You are on page 1of 35

Data Management

METHODS OF COLLECTING AND ANALYZING EMPIRICAL MATERIALS and Analysis Methods

29
DATA MANAGEMENT
AND ANALYSIS METHODS

u Gery W. Ryan and H. Russell Bernard

u Texts Are Us of transcribing open-ended interviews. These


technologies are blind to epistemological differ-
ences. Interpretivists and positivists alike are us-
This chapter is about methods for managing and ing these technologies for the analysis of texts,
analyzing qualitative data. By qualitative data and will do so more and more.
we mean text: newspapers, movies, sitcoms, Like Tesch (1990), we distinguish between
e-mail traffic, folktales, life histories. We also the linguistic tradition, which treats text as an
mean narrativesnarratives about getting di- object of analysis itself, and the sociological tra-
vorced, about being sick, about surviving dition, which treats text as a window into human
hand-to-hand combat, about selling sex, about experience (see Figure 29.1). The linguistic tra-
trying to quit smoking. In fact, most of the ar- dition includes narrative analysis, conversation
chaeologically recoverable information about (or discourse) analysis, performance analysis,
human thought and human behavior is text, the and formal linguistic analysis. Methods for anal-
good stuff of social science. yses in this tradition are covered elsewhere in
Scholars in content analysis began using com- this Handbook. We focus here on methods used
puters in the 1950s to do statistical analysis of in the sociological tradition, which we take to in-
texts (Pool, 1959), but recent advances in tech- clude work across the social sciences.
nology are changing the economics of the social There are two kinds of written texts in the so-
sciences. Optical scanning today makes light ciological tradition: (a) words or phrases gener-
work of converting written texts to ma- ated by techniques for systematic elicitation and
chine-readable form. Within a few years, (b) free-flowing texts, such as narratives, dis-
voice-recognition software will make light work course, and responses to open-ended interview

u 769
770 u METHODS OF COLLECTING AND ANALYZING EMPIRICAL MATERIALS

questions. In the next section, we describe some tury) are matters of heated debate. Below we
methods for collecting and analyzing words or review some of the most common systematic
phrases. Techniques for data collection include elicitation techniques and how researchers ana-
free lists, pile sorts, frame elicitations, and triad lyze the data they generate.
tests. Techniques for the analysis of these kinds
of data include componential analysis, taxono- Free Lists
mies, and mental maps.
We then turn to the analysis of free-flowing Free lists are particularly useful for identify-
texts. We look first at methods that use raw text ing the items in a cultural domain. To elicit do-
as their inputmethods such as key-words- mains, researchers might ask, What kinds of ill-
in-context, word counts, semantic network nesses do you know? Some short, open-ended
analysis, and cognitive maps. We then describe questions on surveys can be considered free lists,
methods that require the reduction of text to as can some responses generated from in-depth
codes. These include grounded theory, schema ethnographic interviews and focus groups. In-
analysis, classical content analysis, content dic- vestigators interpret the frequency of mention
tionaries, analytic induction, and ethnographic and the order in which items are mentioned in
decision models. Each of these methods of anal- the lists as indicators of items salience (for mea-
ysis has advantages and disadvantages. Some are sures of salience, see Robbins & Nolan, 1997;
appropriate for exploring data, others for mak- Smith, 1993; Smith & Borgatti, 1998). The
ing comparisons, and others for building and co-occurrence of items across lists and the prox-
testing models. Nothing does it all. imity with which items appear in lists may be
used as measures of similarity among items
(Borgatti, 1998; Henley, 1969; for a clear exam-
u Collecting and Analyzing ple, see Fleisher & Harrington, 1998).
Words or Phrases
Paired Comparisons,
Pile Sorts, Triad Tests
Techniques for Systematic Elicitation Researchers use paired comparisons, pile
sorts, and triads tests to explore the relationships
Researchers use techniques for systematic among items. Here are two questions we might
elicitation to identify lists of items that belong in ask someone in a paired comparison test about a
a cultural domain and to assess the relationships list of fruits: (a) On a scale of 1 to 5, how similar
among these items (for detailed reviews of these are lemons and watermelons with regard to
methods, see Bernard, 1994; Borgatti, 1998; sweetness? (b) Which is sweeter, watermelons
Weller, 1998; Weller & Romney, 1988). Cul- or lemons? The first question produces a set of
tural domains comprise lists of words in a lan- fruit-by-fruit matrices, one for each respondent,
guage that somehow belong together. Some the entries of which are scale values on the simi-
domains (such as animals, illnesses, things to eat) larity of sweetness among all pairs of fruits. The
are very large and inclusive, whereas others (ani- second question produces, for each respondent,
mals you can keep at home, illnesses that chil- a perfect rank ordering of the set of fruits.
dren get, brands of beer) are relatively small. In a pile sort, the researcher asks each respon-
Some lists (such as the list of terms for members dent to sort a set of cards or objects into piles.
of a family or the names of all the Major League Item similarity is the number of times each pair
Baseball teams) are agreed on by all native speak- of items is placed in the same pile (for examples,
ers of a language; others (such as the list of car- see Boster, 1994; Roos, 1998). In a triad test, the
penters tools) represent highly specialized researcher presents sets of three items and asks
knowledge, and still others (like the list of great each respondent either to choose the two most
left-handed baseball pitchers of the 20th cen- similar items or to pick the item that is the
u
771

Figure 29.1. Typology of Qualitative Analysis Techniques


772 u METHODS OF COLLECTING AND ANALYZING EMPIRICAL MATERIALS

most different. The similarity among pairs of Componential analysis is based on the princi-
items is the number of times people choose to ple of distinctive features. Any two items
keep pairs of items together (for some good ex- (sounds, kinship terms, names of plants, names
amples, see Albert, 1991; Harman, 1998). of animals, and so on) can be distinguished by
some minimal set (2n) of binary featuresthat
is, features that either occur or do not occur. It
Frame Substitution
takes two features to distinguish four items (22 =
In the frame substitution task (DAndrade, 4, in other words), three features to distinguish
1995; DAndrade, Quinn, Nerlove, & Romney, eight items (23 = 8), and so on. The trick is to
1972; Frake, 1964; Metzger & Williams, 1966), identify the smallest set of features that best de-
the researcher asks the respondent to link each scribes the domain of interest. Table 29.1 shows
item in a list of items with a list of attributes. that just three features are needed to describe
DAndrade et al. (1972) gave people a list of 30 kinds of horses.
illness terms and asked them to fill in the blanks Componential analysis produces models
in frames such as You can catch _____ from based on logical relationships among features.
other people, You can have _____ and never The models do not account for variations in the
know it, and Most people get _____ at one meanings of terms across individuals. For exam-
time or other (p. 12; for other examples of ple, when we tried to do a componential analysis
frame substitution, see Furbee & Benfer, 1983; on the terms for cattle (bull, cow, heifer, calf,
Young, 1978). steer, and ox), we found that native speakers of
English in the United States (even farmers) dis-
agreed about the differences between cow and
Techniques for Analyzing Data heifer, and between steer and ox. When the rela-
About Cultural Domains tionships among items are less well defined, tax-
onomies or mental models may be useful. Nor is
Researchers use these kinds of data to build there any intimation that componential analyses
several kinds of models about how people think. reflect how people really think.
Componential analysis produces formal models
of the elements in a cultural domain, and taxon-
omies display hierarchical associations among Taxonomies
the elements in a domain. Mental maps are best
for displaying fuzzy constructs and dimensions. Folk taxonomies are meant to capture the hi-
We treat these in turn. erarchical structure in sets of terms and are com-
monly displayed as branching tree diagrams.
Componential Analysis Figure 29.1 presents a taxonomy of our own un-
derstanding of qualitative analysis techniques.
As we have outlined elsewhere, componen- Figure 29.2 depicts a taxonomy we have adapted
tial analysis (or feature analysis) is a formal, from Pamela Ericksons (1997) study of the per-
qualitative technique for studying the content of ceptions among clinicians and adolescents of
meaning (Bernard, 1994; Bernard & Ryan, methods of contraception. Researchers can elicit
1998). Developed by linguists to identify the folk taxonomies directly by using successive pile
features and rules that distinguish one sound sorts (Boster, 1994; Perchonock & Werner,
from another (Jakobson & Halle, 1956), the 1969). This involves asking people to continu-
technique was elaborated by anthropologists in ally subdivide the piles of a free pile sort until
the 1950s and 1960s (Conklin, 1955; each item is in its own individual pile. Taxo-
DAndrade, 1995; Frake, 1962; Goodenough, nomic models can also be created with cluster
1956; Rushforth, 1982; Wallace, 1962). (For a analysis on the similarity data from paired com-
particularly good description of how to apply parisons, pile sorts, and triad tests. Hierarchical
the method, see Spradley, 1979, pp. 173-184.) cluster analysis (Johnson, 1967) builds a taxo-
Data Management and Analysis Methods u 773

items are organized hierarchically. One popular


TABLE 29.1 A Componential method for making these maps is by collecting
Analysis of Six data about the cognitive similarity or dissimilar-
Kinds of Horses ity among a set of objects and then applying mul-
tidimensional scaling, or MDS, to the similarities
(Kruskal & Wish, 1978).
Name Female Neuter Adult
Cognitive maps are meant to be directly anal-
ogous to physical maps. Consider a table of dis-
Mare + + tances between all pairs of cities on a map. Ob-
jects (cities) that are very dissimilar have high
Stallion + mileage between them and are placed far apart on
the map; objects that are less dissimilar have low
Gelding + + mileage between them and are placed closer to-
gether. Pile sorts, triad tests, and paired compari-
Foal + son tests are measures of cognitive distance. For
example, Ryan (1995) asked 11 literate Kom
Filly +
speakers in Cameroon to perform successive pile
sorts on Kom illness terms. Figure 29.3 presents
Colt
an MDS plot of the collective mental map of
SOURCE: Adapted from DAndrade (1995). these terms. The five major illness categories, cir-
cled, were identified by hierarchical cluster anal-
ysis of the same matrix used to produce the MDS
plot.1
nomic tree where each item appears in only one Data from frame substitution tasks can be dis-
group. played with correspondence analysis (Weller &
Interinformant variation is common in folk Romney, 1990).2 Correspondence analysis scales
taxonomies. That is, different people may use both the rows and the columns into the same
different words to refer to the same category of space. For example, Kirchler (1992) analyzed
things. Some of Ericksons (1997) clinician in- 562 obituaries of managers who had died in
formants referred to the highly effective 1974, 1980, and 1986. He identified 31 descrip-
group of methods as safe, more reliable, tive categories from adjectives used in the obitu-
and sure bets. Category labels need not be aries and then used correspondence analysis to
simple words, but may be complex phrases; for display how these categories were associated
example, see the category in Figure 29.2 com- with men and women managers over time. Figure
prising contraceptive methods in which you 29.4 shows that male managers who died in 1974
have to pay attention to timing. Sometimes, and 1980 were seen by their surviving friends and
people have no labels at all for particular cate- family as active, intelligent, outstanding, consci-
goriesat least not that they can dredge up eas- entious, and experienced experts. Although the
ilyand categories, even when named, may be managers who died in 1986 were still respected,
fuzzy and may overlap with other categories. they were more likely to be described as entrepre-
Overlapping cluster analysis (Hartigan, 1975) neurs, opinion leaders, and decision makers. Per-
identifies groups of items where a single item ceptions of female managers also changed, but
may appear in multiple groups. they did not become more like their male coun-
terparts. In 1974 and 1980, female managers
were remembered for being nice people. They
Mental Maps were described as kind, likable, and adorable. By
1986, women were remembered for their cour-
Mental maps are visual displays of the simi- age and commitment. Kirchler interpreted these
larities among items, whether or not those data to mean that gender stereotypes changed in
774
u

Figure 29.2. Clinicians Taxonomy of Contraceptive Methods


SOURCE: Based on Erickson (1997).
Data Management and Analysis Methods u 775

Figure 29.3. Mental Map of Kom Illness Terms

the early 1980s. By 1986, both male and female Analyzing Words
managers were perceived as working for suc-
cess, but men impressed their colleagues Techniques for word analysis include
through their knowledge and expertise, key-words-in-context, word counts, structural
whereas women impressed their colleagues analysis, and cognitive maps. We review each be-
with motivation and engagement. low.

Key-Words-in-Context
u Methods for Analyzing
Researchers create key-words-in-context
Free-Flowing Text (KWIC) lists by finding all the places in a text
where a particular word or phrase appears and
printing it out in the context of some number of
words (say, 30) before and after it. This produces
Although taxonomies, MDS maps, and the like a concordance. Well-known concordances have
are useful for analyzing short phrases or words, been done on sacred texts, such as the Old and
most qualitative data come in the form of New Testaments (Darton, 1976; Hatch &
free-flowing texts. There are two major types of Redpath, 1954) and the Koran (Kassis, 1983),
analysis. In one, the text is segmented into its and on famous works of literature from Euripides
most basic meaningful components: words. In (Allen & Italie, 1954) to Homer (Prendergast,
the other, meanings are found in large blocks of 1971), to Beowulf (Bessinger, 1969), to Dylan
text. Thomas (Farringdon & Farringdon, 1980). (On
776 u METHODS OF COLLECTING AND ANALYZING EMPIRICAL MATERIALS

Figure 29.4. Correspondence Analysis of the Frequencies of 31 Disruptive Obituary Categories by


Gender and Year of Publication
SOURCE: Erich Kirchler, Adorable Woman, Expert Man: Changing Gender Images of Women and Men in
Management, European Journal of Social Psychology, 22 (1992), p. 371. Copyright 1992 by John Wiley &
Sons Limited. Reproduced by permission of John Wiley & Sons Limited.

the use of concordances in modern literary stud- son and Alexander Hamilton led Mosteller and
ies, see Burton, 1981a, 1981b, 1982; McKin- Wallace (1964) to conclude that Madison and
non, 1993.) not Hamilton had written 12 of the Federalist
Papers. (For other examples of authorship stud-
Word Counts ies, see Martindale & McKenzie, 1995; Yule
1944/1968.)
Word counts are useful for discovering pat- Word analysis (like constant comparison,
terns of ideas in any body of text, from field memoing, and other techniques) can help re-
notes to responses to open2Dended questions. searchers to discover themes in texts. Ryan and
Students of mass media have used use word Weisner (1996) instructed fathers and mothers
counts to trace the ebb and flow of support for of adolescents in Los Angeles: Describe your
political figures over time (Danielson & Lasorsa, children. In your own words, just tell us about
1997; Pool, 1952). Differences in the use of them. Ryan and Weisner identified all the
words common to the writings of James Madi- unique words in the answers they got to that
Data Management and Analysis Methods u 777

Figure 29.5. Multidimensional Scaling of Informants Based on Words Used in Descriptions of Horror
Films
SOURCE: Based on data in Nolan and Ryan (1999).

grand-tour question and noted the number of structs and can provide data for systematic com-
times each word was used by mothers and by fa- parisons across groups.
thers. Mothers, for example, were more likely
to use words like friends, creative, time, and Structural Analysis and
honest; fathers were more likely to use words Semantic Networks
like school, good, lack, student, enjoys, inde-
pendent, and extremely. This suggests that Network, or structural, analysis examines the
mothers, on first mention, express concern properties that emerge from relations among
over interpersonal issues, whereas fathers ap- things. As early as 1959, Charles Osgood created
pear to prioritize achievement-oriented and in- word co-occurrence matrices and applied factor
dividualistic issues. This kind of analysis con- analysis and dimensional plotting to describe the
siders neither the contexts in which the words relations among words. Today, semantic network
occur nor whether the words are used nega- analysis is a growing field (Barnett & Danowski,
tively or positively, but distillations like these 1992; Danowski, 1982, 1993). For example,
can help researchers to identify important con- Nolan and Ryan (1999) asked 59 undergraduates
778 u METHODS OF COLLECTING AND ANALYZING EMPIRICAL MATERIALS

(30 women and 29 men) to describe their most Cognitive Maps


memorable horror film. The researchers identi-
fied the 45 most common adjectives, verbs, and Cognitive map analysis combines the intu-
nouns used across the descriptions of the films. ition of human coders with the quantitative
They produced a 45(word)-by-59(person) ma- methods of network analysis. Carleys work
trix, the cells of which indicated whether each with this technique is instructive. Carley argues
student had used each key word in his or her de- that if cognitive models or schemata exist, they
scription. Finally, Nolan and Ryan created a are expressed in the texts of peoples speech and
59(person)-by-59(person) similarity matrix of can be represented as networks of concepts (see
people based on the co-occurrence of the words Carley & Palmquist, 1992, p. 602), an approach
in their descriptions. also suggested by DAndrade (1991). To the ex-
Figure 29.5 shows the MDS of Nolan and tent that cognitive models are widely shared,
Ryans data. Although there is some overlap, it is Carley asserts, even a very small set of texts will
pretty clear that the men and women in their contain the information required for describing
study used different sets of words to describe the models, especially for narrowly defined are-
horror films. Men were more likely to use words nas of life.
such as teenager, disturbing, violence, rural, In one study, Carley (1993) asked students
dark, country, and hillbilly, whereas women some questions about the work of scientists.
were more likely to use words such as boy, little, Here are two examples she collected:
devil, young, horror, father, and evil. Nolan and
Ryan interpreted these results to mean that the Student A: I found that scientists engage in re-
search in order to make discoveries and generate
men had a fear of rural people and places, new ideas. Such research by scientists is hard
whereas the women were more afraid of be- work and often involves collaboration with
trayed intimacy and spiritual possession. (For other scientists which leads to discoveries which
other examples of the use of word-by-word ma- make the scientists famous. Such collaboration
may be informal, such as when they share new
trices, see Jang & Barnett, 1994; Schnegg &
ideas over lunch, or formal, such as when they
Bernard, 1996.) This example makes abun- are coauthors of a paper.
dantly clear the value of turning qualitative data
into quantitative data: Doing so can produce in- Student B: It was hard work to research famous
formation that engenders deeper interpretations scientists engaged in collaboration and I made
of the meanings in the original corpus of qualita- many informal discoveries. My research showed
tive data. Just as in any mass of numbers, it is that scientists engaged in collaboration with
other scientists are coauthors of at least one pa-
hard to see patterns in words unless one first per containing their new ideas. Some scientists
does some kind of data reduction. More about make formal discoveries and have new ideas.
this below. (p. 89)
As in word analysis, one appeal of semantic
network analysis is that the data processing is Carley compared the students texts by analyz-
done by computer. The only investigator bias in- ing 11 concepts: I, scientists, research, hard
troduced in the process is the decision to include work, collaboration, discoveries, new ideas, for-
words that occur at least 10 times or 5 times or mal, informal, coauthors, paper. She coded the
whatever. (For discussion of computer programs concepts for their strength, sign (positive or neg-
that produce word-by-text and word-by-word ative), and direction (whether one concept is
co-occurrence matrices, see Borgatti, 1992; logically prior to others), not just for their exis-
Doerfel & Barnett, 1996.) There is, however, no tence. She found that although students used the
guarantee that the output of any word co-occur- same concepts in their texts, the concepts clearly
rence matrix will be meaningful, and it is notori- had different meanings. To display the differ-
ously easy to read patterns (and thus meanings) ences in understandings, Carley advocates the
into any set of items. use of maps that show the relations between and
Data Management and Analysis Methods u 779

Figure 29.6. Coded Maps of Two Students Texts


SOURCE: Kathleen Carley, Coding Choices for Textual Analysis: A Comparison of Content Analysis and Map
Analysis, in P. Marsden (Ed.), Sociological Methodology (Oxford: Blackwell, 1993), p. 104. Copyright 1993 by
the American Sociological Association. Reproduced by permission of the American Sociological Association.

among concepts. Figure 29.6 shows Carleys Palmquist, 1992; Palmquist, Carley, & Dale,
maps of two of the texts. 1997).
Carleys approach is promising because it Key-words-in-context, word counts, struc-
combines the automation of word counts with tural analysis, and cognitive maps all reduce text
the sensitivity of human intuition and interpre- to the fundamental meanings of specific words.
tation. As Carley recognizes, however, a lot de- These reductions make it easy for researchers to
pends on who does the coding. Different coders identify general patterns and make comparisons
will produce different maps by making differ- across texts. With the exception of KWIC, how-
ent coding choices. In the end, native-language ever, these techniques remove words from the
competence is one of the fundamental method- contexts in which they occur. Subtle nuances are
ological requirements for analysis (see also likely to be lostwhich brings us to the analysis
Carley, 1997; Carley & Kaufer, 1993; Carley & of whole texts.
780 u METHODS OF COLLECTING AND ANALYZING EMPIRICAL MATERIALS

Analyzing Chunks of Text: Coding experience. Morse also suggests 30-50 inter-
views for ethnographies and grounded theory
Coding is the heart and soul of whole-text studies. Finding themes and building theory may
analysis. Coding forces the researcher to make require fewer cases than comparing across
judgments about the meanings of contiguous groups and testing hypotheses or models.
blocks of text. The fundamental tasks associated Once the researcher has established a sample
with coding are sampling, identifying themes, of texts, the next step is to identify the basic units
building codebooks, marking texts, constructing of analysis. The units may be entire texts (books,
models (relationships among codes), and testing interviews, responses to an open-ended question
these models against empirical data. We outline on a survey), grammatical segments (words,
each task below. We then describe some of the word senses, sentences, themes, paragraphs),
major coding traditions: grounded theory, formatting units (rows, columns, or pages), or
schema analysis, classic content analysis, content simply chunks of text that reflect a single
dictionaries, analytic induction, and themewhat Krippendorf (1980, p. 62) calls
ethnographic decision trees. We want to empha- thematic units. In general, where the objective is
size that no particular tradition, whether hu- to compare across texts (as in the case of classical
manistic or positivistic, has a monopoly on text content analysis), the units of analysis need to be
analysis. nonoverlapping. (For discussion of additional
kinds of units of analysis, see Krippendorf,
1980, pp. 57-64; Tesch, 1990.)
Sampling

Investigators must first identify a corpus of Finding Themes


texts, and then select the units of analysis within
the texts. Selection can be either random or pur- Themes are abstract (and often fuzzy) con-
posive, but the choice is not a matter of cleaving structs that investigators identify before, during,
to one epistemological tradition or another. and after data collection. Literature reviews are
Waitzkin and Britt (1993) did a thoroughgoing rich sources for themes, as are investigators
interpretive analysis of encounters between pa- own experiences with subject matter. More of-
tients and doctors by selecting 50 texts at ran- ten than not, however, researchers induce
dom from 336 audiotaped encounters. Trost themes from the text itself.
(1986) used classical content analysis to test how There is more than one way to induce
the relationships between teenagers and their themes. Grounded theorists suggest a careful,
families might be affected by five different di- line-by-line reading of the text while looking for
chotomous variables. He intentionally selected processes, actions, assumptions, and conse-
five cases from each of the 32 possible combina- quences. Schema analysts suggest looking for
tions of the five variables and conducted metaphors, for repetitions of words, and for
32 5 = 160 interviews. shifts in content (Agar & Hobbs, 1985). Content
Samples may also be based on extreme or de- analysts have used KWIC to identify different
viant cases, cases that illustrate maximum vari- meanings. Spradley (1979, pp. 199-201) sug-
ety on variables, cases that are somehow typical gests looking for evidence of social conflict, cul-
of a phenomenon, or cases that confirm or tural contradictions, informal methods of social
disconfirm a hypothesis. (For reviews of control, things that people do in managing im-
nonrandom sampling strategies, see Patton, personal social relationships, methods by which
1990, pp. 169-186; Sandelowski, 1995b.) A sin- people acquire and maintain achieved and as-
gle case may be sufficient to display something cribed status, and information about how peo-
of substantive importance, but Morse (1994) ple solve problems. Each of these arenas is likely
suggests using at least six participants in studies to yield major themes in cultures. Barkin, Ryan,
where one is trying to understand the essence of and Gelberg (1999) had multiple coders inde-
Data Management and Analysis Methods u 781

pendently sort informants statements into the- boundaries and even some cases that are closely
matic piles. They then used multidimensional related but not included within the theme.
scaling and cluster analysis on the pile-sort data Coding is supposed to be data reduction, not pro-
to identify subthemes shared across coders. liferation (Miles, 1979, pp. 593-594). The codes
(For another example, see Patterson, Bettini, & themselves are mnemonic devices used to identify or
Nussbaum, 1993.) mark the specific themes in a text. They can be ei-
Willms et al. (1990) and Miles and ther words or numberswhatever the researcher
Huberman (1994) suggest that researchers start finds easiest to remember and to apply.
with some general themes derived from reading Qualitative researchers working as a team
the literature and add more themes and need to agree up front on what to include in their
subthemes as they go. Shelley (1992) followed codebook. Morse (1994) suggests beginning the
this advice in her study of how social networks process with a group meeting. MacQueen et al.
affect people with end-stage kidney disease. She (1998) suggest that a single team member should
used the Outline of Cultural Materials be designated Keeper of the Codebookwe
(Murdock, 1971) as the basis of her coding strongly agree.
scheme and then added additional themes Good codebooks are developed and refined as
based on a close reading of the text. Bulmer the research goes along. Kurasaki (1997) inter-
(1979) lists 10 different sources of themes, in- viewed 20 sanseithird-generation Japanese
cluding literature reviews, professional defini- Americansand used a grounded theory ap-
tions, local commonsense constructs, and re- proach to do her analysis of ethnic identity. She
searchers values and prior experiences. He also started with seven major themes. As the analysis
notes that investigators general theoretical ori- progressed, she split the major themes into
entations, the richness of the existing literature, subthemes. Eventually, she combined two of the
and the characteristics of the phenomena being major themes and wound up with six major
studied influence the themes researchers are themes and a total of 18 subthemes. (Richards &
likely to find. Richards, 1995, discuss the theoretical principles
No matter how the researcher actually does related to hierarchical coding structures that
inductive coding, by the time he or she has iden- emerge out of the data. Araujo, 1995, uses an ex-
tified the themes and refined them to the point ample from his own research on the traditional
where they can be applied to an entire corpus of British manufacturing industry to describe the
texts, a lot of interpretive analysis has already process of designing and refining hierarchical
been done. Miles and Huberman (1994) say codes.)
simply, Coding is analysis (p. 56). The development and refinement of coding
categories have long been central tasks in classical
Building Codebooks content analysis (see Berelson, 1952,
pp. 147-168; Holsti, 1969, pp. 95-126) and are
Codebooks are simply organized lists of particularly important in the construction of con-
codes (often in hierarchies). How a researcher cept dictionaries (Deese, 1969; Stone et al.,
can develop a codebook is covered in detail by 1966, pp. 134-168). Krippendorf (1980,
Dey (1993, pp. 95-151), Crabtree and Miller pp. 71-84) and Carey, Morgan, and Oxtoby
(1992), and Miles and Huberman (1994, (1996) note that much of codebook refinement
pp. 55-72). MacQueen, McLellan, Kay, and comes during the training of coders to mark the
Milstein (1998) suggest that a good codebook text and in the act of checking for intercoder
should include a detailed description of each agreement. Disagreement among multiple coders
code, inclusion and exclusion criteria, and ex- shows when the codebook is ambiguous and con-
emplars of real text for each theme. If a theme is fusing. The first run also allows the researcher to
particularly abstract, we suggest that the re- identify good examples to include in the
searcher also provide examples of the themes codebook.
782 u METHODS OF COLLECTING AND ANALYZING EMPIRICAL MATERIALS

Marking Texts schema analysts (Quinn, 1997), ethnographic


decision modelers (Gladwin, 1989), and schol-
The act of coding involves the assigning of ars who use analytic induction (Bloor, 1976;
codes to contiguous units of text. Coding serves Cressey, 1953/1971; Lindesmith, 1947/1968).
two distinct purposes in qualitative analysis. In ethnographic decision modeling and in
First, codes act as tags to mark off text in a cor- classical content analysis, models are built on
pus for later retrieval or indexing. Tags are not one set of data and tested on another. In their
associated with any fixed units of text; they can original formulation, Glaser and Strauss (1967)
mark simple phrases or extend across multiple emphasized that building grounded theory mod-
pages. Second, codes act as values assigned to els is a step in the research process and that mod-
fixed units (see Bernard, 1991, 1994; Seidel & els need to be validated. Grounded theorists and
Kelle, 1995). Here, codes are nominal, ordinal, schema analysts today are more likely to validate
or ratio scale values that are applied to fixed, their models by seeking confirmation from ex-
nonoverlapping units of analysis. The pert informants than by analyzing a second set of
nonoverlapping units can be texts (such as para- data. For example, Kearney, Murphy, and
graphs, pages, documents), episodes, cases, or Rosenbaum (1994) checked the validity of their
persons. Codes as tags are associated with model of crack mothers experiences by present-
grounded theory and schema analysis (reviewed ing it to knowledgeable respondents who were
below). Codes as values are associated with clas- familiar with the research.
sic content analysis and content dictionaries. Regardless of the kind of reliability and valid-
The two types of codes are not mutually exclu- ity checks, models are simplifications of reality.
sive, but the use of one glosscodefor both They can be made more or less complicated and
concepts can be misleading. may capture all or only a portion of the variance
in a given set of data. It is up to the investigator
Analyzing Chunks of Texts: Building and his or her peers to decide how much a partic-
Conceptual Models ular model is supposed to describe.
Below we review some of the most common
Once the researcher identifies a set of things methods researchers use to analyze blocks of
(themes, concepts, beliefs, behaviors), the next texts. These include grounded theory, schema
step is to identify how these things are linked to analysis, classical content analysis, content dic-
each other in a theoretical model (Miles & tionaries, analytic induction, and ethnographic
Huberman, 1994, pp. 134-137). Models are sets decision tree analysis.
of abstract constructs and the relationships
among them (Bulmer, 1979). Grounded theory, Grounded Theory
schema analysis, ethnographic decision model-
ing, and analytic induction all include Grounded theorists want to understand peo-
model-building phases. ples experiences in as rigorous and detailed a
Once a model starts to take shape, the re- manner as possible. They want to identify cate-
searcher looks for negative casescases that gories and concepts that emerge from text and
dont fit the model. Negative cases either link these concepts into substantive and formal
disconfirm parts of a model or suggest new con- theories. The original formulation of the
nections that need to be made. In either instance, method (Glaser & Strauss, 1967) is still useful,
negative cases need to be accommodated. Nega- but later works are easier to read and more prac-
tive case analysis is discussed in detail by Becker, tical (Charmaz, 1990; Lincoln & Guba, 1985;
Geer, Hughes, and Strauss (1961, pp. 37-45), Lonkila, 1995; Strauss, 1987). Strauss and
Strauss and Corbin (1990, pp. 108-109), Lin- Corbin (1990), Dey (1993), and Becker (1998)
coln and Guba (1985, pp. 309-313), Dey (1993, provide especially useful guidance. (For some re-
pp. 226-233), Miles and Huberman (1994, cent examples of grounded theory research, see
p. 271), and Becker (1998), and is used by Hunt & Ropo, 1995; Irurita, 1996; Kearney et
Data Management and Analysis Methods u 783

al., 1994; Kearney, Murphy, Irwin, & resent individual and small group influences on
Rosenbaum, 1995; Sohier, 1993; Strauss & action. The matrix is designed to help investiga-
Corbin, 1997; Wilson & Hutchinson, 1996; tors to be more sensitive to conditions, ac-
Wright, 1997.) tions/interactions, and consequences of a phe-
Grounded theory is an iterative process by nomenon and to order these conditions and
which the analyst becomes more and more consequences into theories.
grounded in the data and develops increas- Memoing is one of the principal techniques
ingly richer concepts and models of how the for recording relationships among themes.
phenomenon being studied really works. To do Strauss and Corbin (1990, pp. 18, 73-74,
this, the grounded theorist collects verbatim 109-129, 197-219) discuss three kinds of
transcripts of interviews and reads through a memos: code notes, theory notes, and opera-
small sample of text (usually line by line). tional notes. Code notes describe the concepts
Sandelowski (1995a) observes that analysis of that are being discovered in the discovery of
texts begins with proofreading the material and grounded theory. In theory notes, the researcher
simply underlining key phrases because they tries to summarize his or her ideas about what is
make some as yet inchoate sense (p. 373). In a going on in the text. Operational notes are about
process called open coding, the investigator practical matters.
identifies potential themes by pulling together Once a model starts to take shape, the re-
real examples from the text (Agar, 1996; Ber- searcher uses negative case analysis to identify
nard, 1994; Bogdan & Biklen, 1992; Lincoln & problems and make appropriate revisions. The
Guba, 1985; Lofland & Lofland, 1995; Strauss end results of grounded theory are often dis-
& Corbin, 1990; Taylor & Bogdan, 1984). played through the presentation of segments of
Identifying the categories and terms used by in- textverbatim quotes from informantsas ex-
formants themselves is called in vivo coding emplars of concepts and theories. These illustra-
(Strauss & Corbin, 1990). As grounded theo- tions may be prototypical examples of central
rists develop their concepts and categories, they tendencies or they may represent exceptions to
often decide they need to gather more data the norm. Grounded theory researchers also dis-
from informants. play their theoretical results in maps of the major
As coding categories emerge, the investiga- categories and the relationships among them
tor links them together in theoretical models. (Kearney et al., 1995; Miles & Huberman, 1994,
One technique is to compare and contrast pp. 134-137). These concept maps are similar
themes and concepts. When, why, and under to the personal semantic networks described by
what conditions do these themes occur in the Leinhardt (1987, 1989), Strauss (1992), and
text? Glazer and Strauss (1967, pp. 101-116) DAndrade (1991) (see below).
refer to this as the constant comparison
method, and it is similar to the contrast ques- Schema Analysis
tions Spradley (1979, pp. 160-172) suggests re-
searchers ask informants. (For other good de- Schema analysis combines elements of the lin-
scriptions of the comparison method, see guistic and sociological traditions. It is based on
Glaser, 1978, pp. 56-72; Strauss & Corbin, the idea that people must use cognitive simplifi-
1990, pp. 84-95.) cations to help make sense of the complex infor-
Another useful tool for building theoretical mation to which they are constantly exposed
models is the conditional matrix described by (Casson, 1983, p. 430). Schank and Abelson
Strauss and Corbin (1990, pp. 158-175). The (1977) postulate that schemataor scripts, as
conditional matrix is a set of concentric circles, they call themenable culturally skilled people
each level corresponding to a different unit of to fill in details of a story or event. It is, says
influence. At the center are actions and interac- Wodak (1992, p. 525), our schemata that lead us
tions; the outer rings represent international to interpret Mona Lisas smile as evidence of her
and national concerns, and the inner rings rep- perplexity or her desperation.
784 u METHODS OF COLLECTING AND ANALYZING EMPIRICAL MATERIALS

From a methodological view, schema analysis that everyone knows. Thus she looks for what
is similar to grounded theory. Both begin with a is not said in order to identify underlying cul-
careful reading of verbatim texts and seek to dis- tural assumptions (p. 314).
cover and link themes into theoretical models. For more examples of the search for cultural
In a series of articles, Quinn (1982, 1987, 1992, schemata in texts, see Hollands (1985) study of
1996, 1997) has analyzed hundreds of hours of the reasoning that Americans apply to interper-
interviews to discover concepts underlying sonal problems, Kemptons (1987) study of or-
American marriage and to show how these con- dinary Americans theories of home heat con-
cepts are tied together. Quinns (1997) method trol, Claudia Strausss (1997) study of what
is to exploit clues in ordinary discourse for chemical plant workers and their neighbors
what they tell us about shared cognitionto think about the free enterprise system, and Agar
glean what people must have in mind in order to and Hobbss (1985) analysis of how an infor-
say the things they do (p. 140). She begins by mant became a burglar. We next turn to the two
looking at patterns of speech and the repetition other methods used across the social sciences for
of key words and phrases, paying particular at- analyzing text: classical content analysis and
tention to informants use of metaphors and the content dictionaries.
commonalities in their reasoning about mar-
riage. Quinn found that the hundreds of meta- Displaying Concepts and Models
phors in her corpus of texts fit into just eight
linked classes, which she calls lastingness, Visual displays are an important part of quali-
sharedness, compatibility, mutual benefit, diffi- tative analysis. Selecting key quotes as exem-
culty, effort, success (or failure), and risk of fail- plars, building matrices or forms, and laying the-
ure. ories out in the form of flowcharts or maps are
Metaphors and proverbs are not the only lin- all potent ways to communicate ideas visually to
guistic features used to infer meaning from text. others. Models are typically displayed using
DAndrade (1991) notes that perhaps the sim- boxes and arrows, with the boxes containing
plest and most direct indication of schematic or- themes and the arrows representing the relation-
ganization in naturalistic discourse is the repeti- ships among them. Lines can be unidirectional
tion of associative linkages (p. 294). He or bidirectional. For example, taxonomies are
observes that indeed, anyone who has listened models in which the lines represent the super-
to long stretches of talkwhether generated by and subordinate relationships among items. Re-
a friend, spouse, workmate, informant, or pa- lationships can include causality, association,
tientknows how frequently people circle choices, and time, to name a few.
through the same network of ideas (p. 287). A widely used method for describing themes
In a study of blue-collar workers in Rhode Is- is the presentation of direct quotes from respon-
land, Claudia Strauss (1992) refers to these ideas dentsquotes that lead the reader to under-
as personal semantic networks. She describes stand quickly what it may have taken the re-
such a network from one of her informants. On searcher months or years to figure out. The
rereading her intensive interviews with one of researcher chooses segments of textverbatim
the workers, Strauss found that her informant quotes from respondentsas exemplars of con-
repeatedly referred to ideas associated with cepts, of theories, and of negative cases. Ryan (in
greed, money, businessmen, siblings, and being press) has used multiple coders to identify typi-
different. She displays the relationships among cal quotes. He asks 10 coders to mark the same
these ideas by writing the concepts on a page of corpus of text for three themes. Ryan argues that
paper and connecting them with lines and expla- the text marked by all the coders represents the
nations. central tendency or typical examples of the ab-
Price (1987) observes that when people tell stract constructs, whereas text marked by only
stories, they assume that their listeners share some of the coders represents less typical exam-
with them many assumptions about how the ples and is more typical of the edges of the
world works, and so they leave out information construct.
Data Management and Analysis Methods u 785

Tables can be used to organize and display pure women survive and unmitigated masculin-
raw text or can be used to summarize qualita- ity leads to death (p. 195).
tive data along multiple dimensions (rows and The coding of texts is usually assigned to mul-
columns). The cells can be filled with verbatim tiple coders so that the researcher can see
quotes (Bernard & Ashton-Voyoucalos, 1976; whether the constructs being investigated are
Leinhardt & Smith, 1985, p. 254; Miles & shared and whether multiple coders can reliably
Huberman, 1994, p. 130), summary statements apply the same codes. Typically, investigators first
(Yoder 1995), or symbols (Fjellman & Gladwin, calculate the percentage of agreement among
1985; Van Maanen, Miller, & Johnson, 1982). coders for each variable or theme. They then ap-
(For a range of presentation formats, see Ber- ply a correction formula to take account of the
nard, 1994; Miles & Huberman, 1994; Werner fact that some fraction of agreement will always
& Schoepfle, 1987.) occur by chance. The amount of that fraction de-
pends on the number of coders and the precision
of measurement for each code. If two people
Classical Content Analysis code a theme present or absent, they could agree,
ceteris paribus, on any answer 25% of the time by
Whereas grounded theory is concerned with chance. If a theme, such as wealth, is measured
the discovery of data-induced hypotheses, clas- ordinally (low, medium, high), then the likeli-
sical content analysis comprises techniques for hood of chance agreement changes accordingly.
reducing texts to a unit-by-variable matrix and Cohens (196) kappa, or K, is a popular measure
analyzing that matrix quantitatively to test hy- for taking these chances into account. When K is
potheses. The researcher can produce a matrix zero, agreement is what might be expected by
by applying a set of codes to a set of qualitative chance. When K is negative, the observed level of
data (including written texts as well as audio agreement is less than one would expect by
and video media). Unlike grounded theory or chance. How much intercoder agreement is
schema analysis, content analysis assumes that enough? The standards are still ad hoc, but
the codes of interest have already been discov- Krippendorf (1980, pp. 147-148) advocates
ered and described. agreement of at least .70 and notes that some
Once the researcher has selected a sample of scholars (e.g., Brouwer, Clark, Gerbner, &
texts, the next step in classical content analysis Krippendorf, 1969) use a cutoff of .80. Fleiss
is to code each unit for each of the themes or (1971) and Light (1971) expand kappa to handle
variables in the codebook. This produces a multiple coders. For other measures of
unit-by-variable matrix that can be analyzed us- intercoder agreement, see Krippendorf (1980,
ing a variety of statistical techniques. For exam- pp. 147-154) and Craig (1981).
ple, Cowan and OBrien (1990) tested whether Reliability concerns the extent to which an
males or females are more likely to be survivors experiment, test, or any measuring procedure
in slasher films. Conventional wisdom about yields the same results on repeated trials
such films suggests that victims are mostly (Carmines & Zeller, 1979, p. 11). A high level of
women and slashers are mostly men. Cowan intercoder agreement is evidence that a theme
and OBrien selected a corpus of 56 slasher has some external validity and is not just a fig-
films and identified 474 victims. They coded ment of the investigators imagination (Mitchell,
each victim for gender and survival. They found 1979). Not surprisingly, investigators have sug-
that slashers are mostly men, but it turned out gested many ways to assess validity (for reviews
that victims are equally likely to be male or fe- of key issues, see Campbell, 1957; Campbell &
male. Women who survive are less likely to be Stanley, 1963; Cook & Campbell, 1979; Denzin,
shown engaging in sexual behavior and are less 1997; Fielding & Fielding, 1986; Guba, 1981;
likely to be physically attractive than their Guba & Lincoln, 1982; Hammersley, 1992; Kirk
nonsurviving counterparts. Male victims are & Miller, 1986; Lincoln & Guba, 1985). Ber-
cynical, egotistical, and dictatorial. Cowan and nard (1994) argues that, ultimately, the validity
OBrien conclude that, in slasher films, sexually of a concept depends on the utility of the device
786 u METHODS OF COLLECTING AND ANALYZING EMPIRICAL MATERIALS

that measures it and the collective judgment of uses a dictionary (the Harvard Psychosocial Dic-
the scientific community that a construct and its tionary) to parse and assign text to coded
measure are valid. In the end, he says, we are categories. Over time, the dictionary has been
left to deal with the effects of our judgments, updated. The latest version (Harvard IV) con-
which is just as it should be. Valid measurement tains more than 10,000 words and can distin-
makes valid data, but validity itself depends on guish among multiple meanings of words
the collective opinion of researchers (p. 43). (Rosenberg, Schnurr, & Oxman, 1990, p. 303).
Generalizability refers to the degree to which Because such dictionaries do not contain all the
the findings are applicable to other populations words in the English language, investigators can
or samples. It draws on the degree to which the assign unrecognized words to categories as they
original data were representative of a larger pop- see fit, a process of further modifying the
ulation. codebook.
For reviews of work in content analysis, see How effective are computer-based dictionar-
Pool (1959); Gerbner, Holsti, Krippendorf, ies? An early version of the General Inquirer was
Paisley, and Stone (1969); Holsti (1969); tested on 66 suicide notes33 written by men
Krippendorf (1980); Weber (1990); and Rob- who had actually taken their own lives and 33
erts (1997). Examples of classical content analy- written by men who were asked to produce sim-
sis can be found in media studies (Hirschman, ulated suicide notes. The program parsed the
1987; Kolbe & Albanese, 1996; Spiggle, 1986), texts and picked the actual suicide notes 91% of
political rhetoric (Kaid, Tedesco, & McKinnon, the time (Ogilvie, Stone, & Schneidman, 1966).
1996), folklore (Johnson & Price-Williams, Content dictionaries do not need to be very big
1997), business relations (Spears, Mowen, & to be useful. Colby (1966) created a simple dic-
Chakraborty, 1996), health care delivery (Potts, tionary to distinguish between Navaho and Zuni
Runyan, Zerger, & Marchetti, 1996; Sleath, responses to thematic apperception tests. For
Svarstad, & Roter, 1997), and law (Imrich, additional examples of special-purpose dictio-
Mullin, & Linz, 1995). Classical content analy- naries in content analysis, see Fan and Shaffer
sis is also the fundamental means by which an- (1990), Furbee (1996), Holsti (1966), Jehn and
thropologists test cross-cultural hypotheses Werner (1993), Laffal (1990, 1995), McTavish
(Bradley, Moore, Burton, & White, 1990; Em- and Pirro (1990), and Schnurr, Rosenberg,
ber & Ember, 1992; White & Burton, 1988). Oxman, and Tucker (1986).
For early, but fundamental, criticisms of the ap- Content dictionaries are attractive because
proach, see Kracauer (1953) and George (1959). they are entirely reliable and automated, but, as
Shapiro (1997) argues, this may be offset by a
Content Dictionaries decrease in validity. For the time being, only hu-
mans can parse certain subtleties of meaning re-
Computer-based, general-purpose content flected in context (Viney, 1983), but com-
analysis dictionaries allow investigators to auto- puter-based dictionaries are getting better all the
mate the coding of texts. To build such dictio- time. For example, texts are now scored by com-
naries, researchers assign words, by hand, to one puter for the Gottschalk-Gleser psychological
or more categories (there are typically 50-60 cat- scales (measuring various forms of anxiety and
egories in computerized content analysis dictio- hostility) with greater than .80 reliability
naries) according to a set of rules. The rules are (Gottschalk & Bechtel, 1993).
part of a computer program that parses new
texts, assigning words to categories. Analytic Induction
Work on content dictionaries began in the and Boolean Tests
1960s with the General Inquirer and continues
to this day (Kelly & Stone, 1975; Stone et al., Analytic induction is a formal, nonquanti-
1966; Zuell, Weber, & Mohler, 1989). The tative method for building up causal explana-
General Inquirer is a computer program that tions of phenomena from a close examination of
Data Management and Analysis Methods u 787

cases. It was proposed as an alternative to statis- negative case analysis, see Becker, 1998,
tical analysis by Znaniecki (1934, pp. 146-214.)
pp. 249-331), modified by Lindesmith (1947/ Schweizer (1991, 1996) applied this method
1968) and Cressey (1953/1971), and is dis- in his analysis of conflict and social status among
cussed by Denzin (1978), Bulmer (1979), residents of Chen Village, China. (For a discus-
Manning (1982), and Becker (1998), among sion of Schweizers data collection and analysis
others. (For critiques of the approach, see Rob- methods, see Bernard & Ryan, 1998.) All the
inson, 1951.) The method is a formal kind of data about the actors in this political drama were
negative case analysis. extracted from a historical narrative about Chen
The technique can be described in a series of Village. Like classic content analysis and cogni-
steps: First, define a phenomenon that requires tive mapping, analytic induction requires that
explanation and propose an explanation. Next, human coders read and code text and then pro-
examine a case to see if the explanation fits. If it duce an event-by-variable matrix. The object of
does, then examine another case. An explana- the analysis, however, is not to show the relation-
tion is accepted until a new case falsifies it. ships among all codes, but to find the minimal set
When a case is found that doesnt fit, then, un- of logical relationships among the concepts that
der the rules of analytic induction, the alterna- accounts for a single dependent variable. With
tives are to change the explanation (so that you more than three variables, the analysis becomes
can include the new case) or redefine the phe- much more difficult. Computer programs such as
nomenon (so that you exclude the nuisance QCA (Drass, 1980) and ANTHROPAC
case). Ideally, the process continues until a uni- (Borgatti, 1992) test all possible multivariate hy-
versal explanation for all known cases of a phe- potheses and find the optimal solution. (QCA is
nomenon is attained. Explaining cases by de- reviewed in Weitzman & Miles, 1995.)
claring them all unique is a tempting but
illegitimate option. Classic examples of analytic Ethnographic Decision Models
induction include Lindesmiths (1947/1968)
study of drug addicts, Cresseys (1953/1971) Ethnographic decision models (EDMs) are
study of embezzlers, and McClearys (1978) qualitative, causal analyses that predict behav-
study of how parole officers decide when one of ioral choices under specific circumstances. An
their charges is in violation of parole. For a par- EDM, often referred to as a decision tree or
ticularly clear example of the technique, see flowchart, comprises a series of nested if-then
Bloors (1976, 1978) analysis of how doctors statements that link criteria (and combinations of
decide whether or not to remove childrens ton- criteria) to the behavior of interest (Figure 29.7).
sils. EDMs have been used to explain how fishermen
Ragin (1987, 1994) formalized the logic of decide where to fish (Gatewood, 1983), what
analytic induction, using a Boolean approach, prices people decide to place on their products
and Romme (1995) applies the approach to tex- (Gladwin, 1971; Quinn, 1978), and which treat-
tual data. Boolean algebra involves just two ments people choose for an illness (Mathews &
states (true and false, present and absent), but Hill, 1990; Ryan & Martnez, 1996; Young,
even with such simple inputs, things can get 1980).
very complicated, very quickly. With just three EDMs combine many of the techniques em-
dichotomous causal conditions (A and not A, B ployed in grounded theory and classic content
and not B, and C and not C) and one outcome analysis. Gladwin (1989) lays out the fundamen-
variable (D and not D), there are 16 possible tal steps to building an ethnographic decision
cases: A, B, C, D; A, not B, C, D; A, B, not C, D; tree model. (For other clear descriptions of the
and so on. Boolean analysis involves setting up steps, see Hill, 1998; Ryan & Martnez, 1996.)
what is known as a truth table, or a matrix of EDMs require exploratory data collection,
the actual versus the possible outcomes. (For preliminary model building, and model testing.
more on truth tables and how they are related to First, researchers identify the decisions they want
788
u

Figure 29.7. Decision Model of Constraints on the Use of Pills or Liquid Medications for Mothers Treating Children with Diarrhea in Rural Mexico
SOURCE: Based on data in Ryan and Martnez (1996).
Data Management and Analysis Methods u 789

to explore and the alternatives that are avail- they test it on an independent sample to see if it
able. Typically, EDMs are done on simple predicts as well as it postdicts. Typically, EDMs
yes/no types of behaviors. They can be used, predict more than 80% of whatever behavior is
however, to predict multiple behaviors being modeled, far above what we expect by
(Mathews & Hill, 1990; Young, 1980) as well chance. (For more detailed arguments on how to
as the order of multiple behaviors (Ryan & calculate accuracy in EDMs, see Ryan &
Martnez, 1996). Martnez, 1996; Weller et al., 1997.)
Next, the researchers conduct open-ended Because of the intensive labor involved,
interviews to discover the criteria people use to EDMs have been necessarily restricted to rela-
select among alternatives. The researchers first tively simple decisions in relatively small and ho-
ask people to recall the most recent example of mogeneous populations. Recently, however, we
an actualnot a hypotheticalbehavior and to found we could effectively test, on a nationally
recall why they did or did not do the behavior. representative sample, our ethnographically de-
Here is an example from a study weve done re- rived decision models for whether or not to recy-
cently: Think about the last time you had a can cle cans and whether or not to ask for paper or
of something to drink in your handsoda, plastic bags at the grocery store (Bernard, Ryan,
juice, water, beer, whatever. Did you recycle the & Borgatti, 1999).
can? Why [Why not]? This kind of question EDMs can be displayed as decision trees (e.g.,
generates a list of decision criteria. To under- Gladwin, 1989), as decision tables (Mathews &
stand how these criteria might be linked, EDM Hill, 1990; Young, 1980), or as sets of rules in the
researchers ask people to compare the latest de- form of if-then statements (Ryan & Martnez,
cision with other similar decisions made in the 1996). Like componential analysis, folk taxono-
past. Some researchers have used vignettes to mies, and schema analysis, EDMs represent an
elicit the relationships among criteria (e.g., aggregate decision process and do not necessarily
Weller, Ruebush, & Klein, 1997; Young, 1980). represent what is going on inside peoples heads
With a list of decision criteria in hand, the re- (Garro, 1998).
searchers next step is to systematically collect
data, preferably from a new group of people,
about how each criterion applies or does not u Breaking Down the Boundaries
apply to a recent example of the behavior. Was
a recycling bin handy? and Do you normally
recycle cans at home? are 2 of the 30 questions
weve asked people in our study of recycling be- Text analysis as a research strategy permeates the
havior. The data from this stage are used for to social sciences, and the range of methods for con-
build a preliminary model of the decision pro- ducting text analysis is inspiring. Investigators
cess for the behavior under scrutiny. Cases that examine words, sentences, paragraphs, pages,
do not fit the model are examined closely and documents, ideas, meanings, paralinguistic fea-
the model is modified. Researchers tweak, or tures, and even what is missing from the text.
tune, the model until they achieve a satisfactory They interpret, mark, retrieve, and count. By
level of postdictive accuracyunderstood to be turns, they apply interpretive analysis and nu-
at least 80% among EDM researchers. Parsimo- merical analysis. They use text analysis for ex-
nious models are favored over more compli- ploratory and confirmatory purposes. Re-
cated ones. (For automated ways of building searchers identify themes, describe them, and
and pruning decision trees, see Mingers, 1989a, compare them across cases and groups. Finally,
1989b.) they combine themes into conceptual models and
The process doesnt end therethe same theories to explain and predict social phenom-
data are used in building a preliminary model ena.
and in testing its postdictive accuracy. When Figure 29.1 depicts a broad range of analysis
EDM researchers feel confident in their model, techniques found across the social sciences. To
790 u METHODS OF COLLECTING AND ANALYZING EMPIRICAL MATERIALS

conform our presentation with the literature on combined methods to understand their data
qualitative methods, we have organized these more fully.
techniques according to the goals of the investi- Jehn and Doucet (1996, 1997) used word
gators and the kinds of texts to which the tech- counts, classical content analysis, and mental
niques are typically applied. mapping to examine conflicts among Chinese
In this chapter, we focus on the sociological and U.S. business associates. They asked 76 U.S.
tradition that uses text as a window into experi- managers who had worked in Sino-American
ence rather than the linguistic tradition that de- joint ventures to describe recent interpersonal
scribes how texts are developed and structured. conflicts with business partners. Each person de-
Texts such as conversations, performances, and scribed a situation with a same-culture manager
narratives are analyzed by investigators from and a different-cultural manager. The research-
both the sociological and linguistic traditions. ers made sure that each manager interviewed in-
Although the agendas of the investigators may cluded information about his or her relationship
differ, we see no reason many of the sociological to the other person, who was involved, what the
techniques we describe could not be useful in the conflict was about, what caused the conflict, and
linguistic tradition and vice versa. how the conflict was resolved.
We also distinguish between those analyses After collecting the narratives, Jehn and
associated with systematically elicited data and Doucet asked their informants to help identify
those associated with free-flowing texts. We ar- the emic themes in the narratives. First, they
gue, however, that these data-analytic pairings generated separate lists of words from the
are ones of convention rather than necessity. In- intercultural and intracultural conflict narra-
vestigators want to (a) identify the range and sa- tives. They asked three expatriate managers to
lience of key items and concepts, (b) discover the act as judges and to identify all the words that
relationships among these items and concepts, were related to conflict. They settled on a list of
and (c) build and test models linking these con- 542 conflict words from the intercultural list
cepts together. They use free-listing tasks, and 242 conflict words from the intracultural
KWIC, word counts, and the exploratory phases list. Jehn and Doucet then asked the three judges
of grounded theory, schema analysis, and EDM to sort the words into piles or categories. The ex-
to discover potentially useful themes and con- perts identified 15 subcategories for the
cepts. intercultural data (things like conflict, expecta-
Researchers use pile sorts, paired compari- tions, rules, power, and volatile) and 15 catego-
sons, triads tests, frame substitution tasks, se- ries for the intracultural data (things like con-
mantic networks, cognitive maps, content analy- flict, needs, standards, power, contentious, and
sis and content dictionaries, and the modeling lose). Taking into consideration the total num-
phases of grounded theory, schema analysis, and ber of words in each corpus, conflict words were
EDM to discover how abstract concepts are re- used more in intracultural interviews and resolu-
lated to each other. They display the relation- tion terms were more likely to be used in inter-
ships as models or frameworks. These frame- cultural interviews.
works include formal models that rely on Jehn and Doucet also used traditional con-
Boolean logic (componential analysis and ana- tent analysis on their data. The had two coders
lytic induction), hierarchical models (taxono- read the 152 conflict scenarios (76 intracultural
mies and ethnographic decision models), proba- and 76 intercultural) and evaluate (on a 5-point
bilistic models (classic content analysis and scale) each on 27 different themes they had iden-
content dictionaries), and more abstract models tified from the literature. This produced two
such as those produced by grounded theory and 76 27 scenario-by-theme profile matrices
schema analysis. Below we describe two impor- one for the intracultural conflicts and one for
tant examples of studies in which researchers the intercultural conflicts. The first three factors
Data Management and Analysis Methods u 791

from the intercultural matrix reflect (a) inter- pulled all the statements that pertained to infor-
personal animosity and hostility, (b) aggrava- mants interactions or assessments of other
tion, and (c) the volatile nature of the conflict. people. He then looked at the statements and
The first two factors from the intracultural ma- sorted them into piles based on their content. He
trix reflect (a) hatred and animosity with a vola- named each pile as a theme and assessed how the
tile nature and (b) conflicts conducted calmly themes interacted. He found that he had three
with little verbal intensity. piles. The first contained statements in which the
Finally, Jehn and Doucet identified the 30 informant was expressing negative feelings for a
intracultural and the 30 intercultural scenarios person in a dominant social position. The second
that they felt were the clearest and pithiest. was made up of statements emphasizing the
They recruited 50 more expatriate managers to others knowledge or awareness. The statements
assess the similarities (on a 5-point scale) of in the third small cluster emphasized the impor-
60-120 randomly selected pairs of scenarios. tance of change or openness to new experiences.
When combined across informants, the manag- From this intuitive analysis, Agar felt that his
ers judgments produced two aggregate, sce- informants were telling him that those in author-
nario-by-scenario, similarity matricesone for ity were only interested in displaying their au-
the intracultural conflicts and one for the thority unless they had knowledge or awareness;
intercultural conflicts. Multidimensional scal- knowledge or awareness comes through open-
ing of the intercultural similarity data identified ness to new experience; most in authority are
four dimensions: (a) open versus resistant to closed to new experience or change.
change, (b) situational causes versus individual To test his intuitive understanding of the data,
traits, (c) high- versus low-resolution potential Agar (1983) used all the statements from a single
based on trust, and (d) high- versus low-resolu- informant and coded the statements for their role
tion potential based on patience. Scaling of the type (kin, friend/acquaintance, educational, oc-
intracultural similarity data identified four dif- cupational, or other), power (dominant, symmet-
ferent dimensions: (a) high versus low coopera- rical, subordinate, or undetermined), and affect
tion, (b) high versus low confrontation, (c) (positive, negative, ambivalent, or absent). Agar
problem solving versus accepting, and (d) re- was particularly interested in whether negative
solved versus ongoing. sentiments were expressed toward those in domi-
The work of Jehn and Doucet is impressive nant social roles. For one informant, Agar found
because the analysis of the data from these tasks that out of 40 statements coded as dominant, 32
produced different sets of themes. All three were coded negative and 8 were coded positive.
emically induced theme sets have some intuitive For the 36 statements coded as symmetrical, 20
appeal, and all three yield analytic results that were coded positive and 16 negative, lending
are useful. The researchers could have also used support to his original theory.
the techniques of grounded theory or schema Next, Agar looked closely at the deviant
analysis to discover even more themes. casesthe 8 statements where the informant ex-
Jehn and Doucet are not the only research- pressed positive affect toward a person in a domi-
ers ever to combine different analytic tech- nant role. These counterexamples suggested that
niques. In a series of articles on young adult the positive affect was expressed toward a domi-
occasional drug users, Agar (1979, 1980, nant social other when the social other possessed,
1983) used grounded theory methods to build or was communicating to the informant, knowl-
models of behavior. He then used classical con- edge that the informant valued.
tent analysis to test his hypotheses. Agar con- Finally, Agar (1980) developed a more sys-
ducted and transcribed three interviews with tematic questionnaire to test his hypothesis fur-
each of his three informants. In his 1979 article, ther. He selected 12 statements, 4 from each of
Agar describes his initial, intuitive analysis. He the control, knowledge, and change themes iden-
792 u METHODS OF COLLECTING AND ANALYZING EMPIRICAL MATERIALS

tified earlier. He matched these statements with others, make it easier and easier for researchers
eight roles from the informants transcript (fa- to identify themes, build codebooks, mark text,
ther, mother, employer, teacher, friend, wife, create memos, and develop theoretical models.
coworker, and teammate). Agar then returned to Based loosely on a grounded theory type of ap-
his informant and asked if the resulting state- proach to qualitative analysis, many program
ments were true, false, or irrelevant. (In no case suites have recently folded in techniques from
did the informant report irrelevant.) Agar classical content analysis. Several programs, for
then compared the informants responses to his example, allow researchers to export data to ma-
original hypotheses. He found that on balance trices that they can then analyze using other pro-
his hypotheses were correct, but discrepancies grams.
between his expectations and his results sug- Investigators, however, remain constrained
gested areas for further research. by program-defined units of analysisusually
These examples show that investigators can marked blocks of text or informants. Re-
apply one technique to different kinds of data searchers need the flexibility to create matrices
and they can apply multiple techniques to the on demand, whether they be word-by-theme or
same data set. Text analysis is used by avowed word-by-informant matrices for word analysis
positivists and interpretivists alike. As we have and sentence-by-code or paragraph-by-code ma-
argued elsewhere (Bernard, 1993; Bernard & trices for content analysis. A series of word anal-
Ryan, 1998), methods are simply tools that be- ysis functions would greatly enhance the auto-
long to everyone. mated coding features found in programs that
are geared to the interests of scholars in the
grounded theory school. Investigators should be
u Whats Next? able to code a section of text using grounded the-
ory, then identify the key words associated with
each theme. They should be able to use key
words to search for additional occurrences of
We do not want to minimize the profound intel- the theme in large corpuses of text.
lectual differences in the epistemological posi- When programs make it easy to use multiple
tions of positivists and interpretivists. We think, coders and to identify intercoder agreements
however, that when researchers can move easily and disagreements systematically, researchers
and cheaply between qualitative and quantita- will be better able to describe themes and to train
tive data collection and analysis, the distinctions assistants. Adding a variety of measures for cal-
between the two epistemological positions will culating intercoder agreement, which only some
become of less practical importance. That is, as programs do, would also be helpful. Some pro-
researchers recognize the full array of tools at grams offer researchers the option of recording
their disposal, and as these tools become easier the marking behavior of multiple coders, yet of-
to use, the pragmatics of research will lessen the fer no direct way to measure intercoder agree-
distinction between qualitative and quantitative ment.
data and analysis. The evolution of text analysis software is just
The process is under wayand is moving beginning. Some 15 years ago, spell checkers,
fastwith the development of increasingly use- thesauruses, and scalable fonts were all sold sep-
ful software tools for qualitative data analysis. arately. Today, these functions are integrated
Useful tools create markets, and market needs into all full-featured word-processing packages.
create increasingly useful tools. Qualitative data Just 10 years ago, graphics programs were sold
analysis packages (ATLAS/ti, NUDIST, separately from programs that do statistical
Code-A-Text, the Ethnograph, AnSWR, and analysis. Today, graphics functions are inte-
others) have improved dramatically over the grated into all full-featured packages for statisti-
past few years (Fischer, 1994; Kelle, 1995; cal analysis. As programmers of text analysis
Weitzman & Miles, 1995). These products, and software compete for market share, packages
Data Management and Analysis Methods u 793

will become more inclusive, incorporating thropology (pp. 413-431). Urbana: University
methods from both sides of the epistemological of Illinois Press.
divide. It cant happen too soon. Albert, S. M. (1991). Cognition of caregiving
tasks: Multidimensional scaling of the care-
giver task domain. Gerontologist, 31,
726-734.
n Notes Allen, J. T., & Italie, G. (1954). A concordance to
Euripides. Berkeley: University of California
1. MDS displays are highly evocative. They Press.
beg to be interpreted. In fact, they must be inter- Araujo, L. (1995). Designing and refining hierar-
preted. Why are some illnesses at the top of Fig- chical coding frames. In U. Kelle (Ed.), Com-
ure 29.3 and some at the bottom? We think the puter-aided qualitative data analysis: Theory,
illnesses at the top are more of the chronic vari- methods and practice (pp. 96-104). London:
ety, whereas those at the bottom are more acute. Sage.
We also think that the illnesses on the left are Barkin, S., Ryan, G. W., & Gelberg, L. (1999).
less serious than those on the right. We can test What clinicians can do to further youth vio-
ideas like these by asking key informants to help lence primary prevention: A qualitative study.
us understand the arrangement of the illnesses Injury Prevention, 5, 53-58.
in the MDS plot. (For more examples of mental Barnett, G. A., & Danowski, J. A. (1992). The
maps, see Albert, 1991; DAndrade et al., 1972; structure of communication: A network anal-
Erickson, 1997.) (There is a formal method, ysis of the International Communication As-
called property fitting analysis, or PROFIT, for sociation. Human Communication Research,
testing ideas about the distribution of items in 19, 164-285.
an MDS map. This method is based on linear re- Becker, H. S. (1998). Tricks of the trade: How to
gression. See Kruskal & Wish, 1978.) think about your research while youre doing
2. Alternatively, profile matrices (the usual it. Chicago: University of Chicago Press.
thing-by-variable attribute matrix ubiquitous in Becker, H. S., Geer, B., Hughes, E. C., & Strauss,
the social sciences) can be converted to similar- A. L. (1961). Boys in white: Student culture in
ity matrices (thing-by-thing matrices in which medical school. Chicago: University of Chi-
the cells contain measures of similarity among cago Press.
pairs of things) and then analyzed with MDS Berelson, B. (1952). Content analysis in commu-
(for step-by-step instructions, see Borgatti, nication research. Glencoe, IL: Free Press.
1999). Bernard, H. R. (1991). About text management
and computers. CAM Newsletter, 3(1), 1-4, 7,
12.
Bernard, H. R. (1993). Methods belong to all of
n References us. In R. Borofsky (Ed.), Assessing cultural an-
thropology (pp. 168-178). New York:
McGraw-Hill.
Agar, M. (1979). Themes revisited: Some prob- Bernard, H. R. (1994). Research methods in an-
lems in cognitive anthropology. Discourse thropology: Qualitative and quantitative ap-
Processes, 2, 11-31. proaches (2nd ed.). Walnut Creek, CA:
Agar, M. (1980). Getting better quality stuff: AltaMira.
Methodological competition in an interdis- Bernard, H. R., & Ashton-Voyoucalos, S. (1976).
ciplinary niche. Urban Life, 9, 34-50. Return migration to Greece. Journal of the
Agar, M. (1983). Microcomputers as field Steward Anthropological Society, 8(1), 31-51.
tools. Computers and the Humanities, 17, Bernard, H. R., & Ryan, G. W. (1998). Qualita-
19-26. tive and quantitative methods of text analysis.
Agar, M. (1996). Speaking of ethnography (2nd In H. R. Bernard (Ed.), Handbook of research
ed.). Thousand Oaks, CA: Sage. methods in cultural anthropology
Agar, M., & Hobbs, J. (1985). How to grow (pp. 595-646). Walnut Creek, CA: AltaMira.
schemata out of interviews. In J. W. D. Bernard, H. R., Ryan, G. W., & Borgatti, S.
Dougherty (Ed.), Directions in cognitive an- (1999). Green cognition and behaviors. Re-
794 u METHODS OF COLLECTING AND ANALYZING EMPIRICAL MATERIALS

port submitted to Ford Research Labora- Burton, D. M. (1981b). Automated concor-


tories, Dearborn, MI. dances and word indexes: The process, the
Bessinger, J. B. (1969). A concordance to programs, and the products. Computers and
Beowulf. Ithaca, NY: Cornell University the Humanities, 15, 139-154.
Press. Burton, D. M. (1982). Automated concordances
Bloor, M. (1976). Bishop Berkeley and the and word indexes: Machine decisions and
adenotonsillectomy dilemma. Sociology, 10, editorial revisions. Computers and the Hu-
43-61. manities, 16, 195-218.
Bloor, M. (1978). On the analysis of observa- Campbell, D. T. (1957). Factors relevant to the
tional data: A discussion of the worth and validity of experiments in social settings. Psy-
uses of inductive techniques and respondent chological Bulletin, 54, 297-312.
validation. Sociology, 12, 545-557. Campbell, D. T., & Stanley, J. C. (1963). Experi-
Bogdan, R. C., & Biklen, S. K. (1992). Qualita- mental and quasi-experimental designs for re-
tive research for education: An introduction search. Chicago: Rand McNally.
to theory and methods (2nd ed.). Boston: Carey, J. W., Morgan, M., & Oxtoby, M. J.
Allyn & Bacon. (1996). Intercoder agreement in analysis of
Borgatti, S. P. (1992). ANTHROPAC 4.0. Co- responses to open-ended interview ques-
lumbia, SC: Analytic Technologies. Available tions: Examples from tuberculosis research.
Internet: http://www.analytictech.com Cultural Anthropology Methods Journal,
Borgatti, S. P. (1998). The methods. In V. C. De 8(3), 1-5.
Munck & E. J. Sobo (Eds.), Using methods in Carley, K. (1993). Coding choices for textual
the field: A practical introduction and case- analysis: A comparison of content analysis
book (pp. 249-252). Walnut Creek, CA: and map analysis. In P. Marsden (Ed.), Socio-
AltaMira. logical methodology (pp. 75-126). Oxford:
Borgatti, S. P. (1999). Elicitation methods for Blackwell.
cultural domain analysis. In J. Schensul, M. Carley, K. (1997). Network text analysis: The
LeCompte, S. Borgatti, & B. Nastasi (Eds.), network position of concepts. In C. W. Rob-
The ethnographers toolkit: Vol. 3. Enhanced erts (Ed.), Text analysis for the social sciences:
ethnographic methods (pp. 115-151). Walnut Methods for drawing statistical inferences
Creek, CA: AltaMira. from texts and transcripts (pp. 79-100).
Boster, J. (1994). The successive pile sort. Cul- Mahwah, NJ: Lawrence Erlbaum.
tural Anthropology Methods Journal, 6(2), Carley, K., & Kaufer, D. S. (1993). Semantic
11-12. connectivity: An approach for analyzing se-
Bradley, C., Moore, C. C., Burton, M. L., & mantic networks. Communication Theory, 3,
White, D. R. (1990). A cross-cultural histori- 182-213.
cal analysis of subsistence change. American Carley, K., & Palmquist, P. (1992). Extracting,
Anthropologist, 92, 447-457. representing, and analyzing mental models.
Brouwer, M., Clark, C. C., Gerbner, G., & Social Forces, 70, 601-636.
Krippendorf, K. (1969). The television world Carmines, E. G., & Zeller, R. A. (1982). Reli-
of violence. In R. K. Baker & S. J. Ball (Eds.), ability and validity assessment. Beverly Hills,
Mass media and violence: A report to the Na- CA: Sage.
tional Commission on the Causes and Preven- Casson, R. (1983). Schemata in cultural anthro-
tion of Violence (pp. 311-339, 519-591). pology. Annual Review of Anthropology, 12,
Washington, DC: Government Printing Of- 429-462.
fice. Charmaz, K. (1990). Discovering chronic ill-
Bulmer, M. (1979). Concepts in the analysis of ness: Using grounded theory. Social Science
qualitative data. Sociological Review, 27, and Medicine, 30, 1161-1172.
651-677. Cohen, J. (1960). A coefficient of agreement for
Burton, D. M. (1981a). Automated concor- nominal scales. Educational and Psychologi-
dances and word indexes: The early sixties cal Measurement, 20, 37-48.
and the early centers. Computers and the Hu- Colby, B. N. (1966). The analysis of culture con-
manities, 15, 83-100. tent and the patterning of narrative concern
Data Management and Analysis Methods u 795

in texts. American Anthropologist, 68, Burgoon (Ed.), Communication yearbook 6


374-388. (pp. 9042D925). Beverly Hills, CA: Sage.
Conklin, H. (1955). Hanuno color categories. Danowski, J. A. (1993). Network analysis of mes-
Southwest Journal of Anthropology, 11, sage content. In W. D. Richards & G. A.
339-344. Barnett (Eds.), Progress in communication sci-
Cook, T. D., & Campbell, D. T. (1979). ence (Vol. 12, pp. 197-221). Norwood, NJ:
Quasi-experimentation: Design and analysis Ablex.
issues for field settings. Chicago: Rand Darton, M. (1976). Modern concordance to the
McNally. New Testament. Garden City, NY: Doubleday.
Cowan, G., & OBrien, M. (1990). Gender and Deese, J. (1969). Conceptual categories in the
survival versus death in slasher films: A con- study of content. In G. Gerbner, O. R. Holsti,
tent analysis. Sex Roles, 23(3-4), 187-196. K. Krippendorf, W. J. Paisley, & P. J. Stone
Crabtree, B. F., & Miller, W. L. (1992). A tem- (Eds.), The analysis of communication con-
plate approach to text analysis: Developing tent: Developments in scientific theories and
and using codebooks. In B. F. Crabtree & W. computer techniques (pp. 39-56). New York:
L. Miller (Eds.), Doing qualitative research John Wiley.
(pp.2093-109). Newbury Park, CA: Sage. Denzin, N. K. (1978). The research act: A theoret-
Craig, R. T. (1981). Generalization of Scotts ical introduction to sociological methods (2nd
index of intercoder agreement. Public Opin- ed.). New York: McGraw-Hill.
ion Quarterly, 45, 260-264. Denzin, N. K. (1997). Interpretive ethnography:
Cressey, D. R. (1971). Other peoples money: A Ethnographic practices for the 21st century.
study in the social psychology of embezzle- Thousand Oaks, CA: Sage.
ment. Montclair, NJ: Patterson Smith. Dey, I. (1993). Qualitative data analysis: A
(Original work published 1953) user2Dfriendly guide for social scientists.
DAndrade, R. (1991). The identification of London: Routledge & Kegan Paul.
schemas in naturalistic data. In M. J. Doerfel, M. L., & Barnett, G. A. (1996). The use
Horowitz (Ed.), Person schemas and of Catpac for text analysis. Cultural Anthro-
maladaptive interpersonal patterns pology Methods Journal, 8(2), 4-7.
(pp. 279-301). Chicago: University of Chi- Drass, K. (1980). The analysis of qualitative data:
cago Press. A computer program. Urban Life, 9, 332-353.
DAndrade, R. (1995). The development of cog- Ember, C. R., & Ember, M. (1992). Resource un-
nitive anthropology. Cambridge: Cam- predictability, mistrust, and war: A cross-cul-
bridge University Press. tural study. Journal of Conflict Resolution, 36,
DAndrade, R., Quinn, N., Nerlove, S., & 242-262.
Romney, A. K. (1972). Categories of disease Erickson, P. (1997). Contraceptive methods: Do
in American-English and Mexican-Spanish. Hispanic adolescents and their family plan-
In A. K. Romney et al. (Eds.), Multidimen- ning care providers think about contraceptive
sional scaling: Theory and applications in methods the same way? Medical Anthropol-
the behavioral sciences (Vol. 2, pp. 9-54). ogy, 17, 65-82.
New York: Seminar. Fan, D. P., & Shaffer, C. L. (1990). Use of
Danielson, W. A., & Lasorsa, D. L. (1997). Per- open-ended essays and computer content
ceptions of social change: 100 years of analysis to survey college students knowledge
front-page content in the New York Times of AIDS. College Health, 38, 221-229.
and the Los Angeles Times. In C. W. Roberts Farringdon, J. M., & Farringdon, M. G. (1980).
(Ed.), Text analysis for the social sciences: A concordance and word-lists to the poems of
Methods for drawing statistical inferences Dylan Thomas. Swansea, England: Ariel
from texts and transcripts (pp. 103-116). House.
Mahwah, NJ: Lawrence Erlbaum. Frake, C. O. (1962). The ethnographic study of
Danowski, J. A. (1982). A network2Dbased cognitive systems. In T. Gladwin & W. C.
content analysis methodology for com- Sturtevant (Eds.), Anthropology and human
puter-mediated communication: An illustra- behavior (pp. 72-85). Washington, DC: An-
tion with a computer bulletin board. In M. thropology Association of Washington.
796 u METHODS OF COLLECTING AND ANALYZING EMPIRICAL MATERIALS

Frake, C. O. (1964). Notes on queries in ethnog- system. Unpublished doctoral dissertation,


raphy. American Anthropologist, 66, Stanford University.
132-145. Glaser, B. G. (1978). Theoretical sensitivity. Mill
Fielding, N. G., & Fielding, J. L. (1986). Linking Valley, CA: Sociology Press.
data. Beverly Hills, CA: Sage. Glaser, B. G., & Strauss, A. L. (1967). The dis-
Fischer, M. D. (1994). Applications in comput- covery of grounded theory: Strategies for
ing for social anthropologists. London: qualitative research. Chicago: Aldine.
Routledge. Goodenough, W. H. (1956). Componential
Fjellman, S. M., & Gladwin, H. (1985). Haitian analysis and the study of meaning. Language,
family patterns of migration to South 32, 195-216.
Florida. Human Organization, 44, 301-312. Gottschalk, L. A., & Bechtel, R. J. (1993). Psy-
Fleisher, M. S., & Harrington, J. A. (1998). chological and neuropsychiatric assessment
Freelisting: Management at a womens fed- applying the Gottschalk-Gleser content anal-
eral prison camp. In V. C. De Munck & E. J. ysis method to verbal sample analysis using
Sobo (Eds.), Using methods in the field: A the Gottschalk-Bechtel computer scoring sys-
practical introduction and casebook tem. Palo Alto, CA: Mind Garden.
(pp. 69-84). Walnut Creek, CA: AltaMira. Guba, E. G. (1981). Criteria for assessing the
Fleiss, J. L. (1971). Measuring nominal scale trustworthiness of naturalistic inquiries. Ed-
agreement among many raters. Psychological ucational Communications and Technology
Bulletin, 76, 378-382. Journal, 29, 75-92.
Guba, E. G., & Lincoln, Y. S. (1982).
Furbee, L. (1996). The religion of politics in
Epistemological and methodological bases
Chiapas: Founding a cult of communicating
for naturalistic inquiry. Educational Commu-
saints. Paper presented at the 96th Annual
nications and Technology Journal, 30,
Meeting of the American Anthropological
233-252.
Association, San Francisco.
Hammersley, M. (1992). Whats wrong with eth-
Furbee, L., & Benfer, R. (1983). Cognitive and
nography? Methodological explorations.
geographic maps: Study of individual varia-
London: Routledge.
tion among Tojolabal Mayans. American An-
Harman, R. C. (1998). Triad questionnaires:
thropologist, 85, 305-333.
Old age in Karen and Maya cultures. In V. C.
Garro, L. (1998). On the rationality of deci- De Munck & E. J. Sobo (Eds.), Using meth-
sion-making studies: Part 1. Decision models ods in the field: A practical introduction and
of treatment choice. Medical Anthropology casebook (pp. 121-138). Walnut Creek, CA:
Quarterly, 12, 319-340. AltaMira.
Gatewood, J. B. (1983). Deciding where to fish: Hartigan, J. A. (1975). Clustering algorithms.
The skippers dilemma in Southeast Alaskan New York: John Wiley.
salmon seining. Coastal Zone Management Hatch, E., & Redpath, H. (1954). A concor-
Journal, 10, 347-367. dance to the Septuagint and the other Greek
George, A. L. (1959). Quantitative and qualita- versions of the Old Testament. Graz, Austria:
tive approaches to content analysis. In I. de S. Akademische Druck-u. Verlagsanstalt.
Pool (Ed.), Trends in content analysis Henley, N. M. (1969). A psychological study of
(pp. 7-32). Urbana: University of Illinois the semantics of animal terms. Journal of Ver-
Press. bal Learning and Verbal Behavior, 8,
Gerbner, G., Holsti, O. R., Krippendorf, K., 176-184.
Paisley, W. J., & Stone, P. J. (Eds.). (1969). Hill, C. E. (1998). Decision modeling: Its use in
The analysis of communication content: De- medical anthropology. In V. C. De Munck &
velopments in scientific theories and com- E. J. Sobo (Eds.), Using methods in the field: A
puter techniques New York: John Wiley. practical introduction and casebook
Gladwin, C. (1989). Ethnographic decision tree (pp. 139-164). Walnut Creek, CA: AltaMira.
modeling. Newbury Park, CA: Sage. Hirschman, E. C. (1987). People as products:
Gladwin, H. (1971). Decision making in the Analysis of a complex marketing exchange.
Cape Coast (Fante) fishing and fish marketing Journal of Marketing, 51, 98-108.
Data Management and Analysis Methods u 797

Holland, D. (1985). From situation to impres- complex in world folk literature. Stanford,
sion: How Americans get to know them- CA: Stanford University Press.
selves and one another. In J. W. D. Johnson, S. C. (1967). Hierarchical clustering
Dougherty (Ed.), Directions in cognitive an- schemes. Psychometrika, 32, 241-253.
thropology (pp. 389-412). Urbana: Univer- Kaid, L. L., Tedesco, J. C., & McKinnon, L. M.
sity of Illinois Press. (1996). Presidential ads as nightly news: A
Holsti, O. R. (1966). External conflict and in- content analysis of 1988 and 1992 televised
ternal consensus: The Sino-Soviet case. In P. Adwatches. Journal of Broadcasting Elec-
J. Stone, D. C. Dunphy, M. S. Smith, & D. tronic Media, 40, 297-308.
M. Ogilvie (Eds.), The General Inquirer: A Kassis, H. (1983). A concordance of the Quran.
computer approach to content analysis Berkeley: University of California Press.
(pp. 343-358). Cambridge: MIT Press.
Kearney, M. H., Murphy, S., Irwin, K., &
Holsti, O. R. (1969). Content analysis for the Rosenbaum, M. (1995). Salvaging self: A
social sciences and humanities. Reading, grounded theory of pregnancy on crack co-
MA: Addison-Wesley. caine. Nursing Research, 44, 208-213.
Hunt, J. G., & Ropo, A. (1995). Multi2Dlevel
Kearney, M. H., Murphy, S., & Rosenbaum, M.
leadership: Grounded theory and main-
(1994). Mothering on crack cocaine: A
stream theory applied to the case of General
grounded theory analysis. Social Science and
Motors. Leadership Quarterly, 6,
Medicine, 38, 351-361.
3792D412.
Kelle, U. (1995). An overview of computer-aided
Imrich D. J., Mullin, C., & Linz, D. (1995).
methods in qualitative research. In U. Kelle
Measuring the extent of prejudicial pretrial
(Ed.), Computer-aided qualitative data analy-
publicity in major American newspapers: A
sis: Theory, methods and practice (pp. 1-18).
content analysis. Journal of Communica-
London: Sage.
tion, 45(3), 94-117.
Kelly, E. F., & Stone, P. J. (1975). Computer rec-
Irurita, V. F. (1996). Hidden dimensions re-
ognition of English word senses. Amsterdam:
vealed: Progressive grounded theory study
North-Holland.
of quality care in the hospital. Qualitative
Health Research, 6, 331-349. Kempton, W. (1987). Two theories of home heat
Jakobson, R., & Halle, M. (1956). Fundamen- control. In D. Holland & N. Quinn (Eds.),
tals of language. The Hague: Mouton. Cultural models in language and thought
(pp. 222-242). Cambridge: Cambridge Uni-
Jang, H.2DY., & Barnett, G. A. (1994, Sep-
versity Press.
tember). Cultural differences in organiza-
tional communication: A semantic network Kirchler, E. (1992). Adorable woman, expert
analysis. Bulletin de Mthodologie man: Changing gender images of women and
Sociologique, 44, 31-59. men in management. European Journal of So-
cial Psychology, 22, 363-373.
Jehn, K. A., & Doucet, L. (1996). Developing
categories from interview data: Part 1. Text Kirk, J., & Miller, M. L. (1986). Reliability and
analysis and multidimensional scaling. Cul- validity in qualitative research. Beverly Hills,
tural Anthropology Methods Journal, 8(2), CA: Sage.
15-16. Kolbe, R. H., & Albanese, J. P. (1996). Man to
Jehn, K. A., & Doucet, L. (1997). Developing man: A content analysis of sole-male images in
categories for interview data: Part 2. Conse- male-audience magazines. Journal of Adver-
quences of different coding and analysis tising, 25(4), 1-20.
strategies in understanding text. Cultural Kracauer, S. (1953. The challenge of qualitative
Anthropology Methods Journal, 9(1), 1-7. content analysis. Public Opinion Quarterly,
Jehn, K. A., & Werner, O. (1993). Hapax 16, 631-642.
Legomenon II: Theory, a thesaurus, and Krippendorf, K. (1980). Content analysis: An in-
word frequency. Cultural Anthropology troduction to its methodology. Beverly Hills,
Methods Journal, 5(1), 8-10. CA: Sage.
Johnson, A., & Price2DWilliams, D. R. Kruskal, J. B., & Wish, M. (1978). Multidimen-
(1997). Oedipus ubiquitous: The family sional scaling. Beverly Hills, CA: Sage.
798 u METHODS OF COLLECTING AND ANALYZING EMPIRICAL MATERIALS

Kurasaki, K. S. (1997). Ethnic identity and its de- tion: The Federalist. Computers and the
velopment among third-generation Japanese Humanities, 29, 259-270.
Americans. Unpublished doctoral disserta- Mathews, H. F., & Hill, C. (1990). Applying
tion, DePaul University. cognitive decision theory to the study of re-
Laffal, J. (1990). A concept dictionary of Eng- gional patterns of illness treatment choice.
lish, with computer programs for content American Anthropologist, 91, 155-170.
analysis. Essex, CT: Gallery. McCleary, R. (1978). Dangerous men: The soci-
Laffal, J. (1995). A concept analysis of Jonathan ology of parole. Beverly Hills, CA: Sage.
Swifts A tale of a tub and Gullivers travels. McKinnon, A. (1993). The multi-dimensional
Computers and the Humanities, 29, concordance: A new tool for literary re-
339-361. search. Computers and the Humanities, 27,
Leinhardt, G. (1987). Development of an expert 165-183.
explanation: An analysis of a sequence of McTavish, D. G., & Pirro, E. B. (1990). Contex-
subtraction lessons. Cognition and Instruc- tual content analysis. Quality and Quantity,
tion, 4, 225-282. 24, 44-63.
Leinhardt, G. (1989). Math lessons: A contrast Metzger, D., & Williams, G. (1966). Some pro-
of novice and expert competence. Journal for cedures and results in the study of native cate-
Research in Mathematics Education, 20(1), gories: Tzeltal firewood. American
52-75. Anthropologist, 68, 389-407.
Leinhardt, G., & Smith, D. A. (1985). Expertise
Miles, M. B. (1979). Qualitative data as an at-
in mathematics instruction: Subject matter
tractive nuisance: The problem of analysis.
knowledge. Journal of Educational Psychol-
Administrative Science Quarterly, 24,
ogy, 77, 247-271.
590-601.
Light, R. J. (1971). Measures of response agree-
Miles, M. B., & Huberman, A. M. (1994). Qual-
ment for qualitative data: Some generaliza-
itative data analysis: An expanded
tions and alternatives. Psychological Bulletin,
sourcebook (2nd ed.). Thousand Oaks, CA:
76, 365-377.
Sage.
Lincoln, Y. S., & Guba, E. G. (1985). Naturalis-
tic inquiry. Beverly Hills, CA: Sage. Mingers, J. (1989a). An empirical comparison of
pruning methods for decision tree induction.
Lindesmith, A. R. (1968). Addiction and opiates.
Machine Learning, 4, 227-243.
Chicago: Aldine. (Original work published
1947) Mingers, J. (1989b). An empirical comparison
Lofland, J., & Lofland, L. H. (1995). Analyzing of selection measures for decision-tree induc-
social settings (3rd ed.). Belmont, CA: tion. Machine Learning, 3, 319-342.
Wadsworth. Mitchell, S. K. (1979). Interobserver agreement,
Lonkila, M. (1995). Grounded theory as an reliability, and generalizability of data col-
emerging paradigm for computer-assisted lected in observational studies. Psychological
qualitative data analysis. In U. Kelle (Ed.), Bulletin, 86, 376-390.
Computer-aided qualitative data analysis: Morse, J. M. (1994). Designing funded qualita-
Theory, methods and practice (pp. 41-51). tive research. In N. K. Denzin & Y. S. Lincoln
London: Sage. (Eds.), Handbook of qualitative research
MacQueen, K. M., McLellan, E., Kay, K., & (pp. 220-235). Thousand Oaks, CA: Sage.
Milstein, B. (1998). Codebook development Mosteller, F., & Wallace, D. L. (1964). Inference
for team-based qualitative research. Cultural and disputed authorship: The Federalist Pa-
Anthropology Methods Journal, 10(2), pers. Reading, MA: Addison-Wesley.
31-36. Murdock, G. P. (1971). Outline of cultural mate-
Manning, P. K. (1982). Analytic induction. In R. rials (4th rev. ed.). New Haven, CT: Human
Smith & P. K. Manning (Eds.), Handbook of Relations Area Files.
social science methods: Vol. 2. Qualitative Nolan, J., & Ryan, G. W. (1999). Fear and loath-
methods (pp. 273-302). New York: Harper. ing at the cinemaplex: Differences in gender
Martindale, C., & McKenzie, D. (1995). On the perceptions and descriptions of slasher films.
utility of content analysis in author attribu- Manuscript submitted for publication.
Data Management and Analysis Methods u 799

Ogilvie, D. M., Stone, P. J., & Schneidman, E. S. Quinn, N. (1987). Convergent evidence for a cul-
(1966). Some characteristics of genuine ver- tural model of American marriage. In D. Hol-
sus simulated suicide notes. In P. J. Stone, D. land & N. Quinn (Eds.), Cultural models in
C. Dunphy, M. S. Smith, & D. M. Ogilvie language and thought (pp. 173-192). Cam-
(Eds.), The General Inquirer: A computer ap- bridge: Cambridge University Press.
proach to content analysis (pp. 527-535). Quinn, N. (1992). The motivational force of
Cambridge: MIT Press. self-understanding: Evidence from wives in-
Osgood, C. (1959). The representational ner conflicts. In R. DAndrade & C. Strauss
model and relevant research methods. In I. (Eds.), Human motives and cultural models
de S. Pool (Eds.), Trends in content analysis (pp. 90-126). New York: Cambridge Univer-
(pp. 33-88). Urbana: University of Illinois sity Press.
Press. Quinn, N. (1996). Culture and contradiction:
Palmquist, M., Carley, K., & Dale, T. (1997). The case of Americans reasoning about mar-
Applications of computer-aided text analy- riage. Ethos, 24, 391-425.
sis: Analyzing literary and nonliterary texts. Quinn, N. (1997). Research on shared task solu-
In C. W. Roberts (Ed.), Text analysis for the tions. In C. Strauss & N. Quinn (Eds.), A cog-
social sciences: Methods for drawing statisti- nitive theory of cultural meaning
cal inferences from texts and transcripts (pp. 137-188). Cambridge: Cambridge Uni-
(pp. 171-189). Mahwah, NJ: Lawrence versity Press.
Erlbaum. Ragin, C. C. (1987). The comparative method:
Patterson, B. R., Bettini, L., & Nussbaum, J. F. Moving beyond qualitative and quantitative
(1993). The meaning of friendship across strategies. Berkeley: University of California
the life-span: Two studies. Communication Press.
Quarterly, 41, 145-160. Ragin, C. C. (1994). Introduction to qualitative
Patton, M. Q. (1990). Qualitative evaluation comparative analysis. In T. Janowski & A. M.
and research methods (2nd ed.). Newbury Hicks (Eds.), The comparative political econ-
Park, CA: Sage. omy of the welfare state (pp. 299-317). Cam-
Perchonock, N., & Werner, O. (1969). Navaho bridge: Cambridge University Press.
systems of classification. Ethnology, 8, Richards, T. J., & Richards, L. (1991). The
229-242. NUDIST qualitative data analysis system.
Pool, I. de S. (1952). Symbols of democracy. Qualitative Sociology, 14, 307-325.
Stanford, CA: Stanford University Press. Robbins, M. C., & Nolan, J. M. (1997). A mea-
Pool, I. de S. (Ed.). (1959). Trends in content sure of dichotomous category bias in free list-
analysis. Urbana: University of Illinois Press. ing tasks. Cultural Anthropology Methods
Potts R., Runyan, D., Zerger, A., & Marchetti, Journal, 9(3), 8-12.
K. (1996). A content analysis of safety be- Roberts, C. W. (1997). A theoretical map for se-
haviors of television characters: Implica- lecting among text analysis methods. In C. W.
tions for childrens safety and injury. Journal Roberts (Ed.), Text analysis for the social sci-
of Pediatric Psychology, 21, 517-528. ences: Methods for drawing statistical infer-
Prendergast, G. L. (1971). A complete concor- ences from texts and transcripts
dance to the Iliad of Homer. Hildesheim, (pp. 275-283). Mahwah, NJ: Lawrence
Germany: G. Olms. Erlbaum.
Price, L. (1987). Ecuadorian illness stories. In Robinson, W. S. (1951). The logical structure of
D. Holland & N. Quinn (Eds.), Cultural analytic induction. American Sociological Re-
models in language and thought view, 16, 812-818.
(pp. 313-342). Cambridge: Cambridge Uni- Romme, A. G. L. (1995). Boolean comparative
versity Press. analysis of qualitative data: A methodological
Quinn, N. (1978). Do Mfantse fish sellers esti- note. Quality and Quantity, 29, 317-329.
mate probabilities in their heads? American Roos, G. (1998). Pile sorting: Kids like candy.
Ethnologist, 5, 206-226. In V. C. De Munck & E. J. Sobo (Eds.), Using
Quinn, N. (1982). Commitment in American methods in the field: A practical introduction
marriage: A cultural analysis. American Eth- and casebook (pp. 97-110). Walnut Creek,
nologist, 9, 755-798. CA: AltaMira.
800 u METHODS OF COLLECTING AND ANALYZING EMPIRICAL MATERIALS

Rosenberg, S. D., Schnurr, P. P., & Oxman, T. E. Boolean analysis of the political disputes in
(1990). Content analysis: A comparison of Chen Village, China. Social Networks, 18,
manual and computerized systems. Journal of 247-266.
Personality Assessment, 54, 298-310. Seidel, J., & Kelle, U. (1995). Different func-
Rushforth, S. (1982). A structural semantic anal- tions of coding in the analysis of textual data.
ysis of Bear Lake Athapaskan kinship classifi- In U. Kelle (Ed.), Computer-aided qualitative
cation. American Ethnologist, 9, 559-577. data analysis: Theory, methods and practice
Ryan, G. W. (1995). Medical decision making (pp. 52-61). London: Sage.
among the Kom of Cameroon: Modeling how Shapiro, G. (1997). The future of coders: Hu-
characteristics of illnesses, patients, caretak- man judgments in a world of sophisticated
ers, and compounds affect treatment choice in software. In C. W. Roberts (Ed.), Text analy-
a rural community. Unpublished doctoral sis for the social sciences: Methods for draw-
dissertation, University of Florida, ing statistical inferences from texts and
Gainesville. transcripts (pp. 225-238). Mahwah, NJ:
Ryan, G. W. (in press). Measuring the typicality Lawrence Erlbaum.
of text: Using multiple coders for more than Shelley, G. A. (1992). The social networks of
just reliability and validity checks. Human people with end-stage renal disease: Com-
Organization. paring hemodialysis and peritoneal dialysis
Ryan, G. W., & Martnez, H. (1996). Can we patients. Unpublished doctoral dissertation,
predict what mothers do? Modeling child- University of Florida.
hood diarrhea in rural Mexico. Human Or- Sleath, B., Svarstad, B., & Roter, D. (1997). Phy-
ganization, 55, 472D57. sician versus patient initiation of
Ryan, G. W., & Weisner, T. (1996). Analyzing psychotropic prescribing in primary care set-
words in brief descriptions: Fathers and tings: A content analysis of audiotapes. Social
mothers describe their children. Cultural An- Science and Medicine, 44, 541-548.
thropology Methods Journal, 8(3), 13-16. Smith, J. J. (1993). Using ANTHROPAC 3.5 and
Sandelowski, M. (1995a). Qualitative analysis: a spreadsheet to compute a free-list salience
What it is and how to begin. Research in index. Cultural Anthropology Methods Jour-
Nursing and Health, 18, 371-375. nal, 5(3), 1-3.
Sandelowski, M. (1995b). Sample size in quali- Smith, J. J., & Borgatti, S. P. (1998). Salience
tative research. Research in Nursing and countsand so does accuracy: Correcting
Health, 18, 179-183. and updating a measure for
Schank, R. C., & Abelson, R. P. (1977). Scripts, free2Dlist2Ditem salience. Journal of Lin-
plans, goals, and understanding: An enquiry guistic Anthropology, 7, 2082D209.
into human knowledge structures. Hillsdale, Sohier, R. (1993). Filial reconstruction: A the-
NJ: Lawrence Erlbaum. ory on development through adversity. Qual-
Schnegg, M., & Bernard, H. R. (1996). Words as itative Health Research, 3, 465-492.
actors: A method for doing semantic network Spears, N. E, Mowen, J. C., & Chakraborty, G.
analysis. Cultural Anthropology Methods (1996). Symbolic role of animals in print ad-
Journal, 8(2), 7-10. vertising: Content analysis and conceptual
Schnurr, P. P., Rosenberg, S. D., Oxman, T. E., & development. Journal of Business Research,
Tucker, G. (1986). A methodological note on 37(2), 87-95.
content analysis: Estimates of reliability. Spiggle, S. (1986). Measuring social values: A
Journal of Personality Assessment, 50, content analysis of Sunday comics and under-
601-609. ground comix. Journal of Consumer Re-
Schweizer, T. (1991). The power struggle in a search, 13, 100-113.
Chinese community, 1950-1980: A social Spradley, J. P. (1979). The ethnographic inter-
network analysis of the duality of actors and view. New York: Holt, Rinehart & Winston.
events. Journal of Quantitative Anthropol- Stone, P. J., Dunphy, D. C., Smith, M. S., &
ogy, 3, 19-44. Ogilvie, D. M. (Eds.). (1966). The General
Schweizer, T. (1996). Actor and event orderings Inquirer: A computer approach to content
across time: Lattice representation and analysis. Cambridge: MIT Press.
Data Management and Analysis Methods u 801

Strauss, A. L. (1987). Qualitative analysis for Weller, S. C. (1998). Structured interviewing and
social scientists. New York: Cambridge Uni- questionnaire construction. In H. R. Bernard
versity Press. (Ed.), Handbook of methods in cultural an-
Strauss, A. L., & Corbin, J. (1990). Basics of thropology (pp. 365-409). Walnut Creek, CA:
qualitative research: Grounded theory proce- AltaMira.
dures and techniques. Newbury Park, CA: Weller, S. C., & Romney, A. K. (1988). System-
Sage. atic data collection. Newbury Park, CA: Sage.
Strauss, A. L., & Corbin, J. (Eds.). (1997). Weller, S. C., & Romney, A. K. (1990). Metric
Grounded theory in practice. Thousand scaling: Correspondence analysis. Newbury
Oaks, CA: Sage. Park, CA: Sage.
Strauss, C. (1992). What makes Tony run? Weller, S. C., Ruebush, T. K., II, & Klein, R. E.
Schemas as motive reconsidered. In R. (1997). Predicting treatment-seeking behav-
DAndrade & C. Strauss (Eds.), Human mo- ior in Guatemala: A comparison of the health
tives and cultural models (pp. 191-224). services research and decision-theoretic ap-
New York: Cambridge University Press. proaches. Medical Anthropology Quarterly,
Strauss, C. (1997). Research on cultural discon- 11, 224-245.
tinuities. In C. Strauss & N. Quinn (Eds.), A Werner, O., & Schoepfle, G. M. (1987). System-
cognitive theory of cultural meaning atic fieldwork: Vol. 2. Ethnographic analysis
(pp. 210-251). Cambridge: Cambridge Uni- and data management. Newbury Park, CA:
versity Press. Sage.
Taylor, S. J., & Bogdan, R. C. (1984). Introduc- White, D. R., & Burton, M. L. (1988). Causes of
tion to qualitative research methods: The polygyny: Ecology, economy, kinship, and
search for meanings (2nd ed.). New York: warfare. American Anthropologist, 90,
John Wiley. 871-887.
Tesch, R. (1990). Qualitative research: Analysis Willms, D. G., Best, J. A., Taylor, D. W., Gilbert,
types and software tools. New York: Falmer. J. R., Wilson, D. M. C., Lindsay, E. A., &
Trost, J. E. (1986). Statistically Singer, J. (1990). A systematic approach for
nonrepresentative stratified sampling: A using qualitative methods in primary preven-
sampling technique for qualitative studies. tion research. Medical Anthropology Quar-
Qualitative Sociology, 9, 54-57. terly, 4, 391-409.
Van Maanen, J., Miller, M., & Johnson, J. Wilson, H. S., & Hutchinson, S. A. (1996).
(1982). An occupation in transition: Tradi- Methodological mistakes in grounded theory.
tional and modern forms of commercial Nursing Research, 45, 122-124.
fishing. Work and Occupations, 9, 193-216. Wodak, R. (1992). Strategies in text production
Viney, L. L. (1983). The assessment of psycho- and text comprehension: A new perspective.
logical states through content analysis of In D. Stein (Ed.), Cooperating with written
verbal communications. Psychological Bul- texts (pp. 493-528). New York: Mouton de
letin, 94, 542-563. Gruyter.
Waitzkin, H., & Britt, T. (1993). Processing Wright, K. B. (1997). Shared ideology in Alco-
narratives of self-destructive behavior in holics Anonymous: A grounded theory ap-
routine medical encounters: Health promo- proach. Journal of Health Communication,
tion, disease prevention, and the discourse 2(2), 83-99.
of health care. Social Science and Medicine, Yoder, S. (1995). Examining ethnomedical diag-
36, 1121-1136. noses and treatment choices for diarrheal dis-
Wallace, A. F. C. (1962). Culture and cognition. orders in Lubumbashi Swahili. Medical
Science, 135, 352-357. Anthropology, 16, 2112D248.
Weber, R. (1990). Basic content analysis (2nd Young, J. C. (1978). Illness categories and action
ed.). Newbury Park, CA: Sage. strategies in a Tarascan town. American Eth-
Weitzman, E. A., & Miles, M. B. (1995). Com- nologist, 5, 81-97.
puter programs for qualitative data analysis: Young, J. C. (1980). A model of illness treatment
A software sourcebook. Thousand Oaks, CA: decisions in a Tarascan town. American Eth-
Sage. nologist, 7, 106-151.
802 u METHODS OF COLLECTING AND ANALYZING EMPIRICAL MATERIALS

Yule, G. U. (1968). The statistical study of liter- Zuell, C., Weber, R. P., & Mohler, P. (Eds.).
ary vocabulary. Hamden, CT: Archon. (Orig- (1989). Computer-assisted text analysis for
inal work published 1944) the social sciences: The General Inquirer III.
Znaniecki, F. (1934). The method of sociology. Mannheim, Germany: Center for Surveys,
New York: Farrar & Rinehart. Methods, and Analysis (ZUMA).

You might also like