- Conference Session
- IT-based Instructional Technologies
- Collection
- 2008 Annual Conference & Exposition
- Authors
-
Edward Gehringer, North Carolina State University
- Tagged Divisions
-
Information Systems
contributed.Several assessment strategies have been suggested. • Self-assessment: Students write up summaries of their contributions to the wiki and submit them to the instructor. • Group-based assessment: Students work in groups, and rate the contributions of each group member, as well as suggesting a grade for the group as a whole. • Instructor/TA assessment: The instructor or teaching assistant assigns a grade and gives feedback without any outside assistance. Page 13.230.2 • Expert assessment: Links to the wiki pages are provided to outside experts, who assess the contributions.Proceedings of the 2008
- Conference Session
- IT-based Instructional Technologies
- Collection
- 2008 Annual Conference & Exposition
- Authors
-
Clifton Kussmaul, Muhlenberg College
- Tagged Divisions
-
Information Systems
. Page 13.952.7 4. View the list of tickets. 5. Accept the ticket assigned to you. 6. Create a wiki page for yourself, using the link on the main course page. (WikiFormatting is a good reference.) 7. Update the ticket. 1. Ask someone to review your wiki page. 2. Explain anything in particular they should look for. 3. Assign the ticket to the next person in the list of names. 8. View the list of tickets. 9. Accept the updated ticket assigned to you. 10. Review the wiki page. 1. If you find problems, update the ticket and assign it back to the author. 2. If you don't find problems, close the ticket.Similarly, activity 2 (below) introduces students to peer review with a wiki. In some cases, it
- Conference Session
- Information and Network Security
- Collection
- 2008 Annual Conference & Exposition
- Authors
-
Richard Smith, U. of St. Thomas - St. Paul
- Tagged Divisions
-
Information Systems
assesspossible vulnerabilities. They perform simple risk assessments in which they must balance theimpact of security measures against the potential reduction in risk. They also write security plansin which they describe the security measures that must be implemented to block specificweaknesses in a system.Each type of student work here is considered in the light of Bloom’s taxonomy for cognitivelearning objectives4. In Bloom’s taxonomy, there are six levels of cognitive learning objectives: Page 13.255.6 • 1. Knowledge • 2. Comprehension • 3. Application • 4. Analysis • 5. Synthesis • 6. EvaluationThe upper 3 are generally