top of page

DATA OVERVIEW

OVERVIEW

There are 3 data sets used in this research:

  1. Primary Qualitative & Quantitative Data – Survey responses

  2. Primary Quantitative Data – Google Trends statistics

  3. Secondary Quantitative Data – Graphs by Fritz

SOURCES

  1. Fritz. (2017, 5 15). ↓ 週間投稿数  約1年間(51週)、約半年間(27週)、5週間の移動平均、1年前の5週平均. Retrieved from VOCALOID ORIGINAL: http://vocaloid.webcrow.jp/graph-SU.gif

  2. Fritz. (2017, 5 15). 投稿比較. Retrieved from VOCALOID ORIGINAL: http://vocaloid.webcrow.jp/graph-TA.gif

  3. Fritz. (2017, 5 15). 統計グラフ集. Retrieved from VOCALOID ORIGINAL: http://vocaloid.webcrow.jp/graph.htm

  4. Fritz. (2017, 5 15). 週刊VOCALOIDとUTAUランキングと. Retrieved from VOCALOID ORIGINAL: http://vocaloid.webcrow.jp/graph-SR.gif

  5. Pham, K. (2017, 5 8). Google Trends. Retrieved from Google Trends: https://trends.google.com.au/trends/

  6. Pham, K. (2017, 4 3). Vocaloid Popularity - a Survey. Retrieved from Google Forms: https://goo.gl/forms/kt3MfKDWBPVl81Pe2

VOCALOID ORIGINAL
Google Trends
Google Forms

FILE MANAGEMENT

Folder Hierarchy

Figure 1. Folder hierarchy for U3O1 SAT

Folder Tree

Figure 2. Folder tree of U3O1 SAT

File Naming Convention

All folders and files were named using Camel Case to avoid spaces and using underscores (_) to separate between the details. Since using asterisk (*) is impossible, Google Trends files that was translated from Japanese is marked with a “J” in front of the word translated (e.g. English translation of the word “Vocaloid” would be marked as “JVocaloid”.)

SECURITY CONTROLS

The following security controls are applied to the data used for this research:

Physical security – Lock: The laptop containing data is usually stored in a locked locker at Peninsula Grammar to prevent theft or kept within arm’s reach. A portable hard drive with backup data is also kept in a separate, locked drawer at the Heather Reilly House

Software security – Password: The laptop, portable hard drive and Dropbox account containing data all requires a password each to log in, the passwords only available to the owner. This prevents outsiders from accessing data without permission even if they can obtain the hardware.

Software security – Backup: Data is backed up using 2 methods: (a) Scheduled backup in a portable hard drive which is then kept separately and (b) Automatic backup using Dropbox to avoid loss of data and work progress.

Software security – Anti-virus software: The laptop containing data is protected using MalwareByte, preventing data from being corrupted by malware.

Legal requirements: Data stored and used in this research is properly protected and credited where necessary. For the survey, it was stated and understood by participants that no sensitive data were collected and all data collected is strictly used for the purpose of the research. No primary data has been communicated in the course of the research.

Password
Lock
Backup
Anti-virus
Legal
Overview
Sources
File Management
Security Controls
Bottom
Vocaloid Mixtape - Various Artists
00:00 / 00:00
bottom of page