Approved Software | Initial Discovery | Researcher Handbook | IT Services for Researchers (2024)

  • TTU
  • IT Services for Researchers
  • Researcher Handbook
  • Initial Discovery

TTU IT provides resources to support researchers throughout the life of their human and non-human research projects.

Approved Software Tools by Category

Category of Human Subject Research Tools Name of Resource/ Technology Details Recommended Use
Data Management Tools

Research Data Management System

About Data Management

Texas Tech University Dataverse

Supported by University Libraries

Data Preservation and Management Over Time
Data Storage

OneDrive for Business

Supported by IT Help Central

Secure Data Storage

SharePoint Online

Supported by IT Help Central, Technology Support Services

Secure Data Storage
High Performance Computing (Very Large Data Processing)

HPCC Various Tools

HPCC Resources & Services

Supported by High Performance Computing

Research – Large Data Processing and Modeling
Quantitative Analysis

R

Running R Jobs on HPCC Resources

Supported by High Performance Computing

Statistical Analysis, Free for all Faculty, Staff, and Students

SAS

Request SAS Software

Supported by Technology Support Services

Statistical analysis, $120 per year

SPSS

Request SPSS Software

Supported by Technology Support Services

Statistical analysis, $170 per year; Students Free
Surveying Tools

Qualtrics

Not centrally supported

Surveying and Analysis for non-confidential data collection; Department/Researcher funds

RedCap

Request Access to RedCap

Supported by Technology Support Services

Additional Support by Project RedCap

Surveying and analysis, Free for Faculty, Staff, and Students

SurveyMonkey

Request Access to SurveyMonkey

Supported by Technology Support Services, Technology Support Enterprise Systems

Surveying and analysis, Free for Faculty, Staff, and Students

Microsoft Forms

Supported by IT Help Central

Surveying, part of Office 365 application set, Free for all Faculty, Students, and Staff
Video and Audio Collaboration – Virtual Interviews

Microsoft Teams

Supported by IT Help Central

Synchronous Activities Automated Transcription; Break-out Rooms; Free for all Faculty, Students, and Staff

Zoom

Supported by Technology Support Services

Synchronous Activities internal and external partners; Free for all Faculty, Students, and Staff

Zoom: Break-Out rooms

Supported by Technology Support Services

Synchronous Activity – Groups; Free for all Faculty, Students, and Staff

Mediasite

Supported by Technology Support Services

Video Content Delivery; Recording Studio; Free for all Faculty, Students, and Staff

Microsoft Skype: Recordings

Skype for Business Recording Instructions

Supported by IT Help Central

Synchronous Activities; Free for all Faculty, Students, and Staff

Video Transcription and Captioning Contracted Services

Vendor Contract Number Funding Source for Research Pricing Notes

3Play Media

77 N Washington St, 2nd Floor
Boston, MA 02114
617-764-5189
617-229-6297

C17651 Researcher
  • 4-calendar day turnaround = $1.75/min
  • 10-calendar day turnaround = $1.60/min

Site Licensed Software

Additional software is available as part of TTU site license agreements. Visit Technology Support Site License Software for more information.

Open Source Software

Securing Open Source Software Act (2022)

The United States Securing Open Source Software Act: What You Need to Know

The Act begins by defining terms we in the open source ecosystem may find interest in reviewing:

  • Open Source Software means "software for which the human-readable source code is made available to the public for use, study, re-use, modification, enhancement, and re-distribution."
  • Open Source Software Community means "the community of individuals, foundations, nonprofit organizations, corporations, and other entities that:
    • develop, contribute to, maintain, and publish open source software; or
    • otherwise work to ensure the security of the open source software ecosystem."
  • Open Source Software Component means "an individual repository of open source software that is made available to the public."

Open Source Software Challenges

Forbes, 2022

  • Lack Of Accountable Parties: Open-source projects are often delivered for free and with no expectations on either end of the transaction. That means if there's a security flaw in the project, no one can be held accountable for that flaw. You can't exactly sue someone for a defect in a digital product that they gave away for free.
  • Inexperienced Developers: Oftentimes, open-source projects are created by inexperienced developers who are looking for ways to gain industry experience before picking up a full-time job. This isn't always the case, but inexperienced developers do often lead to less secure projects.
  • Busy Developers: Other times, open-source projects are side projects or hobbies of people who are committed to full-time work somewhere else. If there is a problem with the code, they may not be able to address it for weeks, or even months.
  • Total Transparency: The transparency of open-source projects is a massive strength, but it can also be a weakness. When a bug is discovered, the entire community knows about it. If there is a massive security vulnerability, cybercriminals will learn how to exploit it quickly.

Guidelines (Forbes, 2022; CERN, 2022)

How To Use Open-Source Software Without Security Issues

  1. Choose the right projects. First, make sure you're choosing the right projects. Not all open-source projects are worth using; some are the product of more experienced, more responsible developers. Analyze the quality of the product and get to know the people who created it. And if there are multiple software options, compare them directly to figure out which one is superior.
  2. Analyze the risks and compensate for them. Every open-source project is going to come with some risks. Be sure to analyze those risks and find a way to compensate for them on your end.
  3. Tap into the power of the community. The open-source community is a huge strength, so take advantage of it. Ask lots of questions, work with experienced community programmers and contribute your own knowledge when you can.
  4. Track your dependencies. Keep meticulous track of all open-source dependencies in your software environment; these will be vital to address in the event of a newly identify security risk.
  5. Keep watch for patches, updates, and warnings. Stay plugged into the community to learn about new bugs, new patches, new updates and posted warnings. The sooner you act in response to these new threats, the better.

Virtual Interviews and Recordings

A note on human research virtual interviews and recordings:

While virtual interviews can be an efficient and secure way to collect human subjects' data, researchers must practice safe computing:

Additional Information

Most software requires acceptance of an End User License Agreement (EULA) at the time of installation. Per Operating Policy and Procedure 72.09(2.b) and Regents' Rules Chapter 07.12, employees and students, as well as departments and units, do not have authority to sign a EULA or any agreement on behalf of Texas Tech. Software license procurements and all related contract documents are reviewed by the TTU Office of the CIO, Procurement Services, and the Office of General Counsel and are approved and signed through the Office of Procurement Services.

Licensing Caution

Many "Personal," "Free," "Consumer," and "Trial" type of software packages forbid installation on organization-owned systems, including on systems owned by Texas Tech, without legitimately acquired and approved software license(s). In some cases, software packages are licensed at the Texas Tech University System level (i.e., Oracle, Ellucian) for software shared among Texas Tech System component institutions; other software packages are licensed at the institutional (TTU) level (i.e., Office 365, Blackboard, Adobe), and some software packages may be licensed by a department for a few systems or users.

TTU has been contacted in the last few years by several software vendors requesting an audit of appropriate use and licensing of their software on Texas Tech systems. Any software package, installed on a Texas Tech owned device, that is not properly licensed through the System, University, or your department is a violation of copyright laws and TTU policies, and must be removed immediately. Additionally, we ask that you review software installed on institutionally owned systems in your area/department and ensure that all software is properly licensed.

For questions regarding software licensed for campus use, please contact TTU IT Technology Support Licensing. For additional information, you may also contact IT Help Central at (806) 742-4357 (HELP) or ithelpcentral@ttu.edu. If you have questions about the procurement and contract process, please contact TTU Contracting.

  • Address

    Texas Tech University, 2500 Broadway, Lubbock, TX 79409
  • Phone

    806.742.2011
  • Email

    webmaster@ttu.edu

© 2024 Texas Tech University Oct 25, 20233:02 PM

Approved Software | Initial Discovery | Researcher Handbook | IT Services for Researchers (2024)

FAQs

How many participants are needed for a case study? ›

In case study research, the case number is often less than 12 and may even be a single case. 4 The eight participants of my study were female clinical laboratory scientists who held the position of a higher education administrator and resided in the Midwest region of the United States.

Can a case study be quantitative? ›

Case studies are commonly used in social, educational, clinical, and business research. A case study research design usually involves qualitative methods, but quantitative methods are sometimes also used.

What is a case study pdf? ›

A case study is a methodological research approach used to generate an in-depth understanding of a contemporary issue or phenomenon in a bounded system. A case study is one of the most widely used and accepted means of qualitative research methods in the social sciences.

What is an example of a case study in research? ›

Some famous examples of case studies are John Martin Marlow's case study on Phineas Gage (the man who had a railway spike through his head) and Sigmund Freud's case studies, Little Hans and The Rat Man. Case studies are widely used in psychology to provide insight into unusual conditions.

Is 20 participants enough for qualitative research? ›

The standard in qualitative research is that it takes 12-13 responses to reach saturation -- meaning whether you survey 13 or 130 people, the number of insights/themes you get is the same. There are folks who debate the exact number of participants, but most in the scientific community agree it's below 20.

Is 30 respondents enough for a survey? ›

While 30 is a good starting point for sample size, it is important to note that the optimal sample size will vary depending on the specific statistical test being used, the desired level of confidence, and the amount of variability in the population.

What does a case study paper look like? ›

Generally, a case study is either formatted as an essay or a report. If it is the latter, your assignment is often divided into sections with headings and subheadings to ensure easy access to key points of interest.

What are the four types of case studies? ›

There are several types of case studies, including explanatory, exploratory, intrinsic, collective, and instrumental case studies. Each type serves a different purpose and focuses on different aspects of the research question.

Can a master's thesis be a case study? ›

Can a case study be a thesis? Yes, in fact a case study is a very good option in your dissertation. There are multiple ways to implement a case study in your thesis.

What makes a good case study? ›

Case study writing is all about making impressive claims about how a product helped someone achieve a certain result. However, it also needs to explain how it happened. Good case studies include key details that show how the customer got from A to B using the product—something you don't get with customer reviews.

What is the difference between a case study and a research paper? ›

What is the difference between a research paper and a case study? A research paper is an essay that explains the issues examined, objectives, methodology and findings of a research. A case study is a research method where you pick an individual entity or phenomenon and study it exhaustively (in depth).

What is a good sample size for a case study? ›

A good maximum sample size is usually around 10% of the population, as long as this does not exceed 1000. For example, in a population of 5000, 10% would be 500. In a population of 200,000, 10% would be 20,000.

How many people should be involved in a case study? ›

Sessions work best when the group size is between 5-20 people so that everyone has an opportunity to participate. You may choose to have one large whole-class discussion or break into sub-groups and have smaller discussions.

How big should a case study be? ›

Most resources tell you that a case study should be 500-1500 words. We also encourage you to have a prominent snapshot section of 100 words or less. The results and benefits section should take the bulk of the word count.

Can a case study have one participant only? ›

Case studies can use one participant, or a small group of participants. However, it is important that the participant pool remain relatively small. The participants can represent a diverse cross section of society, but this isn't necessary.

References

Top Articles
Latest Posts
Article information

Author: Van Hayes

Last Updated:

Views: 5837

Rating: 4.6 / 5 (66 voted)

Reviews: 81% of readers found this page helpful

Author information

Name: Van Hayes

Birthday: 1994-06-07

Address: 2004 Kling Rapid, New Destiny, MT 64658-2367

Phone: +512425013758

Job: National Farming Director

Hobby: Reading, Polo, Genealogy, amateur radio, Scouting, Stand-up comedy, Cryptography

Introduction: My name is Van Hayes, I am a thankful, friendly, smiling, calm, powerful, fine, enthusiastic person who loves writing and wants to share my knowledge and understanding with you.