1) The cognitive task model outlines the process of returning books to the library from collection to reshelving.
2) It involves 4 phases - collecting books from the counter and book drop machine, sorting books by code number and level, delivering books to the appropriate floors, and arranging books on the correct shelves.
3) The model identifies the tools, tasks, structures, rules, and knowledge required by the library assistant to successfully complete each step in the process.
Job Descriptions of Govt Librarians in PakistanAta Rehman
1) The document analyzes 212 job advertisements for government librarian positions in Pakistan over a 3-year period to understand job requirements and trends.
2) It finds inconsistencies in job titles, pay scales, and lack of clear descriptions of required qualifications, skills and responsibilities.
3) The study recommends developing standard job descriptions for government librarian positions in consultation with experts, to improve quality and uniformity of hiring practices and library services.
This document provides information about several risk management job positions, including Chief Risk Officer, Director of Enterprise Risk Management, and Director of Financial Risk Management. It includes descriptions of responsibilities, required experience, competencies, and typical reporting structure for each role. The Chief Risk Officer oversees all aspects of an organization's risk management and ensures communication of risk information to stakeholders. Directors develop risk management tools and frameworks to identify, evaluate and monitor operational and financial risks according to policies.
Contractors and engineers are mostly involved in the design and analysis of
columns, beams, and numerous other support devices for both building
structures, and non-building structures, such as bridges, stadia, tunnels, and much
more.
The document provides an orientation for new students about the school library. It introduces the librarian, Ms. Trapani, and library assistant, Ms. Butler. It outlines the library hours and rules for book checkout. The library has over 14,000 books across various subjects and genres, as well as computers, printers and other resources. Students are expected to follow 6 simple rules including no food/drink, being respectful, and returning books on time.
Civil engineering is one of the most in-demand branches of engineering. It is projected to grow 20% faster than the average occupation due to aging infrastructure requiring rebuilding and repairs. Civil engineers work in various specialties like construction, transportation, and water resources. It is also one of the fastest growing and highest paying engineering sectors, with the average salary being $79,340 annually in the US. Civil engineers gain job satisfaction from seeing projects through from start to finish and helping to build the world's infrastructure.
This job application is seeking a library assistant with a passion for books who is patient and accommodating. The successful candidate will pass an examination to qualify for distributing books to either a public or private library. As a library assistant, duties will include circulation, customer service, working the reference desk, paperwork, maintenance, and holding activities.
This document summarizes a student's computing research project on remote working tools. It outlines the student's research process, including setting the project vision to improve the Discord online meeting platform. The student defined requirements by comparing Discord to other tools and surveying users. The roles of literature review and importance of project planning are discussed. Primary and secondary research methods were used, each with merits and limitations. Research results were presented through online survey figures and analysis of advantages, disadvantages, and needed improvements to Discord.
Job Descriptions of Govt Librarians in PakistanAta Rehman
1) The document analyzes 212 job advertisements for government librarian positions in Pakistan over a 3-year period to understand job requirements and trends.
2) It finds inconsistencies in job titles, pay scales, and lack of clear descriptions of required qualifications, skills and responsibilities.
3) The study recommends developing standard job descriptions for government librarian positions in consultation with experts, to improve quality and uniformity of hiring practices and library services.
This document provides information about several risk management job positions, including Chief Risk Officer, Director of Enterprise Risk Management, and Director of Financial Risk Management. It includes descriptions of responsibilities, required experience, competencies, and typical reporting structure for each role. The Chief Risk Officer oversees all aspects of an organization's risk management and ensures communication of risk information to stakeholders. Directors develop risk management tools and frameworks to identify, evaluate and monitor operational and financial risks according to policies.
Contractors and engineers are mostly involved in the design and analysis of
columns, beams, and numerous other support devices for both building
structures, and non-building structures, such as bridges, stadia, tunnels, and much
more.
The document provides an orientation for new students about the school library. It introduces the librarian, Ms. Trapani, and library assistant, Ms. Butler. It outlines the library hours and rules for book checkout. The library has over 14,000 books across various subjects and genres, as well as computers, printers and other resources. Students are expected to follow 6 simple rules including no food/drink, being respectful, and returning books on time.
Civil engineering is one of the most in-demand branches of engineering. It is projected to grow 20% faster than the average occupation due to aging infrastructure requiring rebuilding and repairs. Civil engineers work in various specialties like construction, transportation, and water resources. It is also one of the fastest growing and highest paying engineering sectors, with the average salary being $79,340 annually in the US. Civil engineers gain job satisfaction from seeing projects through from start to finish and helping to build the world's infrastructure.
This job application is seeking a library assistant with a passion for books who is patient and accommodating. The successful candidate will pass an examination to qualify for distributing books to either a public or private library. As a library assistant, duties will include circulation, customer service, working the reference desk, paperwork, maintenance, and holding activities.
This document summarizes a student's computing research project on remote working tools. It outlines the student's research process, including setting the project vision to improve the Discord online meeting platform. The student defined requirements by comparing Discord to other tools and surveying users. The roles of literature review and importance of project planning are discussed. Primary and secondary research methods were used, each with merits and limitations. Research results were presented through online survey figures and analysis of advantages, disadvantages, and needed improvements to Discord.
This document outlines a survey to analyze the number of books read by students. It discusses collecting data from 40 students on their reading habits, including the number of books read per week, where they obtain books, and what types of books they prefer. The data will be organized and represented using pie charts, bar charts and histograms to visualize trends and compare subgroups. The survey aims to provide insight into student reading to help the university support the library and student success.
The document describes a thesis that develops a computational model to realistically reproduce the mechanisms in the human brain involved in pain handling. The model proposes designs for three main behavioral modules identified by psychologists and neuroscientists - a model-free module, model-based module, and Pavlovian module. It shows how the modules perform individually and how their integration allows the model to reproduce interaction phenomena expected in nature. Preliminary results also show how the model can explain a psychological pathology related to pain handling. The work represents the first effort in a long-term research project to create a pain processing model for developing realistic human-like robots.
The document discusses computational thinking and its four pillars: decomposition, pattern recognition, abstraction, and algorithms. It defines computational thinking as a problem-solving methodology that utilizes techniques derived from computer science. The four pillars are described as key steps in breaking down problems, identifying patterns and relevant information, and developing logical solutions. Examples are provided for how each pillar can be applied, especially for solving mathematics problems. The document also discusses how computational thinking skills can be taught in the classroom to help students learn problem-solving methods.
Data Collection I Available Data and Observation OVERVIE.docxtheodorelove43763
Data Collection I
Available Data and Observation
OVERVIEW
The choice of a data collection approach should logically flow from the prior decisions
about the research questions and measurement choices. Basically, the data collection
decision depends on three factors. The first factor centers on what the researchers
want to know. For example, do they want to know what people think or what they
do'' If learning what people think is the goal, the researchers would choose a data
collection approach that asks them. If the researchers want to know what people do,
the approach to choose would be observation.
The second factor is where the data reside. Perhaps other researchers have already
collected the needed data. If so, then the task is to obtain those studies, reports, and/
or databases. Alternatively, if the data are in files stored in a basement, then the tasks
are to access those files and gather the needed information systematically. If the data
are in the physical or built environment. the researchers will need to get out of the
office and observe. If people have the desired information, then the researchers will
need to decide whether to use interviews, surveys, or focus groups.
The third factor is the amount of resources available to collect the data. If suffi-
cient money, staff, and time were available. then it would be possible, for example.
to conduct face-to-face interviews with a large number of the people who have the
desired information. If there is very little money, staff, or time, then interviewing ju~t
a few people or conducting three focus groups might have to do.
There are trade-offs in collecting data that ultimately affect the conclusions th:1t
can be drawn. However, regardless of what data collection approach is selectee.
researchers need to develop very clear, specific guidelines to ensure that data i' :<-
curate. reliable, and unbiased. The data collection methods should be described : ..
the final report, along with any problems encountered and any limitatiom that m:~·· ·
affect the conclusions.
This phase of the research process requires attention to detaiL and ever: dcta1: ;.. >
to be nailed down. The decision about the best data collection approach i ~ i nten'- ~ '- ::-
\'. 'th the measurement strategy and sampling approach. It take~ timet,, n:::"e 'L:~:.
97
98 CHAPTER 7
the pieces align and requires flexibility because the initial plan may not work if the
situation proves to have unexpected barriers. The next three chapters provide a toolkit
for the most commonly used methods of data collection. This chapter discusses the
larger issues of structured and semistructured data collection-that is, quantitative
and qualitative data collection methods. It then turns to several commonly used data
collection methods: using available data, collecting data from records and files, and
observation. The purpose is provide some "how to" basics so that it is easier to identify
the stre.
- Robert Marzano proposed a new taxonomy of educational objectives to address shortcomings of Bloom's Taxonomy. His model incorporates a wider range of factors that affect how students think.
- Marzano's taxonomy includes three systems - the Self System, Metacognitive System, and Cognitive System - as well as a Knowledge Domain. The Self System determines whether to engage in a new task. The Metacognitive System sets goals and monitors progress. The Cognitive System processes information using thinking strategies. The Knowledge Domain provides content.
- Together, these systems and domain describe the thinking process and how knowledge is retrieved, comprehended, analyzed, and utilized to drive higher-order thinking.
The document provides instructions for analyzing quantitative and qualitative data. For the quantitative analysis, it includes conducting descriptive statistics such as frequency tables and charts on variables like age, hours of TV watched, and hours spent reading using sample survey data. It also covers hypothesis testing to analyze differences in means. For qualitative analysis, it involves coding an interview transcript about factors that enable or inhibit teachers' use of technology in class. The goal is to identify codes and patterns in the responses.
This document discusses descriptive research methods in educational research. Descriptive research involves collecting data to answer questions about the current status of a subject. It can use surveys, observations, interviews or other quantitative methods to study preferences, attitudes or interests of a sample population. The document outlines the basic steps of descriptive research and classifications of descriptive studies like cross-sectional, longitudinal, self-report and observation studies. It also discusses how to conduct questionnaire, interview and observation studies including developing instruments, sampling, analysis and reporting results.
This document outlines the research process and provides guidance on its key steps and phases. It begins by defining research as a step-by-step process of identifying, assessing, and analyzing a research question in order to find answers. The document then describes the main phases of research as conceptual, design and planning, empirical, analytic, and dissemination. It also discusses factors that can influence the research process as well as headings typically included in a research paper. The goal is to empower participants with knowledge of the overall research process.
PPT Group 4 Sifat dan Model Analitis Penelitian Kuantitatif.pdfAnggela20
This document discusses qualitative research analysis. It provides an overview of the nature of qualitative data analysis, including that it is inductive, naturalistic, subjective, holistic, humanistic, and a posteriori. It then discusses two models of qualitative data analysis: 1) the constant comparative method which involves comparing events and categories, and 2) Miles and Huberman's interactive model which involves three stages of data reduction, display, and conclusion drawing. It provides details on the steps involved in each stage of Miles and Huberman's model.
This document outlines different methods for collecting experimental data in research. It discusses quantitative and qualitative data types, as well as primary and secondary sources of data. Three common data collection methods are described: questionnaires, interviews, and observation. Questionnaires can be structured or unstructured, closed or open-ended. Interviews may be conducted in-person, by telephone, in focus groups, or using depth or projective techniques. Both questionnaires and interviews are effective ways to gather information for descriptive or analytical research. The document emphasizes the importance of planning, designing, and critically examining different data collection methods in research.
The document describes a study conducted at the University of Queensland to enhance information systems literacy education. Researchers found a significant difference in prior IS knowledge between business and non-business students. Weekly scaffolding sessions were implemented using the Four Resources Model to help close this gap. Student feedback was positive, noting improved understanding, motivation, and development of higher-order skills. Future plans include evaluating video recordings of the scaffolding sessions.
The document describes a study conducted at the University of Queensland to enhance information systems literacy education. Researchers found a significant difference in prior IS knowledge between business and non-business students. Weekly scaffolding sessions were implemented using the Four Resources Model to help close this gap. Student feedback was positive, noting improved understanding, motivation, and development of higher-order skills. Future plans include evaluating video recordings of the scaffolding sessions.
The document describes a project to predict student demand for an online language teaching company. It aims to generate predicted weekly lesson schedules for new students based on their timezone and company data, to help the company balance teacher hiring. The author analyzes past student data to explore patterns in lesson times by timezone. Various predictive models are tested and evaluated using mean absolute error between actual and predicted lesson buckets over time. The best model is selected to minimize error in predicting unseen monthly data.
assessment techniques in effective and psychomotor domaiinnalizia54
This document discusses various assessment techniques used to evaluate students' learning in the cognitive, affective, and psychomotor domains. It describes observation, self-reports like questionnaires and interviews, rating scales, anecdotal records, checklists, and peer assessment. For each technique, it provides definitions, types, characteristics, advantages, and limitations. The key assessment techniques discussed are observation, questionnaires, interviews, rating scales, anecdotal records, checklists and peer assessment.
This chapter outlines the research method used in the study. It describes a classroom action research design involving several cycles of planning, implementation, observation, and reflection. Data collection methods include lesson plans, observation sheets, pre-tests and post-tests to assess student writing skills. The study aims to determine if using outdoor classical music can improve students' ability to write descriptive texts in English.
The document discusses methods for researching, collecting data, sampling, potential errors, eliminating bias, and hardware/software needs. The author would use a hypothesis-driven research method and survey questionnaires distributed to students to collect data. Cluster sampling of specific student groups like 11th graders would be used. Potential errors include complex questions or limited answer options. Bias would be eliminated by avoiding questions that restrict answers or pressure responses. Microsoft Office would be used to create the questionnaire, analyze collected data, and report findings.
E.Leute: Learning the impact of Learning Analytics with an authentic datasetHendrik Drachsler
Nowadays, data sets of the interactions of users and their corresponding demographic data are becoming more and more valuable for companies and academic institutions like universities
when optimizing their key performance indicators. Whether it is to develop a model to predict the optimal learning path for a student or to sell customers additional products, data sets to
train these models are in high demand. Despite the importance and need for big data sets it still has not become apparent to every decision-maker how crucial data sets like these are for the
future success of their operations.
The objective of this thesis is to demonstrate the use of a data set, gathered from the virtual learning environment of a distance learning university, by answering a selection of questions in
Learning Analytics. Therefore, a real-world data set was analyzed and the selected questions were answered by using state-of-the-art machine learning algorithms.
What is Research, how many types of research?naveedtariq21
The document provides an overview of the fundamentals of scientific research, including defining research, the different types of research, selecting topics and gathering relevant literature. It discusses general steps in the research process such as problem identification, data collection and analysis, and drawing conclusions. Additionally, it covers writing a research paper or thesis by outlining the typical structure and providing guidance on writing the introduction, methodology, results, and discussion sections.
The document outlines four main aims of research: describe, predict, explain, and interpret. It then discusses various research methodologies including descriptive studies, correlational research, explanatory research, and interpretive research. The document also outlines the typical steps in a research process including formulating the research problem, determining the design, collecting and analyzing data, drawing conclusions, and reporting findings. It discusses phases of research including clarifying the issue, collecting data through various methods, and analyzing and interpreting the data. The document emphasizes the importance of research ethics in protecting participants and honestly reporting results.
This document discusses the benefits of using science notebooks in elementary classrooms. Science notebooks allow students to organize their work, draw conclusions from investigations, and develop conceptual understanding. Key components of effective notebooks include posing questions, making predictions, planning investigations, recording observations and data, stating claims with evidence, drawing conclusions, and reflecting on learning. Notebooks support students' critical thinking skills and help teachers assess student understanding over time.
Soalan bi tahun 3 kssr pk mengikut jsu dan aras taksanomi bloomMardhiah Hayati Rahim
Dokumen tersebut berisi soalan-soalan ujian untuk murid tingkatan 3 tentang subjek Bahasa Inggeris. Soalan-soalan itu mencakupi topik keluarga, perabot kelas, dan tempat-tempat di sekolah pada tingkat kesukaran yang berbeza. Ia juga menyertakan gambar-gambar untuk membantu murid menjawab soalan-soalan.
More Related Content
Similar to Cognitive task analysis of a library assistant
This document outlines a survey to analyze the number of books read by students. It discusses collecting data from 40 students on their reading habits, including the number of books read per week, where they obtain books, and what types of books they prefer. The data will be organized and represented using pie charts, bar charts and histograms to visualize trends and compare subgroups. The survey aims to provide insight into student reading to help the university support the library and student success.
The document describes a thesis that develops a computational model to realistically reproduce the mechanisms in the human brain involved in pain handling. The model proposes designs for three main behavioral modules identified by psychologists and neuroscientists - a model-free module, model-based module, and Pavlovian module. It shows how the modules perform individually and how their integration allows the model to reproduce interaction phenomena expected in nature. Preliminary results also show how the model can explain a psychological pathology related to pain handling. The work represents the first effort in a long-term research project to create a pain processing model for developing realistic human-like robots.
The document discusses computational thinking and its four pillars: decomposition, pattern recognition, abstraction, and algorithms. It defines computational thinking as a problem-solving methodology that utilizes techniques derived from computer science. The four pillars are described as key steps in breaking down problems, identifying patterns and relevant information, and developing logical solutions. Examples are provided for how each pillar can be applied, especially for solving mathematics problems. The document also discusses how computational thinking skills can be taught in the classroom to help students learn problem-solving methods.
Data Collection I Available Data and Observation OVERVIE.docxtheodorelove43763
Data Collection I
Available Data and Observation
OVERVIEW
The choice of a data collection approach should logically flow from the prior decisions
about the research questions and measurement choices. Basically, the data collection
decision depends on three factors. The first factor centers on what the researchers
want to know. For example, do they want to know what people think or what they
do'' If learning what people think is the goal, the researchers would choose a data
collection approach that asks them. If the researchers want to know what people do,
the approach to choose would be observation.
The second factor is where the data reside. Perhaps other researchers have already
collected the needed data. If so, then the task is to obtain those studies, reports, and/
or databases. Alternatively, if the data are in files stored in a basement, then the tasks
are to access those files and gather the needed information systematically. If the data
are in the physical or built environment. the researchers will need to get out of the
office and observe. If people have the desired information, then the researchers will
need to decide whether to use interviews, surveys, or focus groups.
The third factor is the amount of resources available to collect the data. If suffi-
cient money, staff, and time were available. then it would be possible, for example.
to conduct face-to-face interviews with a large number of the people who have the
desired information. If there is very little money, staff, or time, then interviewing ju~t
a few people or conducting three focus groups might have to do.
There are trade-offs in collecting data that ultimately affect the conclusions th:1t
can be drawn. However, regardless of what data collection approach is selectee.
researchers need to develop very clear, specific guidelines to ensure that data i' :<-
curate. reliable, and unbiased. The data collection methods should be described : ..
the final report, along with any problems encountered and any limitatiom that m:~·· ·
affect the conclusions.
This phase of the research process requires attention to detaiL and ever: dcta1: ;.. >
to be nailed down. The decision about the best data collection approach i ~ i nten'- ~ '- ::-
\'. 'th the measurement strategy and sampling approach. It take~ timet,, n:::"e 'L:~:.
97
98 CHAPTER 7
the pieces align and requires flexibility because the initial plan may not work if the
situation proves to have unexpected barriers. The next three chapters provide a toolkit
for the most commonly used methods of data collection. This chapter discusses the
larger issues of structured and semistructured data collection-that is, quantitative
and qualitative data collection methods. It then turns to several commonly used data
collection methods: using available data, collecting data from records and files, and
observation. The purpose is provide some "how to" basics so that it is easier to identify
the stre.
- Robert Marzano proposed a new taxonomy of educational objectives to address shortcomings of Bloom's Taxonomy. His model incorporates a wider range of factors that affect how students think.
- Marzano's taxonomy includes three systems - the Self System, Metacognitive System, and Cognitive System - as well as a Knowledge Domain. The Self System determines whether to engage in a new task. The Metacognitive System sets goals and monitors progress. The Cognitive System processes information using thinking strategies. The Knowledge Domain provides content.
- Together, these systems and domain describe the thinking process and how knowledge is retrieved, comprehended, analyzed, and utilized to drive higher-order thinking.
The document provides instructions for analyzing quantitative and qualitative data. For the quantitative analysis, it includes conducting descriptive statistics such as frequency tables and charts on variables like age, hours of TV watched, and hours spent reading using sample survey data. It also covers hypothesis testing to analyze differences in means. For qualitative analysis, it involves coding an interview transcript about factors that enable or inhibit teachers' use of technology in class. The goal is to identify codes and patterns in the responses.
This document discusses descriptive research methods in educational research. Descriptive research involves collecting data to answer questions about the current status of a subject. It can use surveys, observations, interviews or other quantitative methods to study preferences, attitudes or interests of a sample population. The document outlines the basic steps of descriptive research and classifications of descriptive studies like cross-sectional, longitudinal, self-report and observation studies. It also discusses how to conduct questionnaire, interview and observation studies including developing instruments, sampling, analysis and reporting results.
This document outlines the research process and provides guidance on its key steps and phases. It begins by defining research as a step-by-step process of identifying, assessing, and analyzing a research question in order to find answers. The document then describes the main phases of research as conceptual, design and planning, empirical, analytic, and dissemination. It also discusses factors that can influence the research process as well as headings typically included in a research paper. The goal is to empower participants with knowledge of the overall research process.
PPT Group 4 Sifat dan Model Analitis Penelitian Kuantitatif.pdfAnggela20
This document discusses qualitative research analysis. It provides an overview of the nature of qualitative data analysis, including that it is inductive, naturalistic, subjective, holistic, humanistic, and a posteriori. It then discusses two models of qualitative data analysis: 1) the constant comparative method which involves comparing events and categories, and 2) Miles and Huberman's interactive model which involves three stages of data reduction, display, and conclusion drawing. It provides details on the steps involved in each stage of Miles and Huberman's model.
This document outlines different methods for collecting experimental data in research. It discusses quantitative and qualitative data types, as well as primary and secondary sources of data. Three common data collection methods are described: questionnaires, interviews, and observation. Questionnaires can be structured or unstructured, closed or open-ended. Interviews may be conducted in-person, by telephone, in focus groups, or using depth or projective techniques. Both questionnaires and interviews are effective ways to gather information for descriptive or analytical research. The document emphasizes the importance of planning, designing, and critically examining different data collection methods in research.
The document describes a study conducted at the University of Queensland to enhance information systems literacy education. Researchers found a significant difference in prior IS knowledge between business and non-business students. Weekly scaffolding sessions were implemented using the Four Resources Model to help close this gap. Student feedback was positive, noting improved understanding, motivation, and development of higher-order skills. Future plans include evaluating video recordings of the scaffolding sessions.
The document describes a study conducted at the University of Queensland to enhance information systems literacy education. Researchers found a significant difference in prior IS knowledge between business and non-business students. Weekly scaffolding sessions were implemented using the Four Resources Model to help close this gap. Student feedback was positive, noting improved understanding, motivation, and development of higher-order skills. Future plans include evaluating video recordings of the scaffolding sessions.
The document describes a project to predict student demand for an online language teaching company. It aims to generate predicted weekly lesson schedules for new students based on their timezone and company data, to help the company balance teacher hiring. The author analyzes past student data to explore patterns in lesson times by timezone. Various predictive models are tested and evaluated using mean absolute error between actual and predicted lesson buckets over time. The best model is selected to minimize error in predicting unseen monthly data.
assessment techniques in effective and psychomotor domaiinnalizia54
This document discusses various assessment techniques used to evaluate students' learning in the cognitive, affective, and psychomotor domains. It describes observation, self-reports like questionnaires and interviews, rating scales, anecdotal records, checklists, and peer assessment. For each technique, it provides definitions, types, characteristics, advantages, and limitations. The key assessment techniques discussed are observation, questionnaires, interviews, rating scales, anecdotal records, checklists and peer assessment.
This chapter outlines the research method used in the study. It describes a classroom action research design involving several cycles of planning, implementation, observation, and reflection. Data collection methods include lesson plans, observation sheets, pre-tests and post-tests to assess student writing skills. The study aims to determine if using outdoor classical music can improve students' ability to write descriptive texts in English.
The document discusses methods for researching, collecting data, sampling, potential errors, eliminating bias, and hardware/software needs. The author would use a hypothesis-driven research method and survey questionnaires distributed to students to collect data. Cluster sampling of specific student groups like 11th graders would be used. Potential errors include complex questions or limited answer options. Bias would be eliminated by avoiding questions that restrict answers or pressure responses. Microsoft Office would be used to create the questionnaire, analyze collected data, and report findings.
E.Leute: Learning the impact of Learning Analytics with an authentic datasetHendrik Drachsler
Nowadays, data sets of the interactions of users and their corresponding demographic data are becoming more and more valuable for companies and academic institutions like universities
when optimizing their key performance indicators. Whether it is to develop a model to predict the optimal learning path for a student or to sell customers additional products, data sets to
train these models are in high demand. Despite the importance and need for big data sets it still has not become apparent to every decision-maker how crucial data sets like these are for the
future success of their operations.
The objective of this thesis is to demonstrate the use of a data set, gathered from the virtual learning environment of a distance learning university, by answering a selection of questions in
Learning Analytics. Therefore, a real-world data set was analyzed and the selected questions were answered by using state-of-the-art machine learning algorithms.
What is Research, how many types of research?naveedtariq21
The document provides an overview of the fundamentals of scientific research, including defining research, the different types of research, selecting topics and gathering relevant literature. It discusses general steps in the research process such as problem identification, data collection and analysis, and drawing conclusions. Additionally, it covers writing a research paper or thesis by outlining the typical structure and providing guidance on writing the introduction, methodology, results, and discussion sections.
The document outlines four main aims of research: describe, predict, explain, and interpret. It then discusses various research methodologies including descriptive studies, correlational research, explanatory research, and interpretive research. The document also outlines the typical steps in a research process including formulating the research problem, determining the design, collecting and analyzing data, drawing conclusions, and reporting findings. It discusses phases of research including clarifying the issue, collecting data through various methods, and analyzing and interpreting the data. The document emphasizes the importance of research ethics in protecting participants and honestly reporting results.
This document discusses the benefits of using science notebooks in elementary classrooms. Science notebooks allow students to organize their work, draw conclusions from investigations, and develop conceptual understanding. Key components of effective notebooks include posing questions, making predictions, planning investigations, recording observations and data, stating claims with evidence, drawing conclusions, and reflecting on learning. Notebooks support students' critical thinking skills and help teachers assess student understanding over time.
Similar to Cognitive task analysis of a library assistant (20)
Soalan bi tahun 3 kssr pk mengikut jsu dan aras taksanomi bloomMardhiah Hayati Rahim
Dokumen tersebut berisi soalan-soalan ujian untuk murid tingkatan 3 tentang subjek Bahasa Inggeris. Soalan-soalan itu mencakupi topik keluarga, perabot kelas, dan tempat-tempat di sekolah pada tingkat kesukaran yang berbeza. Ia juga menyertakan gambar-gambar untuk membantu murid menjawab soalan-soalan.
Dokumen tersebut menganalisis tugas kognitif seorang asisten perpustakaan dalam proses pengembalian buku sampai buku-buku tersebut disusun kembali ke rak. Dokumen tersebut mengidentifikasi pengetahuan dan informasi yang dimiliki asisten perpustakaan, mengkategorikan pengetahuan tersebut, dan mengembangkan model kognitif tugas asisten perpustakaan.
1) Gender roles are behavioral and social norms that associate certain behaviors with particular sexes in a society. Traditionally, masculinity was viewed as powerful and in control while femininity was nurturing and relationship-focused.
2) In the past, gender roles were more strictly divided, with men as breadwinners and women as homemakers. Now, roles are less rigid as more women enter the workforce in a variety of fields.
3) However, gender discrimination and stereotyping still exist and negatively impact human resource practices and employee performance if not properly addressed. HR managers have a role in developing equitable workplace policies.
HCL Notes and Domino License Cost Reduction in the World of DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-and-domino-license-cost-reduction-in-the-world-of-dlau/
The introduction of DLAU and the CCB & CCX licensing model caused quite a stir in the HCL community. As a Notes and Domino customer, you may have faced challenges with unexpected user counts and license costs. You probably have questions on how this new licensing approach works and how to benefit from it. Most importantly, you likely have budget constraints and want to save money where possible. Don’t worry, we can help with all of this!
We’ll show you how to fix common misconfigurations that cause higher-than-expected user counts, and how to identify accounts which you can deactivate to save money. There are also frequent patterns that can cause unnecessary cost, like using a person document instead of a mail-in for shared mailboxes. We’ll provide examples and solutions for those as well. And naturally we’ll explain the new licensing model.
Join HCL Ambassador Marc Thomas in this webinar with a special guest appearance from Franz Walder. It will give you the tools and know-how to stay on top of what is going on with Domino licensing. You will be able lower your cost through an optimized configuration and keep it low going forward.
These topics will be covered
- Reducing license cost by finding and fixing misconfigurations and superfluous accounts
- How do CCB and CCX licenses really work?
- Understanding the DLAU tool and how to best utilize it
- Tips for common problem areas, like team mailboxes, functional/test users, etc
- Practical examples and best practices to implement right away
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slackshyamraj55
Discover the seamless integration of RPA (Robotic Process Automation), COMPOSER, and APM with AWS IDP enhanced with Slack notifications. Explore how these technologies converge to streamline workflows, optimize performance, and ensure secure access, all while leveraging the power of AWS IDP and real-time communication via Slack notifications.
Main news related to the CCS TSI 2023 (2023/1695)Jakub Marek
An English 🇬🇧 translation of a presentation to the speech I gave about the main changes brought by CCS TSI 2023 at the biggest Czech conference on Communications and signalling systems on Railways, which was held in Clarion Hotel Olomouc from 7th to 9th November 2023 (konferenceszt.cz). Attended by around 500 participants and 200 on-line followers.
The original Czech 🇨🇿 version of the presentation can be found here: https://www.slideshare.net/slideshow/hlavni-novinky-souvisejici-s-ccs-tsi-2023-2023-1695/269688092 .
The videorecording (in Czech) from the presentation is available here: https://youtu.be/WzjJWm4IyPk?si=SImb06tuXGb30BEH .
5th LF Energy Power Grid Model Meet-up SlidesDanBrown980551
5th Power Grid Model Meet-up
It is with great pleasure that we extend to you an invitation to the 5th Power Grid Model Meet-up, scheduled for 6th June 2024. This event will adopt a hybrid format, allowing participants to join us either through an online Mircosoft Teams session or in person at TU/e located at Den Dolech 2, Eindhoven, Netherlands. The meet-up will be hosted by Eindhoven University of Technology (TU/e), a research university specializing in engineering science & technology.
Power Grid Model
The global energy transition is placing new and unprecedented demands on Distribution System Operators (DSOs). Alongside upgrades to grid capacity, processes such as digitization, capacity optimization, and congestion management are becoming vital for delivering reliable services.
Power Grid Model is an open source project from Linux Foundation Energy and provides a calculation engine that is increasingly essential for DSOs. It offers a standards-based foundation enabling real-time power systems analysis, simulations of electrical power grids, and sophisticated what-if analysis. In addition, it enables in-depth studies and analysis of the electrical power grid’s behavior and performance. This comprehensive model incorporates essential factors such as power generation capacity, electrical losses, voltage levels, power flows, and system stability.
Power Grid Model is currently being applied in a wide variety of use cases, including grid planning, expansion, reliability, and congestion studies. It can also help in analyzing the impact of renewable energy integration, assessing the effects of disturbances or faults, and developing strategies for grid control and optimization.
What to expect
For the upcoming meetup we are organizing, we have an exciting lineup of activities planned:
-Insightful presentations covering two practical applications of the Power Grid Model.
-An update on the latest advancements in Power Grid -Model technology during the first and second quarters of 2024.
-An interactive brainstorming session to discuss and propose new feature requests.
-An opportunity to connect with fellow Power Grid Model enthusiasts and users.
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc
How does your privacy program stack up against your peers? What challenges are privacy teams tackling and prioritizing in 2024?
In the fifth annual Global Privacy Benchmarks Survey, we asked over 1,800 global privacy professionals and business executives to share their perspectives on the current state of privacy inside and outside of their organizations. This year’s report focused on emerging areas of importance for privacy and compliance professionals, including considerations and implications of Artificial Intelligence (AI) technologies, building brand trust, and different approaches for achieving higher privacy competence scores.
See how organizational priorities and strategic approaches to data security and privacy are evolving around the globe.
This webinar will review:
- The top 10 privacy insights from the fifth annual Global Privacy Benchmarks Survey
- The top challenges for privacy leaders, practitioners, and organizations in 2024
- Key themes to consider in developing and maintaining your privacy program
Introduction of Cybersecurity with OSS at Code Europe 2024Hiroshi SHIBATA
I develop the Ruby programming language, RubyGems, and Bundler, which are package managers for Ruby. Today, I will introduce how to enhance the security of your application using open-source software (OSS) examples from Ruby and RubyGems.
The first topic is CVE (Common Vulnerabilities and Exposures). I have published CVEs many times. But what exactly is a CVE? I'll provide a basic understanding of CVEs and explain how to detect and handle vulnerabilities in OSS.
Next, let's discuss package managers. Package managers play a critical role in the OSS ecosystem. I'll explain how to manage library dependencies in your application.
I'll share insights into how the Ruby and RubyGems core team works to keep our ecosystem safe. By the end of this talk, you'll have a better understanding of how to safeguard your code.
Building Production Ready Search Pipelines with Spark and MilvusZilliz
Spark is the widely used ETL tool for processing, indexing and ingesting data to serving stack for search. Milvus is the production-ready open-source vector database. In this talk we will show how to use Spark to process unstructured data to extract vector representations, and push the vectors to Milvus vector database for search serving.
In the rapidly evolving landscape of technologies, XML continues to play a vital role in structuring, storing, and transporting data across diverse systems. The recent advancements in artificial intelligence (AI) present new methodologies for enhancing XML development workflows, introducing efficiency, automation, and intelligent capabilities. This presentation will outline the scope and perspective of utilizing AI in XML development. The potential benefits and the possible pitfalls will be highlighted, providing a balanced view of the subject.
We will explore the capabilities of AI in understanding XML markup languages and autonomously creating structured XML content. Additionally, we will examine the capacity of AI to enrich plain text with appropriate XML markup. Practical examples and methodological guidelines will be provided to elucidate how AI can be effectively prompted to interpret and generate accurate XML markup.
Further emphasis will be placed on the role of AI in developing XSLT, or schemas such as XSD and Schematron. We will address the techniques and strategies adopted to create prompts for generating code, explaining code, or refactoring the code, and the results achieved.
The discussion will extend to how AI can be used to transform XML content. In particular, the focus will be on the use of AI XPath extension functions in XSLT, Schematron, Schematron Quick Fixes, or for XML content refactoring.
The presentation aims to deliver a comprehensive overview of AI usage in XML development, providing attendees with the necessary knowledge to make informed decisions. Whether you’re at the early stages of adopting AI or considering integrating it in advanced XML development, this presentation will cover all levels of expertise.
By highlighting the potential advantages and challenges of integrating AI with XML development tools and languages, the presentation seeks to inspire thoughtful conversation around the future of XML development. We’ll not only delve into the technical aspects of AI-powered XML development but also discuss practical implications and possible future directions.
Ivanti’s Patch Tuesday breakdown goes beyond patching your applications and brings you the intelligence and guidance needed to prioritize where to focus your attention first. Catch early analysis on our Ivanti blog, then join industry expert Chris Goettl for the Patch Tuesday Webinar Event. There we’ll do a deep dive into each of the bulletins and give guidance on the risks associated with the newly-identified vulnerabilities.
Generating privacy-protected synthetic data using Secludy and MilvusZilliz
During this demo, the founders of Secludy will demonstrate how their system utilizes Milvus to store and manipulate embeddings for generating privacy-protected synthetic data. Their approach not only maintains the confidentiality of the original data but also enhances the utility and scalability of LLMs under privacy constraints. Attendees, including machine learning engineers, data scientists, and data managers, will witness first-hand how Secludy's integration with Milvus empowers organizations to harness the power of LLMs securely and efficiently.
GraphRAG for Life Science to increase LLM accuracyTomaz Bratanic
GraphRAG for life science domain, where you retriever information from biomedical knowledge graphs using LLMs to increase the accuracy and performance of generated answers
This presentation provides valuable insights into effective cost-saving techniques on AWS. Learn how to optimize your AWS resources by rightsizing, increasing elasticity, picking the right storage class, and choosing the best pricing model. Additionally, discover essential governance mechanisms to ensure continuous cost efficiency. Whether you are new to AWS or an experienced user, this presentation provides clear and practical tips to help you reduce your cloud costs and get the most out of your budget.
1. UNIVERSITI MALAYSIA SARAWAK
FACULTY OF COGNITIVE SCIENCES AND HUMAN DEVELOPMENT
(KMS 3013)
COGNITIVE AND MANAGEMENT MODEL
PAIR WORK ASSIGNMENT
COGNITIVE TASK ANALYSIS OF
A LIBRARY ASSISTANT
NAME;
MARDHIAH HAYATI RAHIM 14419
NOOR FAZZURA AIN ZAINUDIN 14710
LECTURER;
DR. SOPIAN BUJANG
1
2. TABLE OF CONTENT
1. Objective of Study……………………………………………………………... 1
2. Background of Study…………………………………………………………... 1
3. Procedure of Data Collection…………………………………………………... 3
Data Preparation……………………………………………………………….. 4
Data Analysis…………………………………………………………………... 5
4. The Models…………………………………………………………………….. 7
Task Model…………………………………………………………………….. 7
Explanation of The Task Model………………………………..……………… 8
Cognitive Task Model ………………………………………………………9
5. Suggestion on How to Use The Cognitive Task Model……………………….. 10
Training on familiarizing the procedures or sequences of the task………..……10
Training on how to operate the book scanning machine…………………......... 11
Training on how to operate the book drop machine…………………………… 11
6. Conclusion………………………………………………………………………12
7. References……………………………………………………………………… 13
2
3. 1. Objective of The Study
This study was conducted to meet numbers of objectives which includes:
To identify the knowledge and information that a library assistant possesses
regarding the process of returning books until the books are reshelf.
To categorized knowledge and information gained from a library assistant.
To analyze the categories of knowledge and information.
To develop a cognitive task model of a library assistant.
2. Background of The Study
Concurrent thinking aloud (CTA) is a method that provides researcher with
information regarding cognitions and emotions of someone being studied (respondent)
while he or she is performing tasks or solving a problem (Lewis, 1982). It is used in
cognitive task analysis activities where many researchers or investigators adopt it to gain
information from their respondents (Someren et al., 1994). This method encourages the
respondent to verbally express his or her thoughts during the process of completing a task
or even during the process of working out a problem (Ericsson & Simon, 1993). There
are several protocols of CTA that need to be followed which are listed as follows:
respondent will thinks aloud which means he or she will be talking while
performing task or solving a problem,
respondent will not analyze his or her thought and just verbalizes them
instead,
the talking by respondent is continuous, and
researcher talk really less and takes notes, do audio recording of the
respondent’s utterances or do video recording of the respondent during the
task or problem completion (Someren et al., 1994).
3
4. CTA is proved to be an effective and efficient method to gather cognitive
processes of a respondent as it possess strengths (Birns et al., 1999). Berry and Broadbent
(1984) have pointed several strengths that CTA has which include:
it is able to reveal the mental model of a respondent,
it is capable of revealing the cognitive processes of a respondent,
it is flexible in terms of location, equipment and recording activity, and
the feedback obtained is “real-time” because of the concurrent nature of the
procedure, respondents do not have time to rationalize their thoughts.
However, Someren et al. (1994) stated that CTA also possess several weaknesses
that are listed as follows:
it might be unnatural method for some respondents because the act of
verbalizing thoughts while completing a task can potentially impact the
normal workflow,
the data obtained from CTA might be difficult to analyze,
there is a possibility that respondent might rationalize his or her thinking
which in return will distort data, and
respondents will perform task faster 9% if they were asked to use CTA and
this prevents researchers from obtaining accurate performance data for their
study.
Concurrent think aloud (CTA) method discloses a plenty of information
concerning respondents’ experiences, thoughts, and perceptions as regards of tasks that
they perform or problem that they solve. Regardless of its limitations, concurrent think
aloud is the best methodology many researchers have found for collecting real-time
cognitive data during the study of the mental model as well as the cognitive processes of
selected respondents.
4
5. 3. Procedure of Data Collection
As for this study, we have selected a library assistant in UNIMAS to become our
respondent. The respondent will perform a task which is the process of returning books
until the books are reshelf. The respondent was chosen because he possesses 3 years
experiences as library assistant and acquires dazzling knowledge and skills in performing
the stated tasks. Thus, with these he can be considered an expert in this field and the
mental model as well as the cognitive processes of him can become useful data for us to
develop cognitive task model regarding the task declared earlier. Besides that, he was
selected because he possesses great communication skills that will ease the thinking
aloud process to be conducted smoothly.
In the CTA activity, the respondent is asked to verbalizes whatever he is looking
at, thinking, doing and feeling as he perform the task. Every utterance by the respondent
is recorded by a voice recorder. This is to ensure that every single data is not left out as it
might happen if we use written recording. The followings are the background of our
respondent:
Name : Gregory Simon
Nick name : Greg
Age : 23 years old
Job : Library Assistant, UNIMAS
Experience : 3 years
Phone no. : 014-8939511
5
6. Data Preparation
Data Obtained from Concurrent Thinking Aloud Activity
Q: aaa…bolehkah abang aaa.. tunjukkan dan ceritekan prosedur kerja abang aaa
dalam menyusun buku, dari student pulang buku sampai buku tu di susun semula ke
rak.
A: ok aaa..pertama sekali kita terima daripada pelajar iaitu mereka hantar ke kaunter
pastu selain itu juga kita ambil buku daripada mesin pemulangan buku 24 jam,
selepas itu kita bawa ke kaunter, kita susun ikut kod nombor, dan juga level, seperti
level satu dan level dua, level satu untuk yang bukan sains dan level dua untuk yg
sains lah. jadi selepas kita menyusun semua buku itu mengikut kod nombor dan level,
kita letak atas troli tu ke level dia. Dan apabila sampai di level-level yang berkenaan
contohnya level satu, kita akan hantar buku yang telah di susun tu ke rak masing-
masing, selepas semua buku-buku telah di hantar ke rak masing-masing, aaa…kita
akan susunlah mengikut kod nombor pada rak tu.
Q: ok..aaa… boleh tak abang bagitau kod-kod pada setiap level, level satu dan level
dua.
A: ok..kod nombornya, kod no pada aaa level satu, kebanyakkannya buku yang bukan
aliran sains terdiri dari A sampai F, dan tingkat dua pula Q sampai Z, QA, QB, QC,
QD, QH, QL, ST, ZU kecuali V la, V tu takde, O kita takde, O dan juga I kita takde,
kod no yang stat dari I, X kita takde, Z kita ade.
Q: aaaa..tadi abang ada cakap aaaa…ada 2 cara pemulangan buku kan, satu di
kaunter, satu di mesin, aaa…apa beza aaa…prosuder pemulangan buku di kedua-dua
tempat.
6
7. A: ok…aaa…kalau student ataupun staff tu dia anta buku ,bezanya dengan di kaunter
dan menggunakan mesin, ok mesin adalah mesin, di kaunter ada staff yang handle, ok
di kaunter lebih detail lagi lah sebab kalau buku tu ada denda dan kalu student atau
staff nak cek denda dia boleh cek terus di kaunter , dan dia boleh bayar dan dia boleh
tanye berapa jumlah buku dan dia boleh mengemukan masalah yang berkaitan dengan
kad dialah ataupun akaun dialah, berbeza dengan mesin, mesin hanya menerima
sahaja, tidak memberitahu samaada student atau staff tu ada denda ataupun ada apa-
apa yang masalah dengan akaun merekalah, tu beza dengan mesin,hanya menerima
buku sahaja,manakala di kaunter prosesnya banyaklah, aaa student atau staff dia
boleh cek akaun dia selain dia hantar buku.
Data Analysis
Segment Protocol Knowledge
1 ok aaa..pertama sekali kita terima daripada Indicate the point of
pelajar iaitu mereka hantar ke kaunter collecting books (counter).
2 pastu selain itu juga kita ambil buku Indicate another point to
daripada mesin pemulangan buku 24 jam collect books (machine).
3 ok di kaunter lebih detail lagi lah sebab Explain the services
kalau buku tu ada denda dan kalau student provided in the library
atau staff nak cek denda dia boleh cek terus counter.
di kaunter
4 dan dia boleh bayar dan dia boleh tanye Explain the services
berapa jumlah buku provided in the library
counter.
5 dan dia boleh mengemukan masalah yang Explain the services
berkaitan dengan kad dialah ataupun akaun provided in the library
dialah counter.
6 berbeza dengan mesin, mesin hanya Compare the usage of two
menerima sahaja, tidak memberitahu points in collecting books
samaada student atau staff tu ada denda (counter and book drop
ataupun ada apa-apa yang masalah dengan machine).
akaun merekalah
7
8. 7 selepas itu kita bawa ke kaunter Explain where books from
book drop machine will be
fetched.
8 kita susun ikut kod nombor dan juga level, Explain how books are
seperti level satu dan level dua sorted (code number and
level).
9 ok..kod nombornya , kod no pada aaa level Explain the code numbers
satu, kebanyakkannya buku yang bukan on level one.
aliran sains terdiri dari A sampai F
10 dan tingkat dua pula Q sampai Z Explain the code numbers
on level two.
11 QA, QB, QC, QD, QH, QL, ST, ZU kecuali List the code numbers that
V la, V tu takde, O kita takde, O dan juga I exist on level two.
kita takde, kod no yang stat dari I, X kita
takde, Z kita ade
12 level satu untuk yg bukan sains dan level Differentiate the categories
dua untuk yg sains lah. of books between level one
and level two.
13 jadi selepas kita menyusun semua buku itu Put the sorted books on
mengikut kod nombor dan level, kita letak trolley and ready to be
atas troli tu ke level dia delivered to the respective
levels.
14 Dan apabila sampai di level-level yang Stroll the trolley to the right
berkenaaan contohnya level satu, kita akan shelves for the books to be
hantar buku yang telah di susun tu ke rak arranged.
masing-masing
15 selepas semua buku buku telah di hantar ke Arrange the books according
rak masing-masing, aaa kita akan susunlah to the shelves’ code
mengikut kod nombor pada rak tu. numbers.
4. The Models
From the thinking aloud activity with the library assistant, it helps us to come out
with two different models which are task model as well as cognitive task model. The
models are shown and explained as follows.
8
9. Task Model
Students and
staffs return books
Counter Book Drop Process ends
Machine
Check account
Details of books
borrowed and
returned Arrange books
Check fine on the right
Pay fine shelves
1- COLLECTING
4- ARRANGING
Sort books Deliver books to
according to code the respective
number and level levels
2- SORTING 3- DELIVERING
4.11 Explanation of the Task Model
As shown in the task model, event that occurs in the early stage of the returning
books process is students and staffs of UNIMAS will return books that they borrow from
CAIS. Since CAIS has provided two mechanisms for the students and staffs to return
9
10. books which are using counter or using book drop machine, they can choose either one
which suits their convenience. However, if they choose to return books by using counter,
they could get extra services which includes account checking to keep track the details of
books borrowed and returned, check if there any fine as well as pay the fine if there is
any. When the library assistant receives the books from counter and fetches books from
book drop machine, he is in the collecting phase. He will gather every single book that is
returned by students and staffs from both points in order to enable him to move to another
phase which is called sorting phase.
During the sorting phase, the library assistant needs to sort every book returned
based on their code numbers as well as its level. This require him to have splendid
memory of the books’ code and the book’s level in order to prevent any misplaces of
books to ensure that he would produce tasks that free of error and completely efficient.
After the sorting phase is finished, the library assistant will move to another phase which
is delivering phase where the books that are sorted previously will be strolled to their
respective floors and shelves by using stroller. Then, when he arrived at the right shelves,
new phase will begins which is called arranging phase. During this phase, the sorted
books will be arranged accordingly and appropriately as to ensure that they will look neat
for students and staffs to find them easily. Thus, the knowledge for arranging books is
really needed by the library assistant to enable him to do his work well. After all books
are completely arranged, the process for returning books until they are reshelf is over.
4.2 Cognitive Task Model
EXTERNAL INFORMATION
1. Basic Characteristics 2. Events and Situation
Tools : (i). Students and staffs return books
(i). Book drop machine that they borrow to CAIS.
10
11. (ii). Counter (ii). Respondent perform the process
(iii). Books to be returned of returning books until they are
(iv). Stroller reshelf which involves four
Characteristics of the Task : phases; 1) collecting, 2) sorting,
(i). Collect books 3) delivering and 4) arranging.
(ii). Sort books
(iii). Deliver books
(iv). Arrange books
3. Structures Person’s Knowledge 4. Rules and Procedures
Physical Structures and Equipment : Person’s Knowledge :
(i). Know what is used to scan books (i). Know the sequence in the
(ii). Know what is used to fetch and process of returning books until
deliver books. they are reshelf.
Abstract Structures and Knowledge (ii). Know how to scan the returned
Concerning Task : books.
(i). Know where to collect returned (iii). Know how to collect books from
books. the book drop machine.
(ii). Know what are the books’ code (iv). Know how to sort the books
numbers for sorting purposes. according to their code numbers
(iii). Know where to deliver sorted and its level.
books. (v). Know how the books should be
(iv). Know where to arrange sorted delivered for reshelf.
books. (vi). Know how to arrange the books
accordingly and appropriately.
INTERNAL INFORMATION
5. Suggestion on How to Use The Cognitive Task Model to Develop Training
Program
All of the library assistant in CAIS, UNIMAS need to be competent enough in
performing the task of returning books until they are reshelf in order to generate a quality
work that will bring positive image towards the customers which are the students and the
staffs itself. This is also a way to develop personal growth of the library assistants in
11
12. terms of their degree of capabilities in completing the tasks and jobs that are assigned to
them. As to meet these requirements, the library assistants need to be given
comprehensive and right trainings regarding the stated tasks from time to time. This is to
ensure that continuous improvements will exist within each of them which in return will
make them become more productive while working in the CAIS. Therefore, we have
several suggestions for the management of the CAIS on what training shall be given to
the library assistant. These suggestions are made based on the cognitive task model that
we developed and shown earlier. This is because, the model is developed based on the
cognitive processes and mental model of an expert. Thus, this model is reliable to be
followed and used for improvement purposes for library assistants who are novices. The
suggestions are as follow:
Training on familiarizing the procedures or sequences of the task
The library assistant need to be exposed with the sequences of the process of
returning books until they are reshelf in order to make them fully understand and clear
about what they need to do while performing the task. The four phases which are
collecting, sorting, delivering and arranging are needed to be explained apparently. They
must be well informed on the points where they need to collect books by borrowers. They
also have to know the various books’ code numbers in order to enable them to sort the
books accurately. They also need to be encouraged to familiarize and memorize the code
numbers by their supervisors since it is not an easy task to be done. Moreover, they need
to be aware of every sections exist in the CAIS for them to deliver the sorted books
without difficulty. Finally, they also must be taught on how to arrange the books on
shelves appropriately and accordingly to ensure that all books are placed correctly.
Training on how to operate the book scanning machine
To accept returned books in counter, library assistants need to scan them on book
scanning machine. As to ensure that the machine will be run properly, library assistants
need to be given chances for attending training on how to operate it. If they know how to
12
13. operate it well, then problems while using the machine will probably reduced or
eliminated.
Training on how to operate the book drop machine
The library assistants in CAIS also need to be given training on how to operate
the book drop machine where many students and staffs choose to use for returning the
borrowed books. They need to know which part of the machine that placed all the books
that are dropped by the students and staffs as well as how to obtained the books to be
fetched to the counter for further actions. Thus, comprehensive training on the machine
must be done for them to be fully proficient in running it without any error.
6. Conclusion
From the experiences that we gained from conducting this study, concurrent
thinking aloud (CTA) method can be said as a good approach to be used when researcher
wants or needs to analyze the cognitive task of his or her respondents. This is because the
CTA capable to help us in obtaining and gathering information that is crucial for us to
complete this assignment successfully. The protocols that need to be followed while
exercising the method are really helpful in gaining information that are really objective,
13
14. accurate and valuable regarding the task that we want to study. This information is then
translated into two different models which are the task model and the cognitive task
model.
The very precious outcome of this study is the development of the cognitive task
model which can be used by the management of the CAIS to create various training
programs that are needed by the library assistants in order to become competent enough
in fulfilling their tasks and jobs productively without any error. Besides that, the
developed cognitive task model can be used by supervisors in CAIS to understand the
cognitive processes of their staffs which in this case are the library assistant. This will
enable the supervisors to find out what are their staffs know, how they organize and
structure information as well as what they seek to understand better in order to produce a
quality job performance.
References:
Berry, D.C. & Broadbent, D.E. (1984). On the relationship between task performance and
associated verbalizable knowledge. Quarterly Journal of Experimental
Psychology, 36A, 209-231
14
15. Birns J. H., Joffre K. A., Leclerc J. F., & Paulsen C. A. (1999). Getting the Whole
Picture: Collecting Usability Data Using Two Methods––Concurrent Think
Aloud and Retrospective Probing. American Institutes for Research.
Ericsson, K.A. & Simon, H. A. (1993). Protocol analysis: Verbal reports as data.
Cambridge, Massachusetts: The MIT Press.
Lewis, C. (1982). Using the "thinking aloud" method in cognitive interface design. New
York: IBM Research Reports RC 9265 (40713), IBM Thomas J. Watson Research
Center. 27
Someren W. M., Barnard, F. Y., & Sandberg A. C. J. (1994). The think aloud method. A
practical guide to modeling cognitive process. London: Harcourt Brace &
Company.
.
15