SlideShare a Scribd company logo
1 of 30
Video analysis:
from grounded to
content analysis
Anne Adams & Liz FitzGerald
Our session today
• Examine different techniques to analyse video
• Further links: suggested tools, web links,
tutorials
• Discussion/Q&A
 Video recording
research inquiries
 Participatory videos
 Cultural probes
Different types of videos
“… a rich and varied set of materials that… let us ground
[our designs / processes / policies] in the detailed
textures of the local cultures”
(Gaver et al 1999)
Three video analysis approaches
• Whole-to-part inductive
(grounded analysis)
• Part-to-whole inductive
(content analysis)
• Manifest content
(Critical Incident approach)
“Two main analysis” divide
Analysis is like fishing
• part-to-whole
• You find the best river for the fish you want, you
have one line, a specific bait for a specific type of
fish.
• whole-to-part
• You may want to catch tuna so you fish in certain
parts of the sea BUT on the whole you throw
your nets out to sea and catch everything
including the things you want and don’t want.
Whole-to-part inductive
[grounded analysis]
Whole-to-part methods
• Conversational analysis
• Discourse analysis
• Thematic analysis
• Grounded theory
• “Both qualitative and quantitative approaches share
a common concern with theory as the goal of
research” (Henwood & Pidgeon, 1992 p.101)
Grounded analysis
• Data in whatever form is broken down,
conceptualised and put back together in new
ways
• Analysis stages: 3 levels of coding:
– Open
– Axial
– Selective (with process effects)
Open coding
Open coding: detailed
• Concepts are:- Conceptual labels placed on discrete
happenings, events, and other instances of phenomena
• Categories are:- where concepts are classified and
grouped together under a higher order – a more
abstract concept called a category.
• Properties are:- characteristics pertaining to a category
• Dimensions are:- Location (values) of properties along a
continuum
Open coding: analysis
• “ When I want to have a personal conversation (private
interaction), I encrypt the message (security
measure). I think that makes the email private
(Securing privacy). Stops people from listening in
(Surveillance).”
• Concepts are:- private interaction, security measures,
securing privacy, surveillance
• Categories are:- Interaction, privacy, security
2nd stage in-depth
Take section of an important point in your
data & start to code concepts!!
If you want, you can also review categories
Open coding
Category Class Property Dimension Dimensional Range
surveillance Being
observed
frequency often ........never
scope more ........less
intensity high.........low
duration long .........short
Part-to-whole
[Content Analysis]
Applying models
Part-to-whole &
manifest methods
• Content analysis
– counting
– imposing established frameworks
• Critical Incident Analysis
Iterative OR Storyline
• With both inductive approaches issues of
Decide continue OR Close
• Continue until saturation point (only
repetitive concepts, issues occurring)
• Summarise analysis with high-level story-line
combining abstract relationships with
detailed findings.
Attention Content & Interaction Pattern Approach
• Review 10-second intervals
• If multi-tasking, code for 1 second
(primary, secondary, tertiary focus)
• In the first table, code hardware foci (the
what), second table software/function
used (the why)
Attention content analysis 1
Time Code /
sequence
identifier
Participant identifier Primary Focus of attention Secondary Focus of attention Tertiary Focus of attention
01:10
01:10
[EXAMPLE]
P1
P2
Tabletop
P1
Book
Tabletop
None
None
Table 1: Hardware / People (what)
Attention content analysis 2
Table 2: Software / Function (why)
Time Code /
sequence
identifier
Participant identifier Primary Focus of attention Secondary Focus of attention Tertiary Focus of attention
01:10
01:10
[EXAMPLE]
P1
P2
Tabletop
P1
Book
Tabletop
None
None
Interaction patterns
Win
dow
Nurse A
Patient
Desk
Computer
Patient
Win
dow
Nurse A
Nurse B
Consultant
ComputerDesks
ConsultantPatient
Win
dow
Examination bed
Critical Incident Analysis
The critical incident technique (CIT)
• Original article by John Flanagan* in 1954
• Fairly robust and sound qualitative method
• “Consists of a set of procedures for collecting direct
observations of human behaviour in such a way as to
facilitate their potential usefulness in solving practical
problems and developing broad psychological
principles…”
• Outlines procedures for collecting observed incidents
having special significance
* Flanagan, John C. (1954) The Critical Incident Technique.
Psychological Bulletin 51 (4): 327-359
Examples of use
• In HCI: the focus of the incident is often on events where
something either goes unexpectedly well, or badly – can be
used to inform the design of further software iterations
• In education: technique has been adapted to uncover
breakthroughs and breakdowns in teaching and learning
activities (which can later be probed through retrospective
interviews with the participants)
• However, the meaning of the terms “breakthrough” and
“breakdown” are contextually bound
Example of a breakthrough
BREAKTHROUGH
Describe incident
and its level of
importance for
learning
(1 low – 5 high)
Relevant
conditions prior to
incident
Relevant
conditions after
the incident
Role of
technology
Role of
collaborators
KEY issue
identified
5 ‘In Here’ students
discussing map
and position of
fault line with
‘Out There’
students
Map was found to
be incorrectly
drawn
Synchronous
communication
carried out
through phone;
internet access
enabled access to
maps; digital
camera and video
camera enabled
capturing of field
data to send back
to ‘In Here’ team
Students “In Here”
were able to use
additional
resources to feed
information to
those students “Out
There”
“Official”
geological map
used by the
students had been
incorrectly drawn
Breakthroughs are observable critical incidents which appear to be initiating
productive new forms of learning or important conceptual change
Example of a breakdown
A breakdown is an observable critical incident where a learner is struggling with the
technology, is asking for help, or appears to be labouring under a clear misunderstanding
BREAKDOWN
Describe incident
and its level of
importance for
learning
(1 low – 5 high)
Relevant
conditions prior to
incident
Relevant conditions
after the incident
Role of technology Role of collaborators KEY issue identified
3 “Out There”
students had
requested further
information about a
particular rock type
from “In Here”
students
“Out There”
students made field
sketches and
annotations of layers
of rock found at the
field site
Temporary problems
with Internet
connectivity meant “In
Here” students could
not get online and so
had to resort to using
reference books instead
– this took longer and
some information was
not available that would
have been expected to
have been found online.
Technical support
was provided to re-
enable Internet
connectivity but this
took some 20 minutes
to restore, so that
students “Out There”
only had some data
made available to
them until this time
That many resources
were only available
online – maybe
some of these should
be locally cached (if
possible) in case of
future similar
episodes, or printed
off.
Next steps
• Look at breakthroughs and breakdowns
• Start to categorise into themes to provide an overview of the
critical incidents that occurred
• Can also define these incidents as explicit (e.g. if analysing
e.g. video diaries/data being directly captured/recorded by
the participants themselves) or implicit (e.g. incidents arising
from the natural interactions of the students with the
technology and each other)
• Can triangulate with other methods of data analysis to get a
more detailed picture of events
Tools and tutorials for video analysis
• Atlas.ti (see https://www.youtube.com/user/ATLASti01 and
http://tinyurl.com/atlasti-video)
• Nvivo (see “Coding Audio and Video in Nvivo”:
http://tinyurl.com/nvivo-video)
• Transana: http://www.transana.org/
• Diver: http://diver.stanford.edu/
Discussion / Q&A
• Any questions, comments, thoughts?
Further reading
• Flanagan, John C. (1954) The Critical Incident Technique. Psychological Bulletin 51
(4) pp. 327-359
• Anastopoulou, S., Sharples, M., Wright, M., Martin, H., Ainsworth, S., Benford, S.,
Crook, C., Greenhalgh, C. and C. O’Malley (2008) Learning 21st Century Science in
Context with Mobile Technologies. Proceedings of the mLearn 2008 Conference:
The bridge from text to context, University of Wolverhampton, pp. 12-19.
• Carroll, J. M., Koenemann-Belliveau, J., Rosson, M. B. and M. K. Singley (1993)
Critical incidents and critical themes in empirical usability evaluation. Proceedings
of People and Computers VIII, Cambridge, UK: Cambridge University Press, pp.
279-292
• Gaver, B., Dunne, T., & Pacenti, E. (1999). Design: Cultural probes. Interactions,
6(1), 21-29.
• Henwood, K. L. and Pidgeon, N. F. (1992), Qualitative research and psychological
theorizing. British Journal of Psychology, 83: 97–111. doi: 10.1111/j.2044-
8295.1992.tb02426.x

More Related Content

What's hot

Forensic Audio and Video Analysis
Forensic Audio and Video AnalysisForensic Audio and Video Analysis
Forensic Audio and Video Analysis
Joulyn Kenny
 
Interactive Recommender Systems with Netflix and Spotify
Interactive Recommender Systems with Netflix and SpotifyInteractive Recommender Systems with Netflix and Spotify
Interactive Recommender Systems with Netflix and Spotify
Chris Johnson
 

What's hot (20)

Computer Forensics
Computer ForensicsComputer Forensics
Computer Forensics
 
Forensic imaging
Forensic imagingForensic imaging
Forensic imaging
 
Survey design report
Survey design reportSurvey design report
Survey design report
 
Crafting Recommenders: the Shallow and the Deep of it!
Crafting Recommenders: the Shallow and the Deep of it! Crafting Recommenders: the Shallow and the Deep of it!
Crafting Recommenders: the Shallow and the Deep of it!
 
Results on video summarization
Results on video summarizationResults on video summarization
Results on video summarization
 
Weakly Supervised Learning for Fake News Detection on Twitter
Weakly Supervised Learning for Fake News Detection on TwitterWeakly Supervised Learning for Fake News Detection on Twitter
Weakly Supervised Learning for Fake News Detection on Twitter
 
Vision and Language: Past, Present and Future
Vision and Language: Past, Present and FutureVision and Language: Past, Present and Future
Vision and Language: Past, Present and Future
 
ISPAC2013 plenary talk - Environmental Forensics and PAHs
ISPAC2013 plenary talk - Environmental Forensics and PAHsISPAC2013 plenary talk - Environmental Forensics and PAHs
ISPAC2013 plenary talk - Environmental Forensics and PAHs
 
Data Hiding Techniques
Data Hiding TechniquesData Hiding Techniques
Data Hiding Techniques
 
Chapter 10 designing and producing Multimedia
Chapter 10 designing and producing MultimediaChapter 10 designing and producing Multimedia
Chapter 10 designing and producing Multimedia
 
Forensic Audio and Video Analysis
Forensic Audio and Video AnalysisForensic Audio and Video Analysis
Forensic Audio and Video Analysis
 
AI workshop slides
AI workshop slidesAI workshop slides
AI workshop slides
 
Computer Vision image classification
Computer Vision image classificationComputer Vision image classification
Computer Vision image classification
 
Object Detection with Tensorflow
Object Detection with TensorflowObject Detection with Tensorflow
Object Detection with Tensorflow
 
Monetization of Algorithms
Monetization of AlgorithmsMonetization of Algorithms
Monetization of Algorithms
 
Interactive Recommender Systems with Netflix and Spotify
Interactive Recommender Systems with Netflix and SpotifyInteractive Recommender Systems with Netflix and Spotify
Interactive Recommender Systems with Netflix and Spotify
 
Real-Time Recommendations with Hopsworks and OpenSearch - MLOps World 2022
Real-Time Recommendations  with Hopsworks and OpenSearch - MLOps World 2022Real-Time Recommendations  with Hopsworks and OpenSearch - MLOps World 2022
Real-Time Recommendations with Hopsworks and OpenSearch - MLOps World 2022
 
Introduction to object detection
Introduction to object detectionIntroduction to object detection
Introduction to object detection
 
Real Time Object Dectection using machine learning
Real Time Object Dectection using machine learningReal Time Object Dectection using machine learning
Real Time Object Dectection using machine learning
 
Real World Predictive Policing: Manchester, NH Police Department
Real World Predictive Policing: Manchester, NH Police DepartmentReal World Predictive Policing: Manchester, NH Police Department
Real World Predictive Policing: Manchester, NH Police Department
 

Similar to Video analysis techniques

H E D C Research Seminar Presentation
H E D C  Research  Seminar  PresentationH E D C  Research  Seminar  Presentation
H E D C Research Seminar Presentation
University of Otago
 
Social Web: (Big) Data Mining | summer 2014/2015 course syllabus
Social Web: (Big) Data Mining | summer 2014/2015 course syllabusSocial Web: (Big) Data Mining | summer 2014/2015 course syllabus
Social Web: (Big) Data Mining | summer 2014/2015 course syllabus
Jakub Ruzicka
 
evaluation technique uni 2
evaluation technique uni 2evaluation technique uni 2
evaluation technique uni 2
vrgokila
 
MW2014 - Gallery One, The First Year: Sustainability, Evaluation Process,
MW2014  - Gallery One, The First Year: Sustainability, Evaluation Process, MW2014  - Gallery One, The First Year: Sustainability, Evaluation Process,
MW2014 - Gallery One, The First Year: Sustainability, Evaluation Process,
Jane Alexander
 
Cloud computing higdon_scott_conway
Cloud computing higdon_scott_conwayCloud computing higdon_scott_conway
Cloud computing higdon_scott_conway
Prerna Agarwal
 
Glit6757 producersofresearch sem1
Glit6757 producersofresearch sem1Glit6757 producersofresearch sem1
Glit6757 producersofresearch sem1
Michele Knobel
 
Accessibility and Inclusion
Accessibility and InclusionAccessibility and Inclusion
Accessibility and Inclusion
Chris Barber
 
Break out: Project Communication and Dissemination - Fabian Di Fiore
Break out: Project Communication and Dissemination - Fabian Di FioreBreak out: Project Communication and Dissemination - Fabian Di Fiore
Break out: Project Communication and Dissemination - Fabian Di Fiore
imec.archive
 

Similar to Video analysis techniques (20)

Video research in education
Video research in educationVideo research in education
Video research in education
 
Ou video analysis workshopfin3
Ou video analysis workshopfin3Ou video analysis workshopfin3
Ou video analysis workshopfin3
 
H E D C Research Seminar Presentation
H E D C  Research  Seminar  PresentationH E D C  Research  Seminar  Presentation
H E D C Research Seminar Presentation
 
Rapid eLearning
Rapid eLearning Rapid eLearning
Rapid eLearning
 
Social Web: (Big) Data Mining | summer 2014/2015 course syllabus
Social Web: (Big) Data Mining | summer 2014/2015 course syllabusSocial Web: (Big) Data Mining | summer 2014/2015 course syllabus
Social Web: (Big) Data Mining | summer 2014/2015 course syllabus
 
evaluation technique uni 2
evaluation technique uni 2evaluation technique uni 2
evaluation technique uni 2
 
Ein incl171212
Ein incl171212Ein incl171212
Ein incl171212
 
Teaching strategies for digital literacy
Teaching strategies for digital literacyTeaching strategies for digital literacy
Teaching strategies for digital literacy
 
Video + Language: Where Does Domain Knowledge Fit in?
Video + Language: Where Does Domain Knowledge Fit in?Video + Language: Where Does Domain Knowledge Fit in?
Video + Language: Where Does Domain Knowledge Fit in?
 
Video + Language: Where Does Domain Knowledge Fit in?
Video + Language: Where Does Domain Knowledge Fit in?Video + Language: Where Does Domain Knowledge Fit in?
Video + Language: Where Does Domain Knowledge Fit in?
 
MW2014 - Gallery One, The First Year: Sustainability, Evaluation Process,
MW2014  - Gallery One, The First Year: Sustainability, Evaluation Process, MW2014  - Gallery One, The First Year: Sustainability, Evaluation Process,
MW2014 - Gallery One, The First Year: Sustainability, Evaluation Process,
 
Fælles præsentation-tema 3-thomas-ryborg-max-eckardt
Fælles præsentation-tema 3-thomas-ryborg-max-eckardtFælles præsentation-tema 3-thomas-ryborg-max-eckardt
Fælles præsentation-tema 3-thomas-ryborg-max-eckardt
 
Organizing and Securing Ethnographic Field Materials.pptx
Organizing and Securing Ethnographic Field Materials.pptxOrganizing and Securing Ethnographic Field Materials.pptx
Organizing and Securing Ethnographic Field Materials.pptx
 
Video Hyperlinking Tutorial (Part B)
Video Hyperlinking Tutorial (Part B)Video Hyperlinking Tutorial (Part B)
Video Hyperlinking Tutorial (Part B)
 
Creating a developer pipeline by teaching gateway technologies
Creating a developer pipeline by teaching gateway technologiesCreating a developer pipeline by teaching gateway technologies
Creating a developer pipeline by teaching gateway technologies
 
Cloud computing higdon_scott_conway
Cloud computing higdon_scott_conwayCloud computing higdon_scott_conway
Cloud computing higdon_scott_conway
 
Glit6757 producersofresearch sem1
Glit6757 producersofresearch sem1Glit6757 producersofresearch sem1
Glit6757 producersofresearch sem1
 
Accessibility and Inclusion
Accessibility and InclusionAccessibility and Inclusion
Accessibility and Inclusion
 
MindTrek2011 - ContextCapture: Context-based Awareness Cues in Status Updates
MindTrek2011 - ContextCapture: Context-based Awareness Cues in Status UpdatesMindTrek2011 - ContextCapture: Context-based Awareness Cues in Status Updates
MindTrek2011 - ContextCapture: Context-based Awareness Cues in Status Updates
 
Break out: Project Communication and Dissemination - Fabian Di Fiore
Break out: Project Communication and Dissemination - Fabian Di FioreBreak out: Project Communication and Dissemination - Fabian Di Fiore
Break out: Project Communication and Dissemination - Fabian Di Fiore
 

More from Liz FitzGerald

Lies, damned lies and statistics: an evaluation of learning styles in AEH
Lies, damned lies and statistics: an evaluation of learning styles in AEHLies, damned lies and statistics: an evaluation of learning styles in AEH
Lies, damned lies and statistics: an evaluation of learning styles in AEH
Liz FitzGerald
 
Geological Society Higher Education Network (HEN 2012) meeting - 18 Jan 2012 ...
Geological Society Higher Education Network (HEN 2012) meeting - 18 Jan 2012 ...Geological Society Higher Education Network (HEN 2012) meeting - 18 Jan 2012 ...
Geological Society Higher Education Network (HEN 2012) meeting - 18 Jan 2012 ...
Liz FitzGerald
 

More from Liz FitzGerald (20)

Impact of the OpenLearn Create course ‘Support Through Court: Domestic Abuse’
Impact of the OpenLearn Create course ‘Support Through Court: Domestic Abuse’Impact of the OpenLearn Create course ‘Support Through Court: Domestic Abuse’
Impact of the OpenLearn Create course ‘Support Through Court: Domestic Abuse’
 
Keynote speech: The promises and pitfalls of personalised eLearning
Keynote speech: The promises and pitfalls of personalised eLearningKeynote speech: The promises and pitfalls of personalised eLearning
Keynote speech: The promises and pitfalls of personalised eLearning
 
Dimensions of personalisation in TEL: a framework and implications for design
Dimensions of personalisation in TEL: a framework and implications for designDimensions of personalisation in TEL: a framework and implications for design
Dimensions of personalisation in TEL: a framework and implications for design
 
Introduction to quantitative and qualitative research
Introduction to quantitative and qualitative researchIntroduction to quantitative and qualitative research
Introduction to quantitative and qualitative research
 
Situ8 overview
Situ8 overviewSitu8 overview
Situ8 overview
 
Situ8: browsing and capturing geolocated user-created content
Situ8: browsing and capturing geolocated user-created contentSitu8: browsing and capturing geolocated user-created content
Situ8: browsing and capturing geolocated user-created content
 
Catwalk technologies and researching in the wild
Catwalk technologies and researching in the wildCatwalk technologies and researching in the wild
Catwalk technologies and researching in the wild
 
Learning in the wild: designing for location-based experiences
Learning in the wild: designing for location-based experiencesLearning in the wild: designing for location-based experiences
Learning in the wild: designing for location-based experiences
 
Using augmented reality and mobile learning: opportunities and challenges
Using augmented reality and mobile learning: opportunities and challengesUsing augmented reality and mobile learning: opportunities and challenges
Using augmented reality and mobile learning: opportunities and challenges
 
Augmented reality and mobile learning: the state of the art
Augmented reality and mobile learning: the state of the artAugmented reality and mobile learning: the state of the art
Augmented reality and mobile learning: the state of the art
 
Assessing informal learning: a case study using historical audio guides
Assessing informal learning: a case study using historical audio guidesAssessing informal learning: a case study using historical audio guides
Assessing informal learning: a case study using historical audio guides
 
Lies, damned lies and statistics: an evaluation of learning styles in AEH
Lies, damned lies and statistics: an evaluation of learning styles in AEHLies, damned lies and statistics: an evaluation of learning styles in AEH
Lies, damned lies and statistics: an evaluation of learning styles in AEH
 
The OU's Digital Humanities seminar series: the Pelagios project
The OU's Digital Humanities seminar series: the Pelagios projectThe OU's Digital Humanities seminar series: the Pelagios project
The OU's Digital Humanities seminar series: the Pelagios project
 
Geolocated audio tours
Geolocated audio toursGeolocated audio tours
Geolocated audio tours
 
Augmented reality for mobile learning
Augmented reality for mobile learningAugmented reality for mobile learning
Augmented reality for mobile learning
 
Educational concepts: learning styles
Educational concepts: learning stylesEducational concepts: learning styles
Educational concepts: learning styles
 
Geological Society Higher Education Network (HEN 2012) meeting - 18 Jan 2012 ...
Geological Society Higher Education Network (HEN 2012) meeting - 18 Jan 2012 ...Geological Society Higher Education Network (HEN 2012) meeting - 18 Jan 2012 ...
Geological Society Higher Education Network (HEN 2012) meeting - 18 Jan 2012 ...
 
IET Technology Coffee Morning - Location-based learning: education in the Wild
IET Technology Coffee Morning - Location-based learning: education in the WildIET Technology Coffee Morning - Location-based learning: education in the Wild
IET Technology Coffee Morning - Location-based learning: education in the Wild
 
Creating location-based mobile learning experiences
Creating location-based mobile learning experiencesCreating location-based mobile learning experiences
Creating location-based mobile learning experiences
 
Hidden Histories: a Towards Pervasive Media feasibility study
Hidden Histories: a Towards Pervasive Media feasibility studyHidden Histories: a Towards Pervasive Media feasibility study
Hidden Histories: a Towards Pervasive Media feasibility study
 

Recently uploaded

The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSSpellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
AnaAcapella
 

Recently uploaded (20)

HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Basic Intentional Injuries Health Education
Basic Intentional Injuries Health EducationBasic Intentional Injuries Health Education
Basic Intentional Injuries Health Education
 
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSSpellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdfFICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
 
Simple, Complex, and Compound Sentences Exercises.pdf
Simple, Complex, and Compound Sentences Exercises.pdfSimple, Complex, and Compound Sentences Exercises.pdf
Simple, Complex, and Compound Sentences Exercises.pdf
 
latest AZ-104 Exam Questions and Answers
latest AZ-104 Exam Questions and Answerslatest AZ-104 Exam Questions and Answers
latest AZ-104 Exam Questions and Answers
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptx21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptx
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
How to Add a Tool Tip to a Field in Odoo 17
How to Add a Tool Tip to a Field in Odoo 17How to Add a Tool Tip to a Field in Odoo 17
How to Add a Tool Tip to a Field in Odoo 17
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 

Video analysis techniques

  • 1. Video analysis: from grounded to content analysis Anne Adams & Liz FitzGerald
  • 2. Our session today • Examine different techniques to analyse video • Further links: suggested tools, web links, tutorials • Discussion/Q&A
  • 3.  Video recording research inquiries  Participatory videos  Cultural probes Different types of videos “… a rich and varied set of materials that… let us ground [our designs / processes / policies] in the detailed textures of the local cultures” (Gaver et al 1999)
  • 4. Three video analysis approaches • Whole-to-part inductive (grounded analysis) • Part-to-whole inductive (content analysis) • Manifest content (Critical Incident approach)
  • 5. “Two main analysis” divide Analysis is like fishing • part-to-whole • You find the best river for the fish you want, you have one line, a specific bait for a specific type of fish. • whole-to-part • You may want to catch tuna so you fish in certain parts of the sea BUT on the whole you throw your nets out to sea and catch everything including the things you want and don’t want.
  • 7. Whole-to-part methods • Conversational analysis • Discourse analysis • Thematic analysis • Grounded theory • “Both qualitative and quantitative approaches share a common concern with theory as the goal of research” (Henwood & Pidgeon, 1992 p.101)
  • 8. Grounded analysis • Data in whatever form is broken down, conceptualised and put back together in new ways • Analysis stages: 3 levels of coding: – Open – Axial – Selective (with process effects)
  • 10. Open coding: detailed • Concepts are:- Conceptual labels placed on discrete happenings, events, and other instances of phenomena • Categories are:- where concepts are classified and grouped together under a higher order – a more abstract concept called a category. • Properties are:- characteristics pertaining to a category • Dimensions are:- Location (values) of properties along a continuum
  • 11. Open coding: analysis • “ When I want to have a personal conversation (private interaction), I encrypt the message (security measure). I think that makes the email private (Securing privacy). Stops people from listening in (Surveillance).” • Concepts are:- private interaction, security measures, securing privacy, surveillance • Categories are:- Interaction, privacy, security
  • 12. 2nd stage in-depth Take section of an important point in your data & start to code concepts!! If you want, you can also review categories
  • 13. Open coding Category Class Property Dimension Dimensional Range surveillance Being observed frequency often ........never scope more ........less intensity high.........low duration long .........short
  • 16. Part-to-whole & manifest methods • Content analysis – counting – imposing established frameworks • Critical Incident Analysis
  • 17. Iterative OR Storyline • With both inductive approaches issues of Decide continue OR Close • Continue until saturation point (only repetitive concepts, issues occurring) • Summarise analysis with high-level story-line combining abstract relationships with detailed findings.
  • 18. Attention Content & Interaction Pattern Approach • Review 10-second intervals • If multi-tasking, code for 1 second (primary, secondary, tertiary focus) • In the first table, code hardware foci (the what), second table software/function used (the why)
  • 19. Attention content analysis 1 Time Code / sequence identifier Participant identifier Primary Focus of attention Secondary Focus of attention Tertiary Focus of attention 01:10 01:10 [EXAMPLE] P1 P2 Tabletop P1 Book Tabletop None None Table 1: Hardware / People (what)
  • 20. Attention content analysis 2 Table 2: Software / Function (why) Time Code / sequence identifier Participant identifier Primary Focus of attention Secondary Focus of attention Tertiary Focus of attention 01:10 01:10 [EXAMPLE] P1 P2 Tabletop P1 Book Tabletop None None
  • 21. Interaction patterns Win dow Nurse A Patient Desk Computer Patient Win dow Nurse A Nurse B Consultant ComputerDesks ConsultantPatient Win dow Examination bed
  • 23. The critical incident technique (CIT) • Original article by John Flanagan* in 1954 • Fairly robust and sound qualitative method • “Consists of a set of procedures for collecting direct observations of human behaviour in such a way as to facilitate their potential usefulness in solving practical problems and developing broad psychological principles…” • Outlines procedures for collecting observed incidents having special significance * Flanagan, John C. (1954) The Critical Incident Technique. Psychological Bulletin 51 (4): 327-359
  • 24. Examples of use • In HCI: the focus of the incident is often on events where something either goes unexpectedly well, or badly – can be used to inform the design of further software iterations • In education: technique has been adapted to uncover breakthroughs and breakdowns in teaching and learning activities (which can later be probed through retrospective interviews with the participants) • However, the meaning of the terms “breakthrough” and “breakdown” are contextually bound
  • 25. Example of a breakthrough BREAKTHROUGH Describe incident and its level of importance for learning (1 low – 5 high) Relevant conditions prior to incident Relevant conditions after the incident Role of technology Role of collaborators KEY issue identified 5 ‘In Here’ students discussing map and position of fault line with ‘Out There’ students Map was found to be incorrectly drawn Synchronous communication carried out through phone; internet access enabled access to maps; digital camera and video camera enabled capturing of field data to send back to ‘In Here’ team Students “In Here” were able to use additional resources to feed information to those students “Out There” “Official” geological map used by the students had been incorrectly drawn Breakthroughs are observable critical incidents which appear to be initiating productive new forms of learning or important conceptual change
  • 26. Example of a breakdown A breakdown is an observable critical incident where a learner is struggling with the technology, is asking for help, or appears to be labouring under a clear misunderstanding BREAKDOWN Describe incident and its level of importance for learning (1 low – 5 high) Relevant conditions prior to incident Relevant conditions after the incident Role of technology Role of collaborators KEY issue identified 3 “Out There” students had requested further information about a particular rock type from “In Here” students “Out There” students made field sketches and annotations of layers of rock found at the field site Temporary problems with Internet connectivity meant “In Here” students could not get online and so had to resort to using reference books instead – this took longer and some information was not available that would have been expected to have been found online. Technical support was provided to re- enable Internet connectivity but this took some 20 minutes to restore, so that students “Out There” only had some data made available to them until this time That many resources were only available online – maybe some of these should be locally cached (if possible) in case of future similar episodes, or printed off.
  • 27. Next steps • Look at breakthroughs and breakdowns • Start to categorise into themes to provide an overview of the critical incidents that occurred • Can also define these incidents as explicit (e.g. if analysing e.g. video diaries/data being directly captured/recorded by the participants themselves) or implicit (e.g. incidents arising from the natural interactions of the students with the technology and each other) • Can triangulate with other methods of data analysis to get a more detailed picture of events
  • 28. Tools and tutorials for video analysis • Atlas.ti (see https://www.youtube.com/user/ATLASti01 and http://tinyurl.com/atlasti-video) • Nvivo (see “Coding Audio and Video in Nvivo”: http://tinyurl.com/nvivo-video) • Transana: http://www.transana.org/ • Diver: http://diver.stanford.edu/
  • 29. Discussion / Q&A • Any questions, comments, thoughts?
  • 30. Further reading • Flanagan, John C. (1954) The Critical Incident Technique. Psychological Bulletin 51 (4) pp. 327-359 • Anastopoulou, S., Sharples, M., Wright, M., Martin, H., Ainsworth, S., Benford, S., Crook, C., Greenhalgh, C. and C. O’Malley (2008) Learning 21st Century Science in Context with Mobile Technologies. Proceedings of the mLearn 2008 Conference: The bridge from text to context, University of Wolverhampton, pp. 12-19. • Carroll, J. M., Koenemann-Belliveau, J., Rosson, M. B. and M. K. Singley (1993) Critical incidents and critical themes in empirical usability evaluation. Proceedings of People and Computers VIII, Cambridge, UK: Cambridge University Press, pp. 279-292 • Gaver, B., Dunne, T., & Pacenti, E. (1999). Design: Cultural probes. Interactions, 6(1), 21-29. • Henwood, K. L. and Pidgeon, N. F. (1992), Qualitative research and psychological theorizing. British Journal of Psychology, 83: 97–111. doi: 10.1111/j.2044- 8295.1992.tb02426.x