Research Methods for Accounting and Finance 2016
DOI: 10.23912/978-1-910158-88-3-3226
|View full text |Cite
|
Sign up to set email alerts
|

Quantitative Data Gathering Methods and Techniques

Abstract: The conclusions of any quantitative research must be supported by appropriate data. This chapter discusses the methods of collecting quantitative data for research. It begins by giving an overview of the nature of quantitative research. It also discusses the two major sources of collecting quantitative data. For primary data collection, issues such as sampling, measurement and surveys are discussed. Examples and sources of obtaining secondary data are also presented. Finally, some ideas are provided for how to… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 2 publications
0
3
0
Order By: Relevance
“…Equally, it was clear to us that resilience should possess the characteristics of measurability, i.e., the resilience framework would need to be able to quantify the variable factors in numerical, logically computational form. This is in line with the dictates of quantitative empirical explorations, whose outputs must be computable, independent, numerical data that can be statistically analysed (Hassani et al, 2011;Salhin et al, 2016). Accordingly, the conceptual CRMM framework we set out in this article seeks to combine strengths found in various existing cybersecurity frameworks into a quantitative framework that can guide the design of instruments to allow logical computation of various effects or variables.…”
Section: Research Phases: Design and Refinement Of A Crmm Frameworkmentioning
confidence: 70%
“…Equally, it was clear to us that resilience should possess the characteristics of measurability, i.e., the resilience framework would need to be able to quantify the variable factors in numerical, logically computational form. This is in line with the dictates of quantitative empirical explorations, whose outputs must be computable, independent, numerical data that can be statistically analysed (Hassani et al, 2011;Salhin et al, 2016). Accordingly, the conceptual CRMM framework we set out in this article seeks to combine strengths found in various existing cybersecurity frameworks into a quantitative framework that can guide the design of instruments to allow logical computation of various effects or variables.…”
Section: Research Phases: Design and Refinement Of A Crmm Frameworkmentioning
confidence: 70%
“…The study employed the survey research design. This research design was adopted as it helps to provide explanations to study phenomenon, attitudes, and opinions, as well as provide study results that could be inferred on the entire study population (Salhin et al, 2016;Mathiyazhaga and Nandan, 2010;Collis and Hussey, 2014;Kpolovie, 2016).…”
Section: Methodsmentioning
confidence: 99%
“…The survey methodology was employed in this study, basically due to its advantages of inexpensiveness, quick data gathering, and allowance for empirical inferences (Kpolovie, 2016;Salhin et al, 2016;Totten, Panacek & Price, 1999). The 25-item CAS measurement tool developed by Itang (2020a) was adopted for assessing the quality of computerized accounting systems, while the scale employed by Kalay and Lynn (2016, p. 137) was adopted for assessing organizational structure in terms of centralization (6 items) and formalization (4 items).…”
Section: Methodsmentioning
confidence: 99%