Chapter 3
METHODOLOGY
This chapter mainly discussed about the methods and techniques
that was used in gathering all the data that is needed for this study. This
chapter included the following: research design, research subjects, research
locale, data sources, data collection procedure, trustworthiness of the
study, role of the researchers, ethical consideration, and data analysis.
Research Design
This research is qualitative in nature. According to Creswell (2009),
qualitative study involves observation, and or archival (content) data to
collect, the data that is needed for the research. The emphasis is put on the
natural setting and the points of views of the research participants. The
qualitative research is descriptive, in that the researchers are interested in
process, meaning, and understanding gained through words or pictures.
From this data, the researcher interprets the meaning of the information
drawing on personal reflections and past research. The structure of the
final report is flexible, and it displays the researcher’s biases and thoughts.
2
Research Participants
Creswell (2002) has recommended that 3-5 participants can be used
for case study research. However, with respect to phenomenological
studies, sample size recommendations range from 6 (Morse, 1994) to 10
(Creswell, 1998).
In this study, the participants were the fourth year college students
of St. Mary’s College of Tagum, Inc. from the following programs;
Education, Bachelor of Arts, Criminology, Civil Engineering, Nursing,
Computer Science, Hospitality Management, Tourism Management,
Business Administration, and Accountancy.
From each program, we utilized purposive sampling having one
student among the seniors per program for the interview. This was used
by the researchers because it proved to be effective when only limited
numbers of people can serve as primary data sources due to the nature of
our research design. Through this also, personal judgment can be used to
choose cases that can easily help answer our research questions or achieve
our research objectives.
3
Research Locale
The researchers conducted the study in St. Mary’s College of Tagum
Inc., Tagum City, Davao del Norte. This school is a private institution run
by the Religious of the Virgin Mary (RVM) sisters. The school provides
basic education and tertiary education. As of today the College
Department offers 11 courses.
Data Sources
According to Creswell (2007), data sources are typically gathered in
multiple forms such as interview, observation, and documentation.
According to Creswell, 10 participants are enough in doing qualitative
research.
We conducted the study through Focus Group Discussion (FGD) for
our first 6 participants and followed by an in – depth interview for the
remaining 4 participants. This served as one of the pillars of this
qualitative study.
Using the recorded audio files of the interviews, we compiled
printed transcriptions of their interviews which were used to find and
analyze their answers.
4
The researchers also took-down notes about the whole process in
collecting the data; their reactions, the way they answer, their eagerness to
participate, and the words they emphasized.
Moreover, we, the researchers, used the questions we formulated.
These guide questions were aligned to the statement of the problem that
helped solve queries and served as an attainment for the purpose of the
study.
Data Collection Procedure
Conducting this study took thorough and systematic procedures to
attain its purpose. The following steps were tracked in conducting the
study.
First, the participants from our study were selected through
purposive sampling in which we chose one fourth year college student
from each courses here in SMCTI. Importantly, it was essential to note that
all the participants were already done with the CALL program for them to
really have an impression on its implementation.
Second, the participants were informed about the study and they
were requested to sign the consent form in order to have an agreement.
The researchers assured the participants that records were with utmost
confidentiality.
5
Third, the participants were oriented with regards to the central
purpose of the study, the protocol design in data gathering, the
participants’ confidentiality as this were given the highest assurance by the
researcher.
Fourth, the preparation of the necessary materials used during the
conduct of the interview such as the questionnaires, cameras, and audio-
recorder were made.
Fifth, we conducted an FGD for one session with the 6 participants
then an in-depth interview was done with the remaining 4 participants.
We collated the data then after that, we transcribed their verbatim words
into writing.
The next step in the study is getting the perceptions of the
participants regarding CALL. Then, we separated the answers according
to the perception of the participants. The results were done when the
answers were analyzed and the identification of the major themes and core
ideas followed.
Lastly, findings were discussed.
Trustworthiness of the Study
6
This study was conceptualized, carefully planned, and authentically
established by the researchers.
Foremost, the title of the activity was defended by the researchers
and was accepted before the panellists allow this study to be conducted.
The information that was gathered especially the background of the study
and the review of related literature is surely with citations. This is to
ensure that we, the researchers, are not the owners of the supporting
studies.
We made it to the point that we remain faithful to our participants
so as to not modify what they uttered in our interview.
In order for us to produce a surely credible and trustworthy study as
we go along with this, we made sure to shadow what Lincoln and Guba
(1985) stated in their Naturalistic Inquiry book that as a qualitative
researchers, we must establish truthfulness by involving credibility,
transferability, dependability, and conformability.
Credibility, in which they seek to ensure that their study measure or
test what is actually intended (Lincoln & Guba, 1985). The researchers used
probes to elicit detailed data and iterative questioning through
paraphrased questions.
7
Transferability as cited by Lincoln and Guba is the responsibility of
the investigator to ensure that sufficient contextual information is
provided to enable the reader to make such transfer for future use of other
researchers. The researchers made the study utilized for other researchers
to be used also for certain information from the study for further
development of the same goals.
Dependability is often compared to the concept of reliability in
quantitative research and refers to how stable the data are (Graneheim and
Lundman, 2004). The researchers used of individual in-depth interview
and focused group discussion which were suitable in getting information
for the study.
Confirmability refers to the neutrality and accuracy of the data
(Tobin and Begley 2004). The researchers made sure that the results were
not be the researchers’ biases and thoughts but rather the vantage points of
the identified participants.
Moreover, as to the objective qualification of this study, particularly
on the efficacy of CALL from the vantage points of the college students in
SMCTI, we consulted prior researches that are related with our study.
Ethical Considerations
8
We, the researchers, considered certain research ethics to ensure
quality validity and integrity of the study. First, we asked the approval of
our school president in St. Mary’s College of Tagum in order for us to start
our data gathering formally. For our participants, we gave them our
consent form in order for them to liberately decides whether to be a part of
our research study or not. We did not force them to be our participants.
They have the right to refuse and we made sure to keep privately all the
personal information, even his/her real name, and his/her data that were
given to us throughout the interview. During our interview, we allowed
them to have their excuses or anything that can stop our talk. The
participants’ educational backgrounds, particularly their grades in the
CALL subject were not mentioned in our study. It is purely their personal
experiences and points only. Lastly, the participants’ cultural background
and social preferences were given highest respect.
Data Analysis
The data analysis technique that was used in our study was thematic
analysis. Thematic analysis is a widely used method of analysis in
qualitative research. It is a method for identifying, analysing and reporting
patterns within data (Braun and Clarke, 2006). Through this technique,
9
rich, detailed, and complex description of our data were gathered. This
will help researchers move from a broad reading of the data toward
discovering patterns and framing specific research questions (Boyatzis,
1998).
The results of the gathered data were the basis of our conclusions,
the implications for practice and recommendations for further research.
10
REFERENCES
A. Books
Braun, V. and Clarke, V. (2006) Using thematic analysis in psychology.
Bush, M. D. (2008). Computer-assisted language learning: From
vision to reality?. CALICO Journal, 25(3), 443- 470. Qualitative
Research in Psychology, 3 (2). pp. 77-101.
Cicerchia A. (2015), Is there a place for place? How spaces and places are
included in the measures of sustainable development and wellbeing,
in: J.Dessein, E.Battaglini and L.Horlings, Culture and
Territorialisation: Theories and Practices, Routledge Studies in
Culture and sustainable development, 125-145.
Denzin& Y. S. Lincoln (Eds.), Handbook of qualitative research
(pp. 220-235). Thousand Oaks, CA: Sage.
DíazLarenas, C. H., Jansson Bruce, L. E., &NeiraMartínez, A. C.
(2011). Percepciones de profesoresyestudianteschilenos de
educación media acercadelpapel de la tecnología en la clase de
ingléscomolenguaextranjera. RevistaLasallista de Investigación, 8(2),
53-60.
Edwards-Groves, C. (2012). Interactive creative technologies:
Changing learning practices andpedagogies in the writing
classroom. AustralianJournal of Language and Literacy, 35(1), 99-
113. Retrieved from: http://www.alea.edu.au
Ellis, N. (1996). Sequencing in SLA: Phonological memory, chunking,
and points of order. Studies in Second Language Acquisition, 18, 91-
26
Genc, H. (2012). An evaluation study of a CALL application:
With BELT or without BELT. Turkish Online Journal of Educational
Technology - TOJET, 11(2), 44-54.
Freynik, S., 2014. Technologies for foreign language learning:
11
A review of technology types and their effectiveness. Computer
Assisted Language Learning 27, 70–105.
ISSN 1478-0887 Available from: http://eprints.uwe.ac.uk/11735
Grgurovic, M., Chapelle, C. A., & Shelley, M. C. (2013).
A meta-analysis of effectiveness studies on computer
technology-supported language learning. Recall,
25(2), 165-198.
Godwin-Jones, R. (2013). Emerging technologies:
The technological imperative in teaching and learning less
commonly taught languages. Language Learning & Technology,
17(1), 7-19.
Golonka, E.M., Bowles, A.R., Frank, V.M., Richardson, D.L.,
Golonka, E.M., Bowles, A.R., Frank, V.M., Richardson, D.L.,
Freynik, S., 2014. Technologies for foreign language learning: A
review of technology types and their effectiveness. Computer
Assisted Language Learning 27, 70–105.
Graneheim, U. H., &Lundman, B. (2004). Qualitative content analysis
in nursing research: Concepts, procedures and measures to achieve
trustworthiness. Nurse Education Today, 24(2), 105- 112. doi:
10.1016/j.nedt.2003.10.001
Hoopingarner, D. (2009). Best practices in technology and
language teaching. Language and Linguistics Compass, 3(1), 222-
235.
Istifci, I., Lomidazde, T., &Demiray, U. (2011). An effective role of
e-learning technology for English language teaching by using meta
communication actors. Turkish Online Journal Of Distance
Education, 12(4), 201-211.
Kirkgoz, Y. (2011). A blended learning study on implementing
video recorded speaking tasks in task- based classroom instruction.
Turkish Online Journal Of Educational Technology - TOJET, 10(4), 1-
13.
12
Levy, M. (2009). Technologies in use for second language learning.
The Modern Language Journal, 93(s1), 769-782.
Lin, L. (2010). A video-based CALL program for proficient and
less-proficient L2 learners' comprehensionability, incidental
vocabulary acquisition. Educational Media International, 47(3), 199-
216 doi:10.1080/09523987.2010.518812
Morse, J. M. (1994). Designing funded qualitative research. In N. K.
Motteram, G (2012) Re-aligning research into teacher education for
CALL andbringing it into the mainstream. Language Teaching
FirstView Article: 1–13.
Park, C. N., & Son, J. B. (2009). Implementing computer assisted
language learning in the EFL classroom:Teachers' perceptions and
perspectives.
International Journal of Pedagogies and Learning,
5(2), 80-101.
Son, J. B. (2002). Online discussion in a CALL course for
distance language teachers. CALICO Journal, 20(1),
127-144.
Stockwell, G. (2007). A review of technology choice for teaching
language skills and areas in the CALL literature. ReCall, 19(02), 105-
120.
Tobin, G. A., & Begley, C. M. (2004). Methodological rigour
within a qualitative framework. Journal of Advanced Nursing, 48(4),
388-396. doi: 10.1111/j.1365-2648.2004.03207.x
Warschauer, M. (2010). Invited commentary:
new tools for teaching writing. Language Learning & Technology, 1
4(1), 3-8.
13
B. Internet Articles
Boyatzis, R.E. 1998. Transforming qualitative information:
Castillo, M. (2015). Effect of Integrating Computer-Assisted Language
Learning in the TOEFL Performance of Nursing Students. Retrieved
August 30,2016 from http://www.apjmr.com/wp-
content/uploads/2015/07/APJMR-2015-3-3-019-Effect-of-
Integrating-Computer-Assisted-Language-Learning-in-the-TOEFL-
Performance-of-Nursing-Students.pdf
Chapelle, C., (2001). Computer applications on second
languageacquisition: Foundations for teaching, 44 testing and
research. Cambridge: Cambridge University Press
Constantinescu, A. I. (2007). Using technology to assist in
vocabulary acquisition and reading comprehension. The Internet
TESL Journal, 13(2).
Creswell JW. Thousand Oaks, California: Sage Publications;
2007. Qualitative Inquiry and Research Design: Choosing Among
Five Approaches: International Student Edition.
Creswell, John W. Research Design: Qualitative, Quantitative, and
Mixed Methods Approaches. 3rd Edition. Los Angeles: Sage
Publications, Inc., 2009.
Dickinson, M., Brew, C.,&Meurers, D. (2012).
Language and Computers. Retrieved from http://www.eblib.com
Gill, D. (2011). Effects of technology on second language learning.
Journal of College Teaching & Learning (TLC), 3(2).
Hornby, P. E. (1995). Using a computerized laboratory as a springboard
for transforming a traditional lecture course. Paper presented at the
9th Annual Conference on Undergraduate
Teaching of Psychology, March 22-24, Ellenville, NY, USA.
Lincoln, Y. S., &Guba, E. G. (1985). Naturalistic Inquiry.
Newbury Park, CA: Sage Publications.
14
Morales, B. (2014). U.S. Department of Education.
Retrieved August 30,2016 from http://www.ed.gov/oii-
news/use-technology-teaching-and- learning
Reinders, H., &Darasawang, P. (2012). Diversity in language support.
In G. Stockwell (Ed.), Computer-assisted language learning:
Diversity in research and practice. Cambridge: Cambridge
University Press (forthcoming).
Reinders, H., Thomas, M. (2012). Contemporary computerassisted
language learning. Retrieved fromhttp://www.eblib.com
Toyama, K. (2011). Educational Technology Debate Exploring ICT and
Learning in Developing Countries. Retrieved August 30,2016, from
http://edutechdebate.org/ict-in-schools/there-are-no-technology-
shortcuts-to-good-education/
West, D. M., & Bleiberg, J. (2013). Education technology
success stories. Brookings Institution
Ybarra, R., & Green T. (2003). Using technology to help ESL/EFL
students develop language skills. The Internet TESL Journal, 9(3).
Retrieved from http://iteslj.org/Articles/Ybarra-Technology.html
Y.S. Lincoln and E.G. Guba, Naturalistic inquiry, Beverly Hills: Sage, 1985.
thematic analysis and code development. Sage Publications.
Retrieved August 30,2016, from
http://www.dictionary.com/browse/vantage-point
Retrieved August 30,2016 from
http://www.businessdictionary.com/definition/web-based-
Retrieved August 30, 201
fromhttp://www.readingrockets.org/article/computer-assisted-
instruction-and-readinginstruction-WBI.html
The Access Center (2012). Computer-Assisted Instruction and Reading.
15
CURRICULUM VITAE
(YOUR PICTURE)
(YOUR COMPLETE NAME)
(ADDRESS)
(contact number)
(email add)
PERSONAL CIRCUMTANCES
Age :
Sex :
Date of Birth :
Place of Birth :
Height :
Weight :
Nationality :
Religion :
EDUCATIONAL BACKGROUND
Elementary Education
School :
Address :
Year Graduated :
Secondary Education
School :
Address :
Year Graduated :