WWW.SA.I-PDF.INFO
FREE ELECTRONIC LIBRARY - Abstracts, books, theses
 
<< HOME
CONTACTS



Pages:     | 1 |   ...   | 7 | 8 || 10 | 11 |   ...   | 35 |

«The Unwritten Rules of PhD Research Gordon Rugg Marian Petre THE UNWRITTEN RULES OF PHD RESEARCH THE UNWRITTEN RULES OF PHD RESEARCH Gordon Rugg and ...»

-- [ Page 9 ] --
something can be a good way to focus your thinking. Bring copies of the discussion document to the meeting.

• Provide key publications: send copies of papers you consider to be seminal to your supervisors in advance of the meeting, particularly if you wish to discuss them. Make sure the full citation is marked on the copy. Providing papers is a courtesy you can do your supervisor, and having them on hand can facilitate discussion.

• Show up on time: if you’re late, bring sin-offerings, such as chocolate biscuits.

• Write down your objectives: know what you want to get out of the meeting, whether it’s technical, administrative or emotional. Give yourself a prioritized checklist in advance. It helps to have something interesting to discuss when you enter the meeting – if you don’t have ideas, then prepare questions.

• Check the agenda with your supervisors: find out what your supervisors want to get out of the meeting. Agree an agenda.

• Behave well: listen and consider before you speak. Be prepared to give a candid account of your progress. Ask the obvious questions – they may seem stupid to you, but they rarely are. It’s horribly easy to overlook the obvious.

Focus on ideas, not emotions. Trust your supervisor and don’t take things personally. Make counter-proposals if you don’t like what your supervisors are advising – this can help expose discrepancies in your thinking and help you understand the rationale for your supervisor’s guidance.

• Take notes.

• Book the next meeting: set a date for your next meeting before you leave.

Set a preliminary agenda.

• After the meeting, email an action-item summary: immediately after the meeting, write a list of agreed action items (both yours and your supervisor’s), with deadlines if possible, and email it to all concerned, asking for confirmation that you’ve summarized correctly. Include the date of the next meeting.

Some classic ways to undermine your relationship withyour supervisor

• Hiding (yourself, or real or imagined problems)

• Ignoring (advice you don’t understand; advice you don’t like)

• Mixing (business with pleasure or with personal issues)

• Gossiping (about your supervisor or colleagues)

• Denigrating (your supervisor, department or institution)

• Bypassing (your supervisor, by making decisions without due consultation) SUPERVISION 45

• Assuming (what something meant; what you’re entitled to do)

• Sinning (illegal or unethical acts – these are in a different league from the failings listed above) If in doubt, ask. This is particularly important in relation to assuming and sinning. Students often don’t check that they really understand something that they’re not quite sure about, and then end up with serious misunderstandings and serious problems. Similarly, students often have mistaken understandings of what is considered reasonable; for instance, is it reasonable or not to phone your supervisor at home without explicit prior agreement?

Illegal acts are usually fairly easy to identify, but unethical ones may require much more knowledge. For instance, thanking respondents by name in the acknowledgements section may be intended as a sign of genuine appreciation, but may breach their anonymity and lead to significant professional and legal problems. Commercial sensitivity is another problematic area, as is publication of draft material. If in doubt, ask...

5 Networks The first horrible incident of our acquaintance was the greatest shock I ever experienced, and it is only with reluctance that I repeat it.

Contrary to a widespread belief among the general public and among depressed second-year PhD students, you don’t complete a PhD in gloomy isolation. There are lots of people who help you, not just through your doctoral research, but also throughout your subsequent career; there are more who can help you, if you find them. This network won’t be confined to eminent academics who are noted experts. It will more usefully also include lesser mortals whom you find good for conversations, who are good readers and commentators, who may have insight into theories, literatures and methodologies with which you are less familiar, who themselves have good networks and are happy to introduce you to useful people, who understand The System and so on. Some students have good networks; others don’t. This chapter describes networks and how to create a good one for yourself.

One common misconception is that networks involve cliques of people doing morally dubious favours for each other, at the expense of more virtuous but less well-connected ordinary people. That’s only one type of network.

We’re using the term in the different sense of normal, ethical support networks and normal, ethical professional networks – people you know and can turn to for advice.

NETWORKS 47

Building a network

Networks don’t just happen; they’re something you build, whether consciously or without thinking about it. Even if you’re normally good at building networks without conscious effort, PhD networks will by definition be new to you, so it’s worth knowing about a network structure which most students find useful.





At the heart of your network, of course, are your supervisors.

A second important component of your network is your informal ‘committee’, (i.e. people who will help you to ensure that your research is of good quality). For this, you need a small set of reliable, interested academics who are willing to do some work for you, to read, to comment, to advise, to critique, to provide pointers, to introduce you to other researchers and so on. They may be specialists who can provide particular expertise, or they may be generalists who can ask incisive questions.

A third main component is your personal support network (i.e. people who give you encouragement and moral support, who help you manage your work, keep life in perspective and bring you pizza when you’re in the throes of inspiration). They may be family, or fellow students, or old friends. They may be academics in your department who are good at bringing you to your senses.

In addition, you need people who can be called on occasionally for specialist help, or whom you can visit once or twice to pick their brains. They may be leading researchers in your specialist field, or they may be technical experts who know about things like laboratory instruments, running databases and formatting documents.

Targeting Most networking is opportunistic: if you meet someone that you happen to like, or find a useful contact, then you stay in touch with them. Sometimes, however, you need to find particular kinds of help or expertise, and for that

you need a strategy. Three particularly useful starting points are:

• the writers of particularly relevant papers;

• people you saw or met at a conference who had pertinent and interesting things to say;

• people recommended by someone reliable (e.g. your supervisor, or a member of your informal committee).

Once you’ve identified some possible leads, you need to do some initial work and then make contact. The initial work consists of some homework.

There’s a reason why you’ve identified this person as someone to contact, but don’t forget to find out what else you can about the person before you

48 THE UNWRITTEN RULES OF PhD RESEARCH

make contact, since there may be other ways in which they can help you. It also makes the contact easier if you know something about the person you’re

contacting. Some things you can do are to:

• check their website;

• ask people who know them;

• check with the person’s secretary about when would be a good time to call, and whether the person is in the country.

Another useful bit of preparation is to consider what it is that you want to ask them. It’s not enough to say that you’re working in the same area as they are – they might justifiably react to this news by thinking, ‘So what?’ You need to say whether you want to clarify something about their work, or want a chance to discuss ideas, or want them to review your work. The more focused and informed the question you ask, the better the chances of things going well. Remember that anyone with enough stature to be worth approaching is probably also approached by other students. A surprising number of these students will ask vague, lazy questions which amount to, ‘Can you tell me everything I need for my literature review, to save me the effort of finding it out for myself?’ This is why we stress the need for tact and courtesy when asking someone for an overview of something over a cup of coffee – there’s a world of difference between a cup of coffee with a well-read, hard-working student and a cup of coffee with an ignorant, idle one.

Tools for networking Two of the main time-honoured tools for networking are shameless flattery and bribery. Shameless flattery usually takes the form of shameless flattery; bribery usually takes the form of coffee, chocolate biscuits and practical favours such as unearthing obscure references. (Just in case of misunderstanding, real bribery via monetary or sexual favours is unethical and illegal, and we emphatically disapprove of it.) Flattery The secret of effective flattery is that it is barefaced, precise, economical and accurate. That is, it has to flow easily and openly from the flatterer, it has to relate specifically and accurately to the flatteree, you mustn’t overdo it, and it must bear some relation to reality. One well-informed, well-placed compliment on a recent publication will do more good than ten vague generalities. It also reduces the risk of your compliment being mistaken for the opening line in a seduction attempt – attractive women researchers at conferences apparently have more than enough unwanted attention of this sort.

NETWORKS 49 Coffee Eminent people are human too, and at venues such as conferences they can be very glad of a break and a decent cup of coffee paid for by someone else. Coffee can be used in various ways. One is as the setting for unofficial advice of one sort or another – career prospects, organizational politics, the future of a research field. Another is as a chance to unwind a bit at a gruelling conference or similar occasion. Treating someone to a cup of decent coffee as a break from a long admin session can be a real act of kindness, especially if you behave with tact and consideration during the coffee (for instance, by not talking about work, if your guest wants to get away from it for a while).

Chocolate biscuits These are a surprisingly useful incentive. If you offer someone some cash to be a subject in your experiment, it might motivate them to some extent. If you offer them an upmarket chocolate biscuit and real coffee, then this is likely to motivate them considerably more, and make them more cooperative and friendly into the bargain. There is a literature on the reasons for this (it involves ‘currencies’, ‘strokes’, and ‘judgement and decision making’, if you feel inclined to follow it up, not to mention ‘cognitive dissonance’).

Not many people believe in the efficacy of chocolate biscuits, which is probably just as well, because if everyone adopted this approach then it would devalue the currency, and the shrewd researcher would need to find a different incentive (which would be a double annoyance to those researchers who happen to like upmarket chocolate biscuits).

Trading favours People are busy. Interesting people are often very busy. One way to borrow some of their precious time is to offer them an exchange – to do something of value for them which allows them to free some time for you. For example, you could offer to do some administrative work or library searching in exchange for half an hour of discussion over coffee (you still buy the coffee).

First contact – people in your institution It’s usually easier to make contact with someone local, because it’s feasible to ‘just drop by’ their office and take them to coffee. Just because they’re local, that doesn’t guarantee that they’re available or friendly; you still have to do the homework first.

First contact – cold calls ‘Cold calls’ (contacting someone who doesn’t know you) outside your own institution can be awkward both for the caller and the person being called.

50 THE UNWRITTEN RULES OF PhD RESEARCH

It’s hard to establish the basis for a conversation in a sentence or two, but you can make it easier if you prepare in advance. Cold calls can succeed if you can establish quickly that the exchange can be of mutual benefit. So think through in advance what you want, and what you have to offer in exchange.

Your best chance is to establish an immediate connection with the person you’re contacting (e.g. through an introduction by a mutual acquaintance such as your supervisor or through reference to that person’s publications).

Having made that link, you need to say who you are and what you want.

Smart researchers like students with interesting ideas, and so they generally respond well to them, especially ones who have potential as named candidates on future grant applications. But sometimes active researchers already have as much work as they can handle, so you shouldn’t assume that they’ll have time for you – or that a lack of response necessarily means a lack of interest.

Be prepared to follow up your initial contact with some substance, for example a good, one-page précis of your research, or a well-constructed conference paper reporting some of your early findings. Make sure what you send represents you well: ensure that it is clearly written, free of major and minor errors and clear it with your supervisors and other experienced readers first.

Via phone Phoning works best if you have a ‘hook’ for the person you’re calling, for example if you’ve been referred to them by someone they know, or if you’ve already emailed them and suggested that you will call. You need to establish quickly who you are and why you’re calling, and then you need to ask if this is a convenient time for, say, a five-minute conversation. Often, it won’t be – be prepared to call back at another time. Also be prepared to follow up via email or post.

Via email or post Published researchers, especially well-known ones, are inundated with requests from random research students wanting favours. Requests that run ‘Dear Professor Haagen, I am a graduate student in Budapest researching ice cream and I wonder if you could offer me any advice about a choice of research topic’ are tediously uninformative and suggest that the student, being incompetent, is not worth the bother of answering. On the other hand, concise requests that give substantive information about the student’s research and ask specific questions are far more interesting and usually attract a response, though perhaps not an immediate one. It might well take the researcher six months to find time to read your message, decide to think about it, lose it in the crush of work, and eventually find it again and reply. Maybe the researcher won’t reply but will remember a good message when you meet

at a conference and introduce yourself. Think about it from their point of view:

NETWORKS 51 if you had 50 emails about a research bid with a budget of several million pounds, and a deadline next Tuesday, would you defer answering them until you’d read every word of an email from a PhD student you’d never heard of before? If anything, it’s surprising how many positive responses you can get to a well-constructed cold call.

If the researcher does reply to your message, be sure to send a thank you message immediately. If you have a good summary of your research, or of a piece of it, then you might attach it to the follow-up message.

We have deliberately not included examples of good cold call emails, since we don’t particularly want to be lynched by eminent colleagues who receive large numbers of identically worded requests for help in the weeks following publication of this book, but some things to think about include the

following:



Pages:     | 1 |   ...   | 7 | 8 || 10 | 11 |   ...   | 35 |


Similar works:

«NEW INSTRUMENTS OF FINANCING UNDER FUTURE CROPS – THE BRAZILIAN EXPERIENCE OF A CPR SYSTEM: OPPORTUNITIES AND ISSUES FOR UKRAINE Kyiv December 2011 Authors1 This report has been produced by the Agrarian Markets Development Institute (AMDI, Ukraine) under a letter of agreement with FAO (Contract # TCP/UKR/3301 SEU-LoA/11/004) using the funds of FAO’s Technical Cooperation Programme as a technical background paper for the development of pre-harvest financing (PrHF) systems for Ukraine....»

«Cotton Textiles And The Great Divergence: Lancashire, India And Shifting Competitive Advantage, 1600-1850 Stephen Broadberry and Bishnupriya Gupta Abstract: We offer a new, quantitative perspective on the shift of competitive advantage in cotton textiles from India to Britain, centred on the interactions between the two countries. The growth of cotton textile imports into Britain from India opened up new opportunities for import substitution as the new cloths, patterns and designs became...»

«How to Make Personalized Web Browsing Simple, Secure, and Anonymous Eran Gabber, Phillip B. Gibbons, Yossi Matias, Alain Mayer Bell Laboratories, Lucent Technologies 600 Mountain Avenue, Murray Hill NJ 07974 USA feran,gibbons,matias,alaing@research.bell-labs.com Abstract. An increasing number of web-sites require users to establish an account before they can access the information stored on that site (\personalized web browsing). Typically, the user is required to provide at least a unique...»

«HANDBOOK FOR VOLUNTEERS OF THE IRISH REPUBLICAN ARMY NOTES ON GUERRILLA WARFARE CONTENTS Chapter Subject 1 Our Tradition 2 What Is Guerrilla Warfare? 3 Guerrilla Strategy 4 Tactics of Guerrillas 5 Organisation and Arms 6 With the People 7 Guerrilla Bases 8 Guerrilla Attack 9 Enemy Tactics 10 Guerrilla Defence 11 General Techniques 12 Battle Notes A Handbook for Volunteers of the Irish Republican Army, issued by General Headquarters, 1956. CHAPTER 1-OUR TRADITION No nation has a greater...»

«CHAPTER Testing Techniques W hat does a tester do? In the first two chapters, our answer has been sage and learned, we hope, but also rather abstract. It’s time to get more specific. Where do tests come from? What do tests look like? This chapter is about testing techniques, but we won’t define every technique in detail. For that, you’ll have to go to the main textbooks on testing. We suggest Kaner, Falk, and Nguyen (1993), Jorgensen (1995), Beizer (1990), Marick (1995), Collard...»

«Plenipotentiary Conference PP-14 Busan, Korea (Rep. of), 20 October 7 November 2014 List of present participants 7 November 2014 1) Member States 2) Resolution 99 (Rev. Guadalajara, 2010) 3) United Nations and its Specialized Agencies Observers (Annex 2 to Resolution 145 (Antalya, 2006)) 4) Intergovernmental Organizations Operating Satellite Systems Observers (Annex 2 to Resolution 145 (Antalya, 2006)) 5) Regional Telecommunication Organizations Observers (Annex 2 to Resolution 145 (Antalya,...»

«FACTORY ACCEPTANCE TESTING INTRODUCTION FAT refers to a Factory Acceptance Test. This is a way to ensure that equipment/systems being purchased meet the agreed upon design specifications. Ideally this happens before arriving at the customer’s plant, however, for complex systems with high integration, tests may need to be performed at the customer’s location. Factory Acceptance Tests allow any issues to be corrected either at the vendor’s location or before production – leveraging the...»

«. Strength-Based Communication Techniques for Relationship Formation & Successful Outcomes Charlie Appelstein, M.S.W. charlieap@comcast.net www.charliea.com Facebook.com/charlietraining Gus on Pejorative Labeling “Look, I know some of us can be quite difficult. I was a hellion my first six months, considered quite obnoxious. But it was simply defensive posturing. (Can you say defense mechanism?) Kids aren’t bad. They’re just screwed up. The kid who’s pushing you away the most is...»

«JANUARY 2017 ARCHITECTURE GUIDELINES AND BEST PRACTICES FOR DEPLOYMENTS OF SAP HANA ON VMWARE VSPHERE ARCHITECTURE AND TECHNICAL CONSIDERATIONS GUIDE ARCHITECTURE GUIDELINES AND BEST PRACTICES FOR DEPLOYMENTS OF SAP HANA ON VMWARE VSPHERE Table of Contents Overview................................................................. 9 Document change log............................................»

«JALA International Technical Reports Vol. 5, No. 2, January 1995 Revised December 1999 Printed in USA A Brief Introduction to the Future1 By JACK M. NILLES INTRODUCTION This is an overview of some techniques and rules for estimating the future course of events and assessing the impact of those events on your future and that of your organization over periods of a few years to a decade or three. Although many of the methods used in this review are quantitative, it is extremely important to...»

«Group Recommender Systems: Combining individual models Judith Masthoff Abstract This chapter shows how a system can recommend to a group of users by aggregating information from individual user models and modelling the users affective state. It summarizes results from previous research in this area. It also shows how group recommendation techniques can be applied when recommending to individuals, in particular for solving the cold-start problem and dealing with multiple criteria. 1 Introduction...»

«EKONOMICKÉ ROZHĽADY/ECONOMIC REVIEW VOLUME, ROČNÍK 39./2010 Ján Rudy Jana Fratričová CHANGES IN JAPANESE HUMAN RESOURCE MANAGEMENT SYSTEM PART I: CHANGES IN THE POST-WAR ERA Abstract: Lifetime employment, seniority system, Ringi system of decision making, and company trade unions are considered the typical characteristics or features of the traditional Japanese approach to management. In reality, majority of these features are related to human resource management practice in Japan. The...»





 
<<  HOME   |    CONTACTS
2017 www.sa.i-pdf.info - Abstracts, books, theses

Materials of this site are available for review, all rights belong to their respective owners.
If you do not agree with the fact that your material is placed on this site, please, email us, we will within 1-2 business days delete him.