Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Management Theories Expert

Answer the following problems:

problem 1: What is ‘hermeneutics’? Describe with reference to the contribution of Jorgen Habermas.

problem 2: Discuss the contribution of Alfred Schutz to the understanding of social reality.

problem 3: Describe the nature and scope of quantitative techniques of data analysis in the sociological research.

problem 4: Discuss the participatory approach to the social research. Compare and contrast it with the conventional research methodology.

problem 5: What is survey research? Create a research design of survey on the utilization of mobile phone by the rural youth.

problem 6: prepare a research report on any one of the given topics in around 3000 words.

A) Use of internet in sociological research.

B) Open and distance learning as a means of empowerment of the socially excluded and marginalized people in India.

C) Impact of mobile phones on the social relationships.

You can prepare this report based either on review of literature, or data collected from the primary sources. For review of literature you are to choose either two books or four research articles published recently on the chosen topic of your choice. prepare a review article focusing on the location of the study, methodology followed and the major findings of such studies.

For the primary source you are to collect two case studies and prepare a report on the chosen topic in a comparative framework. While writing the report spell out clearly the objectives and the problems of the study and

a) Problematise the issue in the existing or available literature, 
b) Illustrate your observations, finding and conclusion coherently, and
c) Make appropriate referencing at the end.

Management Theories, Management Studies

  • Category:- Management Theories
  • Reference No.:- M92131

Have any Question? 


Related Questions in Management Theories

What four types of controls or applications can be used to

What four types of controls or applications can be used to avoid risk? Describe how outsourcing can be used for risk transference? What conditions must be met to ensure that risk acceptance has been used properly? What i ...

Case study formatanalysisresponses to questions total of 3

CASE STUDY FORMAT Analysis/Responses to Questions (Total of 3 single-spaced pages): These are not short-answer questions! This is where you show how much you understand the material. The grade for the paper depends heavi ...

Assume that management desires to achieve the mexican

Assume that management desires to achieve the Mexican break-even point: however, operations will remain in the United States. If variable costs remain constant, what must management do to fixed costs? By how much must fi ...

What is cobit who is its sponsor what does it accomplish

What is COBIT? Who is its sponsor? What does it accomplish? What are the two primary advantages of NIST security models? What is the common name for NIST SP 800-12? What is the document's purpose? What resources does it ...

Question onewhat results in your departments seem to be

Question one: What results in your departments seem to be correlated or related (either causal or not) to other activities? How could you verify this? What are the managerial implications of a correlation between these v ...

Distribution place strategy - discussionretailing -

Distribution (Place) Strategy - Discussion Retailing - Consumer Perceptions Retailing has an impact on the daily lives of each individual all over the world. Retailing is "all the activities directly related to the sale ...

Change management workbook 1a context analysisq1 how is ai

CHANGE MANAGEMENT WORKBOOK 1 A. Context Analysis Q1: How is AI (Artificial Intelligence) a game-changer in the industry you're analyzing? What new competitive dynamics/models emerge b/c of the introduction of AI? Q2: Ben ...

What is an infosec framework what is an infosec blueprint

What is an InfoSec framework? What is an InfoSec blueprint?. What is a security model? How might an InfoSec professional use a security model? What is access control? What are the essential processes of access control? W ...

Majorfield supply change management writingthree-pages

MAJOR/FIELD: ''SUPPLY CHANGE MANAGEMENT'' WRITING Three-pages paper single space on the following Supply Chain Topics: Did Toyota an auto manufacturing company benefit from implementing JIT? Is Tesla benefiting from Supp ...

Employee developmentin an organization that wants to use

Employee Development In an organization that wants to use work experiences as a method of employee development, what basic options are available? Which of these options would be most attractive to you as an employee? Why ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

WalMart Identification of theory and critical discussion

Drawing on the prescribed text and/or relevant academic literature, produce a paper which discusses the nature of group

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro