthesized
by
Barrett, Nichole Marie, author.
Format:
Excerpt:
theory analysis. These procedures allowed the researcher to explore the relationship between Johnson
by
Woodruff, Richard A., author.
Format:
Excerpt:
years). Various levels of grounded theory coding were used on the data to produce three models and a
by
Gassama, Musa Yerro, author.
Format:
Excerpt:
records obtained from online sources. Data were coded using an inductive coding strategy and then analyzed
by
Holt, Patrick John, author.
Format:
Excerpt:
offerings. Gerald Arbuckle's refounding theory was used as a theoretical base for this project. Refounding
by
Frazier, Larry D., author.
Format:
Excerpt:
. Coding and thematic analysis was used to identify emergent themes in the experiential data. The analysis
by
Fragkou, Aikaterini, author.
Format:
Excerpt:
conducted to gather data. Coding was the procedure followed to divide the interview data and rearrange based
by
Idoko, Evelyn, author.
Format:
Excerpt:
education programs. Knowles's andragogy theory and Tinto's persistence theory were the theoretical
by
Schoeny, Clayton Maxwell, author.
Format:
Excerpt:
and coding theory---to address the difficulties associated with storing, transmitting, and analyzing
by
Haywood, Marlon, author.
Format:
Excerpt:
collected from interviews, field notes, and a reflective journal. Pattern coding and theme identification
by
Alkaabi, Mahfood Hussain, author.
Format:
Excerpt:
innovation (DOI) theory and the technology acceptance model (TAM) provided the conceptual framework. A
by
Lovejoy, Sonya, author.
Format:
Excerpt:
explain the quantitative results. Qualitative focus group results were examined using theory-generated a
by
Zhong, Chenjiazi, author.
Format:
Excerpt:
served as the primary conceptual framework. The data analysis process entailed using coding techniques to
by
Ndikum, Charles, author.
Format:
Excerpt:
, distribution, and ownership of guns. Based on the theoretical framework of Rousseau's social contract theory
by
Brown, Angela L., author.
Format:
Excerpt:
participants were analyzed for codes and themes using Merriam and Tisdell's coding method. The themes that
by
Allen, Monique, author.
Format:
Excerpt:
's communication accommodation theory and Rogers's protection motivation theory (PMT), the purpose of this study
by
Wen, Haiguang, author.
Format:
Excerpt:
and recurrent neural network based on the predictive coding theory. As a theory in neuroscience
by
Gordon, Shelby Denise, author.
Format:
Excerpt:
that promote teacher commitment and retention? Holistic coding and a cross-case analysis revealed that
by
Caldwell, Desiree' D., author.
Format:
Excerpt:
Cognitive Theory, the Direct Instruction approach, the Information Processing Theory, and the Constructivist
by
Goykhman, Nathalie Isabelle, author. (orcid)0000-0002-0612-1378
Format:
Excerpt:
theory approach includes qualitative semi-structured interviews to better understand the participants
by
Harris, Laura Denise, author.
Format:
Excerpt:
five practitioners employed at various sites within the organization. Social Cognitive Theory provided
by
Clarke-Myers, Katherine, author.
Format:
Excerpt:
coding text, developing case-specific thematic tables, and cross-case analysis. Three major themes were
by
Smith, Jessica, author.
Format:
Excerpt:
Second Cycle coding by three separate researchers. Self-Determination Theory (SDT) was used as a guiding
by
Olsen, Katie Rose, author.
Format:
Excerpt:
analyzed and coded using in-vivo and descriptive coding, as well as pattern-finding, over two cycles of
by
Finney, Sara, author.
Format:
Excerpt:
) Constructivist Grounded Theory, I conducted a line-by-line coding of the pre- and post-simulation questionnaires
by
Koziel, Ellen B., author.
Format:
Excerpt:
grounded theory was used to analyze the 12 semi-structured qualitative interviews with the goal of
by
Hodge, Timothy D., author.
Format:
Excerpt:
case and open coding format allowed the research to gain granularity and lead to a better understanding
by
Ryan, William M., author. (orcid)0000-0002-0073-6005
Format:
Excerpt:
experienced UCP participants from higher education, corporate, non-profit and public entities. Thematic coding
by
Riess, Helene, author.
Format:
Excerpt:
were guided by constructivist grounded theory methodology. Analytic techniques included initial coding
by
Arroyo, Joy L., author.
Format:
Excerpt:
attendance. After coding these interviews using grounded theory, the author proposes that matrescence may
by
Chang, Shen-Kuen, author.
Format:
Excerpt:
, such as embodied cognition and Common Coding Theory, shows that physical movements can enhance
by
Curtis, Nicholas A., author.
Format:
Excerpt:
A grounded theory-based qualitative method was used to generate a framework for practitioners who
by
Schwark, Cates Kimberli, author.
Format:
Excerpt:
., 2009) pre- and post-survey, and document analysis. Data analysis entailed open coding of transcripts
by
Du, Juan, author.
Format:
Excerpt:
months. Analysis of data was done by open coding, focused coding, selective coding, and theoretical
by
Dillon, Barbara, author.
Format:
Excerpt:
their educational story to date. From coding and categorising the data generated, nine themes emerged
by
Deliot, Eric, author.
Format:
Excerpt:
thesis though, we look at the performance of shaping without coding. We first introduce elements of the
by
Mehta, Aditi, author.
Format:
Excerpt:
(2012). Applying grounded theory and emergent coding from these examples, it presents a timeless Post
by
Zheng, Amin, author.
Format:
Excerpt:
. Experimental results show that the proposed contour coding algorithms significantly improve the overall coding
by
Cavaleri, Michelle Rose, author.
Format:
Excerpt:
recorded feedback and simultaneous video of the advisor's computer screen. Using grounded theory methods

Select an Action





