SlideShare a Scribd company logo
Week 3 Assignment: Analyze Action Research
log Teaching and Learning
Orlanda Haynes
North Central University
School of Education
Ed. D Student
EDR 8204-3 - summer 2018
Copyright Note: All images used in this presentation have been confirmed to be either in the
public domain, of expired copyright status, licensed under the GNU Free Documentation
License, or using creative commons license
Speaker Notes
Hello, everyone! I’m Orlanda Haynes.
Thanks for joining the presentation on “Analyze Action Research.”
This presentation is an example of an action research project within
an education environment. The primary aim is to address specific
problems or issues (effectively) in applied settings and in real-time
(Creswell, 2012; Mills, 2014).
When to Use Action Research
• To address specific problems or
issues in applied settings
• To create reflective opportunities
about problems or issues
• To offer means to staff
development (e.g., education
practitioners)
• To improve work related practices,
in part, by being participants
Primary Types of Action Research
•Practical
•Participatory
In teaching and learning environments, practical research occurs when the aim is
to improve teaching methods, to help students learn more effectively, and to
create educational settings that are proactive and content relevant. Usually,
projects involve small-scaled and narrowly focused plans, which address specific
issues or problems (Creswell, 2012).
On the other hand, participatory inquiries refer to plans designed to address
social, organizational, or community problems. The primary purpose is to
improve people’s lives by empowering them to create solutions that address
specific problems or issues (Lodico, Spaulding, & Voegtle, 2010; Mills, 2014).
An issue of interest could be, for instance, to repeal public schools textbook
publication laws, which allow the omission of important historical figures and
cultural events.
Speaker Notes
A Sample Action
Research Project
Internet Safety
Grade levels
6th – 12th
Speaker Notes
Most schools rely on internet access for all manners of teaching,
learning, and communication needs (Prieger, 2013). Tomczyk and
Kopecký (2016) noted that “ . . . Systematic use of . . . Electronic
media begins . . . At the age of 7–11” (Abstract).
They went on to say that “The very devices that are easily used . . .
Become an open door for unscrupulous forces to steal information
and seize control of machines for nefarious purposes;[the] problem is
multi-faceted” . . . .
Speaker Notes
Moreover, Shillair et al. (2015) conducted a study entitled “Online
Safety Begins with You and Me: Convincing Internet Users to
Protect Themselves.” They discovered that most online schools,
colleges, and universities post messages on their websites about how
students should protect themselves while engaging in cyber
environments (Ng Chong, Kanagasundram, Yee Hway, Loong, &
Teoh Kar, 2016; Prieger, 2013; Shillair et al., 2015; Tomczyk &
KopeckĂ˝, 2016).
Speaker Notes
Despite these measures, however, administrators at XYZ Middle
school district (in 2016) reported an alarming increase in
students’ complaints about the lack of internet security,
especially password protection.
To address the problem, in January of 2018, the school board
approved an action research plan that included a mandatory
cybersecurity program (for both students and staff) and an annual
district-wide survey to include all staff as well as students and
parent.
A Sample Action Research Problem Statement
• Students in grades
levels six through
12th lack sufficient
Internet safety skills
to cope with
emerging cyber
threats.
Purpose of the Research
• To determine the cause of the problem
and to recommend an effective
solution
• To build a web-based education
program based on best practice for
emerging cyber-threats
• To emphasize the importance of
internet security and to encourage
students’ awareness by sharing
knowledge about internet security
resources and by implementing a
mandatory cyber-security activity
Goals of the Research
Upon completion of the Cyber
Security program, students will
understand:
• Basic Internet terminologies, tools,
and resources;
• Primary Internet security problems
and implications;
• How to recognize cyber-threats;
• What does “the Internet is forever
means”;
• The importance of password
protection; and
• Concepts of Spam and Phishing?
Why are
Passwords
Important?
Goals of the Research
Speaker Notes
Why are “passwords” important? They help protect end-users’ data
privacy when they engage in online activities (Shillair, et al., 2015).
The University of Ottawa, Canada, published the article “The
Importance of Passwords ” to emphasize current and emerging cyber
communication threats. They noted that students should not create
common passwords such as yellow123 because common colors
joined by standard sequence of numbers are too easy for cyber
hackers to steal and use inappropriately (The Importance of
Passwords, n.d.).
Goals of the Research
Spam and Phishing?
Speaker Notes
Most students are familiar with junk mail, which is unauthorized advertisements
from companies and individuals via standard mail or other third party mail
delivery services. Spam is its equivalent, which is usually sent via emails and
text messages (Mazzarello, Fralick, & Clemons, 2016). But how do they obtain
your addresses? You may ask.
Commercial, mailing-list vendors and internet software programs designed to
identify and compile electronic addresses are common sources. Likewise,
phishing share similar characteristics as far as being unsolicited and using
similar delivery options (Mazzarello, Fralick, & Clemons, 2016;Tomczyk, &
KopeckĂ˝, 2016). However, the purpose is different.
Speaker Notes
Most business communities, for instance, label the act a scam
because cyber hackers and cyberthieves shop for personal
information including passwords, credit cards and bank account
numbers, as well as social security numbers. Their sole purpose is to
commit fraud (Mazzarello, Fralick, & Clemons, 2016;Tomczyk, &
KopeckĂ˝, 2016).
The Participants
Students and Staff Parents
Speaker Notes
Students and staff will complete two online surveys (e.g., before and
after the research) based on closed-ended research questions and a
cybersecurity online activity; they will also complete a standardized
exam (Lodico, Spaulding, & Voegtle, 2010).
Researchers will ask parents, via phone or email, to take part in the
surveys; however, the cybersecurity online activity will be optional
although recommended. They will also issue passwords to all
participants and follow standard research protocol for conducting
research with human subjects (Mills, 2014).
Data Collection Methods
Survey
Question Pro Online Program
http://www.questionpro.com/aki
ra/ShowResults?id=161974)
Data Collection Method: Cyber Activities
Speaker Notes
Read the slide text out-loud and remind research participants that all
information regarding the research project will be emailed to them
two weeks prior to the start date.
Please follow this link: https://sos.fbi.gov./. Pay close attention to
the instructions. After completing all sections, take the quiz. The
game only allows for one attempt. For addition resources, click the
link below (internet security tutorial):
http://www.netsmartz.org/Presentations/Tweens
Sharing of the Results
Speaker Notes
The lead researcher should draft a research report and then present
the findings at XYZ next school-board meeting (time and date to be
decided) (Lodico, Spaulding, & Voegtle, 2010).
In addition, he/she should give a certified copy to all board members
two weeks prior to the meeting date (Lodico, Spaulding, & Voegtle,
2010). Please contact the research director for further guidance. The
report should include the following (see next slide):
Speaker Notes
•The research context and background data
•Literature review
•Practice to improve
•Description of action plan and implementation procedures
•Data collection methods
•Data analysis and results
•Reflection, implications, and recommendations
•References
Week 3 Assignment: Analyze Action Research
This concludes the presentation.
Let’s take a few moments for questions, thoughts, or comments.
References
Creswell, J. W. (2013). Qualitative inquiry and research design: Choosing
among five approaches. Thousand Oaks, CA: Sage Publications.
Creswell, J.W. (2012). Educational research: planning, conducting and
evaluating quantitative and qualitative research (4th Ed.). Boston, MA:
Pearson Education Inc.
Jang-Jaccard, J., & Nepal, S. (2014). A survey of emerging threats in
cybersecurity. Journal of Computer and System Sciences, 80(5), pp. 973–993.
http://dx.doi.org/ 10.1016/j.jcss.2014.02.005
References
Lodico, M., Spaulding, D., & Voegtle, K. (2010). Methods in educational
research: From theory to practice (Laureate Education, Inc., custom ed.). San
Francisco: John Wiley & Sons.
Mazzarello, S., Fralick, M., & Clemons, M. (2016). A simple approach for
eliminating spam. Current Oncology, 23(1), e75-e76.
https://doi:10.3747/co.23.2860
Mills, G. E. (2014). Action research: A guide for the teacher researcher (5th
eds.). London: Pearson Education Limited.
References
National Center for Education Statistics. (2016, May). Indicators of school crime
and safety. Retrieved from
Ng Chong, G., Kanagasundram, S., Yee Hway, A., Tan Loong, H., & Teoh Kar,
M. (2016). Cyber bullying: A new social menace. ASEAN Journal of
Psychiatry, 17(1), 104-115. Retrieved
fromhttps://umexpert.um.edu.my/file/publication/00012227_134529.pdf
Ott, K. (2017, 03). The internet endureth forever. Sojourners Magazine, 46, pp.
30-33. Retrieved from
file:///C:/Users/educa/Desktop/EduProposals/The%20Internet.pdf
References
Prieger, J. (2013). The impact of government policies on access to broadband.
School of public policy working papers. Retrieved from
http://digitalcommons.pepperdine.edu/cgi/viewcontent.cgi?article=1043&contex
t=sppworkingpapers
Shillair, R., Cotten, S. R., Tsai, H. S., Alhabash, S., LaRose, R., & Rifon, N. J.
(2015). Online safety begins with you and me: Convincing Internet users to
protect themselves. Computers in Human Behavior, 48, pp. 199-207.
https://doi.org/10.1016/j.chb.2015.01.046
The Importance of Passwords (n.d.). University of Ottawa, Canada.
Retrieved from https://it.uottawa.ca/accounts/password-tips
References
Tomczyk, Ł., & Kopecký, K. (2016). Children and youth safety on the Internet:
Experiences from Czech Republic and Poland. Telematics and Informatics, 33,
pp. 822-833. Retrieved from
https://www.researchgate.net/profile/Lukasz_Tomczyk/publication/285288746_
Children_and_Youth_Safety_on_Internet_Experiences_from_Czech_Republic_
and_Poland/links/56d3138108aeb52500d1829c/Children-and-Youth-Safety-on-
Internet-Experiences-from-Czech-Republic-and-Poland.pdf

More Related Content

What's hot

EDRD*6000 - SlideShare Presentation - Paul Simon
EDRD*6000 - SlideShare Presentation - Paul SimonEDRD*6000 - SlideShare Presentation - Paul Simon
EDRD*6000 - SlideShare Presentation - Paul Simon
Paul Simon
 
Open Science and Ethics studies in SLE research
Open Science and Ethics studies in SLE researchOpen Science and Ethics studies in SLE research
Open Science and Ethics studies in SLE research
davinia.hl
 
An Examination of the Prior Use of E-Learning Within an Extended Technology A...
An Examination of the Prior Use of E-Learning Within an Extended Technology A...An Examination of the Prior Use of E-Learning Within an Extended Technology A...
An Examination of the Prior Use of E-Learning Within an Extended Technology A...
Maurice Dawson
 
A Multimedia Data Mining Framework for Monitoring E-Examination Environment
A Multimedia Data Mining Framework for Monitoring E-Examination EnvironmentA Multimedia Data Mining Framework for Monitoring E-Examination Environment
A Multimedia Data Mining Framework for Monitoring E-Examination Environment
ijma
 
Information Literacy for Engineering Students
Information Literacy for Engineering StudentsInformation Literacy for Engineering Students
Information Literacy for Engineering Students
John Meier
 
Why ethics?
Why ethics?Why ethics?
Why ethics?
Robert Farrow
 
Time management of internet dependency among university students and its impa...
Time management of internet dependency among university students and its impa...Time management of internet dependency among university students and its impa...
Time management of internet dependency among university students and its impa...
Alexander Decker
 
Turning Learning into Numbers - A Learning Analytics Framework
Turning Learning into Numbers - A Learning Analytics FrameworkTurning Learning into Numbers - A Learning Analytics Framework
Turning Learning into Numbers - A Learning Analytics Framework
Hendrik Drachsler
 
Promoting Reading Through Web Engagement
Promoting Reading Through Web EngagementPromoting Reading Through Web Engagement
Promoting Reading Through Web Engagement
Thadthong Bhrammanee JJ/Ja-ay
 
Lak15workshop vulnerability
Lak15workshop vulnerabilityLak15workshop vulnerability
Lak15workshop vulnerability
Sharon Slade
 
Technology and Student Affairs
Technology and Student AffairsTechnology and Student Affairs
Technology and Student Affairs
Leslie Dare
 
Towards Tangible Trusted Learning Analytics
Towards Tangible Trusted Learning AnalyticsTowards Tangible Trusted Learning Analytics
Towards Tangible Trusted Learning Analytics
Hendrik Drachsler
 
Developing a multiple-document-processing performance assessment for epistem...
 Developing a multiple-document-processing performance assessment for epistem... Developing a multiple-document-processing performance assessment for epistem...
Developing a multiple-document-processing performance assessment for epistem...
Simon Knight
 
Six dimensions of Learning Analytics
Six dimensions of Learning AnalyticsSix dimensions of Learning Analytics
Six dimensions of Learning Analytics
Hendrik Drachsler
 
Academic Integrity Keynote
Academic Integrity KeynoteAcademic Integrity Keynote
Academic Integrity Keynote
Alec Couros
 
Keynote speech - Carole Goble - Jisc Digital Festival 2015
Keynote speech - Carole Goble - Jisc Digital Festival 2015Keynote speech - Carole Goble - Jisc Digital Festival 2015
Keynote speech - Carole Goble - Jisc Digital Festival 2015
Jisc
 
Learning Analytics – Ethical questions and dilemmas
Learning Analytics  – Ethical questions and dilemmasLearning Analytics  – Ethical questions and dilemmas
Learning Analytics – Ethical questions and dilemmas
Tore Hoel
 
edmedia2014-learning-analytics-keynote
edmedia2014-learning-analytics-keynoteedmedia2014-learning-analytics-keynote
edmedia2014-learning-analytics-keynote
Simon Buckingham Shum
 
Conole Inaugural Final
Conole Inaugural FinalConole Inaugural Final
Conole Inaugural Finalgrainne
 
Dealing with the plague of plagiarism in nigeria
Dealing with the plague of plagiarism in nigeriaDealing with the plague of plagiarism in nigeria
Dealing with the plague of plagiarism in nigeria
Alexander Decker
 

What's hot (20)

EDRD*6000 - SlideShare Presentation - Paul Simon
EDRD*6000 - SlideShare Presentation - Paul SimonEDRD*6000 - SlideShare Presentation - Paul Simon
EDRD*6000 - SlideShare Presentation - Paul Simon
 
Open Science and Ethics studies in SLE research
Open Science and Ethics studies in SLE researchOpen Science and Ethics studies in SLE research
Open Science and Ethics studies in SLE research
 
An Examination of the Prior Use of E-Learning Within an Extended Technology A...
An Examination of the Prior Use of E-Learning Within an Extended Technology A...An Examination of the Prior Use of E-Learning Within an Extended Technology A...
An Examination of the Prior Use of E-Learning Within an Extended Technology A...
 
A Multimedia Data Mining Framework for Monitoring E-Examination Environment
A Multimedia Data Mining Framework for Monitoring E-Examination EnvironmentA Multimedia Data Mining Framework for Monitoring E-Examination Environment
A Multimedia Data Mining Framework for Monitoring E-Examination Environment
 
Information Literacy for Engineering Students
Information Literacy for Engineering StudentsInformation Literacy for Engineering Students
Information Literacy for Engineering Students
 
Why ethics?
Why ethics?Why ethics?
Why ethics?
 
Time management of internet dependency among university students and its impa...
Time management of internet dependency among university students and its impa...Time management of internet dependency among university students and its impa...
Time management of internet dependency among university students and its impa...
 
Turning Learning into Numbers - A Learning Analytics Framework
Turning Learning into Numbers - A Learning Analytics FrameworkTurning Learning into Numbers - A Learning Analytics Framework
Turning Learning into Numbers - A Learning Analytics Framework
 
Promoting Reading Through Web Engagement
Promoting Reading Through Web EngagementPromoting Reading Through Web Engagement
Promoting Reading Through Web Engagement
 
Lak15workshop vulnerability
Lak15workshop vulnerabilityLak15workshop vulnerability
Lak15workshop vulnerability
 
Technology and Student Affairs
Technology and Student AffairsTechnology and Student Affairs
Technology and Student Affairs
 
Towards Tangible Trusted Learning Analytics
Towards Tangible Trusted Learning AnalyticsTowards Tangible Trusted Learning Analytics
Towards Tangible Trusted Learning Analytics
 
Developing a multiple-document-processing performance assessment for epistem...
 Developing a multiple-document-processing performance assessment for epistem... Developing a multiple-document-processing performance assessment for epistem...
Developing a multiple-document-processing performance assessment for epistem...
 
Six dimensions of Learning Analytics
Six dimensions of Learning AnalyticsSix dimensions of Learning Analytics
Six dimensions of Learning Analytics
 
Academic Integrity Keynote
Academic Integrity KeynoteAcademic Integrity Keynote
Academic Integrity Keynote
 
Keynote speech - Carole Goble - Jisc Digital Festival 2015
Keynote speech - Carole Goble - Jisc Digital Festival 2015Keynote speech - Carole Goble - Jisc Digital Festival 2015
Keynote speech - Carole Goble - Jisc Digital Festival 2015
 
Learning Analytics – Ethical questions and dilemmas
Learning Analytics  – Ethical questions and dilemmasLearning Analytics  – Ethical questions and dilemmas
Learning Analytics – Ethical questions and dilemmas
 
edmedia2014-learning-analytics-keynote
edmedia2014-learning-analytics-keynoteedmedia2014-learning-analytics-keynote
edmedia2014-learning-analytics-keynote
 
Conole Inaugural Final
Conole Inaugural FinalConole Inaugural Final
Conole Inaugural Final
 
Dealing with the plague of plagiarism in nigeria
Dealing with the plague of plagiarism in nigeriaDealing with the plague of plagiarism in nigeria
Dealing with the plague of plagiarism in nigeria
 

Similar to EDR 8204 Week 3 Assignment: Analyze Action Research

EDR8204-3
EDR8204-3 EDR8204-3
EDR8204-3
eckchela
 
Designing a Survey Study to Measure the Diversity of Digital Learners
Designing a Survey Study to Measure the Diversity of Digital Learners Designing a Survey Study to Measure the Diversity of Digital Learners
Designing a Survey Study to Measure the Diversity of Digital Learners
IJITE
 
Designing a Survey Study to Measure the Diversity of Digital Learners
Designing a Survey Study to Measure the Diversity of Digital LearnersDesigning a Survey Study to Measure the Diversity of Digital Learners
Designing a Survey Study to Measure the Diversity of Digital Learners
IJITE
 
144 presentation iee_tel2021
144 presentation iee_tel2021144 presentation iee_tel2021
144 presentation iee_tel2021
Malinka Ivanova
 
Doing Your Part to Stay Safe Online
Doing Your Part to Stay Safe OnlineDoing Your Part to Stay Safe Online
Doing Your Part to Stay Safe Online
reamatthews
 
Universal Design for Learning: A framework for addressing learner diversity
Universal Design for Learning: A framework for addressing learner diversityUniversal Design for Learning: A framework for addressing learner diversity
Universal Design for Learning: A framework for addressing learner diversity
Harvard Web Working Group
 
Working with Social Media Data: Ethics & good practice around collecting, usi...
Working with Social Media Data: Ethics & good practice around collecting, usi...Working with Social Media Data: Ethics & good practice around collecting, usi...
Working with Social Media Data: Ethics & good practice around collecting, usi...
Nicola Osborne
 
PP for syncrinization
PP for syncrinizationPP for syncrinization
PP for syncrinizationasteggalllewis
 
Munassir etec647 e presentation
Munassir etec647 e presentationMunassir etec647 e presentation
Munassir etec647 e presentationMunassir Alhamami
 
Irjet v4 i73A Survey on Student’s Academic Experiences using Social Media Data53
Irjet v4 i73A Survey on Student’s Academic Experiences using Social Media Data53Irjet v4 i73A Survey on Student’s Academic Experiences using Social Media Data53
Irjet v4 i73A Survey on Student’s Academic Experiences using Social Media Data53
IRJET Journal
 
MOOCs & Learning Analytics
MOOCs & Learning AnalyticsMOOCs & Learning Analytics
MOOCs & Learning Analytics
EDSA project
 
Krakow presentation speak_appsmngm_final
Krakow presentation speak_appsmngm_finalKrakow presentation speak_appsmngm_final
Krakow presentation speak_appsmngm_final
SpeakApps Project
 
Computers in Human Behavior xxx (2012) xxx–xxxContents lists.docx
Computers in Human Behavior xxx (2012) xxx–xxxContents lists.docxComputers in Human Behavior xxx (2012) xxx–xxxContents lists.docx
Computers in Human Behavior xxx (2012) xxx–xxxContents lists.docx
patricke8
 
Eurocall2014 SpeakApps Presentation - SpeakApps and Learning Analytics
Eurocall2014 SpeakApps Presentation - SpeakApps and Learning AnalyticsEurocall2014 SpeakApps Presentation - SpeakApps and Learning Analytics
Eurocall2014 SpeakApps Presentation - SpeakApps and Learning Analytics
SpeakApps Project
 
[DSC Europe 22] Machine learning algorithms as tools for student success pred...
[DSC Europe 22] Machine learning algorithms as tools for student success pred...[DSC Europe 22] Machine learning algorithms as tools for student success pred...
[DSC Europe 22] Machine learning algorithms as tools for student success pred...
DataScienceConferenc1
 
Organizing to Get Analytics Right
Organizing to Get Analytics RightOrganizing to Get Analytics Right
Organizing to Get Analytics Right
Vince Kellen, Ph.D.
 
Keynote Presentation: Implementing learning analytics and learning design at ...
Keynote Presentation: Implementing learning analytics and learning design at ...Keynote Presentation: Implementing learning analytics and learning design at ...
Keynote Presentation: Implementing learning analytics and learning design at ...
Bart Rienties
 
SHEILA-CRLI seminar
SHEILA-CRLI seminarSHEILA-CRLI seminar
SHEILA-CRLI seminar
Yi-Shan Tsai
 
Activities And Resources In Online Learning From A Critical Thinking View
Activities And Resources In Online Learning  From A Critical Thinking ViewActivities And Resources In Online Learning  From A Critical Thinking View
Activities And Resources In Online Learning From A Critical Thinking View
Samantha Martinez
 

Similar to EDR 8204 Week 3 Assignment: Analyze Action Research (20)

EDR8204-3
EDR8204-3 EDR8204-3
EDR8204-3
 
Designing a Survey Study to Measure the Diversity of Digital Learners
Designing a Survey Study to Measure the Diversity of Digital Learners Designing a Survey Study to Measure the Diversity of Digital Learners
Designing a Survey Study to Measure the Diversity of Digital Learners
 
Designing a Survey Study to Measure the Diversity of Digital Learners
Designing a Survey Study to Measure the Diversity of Digital LearnersDesigning a Survey Study to Measure the Diversity of Digital Learners
Designing a Survey Study to Measure the Diversity of Digital Learners
 
144 presentation iee_tel2021
144 presentation iee_tel2021144 presentation iee_tel2021
144 presentation iee_tel2021
 
Doing Your Part to Stay Safe Online
Doing Your Part to Stay Safe OnlineDoing Your Part to Stay Safe Online
Doing Your Part to Stay Safe Online
 
Universal Design for Learning: A framework for addressing learner diversity
Universal Design for Learning: A framework for addressing learner diversityUniversal Design for Learning: A framework for addressing learner diversity
Universal Design for Learning: A framework for addressing learner diversity
 
Working with Social Media Data: Ethics & good practice around collecting, usi...
Working with Social Media Data: Ethics & good practice around collecting, usi...Working with Social Media Data: Ethics & good practice around collecting, usi...
Working with Social Media Data: Ethics & good practice around collecting, usi...
 
PP for syncrinization
PP for syncrinizationPP for syncrinization
PP for syncrinization
 
Munassir etec647 e presentation
Munassir etec647 e presentationMunassir etec647 e presentation
Munassir etec647 e presentation
 
Irjet v4 i73A Survey on Student’s Academic Experiences using Social Media Data53
Irjet v4 i73A Survey on Student’s Academic Experiences using Social Media Data53Irjet v4 i73A Survey on Student’s Academic Experiences using Social Media Data53
Irjet v4 i73A Survey on Student’s Academic Experiences using Social Media Data53
 
Mseit advisory mtgoctober2013
Mseit advisory mtgoctober2013Mseit advisory mtgoctober2013
Mseit advisory mtgoctober2013
 
MOOCs & Learning Analytics
MOOCs & Learning AnalyticsMOOCs & Learning Analytics
MOOCs & Learning Analytics
 
Krakow presentation speak_appsmngm_final
Krakow presentation speak_appsmngm_finalKrakow presentation speak_appsmngm_final
Krakow presentation speak_appsmngm_final
 
Computers in Human Behavior xxx (2012) xxx–xxxContents lists.docx
Computers in Human Behavior xxx (2012) xxx–xxxContents lists.docxComputers in Human Behavior xxx (2012) xxx–xxxContents lists.docx
Computers in Human Behavior xxx (2012) xxx–xxxContents lists.docx
 
Eurocall2014 SpeakApps Presentation - SpeakApps and Learning Analytics
Eurocall2014 SpeakApps Presentation - SpeakApps and Learning AnalyticsEurocall2014 SpeakApps Presentation - SpeakApps and Learning Analytics
Eurocall2014 SpeakApps Presentation - SpeakApps and Learning Analytics
 
[DSC Europe 22] Machine learning algorithms as tools for student success pred...
[DSC Europe 22] Machine learning algorithms as tools for student success pred...[DSC Europe 22] Machine learning algorithms as tools for student success pred...
[DSC Europe 22] Machine learning algorithms as tools for student success pred...
 
Organizing to Get Analytics Right
Organizing to Get Analytics RightOrganizing to Get Analytics Right
Organizing to Get Analytics Right
 
Keynote Presentation: Implementing learning analytics and learning design at ...
Keynote Presentation: Implementing learning analytics and learning design at ...Keynote Presentation: Implementing learning analytics and learning design at ...
Keynote Presentation: Implementing learning analytics and learning design at ...
 
SHEILA-CRLI seminar
SHEILA-CRLI seminarSHEILA-CRLI seminar
SHEILA-CRLI seminar
 
Activities And Resources In Online Learning From A Critical Thinking View
Activities And Resources In Online Learning  From A Critical Thinking ViewActivities And Resources In Online Learning  From A Critical Thinking View
Activities And Resources In Online Learning From A Critical Thinking View
 

More from eckchela

Aspen University EDD830 Module 5 Discussion Question
Aspen University EDD830 Module 5  Discussion QuestionAspen University EDD830 Module 5  Discussion Question
Aspen University EDD830 Module 5 Discussion Question
eckchela
 
EDD830-Leadership Theory: Module 3 Assignment
EDD830-Leadership Theory: Module 3 AssignmentEDD830-Leadership Theory: Module 3 Assignment
EDD830-Leadership Theory: Module 3 Assignment
eckchela
 
Why is leadership a key issue in management?
Why is leadership a key issue in management? Why is leadership a key issue in management?
Why is leadership a key issue in management?
eckchela
 
DPSY-6215-2 and PSYC-6215-2: Week 10 Discussion
DPSY-6215-2 and PSYC-6215-2: Week 10 DiscussionDPSY-6215-2 and PSYC-6215-2: Week 10 Discussion
DPSY-6215-2 and PSYC-6215-2: Week 10 Discussion
eckchela
 
Walden University DPSY 6215/8215
Walden University DPSY 6215/8215Walden University DPSY 6215/8215
Walden University DPSY 6215/8215
eckchela
 
DPSY 8215/ PSY Week 5 Discussion: Infancy and Childhood
DPSY 8215/ PSY  Week 5 Discussion: Infancy and ChildhoodDPSY 8215/ PSY  Week 5 Discussion: Infancy and Childhood
DPSY 8215/ PSY Week 5 Discussion: Infancy and Childhood
eckchela
 
DPSY 6215-2/ PSYC 6215-2 Week 2: Social and Cognitive Development
DPSY 6215-2/ PSYC 6215-2 Week 2: Social and Cognitive DevelopmentDPSY 6215-2/ PSYC 6215-2 Week 2: Social and Cognitive Development
DPSY 6215-2/ PSYC 6215-2 Week 2: Social and Cognitive Development
eckchela
 
DPSY 6121/8121 Week 11 Dscussion
DPSY 6121/8121 Week 11 DscussionDPSY 6121/8121 Week 11 Dscussion
DPSY 6121/8121 Week 11 Dscussion
eckchela
 
DPSY 6121-8121 Week 10 Final Project: Mitigation Plan
DPSY 6121-8121 Week 10 Final Project: Mitigation PlanDPSY 6121-8121 Week 10 Final Project: Mitigation Plan
DPSY 6121-8121 Week 10 Final Project: Mitigation Plan
eckchela
 
DPSY Week-9 Discussion 2: Generational Differences
DPSY Week-9 Discussion 2: Generational DifferencesDPSY Week-9 Discussion 2: Generational Differences
DPSY Week-9 Discussion 2: Generational Differences
eckchela
 
DPSY 6121/8121 Discussion Week 7: Cyber-Victimization
DPSY 6121/8121 Discussion Week 7: Cyber-VictimizationDPSY 6121/8121 Discussion Week 7: Cyber-Victimization
DPSY 6121/8121 Discussion Week 7: Cyber-Victimization
eckchela
 
DPSY 5111 6121-8121 Week 6 Discussion
DPSY 5111 6121-8121 Week 6 DiscussionDPSY 5111 6121-8121 Week 6 Discussion
DPSY 5111 6121-8121 Week 6 Discussion
eckchela
 
DPSY 6121-8121-5121 Week 5 Discussion 1
DPSY 6121-8121-5121 Week 5 Discussion 1DPSY 6121-8121-5121 Week 5 Discussion 1
DPSY 6121-8121-5121 Week 5 Discussion 1
eckchela
 
EL-7010 Week 1 Assignment: Online Learning for the K-12 Students
EL-7010 Week 1 Assignment: Online Learning for the K-12 StudentsEL-7010 Week 1 Assignment: Online Learning for the K-12 Students
EL-7010 Week 1 Assignment: Online Learning for the K-12 Students
eckchela
 
DPSY 5111-6111 Week 3 Assignment: Final Project: Mitigation Plan
DPSY 5111-6111 Week 3 Assignment: Final Project: Mitigation PlanDPSY 5111-6111 Week 3 Assignment: Final Project: Mitigation Plan
DPSY 5111-6111 Week 3 Assignment: Final Project: Mitigation Plan
eckchela
 
DPSY 8111/6112 Week 5 Assignment
DPSY 8111/6112 Week 5 AssignmentDPSY 8111/6112 Week 5 Assignment
DPSY 8111/6112 Week 5 Assignment
eckchela
 
DPSY-8111-DPSY 6111 Week 10 Project: Retirement Issues
DPSY-8111-DPSY 6111 Week 10 Project: Retirement IssuesDPSY-8111-DPSY 6111 Week 10 Project: Retirement Issues
DPSY-8111-DPSY 6111 Week 10 Project: Retirement Issues
eckchela
 
Thread: Discussion - Week 8 – DPSY-6111-1/DPSY-5111-1
Thread: Discussion - Week 8 – DPSY-6111-1/DPSY-5111-1Thread: Discussion - Week 8 – DPSY-6111-1/DPSY-5111-1
Thread: Discussion - Week 8 – DPSY-6111-1/DPSY-5111-1
eckchela
 
Thread: Discussion 1 - Week 7 – DPSY-6111-1/DPSY-5111-1
Thread: Discussion 1 - Week 7 – DPSY-6111-1/DPSY-5111-1Thread: Discussion 1 - Week 7 – DPSY-6111-1/DPSY-5111-1
Thread: Discussion 1 - Week 7 – DPSY-6111-1/DPSY-5111-1
eckchela
 
Thread: Discussion - Week 9 – DPSY-6111-1/DPSY-5111-1
Thread: Discussion - Week 9 – DPSY-6111-1/DPSY-5111-1Thread: Discussion - Week 9 – DPSY-6111-1/DPSY-5111-1
Thread: Discussion - Week 9 – DPSY-6111-1/DPSY-5111-1
eckchela
 

More from eckchela (20)

Aspen University EDD830 Module 5 Discussion Question
Aspen University EDD830 Module 5  Discussion QuestionAspen University EDD830 Module 5  Discussion Question
Aspen University EDD830 Module 5 Discussion Question
 
EDD830-Leadership Theory: Module 3 Assignment
EDD830-Leadership Theory: Module 3 AssignmentEDD830-Leadership Theory: Module 3 Assignment
EDD830-Leadership Theory: Module 3 Assignment
 
Why is leadership a key issue in management?
Why is leadership a key issue in management? Why is leadership a key issue in management?
Why is leadership a key issue in management?
 
DPSY-6215-2 and PSYC-6215-2: Week 10 Discussion
DPSY-6215-2 and PSYC-6215-2: Week 10 DiscussionDPSY-6215-2 and PSYC-6215-2: Week 10 Discussion
DPSY-6215-2 and PSYC-6215-2: Week 10 Discussion
 
Walden University DPSY 6215/8215
Walden University DPSY 6215/8215Walden University DPSY 6215/8215
Walden University DPSY 6215/8215
 
DPSY 8215/ PSY Week 5 Discussion: Infancy and Childhood
DPSY 8215/ PSY  Week 5 Discussion: Infancy and ChildhoodDPSY 8215/ PSY  Week 5 Discussion: Infancy and Childhood
DPSY 8215/ PSY Week 5 Discussion: Infancy and Childhood
 
DPSY 6215-2/ PSYC 6215-2 Week 2: Social and Cognitive Development
DPSY 6215-2/ PSYC 6215-2 Week 2: Social and Cognitive DevelopmentDPSY 6215-2/ PSYC 6215-2 Week 2: Social and Cognitive Development
DPSY 6215-2/ PSYC 6215-2 Week 2: Social and Cognitive Development
 
DPSY 6121/8121 Week 11 Dscussion
DPSY 6121/8121 Week 11 DscussionDPSY 6121/8121 Week 11 Dscussion
DPSY 6121/8121 Week 11 Dscussion
 
DPSY 6121-8121 Week 10 Final Project: Mitigation Plan
DPSY 6121-8121 Week 10 Final Project: Mitigation PlanDPSY 6121-8121 Week 10 Final Project: Mitigation Plan
DPSY 6121-8121 Week 10 Final Project: Mitigation Plan
 
DPSY Week-9 Discussion 2: Generational Differences
DPSY Week-9 Discussion 2: Generational DifferencesDPSY Week-9 Discussion 2: Generational Differences
DPSY Week-9 Discussion 2: Generational Differences
 
DPSY 6121/8121 Discussion Week 7: Cyber-Victimization
DPSY 6121/8121 Discussion Week 7: Cyber-VictimizationDPSY 6121/8121 Discussion Week 7: Cyber-Victimization
DPSY 6121/8121 Discussion Week 7: Cyber-Victimization
 
DPSY 5111 6121-8121 Week 6 Discussion
DPSY 5111 6121-8121 Week 6 DiscussionDPSY 5111 6121-8121 Week 6 Discussion
DPSY 5111 6121-8121 Week 6 Discussion
 
DPSY 6121-8121-5121 Week 5 Discussion 1
DPSY 6121-8121-5121 Week 5 Discussion 1DPSY 6121-8121-5121 Week 5 Discussion 1
DPSY 6121-8121-5121 Week 5 Discussion 1
 
EL-7010 Week 1 Assignment: Online Learning for the K-12 Students
EL-7010 Week 1 Assignment: Online Learning for the K-12 StudentsEL-7010 Week 1 Assignment: Online Learning for the K-12 Students
EL-7010 Week 1 Assignment: Online Learning for the K-12 Students
 
DPSY 5111-6111 Week 3 Assignment: Final Project: Mitigation Plan
DPSY 5111-6111 Week 3 Assignment: Final Project: Mitigation PlanDPSY 5111-6111 Week 3 Assignment: Final Project: Mitigation Plan
DPSY 5111-6111 Week 3 Assignment: Final Project: Mitigation Plan
 
DPSY 8111/6112 Week 5 Assignment
DPSY 8111/6112 Week 5 AssignmentDPSY 8111/6112 Week 5 Assignment
DPSY 8111/6112 Week 5 Assignment
 
DPSY-8111-DPSY 6111 Week 10 Project: Retirement Issues
DPSY-8111-DPSY 6111 Week 10 Project: Retirement IssuesDPSY-8111-DPSY 6111 Week 10 Project: Retirement Issues
DPSY-8111-DPSY 6111 Week 10 Project: Retirement Issues
 
Thread: Discussion - Week 8 – DPSY-6111-1/DPSY-5111-1
Thread: Discussion - Week 8 – DPSY-6111-1/DPSY-5111-1Thread: Discussion - Week 8 – DPSY-6111-1/DPSY-5111-1
Thread: Discussion - Week 8 – DPSY-6111-1/DPSY-5111-1
 
Thread: Discussion 1 - Week 7 – DPSY-6111-1/DPSY-5111-1
Thread: Discussion 1 - Week 7 – DPSY-6111-1/DPSY-5111-1Thread: Discussion 1 - Week 7 – DPSY-6111-1/DPSY-5111-1
Thread: Discussion 1 - Week 7 – DPSY-6111-1/DPSY-5111-1
 
Thread: Discussion - Week 9 – DPSY-6111-1/DPSY-5111-1
Thread: Discussion - Week 9 – DPSY-6111-1/DPSY-5111-1Thread: Discussion - Week 9 – DPSY-6111-1/DPSY-5111-1
Thread: Discussion - Week 9 – DPSY-6111-1/DPSY-5111-1
 

Recently uploaded

PART A. Introduction to Costumer Service
PART A. Introduction to Costumer ServicePART A. Introduction to Costumer Service
PART A. Introduction to Costumer Service
PedroFerreira53928
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
Jheel Barad
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
GeoBlogs
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
RaedMohamed3
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
Fish and Chips - have they had their chips
Fish and Chips - have they had their chipsFish and Chips - have they had their chips
Fish and Chips - have they had their chips
GeoBlogs
 
Sectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdfSectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdf
Vivekanand Anglo Vedic Academy
 
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdfESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
Fundacja Rozwoju Społeczeństwa Przedsiębiorczego
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
kaushalkr1407
 
How to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERPHow to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERP
Celine George
 
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptxMARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
bennyroshan06
 
Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxStudents, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
EduSkills OECD
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
Anna Sz.
 

Recently uploaded (20)

PART A. Introduction to Costumer Service
PART A. Introduction to Costumer ServicePART A. Introduction to Costumer Service
PART A. Introduction to Costumer Service
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
Fish and Chips - have they had their chips
Fish and Chips - have they had their chipsFish and Chips - have they had their chips
Fish and Chips - have they had their chips
 
Sectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdfSectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdf
 
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdfESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
 
How to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERPHow to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERP
 
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptxMARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
 
Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......
 
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxStudents, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
 

EDR 8204 Week 3 Assignment: Analyze Action Research

  • 1. Week 3 Assignment: Analyze Action Research log Teaching and Learning Orlanda Haynes North Central University School of Education Ed. D Student EDR 8204-3 - summer 2018 Copyright Note: All images used in this presentation have been confirmed to be either in the public domain, of expired copyright status, licensed under the GNU Free Documentation License, or using creative commons license
  • 2. Speaker Notes Hello, everyone! I’m Orlanda Haynes. Thanks for joining the presentation on “Analyze Action Research.” This presentation is an example of an action research project within an education environment. The primary aim is to address specific problems or issues (effectively) in applied settings and in real-time (Creswell, 2012; Mills, 2014).
  • 3. When to Use Action Research • To address specific problems or issues in applied settings • To create reflective opportunities about problems or issues • To offer means to staff development (e.g., education practitioners) • To improve work related practices, in part, by being participants
  • 4. Primary Types of Action Research •Practical •Participatory
  • 5. In teaching and learning environments, practical research occurs when the aim is to improve teaching methods, to help students learn more effectively, and to create educational settings that are proactive and content relevant. Usually, projects involve small-scaled and narrowly focused plans, which address specific issues or problems (Creswell, 2012). On the other hand, participatory inquiries refer to plans designed to address social, organizational, or community problems. The primary purpose is to improve people’s lives by empowering them to create solutions that address specific problems or issues (Lodico, Spaulding, & Voegtle, 2010; Mills, 2014). An issue of interest could be, for instance, to repeal public schools textbook publication laws, which allow the omission of important historical figures and cultural events. Speaker Notes
  • 6. A Sample Action Research Project Internet Safety Grade levels 6th – 12th
  • 7. Speaker Notes Most schools rely on internet access for all manners of teaching, learning, and communication needs (Prieger, 2013). Tomczyk and KopeckĂ˝ (2016) noted that “ . . . Systematic use of . . . Electronic media begins . . . At the age of 7–11” (Abstract). They went on to say that “The very devices that are easily used . . . Become an open door for unscrupulous forces to steal information and seize control of machines for nefarious purposes;[the] problem is multi-faceted” . . . .
  • 8. Speaker Notes Moreover, Shillair et al. (2015) conducted a study entitled “Online Safety Begins with You and Me: Convincing Internet Users to Protect Themselves.” They discovered that most online schools, colleges, and universities post messages on their websites about how students should protect themselves while engaging in cyber environments (Ng Chong, Kanagasundram, Yee Hway, Loong, & Teoh Kar, 2016; Prieger, 2013; Shillair et al., 2015; Tomczyk & KopeckĂ˝, 2016).
  • 9. Speaker Notes Despite these measures, however, administrators at XYZ Middle school district (in 2016) reported an alarming increase in students’ complaints about the lack of internet security, especially password protection. To address the problem, in January of 2018, the school board approved an action research plan that included a mandatory cybersecurity program (for both students and staff) and an annual district-wide survey to include all staff as well as students and parent.
  • 10. A Sample Action Research Problem Statement • Students in grades levels six through 12th lack sufficient Internet safety skills to cope with emerging cyber threats.
  • 11. Purpose of the Research • To determine the cause of the problem and to recommend an effective solution • To build a web-based education program based on best practice for emerging cyber-threats • To emphasize the importance of internet security and to encourage students’ awareness by sharing knowledge about internet security resources and by implementing a mandatory cyber-security activity
  • 12. Goals of the Research Upon completion of the Cyber Security program, students will understand: • Basic Internet terminologies, tools, and resources; • Primary Internet security problems and implications; • How to recognize cyber-threats; • What does “the Internet is forever means”; • The importance of password protection; and • Concepts of Spam and Phishing?
  • 14. Speaker Notes Why are “passwords” important? They help protect end-users’ data privacy when they engage in online activities (Shillair, et al., 2015). The University of Ottawa, Canada, published the article “The Importance of Passwords ” to emphasize current and emerging cyber communication threats. They noted that students should not create common passwords such as yellow123 because common colors joined by standard sequence of numbers are too easy for cyber hackers to steal and use inappropriately (The Importance of Passwords, n.d.).
  • 15. Goals of the Research Spam and Phishing?
  • 16. Speaker Notes Most students are familiar with junk mail, which is unauthorized advertisements from companies and individuals via standard mail or other third party mail delivery services. Spam is its equivalent, which is usually sent via emails and text messages (Mazzarello, Fralick, & Clemons, 2016). But how do they obtain your addresses? You may ask. Commercial, mailing-list vendors and internet software programs designed to identify and compile electronic addresses are common sources. Likewise, phishing share similar characteristics as far as being unsolicited and using similar delivery options (Mazzarello, Fralick, & Clemons, 2016;Tomczyk, & KopeckĂ˝, 2016). However, the purpose is different.
  • 17. Speaker Notes Most business communities, for instance, label the act a scam because cyber hackers and cyberthieves shop for personal information including passwords, credit cards and bank account numbers, as well as social security numbers. Their sole purpose is to commit fraud (Mazzarello, Fralick, & Clemons, 2016;Tomczyk, & KopeckĂ˝, 2016).
  • 19. Speaker Notes Students and staff will complete two online surveys (e.g., before and after the research) based on closed-ended research questions and a cybersecurity online activity; they will also complete a standardized exam (Lodico, Spaulding, & Voegtle, 2010). Researchers will ask parents, via phone or email, to take part in the surveys; however, the cybersecurity online activity will be optional although recommended. They will also issue passwords to all participants and follow standard research protocol for conducting research with human subjects (Mills, 2014).
  • 20. Data Collection Methods Survey Question Pro Online Program http://www.questionpro.com/aki ra/ShowResults?id=161974)
  • 21. Data Collection Method: Cyber Activities
  • 22. Speaker Notes Read the slide text out-loud and remind research participants that all information regarding the research project will be emailed to them two weeks prior to the start date. Please follow this link: https://sos.fbi.gov./. Pay close attention to the instructions. After completing all sections, take the quiz. The game only allows for one attempt. For addition resources, click the link below (internet security tutorial): http://www.netsmartz.org/Presentations/Tweens
  • 23. Sharing of the Results
  • 24. Speaker Notes The lead researcher should draft a research report and then present the findings at XYZ next school-board meeting (time and date to be decided) (Lodico, Spaulding, & Voegtle, 2010). In addition, he/she should give a certified copy to all board members two weeks prior to the meeting date (Lodico, Spaulding, & Voegtle, 2010). Please contact the research director for further guidance. The report should include the following (see next slide):
  • 25. Speaker Notes •The research context and background data •Literature review •Practice to improve •Description of action plan and implementation procedures •Data collection methods •Data analysis and results •Reflection, implications, and recommendations •References
  • 26. Week 3 Assignment: Analyze Action Research This concludes the presentation. Let’s take a few moments for questions, thoughts, or comments.
  • 27. References Creswell, J. W. (2013). Qualitative inquiry and research design: Choosing among five approaches. Thousand Oaks, CA: Sage Publications. Creswell, J.W. (2012). Educational research: planning, conducting and evaluating quantitative and qualitative research (4th Ed.). Boston, MA: Pearson Education Inc. Jang-Jaccard, J., & Nepal, S. (2014). A survey of emerging threats in cybersecurity. Journal of Computer and System Sciences, 80(5), pp. 973–993. http://dx.doi.org/ 10.1016/j.jcss.2014.02.005
  • 28. References Lodico, M., Spaulding, D., & Voegtle, K. (2010). Methods in educational research: From theory to practice (Laureate Education, Inc., custom ed.). San Francisco: John Wiley & Sons. Mazzarello, S., Fralick, M., & Clemons, M. (2016). A simple approach for eliminating spam. Current Oncology, 23(1), e75-e76. https://doi:10.3747/co.23.2860 Mills, G. E. (2014). Action research: A guide for the teacher researcher (5th eds.). London: Pearson Education Limited.
  • 29. References National Center for Education Statistics. (2016, May). Indicators of school crime and safety. Retrieved from Ng Chong, G., Kanagasundram, S., Yee Hway, A., Tan Loong, H., & Teoh Kar, M. (2016). Cyber bullying: A new social menace. ASEAN Journal of Psychiatry, 17(1), 104-115. Retrieved fromhttps://umexpert.um.edu.my/file/publication/00012227_134529.pdf Ott, K. (2017, 03). The internet endureth forever. Sojourners Magazine, 46, pp. 30-33. Retrieved from file:///C:/Users/educa/Desktop/EduProposals/The%20Internet.pdf
  • 30. References Prieger, J. (2013). The impact of government policies on access to broadband. School of public policy working papers. Retrieved from http://digitalcommons.pepperdine.edu/cgi/viewcontent.cgi?article=1043&contex t=sppworkingpapers Shillair, R., Cotten, S. R., Tsai, H. S., Alhabash, S., LaRose, R., & Rifon, N. J. (2015). Online safety begins with you and me: Convincing Internet users to protect themselves. Computers in Human Behavior, 48, pp. 199-207. https://doi.org/10.1016/j.chb.2015.01.046 The Importance of Passwords (n.d.). University of Ottawa, Canada. Retrieved from https://it.uottawa.ca/accounts/password-tips
  • 31. References Tomczyk, Ł., & KopeckĂ˝, K. (2016). Children and youth safety on the Internet: Experiences from Czech Republic and Poland. Telematics and Informatics, 33, pp. 822-833. Retrieved from https://www.researchgate.net/profile/Lukasz_Tomczyk/publication/285288746_ Children_and_Youth_Safety_on_Internet_Experiences_from_Czech_Republic_ and_Poland/links/56d3138108aeb52500d1829c/Children-and-Youth-Safety-on- Internet-Experiences-from-Czech-Republic-and-Poland.pdf