Thursday, April 4, 2019

Mobile commerce | An introduction

sprightly profession An introductionCHAPTER 1 INTRODUCTIONMobile Commerce (m- avocation) merchantman be widely defined as any relations, involving the transfer of ownership or rights to occasion goods and benefits, which is initiated and/or correct by victimisation fluid access to computer-mediated net profits with the help of an electronic whatchamacallum. (R. Tiwari, and S. Buse. 2007)Business-to-consumer (B2C) wide awake duty (m- mer fucktile system) refers to consumers sacra handstal manduction info and acquire products and work from sellers with their winding crooks (Balasubramanian et al. 2002). With the continuous bafflework forcet of telecommunication technology, energetic services ranges from electronic mail receiving and sending, shopping for goods and services, playing on an nonation inter guessive gamys, trading stocks and sh argons, reserve tickets, conduct banking and m wiztary transactions and even marry to tender mesh topologying sites to con nect with friends.Mobile trade constitutes payment for much(prenominal)(prenominal) goods, services and learning. Users access a website or radio receiver access protocol (WAP) by entering the web address (URL) of the weakenicular products required via the diligent skirt browser. Text messaging (SMS) is another way drug users potful communicate with ternary dampy service supplier. Depending on the tangibility of the product, the deli really of the product can be in the form of physical collection or downloaded digitally into the expeditious devices. 1.1 Evolution of Mobile CommerceFinland is the birthplace of Mobile Commerce. In 1997, the early SMS-activated coca plant Cola vending machines was installed in Helsinki. Same year, vigorous-based finance and banking service were in addition launched. Finland is as well the place where the fender sales of digital content, ring t integritys were downloaded to restless phones, were make. In 1999, Philippines and Japa n commenced a national commercial broadcast for sprightly business, known as SMART and i-Mode respectively. Subsequently, mobile traffic associated services begun to sprout rapidly in other markets, from mobile parking in Norway, to sales of watch tickets via mobile phones in Austria to the purchase of air hose tickets in Japan. From 2002, public transportation commuters in Helsinki atomic number 18 able to purchase tram and undergrounds train tickets via mobile phones. The cost of the tickets is the same as those bought from a machine scarcely without the queue. In Colorado, it is one of the first few places whereby one can regularise movie tickets and pay via mobile phone. A dedicated foretell is arranged for the pick-up. Mobile vouchers or coupons be visible in many countries from Finland, Spain, Germany, and United States to Japan. The promotional items offered on discounts ranges from laptops to McDonalds. Ring tone and wallpaper downloading squander been one of t he first widely employ mobile commercialism services. Some mobile services providers offer mobile password services, much(prenominal)(prenominal) as headlines, sports, weather, sports to mobile subscriber, virtuallytimes free when sponsored by mobile advertiser or at a monthly subscription cost to the user. Small- get oerd mobile commerce does exist in close markets, from SMS voting in reality shows like American Idol to get in in promotion lucky draws to downloading mobile ringtones. External environmental factors do play a part in promoting the mobile commerce growth. Worldwide expansion of digitalisation and automation of sales proceduresin the e-business and e-commerce on the meshwork al let out easier transference to the mobile commerce environment. 1.2 TechnologyMobile commerce is striked by a series of interlinked technologies such as networking, embedded systems, entropybases and trade protection. (Siau et al, 2003). Mobile devices, wireless systems and softw ar s enable a smart transmission of data, on with reli mogul and security. Global System for Mobile Communication (GSM) is the second generation (2G) after the analogue cellular era. It is the basic circuit-switched system whereby users need to dial in to maintain connection. The 2.5G technologies consist of the General Packet tuner armed service (GPRS) and Enhanced Data GSM Environment where they make used of existing infra social structure but faster in monetary value of sending speed. This generation of mobile technology is meant for transference of multimedia and broadband applications. The third generation (3G) uses the Universal Mobile telecommunication System (UMTS), which strives to provide higher bandwidth, faster transmission of voice, text, video, and multimedia for data-concentrated applications. UMTS allows users to be constantly connected to the lucre and its services gentlemans gentlemanwide, regardless of the devices (mobile or computers) used. As such, the m obile device can be integrated with functions of other equipment such as television, newspaper, organiser, computer and even credit card. In order to access web schooling to the mobile devices, the Wireless Application Protocol (WAP) was designed. As an outdoors and global standardisation for mobile applications, WAP aimed to connect and communicate mobile devices with other devices over wireless network on an interactive and real-time interface. Global localisation System (GPS) uses a satellites system orbiting more or less the existence and is particularly useful location technology. It is essential to location based mobile commerce based applications, as it offers relevant information dependent on location. 1.3 Role of channel provider The roles of the 3G operators are more than contributen for granted(predicate) than the voice-centric 2G. In fact, how these operators facilitate their roles leave alone determine the word sense of mobile commerce. The carrier or profit s Service Provider (ISP) is the entity that delivers the data to and from the user. The initial stage of 3G-standardisation process started with dual layer model, the pure carrier and service and/or connection provider. It is studyed that this model volition continue with carriers bring the main subscription provider. The gateway or hepatic portal vein is the entity centred to the services range. It is still unclear whether carrier allow for control it wholly. Regardless, it is definite that the number of content provider defend amplify. The role of banks in mobile commerce is considered critical since ease of payment is one of the decisive factors in adoption of mobile commerce. Certification authority is the entity that guarantees the transactions between the origin and destination. In accompaniment to the above mentioned infrastructure requirements, a smartcard called UMTS Subscriber Identity Card (USIM) is compulsory in every device n order to make phone calls. The ba sic functions for USIM are security via shared secret let out, individualizedized information manager, and SIM toolkit applications. USIM is also a plan for applications or features such as public key security content copyright control, peculiar(prenominal)ation and cookies, data or application cache, au thentication of users and p run lowic roaming. 1.4 Development of Mobile Commerce The extensive availability of Internet-accessible mobile phones is slowly creating a community of mobile commerce users. It is pass judgment that this community might exceed the PC community. (Ahonen, 2002) With technology such as WAP or 3G, it is cerebrated that electronic commerce information and/or interactive content ordain be adapted to the mobile commerce environment. magic spell the majority of mobile commerce opportunities and purchases are business-to-consumer (B2C), the possibility of business-to-business (B2B) still stands. It is predicted that business users and their requirement s will be carry through by the 3G services. A report by Accenture in 2001 Future of Wireless, has implyed that well-nigh business activities are easily accommodated for mobile commerce. With the rapid spread of mobile commerce, mobile phone manufacturers such as Nokia, Sony Ericsson, Samsung, Motorola and LG had began to develop WAP-enabled smart phones to exploit on the market potential. Interestingly, it was the introduction of Apples iPhone mobile commerce based systems like FanGo that the platform started to move into actual applications instead of SMS systems. The key advantage of mobile commerce services is the mobility of conveniences. Mobile commerce allows users the ability to execute transactions regardless of the location and time. With such uniqueness, mobile commerce has experienced relatively greater success in markets like Japan in regards to individual adoption rate. In comparison, this bric-a-brac technology has yet to achieve widespread popularity in other ma rkets like the USA, Australia and capital of Singapore. Mobile commerce actualise the possibility of accessing information at anywhere and anytime. It provides users the chance to access the Internet regardless of location (subject to the network coverage of mobile meshing operators), the ability to find a single mobile devices location (Global Positioning System) and to retrieve and/or update information whenever needed. The features of mobile commerce can be categorised into the time to come(a) Ubiquity. The most distinct advantage of mobile commerce is its ubiquity. With internet-enabled mobile devices, users can halt any information required. as well as, the emerging mobile commerce applications allow users to take aim in activities such as instant messaging, linking to social networking websites, conducting financial transactions or looking up for weather news. Dissemination The wireless infrastructure that embody instant(prenominal) delivery of data to mobile device s allows an efficient distribution of information to a population. Personalisation. With the massive amount of money of information available on the Internet, it is important that the content users receive is relevant. Mobile commerce companies can earn applications that allow customizable information and services applicable to users. Localisation. Another substantial feature will be the ability to identify users physical location with prompted the creation of location-based applications. The Sekai Camera created by Tonchidot is one example of how far such applications can go. (Figure) ancestry http//popupcity.net/2009/01/tag-the-world-share-spaces/CHAPTER 2 BACKGROUND 2.1 Mobile Commerce in Singapore Mobile commerce innovations were also introduced. June 2001, Coca-Cola partnered with SingTel on a Dial-a-Drink scheme to enable consumers to buy drinks from the vending machines via SMS, cost of the drinks will be credited to their phone bills. M1 has a similar development with Ye o Hiap Seng too. The largest nag fleet company, ComfortDelgro, started a free SMS taxi booking service. This service, aimed to damp match demand and supply, offers commuters an alternative channel to book a taxi aside from the call-a-cab scheme. Another interested application of mobile commerce will be the audience polling. When television position and/or web-based TV reality contests was newly introduced into the local media scene, audience champion through SMS voting was a common trend. Although the hype is fading, SMS voting is still an alternative for media contests on top of online voting. It is evident in the Singapore Blog Awards 2009 where Rednano Mobile, the mobile platform of rednano.sg, powers SMS voting. Increasingly, real-time SMS service like messageLIVE provided by SingTel are used at events where audience can participate in lucky draws, comment, etc via SMS and it will be instantaneously reflected on screen. SMS transaction has been seen in local television char ity shows such as the President Star Charity Show. It is detect that mobile payment method plays an important part to the success of mobile commerce. on that point had been several mobile payment initiatives launched in Singapore. Local banks ease up started rolling out mobile banking services way jeopardize in 2001. TELEMONEY by emailprotected Pte Ltd has also implemented mobile payment systems for retail and parking charges at Suntec City. NETS, too, class in YW8 whereby moviegoers can reserve and purchase Eng Wah cinema tickets. However, the demand for these services was so low that some services ceased to exist. One of the main powers for the unpopularity then was the complex use of goods and services procedure for mobile payments. Users first sop up to register and remember a sixteen-digit personal identification number. After which, users will be required to all send Short Message Service (SMS) or dial a specific number to put up any purchase. Such inconveniences m ake mobile payment schemes difficult to gain prevalence. Nonetheless, there consume been ongoing efforts to improve the telecommunication technology such as Near Field Communications (NFC) and mobile survey technology to facilitate mobile commerce. NFC allows users to make payment by tapping their mobile devices against a reader. Mobile view technology involves the using of camera in mobile phone as barcode reader. Mobile barcodes are ordinarily used for information or service request or content from a website. It can be promotion details, discount voucher or code via SMS or MMS, or ring tone, MP3, or game download or activation, or click to buy human agent, or purchase concert or travel ticket. The set up costs is usually the responsibility of the products company while partnering with a mobile payment service provider. While Mobile commerce now remains at infant stage, there are a myriad of companies looking into SMS-based applications and WAP. The InfoComm development Auth ority of Singapore (IDA) has on-going research to identify the ongoing local mobile commerce industry status and thereafter implemented several initiatives to encourage and support companies on mobile applications and/or platform development. At the official opening of imbX 2009, it was announced by Minster Lui put in Yew that the government intend to allocate $1.73 billion for new infocomm projects. Part of these projects will include the deployment of contactless point-of-sale terminals via NFC to labour electronic payment adoption and developing of applications on mobile commerce platform, location-based services and novel original mobile services. It is observed that service provider in the mobile commerce value chain, such as the wireless application providers, mobile operators, and other players, have been swift to introduce applications to the mass-market. However, the rate of adoption has been somewhat pale. 2.2 Statistics As of June 2009, Singapore has a mobile penetr ation rate of 130.6%. It is very common to for consumers to own more than one mobile device each. The mobile penetration rate has been on a steadily increase since 1997. 2009 also indicate an uprising trend lest for the stark drop of 3.2% in June 2009. While the mobile subscriptions averaged most 64000, the number of 3G subscriptions has increased over the away six months. Despite the positive increment, the market share of mobile commerce has yet to pick up similar pattern. Singapore pales comparison to Japan wheremobile commerce is a huge success, attributing more than $400 million in revenues yearly. NTT DoCoMos popular i-mode service allows users to buy soft drinks from vending machine, pay for food at fast food restaurants, and shop at online shops like Amazon.com, and buy most of goods via DoCoMos billing system. Companies like Visa also offer m-commerce services in Japan. Chart 2.1 Mobile acuteness Rate of Singapore, Q1-Q2 2009 Source Statistics on Telecom Services for 200 9 (Jan Jun), IDA Singapore. http//www.ida.gov.sg/Publications/20090304182010.aspxChart 2.2 Singapore Mobile MarketSource Statistics on Telecom Services for 2009 (Jan Jun), IDA Singapore. http//www.ida.gov.sg/Publications/20090304182010.aspx Chart 2.3 Mobile Penetration Rate of Singapore, Annual, 1997-2008 Source Statistics on Telecom Services for 2009 (Jan Jun), IDA Singapore. http//www.ida.gov.sg/Publications/20090304182010.aspxCHAPTER 3 LITERATURE REVIEW 3.1 Mobile Commerce ProcessMobile commerce consists of users date in transactions via mobile terminals. From a users point of view, retrieving and sending information and acquire products are regarded as the basic steps to mobile commerce. Most mobile commerce studies focused mainly on the purchasing stage but customers are involved in receiving and transferring information at the pre-purchase stage. Receiving information consists of conveying of information from seller to users mobile device. As it is important for customer s to know virtually the products, make comparison between products and then make buying decisiveness. Transferring information represent the directing of information from user to sellers. The information can be used to describe product and services requirements, registering, providing feedback and offering payment and/or delivery details. Purchasing is the act of buying products and services via mobile devices in return of monetary returns. The act of placing orders can be through with(p) through Wireless Application Protocol (WAP) properties of mobile device. It does not include making order by calling the seller from mobile phone. 3.2 Mobile Commerce Adoption Activators and Inhibitors on that point are a significant number of studies carried out to identify and predict the upcoming activators and inhibitors of mass-market mobile commerce adoption. As seen in the inspection here, different authors have highlighted different factors as key activators/inhibitors to the adoption of mobile commerce. Gillick and Vanderhoof (2000) suggest five broad-natured inhibitors, that is to say the technology, standardization of industry, the business case, expectations of consumers, security and reliability. The last factor is one of the most comm barely quoted. Most authors have quoted the pretermit of security and screen could be the main obstacle to the growth of mobile commerce. E-Mori conducted a multi-market take away for Nokia Networks and it was instal that the lack of perceived need (Signorini, 2001), conservatism, and perceptions relating to the reliability and security of the technology are the main overleap to adoption of mobile commerce while convenience and control are found to be the key determinants of demand. Buellingen and Woerter (2002) emphasize four vital success factors for the use of mobile services transmission rate, personalisation, data security, and user friendliness. Based on a survey by Strong and Old (2000) propose that ease of havi ng ubiquitous Internet access will be the most essential for customers to engage in mobile Internet applications. The authors noticed substantial obstacles to rapid adoption to mobile Internet in the future are lack of awareness in content and application, high operating costs and the unfavourable comparison towards mobile Internet in terms of small screen size, awkward input, poor search functions, unstable or high-ticket(prenominal) connections, etc. On the other hand, many studies disputed on the fact that mobile commerce whitethorn encounter considerable growth with non-Internet adopters because of the lower costs and ease of fashion with mobile devices involved. (Mller-Versee, 1999 Vittet- Philippe and Navarro, 2000 Ropers, 2001) Vittet- Philippe and Navarro (2000) and Green (2000) believe that user-friendly is the main point for mobile commerce adoption. As such, the limitations like small screen size, low bandwidth and the basic functions of mobile devices influence the des ign of mobile commerce applications interface. Likewise, the survey conducted by Carlsson and Walden (2002) throwawayd that obtuseness in speed of service and small screen size of mobile phones attributed to the hindrance in mobile commerce adoption. On the other hand, Langendoerfer (2002) assumes that technological matters such as technical environment and mobile devices will not be the main reason for the slowness in widespread usage of mobile commerce. Rather, the concerns of users such as privacy and security have a big influence on the slow take off. Shuster (2001) reflect that pricing will definitely have an influence on mobile commerce adoption. modify mobile devices, user-friendly shopping interfaces, effective applications and services, reduced prices, secure transactions, high bandwidth and network coverage are the list of key success factors for escalating mobile commerce adoption from the online survey by Vrechopoulos et al (2002) It is also highlighted from a cons umer survey (Anckar, 2002b) that mobile commerce adoption is driven by convenience and flexibility to routine routines quite an than excitement and entertainment. It is also found out that consumers regard the function to fulfill instantaneous and time-sensitive needs as important adoption drivers of mobile commerce. Prior research has somewhat indicated that the main factors influencing the finding to adopt mobile commerce related to the services or device features has gone beyond the traditionalistic function of a mobile phone, i.e. one-to-one voice communication. In line with this theory, consumer will be boost towards mobile commerce based on the fact that mobile device in transforming into a personal device, via which various transactions and activities can be carried out. 3.3 Traditional models Several studies have been carried out using formulaic adoption theories and models like the Technology Acceptance Model (TAM) and Theory of Planned Behaviour (TBP). However, the main goal drawn by many authors was that traditional models are lacking to derive significant deduction on the determinants of individual adoption or rejection of mobile commerce. According to the Theory of Planned Behaviour (Ajzen, 1991), the behaviour earlier to any act (behavioural objectives) is established by variables like Attitude, Subjective Norm and Perceived Behavioural conquer (PBC). A users attitude linking to using mobile device to obtain, transmit information and purchase is believed to influence the users intention to carry out the trio behaviours. Subjective norm is believed to have the same effects on users too. PBC is a factor of intended users behaviour via increasing perceptivity of control, assurance and ease of performing act. Based on the research by Pavlou et al, (2007), the model of m-commerce adoption emphasize for the most part on technology adoption (perceived returns and ease of use), technological characteristics (mobile device display featur es, mobile device portability, and mobile site navigability and download delay), information characteristics (mobile site informativeness, information protection, and personalization), and consumer characteristics (mobile users skills). TAM has influence many information system based findings (such as downwind et al., 2002 OCass and Fenech, 2003) pertaining to information technology adoption in set or mobile environment. Although many studies are in favor of TAM as a model to explain the decision of acceptance, it is still un certain(a) if the model is entirely appropriate with regards to different channels. The decisions to adopt mobile commerce are very different from the decision to adopt technology for carrying reasons. Firstly, users adopt mobile commerce as a new channel of commerce rather than as technology per se. Second, mobile commerce whitethorn consist of transactional and non- transactional element. This means that adopters intent to engage in mobile commerce should be viewed holistically. (Pavlou, 2002) As such, we need differentiate between the various levels of mobile commerce adoption as we study consumer adoption decision. Third, Eikebrokk and Sorebo (1998) pointed out that TAM is generally applied to droll target situation, based on the presumption that potential users are only faced with one specific technology. It is therefore argued that to acquire valid forecasts and justifications of technology acceptance with TAM since users are presented with situation whereby they can recognise among alternative channels. Fourth, it is argued that TAM itself is imperfect as it does not considered the influence of social factors in the adoption and usage of new technology or system. This shortcoming has to be taken into condition when examining the adoption factors. Last, TAM assumes that usage is free and voluntary, that there are no obstacles to prevent user from adopting any technology as farsighted as wanting to do so. This has lead to cr iticism from several tecs (Mathieson et al, 2001) and prompted some authors to supplement TAM with theories that hypothesize perceived risks as a pre-condition to the mobile commerce adoption. Pavlou (2002) emphasizes that the proliferation of the Internet has brought uncertainty and risk in the adoption of system. It therefore require the integration of variables that capture concepts in current technology adoption models by reflecting that faith and perceived risk are directly linked to the intent to transact via mobile devices. One reason for the inadequacy of traditional models is that the relationship between users and mobile commerce has not been clearly defined. Past methods only analysed the interaction between the users and the technology or between people in a network connections. On the contrary, mobile commerce users interrelate in three directions, in technological aspect, as members of networks and as consumers. These three roles need to be incorporated in order to achieve a greater understanding of mobile commerce adoption. The adoption of mobile commerce the interaction of consumers and sellers via mobile transactions is different from the usual electronics commerce due to the nature of location-independence, instantaneous real-time exchanges, the distinctive interface of mobile devices, and the unique aspect of mobile devices like small screen size and low bandwidth. Therefore, mobile adoption is not merely an case of usability of system or acceptance of technology. It should include several consumer pre-purchase actions such as researching for information, providing details and act of purchasing using mobile devices. This paper will re- dig into present literature of voluntary adoption of m-commerce services by individuals to emphasize the need to approach the three aspects of mobile commerce together in order to attain a holistic comprehension. The current mobile commerce industry of Singapore will be evaluated based in this research. It will enable stakeholders of the mobile commerce industry to gain informative insight on the acceptance of mobile services. Hence, this will result in wiser decision-making in terms of business strategies and prep of the product and services. CHAPTER 4 METHODOLOGY4.1 SurveyThe self-administered survey was hosted online on speedsurvey.com, under the domain http//mobilecommercesingapore.speedsurvey.com/. The reason for having such an unsupervised survey technique was that the 16 questions were simple to understand and followed a direct logic. The respondents are made up of 12 females and 24 males and all the respondents own a mobile phone. They survey instrument cover 16 questions pertaining to the users insight and purpose associated to mobile commerce and also their experience with the mobile commerce and mobile Internet. In this paper, there is a section in the questionnaire where the respondents were requested to specify to what extent does they agree or disagree with the stat ement related to the considered significance of different proposed benefits and obstacles to mobile commerce. The data collected were used to identify the activators and inhibitors that cover critical or non-critical factors that impact consumers decision in adoption or not adopting mobile commerce.4.2 Results and DiscussionOver 41% of the respondent have a bachelor degree and about 50% of them holds a master or doctorate degree. All the respondents own a mobile phone and about 75% have Apple iPhone. This will mean that their service provider is SingTel since the Telecommunication Company has a monopoly on the distribution of the Apple iPhone until 2010 when the other 2 Telecommunication Company will also have the distributor rights. Incidentally, it is reflected from the data collection that the most common item purchase via mobile is the phone applications. Also known as widgets, these applications can be downloaded on the iApps or iTunesstore via the phone Internet browser. In te rms of frequency, it is has the most recent item purchase. More then 40% of the respondent has purchase widgets for the past 1 week. Out of the 36 respondents, 34 of them has purchased (buy/order/reserve/download) item at least once for the past 12 months. None of them has bought items off the vending machine via the mobile phone. The purchase of other items such as requesting for information and buying multimedia content by SMSto a specific 5-digit number are rather sporadic. Over 40% of the respondents agree that using mobile commerce saves them time, with the other 30% strongly agreeing. There are about 70% of them who see that using mobile commerce is fashionable and trendy. With regards to the mobile commerce being an invasion of privacy, there are equate responses from those who agree, strong agree and disagree. However, about 80% of the respondents esteem that it is safe to make purchases using mobile commerce. The majority of the respondents agree that they have the neces sary means and resources to use mobile commerce. Same, the respondents also agree that they will seek information about the new product or services. Among those that had never performed a mobile transaction before, the reasons mainly evolved round unawareness. Mostly, they are do not have enough information to get started or use it, or no imagination how much it will cost. It is much preferred to use other devices such as computer or payment kiosks such as SAM or AXS to perform the transaction. It is commonly believe that mobile commerce is expensive and will cost too much. However, it is indicated that they are willing to try to mobile commerce mainly if it was easier to obtain information from the Internet via mobile phone. This will also comprise of ease of access to lively media on mobile devices and user-friendly navigation on their mobile devices.4.3 Limitations of the survey The data collected from the survey is exceedingly non conclusive for several reason. Firstly, the size of respondents is less than 50 therefore the results are not substantial. Secondly, the profile of the respondents is too reorient towards certain segments mainly male that has Apple iPhone. Hence, the data is not representative enough. Thirdly, the structure of the survey was not well organised. The lack of logic and guided instructions, which is critical in self-administered survey, may somewhat confused respondent.4.4 Suggestions for future researchIt is seen that Apple iPhone may be a boosting factor for the future mobile commerce phenomenon. The splanchnic design and ease of navigation of the iPhone may propel more and more users to perform mobile commerce transaction. Also, with the fact that all three Telecommunication Companies are offering iPhone from 2010, it is believe that the market share of iPhone will expand rapidly. It is therefore suggest that an iPhone focus study may be undertaken in the future to better understand the effect of iPhone, iPhone applicati ons, iApps, and iTunes store on mobile comQualitative and Quantitative look on guardianship of offense RapeQualitative and Quantitative Research on Fear of abhorrence RapeResearch PortfolioIntroductionThe beginning of this portfolio will be introduced by two main types of shame data. They come in the form of qualitative and quantitative. They both show and represent crime in different way, and it also gives a clear idea of how crime has a big impact. They both have their strengths and weaknesses, but this portfolio will demonstrate their differences along with their similarities. They both have something to offer researchers and can also be mutually exclusive. Following this, the portfolio will include a personal noteal experience that explores the process of effective data collecting. The method of observation has many strengths yet many flaws, and obtain qualitative data. This final part of the portfolio will also examine the sexual violence in relation to gender, with resea rch to support it. It will use statistics to weight up and support the argument.Portfolio Part 1 The Difference Between Qualitative and Quantitate Research.There are two types of data when it comes to research Qualitative and Quantitate. Quantitative data is the process of managing the natural world through a mathematical formula, especially statistics. Crowther (2007, p.72) suggests that Quantification is, inescapably, about counting the number of cases. There is a belief that the number of cases provides a accepted measure of a particular aspect of the social world. Quantitate data is fact and cannot be questioned in bloodline to this qualitative data is more difficult to define as it focuses on getting tint rich data that gives great understanding. One major debate of Qualitative research is whether statistics and numbers can tell us anything of important or substantial about social life. Crowther (2007, p.76) proposed that Quantitative data does not capture the complexity of human experience. It is not possible to deal with human emotions and subjectivity. Statistics are not facts that exist independently of human interpretation they can only be made meaningful as part of an interpretive process.Quantitate research tends to be on a relatively large scale, having large amounts of numerical data and using statistical procedures to analyse the data and reach conclusions it tries to find representative samples and generalizable finding. In contrast to this qualitative research tends to have much littler samples, and therefore is on a much smaller scale (Newburn, 2007, pp.898-899).Qualitative data is large, unwieldy database of transcripts, fieldnotes and/or documents and the aim of this discussion is to explain how these data can be managed and analysed. However, unlike quantitative data, there can be no clear-cut and widely accepted rules or procedures for qualitative analysis (Crowe and Semmens, 2006, p.176).A Quantitative research method is surveys. The y are extremely large scale and can be sent out to almost anyone, most people have participated in a survey in their lifetime. Surveys obtain data through a standardised questionnaire and although they are primarily used for large amounts of quantitative data, they can also have a qualitative element (Newburn, 2007, p.899). One of the most common form of survey is postal survey, they are extremely flaccid, cheap and simple. Postal surveys are self-completed, which may explain why the response rates are very low even if someone may be interested in completing the survey they may just forget, as it is not a top priority. In contrast face-to-face interviews have a much greater compliance and also they can sort out any misunderstandings the participant may have about the questionnaire (Newburn, 2007, p.900). Telephone surveys are in the middle postal and interview surveys, as they are more personal than postal but less expensive than face to face. This method has practical recognizes, such as how will the researcher obtain the numbers to have verbalised data? Even after overcoming this obstacle there is still the issue of mobile phones being turned off and going through to voicemail. The last type of survey of internet based surveys, they are also cheap and easy but like telephone surveys if depends on whether the researcher has the appropriate contact information like emails internet based surveys also compare to postal surveys as the response rate is very low (Newburn, 2007, p.901). Surveys are known for being easy but Crowe and Semmens (2006, p.131) suggest that this apparent simplicity can, however, be deceptive since your chosen means of administration is not guaranteed to produce certain results, or a high response rate.There are three types of interviews structured, semi-structured, and unstructured. Structures falls into the quantitate division whereas semi-structured and unstructured fall into the qualitative category. Structured interviews are plann ed out with set questions without deviation and are good at finding number of time an individual has been a victim of crime over the past 12 months. precisely cannot tell the subjective experience of victimisation (Crowther, 2007, p.100). Unstructured research allows the police detective an understanding of depth and detail and how participants perceive matters. Each question is open ended with no structure and the interview is very much like a conversation, but with the interviewer steering the interview with a paper guide (Newburn, 2007, p.904). Semi-structured falls in-between structured and unstructured, as t is fairly formal with a stem of questions, but can deviate and explore in further detail the interviewer does not tactile property point of accumulation and leaves dwell for the respondent to talk. Both semi-structured and unstructured give more room to express own set and attitudes (Crowther, 2007, p.101). These methods are extremely time consuming and tend to have small samples, making it hard to generalise the findings.Portfolio Part 2 A Reflection on the Experience of Conducting an ObservationCrowe and Semmens (2006, p.101) suggested that knowledge of natural world is gathered through systematic objective and repeated observations of naturally occurring phenomena. This form of data collecting is largely a product of qualitative data. We place ourselves in an environment and simply watch the behaviours of others taking into consideration the context we detect how an individual in behaving and why they are behaving like that. This gives us incredibly rich and vivid information that simply cannot be oppressed into stats and figures. Kawulich (2005) states that observations enable the researcher to describe existing situations using the five senses, providing a Written photograph of the situation under study.The observation was conducted in a bus carry over a one hour period on the Saturday second may 2015. The main topic of the observation was to examine what behaviours people were doing and scrutinise why. In terms of weather, the afternoon of the 2nd was cold and raining, as a result of this the majority of people were wearing larger winter coats with hoods a lot of people were carrying umbrellas and had damp clothing and hair. As the bus station is in the centre of Leeds we can assume that the majority of people there did not live in the centre and were possibly having a Saturday shopping day or a day out and were travelling home. The bus station was very busy and full with constant movement, and what was interesting was that it seemed quiet from what you would expect of a heavily crowded room. Upon find the room it was noticed that the atmosphere of the bus station was calm and patient. Many of the individuals were seated quietly delay for their bus or checking the times and showed no elevated emotions, they gave off a sense of cool and composed. There seemed to be a social expectation of behaviour when others e ntered and exist the bus Individuals in the bus station waited for those to exit the bus, but always formed a line at the door in a first come first serve mentality it appeared that everyone followed the rules.Upon arriving at the bus stop it was noticeable that the room was very large and long, so deciding a place to conduct the observation proved to be difficult. In order to try and get a full experience and be in equal distance to everything, the observation was carried out in the centre of the bus station, seated as if waiting for a bus and as the observation was open and unstructured there was no behaviours that were expected. In the observation it was conducted as the investigator was a participant-as-observer this included sitting waiting for the bus, but not participating with the behaviour of everyone surrounding, such as getting on an off the bus (Crowe and Semmens, 2006, p.101). Data was collected in the form of note taking, balancing observation and writing equally. To m ake the note-taking for efficient, abbreviations were used and only lecture that were contained necessary information and words that were necessary for the sentence to make sense were used. Because the bus station was so busy it made it impossible to see and evidence every event and behaviour that happened. Because the room was in constant movement, it was difficult to record certain patterns of behaviour (Crowe and Semmens, 2006, p.110).In terms of success, the method of note-taking proved to be well organised and easy to refer back to, but one thing that could have been improved was how much information could have potentially been save. If the observation was to be repeated a possible improvement could be move around the bus station after certain time lapses, to ensure the full bus station was cover and recorded in comparison to sitting in the centre doing a 360 surveillance. Another possibility would be to bring an assistant observer(s) that recorded an area designated to the m this method may cover a much larger range of qualitative data. Observation as a data collecting method can be very time consuming, having it been said that to have a valid observational research study, it should have a minimum of a year of research, but meanwhile it does generate rich qualitative data. This method arises certain ethical issues, recording and using information of their behaviour can be seen as an invasion of their privacy as researches, in an open observation, do not ask for consent. It can be argued that if an individual knows they are being recorded, then they will change their behaviour to what they think is right and acceptable, wanting to occupy the researcher. This concludes that the data gathered is unreliable and unusable as it is not genuine (Crowe and Semmens, 2006, p.114).Portfolio Part 3 Analysing Crime StatisticsDescribe Sexual Violence in relation to gender.Newburn (2007, p.818) suggested that men have a much greater risk of being a victim of violent crimes than women do. A survey study in 2004 recorded that women had a 6.3% chance of becoming a victim whereas men had a 14.6% chance. Although these studies suggest men are more likely to amaze the victim of all violent crime, it has been found that women have a much greater risk to intimate violence (Newburn, 2007, p.819). According to the Office for National Statistics (2013) a CSEW Survey, in like manner found that young women were much more likely to be victims of sexual assault in the last year. The British Crime Survey found 6% of women inform non-sexual partner abuse, 3% reported sexual assault and 9% reported stalking And in 1991 a survey discovered that one in four women had experienced sack-attempted rape in their lifetime (Newburn, 2007, pp.819-820). The Guardian (2013) states that between 2009/10 and 2011/12 there were an estimated 78,000 victims of rape per year in England and Wales 69,000 females and 9,000 males.In the last 30 years there has been a significant increase in the awareness of rape. Studies that were conducted in the 70s have shown that women who reported rape were seen more as complainants than an individual making a serious claim Officials were highly unsympathetic. Women were given a list of things not to do, such as dont go out alone at night, Dont use public transport at night, Dont take shortcuts, Dont cross commons or parks on your way or use alley, and finally dont walk down badly lit streets (Newburn, 2007, p.822). This advice has been highly criticised with many stating it takes away the womans independence and implies that women are the ones at fault if they do not follow the rules. These rules, although are a precaution, make women feel that if they do any of these things, then they will sure be a victim on sexual assault. This can be seen in the SPSS graph down the stairs as in both columns very worried and fairly worried, it is significantly higher than in the mens column presenting that there is a distress in women that they have been subjected to.In correlativity with this theory Russell Pond (1999, p.82) states that victim surveys have opened up a whole new line of enquiry, leading to the fear of crime debate. This concept has become a serious tool of social control, and has become more of a problem than crime itself. One major aspect of the fear of crime is the assumption that men are less likely to read fear. Maguire et al (2007, pp.387-389) suggested that in terms of society men have a pressure telling then to be masculine to be strong and venturesome and have little fear. This is carried onto the crime world, men are expected to be dominant and reject abuse. This idea can be seen in the SPSS Graph below the vast majority of males are either not very worried or not worried at all. This can imply that men feel they will be judged if they admit to fear so they chose their answer based on what is expected of them. The take of Worry That Males and Females Have on Being Raped.One is sue with the fear of crime debate is delimitate fear, how do we measure fear? Fear usually correlated with risk and danger which can be seen with men going out and consuming alcohol this is a risk, but men will admit to little fear (Pond, 1999, p.82). Men are more likely to act in risk-seeking behaviours than women. Walklate (1995) suggests that fear is a gendered phenomenon. She states that the fear of crime is rooted in a male defined rationality based risk management view of fear which cannot tap the kinds of experiences that underpin womens responses. Pond (1999, p.83) also refers to Farrel et al who suggested that crime was significantly misinterpreted in the way it is recorded. He said Their suggestion is that quantitative methods based on surveys give a greater incidence of fear than qualitative methods based on interview.In an extremely controversial argument made in Patterns in Criminal Homicide (1958) by Wolfgang, he defined victim-precipitated offences as those in which the victim is a direct positive precipitator in crime. Amir suggested that one fifth of rapes were victim precipitates where the victim agreed to have sexual relations but retracted or did not resists strong enough or entered vulnerable situations sexually charged (Pond, 1995, p.78). At the time was a new emerging feminist movement, of which was highly critical of this approach.ConclusionIn conclusion we can see the clear differences between qualitative and quantitative. Quantitative focuses on numeric data and with what is countable, whereas qualitative tends to focus on words and meaning. These two types of data are very different but the measures and methods we use to obtain them can occasionally go hand in hand, complimenting each other. The data obtaining method of observation was very educational as it displayed a personal experience of what went right and also how improvements could have been made, for example moving around and creating a large radius of observation would hav e improved and made diverse data. The final chapter it was found that women have a much greater chance of rape and sexual violence happening to them. But it also showcases that women are more worried about it as more pressure and attention is move upon them to avoid it, creating a slight sense of paranoia.BibliographyCrowe, I. and Semmens, N. (2006) Researching Criminology. Berkshire McGraw-Hill.Crowther, C. (2007) An Introduction to Criminology and Criminal Justice. Hampshire Palgrave Macmillian.Kawulich, B. (2005) Participant Observation as a Data Collection Method. Forum Qualitative Social Research Online, Vol 6 (2) May, Chapter 2. Available from http//www.qualitative-research.net/index.php/fqs/article/view/466/996 Accessed 6 May 2015.Maguire, M. Morgan, R. Reiner, R. (2007) The Oxford Handbook of Criminology. 4th ed. Oxford Oxford University Press.Newburn, T. (2007) Criminology. Devon Willan Publishing.Office for National Statistics (2013) Focus on Violent Crime and Sexual Offe nces, 2011/12 Online. London. Available from http//www.ons.gov.uk/ons/rel/crime-stats/crime-statistics/focus-on-violent-crime/stb-focus-onviolent-crime-and-sexual-offences-2011-12.htmltab-Introduction-and-sources Accessed 7th May 2015.Pond, R. (1999) Introduction to Criminology. Winchester Waterside Press.The Guardian (2013) Rape crime and punishment Online. Available from http//www.theguardian.com/news/datablog/2013/jan/11/male-female-rape-statistics-graphic Accessed 7 May 2015.Walklate, S. (1995) Gender and Crime. Hemel Hempstead Prentice Hall.

No comments:

Post a Comment