SlideShare a Scribd company logo
analysing qualitative
data the hard way
jaimes nel
@gnva
connectedfutures.com
Post-up

@gnva
connectedfutures.com
Sweat the text
“NSA and intelligence community in general is focused on getting intelligence wherever it can
by any means possible. It believes, on the grounds of sort of a self-certification, that they
serve the national interest. Originally we saw that focus very narrowly tailored as foreign
intelligence gathered overseas."
"Now increasingly we see that it's happening domestically and to do that they, the NSA
specifically, targets the communications of everyone. It ingests them by default. It collects
them in its system and it filters them and it analyses them and it measures them and it stores
them for periods of time simply because that's the easiest, most efficient, and most valuable
way to achieve these ends. So while they may be intending to target someone associated with
a foreign government or someone they suspect of terrorism, they're collecting you're
communications to do so.”

@gnva
connectedfutures.com
Data grid

@gnva
connectedfutures.com
Sweat the text

@gnva
connectedfutures.com
@gnva
connectedfutures.com
@gnva
connectedfutures.com
Theory emerges from the data
Iterate theory till you can account for deviant cases
Underpinned by the idea that
“a unifying theory is possible”

@gnva
connectedfutures.com
Coding as data management - e.g. all instances of
a particular phenomenon
Coding as analytical process - identification and
refinement of themes
Memoing as reflexive process - what are your
thoughts as you encounter the data, how is your
interpretation taking shape
@gnva
connectedfutures.com
@gnva
connectedfutures.com
Data grid

@gnva
connectedfutures.com
Use data structure to aid the analysis process
Pragmatic - you start off by limiting the data you’re
looking at, and you can use this to design data collection
in the first place

@gnva
connectedfutures.com
@gnva
connectedfutures.com
@gnva
connectedfutures.com
Software

@gnva
connectedfutures.com
@gnva
connectedfutures.com
@gnva
connectedfutures.com
@gnva
connectedfutures.com
@gnva
connectedfutures.com
@gnva
connectedfutures.com
@gnva
connectedfutures.com
@gnva
connectedfutures.com
Soft outputs

@gnva
connectedfutures.com
Implicit
Opportunities

Scanning
relevant
intranet
articles

Exposure/
Push

Someone in
Brazil who
does Marine

Search/
Pull

Personal
interests,
follow

Regulations
Sign-off,
workflow

Explicit

Operating
Procedure
Manual

Named
person

@gnva
connectedfutures.com
Turned into a
"knowledge
object"

Point of interest
identified

Issue

Article
Column

Object

White paper
Bulletin
Association agenda

Iterations with
Marketing and
Compliance

Talk

Specialisms
Magazine
Increases
Credibility
and/or
Reach

Personal sharing

Amplification

SM sharing
Profile
Association

Audience
recognise
relevance

Web destination
Conversations
take place

Discovery

Engagement

Potential
opportunities
reached

Opportunity

collect
data
billing
Marketing/
publishing

Clients

Clients

client
service
Clients
renewals

Frontend

Clients

tender

Consulting

Broking

Frontend

Underwriters

Processing

Frontend

Underwriters
placement

collection
Underwriters

Clients

Marketing/
publishing

claim

Frontend

Processing

payment

Clients

@gnva
connectedfutures.com
Acquiring

Discovering

Buying
Organising
Downloading

Performing

Listening

Making
Accessing

Distributing

Hosting

@gnva
connectedfutures.com
Fidelity

@gnva
connectedfutures.com
Low-res

High-res
“NSA and intelligence community in general is focused on getting intelligence
wherever it can by any means possible. It believes, on the grounds of sort of a
self-certification, that they serve the national interest. Originally we saw that
focus very narrowly tailored as foreign intelligence gathered overseas."
"Now increasingly we see that it's happening domestically and to do that they,
the NSA specifically, targets the communications of everyone. It ingests
them by default. It collects them in its system and it filters them and it analyses
them and it measures them and it stores them for periods of time simply
because that's the easiest, most efficient, and most valuable way to achieve
these ends. So while they may be intending to target someone associated with a
foreign government or someone they suspect of terrorism, they're collecting
you're communications to do so.”

@gnva
connectedfutures.com
Builds robustness
Case analysis - 3 out of 4 * never 75%
Deviant cases
Close to the data

@gnva
connectedfutures.com
@gnva
connectedfutures.com
Pragmatic
Work and rework themes
Memo
Return to your data *why video is dangerous

@gnva
connectedfutures.com
1. Fight for budget for better analysis

@gnva
connectedfutures.com
1. Fight for budget for better analysis
2. Clients should own the fidelity

@gnva
connectedfutures.com
1. Fight for budget for better analysis
2. Clients should own the fidelity
3. Talk in terms of confidence, not absolutes

@gnva
connectedfutures.com

More Related Content

PDF
A Cyber Security Facade
PPTX
Using Mindmaps for quick analysis - July event on 'Turning the mountain into ...
PPTX
Active Testing: Real time Collaborative Analysis - July event on 'Turning the...
PPTX
Bridging the language gap - July event on 'Turning the mountain into a molehill'
PPTX
New experience - The how to's of research with an older audience
PDF
Helping users in assessing the trustworthiness of user-generated reviews
PDF
Illustration & Visual Thinking as an Engagement Tool
PDF
Luddites won't let me Skype in
A Cyber Security Facade
Using Mindmaps for quick analysis - July event on 'Turning the mountain into ...
Active Testing: Real time Collaborative Analysis - July event on 'Turning the...
Bridging the language gap - July event on 'Turning the mountain into a molehill'
New experience - The how to's of research with an older audience
Helping users in assessing the trustworthiness of user-generated reviews
Illustration & Visual Thinking as an Engagement Tool
Luddites won't let me Skype in

Similar to Analysing qualitative data the hard way - July event on 'Turning the mountain into a molehill' (20)

PDF
Graphs in Government
PPTX
Information Literacy, Privacy, & Risk: What Are the Implications of Mass Surv...
PDF
Open Source Information Gathering Brucon Edition
PDF
Using Predictive Analytics for Anticipatory Investigation and Intervention
PDF
CORMA-FW REPRINT-APR2015
DOCX
Panama papers
DOC
Privacy and anonymity have been reduced to the point of non
PPTX
Threat Hunting with Splunk
PDF
Why private search is important for everone and how you can protect your pers...
PDF
Why private search is important for everone and how you can protect your pers...
DOCX
The Rivest-Shamir-Adleman (RSA) is a system for p.docx
PPTX
Open Data Journalism
PPTX
Progscon cybercrime and the developer
PDF
01 Introduction atala prism.pdf
PDF
Consumers' and Citizens' Privacy
PPTX
Mongoose H4D 2021 Lessons Learned
PDF
Cyber security macau
PDF
Data Mining Online Audiences with D8A Group
PDF
Stalking the Kill Chain
 
PPTX
Threat Hunting
Graphs in Government
Information Literacy, Privacy, & Risk: What Are the Implications of Mass Surv...
Open Source Information Gathering Brucon Edition
Using Predictive Analytics for Anticipatory Investigation and Intervention
CORMA-FW REPRINT-APR2015
Panama papers
Privacy and anonymity have been reduced to the point of non
Threat Hunting with Splunk
Why private search is important for everone and how you can protect your pers...
Why private search is important for everone and how you can protect your pers...
The Rivest-Shamir-Adleman (RSA) is a system for p.docx
Open Data Journalism
Progscon cybercrime and the developer
01 Introduction atala prism.pdf
Consumers' and Citizens' Privacy
Mongoose H4D 2021 Lessons Learned
Cyber security macau
Data Mining Online Audiences with D8A Group
Stalking the Kill Chain
 
Threat Hunting
Ad

More from The Research Thing (16)

PDF
Saving energy (and money) with behavioural science with Karina van Schaardenburg
PDF
Increasing your impact with behavioural science with Dr. Rosie Webster
PPTX
Discovery-phase workshops with primary school pupils
PDF
How to conduct research with a global generation of kids
PDF
Different approaches to co-creating with and for kids
PDF
Disclosing worlds and embodying knowledge
PDF
Research as a team sport
PDF
Studio INTO - Getting old isn't what it used to be
PDF
WhatUsersDo: Remote UX Testing
PDF
SessionCam: Generating customer insights
PDF
Nativeye: Mobile research for innovation
PDF
10 tips for starting up ux research
PDF
Ethnography for e-Commerce (Annette Priest)
PPTX
Data analysis for Design Research - July event on 'Turning the mountain into ...
PPT
Carry on pumping - March event on 'Research in the field'
PPTX
Into the belly of the beast - March event on 'Research in the field'
Saving energy (and money) with behavioural science with Karina van Schaardenburg
Increasing your impact with behavioural science with Dr. Rosie Webster
Discovery-phase workshops with primary school pupils
How to conduct research with a global generation of kids
Different approaches to co-creating with and for kids
Disclosing worlds and embodying knowledge
Research as a team sport
Studio INTO - Getting old isn't what it used to be
WhatUsersDo: Remote UX Testing
SessionCam: Generating customer insights
Nativeye: Mobile research for innovation
10 tips for starting up ux research
Ethnography for e-Commerce (Annette Priest)
Data analysis for Design Research - July event on 'Turning the mountain into ...
Carry on pumping - March event on 'Research in the field'
Into the belly of the beast - March event on 'Research in the field'
Ad

Recently uploaded (20)

PPTX
Final Presentation General Medicine 03-08-2024.pptx
PDF
01-Introduction-to-Information-Management.pdf
PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PPTX
Pharmacology of Heart Failure /Pharmacotherapy of CHF
PPTX
Introduction-to-Literarature-and-Literary-Studies-week-Prelim-coverage.pptx
PDF
Chinmaya Tiranga quiz Grand Finale.pdf
PPTX
Pharma ospi slides which help in ospi learning
PPTX
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
DOC
Soft-furnishing-By-Architect-A.F.M.Mohiuddin-Akhand.doc
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PPTX
master seminar digital applications in india
PDF
Microbial disease of the cardiovascular and lymphatic systems
PPTX
Orientation - ARALprogram of Deped to the Parents.pptx
PPTX
202450812 BayCHI UCSC-SV 20250812 v17.pptx
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PDF
RTP_AR_KS1_Tutor's Guide_English [FOR REPRODUCTION].pdf
PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
PDF
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
PPTX
Cell Structure & Organelles in detailed.
PDF
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
Final Presentation General Medicine 03-08-2024.pptx
01-Introduction-to-Information-Management.pdf
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
Pharmacology of Heart Failure /Pharmacotherapy of CHF
Introduction-to-Literarature-and-Literary-Studies-week-Prelim-coverage.pptx
Chinmaya Tiranga quiz Grand Finale.pdf
Pharma ospi slides which help in ospi learning
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
Soft-furnishing-By-Architect-A.F.M.Mohiuddin-Akhand.doc
2.FourierTransform-ShortQuestionswithAnswers.pdf
master seminar digital applications in india
Microbial disease of the cardiovascular and lymphatic systems
Orientation - ARALprogram of Deped to the Parents.pptx
202450812 BayCHI UCSC-SV 20250812 v17.pptx
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
RTP_AR_KS1_Tutor's Guide_English [FOR REPRODUCTION].pdf
Abdominal Access Techniques with Prof. Dr. R K Mishra
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
Cell Structure & Organelles in detailed.
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS

Analysing qualitative data the hard way - July event on 'Turning the mountain into a molehill'