The question of methodology in internet studies has started to attract the attention of researchers since this tool began to be used widely since the 2000s. This interest, especially in the period of web 2.0 and social media tools has increased more and more. Internet, being the focus of interdisciplinary studies and which is offering virtual methods, continues to be a subject for social scientist. According to some researchers, Internet also brings some risks to perform research in the social sciences.The ever-changing Internet environment and data, make it impossible to secure ceteris paribus condition. This also raises the question of the validity of the research methodology. On the other hand the ease and cheapness of data collection on the internet compared to traditional media, as well as the opportunity to reach a wider sampling via Internet appear to be the positive aspects of the study area. In this study, internet based data collection methods with the transition from the web 1.0 era to web 2.0, and research methods based on social media are explained. The shortcomings of these applications will be discussed. How quantitative and qualitative research methods can be applied to investigate web 2.0 tools and what can be done to remedy the deficiencies of these applications will be discussed. Thus, different methods used in different fields and studies carried out by the literature review and new methodological problems will be revealed.
the question of disclosure of internet studies has started to ask the attention of difficulties since this tool began to be used widely since the 2000s this interest especially in the period of web 20 and social media tools have increased more and more of the users of the interest of the intelligence of the support of the support of the internet in the support of the support of the accession of the accession of the security of the connection of the accession of the accession of the security of the security of the internet accession of the connection of the access to the security of the security of the connection of the security of the support of the connection of the connection of the connection of the connection of the connection of the connection of the access of the access of the access of the access of the accession of the access to access to access to access to access to access of the information of the information of the access to access to access to access of the access of the security of the information of the data exchange of the access of the data exchange of the information of the information of the data exchange of the security of the security of the connection of the information of the information of the data exchange of the information of the data exchange of the data exchange of the connection of the connection of the information of the
Benzer Makaleler | Yazar | # |
---|
Makale | Yazar | # |
---|