Verified Document

Electronic Libraries And Their Referencing Article Critique

The librarians also provided questionnaires that contained questions that were inquisitive of; directions and building locations, reference and general library information etc. The librarians contacted 28 people over a period of two weeks only, which was an average turn up for the research. The target group was well established, as the librarians targeted students and the community, which were the most frequent users of the library. It would have been unjust to choose a group that hardly did any academic research. The data gathered was also reliable and relevant, because it came directly from the users of the electronic library, and they were in the best position to understand what affected their research. The researches were lenient enough to avoid biasness, as they were gender sensitive and did their sampling sensitively. The methods of secondary data collection were rightfully adopted and implemented, because of the fruitful results and analysis.

Statistical analysis of both the qualitative and quantitative analysis was well established. Different times were provided for the collection of data through giving students questionnaires to fill and return observation of students by their librarians and adoption of the new model to observe the response. The allocation of time for data collection was efficient to ensure the students were observed during their research and after their research too. The librarians ensured they did not collide research time with the time for lessons as it would hinder data collection and also limit the amount of information required. The researchers used the right procedures; they collected data, analyzed the data and later interpreted to make a conclusion based on the information collected. However, the data was not well reported in the research paper. The writers of the paper were obligated to provide a deeper analysis of their findings, information they received,...

Reporting data collection and analysis is critical for any research work and writing.
Gaps in the research design, methodology and implementation

There were a few gaps in the research paper. The design of the paper lacked very fundamental aspects that need not be ignored. The problem statement was not as clear as expected by standards. However, the objective of the research was well tackled. The writers should have given a more detailed objective that is supposed to be framed in positive terms. The background and significance of the research was not dealt with, increasing the gaps left by the researchers and authors of the article. The authors were also expected to enumerate the benefits that come after the research such as the services it would render to community. This was mentioned in the paper, but in unclear terms.

Link of research conclusion with objectives of research

The best way to conclude the research and integrate this conclusion with the objective is to conclude by providing a summary statement that notes whether the research managed to fully answer the research questions earlier stated. When doing the conclusion, it is necessary to include the right time frames and show the authors skillfulness during the research (Website, 2012). The conclusion would therefore be that the paper under scrutiny was not well concluded, as per the expectations. In conclusion, any other critique would support me that regardless of the fact that the author of the paper tried to present a good case, there are still numerous elements in the paper which ought to be revised and corrected.

Reference

Okladot (2012). Contents of a Research Proposal. Retrieved 19 October, 2012 from http://www.okladot.state.ok.us/hqdiv/p-r-div/spr-rip/spr-pdf/submission.pdf

Sources used in this document:
Reference

Okladot (2012). Contents of a Research Proposal. Retrieved 19 October, 2012 from http://www.okladot.state.ok.us/hqdiv/p-r-div/spr-rip/spr-pdf/submission.pdf
Cite this Document:
Copy Bibliography Citation

Related Documents

Academic Library Quality Services Academic Libraries Are
Words: 1220 Length: 4 Document Type: Essay

Academic Library Quality Services Academic Libraries are held to a higher standard because they are used by so many people for research purposes. They are utilized by college students and business people researching ideas and theories and they are utilized by doctoral students coming up with thesis subjects. Reports or articles written based on things found in an academic library are important and also can be used to find information that

Internet & Electronic Marketing Website & Business
Words: 3210 Length: 11 Document Type: Essay

Internet & Electronic Marketing Website & Business Model Target Market & Consumer Behavior Building & Maintaining Customer Relationships F. Recommendations for Website Improvement G. Conclusion H. References Pace University is a comprehensive non-profit university that offers its educational services to online students and to the more traditional brick-and-mortar student. As the university competes with global universities, the web presence must convey the value and quality of the education as well as enable the student to make an

Nursing Original Understanding of What It Meant
Words: 1126 Length: 4 Document Type: Essay

Nursing Original understanding of what it meant to be an RN Being a Registered Nurse meant applying evidence-based practice to patient care. It meant doing whatever it took to make patients as comfortable as possible, listening closely to their needs, and to the concerns they and their family presented to the healthcare team and me. Being a Registered Nurse meant collaborating with my colleagues and other members of the healthcare team to

Operating Systems Are the Very
Words: 1889 Length: 6 Document Type: Essay

Without the consent of the user, the program will never be elevated to administrator privilege. The MIC or integrity levels is again a new security concept with Vista OS. This feature is controlled by the Access control entry (ACE) in the System Access control List (SACL) of a file, process or a registry key. By associating every process with an integrity level, the OS limits privilege escalation attacks. [Matthew

Copying the Quote or Paraphrase
Words: 2991 Length: 8 Document Type: Essay

The previous section discussed the advantages of ODR. This section will list some of its disadvantages and, likewise, analyze the advantages and disadvantages of online legal guidance in general Positive sides ODR The merits of ODR, as stated, include the fact that users can save time and expense by scheduling their meetings online at the comfort and convenience of all parties. Disputes, too, such as those by virtual traders can be resolved in

Operations Management: Balancing Ethics With
Words: 2723 Length: 9 Document Type: Essay

1073). Brocklesby advocates 'Soft OR' approaches such as Multi-Criteria Decision Analysis, Data Envelope Analysis, Cognitive Mapping, Soft Systems Methodology and the Theory of Constraints to allow for "conflicting objectives and multiple subjectivities" (Brocklesby 2007, p.1073). For example, the Theory of Constraints (TOC) deploys the TOC Thinking Processes to map social, material, and personal consequences of collective decisions. A TOC Current Reality Tree, searches for root causes of problems. A representation of

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now