CHAPTER THREE

METHODOLOGY

Topics
Figures
Tables

Nature of Study

The researcher used qualitative methodology to investigate the perceptions of teaching candidates who were involved in the process of creating electronic portfolios. This research was a multiple case study in which qualitative data was obtained through personal interviews with the teacher candidates, the course professor, and the computer lab technician, as well as the examination of the portfolios themselves. Qualitative methodology was used to analyze the data obtained from the interviews as well as the written responses included within the electronic portfolio products. The interviews and portfolio analyses contributed to the development of an understanding of each individual's unique experience in collecting and preserving electronic evidence aligned with course objectives.

The researcher used an inductive process, seeking out details and discovering patterns as they emerged throughout the electronic portfolio process. Technical background and attitudes toward technology, as reported in the computer literacy questionnaire, were compared to student perceptions of the portfolio process. The process of designing the portfolio was investigated from the perspective of the course professor and the research designer to determine strengths and weaknesses in organization and presentation. Technological processes within the real-life context of a college computer lab were examined for problematic hardware and software issues. The electronic portfolio process was described and analyzed on an individual basis with no clear set of anticipated outcomes.

This study was exploratory in nature, attempting to promote further understanding of an innovative technology. The technical background of the individuals participating in the project was diverse, requiring non-standardized methods of investigation (Patton, 1980, p. 88). Strengths and weaknesses of the process and technical problems encountered by the participants varied according to the individual's background and interest in technology. Lincoln and Guba (1985) discussed the use of qualitative methods as being adaptable when dealing with multiple realities. Participants in this study represented multiple realities in terms of attitude toward and expertise in technology.

Detailed information was obtained through the participant’s descriptions to further understand and improve the process of creating electronic portfolios. The researcher interacted closely with some of the students involved in the study. The researcher observed and actively assisted personally in portfolio preparation within the lab setting with the first group of participants. The study was guided by the following questions:

1. What effect does incorporating technology have on the development of a portfolio for teacher candidates?
2. To what extent does the electronic portfolio process encourage self-assessment and reflection?
3. In what ways does the electronic portfolio provide evidence of student learning and achievement in line with course objectives?
4. What are the problems encountered in putting together the portfolio electronically?
5. What do students perceive as the strengths and/or weaknesses of creating a portfolio electronically?
6. What are the course professor's perceptions concerning the effectiveness of the electronic portfolio as a tool for assessment?

Project Description

The electronic portfolio project explored the possibilities of using computer technology to store artifacts in a digital multimedia format. These artifacts, created with computer text, graphics, sound, or video, were presented as partial evidence of meeting course objectives. The electronic portfolio was the final assessment for teacher candidates enrolled in a reading methods course as a requirement of the multiple subjects credential program. The project involved the course professor, students of two successive reading methods classes, the computer lab technician, and the researcher. The course syllabus, prepared by the course professor, presented learning objectives aligned with current state certification standards. The course professor and the researcher collaborated on the software template design. A computer lab technician was available on a regular basis to provide technical support to the teacher candidates.

Previous to this study, the paper portfolio binder had been established as the primary assessment for the reading methodology course in this university teacher preparation program. Students were expected to collect paper documents, photographs, graphic examples, and audio-visual artifacts as evidence of meeting course objectives. Providing evidence of reflective practice was considered a significant component of the portfolio process. The electronic portfolio provided a computer framework for documenting the meeting of course criteria and providing evidence of self-reflection and self-assessment. A template was designed to accommodate the use of digital text, graphics, audio, and video files in order to provide multimedia evidence of the achievement of course objectives. Students wrote cover sheet reflections explaining, describing, and defending the artifacts they chose as evidence of their achievement.

The electronic portfolio project was constantly evolving during the course of this study due to revisions in state credential standards and adjustments made because of technical problems. The initial template was presented to the first group of students in an interactive web design based on hypertext markup language (HTML). The course objectives were linked directly to state certification standards on the World Wide Web (WWW). After determining that some students considered the web design complicated and confusing, the researcher created a second alternative template using an interactive multimedia authoring program, Hyperstudio. The software featured tools for inserting text boxes, graphics, audio, and video, as well as provide interactive functions which allowed for linking within the program, to other software programs, and to the internet. The second semester course objectives were modified to incorporate revised state certification standards and the implementation of Reading Instruction Competency Assessment (RICA).


Selection of the Project Participants

The participants in this study included teacher candidates enrolled in two successive reading methods courses as a part of a multiple subjects credential program. A total of 31 students participated in electronic portfolio project during the course of two semesters. Group I took the reading methods course in Spring of 1998. Group II took the same course in Fall of 1998. All students involved in the project were asked to complete a computer literacy questionnaire at the beginning of the course. All students were invited to participate in the interview process. Participation was voluntary. Twelve students agreed to be interviewed and voluntarily submitted their electronic portfolios for analysis: six students from Group I and six students from Group II. All volunteers were female fourth or fifth year teacher credential candidates. The twelve students who agreed to participate signed an informed consent form (see Appendix E) that detailed the purpose of the study, described the activities in which the volunteers would engage, and presented the rights of the participants.

In addition, the course professor and the computer lab technician were asked to provide observational data, opinions, and insights into the portfolio process through interviews, phone conversations, and e-mail correspondence. A field journal was kept in order to provide an historical record of the researcher's involvement in the process of developing templates for the multimedia computer portfolio. The researcher provided a narrative of significant developments, changes, and problems that occurred during the study. E-mail correspondence between the course professor and the researcher was analyzed to provide additional historical data. The researcher provided additional technical help and advice within the computer lab setting, as well as through e-mail correspondence with some of the participants.


Human as Instrument

Lincoln and Guba (1985, p. 236) stated that the instrument of choice in naturalistic inquiry is the human because he/she has the ability to interact with the situation, be responsive to environmental clues, provide immediate feedback, and request verification of data. The human instrument can collect information at multiple levels simultaneously, explore atypical or unexpected responses, and process data as soon as they become available (Hoepfl, 1997). The researcher was the primary human instrument of data collection and interpretation in this study. The researcher designed the computer literacy questionnaire (Appendix A), created an open-ended interview question guide for student participants (Appendix B), and created additional individual question guides for the course professor (Appendix D) and the computer lab technician (Appendix C). All interview transcriptions, e-mail correspondence, field notes, and narrative text were stored and indexed in a qualitative research software package, Ethnograph, v. 5.0 (Seidel, 1998).

Data Collection Procedures

A questionnaire to determine computer literacy and level of interest in technology was administered to students prior to their participation in the portfolio project (see Appendix A). All students completed the computer literacy questionnaire at the beginning of the reading methods course prior to beginning the electronic portfolio project. Questions were designed to determine participants’ access to computer hardware and software, level of computer activity, attitude towards technology, skill and activity level with different types of software, and personal purposes for using technology. Additional questions related to age, gender, year in college, and computer format used. Additional comments were encouraged and these comments provided further insights into students’ perceptions concerning computers technology. The results of the computer literacy questionnaire were analyzed and charted using a computer spreadsheet software program, Microsoft Excel. Comparisons were made between the results of the entire student population participating in the electronic portfolio project and the twelve volunteer participants in the research study.

Open-ended interviews with volunteer student participants were conducted after the completion of the course portfolio by the researcher (see Appendix B). A flexible question guide was followed and responses were audio-taped and transcribed. Interviews, which lasted approximately 30 to 45 minutes, were conducted after the student completed the reading methods course. The one on one interview was scheduled at the participant’s convenience and was held on campus in an available school of education classroom. The interviewer took notes during the course of each interview and asked for responses to be clarified or expanded upon when it was considered useful to the study. Additional responses or clarification were accomplished through e-mail correspondence. The researcher initially explained the purpose of the interview and requested permission to tape the interview. The researcher attempted to remain open to issues of personal interest to the participant and ask questions to further develop emerging topics and patterns. Participants were encouraged to expand upon the interview questions and talk about their experiences openly and freely. All interview text was imported into the qualitative software package, Ethnograph (Seidel, 1998), for analysis.

Electronic portfolios were examined after the participants had completed the course and had received their course evaluations from the professor. Portfolios of all participating students were collected on a zip disk and transferred to a CD-ROM disk. Student generated reflective cover sheet texts within the electronic portfolio framework were imported into the qualitative software for analysis along with interview and e-mail text. The cover sheet texts were examined primarily for evidence of self-reflection and self-assessment. Texts from the portfolios were examined for reference to personal perceptions and attitudes toward the electronic portfolio project. The researcher made no attempt to evaluate the quality of the electronic portfolio artifacts as assessment in reference to the achievement of course objectives.

An open-ended e-mail interview with the course professor was conducted after the portfolio project was completed (Appendix D). The course professor was asked about her expectations for the electronic portfolio project and her reasons for using technology in teacher preparation. She was asked to describe design changes and technical adjustments made during the course of the project. She described how she assessed the portfolio products and what she perceived student attitudes to be throughout the portfolio process. Adjustments in software design, as well as curricular changes in the portfolio format, were documented throughout the study. Data on the initial design phase of creating a template for the electronic portfolio organized around course objectives was obtained through e-mail correspondence and records of informal conversations with the course professor. A research journal was used to record field procedure notes. Throughout the study, the researcher kept a thorough narrative of the technical processes, the problems that occurred with software and hardware, the changes made to improve the templates and electronic resources, and the course revisions made for subsequent terms. In addition, a semi-structured interview with the computer lab technician was taped and transcribed.

An informed consent form was provided for everyone participating in the study (Appendix E). Participants were granted the right to withdraw from the study at any time. Interview participants received a CD-ROM of their electronic portfolio for helping provide their perspective on the portfolio experience. Data obtained throughout this study was collected and saved in digital format in order to be used as evidence in a multimedia computer presentation.


Data Analysis Procedures

Qualitative inductive analysis was used in this study to discover critical themes emerging out of the data (Patton, 1990). Data was coded into logical, descriptive, and meaningful categories to provide a framework for analysis (Hoepfl, 1997). An appropriate method of analysis for this study has been described by Bogdan and Biklen (1982) as "working with data, organizing it, breaking it into manageable units, synthesizing it, searching for patterns, discovering what is important and what is to be learned, and deciding what you will tell others" (p.145).

The data analysis software package, Ethnograph, v. 5.0 (Seidel, 1998), was used to manage narrative documents and transcripts, allowing for storing, browsing, indexing, and coding of all text. Ethnograph allowed the researcher to explore documents and search for patterns and themes that emerged from the text. As the data was explored, text annotations were coded and an index system was established. Data for this study included research questions, emerging ideas, categories of people, interview text, field notes, e-mail responses, open-ended questions, portfolio analysis text, and other documents related to the electronic portfolio project. Search tools within the software were used to link, explore, and ask questions in order to determine relationships and establish hierarchies within the data.

Transcriptions of the interviews from all participating students provided the text for the initial coding and indexing of data. Other text imported into the software program included student generated cover sheet text from within the portfolios, as well as text from the researcher’s e-mail and research journal. Text from interviews and e-mail correspondence with the course professor and the computer lab technician provided additional data. Most of the data was imported from Microsoft Word documents, although some of the cover sheet text was taken directly from the text of the Hyperstudio portfolios. The Ethnograph editor’s reformat function was used to convert data files into the 40 character, hanging indent format required by the software for analysis. Additional preparation of the data was made by editing the text to include identifiers which were followed by a colon (:) and contextual comments which followed the plus (+) sign.

Imported text from a student interview is presented in the following example (Figure 1). The student’s name, as well as the key terms from the interview questions, are contextual comments following the plus (+) sign. "CP1:" refers to the researcher asking the first question and the "Q1:" refers to the student’s answer. "CP1a:" refers to a follow-up question to clarify the student response.

Figure 1. Example of interview text from Ethnograph.

+Lisa – Interview – Fall Group

+Process - 1
CP1: Could you briefly describe the
process you used to put your
electronic portfolio together? What
computer software/hardware did you
use, how did you go about it?
Q1: I used the Hyperstudio program and I
used the portfolio that had been
pre-done, the template for it, but I
took it apart and put it back
together the way I wanted it to connect.
I set up how I wanted the computer
part of it first. Then I went in and
plugged in what I wanted to add for
the objectives and artifacts and
things.
CP1a: What kind of changes did you make
to the template?
Q1a: There were links between stacks
that didn't make a whole lot of sense
to me, so I changed the links. The
biggest thing that I did--there was
one assignment that I wanted to use
pieces of in different stacks. I
had to take it all out and make it
into a new stack, so I ended up linking.
There are some pages that look the same but
they're actually two different pages
that I ended up double creating so it
would link the way I wanted it to.
The researcher began the coding process by marking recurring words and ideas emerging from the text by hand. In order to establish a code word index, each text file was then analyzed using the Ethnograph software file coding function. The coding process began with the numbering of each line of each text file. Each interview was coded individually to discover patterns and determine a word index referred to as the codebook. The researcher repeated the process at several stages in the research, noting patterns as they emerged in order to establish primary categories. These primary categories provided the first level within the coding hierarchy. A family tree structure was established with parent code words at the top of the hierarchy. Related code words, referred to as family code words, were placed into a hierarchical index under the parent code words. The parent code words that emerged through interview data examination were determined to include four level one categories: process, product, assessment, and technology.

In addition to interview text, the cover sheet text was imported for analysis. The electronic portfolio framework was designed to give students an opportunity to include artifacts as evidence of achieving course objectives. For each objective, students prepared a cover sheet providing support for their choice of artifacts as evidence of their competence in meeting established criteria. Students reflected upon each course objective and assessed their proficiency in each area. Once the cover sheet reflections were imported into Ethnograph, an additional parent code for teaching was added to the family tree structure to accommodate expanded discussion of literacy, learning, curriculum, and instruction.

Determination of the coding hierarchy remained flexible throughout the study. The level one parent code words were based on the following themes:

  1. The process of creating a portfolio electronically: student’s personal approach and attitude toward the assignment, the amount of time spent on the project, methods of collecting artifacts, design decisions made, and advice for improving the process.
  2. The electronic portfolio product: references to demonstrating achievement of course objectives, the qualities of the product, assignments, artifacts, and comparisons to paper portfolio projects.
  3. The use of the electronic portfolio for assessment: evidence of self-reflection, demonstration of competencies and proficiencies, personal ownership of the product, and evidence of successful performance of course criteria.
  4. The use of technology: the development of technical skills, the need for support, hardware and software problems encountered, and the future use of technology in teaching.
  5. The purpose of the electronic portfolio as a framework for discussion of teaching: course content, methodology, curriculum, literacy, content standards, strategies, research, resources, lesson plans, and classroom management.
In addition, the open-ended interview questions were analyzed and key terms were assigned to each question. One key term, "process," directly matched a level one parent code word. Other key terms were closely related to the family tree code structure. The relationship of the key terms to the parent code words generated after the completion of student interviews is presented in Table 1.

Table 1. Key Terms for Interview Questions in Relationship to Original Parent Code Words

Process
Product
Assessment
Technology
#1 Process 

#3 Methods 

#7 Time 

#12 Enjoyable

#13 Advice

#2 Evidence 

#8 Resources

#14 Improve

#15 Paper

#4 Purpose

#5 Objectives 

#16 Self-reflect and Self-assess

#6 Unable

#9 Skills

#10 Support

#11 Problems 

The primary coding system that developed is illustrated in Table 2. The "teaching" parent code was not added to the codebook until the portfolios had been analyzed and coded. At that point, new patterns were observed in the reflective cover sheets that required additional code words beyond those addressed in the interviews.
 
 

Table 2. Primary Coding System

Process
Product
Assessment
Technology
Teaching
Approach
     
  • Creative 
  • Experiment 
  • Explore 
  • Design 
  • Hand-on 
  • Organize 
  • Prepare 
  • Problem Solving 
Collect

Methods

Need Help

Advice

Attitude

  • Emotions 
  • Positive 
  • Negative 
  • Future Use 
Time

Decisions

Content
     
  • Artifacts 
  • Assignment 
  • Notes Menu 
Qualities
  • Aesthetic 
  • Artistic 
  • Consistent 
  • Fit/Flow 
  • Intricate 
  • Interest 
  • Pleasing 
  • Portable 
  • Professional 
  • Simple 
  • Space 
  • Visual 
Improve

Packet 

Paper Portfolios

Evidence

Objectives

Goals

Competence

Proficiency

  • Demonstrate 
  • Example 
  • Performance 
  • Know 
  • Understand 
Owner

Personal

Purpose

Fulfill

Reflect

Criteria

Sense

Experience

Background

Platform

  • Mac 
  • Windows 
Lab/Home

Internet/Web

Problems

Programs

  • Hyperstudio 
  • HTML 
Skills
  • Scan 
  • Edit/Copy 
  • Import 
  • Save 
Support

Strength

Technical

Use in Teaching

Multimedia

Literacy

Research 

Resources 

Standards

Strategies

Theory

Curriculum

2nd Language

Community

Learning Style

Lessons

Literature

Meaning

Reading

RICA

Special Needs

With Technology

Phonics

Influence Teaching 

Child Assess

Class Management

Student attitudes were explored by coding responses from the interviews, as well as through examination of the portfolio cover sheet reflections. Table 3 demonstrates an example of the fourth and fifth level code words used to describe student attitudes.
 
 

Table 3. Words Used in the Coding of Student Attitudes

Positive
Negative
Future
Emotions
Accomplish

Appreciate

Confident

Easy

Faster

Final Product

Artistic

Creative

Energy

Game

Good Job

Helpful

Motivated

Patience

Success

Personal

Aesthetic

Difficult

Frustrated

Intimidate

Irritate

Not Comfortable

Problems

Time Consuming

Scared

Stress

Lack of Background

Worry

Technical Problems

Need Training

Change

Do Again

Help in Job

Prep in Teaching

Responsible 

Comfortable

Excited

Enjoyable

Fun

Happy

Pleased

Proud

The family tree code structure evolved throughout the study. Segments of text were coded for each data file (See Figure 2). Codes for some text segments overlapped with others and some word codes were nested within other segments.

Figure 2. Example of coded segment of text file.

+Barbara - Interview - Spring Group 1

+process - 1 4
CP1: Could you briefly describe the 6
process you used to put your 7
electronic portfolio together? (What 8
computer software and hardware did you 9
use?) 10
#-ORGANIZE $-ARTIFACTS %-COMPETENCE
Q1: The first step was organizing 12 -#-$-%
material I wanted to use, the 13 | | |
artifacts. I looked at competencies 14 |-$ |
$-TECHNOLOGY
required. The second step was to 15 |-$-%
%-COLLECT *-ARTIFACTS
apply the technology. Once all the 16 |-$-%-*
artifacts were gathered and collected, 17 | -% |
$-HYPER $-FIELDWORK
I began to enter field experiences in 18 |-$ |
%-TEMPLATES
Hyperstudio. The second template was 19 |-$-%-*
$-CUT/PASTE
easier to use. I cut and pasted in 20 |-$-%
the material. 21 -#-$
+evidence - 2 23
CP2: What types of evidence did you 25
choose to place in your portfolio? How 26
did you select your evidence? 27
!-FIELDWORK #-ARTIFACTS
Q2: My fieldwork experience, artifacts 29 !-#
included lesson plans created for 30 |
$-JOURNAL
actual courses, critiques of journal 31 |-$
!-REFLECTION
articles, reflection papers, I 32 ! |-$
!-FOUNDATION $-OTHERCLASS
implemented my foundations teaching 33 ! |-$
!-KIDSBOOK
management plan, my children's book. 34 !-#-$
+methods - 3 36
CP3: What methods did you use to get 38
your evidence into the computer? 39
(typed, scanned, cut and paste?) 40
!-SCANNED !-TYPE !-CUT/PASTE
Q3: Scanning, typing, cut and paste, 42 !
!-VIDEO !-WEBSITE
video, web, audio sampling. 43 !
+purpose - 4 45
CP4: What did you see as the purpose of 47
your electronic portfolio? 48
#-REFLECT $-PURPOSE
Q4: I saw it as primarily a 50 -#-$
%-HELPATT
reflectionary tool. It was helpful to 51 -# |-%
know you were gaining what you should 52 | |
get out of the course. It fulfilled 53 -# |-%
%-OBJECTIVES
various purposes, but I used it more 54 | |-%
*-JOB
for reflection on goals. It could 55 | |-%-*
also be a tool for interviews. 56 -#-$ -*
Code counts were generated for each code word used in the research. Single code counts indicated the total number of times used by all students within all interview and portfolio text data. A variety of search combinations using multiple codes were conducted as well, which allowed for the grouping of related code words. In addition, searches were conducted using filters created by the use of identifiers. Searches were generated by single code, multiple codes, and filters, including face filters, identifiers, memos, or file codes. Face sheets were created to incorporate data from the computer literacy survey and allow for data to be filtered according to specific survey questions. Identifier sheets were created to differentiate between students from Group I and Group II in both interviews and cover sheets. Multiple codes and filters were used within the software to examine patterns and clarify data. The output of code counts was generated as segments, frequencies, summaries, or memos. An example of a single code count of words that students used to describe technical processes is presented in Figure 3.
 
 

Figure 3. Code counts for references to technical processes.

Code Word Count Code Word Count Code Word Count Code Word Count
HOST
1
OWNER
2
ARTISTIC
4
EASY
8
APPROACH
1
DECISIONS
2
FUN
4
RECORD
8
EVIDENCE
1
TECHBACK
2
WEBSITE
4
VIDEO
9
PRODUCT
1
KIDSBOOK
2
LABTECH
4
PICTURES
9
HAPPY
1
TECHLOGIST
2
CREATIVE
4
DISKS
10
READLANG
1
ASSIGNMENT
2
SAVEFILE
4
BUTTONS
10
ACCOMPLISH
1
SUCCESS
2
FIRSTEXP
4
ORGANIZE
10
ASSESS
1
RESOURCES
2
IMPORT
4
PACKET
11
CONTENT
1
EMAIL
2
IMPROVE
4
SKILLS
11
SCARED
1
DESIGN
2
ELECTRONIC
4
LINK
12
WEBACCESS
1
TEMPLATES
2
LAB/LRC
4
ZIP
12
RNNINGREC
1
TECHNOLOGY
2
SOLVE
5
PROBLEMS
15
PROFESSOR
1
RICA
2
IBM/WIN
5
HYPER
15
EXPLORE
1
CAPTURE
2
PUTOGETHER
5
TRANSFER
20
ENJOYABLE
1
NOTES
3
MAC
5
CUT/PASTE
30
PREPTEACH
1
TEXT
3
HOME
5
TYPE
30
TEACHEXP
1
PROCESS
3
HTML
5
TECHNICAL
36
INCORPORAT
1
TYPETEXT
3
ARTIFACTS
5
SCANNED
68
LEARN
1
ANIMATE
3
OBJECTIVES
5
   
STRATEGIES
1
FRUSTRATED
3
GRAPHICS
6
   
SIMPLE
1
OTHERCLASS
3
REFLECT
6
   
DIFFICULT
1
DRAWING
3
INTERNET
6
   
COMPKNOW
1
PROGRAMS
3
COPY
6
   
TRAINING
1
USEINTEACH
4
COLLECT
7
   
POSITIVE
2
WORDPROCES
4
AUDIO
8
   
COMPCLASS
2
OTHERS
4
TIME
8
   

Combined searches for code words provided specific information in reference to files and lines each imported transcript. An example of a combined search for the code word, "experience," is provided in Figure 4.

Figure 4. Combined search results for experience code word.

Combined Search Results Search Code EXPERIENCE
====================================== Lines 96 to 98 of File PENNY ======================================
A lot of the people in the class were not already computer literate and so she wanted them to improve their knowledge.
====================================== Lines 282 to 283 of File PENNY ======================================
except my computer knowledge was expanded.
====================================== Lines 70 to 71 of File MAGGIE ======================================
Q4: One of the purposes was to get me used to a new computer program,
====================================== Lines 72 to 74 of File MAGGIE ======================================
because I know that's one of the big things that we need to start getting used to now is all the technology.
====================================== Lines 361 to 362 of File MAGGIE ======================================
Probably just more basic knowledge on how to use it.
====================================== Lines 367 to 370 of File MAGGIE ======================================
Q14e: Oh yes. I think they're really neat and I think that kids can learn a lot from them to. You can put so much into it and personalize it so much.
Code counts were generated to provide summary data. The summary read-out shows the code count, the start and stop lines of the text, the number of lines, and the number of cumulative lines. An example of part of the summary output of coded reference to "advice" on how to proceed with the electronic portfolio project is included in Figure 5.

Figure 5. Example of summary output of advice code word.

PLAY ADVICE LISA
1
304
306
3
3
STARTEARLY ADVICE LISA
1
313
314
2
5
PLANAHEAD ADVICE LISA
1
314
332
19
24
               
ADVICE ADVICE PAULA
1
244
249
6
6
STARTEARLY ADVICE PAULA
1
244
245
2
8
IMMERSE ADVICE PAULA
1
245
249
5
13

Frequency data for the code word, " assessment," generates a report as it appears in Figure 6. The count for each file is stated along with the percent across all files (top number) and the percent within the file (bottom number).

Figure 6. Example of frequency count for assessment code word.

File:LISA
---------- ----- ---- ---------- ----- ----
ASSESS 15 0.06
1.00
File:PAULA
---------- ----- ---- ---------- ----- ----
ASSESS 20 0.08
1.00
File:BARBARA
---------- ----- ---- ---------- ----- ----
ASSESS 20 0.08
1.00
File:MAGGIE
---------- ----- ---- ---------- ----- ----
ASSESS 14 0.05
1.00
Segment output searches were made on various code words in order to view the text of the transcript in detail rather than through frequency or summary output. And example appears in Figure 7.

Figure 7. Example segment output of aesthetic code word.

With Kids-Parent = AESTHETIC
SEARCH CODE: AESTHETIC
$-AESTHETIC
files. Other than that, the arranging 171 -# -$
#-CONSISTENT
of it. I wanted it to look 172 -# $
%-THELOOK
consistent and I spent a lot of time 173 | $ -%
on the visual, the esthetic. 174 -# -$ -%



Trustworthiness of the Study

Triangulation of multiple data sources contributed to the trustworthiness and authenticity of this research study. Data triangulation from teacher candidate participants was obtained from questionnaire results, open-ended interviews, and portfolio cover sheet analysis. Responses to the computer literacy questionnaire were tabulated and analyzed in relation to individual interview responses and portfolio product analysis. The electronic portfolio products were examined to discover what patterns of experience participants brought to the portfolio, what patterns characterized their participation in the project, and "what patterns of change were reported by and observed in the participants" (Patton, 1980, p. 112). Additional data was obtained from observations, field notes, telephone conversations, and e-mail responses.

Triangulation of multiple data sources involved comparing the perspectives of people from different points of view, particularly the student participants, the course professor, the computer lab technician, and the researcher (Patton, 1980, pp. 330-331). Participants in the study were asked to review findings and give feedback during the course of the study in an effort to validate the accuracy of the information and determine whether it matches reality (Merriam, 1988). Member checks were conducted throughout the study through telephone, e-mail, and postal correspondence in order to clarify any conflicting statements or confusing data.

An audit trail was established and maintained to facilitate an external audit to establish levels of dependability and confirmability of this study (Lincoln and Guba, 1985). This research conformed to the audit trail classifications made by Halpern (1983) in an attempt to provide reliability and enhance dependability (Cited in Lincoln and Guba, 1985, pp. 382-392). Raw data was collected and sufficient evidence was provided concerning data reduction and analysis. Data reconstruction and synthesis established hierarchies of concepts and categories. Process notes were maintained; intentions and dispositions were recorded; and valid instruments were developed. The audit trail included audio-tapes of interviews, transcriptions of interviews, hard copies of all documents coded by the qualitative software package, including e-mail correspondence and text from the researchers diary. Data imported into the software package, Ethnograph, resulted in the generation of the following documents: the research codebook, individual code counts, and code searches using segment, summary, and frequency outputs.


Assumptions And Limitations

An ideological assumption of this study was related to the researcher's strong belief in the importance of technology in today's society. The researcher expressed the belief that educators have a responsibility to prepare students for a rapidly changing, highly technological future. The researcher believed that learning with technology would promote creativity and develop the necessary problem-solving abilities required to meet the challenges of the future. The researcher professed to be a strong proponent of multiple modes of learning guided by performance based assessment.

An assumption in this study was that all participants answered interview questions about their perceptions and actions truthfully, freely, and frankly. It was assumed that the interviews, observations, and collection of electronic portfolios provided a complete and useful database of information upon which interpretations and conclusions could be drawn.

Limitations of the study included the lack of generalizability of findings beyond the specific research setting. The transferability of the research findings to another situation cannot be validated, although providing sufficient information might make findings applicable to a new situation depending on the degree of similarity (Lincoln and Guba, 1985). The reliability of this study was limited because it would be impossible to replicate in another context.

An additional limitation of the study related to the objectivity of the researcher. Patton recommended "empathic neutrality" (1980, p. 55). He stated that empathy "is a stance toward the people one encounters, while neutrality is a stance toward the findings" (1980, p. 58). He stated that the neutral researcher needs to be non-judgmental while trying to report what is found in a balanced way. This study was limited because participation in this study was completely optional and voluntary. Data obtained from the students who volunteered to be interviewed and willingly agreed to have their portfolios analyzed may not be representative of an entire class of teacher candidates.
 
 

Table of Contents

Index
 
 

Copyright 1999 by Carla Hagen Piper