CHAPTER III RESEARCH METHODOLOGY 1. Type of Research This research is a descriptive qualitative research. It is qualitative because it is more adaptable to dealing with multiple realities (Lincoln & Guba, 1985). This research is a qualitative research, because it contains of nature reality such as multiple, constructed, and holistic. It is multiple because language has a lot of differences in reality. It is constructed because reality is constructed in the context. It is also holistic because there is no single generalization and it can be studied only holistically. This research refers to qualitative research since this type of research gains more understanding of the human and social phenomenon. It is also descriptive research. Descriptive research is aimed at describing condition of a phenomenon. According to Arikuntoro (2009) this kind of research is used to obtain information concerning the current status of the phenomena to describe "what exists" with respect to variables or conditions in a situation. This research focuses on describing and understanding a phenomenon and the phenomenon described in this research is face threatening act. The aim of this research is to describe how male and female employ face threatening act encompassing type and the effect of face threatening act. The way the researcher describes the phenomenon is by generating words rather than numbers. This research also employed a case study which has generalizing power and transferability (Whyte in Yin in Santosa, 2014). In addition, case study not only descriptive, but also it used as exploratory and explanatory design (Yin in Santosa, 2014). There are several cases of face threatening act. This research is considered a small-scale research and the
researcher restricts the research to a detailed study of one case. The research will only focus on face threatening act practices on Twilight Novel which only uses one of speech acts. The research uses Pragmatics approach. According to Duffy and O Donnel (1998) research approach represents a basis for carrying out the research. The theory of face threatening act which is in the frame of Pragmatics, particularly politeness, was employed as the approach of this research. Thus, by applying Pragmatics focusing on face threatening act, the ideology of characters covering status, affect, and contact in the interaction can be revealed. This research views the problem of the research based on the uses of language in the human daily conversation. 2. Research Location Lincoln & Guba (1985) defined research location as focus determined boundary. Boundaries are set to the inquiry on the basis of the emergent focus of the research. Focus of the research establishes boundaries for a study. Research location can be in the form of geography, demography, or media (Santosa, 2014). Thus, the location of this research was in the form of media. It defines the terrain that is to be considered the proper territory of the inquiry. Research location is concerned with locating the idea of the research. The research location of this research is Twilight Novel. This novel fulfilled the primary elements of the research location, including setting, actors or participants, and events (Spradley in Santosa, 2014). The setting of this research location was Twilight Novel. The participants of this research were the characters in the novel. Finally, the events cover all happenings which occur in the novel delivered by the characters of the novel.
The researcher picks out Twilight Novel as research location with consideration that the practice of face threatening acts in this novel is interesting to be analyzed regarding that Twilight Novel is one of famous novel. In addition this novel have been filmed which is popular especially in teenagers. The study of face threatening act in Twilight Novel is quite recommended by previous research on face threatening act since it is still the most recent and most wanted novel. 3. Data and source of data Source of data can be a place, informant, event, document, or site (Patton in Santosa, 2014). The source of data in this research is document regarding that face threatening act practices produced from the interaction by research subjects that are recorded in that document. Since the source is document, the technique to collect the data from this source is by using document or content analysis. Meanwhile, data is detailed description of situations, events, people, interactions, and observed behaviors (ibid). There are 2 types of data, primary data and secondary data. Primary data refers to the data gained by the researcher directly from the research location, whereas secondary data refers to the data obtained by other researchers to support the research (Blaxter et al. in Santosa, 2014). The primary data of the research are taken from the dialogs which contain asking expression uttered by male and female characters in the Twilight novel. The conversations on the Twilight Novel are chosen as primary data because it contains main information required to answer research questions of this research. 4. Sample and Sampling Technique
In qualitative research, sample is not used to generate generalization of the population but it is used to obtain more profound understanding or information related to the field of study as well as to achieve the objectives of the research (Santosa, 2014). This research employs purposive sampling by selecting certain units or cases based on a specific purpose rather than randomly based on the research questions of this research (Tashakkori & Teddlie, 2003). The researcher takes samples which are only related to the focus of this research in order to fulfill the purpose of this research which is about face threatening act in the conversations between male and female. This research employs snow-ball sampling. The data collected one by one which in every datum, the datum will be analyzed. The datum which collected one by one until it will be sufficient data (Santosa, 2014). In this research, the researcher collects the data from the beginning of the novel by collecting conversations between male and female in the novel which contains face threatening act until the end of the novel. In order to avoid taking random samples, the researcher also applies criterion-based sampling and the criterion is constructed from the setting description, events, participants, behaviors, and interactions (Patton in Santosa, 2014) The criteria are as follows: - The conversation in asking contains face threatening act between male and female characters of the novel. - The situation of the setting when the conversation happens 5. Data Validity
In qualitative study, triangulation technique is typically applied as the data validity to check the trustworthiness of the data (Santosa, 2014). Triangulation is a method used by qualitative researchers to check and establish validity in their studies (Guion, 2002). Triangulation technique is classified into four types, the source of data triangulation technique, the researcher triangulation technique, the method triangulation technique, and theoretical triangulation technique (Paton in Santosa, 2014). To establish validity in this research, the researcher uses source of data triangulation. the researcher uses source of data triangulation. It is because the source of data triangulation applied various source of data. This research applies various sources of data, such as Twilight movie, and the review site. Any weaknesses in the data can be compensated for by the strengths of other data, thereby increasing the validity and reliability of the results. 6. Technique of Collecting Data There are four techniques of collecting data, observation, interview, giving questioner, group discussion, analysis document (Santosa, 2014). This research uses analysis data as technique of analyzing data. The data of the research are collected by doing the following steps: 1. Reading the novel for two times to give more comprehension related to the content of the novel 2. Finding the conversations in asking between male and female which contain face threatening act 3. Giving mark of the conversations in asking between male and female which contain face threatening act
4. Identifying the conversations in asking between male and female which contain face threatening act 7. Procedure of Data Analysis The method that is used in this research is content analysis. Content analysis is used to digest form, meaning, function of social behavior in a context in a large document includes coding and categorizing (Grbich in Santosa in 2014). The analysis data of this research uses qualitative and inductive. Qualitative inductive of this analysis data can be divided into four: domain analysis, taxonomy analysis, componential analysis, and cultural value analysis (Spradley in Santosa, 2014). Domain Taxonomy Componential Figure 3.1. Diagram of Analysis Data Cultural Values (Adopted from Spradley in Santosa, 2014) 7.1 Domain Analysis According to Santosa (2014), domain analysis is used to classify the data. In this research, domain analysis of the data is categorized by generic structure of narrative text, relationship between male and female characters, context, characters, focus, and type of FTAs. Table 3.1 Examples of domain analysis (text structure of narrative text, relationship between male and female characters, context, characters, focus, and type of FTAs: bald on record) Generic structure of Relationship between Context Characters Focus
narrative text participants (distance and power) Orientation - D +P Bella moved to Fork to live with her dad, Charlie. Charlie who pick Bella up in airport feel uncomfortable to speak with his daughter after long time not to see her Charlie: Bella: Charlie: I found a good car for you, really cheap What kind of car? Well, it s a truck actually, a Chevy Ori/-d+p/f/1/onr 7.2 Taxonomy Analysis Taxonomy analysis is used to reduce the data from the larger scale into the smaller one by classifying them based on the natural realization object observed (Santosa, 2014). Table 3.2 Presence of bald on record Generic Relationship Type of FTA structure of between participants Participants Bald on record narrative (distance and power) Orientation -D -P Male
Complication -D -P Male Evaluation -D -P Male
Re-orientation -D -P Male Table 3.3 Presence of positive politeness Generic Relationship Type of FTA structure of between participants Participants Positive Politeness narrative (distance and power) Orientation -D -P Male Complication -D -P Male
Evaluation -D -P Male Re-orientation -D -P Male
Table 3.4 Presence of negative politeness Generic Relationship Type of FTA structure of between participants Participants Negative Politeness narrative (distance and power) Orientation -D -P Male Complication -D -P Male
Evaluation -D -P Male Reorientation -D -P Male Table 3.5 Presence of bald off record Generic Relationship Type of FTA structure of between participants Participants Bald off record narrative (distance and power) Orientation -D -P Male
Complication -D -P Male Evaluation -D -P Male
Re-orientation -D -P Male 7.3 Componential Analysis Componential analysis is used to correlate all the aspects observed horizontally and hierarchically (Santosa, 2014). Table 3.6 Componential analysis of face threatening acts between male and female characters in Twilight novel Generic Relationship Characters Types of Face Threatening Act structure between Bald Positive Negative Bald participants on politeness politeness off (distance and record record power) Orientation -D -P Male
Complication -D -P Male Evaluation -D -P Male Reorientation -D -P Male
Total Male Total 7.4 Finding Cultural Values After analyzing domain, taxonomy, and componential analysis, the result will show the pattern of the data. The pattern of the data is interpreted by linking it with the secondary data, such as the contexts which could be the situation behind the text and the literature reviews found. This stage of finding pattern is called as finding cultural value. From this stage, the researcher tries to find out the relationship between male and female characters and the type of FTAs that the characters used.