Data Management and Analysis Methods

Download as pdf or txt
Download as pdf or txt
You are on page 1of 35

METHODS OF COLLECTING AND ANALYZING EMPIRICAL MATERIALS Data Management

and Analysis Methods

29
DATA MANAGEMENT AND ANALYSIS METHODS
u

Gery W. Ryan and H. Russell Bernard

Texts Are Us

This chapter is about methods for managing and analyzing qualitative data. By qualitative data we mean text: newspapers, movies, sitcoms, e-mail traffic, folktales, life histories. We also mean narrativesnarratives about getting divorced, about being sick, about surviving hand-to-hand combat, about selling sex, about trying to quit smoking. In fact, most of the archaeologically recoverable information about human thought and human behavior is text, the good stuff of social science. Scholars in content analysis began using computers in the 1950s to do statistical analysis of texts (Pool, 1959), but recent advances in technology are changing the economics of the social sciences. Optical scanning today makes light work of converting written texts to machine-readable form. Within a few years, voice-recognition software will make light work

of transcribing open-ended interviews. These technologies are blind to epistemological differences. Interpretivists and positivists alike are using these technologies for the analysis of texts, and will do so more and more. Like Tesch (1990), we distinguish between the linguistic tradition, which treats text as an object of analysis itself, and the sociological tradition, which treats text as a window into human experience (see Figure 29.1). The linguistic tradition includes narrative analysis, conversation (or discourse) analysis, performance analysis, and formal linguistic analysis. Methods for analyses in this tradition are covered elsewhere in this Handbook. We focus here on methods used in the sociological tradition, which we take to include work across the social sciences. There are two kinds of written texts in the sociological tradition: (a) words or phrases generated by techniques for systematic elicitation and (b) free-flowing texts, such as narratives, discourse, and responses to open-ended interview

769

770

METHODS OF COLLECTING AND ANALYZING EMPIRICAL MATERIALS


tury) are matters of heated debate. Below we review some of the most common systematic elicitation techniques and how researchers analyze the data they generate.

questions. In the next section, we describe some methods for collecting and analyzing words or phrases. Techniques for data collection include free lists, pile sorts, frame elicitations, and triad tests. Techniques for the analysis of these kinds of data include componential analysis, taxonomies, and mental maps. We then turn to the analysis of free-flowing texts. We look first at methods that use raw text as their inputmethods such as key-wordsin-context, word counts, semantic network analysis, and cognitive maps. We then describe methods that require the reduction of text to codes. These include grounded theory, schema analysis, classical content analysis, content dictionaries, analytic induction, and ethnographic decision models. Each of these methods of analysis has advantages and disadvantages. Some are appropriate for exploring data, others for making comparisons, and others for building and testing models. Nothing does it all.

Free Lists
Free lists are particularly useful for identifying the items in a cultural domain. To elicit domains, researchers might ask, What kinds of illnesses do you know? Some short, open-ended questions on surveys can be considered free lists, as can some responses generated from in-depth ethnographic interviews and focus groups. Investigators interpret the frequency of mention and the order in which items are mentioned in the lists as indicators of items salience (for measures of salience, see Robbins & Nolan, 1997; Smith, 1993; Smith & Borgatti, 1998). The co-occurrence of items across lists and the proximity with which items appear in lists may be used as measures of similarity among items (Borgatti, 1998; Henley, 1969; for a clear example, see Fleisher & Harrington, 1998).

Collecting and Analyzing Words or Phrases

Paired Comparisons, Pile Sorts, Triad Tests


Researchers use paired comparisons, pile sorts, and triads tests to explore the relationships among items. Here are two questions we might ask someone in a paired comparison test about a list of fruits: (a) On a scale of 1 to 5, how similar are lemons and watermelons with regard to sweetness? (b) Which is sweeter, watermelons or lemons? The first question produces a set of fruit-by-fruit matrices, one for each respondent, the entries of which are scale values on the similarity of sweetness among all pairs of fruits. The second question produces, for each respondent, a perfect rank ordering of the set of fruits. In a pile sort, the researcher asks each respondent to sort a set of cards or objects into piles. Item similarity is the number of times each pair of items is placed in the same pile (for examples, see Boster, 1994; Roos, 1998). In a triad test, the researcher presents sets of three items and asks each respondent either to choose the two most similar items or to pick the item that is the

Techniques for Systematic Elicitation


Researchers use techniques for systematic elicitation to identify lists of items that belong in a cultural domain and to assess the relationships among these items (for detailed reviews of these methods, see Bernard, 1994; Borgatti, 1998; Weller, 1998; Weller & Romney, 1988). Cultural domains comprise lists of words in a language that somehow belong together. Some domains (such as animals, illnesses, things to eat) are very large and inclusive, whereas others (animals you can keep at home, illnesses that children get, brands of beer) are relatively small. Some lists (such as the list of terms for members of a family or the names of all the Major League Baseball teams) are agreed on by all native speakers of a language; others (such as the list of carpenters tools) represent highly specialized knowledge, and still others (like the list of great left-handed baseball pitchers of the 20th cen-

771

Figure 29.1. Typology of Qualitative Analysis Techniques

772

METHODS OF COLLECTING AND ANALYZING EMPIRICAL MATERIALS


Componential analysis is based on the principle of distinctive features. Any two items (sounds, kinship terms, names of plants, names of animals, and so on) can be distinguished by some minimal set (2n) of binary featuresthat is, features that either occur or do not occur. It takes two features to distinguish four items (22 = 4, in other words), three features to distinguish eight items (23 = 8), and so on. The trick is to identify the smallest set of features that best describes the domain of interest. Table 29.1 shows that just three features are needed to describe kinds of horses. Componential analysis produces models based on logical relationships among features. The models do not account for variations in the meanings of terms across individuals. For example, when we tried to do a componential analysis on the terms for cattle (bull, cow, heifer, calf, steer, and ox), we found that native speakers of English in the United States (even farmers) disagreed about the differences between cow and heifer, and between steer and ox. When the relationships among items are less well defined, taxonomies or mental models may be useful. Nor is there any intimation that componential analyses reflect how people really think.

most different. The similarity among pairs of items is the number of times people choose to keep pairs of items together (for some good examples, see Albert, 1991; Harman, 1998).

Frame Substitution
In the frame substitution task (DAndrade, 1995; DAndrade, Quinn, Nerlove, & Romney, 1972; Frake, 1964; Metzger & Williams, 1966), the researcher asks the respondent to link each item in a list of items with a list of attributes. DAndrade et al. (1972) gave people a list of 30 illness terms and asked them to fill in the blanks in frames such as You can catch _____ from other people, You can have _____ and never know it, and Most people get _____ at one time or other (p. 12; for other examples of frame substitution, see Furbee & Benfer, 1983; Young, 1978).

Techniques for Analyzing Data About Cultural Domains


Researchers use these kinds of data to build several kinds of models about how people think. Componential analysis produces formal models of the elements in a cultural domain, and taxonomies display hierarchical associations among the elements in a domain. Mental maps are best for displaying fuzzy constructs and dimensions. We treat these in turn.

Taxonomies
Folk taxonomies are meant to capture the hierarchical structure in sets of terms and are commonly displayed as branching tree diagrams. Figure 29.1 presents a taxonomy of our own understanding of qualitative analysis techniques. Figure 29.2 depicts a taxonomy we have adapted from Pamela Ericksons (1997) study of the perceptions among clinicians and adolescents of methods of contraception. Researchers can elicit folk taxonomies directly by using successive pile sorts (Boster, 1994; Perchonock & Werner, 1969). This involves asking people to continually subdivide the piles of a free pile sort until each item is in its own individual pile. Taxonomic models can also be created with cluster analysis on the similarity data from paired comparisons, pile sorts, and triad tests. Hierarchical cluster analysis (Johnson, 1967) builds a taxo-

Componential Analysis
As we have outlined elsewhere, componential analysis (or feature analysis) is a formal, qualitative technique for studying the content of meaning (Bernard, 1994; Bernard & Ryan, 1998). Developed by linguists to identify the features and rules that distinguish one sound from another (Jakobson & Halle, 1956), the technique was elaborated by anthropologists in the 1950s and 1960s (Conklin, 1955; DAndrade, 1995; Frake, 1962; Goodenough, 1956; Rushforth, 1982; Wallace, 1962). (For a particularly good description of how to apply the method, see Spradley, 1979, pp. 173-184.)

Data Management and Analysis Methods

773

TABLE 29.1

A Componential Analysis of Six Kinds of Horses


Neuter + + Adult + + +

Name Mare Stallion Gelding Foal Filly Colt

Female + +

SOURCE: Adapted from DAndrade (1995).

nomic tree where each item appears in only one group. Interinformant variation is common in folk taxonomies. That is, different people may use different words to refer to the same category of things. Some of Ericksons (1997) clinician informants referred to the highly effective group of methods as safe, more reliable, and sure bets. Category labels need not be simple words, but may be complex phrases; for example, see the category in Figure 29.2 comprising contraceptive methods in which you have to pay attention to timing. Sometimes, people have no labels at all for particular categoriesat least not that they can dredge up easilyand categories, even when named, may be fuzzy and may overlap with other categories. Overlapping cluster analysis (Hartigan, 1975) identifies groups of items where a single item may appear in multiple groups.

Mental Maps
Mental maps are visual displays of the similarities among items, whether or not those

items are organized hierarchically. One popular method for making these maps is by collecting data about the cognitive similarity or dissimilarity among a set of objects and then applying multidimensional scaling, or MDS, to the similarities (Kruskal & Wish, 1978). Cognitive maps are meant to be directly analogous to physical maps. Consider a table of distances between all pairs of cities on a map. Objects (cities) that are very dissimilar have high mileage between them and are placed far apart on the map; objects that are less dissimilar have low mileage between them and are placed closer together. Pile sorts, triad tests, and paired comparison tests are measures of cognitive distance. For example, Ryan (1995) asked 11 literate Kom speakers in Cameroon to perform successive pile sorts on Kom illness terms. Figure 29.3 presents an MDS plot of the collective mental map of these terms. The five major illness categories, circled, were identified by hierarchical cluster analysis of the same matrix used to produce the MDS plot.1 Data from frame substitution tasks can be displayed with correspondence analysis (Weller & Romney, 1990).2 Correspondence analysis scales both the rows and the columns into the same space. For example, Kirchler (1992) analyzed 562 obituaries of managers who had died in 1974, 1980, and 1986. He identified 31 descriptive categories from adjectives used in the obituaries and then used correspondence analysis to display how these categories were associated with men and women managers over time. Figure 29.4 shows that male managers who died in 1974 and 1980 were seen by their surviving friends and family as active, intelligent, outstanding, conscientious, and experienced experts. Although the managers who died in 1986 were still respected, they were more likely to be described as entrepreneurs, opinion leaders, and decision makers. Perceptions of female managers also changed, but they did not become more like their male counterparts. In 1974 and 1980, female managers were remembered for being nice people. They were described as kind, likable, and adorable. By 1986, women were remembered for their courage and commitment. Kirchler interpreted these data to mean that gender stereotypes changed in

774
u

Figure 29.2. Clinicians Taxonomy of Contraceptive Methods


SOURCE: Based on Erickson (1997).

Data Management and Analysis Methods

775

Figure 29.3. Mental Map of Kom Illness Terms

the early 1980s. By 1986, both male and female managers were perceived as working for success, but men impressed their colleagues through their knowledge and expertise, whereas women impressed their colleagues with motivation and engagement.

Analyzing Words
Techniques for word analysis include key-words-in-context, word counts, structural analysis, and cognitive maps. We review each below.

Methods for Analyzing Free-Flowing Text

Key-Words-in-Context
Researchers create key-words-in-context (KWIC) lists by finding all the places in a text where a particular word or phrase appears and printing it out in the context of some number of words (say, 30) before and after it. This produces a concordance. Well-known concordances have been done on sacred texts, such as the Old and New Testaments (Darton, 1976; Hatch & Redpath, 1954) and the Koran (Kassis, 1983), and on famous works of literature from Euripides (Allen & Italie, 1954) to Homer (Prendergast, 1971), to Beowulf (Bessinger, 1969), to Dylan Thomas (Farringdon & Farringdon, 1980). (On

Although taxonomies, MDS maps, and the like are useful for analyzing short phrases or words, most qualitative data come in the form of free-flowing texts. There are two major types of analysis. In one, the text is segmented into its most basic meaningful components: words. In the other, meanings are found in large blocks of text.

776

METHODS OF COLLECTING AND ANALYZING EMPIRICAL MATERIALS

Figure 29.4. Correspondence Analysis of the Frequencies of 31 Disruptive Obituary Categories by Gender and Year of Publication
SOURCE: Erich Kirchler, Adorable Woman, Expert Man: Changing Gender Images of Women and Men in Management, European Journal of Social Psychology, 22 (1992), p. 371. Copyright 1992 by John Wiley & Sons Limited. Reproduced by permission of John Wiley & Sons Limited.

the use of concordances in modern literary studies, see Burton, 1981a, 1981b, 1982; McKinnon, 1993.)

Word Counts
Word counts are useful for discovering patterns of ideas in any body of text, from field notes to responses to open2Dended questions. Students of mass media have used use word counts to trace the ebb and flow of support for political figures over time (Danielson & Lasorsa, 1997; Pool, 1952). Differences in the use of words common to the writings of James Madi-

son and Alexander Hamilton led Mosteller and Wallace (1964) to conclude that Madison and not Hamilton had written 12 of the Federalist Papers. (For other examples of authorship studies, see Martindale & McKenzie, 1995; Yule 1944/1968.) Word analysis (like constant comparison, memoing, and other techniques) can help researchers to discover themes in texts. Ryan and Weisner (1996) instructed fathers and mothers of adolescents in Los Angeles: Describe your children. In your own words, just tell us about them. Ryan and Weisner identified all the unique words in the answers they got to that

Data Management and Analysis Methods

777

Figure 29.5. Multidimensional Scaling of Informants Based on Words Used in Descriptions of Horror Films
SOURCE: Based on data in Nolan and Ryan (1999).

grand-tour question and noted the number of times each word was used by mothers and by fathers. Mothers, for example, were more likely to use words like friends, creative, time, and honest; fathers were more likely to use words like school, good, lack, student, enjoys, independent, and extremely. This suggests that mothers, on first mention, express concern over interpersonal issues, whereas fathers appear to prioritize achievement-oriented and individualistic issues. This kind of analysis considers neither the contexts in which the words occur nor whether the words are used negatively or positively, but distillations like these can help researchers to identify important con-

structs and can provide data for systematic comparisons across groups.

Structural Analysis and Semantic Networks


Network, or structural, analysis examines the properties that emerge from relations among things. As early as 1959, Charles Osgood created word co-occurrence matrices and applied factor analysis and dimensional plotting to describe the relations among words. Today, semantic network analysis is a growing field (Barnett & Danowski, 1992; Danowski, 1982, 1993). For example, Nolan and Ryan (1999) asked 59 undergraduates

778

METHODS OF COLLECTING AND ANALYZING EMPIRICAL MATERIALS

(30 women and 29 men) to describe their most memorable horror film. The researchers identified the 45 most common adjectives, verbs, and nouns used across the descriptions of the films. They produced a 45(word)-by-59(person) matrix, the cells of which indicated whether each student had used each key word in his or her description. Finally, Nolan and Ryan created a 59(person)-by-59(person) similarity matrix of people based on the co-occurrence of the words in their descriptions. Figure 29.5 shows the MDS of Nolan and Ryans data. Although there is some overlap, it is pretty clear that the men and women in their study used different sets of words to describe horror films. Men were more likely to use words such as teenager, disturbing, violence, rural, dark, country, and hillbilly, whereas women were more likely to use words such as boy, little, devil, young, horror, father, and evil. Nolan and Ryan interpreted these results to mean that the men had a fear of rural people and places, whereas the women were more afraid of betrayed intimacy and spiritual possession. (For other examples of the use of word-by-word matrices, see Jang & Barnett, 1994; Schnegg & Bernard, 1996.) This example makes abundantly clear the value of turning qualitative data into quantitative data: Doing so can produce information that engenders deeper interpretations of the meanings in the original corpus of qualitative data. Just as in any mass of numbers, it is hard to see patterns in words unless one first does some kind of data reduction. More about this below. As in word analysis, one appeal of semantic network analysis is that the data processing is done by computer. The only investigator bias introduced in the process is the decision to include words that occur at least 10 times or 5 times or whatever. (For discussion of computer programs that produce word-by-text and word-by-word co-occurrence matrices, see Borgatti, 1992; Doerfel & Barnett, 1996.) There is, however, no guarantee that the output of any word co-occurrence matrix will be meaningful, and it is notoriously easy to read patterns (and thus meanings) into any set of items.

Cognitive Maps
Cognitive map analysis combines the intuition of human coders with the quantitative methods of network analysis. Carleys work with this technique is instructive. Carley argues that if cognitive models or schemata exist, they are expressed in the texts of peoples speech and can be represented as networks of concepts (see Carley & Palmquist, 1992, p. 602), an approach also suggested by DAndrade (1991). To the extent that cognitive models are widely shared, Carley asserts, even a very small set of texts will contain the information required for describing the models, especially for narrowly defined arenas of life. In one study, Carley (1993) asked students some questions about the work of scientists. Here are two examples she collected:
Student A: I found that scientists engage in research in order to make discoveries and generate new ideas. Such research by scientists is hard work and often involves collaboration with other scientists which leads to discoveries which make the scientists famous. Such collaboration may be informal, such as when they share new ideas over lunch, or formal, such as when they are coauthors of a paper. Student B: It was hard work to research famous scientists engaged in collaboration and I made many informal discoveries. My research showed that scientists engaged in collaboration with other scientists are coauthors of at least one paper containing their new ideas. Some scientists make formal discoveries and have new ideas. (p. 89)

Carley compared the students texts by analyzing 11 concepts: I, scientists, research, hard work, collaboration, discoveries, new ideas, formal, informal, coauthors, paper. She coded the concepts for their strength, sign (positive or negative), and direction (whether one concept is logically prior to others), not just for their existence. She found that although students used the same concepts in their texts, the concepts clearly had different meanings. To display the differences in understandings, Carley advocates the use of maps that show the relations between and

Data Management and Analysis Methods

779

Figure 29.6. Coded Maps of Two Students Texts

SOURCE: Kathleen Carley, Coding Choices for Textual Analysis: A Comparison of Content Analysis and Map Analysis, in P Marsden (Ed.), Sociological Methodology (Oxford: Blackwell, 1993), p. 104. Copyright 1993 by . the American Sociological Association. Reproduced by permission of the American Sociological Association.

among concepts. Figure 29.6 shows Carleys maps of two of the texts. Carleys approach is promising because it combines the automation of word counts with the sensitivity of human intuition and interpretation. As Carley recognizes, however, a lot depends on who does the coding. Different coders will produce different maps by making different coding choices. In the end, native-language competence is one of the fundamental methodological requirements for analysis (see also Carley, 1997; Carley & Kaufer, 1993; Carley &

Palmquist, 1992; Palmquist, Carley, & Dale, 1997). Key-words-in-context, word counts, structural analysis, and cognitive maps all reduce text to the fundamental meanings of specific words. These reductions make it easy for researchers to identify general patterns and make comparisons across texts. With the exception of KWIC, however, these techniques remove words from the contexts in which they occur. Subtle nuances are likely to be lostwhich brings us to the analysis of whole texts.

780

METHODS OF COLLECTING AND ANALYZING EMPIRICAL MATERIALS


experience. Morse also suggests 30-50 interviews for ethnographies and grounded theory studies. Finding themes and building theory may require fewer cases than comparing across groups and testing hypotheses or models. Once the researcher has established a sample of texts, the next step is to identify the basic units of analysis. The units may be entire texts (books, interviews, responses to an open-ended question on a survey), grammatical segments (words, word senses, sentences, themes, paragraphs), formatting units (rows, columns, or pages), or simply chunks of text that reflect a single themewhat Krippendorf (1980, p. 62) calls thematic units. In general, where the objective is to compare across texts (as in the case of classical content analysis), the units of analysis need to be nonoverlapping. (For discussion of additional kinds of units of analysis, see Krippendorf, 1980, pp. 57-64; Tesch, 1990.)

Analyzing Chunks of Text: Coding


Coding is the heart and soul of whole-text analysis. Coding forces the researcher to make judgments about the meanings of contiguous blocks of text. The fundamental tasks associated with coding are sampling, identifying themes, building codebooks, marking texts, constructing models (relationships among codes), and testing these models against empirical data. We outline each task below. We then describe some of the major coding traditions: grounded theory, schema analysis, classic content analysis, content dictionaries, analytic induction, and ethnographic decision trees. We want to emphasize that no particular tradition, whether humanistic or positivistic, has a monopoly on text analysis.

Sampling
Investigators must first identify a corpus of texts, and then select the units of analysis within the texts. Selection can be either random or purposive, but the choice is not a matter of cleaving to one epistemological tradition or another. Waitzkin and Britt (1993) did a thoroughgoing interpretive analysis of encounters between patients and doctors by selecting 50 texts at random from 336 audiotaped encounters. Trost (1986) used classical content analysis to test how the relationships between teenagers and their families might be affected by five different dichotomous variables. He intentionally selected five cases from each of the 32 possible combinations of the five variables and conducted 32 5 = 160 interviews. Samples may also be based on extreme or deviant cases, cases that illustrate maximum variety on variables, cases that are somehow typical of a phenomenon, or cases that confirm or disconfirm a hypothesis. (For reviews of nonrandom sampling strategies, see Patton, 1990, pp. 169-186; Sandelowski, 1995b.) A single case may be sufficient to display something of substantive importance, but Morse (1994) suggests using at least six participants in studies where one is trying to understand the essence of

Finding Themes
Themes are abstract (and often fuzzy) constructs that investigators identify before, during, and after data collection. Literature reviews are rich sources for themes, as are investigators own experiences with subject matter. More often than not, however, researchers induce themes from the text itself. There is more than one way to induce themes. Grounded theorists suggest a careful, line-by-line reading of the text while looking for processes, actions, assumptions, and consequences. Schema analysts suggest looking for metaphors, for repetitions of words, and for shifts in content (Agar & Hobbs, 1985). Content analysts have used KWIC to identify different meanings. Spradley (1979, pp. 199-201) suggests looking for evidence of social conflict, cultural contradictions, informal methods of social control, things that people do in managing impersonal social relationships, methods by which people acquire and maintain achieved and ascribed status, and information about how people solve problems. Each of these arenas is likely to yield major themes in cultures. Barkin, Ryan, and Gelberg (1999) had multiple coders inde-

Data Management and Analysis Methods


pendently sort informants statements into thematic piles. They then used multidimensional scaling and cluster analysis on the pile-sort data to identify subthemes shared across coders. (For another example, see Patterson, Bettini, & Nussbaum, 1993.) Willms et al. (1990) and Miles and Huberman (1994) suggest that researchers start with some general themes derived from reading the literature and add more themes and subthemes as they go. Shelley (1992) followed this advice in her study of how social networks affect people with end-stage kidney disease. She used the Outline of Cultural Materials (Murdock, 1971) as the basis of her coding scheme and then added additional themes based on a close reading of the text. Bulmer (1979) lists 10 different sources of themes, including literature reviews, professional definitions, local commonsense constructs, and researchers values and prior experiences. He also notes that investigators general theoretical orientations, the richness of the existing literature, and the characteristics of the phenomena being studied influence the themes researchers are likely to find. No matter how the researcher actually does inductive coding, by the time he or she has identified the themes and refined them to the point where they can be applied to an entire corpus of texts, a lot of interpretive analysis has already been done. Miles and Huberman (1994) say simply, Coding is analysis (p. 56).

781

Building Codebooks
Codebooks are simply organized lists of codes (often in hierarchies). How a researcher can develop a codebook is covered in detail by Dey (1993, pp. 95-151), Crabtree and Miller (1992), and Miles and Huberman (1994, pp. 55-72). MacQueen, McLellan, Kay, and Milstein (1998) suggest that a good codebook should include a detailed description of each code, inclusion and exclusion criteria, and exemplars of real text for each theme. If a theme is particularly abstract, we suggest that the researcher also provide examples of the themes

boundaries and even some cases that are closely related but not included within the theme. Coding is supposed to be data reduction, not proliferation (Miles, 1979, pp. 593-594). The codes themselves are mnemonic devices used to identify or mark the specific themes in a text. They can be either words or numberswhatever the researcher finds easiest to remember and to apply. Qualitative researchers working as a team need to agree up front on what to include in their codebook. Morse (1994) suggests beginning the process with a group meeting. MacQueen et al. (1998) suggest that a single team member should be designated Keeper of the Codebookwe strongly agree. Good codebooks are developed and refined as the research goes along. Kurasaki (1997) interviewed 20 sanseithird-generation Japanese Americansand used a grounded theory approach to do her analysis of ethnic identity. She started with seven major themes. As the analysis progressed, she split the major themes into subthemes. Eventually, she combined two of the major themes and wound up with six major themes and a total of 18 subthemes. (Richards & Richards, 1995, discuss the theoretical principles related to hierarchical coding structures that emerge out of the data. Araujo, 1995, uses an example from his own research on the traditional British manufacturing industry to describe the process of designing and refining hierarchical codes.) The development and refinement of coding categories have long been central tasks in classical content analysis (see Berelson, 1952, pp. 147-168; Holsti, 1969, pp. 95-126) and are particularly important in the construction of concept dictionaries (Deese, 1969; Stone et al., 1966, pp. 134-168). Krippendorf (1980, pp. 71-84) and Carey, Morgan, and Oxtoby (1996) note that much of codebook refinement comes during the training of coders to mark the text and in the act of checking for intercoder agreement. Disagreement among multiple coders shows when the codebook is ambiguous and confusing. The first run also allows the researcher to identify good examples to include in the codebook.

782

METHODS OF COLLECTING AND ANALYZING EMPIRICAL MATERIALS


schema analysts (Quinn, 1997), ethnographic decision modelers (Gladwin, 1989), and scholars who use analytic induction (Bloor, 1976; Cressey, 1953/1971; Lindesmith, 1947/1968). In ethnographic decision modeling and in classical content analysis, models are built on one set of data and tested on another. In their original formulation, Glaser and Strauss (1967) emphasized that building grounded theory models is a step in the research process and that models need to be validated. Grounded theorists and schema analysts today are more likely to validate their models by seeking confirmation from expert informants than by analyzing a second set of data. For example, Kearney, Murphy, and Rosenbaum (1994) checked the validity of their model of crack mothers experiences by presenting it to knowledgeable respondents who were familiar with the research. Regardless of the kind of reliability and validity checks, models are simplifications of reality. They can be made more or less complicated and may capture all or only a portion of the variance in a given set of data. It is up to the investigator and his or her peers to decide how much a particular model is supposed to describe. Below we review some of the most common methods researchers use to analyze blocks of texts. These include grounded theory, schema analysis, classical content analysis, content dictionaries, analytic induction, and ethnographic decision tree analysis.

Marking Texts
The act of coding involves the assigning of codes to contiguous units of text. Coding serves two distinct purposes in qualitative analysis. First, codes act as tags to mark off text in a corpus for later retrieval or indexing. Tags are not associated with any fixed units of text; they can mark simple phrases or extend across multiple pages. Second, codes act as values assigned to fixed units (see Bernard, 1991, 1994; Seidel & Kelle, 1995). Here, codes are nominal, ordinal, or ratio scale values that are applied to fixed, nonoverlapping units of analysis. The nonoverlapping units can be texts (such as paragraphs, pages, documents), episodes, cases, or persons. Codes as tags are associated with grounded theory and schema analysis (reviewed below). Codes as values are associated with classic content analysis and content dictionaries. The two types of codes are not mutually exclusive, but the use of one glosscodefor both concepts can be misleading.

Analyzing Chunks of Texts: Building Conceptual Models


Once the researcher identifies a set of things (themes, concepts, beliefs, behaviors), the next step is to identify how these things are linked to each other in a theoretical model (Miles & Huberman, 1994, pp. 134-137). Models are sets of abstract constructs and the relationships among them (Bulmer, 1979). Grounded theory, schema analysis, ethnographic decision modeling, and analytic induction all include model-building phases. Once a model starts to take shape, the researcher looks for negative casescases that dont fit the model. Negative cases either disconfirm parts of a model or suggest new connections that need to be made. In either instance, negative cases need to be accommodated. Negative case analysis is discussed in detail by Becker, Geer, Hughes, and Strauss (1961, pp. 37-45), Strauss and Corbin (1990, pp. 108-109), Lincoln and Guba (1985, pp. 309-313), Dey (1993, pp. 226-233), Miles and Huberman (1994, p. 271), and Becker (1998), and is used by

Grounded Theory
Grounded theorists want to understand peoples experiences in as rigorous and detailed a manner as possible. They want to identify categories and concepts that emerge from text and link these concepts into substantive and formal theories. The original formulation of the method (Glaser & Strauss, 1967) is still useful, but later works are easier to read and more practical (Charmaz, 1990; Lincoln & Guba, 1985; Lonkila, 1995; Strauss, 1987). Strauss and Corbin (1990), Dey (1993), and Becker (1998) provide especially useful guidance. (For some recent examples of grounded theory research, see Hunt & Ropo, 1995; Irurita, 1996; Kearney et

Data Management and Analysis Methods


al., 1994; Kearney, Murphy, Irwin, & Rosenbaum, 1995; Sohier, 1993; Strauss & Corbin, 1997; Wilson & Hutchinson, 1996; Wright, 1997.) Grounded theory is an iterative process by which the analyst becomes more and more grounded in the data and develops increasingly richer concepts and models of how the phenomenon being studied really works. To do this, the grounded theorist collects verbatim transcripts of interviews and reads through a small sample of text (usually line by line). Sandelowski (1995a) observes that analysis of texts begins with proofreading the material and simply underlining key phrases because they make some as yet inchoate sense (p. 373). In a process called open coding, the investigator identifies potential themes by pulling together real examples from the text (Agar, 1996; Bernard, 1994; Bogdan & Biklen, 1992; Lincoln & Guba, 1985; Lofland & Lofland, 1995; Strauss & Corbin, 1990; Taylor & Bogdan, 1984). Identifying the categories and terms used by informants themselves is called in vivo coding (Strauss & Corbin, 1990). As grounded theorists develop their concepts and categories, they often decide they need to gather more data from informants. As coding categories emerge, the investigator links them together in theoretical models. One technique is to compare and contrast themes and concepts. When, why, and under what conditions do these themes occur in the text? Glazer and Strauss (1967, pp. 101-116) refer to this as the constant comparison method, and it is similar to the contrast questions Spradley (1979, pp. 160-172) suggests researchers ask informants. (For other good descriptions of the comparison method, see Glaser, 1978, pp. 56-72; Strauss & Corbin, 1990, pp. 84-95.) Another useful tool for building theoretical models is the conditional matrix described by Strauss and Corbin (1990, pp. 158-175). The conditional matrix is a set of concentric circles, each level corresponding to a different unit of influence. At the center are actions and interactions; the outer rings represent international and national concerns, and the inner rings rep-

783

resent individual and small group influences on action. The matrix is designed to help investigators to be more sensitive to conditions, actions/interactions, and consequences of a phenomenon and to order these conditions and consequences into theories. Memoing is one of the principal techniques for recording relationships among themes. Strauss and Corbin (1990, pp. 18, 73-74, 109-129, 197-219) discuss three kinds of memos: code notes, theory notes, and operational notes. Code notes describe the concepts that are being discovered in the discovery of grounded theory. In theory notes, the researcher tries to summarize his or her ideas about what is going on in the text. Operational notes are about practical matters. Once a model starts to take shape, the researcher uses negative case analysis to identify problems and make appropriate revisions. The end results of grounded theory are often displayed through the presentation of segments of textverbatim quotes from informantsas exemplars of concepts and theories. These illustrations may be prototypical examples of central tendencies or they may represent exceptions to the norm. Grounded theory researchers also display their theoretical results in maps of the major categories and the relationships among them (Kearney et al., 1995; Miles & Huberman, 1994, pp. 134-137). These concept maps are similar to the personal semantic networks described by Leinhardt (1987, 1989), Strauss (1992), and DAndrade (1991) (see below).

Schema Analysis
Schema analysis combines elements of the linguistic and sociological traditions. It is based on the idea that people must use cognitive simplifications to help make sense of the complex information to which they are constantly exposed (Casson, 1983, p. 430). Schank and Abelson (1977) postulate that schemataor scripts, as they call themenable culturally skilled people to fill in details of a story or event. It is, says Wodak (1992, p. 525), our schemata that lead us to interpret Mona Lisas smile as evidence of her perplexity or her desperation.

784

METHODS OF COLLECTING AND ANALYZING EMPIRICAL MATERIALS


that everyone knows. Thus she looks for what is not said in order to identify underlying cultural assumptions (p. 314). For more examples of the search for cultural schemata in texts, see Hollands (1985) study of the reasoning that Americans apply to interpersonal problems, Kemptons (1987) study of ordinary Americans theories of home heat control, Claudia Strausss (1997) study of what chemical plant workers and their neighbors think about the free enterprise system, and Agar and Hobbss (1985) analysis of how an informant became a burglar. We next turn to the two other methods used across the social sciences for analyzing text: classical content analysis and content dictionaries.

From a methodological view, schema analysis is similar to grounded theory. Both begin with a careful reading of verbatim texts and seek to discover and link themes into theoretical models. In a series of articles, Quinn (1982, 1987, 1992, 1996, 1997) has analyzed hundreds of hours of interviews to discover concepts underlying American marriage and to show how these concepts are tied together. Quinns (1997) method is to exploit clues in ordinary discourse for what they tell us about shared cognitionto glean what people must have in mind in order to say the things they do (p. 140). She begins by looking at patterns of speech and the repetition of key words and phrases, paying particular attention to informants use of metaphors and the commonalities in their reasoning about marriage. Quinn found that the hundreds of metaphors in her corpus of texts fit into just eight linked classes, which she calls lastingness, sharedness, compatibility, mutual benefit, difficulty, effort, success (or failure), and risk of failure. Metaphors and proverbs are not the only linguistic features used to infer meaning from text. DAndrade (1991) notes that perhaps the simplest and most direct indication of schematic organization in naturalistic discourse is the repetition of associative linkages (p. 294). He observes that indeed, anyone who has listened to long stretches of talkwhether generated by a friend, spouse, workmate, informant, or patientknows how frequently people circle through the same network of ideas (p. 287). In a study of blue-collar workers in Rhode Island, Claudia Strauss (1992) refers to these ideas as personal semantic networks. She describes such a network from one of her informants. On rereading her intensive interviews with one of the workers, Strauss found that her informant repeatedly referred to ideas associated with greed, money, businessmen, siblings, and being different. She displays the relationships among these ideas by writing the concepts on a page of paper and connecting them with lines and explanations. Price (1987) observes that when people tell stories, they assume that their listeners share with them many assumptions about how the world works, and so they leave out information

Displaying Concepts and Models


Visual displays are an important part of qualitative analysis. Selecting key quotes as exemplars, building matrices or forms, and laying theories out in the form of flowcharts or maps are all potent ways to communicate ideas visually to others. Models are typically displayed using boxes and arrows, with the boxes containing themes and the arrows representing the relationships among them. Lines can be unidirectional or bidirectional. For example, taxonomies are models in which the lines represent the superand subordinate relationships among items. Relationships can include causality, association, choices, and time, to name a few. A widely used method for describing themes is the presentation of direct quotes from respondentsquotes that lead the reader to understand quickly what it may have taken the researcher months or years to figure out. The researcher chooses segments of textverbatim quotes from respondentsas exemplars of concepts, of theories, and of negative cases. Ryan (in press) has used multiple coders to identify typical quotes. He asks 10 coders to mark the same corpus of text for three themes. Ryan argues that the text marked by all the coders represents the central tendency or typical examples of the abstract constructs, whereas text marked by only some of the coders represents less typical examples and is more typical of the edges of the construct.

Data Management and Analysis Methods


Tables can be used to organize and display raw text or can be used to summarize qualitative data along multiple dimensions (rows and columns). The cells can be filled with verbatim quotes (Bernard & Ashton-Voyoucalos, 1976; Leinhardt & Smith, 1985, p. 254; Miles & Huberman, 1994, p. 130), summary statements (Yoder 1995), or symbols (Fjellman & Gladwin, 1985; Van Maanen, Miller, & Johnson, 1982). (For a range of presentation formats, see Bernard, 1994; Miles & Huberman, 1994; Werner & Schoepfle, 1987.)

785

Classical Content Analysis


Whereas grounded theory is concerned with the discovery of data-induced hypotheses, classical content analysis comprises techniques for reducing texts to a unit-by-variable matrix and analyzing that matrix quantitatively to test hypotheses. The researcher can produce a matrix by applying a set of codes to a set of qualitative data (including written texts as well as audio and video media). Unlike grounded theory or schema analysis, content analysis assumes that the codes of interest have already been discovered and described. Once the researcher has selected a sample of texts, the next step in classical content analysis is to code each unit for each of the themes or variables in the codebook. This produces a unit-by-variable matrix that can be analyzed using a variety of statistical techniques. For example, Cowan and OBrien (1990) tested whether males or females are more likely to be survivors in slasher films. Conventional wisdom about such films suggests that victims are mostly women and slashers are mostly men. Cowan and OBrien selected a corpus of 56 slasher films and identified 474 victims. They coded each victim for gender and survival. They found that slashers are mostly men, but it turned out that victims are equally likely to be male or female. Women who survive are less likely to be shown engaging in sexual behavior and are less likely to be physically attractive than their nonsurviving counterparts. Male victims are cynical, egotistical, and dictatorial. Cowan and OBrien conclude that, in slasher films, sexually

pure women survive and unmitigated masculinity leads to death (p. 195). The coding of texts is usually assigned to multiple coders so that the researcher can see whether the constructs being investigated are shared and whether multiple coders can reliably apply the same codes. Typically, investigators first calculate the percentage of agreement among coders for each variable or theme. They then apply a correction formula to take account of the fact that some fraction of agreement will always occur by chance. The amount of that fraction depends on the number of coders and the precision of measurement for each code. If two people code a theme present or absent, they could agree, ceteris paribus, on any answer 25% of the time by chance. If a theme, such as wealth, is measured ordinally (low, medium, high), then the likelihood of chance agreement changes accordingly. Cohens (196) kappa, or K, is a popular measure for taking these chances into account. When K is zero, agreement is what might be expected by chance. When K is negative, the observed level of agreement is less than one would expect by chance. How much intercoder agreement is enough? The standards are still ad hoc, but Krippendorf (1980, pp. 147-148) advocates agreement of at least .70 and notes that some scholars (e.g., Brouwer, Clark, Gerbner, & Krippendorf, 1969) use a cutoff of .80. Fleiss (1971) and Light (1971) expand kappa to handle multiple coders. For other measures of intercoder agreement, see Krippendorf (1980, pp. 147-154) and Craig (1981). Reliability concerns the extent to which an experiment, test, or any measuring procedure yields the same results on repeated trials (Carmines & Zeller, 1979, p. 11). A high level of intercoder agreement is evidence that a theme has some external validity and is not just a figment of the investigators imagination (Mitchell, 1979). Not surprisingly, investigators have suggested many ways to assess validity (for reviews of key issues, see Campbell, 1957; Campbell & Stanley, 1963; Cook & Campbell, 1979; Denzin, 1997; Fielding & Fielding, 1986; Guba, 1981; Guba & Lincoln, 1982; Hammersley, 1992; Kirk & Miller, 1986; Lincoln & Guba, 1985). Bernard (1994) argues that, ultimately, the validity of a concept depends on the utility of the device

786

METHODS OF COLLECTING AND ANALYZING EMPIRICAL MATERIALS


uses a dictionary (the Harvard Psychosocial Dictionary) to parse and assign text to coded categories. Over time, the dictionary has been updated. The latest version (Harvard IV) contains more than 10,000 words and can distinguish among multiple meanings of words (Rosenberg, Schnurr, & Oxman, 1990, p. 303). Because such dictionaries do not contain all the words in the English language, investigators can assign unrecognized words to categories as they see fit, a process of further modifying the codebook. How effective are computer-based dictionaries? An early version of the General Inquirer was tested on 66 suicide notes33 written by men who had actually taken their own lives and 33 written by men who were asked to produce simulated suicide notes. The program parsed the texts and picked the actual suicide notes 91% of the time (Ogilvie, Stone, & Schneidman, 1966). Content dictionaries do not need to be very big to be useful. Colby (1966) created a simple dictionary to distinguish between Navaho and Zuni responses to thematic apperception tests. For additional examples of special-purpose dictionaries in content analysis, see Fan and Shaffer (1990), Furbee (1996), Holsti (1966), Jehn and Werner (1993), Laffal (1990, 1995), McTavish and Pirro (1990), and Schnurr, Rosenberg, Oxman, and Tucker (1986). Content dictionaries are attractive because they are entirely reliable and automated, but, as Shapiro (1997) argues, this may be offset by a decrease in validity. For the time being, only humans can parse certain subtleties of meaning reflected in context (Viney, 1983), but computer-based dictionaries are getting better all the time. For example, texts are now scored by computer for the Gottschalk-Gleser psychological scales (measuring various forms of anxiety and hostility) with greater than .80 reliability (Gottschalk & Bechtel, 1993).

that measures it and the collective judgment of the scientific community that a construct and its measure are valid. In the end, he says, we are left to deal with the effects of our judgments, which is just as it should be. Valid measurement makes valid data, but validity itself depends on the collective opinion of researchers (p. 43). Generalizability refers to the degree to which the findings are applicable to other populations or samples. It draws on the degree to which the original data were representative of a larger population. For reviews of work in content analysis, see Pool (1959); Gerbner, Holsti, Krippendorf, Paisley, and Stone (1969); Holsti (1969); Krippendorf (1980); Weber (1990); and Roberts (1997). Examples of classical content analysis can be found in media studies (Hirschman, 1987; Kolbe & Albanese, 1996; Spiggle, 1986), political rhetoric (Kaid, Tedesco, & McKinnon, 1996), folklore (Johnson & Price-Williams, 1997), business relations (Spears, Mowen, & Chakraborty, 1996), health care delivery (Potts, Runyan, Zerger, & Marchetti, 1996; Sleath, Svarstad, & Roter, 1997), and law (Imrich, Mullin, & Linz, 1995). Classical content analysis is also the fundamental means by which anthropologists test cross-cultural hypotheses (Bradley, Moore, Burton, & White, 1990; Ember & Ember, 1992; White & Burton, 1988). For early, but fundamental, criticisms of the approach, see Kracauer (1953) and George (1959).

Content Dictionaries
Computer-based, general-purpose content analysis dictionaries allow investigators to automate the coding of texts. To build such dictionaries, researchers assign words, by hand, to one or more categories (there are typically 50-60 categories in computerized content analysis dictionaries) according to a set of rules. The rules are part of a computer program that parses new texts, assigning words to categories. Work on content dictionaries began in the 1960s with the General Inquirer and continues to this day (Kelly & Stone, 1975; Stone et al., 1966; Zuell, Weber, & Mohler, 1989). The General Inquirer is a computer program that

Analytic Induction and Boolean Tests


Analytic induction is a formal, nonquantitative method for building up causal explanations of phenomena from a close examination of

Data Management and Analysis Methods


cases. It was proposed as an alternative to statistical analysis by Znaniecki (1934, pp. 249-331), modified by Lindesmith (1947/ 1968) and Cressey (1953/1971), and is discussed by Denzin (1978), Bulmer (1979), Manning (1982), and Becker (1998), among others. (For critiques of the approach, see Robinson, 1951.) The method is a formal kind of negative case analysis. The technique can be described in a series of steps: First, define a phenomenon that requires explanation and propose an explanation. Next, examine a case to see if the explanation fits. If it does, then examine another case. An explanation is accepted until a new case falsifies it. When a case is found that doesnt fit, then, under the rules of analytic induction, the alternatives are to change the explanation (so that you can include the new case) or redefine the phenomenon (so that you exclude the nuisance case). Ideally, the process continues until a universal explanation for all known cases of a phenomenon is attained. Explaining cases by declaring them all unique is a tempting but illegitimate option. Classic examples of analytic induction include Lindesmiths (1947/1968) study of drug addicts, Cresseys (1953/1971) study of embezzlers, and McClearys (1978) study of how parole officers decide when one of their charges is in violation of parole. For a particularly clear example of the technique, see Bloors (1976, 1978) analysis of how doctors decide whether or not to remove childrens tonsils. Ragin (1987, 1994) formalized the logic of analytic induction, using a Boolean approach, and Romme (1995) applies the approach to textual data. Boolean algebra involves just two states (true and false, present and absent), but even with such simple inputs, things can get very complicated, very quickly. With just three dichotomous causal conditions (A and not A, B and not B, and C and not C) and one outcome variable (D and not D), there are 16 possible cases: A, B, C, D; A, not B, C, D; A, B, not C, D; and so on. Boolean analysis involves setting up what is known as a truth table, or a matrix of the actual versus the possible outcomes. (For more on truth tables and how they are related to

787

negative case analysis, see Becker, 1998, pp. 146-214.) Schweizer (1991, 1996) applied this method in his analysis of conflict and social status among residents of Chen Village, China. (For a discussion of Schweizers data collection and analysis methods, see Bernard & Ryan, 1998.) All the data about the actors in this political drama were extracted from a historical narrative about Chen Village. Like classic content analysis and cognitive mapping, analytic induction requires that human coders read and code text and then produce an event-by-variable matrix. The object of the analysis, however, is not to show the relationships among all codes, but to find the minimal set of logical relationships among the concepts that accounts for a single dependent variable. With more than three variables, the analysis becomes much more difficult. Computer programs such as QCA (Drass, 1980) and ANTHROPAC (Borgatti, 1992) test all possible multivariate hypotheses and find the optimal solution. (QCA is reviewed in Weitzman & Miles, 1995.)

Ethnographic Decision Models


Ethnographic decision models (EDMs) are qualitative, causal analyses that predict behavioral choices under specific circumstances. An EDM, often referred to as a decision tree or flowchart, comprises a series of nested if-then statements that link criteria (and combinations of criteria) to the behavior of interest (Figure 29.7). EDMs have been used to explain how fishermen decide where to fish (Gatewood, 1983), what prices people decide to place on their products (Gladwin, 1971; Quinn, 1978), and which treatments people choose for an illness (Mathews & Hill, 1990; Ryan & Martnez, 1996; Young, 1980). EDMs combine many of the techniques employed in grounded theory and classic content analysis. Gladwin (1989) lays out the fundamental steps to building an ethnographic decision tree model. (For other clear descriptions of the steps, see Hill, 1998; Ryan & Martnez, 1996.) EDMs require exploratory data collection, preliminary model building, and model testing. First, researchers identify the decisions they want

788
u

Figure 29.7. Decision Model of Constraints on the Use of Pills or Liquid Medications for Mothers Treating Children with Diarrhea in Rural Mexico
SOURCE: Based on data in Ryan and Martnez (1996).

Data Management and Analysis Methods


to explore and the alternatives that are available. Typically, EDMs are done on simple yes/no types of behaviors. They can be used, however, to predict multiple behaviors (Mathews & Hill, 1990; Young, 1980) as well as the order of multiple behaviors (Ryan & Martnez, 1996). Next, the researchers conduct open-ended interviews to discover the criteria people use to select among alternatives. The researchers first ask people to recall the most recent example of an actualnot a hypotheticalbehavior and to recall why they did or did not do the behavior. Here is an example from a study weve done recently: Think about the last time you had a can of something to drink in your handsoda, juice, water, beer, whatever. Did you recycle the can? Why [Why not]? This kind of question generates a list of decision criteria. To understand how these criteria might be linked, EDM researchers ask people to compare the latest decision with other similar decisions made in the past. Some researchers have used vignettes to elicit the relationships among criteria (e.g., Weller, Ruebush, & Klein, 1997; Young, 1980). With a list of decision criteria in hand, the researchers next step is to systematically collect data, preferably from a new group of people, about how each criterion applies or does not apply to a recent example of the behavior. Was a recycling bin handy? and Do you normally recycle cans at home? are 2 of the 30 questions weve asked people in our study of recycling behavior. The data from this stage are used for to build a preliminary model of the decision process for the behavior under scrutiny. Cases that do not fit the model are examined closely and the model is modified. Researchers tweak, or tune, the model until they achieve a satisfactory level of postdictive accuracyunderstood to be at least 80% among EDM researchers. Parsimonious models are favored over more complicated ones. (For automated ways of building and pruning decision trees, see Mingers, 1989a, 1989b.) The process doesnt end therethe same data are used in building a preliminary model and in testing its postdictive accuracy. When EDM researchers feel confident in their model,

789

they test it on an independent sample to see if it predicts as well as it postdicts. Typically, EDMs predict more than 80% of whatever behavior is being modeled, far above what we expect by chance. (For more detailed arguments on how to calculate accuracy in EDMs, see Ryan & Martnez, 1996; Weller et al., 1997.) Because of the intensive labor involved, EDMs have been necessarily restricted to relatively simple decisions in relatively small and homogeneous populations. Recently, however, we found we could effectively test, on a nationally representative sample, our ethnographically derived decision models for whether or not to recycle cans and whether or not to ask for paper or plastic bags at the grocery store (Bernard, Ryan, & Borgatti, 1999). EDMs can be displayed as decision trees (e.g., Gladwin, 1989), as decision tables (Mathews & Hill, 1990; Young, 1980), or as sets of rules in the form of if-then statements (Ryan & Martnez, 1996). Like componential analysis, folk taxonomies, and schema analysis, EDMs represent an aggregate decision process and do not necessarily represent what is going on inside peoples heads (Garro, 1998).

Breaking Down the Boundaries

Text analysis as a research strategy permeates the social sciences, and the range of methods for conducting text analysis is inspiring. Investigators examine words, sentences, paragraphs, pages, documents, ideas, meanings, paralinguistic features, and even what is missing from the text. They interpret, mark, retrieve, and count. By turns, they apply interpretive analysis and numerical analysis. They use text analysis for exploratory and confirmatory purposes. Researchers identify themes, describe them, and compare them across cases and groups. Finally, they combine themes into conceptual models and theories to explain and predict social phenomena. Figure 29.1 depicts a broad range of analysis techniques found across the social sciences. To

790

METHODS OF COLLECTING AND ANALYZING EMPIRICAL MATERIALS


combined methods to understand their data more fully. Jehn and Doucet (1996, 1997) used word counts, classical content analysis, and mental mapping to examine conflicts among Chinese and U.S. business associates. They asked 76 U.S. managers who had worked in Sino-American joint ventures to describe recent interpersonal conflicts with business partners. Each person described a situation with a same-culture manager and a different-cultural manager. The researchers made sure that each manager interviewed included information about his or her relationship to the other person, who was involved, what the conflict was about, what caused the conflict, and how the conflict was resolved. After collecting the narratives, Jehn and Doucet asked their informants to help identify the emic themes in the narratives. First, they generated separate lists of words from the intercultural and intracultural conflict narratives. They asked three expatriate managers to act as judges and to identify all the words that were related to conflict. They settled on a list of 542 conflict words from the intercultural list and 242 conflict words from the intracultural list. Jehn and Doucet then asked the three judges to sort the words into piles or categories. The experts identified 15 subcategories for the intercultural data (things like conflict, expectations, rules, power, and volatile) and 15 categories for the intracultural data (things like conflict, needs, standards, power, contentious, and lose). Taking into consideration the total number of words in each corpus, conflict words were used more in intracultural interviews and resolution terms were more likely to be used in intercultural interviews. Jehn and Doucet also used traditional content analysis on their data. The had two coders read the 152 conflict scenarios (76 intracultural and 76 intercultural) and evaluate (on a 5-point scale) each on 27 different themes they had identified from the literature. This produced two 76 27 scenario-by-theme profile matrices one for the intracultural conflicts and one for the intercultural conflicts. The first three factors

conform our presentation with the literature on qualitative methods, we have organized these techniques according to the goals of the investigators and the kinds of texts to which the techniques are typically applied. In this chapter, we focus on the sociological tradition that uses text as a window into experience rather than the linguistic tradition that describes how texts are developed and structured. Texts such as conversations, performances, and narratives are analyzed by investigators from both the sociological and linguistic traditions. Although the agendas of the investigators may differ, we see no reason many of the sociological techniques we describe could not be useful in the linguistic tradition and vice versa. We also distinguish between those analyses associated with systematically elicited data and those associated with free-flowing texts. We argue, however, that these data-analytic pairings are ones of convention rather than necessity. Investigators want to (a) identify the range and salience of key items and concepts, (b) discover the relationships among these items and concepts, and (c) build and test models linking these concepts together. They use free-listing tasks, KWIC, word counts, and the exploratory phases of grounded theory, schema analysis, and EDM to discover potentially useful themes and concepts. Researchers use pile sorts, paired comparisons, triads tests, frame substitution tasks, semantic networks, cognitive maps, content analysis and content dictionaries, and the modeling phases of grounded theory, schema analysis, and EDM to discover how abstract concepts are related to each other. They display the relationships as models or frameworks. These frameworks include formal models that rely on Boolean logic (componential analysis and analytic induction), hierarchical models (taxonomies and ethnographic decision models), probabilistic models (classic content analysis and content dictionaries), and more abstract models such as those produced by grounded theory and schema analysis. Below we describe two important examples of studies in which researchers

Data Management and Analysis Methods


from the intercultural matrix reflect (a) interpersonal animosity and hostility, (b) aggravation, and (c) the volatile nature of the conflict. The first two factors from the intracultural matrix reflect (a) hatred and animosity with a volatile nature and (b) conflicts conducted calmly with little verbal intensity. Finally, Jehn and Doucet identified the 30 intracultural and the 30 intercultural scenarios that they felt were the clearest and pithiest. They recruited 50 more expatriate managers to assess the similarities (on a 5-point scale) of 60-120 randomly selected pairs of scenarios. When combined across informants, the managers judgments produced two aggregate, scenario-by-scenario, similarity matricesone for the intracultural conflicts and one for the intercultural conflicts. Multidimensional scaling of the intercultural similarity data identified four dimensions: (a) open versus resistant to change, (b) situational causes versus individual traits, (c) high- versus low-resolution potential based on trust, and (d) high- versus low-resolution potential based on patience. Scaling of the intracultural similarity data identified four different dimensions: (a) high versus low cooperation, (b) high versus low confrontation, (c) problem solving versus accepting, and (d) resolved versus ongoing. The work of Jehn and Doucet is impressive because the analysis of the data from these tasks produced different sets of themes. All three emically induced theme sets have some intuitive appeal, and all three yield analytic results that are useful. The researchers could have also used the techniques of grounded theory or schema analysis to discover even more themes. Jehn and Doucet are not the only researchers ever to combine different analytic techniques. In a series of articles on young adult occasional drug users, Agar (1979, 1980, 1983) used grounded theory methods to build models of behavior. He then used classical content analysis to test his hypotheses. Agar conducted and transcribed three interviews with each of his three informants. In his 1979 article, Agar describes his initial, intuitive analysis. He

791

pulled all the statements that pertained to informants interactions or assessments of other people. He then looked at the statements and sorted them into piles based on their content. He named each pile as a theme and assessed how the themes interacted. He found that he had three piles. The first contained statements in which the informant was expressing negative feelings for a person in a dominant social position. The second was made up of statements emphasizing the others knowledge or awareness. The statements in the third small cluster emphasized the importance of change or openness to new experiences. From this intuitive analysis, Agar felt that his informants were telling him that those in authority were only interested in displaying their authority unless they had knowledge or awareness; knowledge or awareness comes through openness to new experience; most in authority are closed to new experience or change. To test his intuitive understanding of the data, Agar (1983) used all the statements from a single informant and coded the statements for their role type (kin, friend/acquaintance, educational, occupational, or other), power (dominant, symmetrical, subordinate, or undetermined), and affect (positive, negative, ambivalent, or absent). Agar was particularly interested in whether negative sentiments were expressed toward those in dominant social roles. For one informant, Agar found that out of 40 statements coded as dominant, 32 were coded negative and 8 were coded positive. For the 36 statements coded as symmetrical, 20 were coded positive and 16 negative, lending support to his original theory. Next, Agar looked closely at the deviant casesthe 8 statements where the informant expressed positive affect toward a person in a dominant role. These counterexamples suggested that the positive affect was expressed toward a dominant social other when the social other possessed, or was communicating to the informant, knowledge that the informant valued. Finally, Agar (1980) developed a more systematic questionnaire to test his hypothesis further. He selected 12 statements, 4 from each of the control, knowledge, and change themes iden-

792

METHODS OF COLLECTING AND ANALYZING EMPIRICAL MATERIALS


others, make it easier and easier for researchers to identify themes, build codebooks, mark text, create memos, and develop theoretical models. Based loosely on a grounded theory type of approach to qualitative analysis, many program suites have recently folded in techniques from classical content analysis. Several programs, for example, allow researchers to export data to matrices that they can then analyze using other programs. Investigators, however, remain constrained by program-defined units of analysisusually marked blocks of text or informants. Researchers need the flexibility to create matrices on demand, whether they be word-by-theme or word-by-informant matrices for word analysis and sentence-by-code or paragraph-by-code matrices for content analysis. A series of word analysis functions would greatly enhance the automated coding features found in programs that are geared to the interests of scholars in the grounded theory school. Investigators should be able to code a section of text using grounded theory, then identify the key words associated with each theme. They should be able to use key words to search for additional occurrences of the theme in large corpuses of text. When programs make it easy to use multiple coders and to identify intercoder agreements and disagreements systematically, researchers will be better able to describe themes and to train assistants. Adding a variety of measures for calculating intercoder agreement, which only some programs do, would also be helpful. Some programs offer researchers the option of recording the marking behavior of multiple coders, yet offer no direct way to measure intercoder agreement. The evolution of text analysis software is just beginning. Some 15 years ago, spell checkers, thesauruses, and scalable fonts were all sold separately. Today, these functions are integrated into all full-featured word-processing packages. Just 10 years ago, graphics programs were sold separately from programs that do statistical analysis. Today, graphics functions are integrated into all full-featured packages for statistical analysis. As programmers of text analysis software compete for market share, packages

tified earlier. He matched these statements with eight roles from the informants transcript (father, mother, employer, teacher, friend, wife, coworker, and teammate). Agar then returned to his informant and asked if the resulting statements were true, false, or irrelevant. (In no case did the informant report irrelevant.) Agar then compared the informants responses to his original hypotheses. He found that on balance his hypotheses were correct, but discrepancies between his expectations and his results suggested areas for further research. These examples show that investigators can apply one technique to different kinds of data and they can apply multiple techniques to the same data set. Text analysis is used by avowed positivists and interpretivists alike. As we have argued elsewhere (Bernard, 1993; Bernard & Ryan, 1998), methods are simply tools that belong to everyone.

Whats Next?

We do not want to minimize the profound intellectual differences in the epistemological positions of positivists and interpretivists. We think, however, that when researchers can move easily and cheaply between qualitative and quantitative data collection and analysis, the distinctions between the two epistemological positions will become of less practical importance. That is, as researchers recognize the full array of tools at their disposal, and as these tools become easier to use, the pragmatics of research will lessen the distinction between qualitative and quantitative data and analysis. The process is under wayand is moving fastwith the development of increasingly useful software tools for qualitative data analysis. Useful tools create markets, and market needs create increasingly useful tools. Qualitative data analysis packages (ATLAS/ti, NUDIST, Code-A-Text, the Ethnograph, AnSWR, and others) have improved dramatically over the past few years (Fischer, 1994; Kelle, 1995; Weitzman & Miles, 1995). These products, and

Data Management and Analysis Methods


will become more inclusive, incorporating methods from both sides of the epistemological divide. It cant happen too soon.

793

Notes

1. MDS displays are highly evocative. They beg to be interpreted. In fact, they must be interpreted. Why are some illnesses at the top of Figure 29.3 and some at the bottom? We think the illnesses at the top are more of the chronic variety, whereas those at the bottom are more acute. We also think that the illnesses on the left are less serious than those on the right. We can test ideas like these by asking key informants to help us understand the arrangement of the illnesses in the MDS plot. (For more examples of mental maps, see Albert, 1991; DAndrade et al., 1972; Erickson, 1997.) (There is a formal method, called property fitting analysis, or PROFIT, for testing ideas about the distribution of items in an MDS map. This method is based on linear regression. See Kruskal & Wish, 1978.) 2. Alternatively, profile matrices (the usual thing-by-variable attribute matrix ubiquitous in the social sciences) can be converted to similarity matrices (thing-by-thing matrices in which the cells contain measures of similarity among pairs of things) and then analyzed with MDS (for step-by-step instructions, see Borgatti, 1999).

References

Agar, M. (1979). Themes revisited: Some problems in cognitive anthropology. Discourse Processes, 2, 11-31. Agar, M. (1980). Getting better quality stuff: Methodological competition in an interdisciplinary niche. Urban Life, 9, 34-50. Agar, M. (1983). Microcomputers as field tools. Computers and the Humanities, 17, 19-26. Agar, M. (1996). Speaking of ethnography (2nd ed.). Thousand Oaks, CA: Sage. Agar, M., & Hobbs, J. (1985). How to grow schemata out of interviews. In J. W D. . Dougherty (Ed.), Directions in cognitive an-

thropology (pp. 413-431). Urbana: University of Illinois Press. Albert, S. M. (1991). Cognition of caregiving tasks: Multidimensional scaling of the caregiver task domain. Gerontologist, 31, 726-734. Allen, J. T., & Italie, G. (1954). A concordance to Euripides. Berkeley: University of California Press. Araujo, L. (1995). Designing and refining hierarchical coding frames. In U. Kelle (Ed.), Computer-aided qualitative data analysis: Theory, methods and practice (pp. 96-104). London: Sage. Barkin, S., Ryan, G. W & Gelberg, L. (1999). ., What clinicians can do to further youth violence primary prevention: A qualitative study. Injury Prevention, 5, 53-58. Barnett, G. A., & Danowski, J. A. (1992). The structure of communication: A network analysis of the International Communication Association. Human Communication Research, 19, 164-285. Becker, H. S. (1998). Tricks of the trade: How to think about your research while youre doing it. Chicago: University of Chicago Press. Becker, H. S., Geer, B., Hughes, E. C., & Strauss, A. L. (1961). Boys in white: Student culture in medical school. Chicago: University of Chicago Press. Berelson, B. (1952). Content analysis in communication research. Glencoe, IL: Free Press. Bernard, H. R. (1991). About text management and computers. CAM Newsletter, 3(1), 1-4, 7, 12. Bernard, H. R. (1993). Methods belong to all of us. In R. Borofsky (Ed.), Assessing cultural anthropology (pp. 168-178). New York: McGraw-Hill. Bernard, H. R. (1994). Research methods in anthropology: Qualitative and quantitative approaches (2nd ed.). Walnut Creek, CA: AltaMira. Bernard, H. R., & Ashton-Voyoucalos, S. (1976). Return migration to Greece. Journal of the Steward Anthropological Society, 8(1), 31-51. Bernard, H. R., & Ryan, G. W (1998). Qualita. tive and quantitative methods of text analysis. In H. R. Bernard (Ed.), Handbook of research methods in cultural anthropology (pp. 595-646). Walnut Creek, CA: AltaMira. Bernard, H. R., Ryan, G. W & Borgatti, S. ., (1999). Green cognition and behaviors. Re-

794

METHODS OF COLLECTING AND ANALYZING EMPIRICAL MATERIALS


Burton, D. M. (1981b). Automated concordances and word indexes: The process, the programs, and the products. Computers and the Humanities, 15, 139-154. Burton, D. M. (1982). Automated concordances and word indexes: Machine decisions and editorial revisions. Computers and the Humanities, 16, 195-218. Campbell, D. T. (1957). Factors relevant to the validity of experiments in social settings. Psychological Bulletin, 54, 297-312. Campbell, D. T., & Stanley, J. C. (1963). Experimental and quasi-experimental designs for research. Chicago: Rand McNally. Carey, J. W Morgan, M., & Oxtoby, M. J. ., (1996). Intercoder agreement in analysis of responses to open-ended interview questions: Examples from tuberculosis research. Cultural Anthropology Methods Journal, 8(3), 1-5. Carley, K. (1993). Coding choices for textual analysis: A comparison of content analysis and map analysis. In P Marsden (Ed.), Socio. logical methodology (pp. 75-126). Oxford: Blackwell. Carley, K. (1997). Network text analysis: The network position of concepts. In C. W Rob. erts (Ed.), Text analysis for the social sciences: Methods for drawing statistical inferences from texts and transcripts (pp. 79-100). Mahwah, NJ: Lawrence Erlbaum. Carley, K., & Kaufer, D. S. (1993). Semantic connectivity: An approach for analyzing semantic networks. Communication Theory, 3, 182-213. Carley, K., & Palmquist, P (1992). Extracting, . representing, and analyzing mental models. Social Forces, 70, 601-636. Carmines, E. G., & Zeller, R. A. (1982). Reliability and validity assessment. Beverly Hills, CA: Sage. Casson, R. (1983). Schemata in cultural anthropology. Annual Review of Anthropology, 12, 429-462. Charmaz, K. (1990). Discovering chronic illness: Using grounded theory. Social Science and Medicine, 30, 1161-1172. Cohen, J. (1960). A coefficient of agreement for nominal scales. Educational and Psychological Measurement, 20, 37-48. Colby, B. N. (1966). The analysis of culture content and the patterning of narrative concern

port submitted to Ford Research Laboratories, Dearborn, MI. Bessinger, J. B. (1969). A concordance to Beowulf. Ithaca, NY: Cornell University Press. Bloor, M. (1976). Bishop Berkeley and the adenotonsillectomy dilemma. Sociology, 10, 43-61. Bloor, M. (1978). On the analysis of observational data: A discussion of the worth and uses of inductive techniques and respondent validation. Sociology, 12, 545-557. Bogdan, R. C., & Biklen, S. K. (1992). Qualitative research for education: An introduction to theory and methods (2nd ed.). Boston: Allyn & Bacon. Borgatti, S. P (1992). ANTHROPAC 4.0. Co. lumbia, SC: Analytic Technologies. Available Internet: http://www.analytictech.com Borgatti, S. P (1998). The methods. In V C. De . . Munck & E. J. Sobo (Eds.), Using methods in the field: A practical introduction and casebook (pp. 249-252). Walnut Creek, CA: AltaMira. Borgatti, S. P (1999). Elicitation methods for . cultural domain analysis. In J. Schensul, M. LeCompte, S. Borgatti, & B. Nastasi (Eds.), The ethnographers toolkit: Vol. 3. Enhanced ethnographic methods (pp. 115-151). Walnut Creek, CA: AltaMira. Boster, J. (1994). The successive pile sort. Cultural Anthropology Methods Journal, 6(2), 11-12. Bradley, C., Moore, C. C., Burton, M. L., & White, D. R. (1990). A cross-cultural historical analysis of subsistence change. American Anthropologist, 92, 447-457. Brouwer, M., Clark, C. C., Gerbner, G., & Krippendorf, K. (1969). The television world of violence. In R. K. Baker & S. J. Ball (Eds.), Mass media and violence: A report to the National Commission on the Causes and Prevention of Violence (pp. 311-339, 519-591). Washington, DC: Government Printing Office. Bulmer, M. (1979). Concepts in the analysis of qualitative data. Sociological Review, 27, 651-677. Burton, D. M. (1981a). Automated concordances and word indexes: The early sixties and the early centers. Computers and the Humanities, 15, 83-100.

Data Management and Analysis Methods


in texts. American Anthropologist, 68, 374-388. Conklin, H. (1955). Hanuno color categories. Southwest Journal of Anthropology, 11, 339-344. Cook, T. D., & Campbell, D. T. (1979). Quasi-experimentation: Design and analysis issues for field settings. Chicago: Rand McNally. Cowan, G., & OBrien, M. (1990). Gender and survival versus death in slasher films: A content analysis. Sex Roles, 23(3-4), 187-196. Crabtree, B. F., & Miller, W L. (1992). A tem. plate approach to text analysis: Developing and using codebooks. In B. F. Crabtree & W . L. Miller (Eds.), Doing qualitative research (pp.2093-109). Newbury Park, CA: Sage. Craig, R. T. (1981). Generalization of Scotts index of intercoder agreement. Public Opinion Quarterly, 45, 260-264. Cressey, D. R. (1971). Other peoples money: A study in the social psychology of embezzlement. Montclair, NJ: Patterson Smith. (Original work published 1953) DAndrade, R. (1991). The identification of schemas in naturalistic data. In M. J. Horowitz (Ed.), Person schemas and maladaptive interpersonal patterns (pp. 279-301). Chicago: University of Chicago Press. DAndrade, R. (1995). The development of cognitive anthropology. Cambridge: Cambridge University Press. DAndrade, R., Quinn, N., Nerlove, S., & Romney, A. K. (1972). Categories of disease in American-English and Mexican-Spanish. In A. K. Romney et al. (Eds.), Multidimensional scaling: Theory and applications in the behavioral sciences (Vol. 2, pp. 9-54). New York: Seminar. Danielson, W A., & Lasorsa, D. L. (1997). Per. ceptions of social change: 100 years of front-page content in the New York Times and the Los Angeles Times. In C. W Roberts . (Ed.), Text analysis for the social sciences: Methods for drawing statistical inferences from texts and transcripts (pp. 103-116). Mahwah, NJ: Lawrence Erlbaum. Danowski, J. A. (1982). A network2Dbased content analysis methodology for computer-mediated communication: An illustration with a computer bulletin board. In M.

795

Burgoon (Ed.), Communication yearbook 6 (pp. 9042D925). Beverly Hills, CA: Sage. Danowski, J. A. (1993). Network analysis of message content. In W D. Richards & G. A. . Barnett (Eds.), Progress in communication science (Vol. 12, pp. 197-221). Norwood, NJ: Ablex. Darton, M. (1976). Modern concordance to the New Testament. Garden City, NY: Doubleday. Deese, J. (1969). Conceptual categories in the study of content. In G. Gerbner, O. R. Holsti, K. Krippendorf, W J. Paisley, & P J. Stone . . (Eds.), The analysis of communication content: Developments in scientific theories and computer techniques (pp. 39-56). New York: John Wiley. Denzin, N. K. (1978). The research act: A theoretical introduction to sociological methods (2nd ed.). New York: McGraw-Hill. Denzin, N. K. (1997). Interpretive ethnography: Ethnographic practices for the 21st century. Thousand Oaks, CA: Sage. Dey, I. (1993). Qualitative data analysis: A user2Dfriendly guide for social scientists. London: Routledge & Kegan Paul. Doerfel, M. L., & Barnett, G. A. (1996). The use of Catpac for text analysis. Cultural Anthropology Methods Journal, 8(2), 4-7. Drass, K. (1980). The analysis of qualitative data: A computer program. Urban Life, 9, 332-353. Ember, C. R., & Ember, M. (1992). Resource unpredictability, mistrust, and war: A cross-cultural study. Journal of Conflict Resolution, 36, 242-262. Erickson, P (1997). Contraceptive methods: Do . Hispanic adolescents and their family planning care providers think about contraceptive methods the same way? Medical Anthropology, 17, 65-82. Fan, D. P & Shaffer, C. L. (1990). Use of ., open-ended essays and computer content analysis to survey college students knowledge of AIDS. College Health, 38, 221-229. Farringdon, J. M., & Farringdon, M. G. (1980). A concordance and word-lists to the poems of Dylan Thomas. Swansea, England: Ariel House. Frake, C. O. (1962). The ethnographic study of cognitive systems. In T. Gladwin & W C. . Sturtevant (Eds.), Anthropology and human behavior (pp. 72-85). Washington, DC: Anthropology Association of Washington.

796

METHODS OF COLLECTING AND ANALYZING EMPIRICAL MATERIALS


system. Unpublished doctoral dissertation, Stanford University. Glaser, B. G. (1978). Theoretical sensitivity. Mill Valley, CA: Sociology Press. Glaser, B. G., & Strauss, A. L. (1967). The discovery of grounded theory: Strategies for qualitative research. Chicago: Aldine. Goodenough, W H. (1956). Componential . analysis and the study of meaning. Language, 32, 195-216. Gottschalk, L. A., & Bechtel, R. J. (1993). Psychological and neuropsychiatric assessment applying the Gottschalk-Gleser content analysis method to verbal sample analysis using the Gottschalk-Bechtel computer scoring system. Palo Alto, CA: Mind Garden. Guba, E. G. (1981). Criteria for assessing the trustworthiness of naturalistic inquiries. Educational Communications and Technology Journal, 29, 75-92. Guba, E. G., & Lincoln, Y. S. (1982). Epistemological and methodological bases for naturalistic inquiry. Educational Communications and Technology Journal, 30, 233-252. Hammersley, M. (1992). Whats wrong with ethnography? Methodological explorations. London: Routledge. Harman, R. C. (1998). Triad questionnaires: Old age in Karen and Maya cultures. In V C. . De Munck & E. J. Sobo (Eds.), Using methods in the field: A practical introduction and casebook (pp. 121-138). Walnut Creek, CA: AltaMira. Hartigan, J. A. (1975). Clustering algorithms. New York: John Wiley. Hatch, E., & Redpath, H. (1954). A concordance to the Septuagint and the other Greek versions of the Old Testament. Graz, Austria: Akademische Druck-u. Verlagsanstalt. Henley, N. M. (1969). A psychological study of the semantics of animal terms. Journal of Verbal Learning and Verbal Behavior, 8, 176-184. Hill, C. E. (1998). Decision modeling: Its use in medical anthropology. In V C. De Munck & . E. J. Sobo (Eds.), Using methods in the field: A practical introduction and casebook (pp. 139-164). Walnut Creek, CA: AltaMira. Hirschman, E. C. (1987). People as products: Analysis of a complex marketing exchange. Journal of Marketing, 51, 98-108.

Frake, C. O. (1964). Notes on queries in ethnography. American Anthropologist, 66, 132-145. Fielding, N. G., & Fielding, J. L. (1986). Linking data. Beverly Hills, CA: Sage. Fischer, M. D. (1994). Applications in computing for social anthropologists. London: Routledge. Fjellman, S. M., & Gladwin, H. (1985). Haitian family patterns of migration to South Florida. Human Organization, 44, 301-312. Fleisher, M. S., & Harrington, J. A. (1998). Freelisting: Management at a womens federal prison camp. In V C. De Munck & E. J. . Sobo (Eds.), Using methods in the field: A practical introduction and casebook (pp. 69-84). Walnut Creek, CA: AltaMira. Fleiss, J. L. (1971). Measuring nominal scale agreement among many raters. Psychological Bulletin, 76, 378-382. Furbee, L. (1996). The religion of politics in Chiapas: Founding a cult of communicating saints. Paper presented at the 96th Annual Meeting of the American Anthropological Association, San Francisco. Furbee, L., & Benfer, R. (1983). Cognitive and geographic maps: Study of individual variation among Tojolabal Mayans. American Anthropologist, 85, 305-333. Garro, L. (1998). On the rationality of decision-making studies: Part 1. Decision models of treatment choice. Medical Anthropology Quarterly, 12, 319-340. Gatewood, J. B. (1983). Deciding where to fish: The skippers dilemma in Southeast Alaskan salmon seining. Coastal Zone Management Journal, 10, 347-367. George, A. L. (1959). Quantitative and qualitative approaches to content analysis. In I. de S. Pool (Ed.), Trends in content analysis (pp. 7-32). Urbana: University of Illinois Press. Gerbner, G., Holsti, O. R., Krippendorf, K., Paisley, W J., & Stone, P J. (Eds.). (1969). . . The analysis of communication content: Developments in scientific theories and computer techniques New York: John Wiley. Gladwin, C. (1989). Ethnographic decision tree modeling. Newbury Park, CA: Sage. Gladwin, H. (1971). Decision making in the Cape Coast (Fante) fishing and fish marketing

Data Management and Analysis Methods


Holland, D. (1985). From situation to impression: How Americans get to know themselves and one another. In J. W D. . Dougherty (Ed.), Directions in cognitive anthropology (pp. 389-412). Urbana: University of Illinois Press. Holsti, O. R. (1966). External conflict and internal consensus: The Sino-Soviet case. In P . J. Stone, D. C. Dunphy, M. S. Smith, & D. M. Ogilvie (Eds.), The General Inquirer: A computer approach to content analysis (pp. 343-358). Cambridge: MIT Press. Holsti, O. R. (1969). Content analysis for the social sciences and humanities. Reading, MA: Addison-Wesley. Hunt, J. G., & Ropo, A. (1995). Multi2Dlevel leadership: Grounded theory and mainstream theory applied to the case of General Motors. Leadership Quarterly, 6, 3792D412. Imrich D. J., Mullin, C., & Linz, D. (1995). Measuring the extent of prejudicial pretrial publicity in major American newspapers: A content analysis. Journal of Communication, 45(3), 94-117. Irurita, V F. (1996). Hidden dimensions re. vealed: Progressive grounded theory study of quality care in the hospital. Qualitative Health Research, 6, 331-349. Jakobson, R., & Halle, M. (1956). Fundamentals of language. The Hague: Mouton. Jang, H.2DY., & Barnett, G. A. (1994, September). Cultural differences in organizational communication: A semantic network analysis. Bulletin de Mthodologie Sociologique, 44, 31-59. Jehn, K. A., & Doucet, L. (1996). Developing categories from interview data: Part 1. Text analysis and multidimensional scaling. Cultural Anthropology Methods Journal, 8(2), 15-16. Jehn, K. A., & Doucet, L. (1997). Developing categories for interview data: Part 2. Consequences of different coding and analysis strategies in understanding text. Cultural Anthropology Methods Journal, 9(1), 1-7. Jehn, K. A., & Werner, O. (1993). Hapax Legomenon II: Theory, a thesaurus, and word frequency. Cultural Anthropology Methods Journal, 5(1), 8-10. Johnson, A., & Price2DWilliams, D. R. (1997). Oedipus ubiquitous: The family

797

complex in world folk literature. Stanford, CA: Stanford University Press. Johnson, S. C. (1967). Hierarchical clustering schemes. Psychometrika, 32, 241-253. Kaid, L. L., Tedesco, J. C., & McKinnon, L. M. (1996). Presidential ads as nightly news: A content analysis of 1988 and 1992 televised Adwatches. Journal of Broadcasting Electronic Media, 40, 297-308. Kassis, H. (1983). A concordance of the Quran. Berkeley: University of California Press. Kearney, M. H., Murphy, S., Irwin, K., & Rosenbaum, M. (1995). Salvaging self: A grounded theory of pregnancy on crack cocaine. Nursing Research, 44, 208-213. Kearney, M. H., Murphy, S., & Rosenbaum, M. (1994). Mothering on crack cocaine: A grounded theory analysis. Social Science and Medicine, 38, 351-361. Kelle, U. (1995). An overview of computer-aided methods in qualitative research. In U. Kelle (Ed.), Computer-aided qualitative data analysis: Theory, methods and practice (pp. 1-18). London: Sage. Kelly, E. F., & Stone, P J. (1975). Computer rec. ognition of English word senses. Amsterdam: North-Holland. Kempton, W (1987). Two theories of home heat . control. In D. Holland & N. Quinn (Eds.), Cultural models in language and thought (pp. 222-242). Cambridge: Cambridge University Press. Kirchler, E. (1992). Adorable woman, expert man: Changing gender images of women and men in management. European Journal of Social Psychology, 22, 363-373. Kirk, J., & Miller, M. L. (1986). Reliability and validity in qualitative research. Beverly Hills, CA: Sage. Kolbe, R. H., & Albanese, J. P (1996). Man to . man: A content analysis of sole-male images in male-audience magazines. Journal of Advertising, 25(4), 1-20. Kracauer, S. (1953. The challenge of qualitative content analysis. Public Opinion Quarterly, 16, 631-642. Krippendorf, K. (1980). Content analysis: An introduction to its methodology. Beverly Hills, CA: Sage. Kruskal, J. B., & Wish, M. (1978). Multidimensional scaling. Beverly Hills, CA: Sage.

798

METHODS OF COLLECTING AND ANALYZING EMPIRICAL MATERIALS


tion: The Federalist. Computers and the Humanities, 29, 259-270. Mathews, H. F., & Hill, C. (1990). Applying cognitive decision theory to the study of regional patterns of illness treatment choice. American Anthropologist, 91, 155-170. McCleary, R. (1978). Dangerous men: The sociology of parole. Beverly Hills, CA: Sage. McKinnon, A. (1993). The multi-dimensional concordance: A new tool for literary research. Computers and the Humanities, 27, 165-183. McTavish, D. G., & Pirro, E. B. (1990). Contextual content analysis. Quality and Quantity, 24, 44-63. Metzger, D., & Williams, G. (1966). Some procedures and results in the study of native categories: Tzeltal firewood. American Anthropologist, 68, 389-407. Miles, M. B. (1979). Qualitative data as an attractive nuisance: The problem of analysis. Administrative Science Quarterly, 24, 590-601. Miles, M. B., & Huberman, A. M. (1994). Qualitative data analysis: An expanded sourcebook (2nd ed.). Thousand Oaks, CA: Sage. Mingers, J. (1989a). An empirical comparison of pruning methods for decision tree induction. Machine Learning, 4, 227-243. Mingers, J. (1989b). An empirical comparison of selection measures for decision-tree induction. Machine Learning, 3, 319-342. Mitchell, S. K. (1979). Interobserver agreement, reliability, and generalizability of data collected in observational studies. Psychological Bulletin, 86, 376-390. Morse, J. M. (1994). Designing funded qualitative research. In N. K. Denzin & Y. S. Lincoln (Eds.), Handbook of qualitative research (pp. 220-235). Thousand Oaks, CA: Sage. Mosteller, F., & Wallace, D. L. (1964). Inference and disputed authorship: The Federalist Papers. Reading, MA: Addison-Wesley. Murdock, G. P (1971). Outline of cultural mate. rials (4th rev. ed.). New Haven, CT: Human Relations Area Files. Nolan, J., & Ryan, G. W (1999). Fear and loath. ing at the cinemaplex: Differences in gender perceptions and descriptions of slasher films. Manuscript submitted for publication.

Kurasaki, K. S. (1997). Ethnic identity and its development among third-generation Japanese Americans. Unpublished doctoral dissertation, DePaul University. Laffal, J. (1990). A concept dictionary of English, with computer programs for content analysis. Essex, CT: Gallery. Laffal, J. (1995). A concept analysis of Jonathan Swifts A tale of a tub and Gullivers travels. Computers and the Humanities, 29, 339-361. Leinhardt, G. (1987). Development of an expert explanation: An analysis of a sequence of subtraction lessons. Cognition and Instruction, 4, 225-282. Leinhardt, G. (1989). Math lessons: A contrast of novice and expert competence. Journal for Research in Mathematics Education, 20(1), 52-75. Leinhardt, G., & Smith, D. A. (1985). Expertise in mathematics instruction: Subject matter knowledge. Journal of Educational Psychology, 77, 247-271. Light, R. J. (1971). Measures of response agreement for qualitative data: Some generalizations and alternatives. Psychological Bulletin, 76, 365-377. Lincoln, Y. S., & Guba, E. G. (1985). Naturalistic inquiry. Beverly Hills, CA: Sage. Lindesmith, A. R. (1968). Addiction and opiates. Chicago: Aldine. (Original work published 1947) Lofland, J., & Lofland, L. H. (1995). Analyzing social settings (3rd ed.). Belmont, CA: Wadsworth. Lonkila, M. (1995). Grounded theory as an emerging paradigm for computer-assisted qualitative data analysis. In U. Kelle (Ed.), Computer-aided qualitative data analysis: Theory, methods and practice (pp. 41-51). London: Sage. MacQueen, K. M., McLellan, E., Kay, K., & Milstein, B. (1998). Codebook development for team-based qualitative research. Cultural Anthropology Methods Journal, 10(2), 31-36. Manning, P K. (1982). Analytic induction. In R. . Smith & P K. Manning (Eds.), Handbook of . social science methods: Vol. 2. Qualitative methods (pp. 273-302). New York: Harper. Martindale, C., & McKenzie, D. (1995). On the utility of content analysis in author attribu-

Data Management and Analysis Methods


Ogilvie, D. M., Stone, P J., & Schneidman, E. S. . (1966). Some characteristics of genuine versus simulated suicide notes. In P J. Stone, D. . C. Dunphy, M. S. Smith, & D. M. Ogilvie (Eds.), The General Inquirer: A computer approach to content analysis (pp. 527-535). Cambridge: MIT Press. Osgood, C. (1959). The representational model and relevant research methods. In I. de S. Pool (Eds.), Trends in content analysis (pp. 33-88). Urbana: University of Illinois Press. Palmquist, M., Carley, K., & Dale, T. (1997). Applications of computer-aided text analysis: Analyzing literary and nonliterary texts. In C. W Roberts (Ed.), Text analysis for the . social sciences: Methods for drawing statistical inferences from texts and transcripts (pp. 171-189). Mahwah, NJ: Lawrence Erlbaum. Patterson, B. R., Bettini, L., & Nussbaum, J. F. (1993). The meaning of friendship across the life-span: Two studies. Communication Quarterly, 41, 145-160. Patton, M. Q. (1990). Qualitative evaluation and research methods (2nd ed.). Newbury Park, CA: Sage. Perchonock, N., & Werner, O. (1969). Navaho systems of classification. Ethnology, 8, 229-242. Pool, I. de S. (1952). Symbols of democracy. Stanford, CA: Stanford University Press. Pool, I. de S. (Ed.). (1959). Trends in content analysis. Urbana: University of Illinois Press. Potts R., Runyan, D., Zerger, A., & Marchetti, K. (1996). A content analysis of safety behaviors of television characters: Implications for childrens safety and injury. Journal of Pediatric Psychology, 21, 517-528. Prendergast, G. L. (1971). A complete concordance to the Iliad of Homer. Hildesheim, Germany: G. Olms. Price, L. (1987). Ecuadorian illness stories. In D. Holland & N. Quinn (Eds.), Cultural models in language and thought (pp. 313-342). Cambridge: Cambridge University Press. Quinn, N. (1978). Do Mfantse fish sellers estimate probabilities in their heads? American Ethnologist, 5, 206-226. Quinn, N. (1982). Commitment in American marriage: A cultural analysis. American Ethnologist, 9, 755-798.

799

Quinn, N. (1987). Convergent evidence for a cultural model of American marriage. In D. Holland & N. Quinn (Eds.), Cultural models in language and thought (pp. 173-192). Cambridge: Cambridge University Press. Quinn, N. (1992). The motivational force of self-understanding: Evidence from wives inner conflicts. In R. DAndrade & C. Strauss (Eds.), Human motives and cultural models (pp. 90-126). New York: Cambridge University Press. Quinn, N. (1996). Culture and contradiction: The case of Americans reasoning about marriage. Ethos, 24, 391-425. Quinn, N. (1997). Research on shared task solutions. In C. Strauss & N. Quinn (Eds.), A cognitive theory of cultural meaning (pp. 137-188). Cambridge: Cambridge University Press. Ragin, C. C. (1987). The comparative method: Moving beyond qualitative and quantitative strategies. Berkeley: University of California Press. Ragin, C. C. (1994). Introduction to qualitative comparative analysis. In T. Janowski & A. M. Hicks (Eds.), The comparative political economy of the welfare state (pp. 299-317). Cambridge: Cambridge University Press. Richards, T. J., & Richards, L. (1991). The NUDIST qualitative data analysis system. Qualitative Sociology, 14, 307-325. Robbins, M. C., & Nolan, J. M. (1997). A measure of dichotomous category bias in free listing tasks. Cultural Anthropology Methods Journal, 9(3), 8-12. Roberts, C. W (1997). A theoretical map for se. lecting among text analysis methods. In C. W . Roberts (Ed.), Text analysis for the social sciences: Methods for drawing statistical inferences from texts and transcripts (pp. 275-283). Mahwah, NJ: Lawrence Erlbaum. Robinson, W S. (1951). The logical structure of . analytic induction. American Sociological Review, 16, 812-818. Romme, A. G. L. (1995). Boolean comparative analysis of qualitative data: A methodological note. Quality and Quantity, 29, 317-329. Roos, G. (1998). Pile sorting: Kids like candy. In V C. De Munck & E. J. Sobo (Eds.), Using . methods in the field: A practical introduction and casebook (pp. 97-110). Walnut Creek, CA: AltaMira.

800

METHODS OF COLLECTING AND ANALYZING EMPIRICAL MATERIALS


Boolean analysis of the political disputes in Chen Village, China. Social Networks, 18, 247-266. Seidel, J., & Kelle, U. (1995). Different functions of coding in the analysis of textual data. In U. Kelle (Ed.), Computer-aided qualitative data analysis: Theory, methods and practice (pp. 52-61). London: Sage. Shapiro, G. (1997). The future of coders: Human judgments in a world of sophisticated software. In C. W Roberts (Ed.), Text analy. sis for the social sciences: Methods for drawing statistical inferences from texts and transcripts (pp. 225-238). Mahwah, NJ: Lawrence Erlbaum. Shelley, G. A. (1992). The social networks of people with end-stage renal disease: Comparing hemodialysis and peritoneal dialysis patients. Unpublished doctoral dissertation, University of Florida. Sleath, B., Svarstad, B., & Roter, D. (1997). Physician versus patient initiation of psychotropic prescribing in primary care settings: A content analysis of audiotapes. Social Science and Medicine, 44, 541-548. Smith, J. J. (1993). Using ANTHROPAC 3.5 and a spreadsheet to compute a free-list salience index. Cultural Anthropology Methods Journal, 5(3), 1-3. Smith, J. J., & Borgatti, S. P (1998). Salience . countsand so does accuracy: Correcting and updating a measure for free2Dlist2Ditem salience. Journal of Linguistic Anthropology, 7, 2082D209. Sohier, R. (1993). Filial reconstruction: A theory on development through adversity. Qualitative Health Research, 3, 465-492. Spears, N. E, Mowen, J. C., & Chakraborty, G. (1996). Symbolic role of animals in print advertising: Content analysis and conceptual development. Journal of Business Research, 37(2), 87-95. Spiggle, S. (1986). Measuring social values: A content analysis of Sunday comics and underground comix. Journal of Consumer Research, 13, 100-113. Spradley, J. P (1979). The ethnographic inter. view. New York: Holt, Rinehart & Winston. Stone, P J., Dunphy, D. C., Smith, M. S., & . Ogilvie, D. M. (Eds.). (1966). The General Inquirer: A computer approach to content analysis. Cambridge: MIT Press.

Rosenberg, S. D., Schnurr, P P & Oxman, T. E. . ., (1990). Content analysis: A comparison of manual and computerized systems. Journal of Personality Assessment, 54, 298-310. Rushforth, S. (1982). A structural semantic analysis of Bear Lake Athapaskan kinship classification. American Ethnologist, 9, 559-577. Ryan, G. W (1995). Medical decision making . among the Kom of Cameroon: Modeling how characteristics of illnesses, patients, caretakers, and compounds affect treatment choice in a rural community. Unpublished doctoral dissertation, University of Florida, Gainesville. Ryan, G. W (in press). Measuring the typicality . of text: Using multiple coders for more than just reliability and validity checks. Human Organization. Ryan, G. W & Martnez, H. (1996). Can we ., predict what mothers do? Modeling childhood diarrhea in rural Mexico. Human Organization, 55, 472D57. Ryan, G. W & Weisner, T. (1996). Analyzing ., words in brief descriptions: Fathers and mothers describe their children. Cultural Anthropology Methods Journal, 8(3), 13-16. Sandelowski, M. (1995a). Qualitative analysis: What it is and how to begin. Research in Nursing and Health, 18, 371-375. Sandelowski, M. (1995b). Sample size in qualitative research. Research in Nursing and Health, 18, 179-183. Schank, R. C., & Abelson, R. P (1977). Scripts, . plans, goals, and understanding: An enquiry into human knowledge structures. Hillsdale, NJ: Lawrence Erlbaum. Schnegg, M., & Bernard, H. R. (1996). Words as actors: A method for doing semantic network analysis. Cultural Anthropology Methods Journal, 8(2), 7-10. Schnurr, P P Rosenberg, S. D., Oxman, T. E., & . ., Tucker, G. (1986). A methodological note on content analysis: Estimates of reliability. Journal of Personality Assessment, 50, 601-609. Schweizer, T. (1991). The power struggle in a Chinese community, 1950-1980: A social network analysis of the duality of actors and events. Journal of Quantitative Anthropology, 3, 19-44. Schweizer, T. (1996). Actor and event orderings across time: Lattice representation and

Data Management and Analysis Methods


Strauss, A. L. (1987). Qualitative analysis for social scientists. New York: Cambridge University Press. Strauss, A. L., & Corbin, J. (1990). Basics of qualitative research: Grounded theory procedures and techniques. Newbury Park, CA: Sage. Strauss, A. L., & Corbin, J. (Eds.). (1997). Grounded theory in practice. Thousand Oaks, CA: Sage. Strauss, C. (1992). What makes Tony run? Schemas as motive reconsidered. In R. DAndrade & C. Strauss (Eds.), Human motives and cultural models (pp. 191-224). New York: Cambridge University Press. Strauss, C. (1997). Research on cultural discontinuities. In C. Strauss & N. Quinn (Eds.), A cognitive theory of cultural meaning (pp. 210-251). Cambridge: Cambridge University Press. Taylor, S. J., & Bogdan, R. C. (1984). Introduction to qualitative research methods: The search for meanings (2nd ed.). New York: John Wiley. Tesch, R. (1990). Qualitative research: Analysis types and software tools. New York: Falmer. Trost, J. E. (1986). Statistically nonrepresentative stratified sampling: A sampling technique for qualitative studies. Qualitative Sociology, 9, 54-57. Van Maanen, J., Miller, M., & Johnson, J. (1982). An occupation in transition: Traditional and modern forms of commercial fishing. Work and Occupations, 9, 193-216. Viney, L. L. (1983). The assessment of psychological states through content analysis of verbal communications. Psychological Bulletin, 94, 542-563. Waitzkin, H., & Britt, T. (1993). Processing narratives of self-destructive behavior in routine medical encounters: Health promotion, disease prevention, and the discourse of health care. Social Science and Medicine, 36, 1121-1136. Wallace, A. F. C. (1962). Culture and cognition. Science, 135, 352-357. Weber, R. (1990). Basic content analysis (2nd ed.). Newbury Park, CA: Sage. Weitzman, E. A., & Miles, M. B. (1995). Computer programs for qualitative data analysis: A software sourcebook. Thousand Oaks, CA: Sage.

801

Weller, S. C. (1998). Structured interviewing and questionnaire construction. In H. R. Bernard (Ed.), Handbook of methods in cultural anthropology (pp. 365-409). Walnut Creek, CA: AltaMira. Weller, S. C., & Romney, A. K. (1988). Systematic data collection. Newbury Park, CA: Sage. Weller, S. C., & Romney, A. K. (1990). Metric scaling: Correspondence analysis. Newbury Park, CA: Sage. Weller, S. C., Ruebush, T. K., II, & Klein, R. E. (1997). Predicting treatment-seeking behavior in Guatemala: A comparison of the health services research and decision-theoretic approaches. Medical Anthropology Quarterly, 11, 224-245. Werner, O., & Schoepfle, G. M. (1987). Systematic fieldwork: Vol. 2. Ethnographic analysis and data management. Newbury Park, CA: Sage. White, D. R., & Burton, M. L. (1988). Causes of polygyny: Ecology, economy, kinship, and warfare. American Anthropologist, 90, 871-887. Willms, D. G., Best, J. A., Taylor, D. W Gilbert, ., J. R., Wilson, D. M. C., Lindsay, E. A., & Singer, J. (1990). A systematic approach for using qualitative methods in primary prevention research. Medical Anthropology Quarterly, 4, 391-409. Wilson, H. S., & Hutchinson, S. A. (1996). Methodological mistakes in grounded theory. Nursing Research, 45, 122-124. Wodak, R. (1992). Strategies in text production and text comprehension: A new perspective. In D. Stein (Ed.), Cooperating with written texts (pp. 493-528). New York: Mouton de Gruyter. Wright, K. B. (1997). Shared ideology in Alcoholics Anonymous: A grounded theory approach. Journal of Health Communication, 2(2), 83-99. Yoder, S. (1995). Examining ethnomedical diagnoses and treatment choices for diarrheal disorders in Lubumbashi Swahili. Medical Anthropology, 16, 2112D248. Young, J. C. (1978). Illness categories and action strategies in a Tarascan town. American Ethnologist, 5, 81-97. Young, J. C. (1980). A model of illness treatment decisions in a Tarascan town. American Ethnologist, 7, 106-151.

802

METHODS OF COLLECTING AND ANALYZING EMPIRICAL MATERIALS


Zuell, C., Weber, R. P & Mohler, P (Eds.). ., . (1989). Computer-assisted text analysis for the social sciences: The General Inquirer III. Mannheim, Germany: Center for Surveys, Methods, and Analysis (ZUMA).

Yule, G. U. (1968). The statistical study of literary vocabulary. Hamden, CT: Archon. (Original work published 1944) Znaniecki, F. (1934). The method of sociology. New York: Farrar & Rinehart.

You might also like