To analyze the qualitative data, interviews were transcribed verbatim and uploaded into NVivo (version 12) where they were subsequently analyzed by one author (EM) using conventional content analysis [52 (link)]. First, EM read each transcript several times to immerse herself in the data. Next, EM coded transcripts, created labels reflecting key ideas, and sorted the codes into higher-order categories. At this point, the author sent the coding scheme to another author (AW) who had reviewed the transcripts several times and challenged EM’s thoughts and interpretations. Following this, EM generated definitions for each category and selected exemplar quotes from the data to illustrate findings from the interviews. The penultimate coding scheme was then sent to all authors, each of whom was involved in the study design, intervention delivery, and/or data collection, to review and approve. Following this, EM revisited all raw data to ensure participants voices were accurately represented and the coding scheme was finalized. To promote rigor and trustworthiness, several steps recommended in the literature were followed [53 (link)]. The two authors who conducted the interviews (EM, KE) and one author who conducted the content analysis (EM) kept reflexivity journals and continuously (re-)examined their own perspectives and how they might influence interpretations. A critical friend (AW) challenged interpretations and sought to ensure the results represented participants’ voices and all authors critically reviewed the findings, and finally, category descriptions and exemplar quotes are available and presented herein to provide transparency.
Evaluating Yoga's Impact on Physical and Psychological Outcomes
To analyze the qualitative data, interviews were transcribed verbatim and uploaded into NVivo (version 12) where they were subsequently analyzed by one author (EM) using conventional content analysis [52 (link)]. First, EM read each transcript several times to immerse herself in the data. Next, EM coded transcripts, created labels reflecting key ideas, and sorted the codes into higher-order categories. At this point, the author sent the coding scheme to another author (AW) who had reviewed the transcripts several times and challenged EM’s thoughts and interpretations. Following this, EM generated definitions for each category and selected exemplar quotes from the data to illustrate findings from the interviews. The penultimate coding scheme was then sent to all authors, each of whom was involved in the study design, intervention delivery, and/or data collection, to review and approve. Following this, EM revisited all raw data to ensure participants voices were accurately represented and the coding scheme was finalized. To promote rigor and trustworthiness, several steps recommended in the literature were followed [53 (link)]. The two authors who conducted the interviews (EM, KE) and one author who conducted the content analysis (EM) kept reflexivity journals and continuously (re-)examined their own perspectives and how they might influence interpretations. A critical friend (AW) challenged interpretations and sought to ensure the results represented participants’ voices and all authors critically reviewed the findings, and finally, category descriptions and exemplar quotes are available and presented herein to provide transparency.
Corresponding Organization : University of the Fraser Valley
Other organizations : University of Calgary
Variable analysis
- Time points (baseline [week 0], post-intervention [week 8], follow-up [week 16])
- Physical outcomes
- Psychological outcomes
- Data were not nested based on wave or instructor
- No adjustments were made
- Higher type I error probability was set (i.e., an uncorrected significance level of 0.05)
Annotations
Based on most similar protocols
As authors may omit details in methods from publication, our AI will look for missing critical information across the 5 most similar protocols.
About PubCompare
Our mission is to provide scientists with the largest repository of trustworthy protocols and intelligent analytical tools, thereby offering them extensive information to design robust protocols aimed at minimizing the risk of failures.
We believe that the most crucial aspect is to grant scientists access to a wide range of reliable sources and new useful tools that surpass human capabilities.
However, we trust in allowing scientists to determine how to construct their own protocols based on this information, as they are the experts in their field.
Ready to get started?
Sign up for free.
Registration takes 20 seconds.
Available from any computer
No download required
Revolutionizing how scientists
search and build protocols!