Description
The focus of this course is on applied learning and your ability to take the information from the course and apply it to a real problem, program, or policy. There really is no one best way to design a research project. The emphasis is on finding the most appropriate way. For example, choosing exercise over eating unhealthy foods is almost always the best choice. Unfortunately, things are not that clear in research. An evaluation design is not always the best in every circumstance. For example, if you are evaluating the effectiveness of an entitlement program that provides cash to low income families, you should not use an experimental design in which some families are randomly excluded from receiving these benefits. You cannot deny benefits that someone is legally entitled to receive. While an experimental design is usually seen as a good design, in this instance, it would not be appropriate.
For this Assignment, you will develop an effective research question and select an appropriate evaluation design for your program, problem, or policy. Review the Learning Resources for this week. Use the organization that you selected as the topic of your Discussion post for this week, and reference your colleagues’ feedback to guide you in selecting your research question(s) and evaluation design. You will be using their feedback to help you further develop and refine the research question and evaluate design you choose for your research project.
In your Assignment, include the following:
- Briefly describe the organization that you will use for your Final Project.
- Briefly describe the program, problem, or policy within that organization that might benefit from evaluation.
- Develop a research question(s) that defines the purpose of the evaluation.
- Describe the evaluation design that is most appropriate for this program, problem, or policy, and justify your selection. Include a discussion of validity and reliability.
Use at least three scholarly sources from the library that were published within the past five years to support your paper. Be sure to follow APA guidelines when citing your sources.
Papers should be double-spaced and be 3–5 pages in length, not including the cover and reference pages.
Readings
- Johnson, G. (2014). Research methods for public administrators (3rd ed.). Armonk, NY: M. E. Sharpe.
- Chapter 3, “What is the Question?” (pp. 34–47)
- Chapter 4, “Identifying Measures and Measurement Strategy” (pp. 48–63)
- Chapter 5, “Designs for Research: The Xs and Os Framework” (pp. 64–83)
- Chapter 6, “Other Research Approaches” (pp. 84–96)
- StatPac. (2009). Qualities of a good question. Retrieved from http://www.statpac.com/surveys/question-qualities.http
work for. The Lexington Public Library system. The Lexington Public Library system has six
library branches. The largest being the downtown Lexington Central library, The Village Branch,
The Northside Branch, The Beaumont Branch, The Eastside Branch and The Tate’s Creek
Branch. These branches make up the Lexington Public library system which service the city of
Lexington and surrounding counties in central Kentucky. The library has a strategic plan process
that follows these six key elements: Education, Access, Inclusion, Space, Culture, and
Stewardship (Lexington public library, n.d.). As part of these six elements the library follows a
strict guideline laid out in the Lexington public libraries policy and procedure manual. This
effects all library staff, operations, and implementations within all the library system. As director
of security, my staff and I follow closely the Lexington Public Library Policy and Procedures
manual.
In strictly following the Lexington public library policy and procedure manual the certain
policy implementations have been reviewed by myself and my staff that could further use
methods of research and evaluation implement better and safer practices inside the Lexington
public library systems. The library policy and procedure dealing with surveillance of library
property and access of customer information is one that needs further research and evaluation
especially in clarifying and finding proper solutions to vague policy understanding and
enforcement of the actual policy as it stands. With examining these areas of the Lexington public
library policy and procedures and finding actual realistic data certain research methods would
help identify key solutions that would institute better policy implementation including
Quantitative research that depends essentially on the accumulation of quantitative information,
Qualitative or research that depends on the gathering of subjective information and Mixed
research that utilization both quantitative and qualitative in a joint evaluation of research
(Johnson, 2014) .Research on this issue of surveillance of library property and the access to
customer information is a vital problem inside the library policy and procedure and could gather
the necessary data to better institute the policy and procedure in a more effective manner.
Lexington Public Library. (n.d.). Retrieved December 08, 2017, from
https://www.lexpublib.org/strategic-plan
Johnson, G. (2014). Research methods for public administrators (3rd ed.). Armonk, NY: M. E.
Sharpe.
Very well done! This should work well for the research design. Please remember to alphabetize the
sources in the reference page.
Responsiveness: 25
Content: 25
Quality: 23
73/75
Video Surveillance Policy
Purpose
The Library strives to maintain a safe and secure environment for its customers and staff.
Selected areas of the Library are equipped with video cameras that are recording at all times. A
sign is posted at the Library entrance informing the public that security cameras are in use.
Video monitoring and recording is conducted in a manner consistent with all existing local and
applicable laws and ordinances.
The Library’s video surveillance system is used for the protection and safety of customers,
employees, assets, property, and to identify persons breaking the law or violating the Library’s
Code of Conduct. No video is released without the permission of the Executive Director.
Approved by the Board of Trustees June 13, 2012
Video Surveillance Procedures
Security Camera Locations
Reasonable efforts are made to safeguard the privacy of customers and employees. The video
security cameras are positioned to record only those areas specified by the Executive Director
or Director of Support Service, and will complement other measures to maintain a safe and
secure environment. Camera locations shall not be changed or added without the permission of
the Executive Director or Director of Support Service.
Cameras may be installed in locations where staff and customers would not have an
expectation of privacy. Examples include common areas of the Library such as entrances,
accounts desks, near book and media collections, public seating, delivery areas and parking lots.
Cameras will not be installed in areas where staff and public have a reasonable expectation of
privacy, such as restrooms, nor are they positioned to identify a person’s reading, viewing or
listening activities in the Library.
Use, Disclosure, and Access to Digital Images
The Security Team Leader and Security Officers, in the course of their normal duties, monitor
and operate the live video security system. The Garage Technician may monitor the live garage
camera feed only and notify security if he or she notices suspicious activity.
Only the following individuals are authorized to access the recorded archival data in pursuit of
incidents of criminal activity, litigation, or violation of the Library Code of Conduct: Executive
Director, Director of Support Service, Security Team Leader, Security Officers, Director of
Library Services, and designated Persons – in – Charge. Authorized individuals, with notice to
the Executive Director or designee, may access or ask other staff to review recorded data in
order to identify security concerns related to a specific incident.
With the written permission of the Executive Director, individuals authorized under this policy
may use a still shot or selected portions of recorded data to request law enforcement review
for assessing the security risk of a specific individual or for investigating a crime on Library
property.
Video records may contain personally identifiable information about an individual who has used
any Library service or borrowed any Library materials (“patron information”). Every effort will
be made to ensure confidentiality and protection of Library users within the parameters of the
Open Records Law.
All requests for security camera footage or still shots by law enforcement will be referred to the
Library Executive Director or Director of Support Service. In his or her absence, direct requests
to the Senior Administrative Staff Member.
In the event of a search warrant, which is executable immediately, Administration will comply
with the search warrant and consult with legal counsel. Upon receipt of a subpoena or other
court order, Administration shall consult with legal counsel to determine if the document is in
proper form and that good cause for its issuance in a court of proper jurisdiction is
demonstrated. If not, Administration shall insist any defect be remedied before releasing
patron records which contain patron information.
General Public Requesting Access to Security Camera Footage
Confidentiality/privacy issues require that the general public submit an Open Records Request
before being allowed to view any security camera footage.
Retention of Digital Images
Images from the Library video security system are stored digitally on hardware in the Library.
Security camera footage will be kept confidential. Security recording equipment will be housed
in a locked area. Recordings are kept for a minimum of 14 days and no longer than 30 days in
accordance with the Library’s approved records retention schedule, unless required as part of
an ongoing investigation or litigation.
Unauthorized Access and/or Disclosure
A breach of this procedure may result in disciplinary action up to and including termination of
employment. Any Library employee who becomes aware of any unauthorized disclosure of a
video record and/or a potential privacy breach has a responsibility to ensure that the Executive
Director is immediately informed of the breach.
Purchase answer to see full
attachment