Asee peer logo
Displaying all 3 results
Conference Session
IT-based Instructional Technologies
Collection
2008 Annual Conference & Exposition
Authors
Edward Gehringer, North Carolina State University
Tagged Divisions
Information Systems
contributed.Several assessment strategies have been suggested. • Self-assessment: Students write up summaries of their contributions to the wiki and submit them to the instructor. • Group-based assessment: Students work in groups, and rate the contributions of each group member, as well as suggesting a grade for the group as a whole. • Instructor/TA assessment: The instructor or teaching assistant assigns a grade and gives feedback without any outside assistance. Page 13.230.2 • Expert assessment: Links to the wiki pages are provided to outside experts, who assess the contributions.Proceedings of the 2008
Conference Session
IT-based Instructional Technologies
Collection
2008 Annual Conference & Exposition
Authors
Clifton Kussmaul, Muhlenberg College
Tagged Divisions
Information Systems
. Page 13.952.7 4. View the list of tickets. 5. Accept the ticket assigned to you. 6. Create a wiki page for yourself, using the link on the main course page. (WikiFormatting is a good reference.) 7. Update the ticket. 1. Ask someone to review your wiki page. 2. Explain anything in particular they should look for. 3. Assign the ticket to the next person in the list of names. 8. View the list of tickets. 9. Accept the updated ticket assigned to you. 10. Review the wiki page. 1. If you find problems, update the ticket and assign it back to the author. 2. If you don't find problems, close the ticket.Similarly, activity 2 (below) introduces students to peer review with a wiki. In some cases, it
Conference Session
Information and Network Security
Collection
2008 Annual Conference & Exposition
Authors
Richard Smith, U. of St. Thomas - St. Paul
Tagged Divisions
Information Systems
assesspossible vulnerabilities. They perform simple risk assessments in which they must balance theimpact of security measures against the potential reduction in risk. They also write security plansin which they describe the security measures that must be implemented to block specificweaknesses in a system.Each type of student work here is considered in the light of Bloom’s taxonomy for cognitivelearning objectives4. In Bloom’s taxonomy, there are six levels of cognitive learning objectives: Page 13.255.6 • 1. Knowledge • 2. Comprehension • 3. Application • 4. Analysis • 5. Synthesis • 6. EvaluationThe upper 3 are generally