StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Research on music application users - Essay Example

Cite this document
Summary
The purpose of my research was to understand music application users who like Itune or Zune. The two research methods involved ethnographic research and questionnaires which are considered qualitative research methods…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER91.1% of users find it useful
Research on music application users
Read Text Preview

Extract of sample "Research on music application users"

Reflection Paper The purpose of my research was to understand music application users who like Itune or Zune. The two research methods involved ethnographic research and questionnaires which are considered qualitative research methods. The group came up with open ended questions which often characterize ethnographic research. We all have to keep in mind that even if the type of research would move us to know our participants better, we must remain objective at all times. Also, we need to work closely as a group because all of us need to communicate clearly our ideas. The research project gave us important lessons that helped us grow as students. The first thing that the group decided upon was the types of research methods we were going to use for the project. Every member researched on different research methods and presented the pros and cons of each method. We deliberated and came up with ethnographic research that involves survey and questionnaires. It was important for us to determine the value of each method and assess whether we would be able to get the result we needed using the methods aforementioned. First, we looked at the advantages of using interview for research. We realized that this method is time-consuming but yields quality data since we can ask open-ended questions. There was so much information that can be extracted using interview. Nevertheless, the group leader took the initiative in properly briefing us on how to conduct an interview for Research purposes. Another essential fact about interview method is that the interviewer must be skilled in conducting an interview. At times the answers can get personal but the listener must not be biased at all. Also, we must not ask leading questions because the subject must express his/her opinions freely. So if I am an avid Itune user, then I must not let the subject know about this. In ethnographic research, we must understand the value of the users. The first principle is that every person has a different background and value system. This could definitely influence their attitude towards a product or service. Some users value affordability while others prefer easy accessibility. There are also many users who prefer to use services that associated with strong brands like Apple’s Itunes. The behavior of users can also help marketers forecast some innovations in product design. While many users love the features of Zune, it cannot be applied on non Mac OS laptop or PCs. Knowing consumer’s preferences and behaviors are extremely important when designing products. First, designers can make decisions on what they should or should not include in creating a product. Once a product is launched and used by consumers, then various feedbacks can useful for improving the product’s characteristics. Nowadays, one way of having leverage is increasing customer satisfaction and that means continuous innovation. Some businesses frown upon criticism, because of this they lose a great opportunity to learn from their market. Due to the research we conducted, the answers given to us revealed the usability of applications and services that marketers should take note of. Indeed, we can say that even if our research was simple, it provided very relevant data for designers of music applications. Personal Contribution Every team member has their personal contribution that eventually led to a successful project. The first challenge that the group must overcome was organizing meetings. I was assigned to schedule the said meetings which was overwhelming at the at the beginning. I had to consider that each member had different priorities and schedule so a meeting must be scheduled based on everyone’s free time. Since I was the contact person, I have to keep track of all their messages and completely relay the information to the whole group. During meetings, all the tasks are delegated so we can start working on our share of tasks. We communicated in any means possible –mobile phone, Facebook, e-mail and quick meetings. Such effort facilitated smooth settlement of any concerns or issues that comes up. Another personal contribution that I did was helping the group to identify the key findings. Before that, I also participated in designing the questionnaire which meant doing some extra research on my part. It was quite tedious to sit beside a group member and discuss for a long period all the questions for the interview. My partner and I could not rush this part because the results of the questionnaire would make difference in our research. Personal skills development Because of the group project, I improved my communication skills because I had to initiate reaching to all members whenever there is a meeting. I also believe that my Organizational skills were enhanced since I did a lot of coordinating. Sometimes, I took notes during the meeting; at one time, I even facilitated a very quick meeting. This increased my self-confidence and realized that I could handle important responsibilities very well. What worked for me? I think it’s the challenge that motivated me to do things I have never done before. I am motivated to finish a task once it is assigned to me since I have high expectations for myself. The only thing that didn’t work for me was interpreting the results of the research because I dislike tasks associated with numbers. It‘s a good thing my other group members were considerate enough of my skills and limitations. Each of one has limitations actually but we try our best to make things work. What makes a good teamwork? Every group member supports the goals that we have set at the beginning of the project. Teamwork becomes successful when a team member gives his best shot to do a task assigned to him. Nobody complained because everyone was busy carrying on their tasks whatever that maybe. Also, teamwork becomes effective when there is constant communication among team members. Even team members who are always in touch and misunderstand another person’s message. Because of the diversity of the group, I also became more gender sensitive and respectful of other people’s culture. Good thing, all group members followed the leader and did not attempt to act smarter than the rest of the group. I think for a team to be successful, the leader is also the key because he is the one responsible for motivating members to work hard. In conclusion, I learned many skills as well as acquire d new set of principles as a future team member. I also realized that designing a product is not an easy task for you cannot please all people. You simply try your best after listening to various feedback. Most of all, I am happy because I have gained more self-confidence and felt very responsible for the first time. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Research on music application users Essay Example | Topics and Well Written Essays - 1000 words”, n.d.)
Retrieved from https://studentshare.org/environmental-studies/1417229-written-report-to-reflect-on-using-interview-and
(Research on Music Application Users Essay Example | Topics and Well Written Essays - 1000 Words)
https://studentshare.org/environmental-studies/1417229-written-report-to-reflect-on-using-interview-and.
“Research on Music Application Users Essay Example | Topics and Well Written Essays - 1000 Words”, n.d. https://studentshare.org/environmental-studies/1417229-written-report-to-reflect-on-using-interview-and.
  • Cited: 0 times

CHECK THESE SAMPLES OF Research on music application users

Networking and Distributed Systems

They all work to provide services to users and at whatever time they need these services.... Online entertainment is one example of what networking is capable of offering users.... They offer users quality in the work they are chosen to carry out and they are reliable (Birman 212).... The memory and real-time focus of these applications offer users enough time to concentrate on the tasks present and finish them without fear of losing data in case of power or system failure....
4 Pages (1000 words) Research Paper

Security in New Generation Cell Phones

users of electronic gadgets like cell phones should be more concerned about their safety.... Cell phones users are required to conduct their business and financial transactions online.... One such application is the opt-in text advertisements that give information on the whereabouts of the user round the clock....
5 Pages (1250 words) Research Paper

Broader Description of Mobile Device OSs iOS, Android, Palm OS

This paper ''Broader Description of Mobile Device OSs iOS, Android, Palm OS'' tells that OS allows the users of the applications to interrelate with the hardware configurations of a computer system.... hellip; OS comprises of certain characteristics which are briefly explained as the multiuser functionality helping two or more users to execute the program simultaneously.... Additionally, the multitasking function of Oss also helps one or more programs to run simultaneously rewarding the virtues of real time function which allows users to obtain responses instantly for the input....
8 Pages (2000 words) Research Paper

Enterprise Web Application Security Issues and Guidelines

The paper "Enterprise Web application Security Issues and Guidelines" discusses that in the past few years, the majority of organizations have shifted their businesses over the internet.... hellip; This paper has discussed some of the important security issues that enterprise application developers experience while implementing these web applications.... The basic purpose of this research is to discuss various issues that need to be considered by the enterprise web application developers while developing web based systems....
13 Pages (3250 words) Research Paper

How Does Spyware Work

It is the biggest dilemma that most of the internet users don't even find about the induction of any spyware application until and unless it has already been installed on their PCs.... Although most users have an understanding of spyware effects such as PCs being sluggish, strange search outcomes, and fronting more pop-up ads but it could be dangerous because of its secret nature.... In the late 1990s, software programs were being used much for getting info about the end-users....
11 Pages (2750 words) Research Paper

Rich Internet Applications Development

This paper highlights the Rich Internet application.... Rich Internet application is a model of modern technology that describes a new type of application linked with the Internet cloud and client.... A rich Internet application (RIA) is a web application developed to deliver similar characteristics and tasks that are offered by desktop applications (TechTarget, 2007).... RIAs normally divide the functions athwart the Internet/network split by positioning the user interface and associated action and ability on the client-side, and the data handling and process on the application server side (TechTarget, 2007)....
6 Pages (1500 words) Research Paper

E-Commerce Websites as a Guarantee of Effective Trade

The paper "E-Commerce Websites as a Guarantee of Effective Trade" discusses that designing the human interface of a website should be biased towards drawing the attention of users to the business that ought to be transacted and henceforth retaining their attention.... nbsp;… Results from previous studies have shown that system quality is the major factor that affects the ease of use of a site as perceived by the users.... This means that the user interface of e-commerce websites have to be designed in such a way that transactions are easy to effect while at the same time ensuring that users are safe from online security threats....
9 Pages (2250 words) Research Proposal

Microsoft Windows 7 Security Best Practices and Vulnerabilities

nbsp; There are several features of windows 7 security, which provide the users a freedom to go anywhere on the network quite securely such as Windows 7 Application locker, Data Execution and Prevention, Bitlocker, Internet Explorer 8, Window 7 Direct Access, and Microsoft Virtual hard disk (VHD).... As a result, the attackers can enter and cause harm to the system of the user or users in a network.... Along with the efficiency of these features, there exist some vulnerabilities as well, like remote attackers can easily attack, and local users can achieve privileges using crafted applications (CVeDetails, 2014)....
11 Pages (2750 words) Research Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us