Table 10: The Form of Data Sheet for Politeness Principles Applied in the Dispreferred Second Turns by the Main Characters in the Movie
The Duchess
NO DATA CODE
DIALOGUES TYPES
OF PP EXPLANATION
1 DC01SC01INT
Ext. Gardens. Althorp – Day,
Scene 1 Georgiana :
LOUDLYYou’d better not let me
down, Charles Grey. I’ve got twenty
guineas riding on you. 1
st
Grey : Only twenty? I’d
double that if I were you.2
nd
Georgiana : Are you ready
gentlemen? Twice around the track. On
my count, three… two…one…go
Georgiana CONT’D :
Come on Grey, come on
Tact Maxim
This conversation takes place in
Georgiana’s house and occurs in
informal situation between Georgina
and Charles Grey. They have been
friend for a long time.Georgina
shows her willingness to
support Charles Grey to win the run
competition. She asks him not to
disappoint her. Because she has
twenty guineas. The dispreffered
second turn is challenge. It used
to give an opportunity to
Georgiana to get double benefits if
Grey win the run competition.
Charles grey minimize cost to
Georgiana by saying I’d double if
I were you. It means he also
makes benefit to Georgina. If he
double her bet Georgina will get
more double benefit.
Description: PP
: Politeness Principles DC
: Data Code SC
: Scene INT
: Internal EXT : External
D. Technique of the Data Analysis
After the data are being collected, selected, and also reduced, then they were analyzed. Wiersma 1995:216 writes
that soon after the data collecting step starts, at the same time, the data analysis also begins. Thus, in this study, right
after working on the raw data on the data sheets, the researcher started the
analysis. Apart from this the rest of the steps in this research are: 1.
Identifying
The goal of this step was to make a description about the data by using a preliminary framework. The categorization was an “open coding” in which the
process of identifying would keep changing so that the researcher might comprehensively identify and categorize the data based on the data sheets
provided.
2. Coding
After identifying the data, the next step was called coding. This was the most difficult step in analyzing data since the researcher had to understand the
data completely to gain descriptive details of the data by comparing the theories. In the data, there were many types of adjacency pairs which occured in one scene.
However, the researcher only kept the main types of the data showed the appropriate adjacency pairs.
3. Interpreting
After finishing the coding step, the researcher began to interpret the data findings. The analysis of the data was in the form of qualitative approach of which
the researcher counted the amount of the types of adjacency pairs and preference organization’s occurrence. Moreover, qualitative approach was used in the third
problem formulation. In this reserarch, she directly interpreted the data without counting the frequency.
4. Discussing
After the findings were discovered, the data were discussed based on the theories provided. Then, she also elaborated and explained the findings to support
the interpretation .
The explanations showed the ranks and the implication of the data in the form of conceptual story line.
This kind of discussion was done to the whole data.
5. Concluding
Finally, the researcher concluded the discussion. The researcher provided a tight close explanation while giving some additional points related to the findings.
Then, she gave suggestions to the readers and future researchers.
E. Trustworthiness of the Data
The trustworthiness data research can be achieved by conforming four criterias; they are dependability, confirmability, credibility, and transferability
Johnstone, 2000:61-62. Dependability means there is no change in final data, which means the data are fixed and the results of the investigation are stable.
Confirmability is applied to provide the neutrality of the research interpretation.
Credibility refers to the richness of the explanation provided and the analytical abilities of the researcher. It can be obtained by doing triangulation processes. The
last is transferability. This refers to the ability of the researcher to give sufficient
information about the findings in different setting and context.
To achieve those trustworthiness’ criteria, triangulation process and peer discussion were done. Triangulation is a technique for checking the
trustworthiness of data by utilizing something outside the data to verify the data or to compare them Moleong, 2001: 128. The researcher performed three types of
triangulation: source triangulation, analyst triangulation, and theory triangulation. Source triangulation was done to check whether the result would not change
although the data were changed several times. It used two types of sources, the movie and the script. Analyst triangulation was done to gain understanding by
doing peer discussion with others, known as “member checks”. The last was theory triangulation. This type of triangulation was related to the use of several
theories to avoid falsity of the result.
CHAPTER IV FINDINGS AND DISCUSSION
This chapter is divided into two sections: findings and discussion. In the first section, the researcher provides the tables of research findings. There are also
brief explanations about the findings before the discussion. In the second section, the researcher provides a deeper explanation of research findings, which contains
types of adjacency pairs, with dispreferred second turn and the politeness principles on dispreferred second turn used by the main characters in the movie
The Duchess. She also gives examples for the analysis to make the explanations clear.
A. Findings
In this section, the researcher figures out the findings based on three problem formulations in the first chapter. The first finding is related to the types
of adjacency pairs uttered by the main characters. Adjacency pairs can occur when at least two pairs of utterances appear. From the analysis of adjacency pairs’
occurrence, the researcher found sixteen types of adjacency pairs uttered by the main characters. After having peer discussion, the researcher finally got the fixed
data as shown in the table below.