SlideShare a Scribd company logo
Week 3 Assignment: Analyze Action Research
log Teaching and Learning
Orlanda Haynes
North Central University
School of Education
Ed. D Student
EDR8204-3 - summer 2018
Copyright Note: All images used in this presentation have been confirmed to be either in the
public domain, of expired copyright status, licensed under the GNU Free Documentation
License, or using creative commons license
When to Use Action Research
• To address specific problems or
issues in applied settings
• To create reflective opportunities
about problems or issues
• To offer means to staff
development (e.g., education
practitioners)
• To improve work related practices,
in part, by being participants
Primary Types of Action Research
•Practical
•Participatory
A Sample Action
Research Project
Internet Safety
Grade levels
6th – 12th
A Sample Action Research Problem Statement
• Students in grades
levels six through
12th lack sufficient
Internet safety skills
to cope with
emerging cyber
threats.
Purpose of the Research
• determine the causes,
• build a web-based education program
based on best practice for emerging
cyber threats,
• emphasize the importance of Internet
security, and
• encourage students’ awareness
by share knowledge about
Internet security resources and
by implementing a mandatory
cyber security activity
Goals of the Research
Upon completion of the Cyber
Security program, students will
understand:
• Basic Internet terminologies, tools,
and resources;
• Primary Internet security problems
and implications;
• How to recognize cyber threats;
• What does “the Internet is forever
means”;
• The importance of password
protection;
• Spam and Phishing?
Why are
Passwords
Important?
Goals of the Research
Goals of the Research
Spam and Phishing?
The Participants
Students and Staff Parents
Data Collection Methods
Survey
QuestionPro Online Program
http://www.questionpro.com/aki
ra/ShowResults?id=161974)
Data Collection Method: Cyber Activities
Sharing of the Results
Week 3 Assignment: Analyze Action Research
Questions /Thoughts/ Comments
References
Creswell, J. W. (2013). Qualitative inquiry and research design: Choosing
among five approaches. Thousand Oaks, CA: Sage Publications.
Creswell, J.W. (2012). Educational research: planning, conducting and
evaluating quantitative and qualitative research (4th Ed.). Boston, MA: Pearson
Education Inc.
Jang-Jaccard, J., & Nepal, S. (2014). A survey of emerging threats in
cybersecurity. Journal of Computer and System Sciences, 80(5), pp. 973–993.
http://dx.doi.org/ 10.1016/j.jcss.2014.02.005
References
Lodico, M., Spaulding, D., & Voegtle, K. (2010). Methods in educational
research: From theory to practice (Laureate Education, Inc., custom ed.). San
Francisco: John Wiley &Sons.
Mazzarello, S., Fralick, M., & Clemons, M. (2016). A simple approach for
eliminating spam. Current Oncology, 23(1), e75-e76.
https://doi:10.3747/co.23.2860
Mills, G. E. (2014). Action research: A guide for the teacher researcher (5th
eds.). London: Pearson Education Limited.
References
National Center for Education Statistics. (2016, May). Indicators of school crime
and safety. Retrieved from
Ng Chong, G., Kanagasundram, S., Yee Hway, A., Tan Loong, H., & Teoh Kar, M.
(2016). Cyber bullying: A new social menace. ASEAN Journal of
Psychiatry, 17(1), 104-115. Retrieved
fromhttps://umexpert.um.edu.my/file/publication/00012227_134529.pdf
Ott, K. (2017, 03). The internet endureth forever. Sojourners Magazine, 46, pp.
30-33. Retrieved from
file:///C:/Users/educa/Desktop/EduProposals/The%20Internet.pdf
References
Prieger, J. (2013). The impact of government policies on access to broadband.
School of public policy working papers. Retrieved from
http://digitalcommons.pepperdine.edu/cgi/viewcontent.cgi?article=1043&contex
t=sppworkingpapers
Shillair, R., Cotten, S. R., Tsai, H. S., Alhabash, S., LaRose, R., & Rifon, N. J.
(2015). Online safety begins with you and me: Convincing Internet users to
protect themselves. Computers in Human Behavior, 48, pp. 199-207.
https://doi.org/10.1016/j.chb.2015.01.046
The Importance of Passwords (n.d.). University of Ottawa, Canada.
Retrieved from https://it.uottawa.ca/accounts/password-tips
References
Tomczyk, Ł., & Kopecký, K. (2016). Children and youth safety on the Internet:
Experiences from Czech Republic and Poland. Telematics and Informatics, 33,
pp. 822-833. Retrieved from
https://www.researchgate.net/profile/Lukasz_Tomczyk/publication/285288746_
Children_and_Youth_Safety_on_Internet_Experiences_from_Czech_Republic_
and_Poland/links/56d3138108aeb52500d1829c/Children-and-Youth-Safety-on-
Internet-Experiences-from-Czech-Republic-and-Poland.pdf

More Related Content

What's hot

An insight into Educational Data Mining at Muğla Sıtkı Koçman University, Turkey
An insight into Educational Data Mining at Muğla Sıtkı Koçman University, TurkeyAn insight into Educational Data Mining at Muğla Sıtkı Koçman University, Turkey
An insight into Educational Data Mining at Muğla Sıtkı Koçman University, Turkey
strehlst
 
Using data (analytics and analysis) to guide (e)teaching and (e)learning (upd...
Using data (analytics and analysis) to guide (e)teaching and (e)learning (upd...Using data (analytics and analysis) to guide (e)teaching and (e)learning (upd...
Using data (analytics and analysis) to guide (e)teaching and (e)learning (upd...
Poh-Sun Goh
 
What data from 3 million learners can tell us about effective course design
What data from 3 million learners can tell us about effective course designWhat data from 3 million learners can tell us about effective course design
What data from 3 million learners can tell us about effective course design
John Whitmer, Ed.D.
 
Examining the Value of Learning Analytics for Supporting Work-integrated Lear...
Examining the Value of Learning Analytics for Supporting Work-integrated Lear...Examining the Value of Learning Analytics for Supporting Work-integrated Lear...
Examining the Value of Learning Analytics for Supporting Work-integrated Lear...
Vitomir Kovanovic
 
Learning Analytics
Learning AnalyticsLearning Analytics
Learning Analytics
Stian Håklev
 
Affective behaviour cognition learning gains project presentation
Affective behaviour cognition learning gains project presentationAffective behaviour cognition learning gains project presentation
Affective behaviour cognition learning gains project presentation
Bart Rienties
 
DATA MINING IN EDUCATION : A REVIEW ON THE KNOWLEDGE DISCOVERY PERSPECTIVE
DATA MINING IN EDUCATION : A REVIEW ON THE KNOWLEDGE DISCOVERY PERSPECTIVEDATA MINING IN EDUCATION : A REVIEW ON THE KNOWLEDGE DISCOVERY PERSPECTIVE
DATA MINING IN EDUCATION : A REVIEW ON THE KNOWLEDGE DISCOVERY PERSPECTIVE
IJDKP
 
Discussant SRHE Symposium "A cross-institutional perspective on merits and ch...
Discussant SRHE Symposium "A cross-institutional perspective on merits and ch...Discussant SRHE Symposium "A cross-institutional perspective on merits and ch...
Discussant SRHE Symposium "A cross-institutional perspective on merits and ch...
Bart Rienties
 
Using Learning Analytics to Create our 'Preferred Future'
Using Learning Analytics to Create our 'Preferred Future'Using Learning Analytics to Create our 'Preferred Future'
Using Learning Analytics to Create our 'Preferred Future'
John Whitmer, Ed.D.
 
OWD2012 - 2,3 - Studiesucces verhogen met learging analytics - Mykola Pecheni...
OWD2012 - 2,3 - Studiesucces verhogen met learging analytics - Mykola Pecheni...OWD2012 - 2,3 - Studiesucces verhogen met learging analytics - Mykola Pecheni...
OWD2012 - 2,3 - Studiesucces verhogen met learging analytics - Mykola Pecheni...
SURF Events
 
USING MRQAP TO ANALYSE THE DEVELOPMENT OF MATHEMATICS PRE-SERVICE TRAINEES’ C...
USING MRQAP TO ANALYSE THE DEVELOPMENT OF MATHEMATICS PRE-SERVICE TRAINEES’ C...USING MRQAP TO ANALYSE THE DEVELOPMENT OF MATHEMATICS PRE-SERVICE TRAINEES’ C...
USING MRQAP TO ANALYSE THE DEVELOPMENT OF MATHEMATICS PRE-SERVICE TRAINEES’ C...
Christian Bokhove
 
Design principles for an innovative learner-determined mobile learning soluti...
Design principles for an innovative learner-determined mobile learning soluti...Design principles for an innovative learner-determined mobile learning soluti...
Design principles for an innovative learner-determined mobile learning soluti...
Dr. Norine Wark
 
Advances in Learning Analytics and Educational Data Mining
Advances in Learning Analytics and Educational Data Mining Advances in Learning Analytics and Educational Data Mining
Advances in Learning Analytics and Educational Data Mining
MehrnooshV
 
SRHE2016: Multilevel Modelling of Learning Gains: The Impact of Module Partic...
SRHE2016: Multilevel Modelling of Learning Gains: The Impact of Module Partic...SRHE2016: Multilevel Modelling of Learning Gains: The Impact of Module Partic...
SRHE2016: Multilevel Modelling of Learning Gains: The Impact of Module Partic...
Bart Rienties
 
Power point technology in our district
Power point technology in our districtPower point technology in our district
Power point technology in our district
michellethielen
 
Assessment & Feedback Literature Review
Assessment & Feedback Literature ReviewAssessment & Feedback Literature Review
Assessment & Feedback Literature Review
Morse Project
 
Developing a multiple-document-processing performance assessment for epistem...
 Developing a multiple-document-processing performance assessment for epistem... Developing a multiple-document-processing performance assessment for epistem...
Developing a multiple-document-processing performance assessment for epistem...
Simon Knight
 
Blackboard Learning Analytics Research Update
Blackboard Learning Analytics Research UpdateBlackboard Learning Analytics Research Update
Blackboard Learning Analytics Research Update
John Whitmer, Ed.D.
 
Learning Analytics In Higher Education: Struggles & Successes (Part 2)
Learning Analytics In Higher Education: Struggles & Successes (Part 2)Learning Analytics In Higher Education: Struggles & Successes (Part 2)
Learning Analytics In Higher Education: Struggles & Successes (Part 2)
Lambda Solutions
 

What's hot (19)

An insight into Educational Data Mining at Muğla Sıtkı Koçman University, Turkey
An insight into Educational Data Mining at Muğla Sıtkı Koçman University, TurkeyAn insight into Educational Data Mining at Muğla Sıtkı Koçman University, Turkey
An insight into Educational Data Mining at Muğla Sıtkı Koçman University, Turkey
 
Using data (analytics and analysis) to guide (e)teaching and (e)learning (upd...
Using data (analytics and analysis) to guide (e)teaching and (e)learning (upd...Using data (analytics and analysis) to guide (e)teaching and (e)learning (upd...
Using data (analytics and analysis) to guide (e)teaching and (e)learning (upd...
 
What data from 3 million learners can tell us about effective course design
What data from 3 million learners can tell us about effective course designWhat data from 3 million learners can tell us about effective course design
What data from 3 million learners can tell us about effective course design
 
Examining the Value of Learning Analytics for Supporting Work-integrated Lear...
Examining the Value of Learning Analytics for Supporting Work-integrated Lear...Examining the Value of Learning Analytics for Supporting Work-integrated Lear...
Examining the Value of Learning Analytics for Supporting Work-integrated Lear...
 
Learning Analytics
Learning AnalyticsLearning Analytics
Learning Analytics
 
Affective behaviour cognition learning gains project presentation
Affective behaviour cognition learning gains project presentationAffective behaviour cognition learning gains project presentation
Affective behaviour cognition learning gains project presentation
 
DATA MINING IN EDUCATION : A REVIEW ON THE KNOWLEDGE DISCOVERY PERSPECTIVE
DATA MINING IN EDUCATION : A REVIEW ON THE KNOWLEDGE DISCOVERY PERSPECTIVEDATA MINING IN EDUCATION : A REVIEW ON THE KNOWLEDGE DISCOVERY PERSPECTIVE
DATA MINING IN EDUCATION : A REVIEW ON THE KNOWLEDGE DISCOVERY PERSPECTIVE
 
Discussant SRHE Symposium "A cross-institutional perspective on merits and ch...
Discussant SRHE Symposium "A cross-institutional perspective on merits and ch...Discussant SRHE Symposium "A cross-institutional perspective on merits and ch...
Discussant SRHE Symposium "A cross-institutional perspective on merits and ch...
 
Using Learning Analytics to Create our 'Preferred Future'
Using Learning Analytics to Create our 'Preferred Future'Using Learning Analytics to Create our 'Preferred Future'
Using Learning Analytics to Create our 'Preferred Future'
 
OWD2012 - 2,3 - Studiesucces verhogen met learging analytics - Mykola Pecheni...
OWD2012 - 2,3 - Studiesucces verhogen met learging analytics - Mykola Pecheni...OWD2012 - 2,3 - Studiesucces verhogen met learging analytics - Mykola Pecheni...
OWD2012 - 2,3 - Studiesucces verhogen met learging analytics - Mykola Pecheni...
 
USING MRQAP TO ANALYSE THE DEVELOPMENT OF MATHEMATICS PRE-SERVICE TRAINEES’ C...
USING MRQAP TO ANALYSE THE DEVELOPMENT OF MATHEMATICS PRE-SERVICE TRAINEES’ C...USING MRQAP TO ANALYSE THE DEVELOPMENT OF MATHEMATICS PRE-SERVICE TRAINEES’ C...
USING MRQAP TO ANALYSE THE DEVELOPMENT OF MATHEMATICS PRE-SERVICE TRAINEES’ C...
 
Design principles for an innovative learner-determined mobile learning soluti...
Design principles for an innovative learner-determined mobile learning soluti...Design principles for an innovative learner-determined mobile learning soluti...
Design principles for an innovative learner-determined mobile learning soluti...
 
Advances in Learning Analytics and Educational Data Mining
Advances in Learning Analytics and Educational Data Mining Advances in Learning Analytics and Educational Data Mining
Advances in Learning Analytics and Educational Data Mining
 
SRHE2016: Multilevel Modelling of Learning Gains: The Impact of Module Partic...
SRHE2016: Multilevel Modelling of Learning Gains: The Impact of Module Partic...SRHE2016: Multilevel Modelling of Learning Gains: The Impact of Module Partic...
SRHE2016: Multilevel Modelling of Learning Gains: The Impact of Module Partic...
 
Power point technology in our district
Power point technology in our districtPower point technology in our district
Power point technology in our district
 
Assessment & Feedback Literature Review
Assessment & Feedback Literature ReviewAssessment & Feedback Literature Review
Assessment & Feedback Literature Review
 
Developing a multiple-document-processing performance assessment for epistem...
 Developing a multiple-document-processing performance assessment for epistem... Developing a multiple-document-processing performance assessment for epistem...
Developing a multiple-document-processing performance assessment for epistem...
 
Blackboard Learning Analytics Research Update
Blackboard Learning Analytics Research UpdateBlackboard Learning Analytics Research Update
Blackboard Learning Analytics Research Update
 
Learning Analytics In Higher Education: Struggles & Successes (Part 2)
Learning Analytics In Higher Education: Struggles & Successes (Part 2)Learning Analytics In Higher Education: Struggles & Successes (Part 2)
Learning Analytics In Higher Education: Struggles & Successes (Part 2)
 

Similar to EDR8204-3

EDR 8204 Week 3 Assignment: Analyze Action Research
EDR 8204 Week 3 Assignment: Analyze Action ResearchEDR 8204 Week 3 Assignment: Analyze Action Research
EDR 8204 Week 3 Assignment: Analyze Action Research
eckchela
 
Project-Based Learning
Project-Based Learning Project-Based Learning
Project-Based Learning
Viviane Vladimirschi
 
Keynote Presentation: Implementing learning analytics and learning design at ...
Keynote Presentation: Implementing learning analytics and learning design at ...Keynote Presentation: Implementing learning analytics and learning design at ...
Keynote Presentation: Implementing learning analytics and learning design at ...
Bart Rienties
 
Instructional Design Presentation For Thunder Training 2009
Instructional Design Presentation For Thunder Training 2009Instructional Design Presentation For Thunder Training 2009
Instructional Design Presentation For Thunder Training 2009
Lisa Taylor
 
MOOCs & Learning Analytics
MOOCs & Learning AnalyticsMOOCs & Learning Analytics
MOOCs & Learning Analytics
EDSA project
 
Using Analytics to Transform the Library Agenda - Linda Corrin | Talis Insigh...
Using Analytics to Transform the Library Agenda - Linda Corrin | Talis Insigh...Using Analytics to Transform the Library Agenda - Linda Corrin | Talis Insigh...
Using Analytics to Transform the Library Agenda - Linda Corrin | Talis Insigh...
Talis
 
Edutech_Europe Keynote Presentation: Implementing learning analytics and lear...
Edutech_Europe Keynote Presentation: Implementing learning analytics and lear...Edutech_Europe Keynote Presentation: Implementing learning analytics and lear...
Edutech_Europe Keynote Presentation: Implementing learning analytics and lear...
Bart Rienties
 
Seminal Works on Education Data Mining and Analytics
Seminal Works on Education Data Mining and AnalyticsSeminal Works on Education Data Mining and Analytics
Seminal Works on Education Data Mining and Analytics
Ardith Conway
 
Kwilnov07 andretta
Kwilnov07 andrettaKwilnov07 andretta
Kwilnov07 andretta
Susie Andretta
 
Supporting the Assessment of Problem Solving Competences through Inquiry-base...
Supporting the Assessment of Problem Solving Competences through Inquiry-base...Supporting the Assessment of Problem Solving Competences through Inquiry-base...
Supporting the Assessment of Problem Solving Competences through Inquiry-base...
Advanced Digital Systems and Services for Education and Learning (ASK)
 
Ethical challenges for learning analytics
Ethical challenges for learning analyticsEthical challenges for learning analytics
Ethical challenges for learning analytics
Rebecca Ferguson
 
DATA CENTRIC EDUCATION & LEARNING
 DATA CENTRIC EDUCATION & LEARNING DATA CENTRIC EDUCATION & LEARNING
DATA CENTRIC EDUCATION & LEARNING
datasciencekorea
 
projetc-based learning
projetc-based learningprojetc-based learning
projetc-based learning
Menghsun Chen
 
A Three-Pronged Model To Learning Analysis And Instructional Design
A Three-Pronged Model To Learning Analysis And Instructional DesignA Three-Pronged Model To Learning Analysis And Instructional Design
A Three-Pronged Model To Learning Analysis And Instructional Design
Courtney Esco
 
Vera.s.weber pre data_collection_powerpoint
Vera.s.weber pre data_collection_powerpointVera.s.weber pre data_collection_powerpoint
Vera.s.weber pre data_collection_powerpoint
Vera Weber
 
Using student data to transform teaching and learning
Using student data to transform teaching and learningUsing student data to transform teaching and learning
Using student data to transform teaching and learning
Bart Rienties
 
Using Learning analytics to support learners and teachers at the Open University
Using Learning analytics to support learners and teachers at the Open UniversityUsing Learning analytics to support learners and teachers at the Open University
Using Learning analytics to support learners and teachers at the Open University
Bart Rienties
 
A Structural Equation Model To Analyse The Antecedents To Students Web-Based...
A Structural Equation Model To Analyse The Antecedents To Students  Web-Based...A Structural Equation Model To Analyse The Antecedents To Students  Web-Based...
A Structural Equation Model To Analyse The Antecedents To Students Web-Based...
Jill Brown
 
The new age of learning
The new age of learningThe new age of learning
The new age of learning
Doris Randell
 
Open Science and Ethics studies in SLE research
Open Science and Ethics studies in SLE researchOpen Science and Ethics studies in SLE research
Open Science and Ethics studies in SLE research
davinia.hl
 

Similar to EDR8204-3 (20)

EDR 8204 Week 3 Assignment: Analyze Action Research
EDR 8204 Week 3 Assignment: Analyze Action ResearchEDR 8204 Week 3 Assignment: Analyze Action Research
EDR 8204 Week 3 Assignment: Analyze Action Research
 
Project-Based Learning
Project-Based Learning Project-Based Learning
Project-Based Learning
 
Keynote Presentation: Implementing learning analytics and learning design at ...
Keynote Presentation: Implementing learning analytics and learning design at ...Keynote Presentation: Implementing learning analytics and learning design at ...
Keynote Presentation: Implementing learning analytics and learning design at ...
 
Instructional Design Presentation For Thunder Training 2009
Instructional Design Presentation For Thunder Training 2009Instructional Design Presentation For Thunder Training 2009
Instructional Design Presentation For Thunder Training 2009
 
MOOCs & Learning Analytics
MOOCs & Learning AnalyticsMOOCs & Learning Analytics
MOOCs & Learning Analytics
 
Using Analytics to Transform the Library Agenda - Linda Corrin | Talis Insigh...
Using Analytics to Transform the Library Agenda - Linda Corrin | Talis Insigh...Using Analytics to Transform the Library Agenda - Linda Corrin | Talis Insigh...
Using Analytics to Transform the Library Agenda - Linda Corrin | Talis Insigh...
 
Edutech_Europe Keynote Presentation: Implementing learning analytics and lear...
Edutech_Europe Keynote Presentation: Implementing learning analytics and lear...Edutech_Europe Keynote Presentation: Implementing learning analytics and lear...
Edutech_Europe Keynote Presentation: Implementing learning analytics and lear...
 
Seminal Works on Education Data Mining and Analytics
Seminal Works on Education Data Mining and AnalyticsSeminal Works on Education Data Mining and Analytics
Seminal Works on Education Data Mining and Analytics
 
Kwilnov07 andretta
Kwilnov07 andrettaKwilnov07 andretta
Kwilnov07 andretta
 
Supporting the Assessment of Problem Solving Competences through Inquiry-base...
Supporting the Assessment of Problem Solving Competences through Inquiry-base...Supporting the Assessment of Problem Solving Competences through Inquiry-base...
Supporting the Assessment of Problem Solving Competences through Inquiry-base...
 
Ethical challenges for learning analytics
Ethical challenges for learning analyticsEthical challenges for learning analytics
Ethical challenges for learning analytics
 
DATA CENTRIC EDUCATION & LEARNING
 DATA CENTRIC EDUCATION & LEARNING DATA CENTRIC EDUCATION & LEARNING
DATA CENTRIC EDUCATION & LEARNING
 
projetc-based learning
projetc-based learningprojetc-based learning
projetc-based learning
 
A Three-Pronged Model To Learning Analysis And Instructional Design
A Three-Pronged Model To Learning Analysis And Instructional DesignA Three-Pronged Model To Learning Analysis And Instructional Design
A Three-Pronged Model To Learning Analysis And Instructional Design
 
Vera.s.weber pre data_collection_powerpoint
Vera.s.weber pre data_collection_powerpointVera.s.weber pre data_collection_powerpoint
Vera.s.weber pre data_collection_powerpoint
 
Using student data to transform teaching and learning
Using student data to transform teaching and learningUsing student data to transform teaching and learning
Using student data to transform teaching and learning
 
Using Learning analytics to support learners and teachers at the Open University
Using Learning analytics to support learners and teachers at the Open UniversityUsing Learning analytics to support learners and teachers at the Open University
Using Learning analytics to support learners and teachers at the Open University
 
A Structural Equation Model To Analyse The Antecedents To Students Web-Based...
A Structural Equation Model To Analyse The Antecedents To Students  Web-Based...A Structural Equation Model To Analyse The Antecedents To Students  Web-Based...
A Structural Equation Model To Analyse The Antecedents To Students Web-Based...
 
The new age of learning
The new age of learningThe new age of learning
The new age of learning
 
Open Science and Ethics studies in SLE research
Open Science and Ethics studies in SLE researchOpen Science and Ethics studies in SLE research
Open Science and Ethics studies in SLE research
 

More from eckchela

Aspen University EDD830 Module 5 Discussion Question
Aspen University EDD830 Module 5  Discussion QuestionAspen University EDD830 Module 5  Discussion Question
Aspen University EDD830 Module 5 Discussion Question
eckchela
 
EDD830-Leadership Theory: Module 3 Assignment
EDD830-Leadership Theory: Module 3 AssignmentEDD830-Leadership Theory: Module 3 Assignment
EDD830-Leadership Theory: Module 3 Assignment
eckchela
 
Why is leadership a key issue in management?
Why is leadership a key issue in management? Why is leadership a key issue in management?
Why is leadership a key issue in management?
eckchela
 
DPSY-6215-2 and PSYC-6215-2: Week 10 Discussion
DPSY-6215-2 and PSYC-6215-2: Week 10 DiscussionDPSY-6215-2 and PSYC-6215-2: Week 10 Discussion
DPSY-6215-2 and PSYC-6215-2: Week 10 Discussion
eckchela
 
Walden University DPSY 6215/8215
Walden University DPSY 6215/8215Walden University DPSY 6215/8215
Walden University DPSY 6215/8215
eckchela
 
DPSY 8215/ PSY Week 5 Discussion: Infancy and Childhood
DPSY 8215/ PSY  Week 5 Discussion: Infancy and ChildhoodDPSY 8215/ PSY  Week 5 Discussion: Infancy and Childhood
DPSY 8215/ PSY Week 5 Discussion: Infancy and Childhood
eckchela
 
DPSY 6215-2/ PSYC 6215-2 Week 2: Social and Cognitive Development
DPSY 6215-2/ PSYC 6215-2 Week 2: Social and Cognitive DevelopmentDPSY 6215-2/ PSYC 6215-2 Week 2: Social and Cognitive Development
DPSY 6215-2/ PSYC 6215-2 Week 2: Social and Cognitive Development
eckchela
 
DPSY 6121/8121 Week 11 Dscussion
DPSY 6121/8121 Week 11 DscussionDPSY 6121/8121 Week 11 Dscussion
DPSY 6121/8121 Week 11 Dscussion
eckchela
 
DPSY 6121-8121 Week 10 Final Project: Mitigation Plan
DPSY 6121-8121 Week 10 Final Project: Mitigation PlanDPSY 6121-8121 Week 10 Final Project: Mitigation Plan
DPSY 6121-8121 Week 10 Final Project: Mitigation Plan
eckchela
 
DPSY Week-9 Discussion 2: Generational Differences
DPSY Week-9 Discussion 2: Generational DifferencesDPSY Week-9 Discussion 2: Generational Differences
DPSY Week-9 Discussion 2: Generational Differences
eckchela
 
DPSY 6121/8121 Discussion Week 7: Cyber-Victimization
DPSY 6121/8121 Discussion Week 7: Cyber-VictimizationDPSY 6121/8121 Discussion Week 7: Cyber-Victimization
DPSY 6121/8121 Discussion Week 7: Cyber-Victimization
eckchela
 
DPSY 5111 6121-8121 Week 6 Discussion
DPSY 5111 6121-8121 Week 6 DiscussionDPSY 5111 6121-8121 Week 6 Discussion
DPSY 5111 6121-8121 Week 6 Discussion
eckchela
 
DPSY 6121-8121-5121 Week 5 Discussion 1
DPSY 6121-8121-5121 Week 5 Discussion 1DPSY 6121-8121-5121 Week 5 Discussion 1
DPSY 6121-8121-5121 Week 5 Discussion 1
eckchela
 
EL-7010 Week 1 Assignment: Online Learning for the K-12 Students
EL-7010 Week 1 Assignment: Online Learning for the K-12 StudentsEL-7010 Week 1 Assignment: Online Learning for the K-12 Students
EL-7010 Week 1 Assignment: Online Learning for the K-12 Students
eckchela
 
DPSY 5111-6111 Week 3 Assignment: Final Project: Mitigation Plan
DPSY 5111-6111 Week 3 Assignment: Final Project: Mitigation PlanDPSY 5111-6111 Week 3 Assignment: Final Project: Mitigation Plan
DPSY 5111-6111 Week 3 Assignment: Final Project: Mitigation Plan
eckchela
 
DPSY 8111/6112 Week 5 Assignment
DPSY 8111/6112 Week 5 AssignmentDPSY 8111/6112 Week 5 Assignment
DPSY 8111/6112 Week 5 Assignment
eckchela
 
DPSY-8111-DPSY 6111 Week 10 Project: Retirement Issues
DPSY-8111-DPSY 6111 Week 10 Project: Retirement IssuesDPSY-8111-DPSY 6111 Week 10 Project: Retirement Issues
DPSY-8111-DPSY 6111 Week 10 Project: Retirement Issues
eckchela
 
Thread: Discussion - Week 8 – DPSY-6111-1/DPSY-5111-1
Thread: Discussion - Week 8 – DPSY-6111-1/DPSY-5111-1Thread: Discussion - Week 8 – DPSY-6111-1/DPSY-5111-1
Thread: Discussion - Week 8 – DPSY-6111-1/DPSY-5111-1
eckchela
 
Thread: Discussion 1 - Week 7 – DPSY-6111-1/DPSY-5111-1
Thread: Discussion 1 - Week 7 – DPSY-6111-1/DPSY-5111-1Thread: Discussion 1 - Week 7 – DPSY-6111-1/DPSY-5111-1
Thread: Discussion 1 - Week 7 – DPSY-6111-1/DPSY-5111-1
eckchela
 
Thread: Discussion - Week 9 – DPSY-6111-1/DPSY-5111-1
Thread: Discussion - Week 9 – DPSY-6111-1/DPSY-5111-1Thread: Discussion - Week 9 – DPSY-6111-1/DPSY-5111-1
Thread: Discussion - Week 9 – DPSY-6111-1/DPSY-5111-1
eckchela
 

More from eckchela (20)

Aspen University EDD830 Module 5 Discussion Question
Aspen University EDD830 Module 5  Discussion QuestionAspen University EDD830 Module 5  Discussion Question
Aspen University EDD830 Module 5 Discussion Question
 
EDD830-Leadership Theory: Module 3 Assignment
EDD830-Leadership Theory: Module 3 AssignmentEDD830-Leadership Theory: Module 3 Assignment
EDD830-Leadership Theory: Module 3 Assignment
 
Why is leadership a key issue in management?
Why is leadership a key issue in management? Why is leadership a key issue in management?
Why is leadership a key issue in management?
 
DPSY-6215-2 and PSYC-6215-2: Week 10 Discussion
DPSY-6215-2 and PSYC-6215-2: Week 10 DiscussionDPSY-6215-2 and PSYC-6215-2: Week 10 Discussion
DPSY-6215-2 and PSYC-6215-2: Week 10 Discussion
 
Walden University DPSY 6215/8215
Walden University DPSY 6215/8215Walden University DPSY 6215/8215
Walden University DPSY 6215/8215
 
DPSY 8215/ PSY Week 5 Discussion: Infancy and Childhood
DPSY 8215/ PSY  Week 5 Discussion: Infancy and ChildhoodDPSY 8215/ PSY  Week 5 Discussion: Infancy and Childhood
DPSY 8215/ PSY Week 5 Discussion: Infancy and Childhood
 
DPSY 6215-2/ PSYC 6215-2 Week 2: Social and Cognitive Development
DPSY 6215-2/ PSYC 6215-2 Week 2: Social and Cognitive DevelopmentDPSY 6215-2/ PSYC 6215-2 Week 2: Social and Cognitive Development
DPSY 6215-2/ PSYC 6215-2 Week 2: Social and Cognitive Development
 
DPSY 6121/8121 Week 11 Dscussion
DPSY 6121/8121 Week 11 DscussionDPSY 6121/8121 Week 11 Dscussion
DPSY 6121/8121 Week 11 Dscussion
 
DPSY 6121-8121 Week 10 Final Project: Mitigation Plan
DPSY 6121-8121 Week 10 Final Project: Mitigation PlanDPSY 6121-8121 Week 10 Final Project: Mitigation Plan
DPSY 6121-8121 Week 10 Final Project: Mitigation Plan
 
DPSY Week-9 Discussion 2: Generational Differences
DPSY Week-9 Discussion 2: Generational DifferencesDPSY Week-9 Discussion 2: Generational Differences
DPSY Week-9 Discussion 2: Generational Differences
 
DPSY 6121/8121 Discussion Week 7: Cyber-Victimization
DPSY 6121/8121 Discussion Week 7: Cyber-VictimizationDPSY 6121/8121 Discussion Week 7: Cyber-Victimization
DPSY 6121/8121 Discussion Week 7: Cyber-Victimization
 
DPSY 5111 6121-8121 Week 6 Discussion
DPSY 5111 6121-8121 Week 6 DiscussionDPSY 5111 6121-8121 Week 6 Discussion
DPSY 5111 6121-8121 Week 6 Discussion
 
DPSY 6121-8121-5121 Week 5 Discussion 1
DPSY 6121-8121-5121 Week 5 Discussion 1DPSY 6121-8121-5121 Week 5 Discussion 1
DPSY 6121-8121-5121 Week 5 Discussion 1
 
EL-7010 Week 1 Assignment: Online Learning for the K-12 Students
EL-7010 Week 1 Assignment: Online Learning for the K-12 StudentsEL-7010 Week 1 Assignment: Online Learning for the K-12 Students
EL-7010 Week 1 Assignment: Online Learning for the K-12 Students
 
DPSY 5111-6111 Week 3 Assignment: Final Project: Mitigation Plan
DPSY 5111-6111 Week 3 Assignment: Final Project: Mitigation PlanDPSY 5111-6111 Week 3 Assignment: Final Project: Mitigation Plan
DPSY 5111-6111 Week 3 Assignment: Final Project: Mitigation Plan
 
DPSY 8111/6112 Week 5 Assignment
DPSY 8111/6112 Week 5 AssignmentDPSY 8111/6112 Week 5 Assignment
DPSY 8111/6112 Week 5 Assignment
 
DPSY-8111-DPSY 6111 Week 10 Project: Retirement Issues
DPSY-8111-DPSY 6111 Week 10 Project: Retirement IssuesDPSY-8111-DPSY 6111 Week 10 Project: Retirement Issues
DPSY-8111-DPSY 6111 Week 10 Project: Retirement Issues
 
Thread: Discussion - Week 8 – DPSY-6111-1/DPSY-5111-1
Thread: Discussion - Week 8 – DPSY-6111-1/DPSY-5111-1Thread: Discussion - Week 8 – DPSY-6111-1/DPSY-5111-1
Thread: Discussion - Week 8 – DPSY-6111-1/DPSY-5111-1
 
Thread: Discussion 1 - Week 7 – DPSY-6111-1/DPSY-5111-1
Thread: Discussion 1 - Week 7 – DPSY-6111-1/DPSY-5111-1Thread: Discussion 1 - Week 7 – DPSY-6111-1/DPSY-5111-1
Thread: Discussion 1 - Week 7 – DPSY-6111-1/DPSY-5111-1
 
Thread: Discussion - Week 9 – DPSY-6111-1/DPSY-5111-1
Thread: Discussion - Week 9 – DPSY-6111-1/DPSY-5111-1Thread: Discussion - Week 9 – DPSY-6111-1/DPSY-5111-1
Thread: Discussion - Week 9 – DPSY-6111-1/DPSY-5111-1
 

Recently uploaded

78 Microsoft-Publisher - Sirin Sultana Bora.pptx
78 Microsoft-Publisher - Sirin Sultana Bora.pptx78 Microsoft-Publisher - Sirin Sultana Bora.pptx
78 Microsoft-Publisher - Sirin Sultana Bora.pptx
Kalna College
 
CapTechTalks Webinar Slides June 2024 Donovan Wright.pptx
CapTechTalks Webinar Slides June 2024 Donovan Wright.pptxCapTechTalks Webinar Slides June 2024 Donovan Wright.pptx
CapTechTalks Webinar Slides June 2024 Donovan Wright.pptx
CapitolTechU
 
Skimbleshanks-The-Railway-Cat by T S Eliot
Skimbleshanks-The-Railway-Cat by T S EliotSkimbleshanks-The-Railway-Cat by T S Eliot
Skimbleshanks-The-Railway-Cat by T S Eliot
nitinpv4ai
 
220711130097 Tulip Samanta Concept of Information and Communication Technology
220711130097 Tulip Samanta Concept of Information and Communication Technology220711130097 Tulip Samanta Concept of Information and Communication Technology
220711130097 Tulip Samanta Concept of Information and Communication Technology
Kalna College
 
NIPER 2024 MEMORY BASED QUESTIONS.ANSWERS TO NIPER 2024 QUESTIONS.NIPER JEE 2...
NIPER 2024 MEMORY BASED QUESTIONS.ANSWERS TO NIPER 2024 QUESTIONS.NIPER JEE 2...NIPER 2024 MEMORY BASED QUESTIONS.ANSWERS TO NIPER 2024 QUESTIONS.NIPER JEE 2...
NIPER 2024 MEMORY BASED QUESTIONS.ANSWERS TO NIPER 2024 QUESTIONS.NIPER JEE 2...
Payaamvohra1
 
How to Setup Default Value for a Field in Odoo 17
How to Setup Default Value for a Field in Odoo 17How to Setup Default Value for a Field in Odoo 17
How to Setup Default Value for a Field in Odoo 17
Celine George
 
Educational Technology in the Health Sciences
Educational Technology in the Health SciencesEducational Technology in the Health Sciences
Educational Technology in the Health Sciences
Iris Thiele Isip-Tan
 
adjectives.ppt for class 1 to 6, grammar
adjectives.ppt for class 1 to 6, grammaradjectives.ppt for class 1 to 6, grammar
adjectives.ppt for class 1 to 6, grammar
7DFarhanaMohammed
 
220711130083 SUBHASHREE RAKSHIT Internet resources for social science
220711130083 SUBHASHREE RAKSHIT  Internet resources for social science220711130083 SUBHASHREE RAKSHIT  Internet resources for social science
220711130083 SUBHASHREE RAKSHIT Internet resources for social science
Kalna College
 
A Visual Guide to 1 Samuel | A Tale of Two Hearts
A Visual Guide to 1 Samuel | A Tale of Two HeartsA Visual Guide to 1 Samuel | A Tale of Two Hearts
A Visual Guide to 1 Samuel | A Tale of Two Hearts
Steve Thomason
 
How to Manage Reception Report in Odoo 17
How to Manage Reception Report in Odoo 17How to Manage Reception Report in Odoo 17
How to Manage Reception Report in Odoo 17
Celine George
 
Pharmaceutics Pharmaceuticals best of brub
Pharmaceutics Pharmaceuticals best of brubPharmaceutics Pharmaceuticals best of brub
Pharmaceutics Pharmaceuticals best of brub
danielkiash986
 
Diversity Quiz Prelims by Quiz Club, IIT Kanpur
Diversity Quiz Prelims by Quiz Club, IIT KanpurDiversity Quiz Prelims by Quiz Club, IIT Kanpur
Diversity Quiz Prelims by Quiz Club, IIT Kanpur
Quiz Club IIT Kanpur
 
How to Fix [Errno 98] address already in use
How to Fix [Errno 98] address already in useHow to Fix [Errno 98] address already in use
How to Fix [Errno 98] address already in use
Celine George
 
Creative Restart 2024: Mike Martin - Finding a way around “no”
Creative Restart 2024: Mike Martin - Finding a way around “no”Creative Restart 2024: Mike Martin - Finding a way around “no”
Creative Restart 2024: Mike Martin - Finding a way around “no”
Taste
 
THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...
THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...
THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...
indexPub
 
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 8 - CẢ NĂM - FRIENDS PLUS - NĂM HỌC 2023-2024 (B...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 8 - CẢ NĂM - FRIENDS PLUS - NĂM HỌC 2023-2024 (B...BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 8 - CẢ NĂM - FRIENDS PLUS - NĂM HỌC 2023-2024 (B...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 8 - CẢ NĂM - FRIENDS PLUS - NĂM HỌC 2023-2024 (B...
Nguyen Thanh Tu Collection
 
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...
TechSoup
 
INTRODUCTION TO HOSPITALS & AND ITS ORGANIZATION
INTRODUCTION TO HOSPITALS & AND ITS ORGANIZATION INTRODUCTION TO HOSPITALS & AND ITS ORGANIZATION
INTRODUCTION TO HOSPITALS & AND ITS ORGANIZATION
ShwetaGawande8
 
220711130088 Sumi Basak Virtual University EPC 3.pptx
220711130088 Sumi Basak Virtual University EPC 3.pptx220711130088 Sumi Basak Virtual University EPC 3.pptx
220711130088 Sumi Basak Virtual University EPC 3.pptx
Kalna College
 

Recently uploaded (20)

78 Microsoft-Publisher - Sirin Sultana Bora.pptx
78 Microsoft-Publisher - Sirin Sultana Bora.pptx78 Microsoft-Publisher - Sirin Sultana Bora.pptx
78 Microsoft-Publisher - Sirin Sultana Bora.pptx
 
CapTechTalks Webinar Slides June 2024 Donovan Wright.pptx
CapTechTalks Webinar Slides June 2024 Donovan Wright.pptxCapTechTalks Webinar Slides June 2024 Donovan Wright.pptx
CapTechTalks Webinar Slides June 2024 Donovan Wright.pptx
 
Skimbleshanks-The-Railway-Cat by T S Eliot
Skimbleshanks-The-Railway-Cat by T S EliotSkimbleshanks-The-Railway-Cat by T S Eliot
Skimbleshanks-The-Railway-Cat by T S Eliot
 
220711130097 Tulip Samanta Concept of Information and Communication Technology
220711130097 Tulip Samanta Concept of Information and Communication Technology220711130097 Tulip Samanta Concept of Information and Communication Technology
220711130097 Tulip Samanta Concept of Information and Communication Technology
 
NIPER 2024 MEMORY BASED QUESTIONS.ANSWERS TO NIPER 2024 QUESTIONS.NIPER JEE 2...
NIPER 2024 MEMORY BASED QUESTIONS.ANSWERS TO NIPER 2024 QUESTIONS.NIPER JEE 2...NIPER 2024 MEMORY BASED QUESTIONS.ANSWERS TO NIPER 2024 QUESTIONS.NIPER JEE 2...
NIPER 2024 MEMORY BASED QUESTIONS.ANSWERS TO NIPER 2024 QUESTIONS.NIPER JEE 2...
 
How to Setup Default Value for a Field in Odoo 17
How to Setup Default Value for a Field in Odoo 17How to Setup Default Value for a Field in Odoo 17
How to Setup Default Value for a Field in Odoo 17
 
Educational Technology in the Health Sciences
Educational Technology in the Health SciencesEducational Technology in the Health Sciences
Educational Technology in the Health Sciences
 
adjectives.ppt for class 1 to 6, grammar
adjectives.ppt for class 1 to 6, grammaradjectives.ppt for class 1 to 6, grammar
adjectives.ppt for class 1 to 6, grammar
 
220711130083 SUBHASHREE RAKSHIT Internet resources for social science
220711130083 SUBHASHREE RAKSHIT  Internet resources for social science220711130083 SUBHASHREE RAKSHIT  Internet resources for social science
220711130083 SUBHASHREE RAKSHIT Internet resources for social science
 
A Visual Guide to 1 Samuel | A Tale of Two Hearts
A Visual Guide to 1 Samuel | A Tale of Two HeartsA Visual Guide to 1 Samuel | A Tale of Two Hearts
A Visual Guide to 1 Samuel | A Tale of Two Hearts
 
How to Manage Reception Report in Odoo 17
How to Manage Reception Report in Odoo 17How to Manage Reception Report in Odoo 17
How to Manage Reception Report in Odoo 17
 
Pharmaceutics Pharmaceuticals best of brub
Pharmaceutics Pharmaceuticals best of brubPharmaceutics Pharmaceuticals best of brub
Pharmaceutics Pharmaceuticals best of brub
 
Diversity Quiz Prelims by Quiz Club, IIT Kanpur
Diversity Quiz Prelims by Quiz Club, IIT KanpurDiversity Quiz Prelims by Quiz Club, IIT Kanpur
Diversity Quiz Prelims by Quiz Club, IIT Kanpur
 
How to Fix [Errno 98] address already in use
How to Fix [Errno 98] address already in useHow to Fix [Errno 98] address already in use
How to Fix [Errno 98] address already in use
 
Creative Restart 2024: Mike Martin - Finding a way around “no”
Creative Restart 2024: Mike Martin - Finding a way around “no”Creative Restart 2024: Mike Martin - Finding a way around “no”
Creative Restart 2024: Mike Martin - Finding a way around “no”
 
THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...
THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...
THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...
 
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 8 - CẢ NĂM - FRIENDS PLUS - NĂM HỌC 2023-2024 (B...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 8 - CẢ NĂM - FRIENDS PLUS - NĂM HỌC 2023-2024 (B...BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 8 - CẢ NĂM - FRIENDS PLUS - NĂM HỌC 2023-2024 (B...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 8 - CẢ NĂM - FRIENDS PLUS - NĂM HỌC 2023-2024 (B...
 
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...
 
INTRODUCTION TO HOSPITALS & AND ITS ORGANIZATION
INTRODUCTION TO HOSPITALS & AND ITS ORGANIZATION INTRODUCTION TO HOSPITALS & AND ITS ORGANIZATION
INTRODUCTION TO HOSPITALS & AND ITS ORGANIZATION
 
220711130088 Sumi Basak Virtual University EPC 3.pptx
220711130088 Sumi Basak Virtual University EPC 3.pptx220711130088 Sumi Basak Virtual University EPC 3.pptx
220711130088 Sumi Basak Virtual University EPC 3.pptx
 

EDR8204-3

  • 1. Week 3 Assignment: Analyze Action Research log Teaching and Learning Orlanda Haynes North Central University School of Education Ed. D Student EDR8204-3 - summer 2018 Copyright Note: All images used in this presentation have been confirmed to be either in the public domain, of expired copyright status, licensed under the GNU Free Documentation License, or using creative commons license
  • 2. When to Use Action Research • To address specific problems or issues in applied settings • To create reflective opportunities about problems or issues • To offer means to staff development (e.g., education practitioners) • To improve work related practices, in part, by being participants
  • 3. Primary Types of Action Research •Practical •Participatory
  • 4. A Sample Action Research Project Internet Safety Grade levels 6th – 12th
  • 5. A Sample Action Research Problem Statement • Students in grades levels six through 12th lack sufficient Internet safety skills to cope with emerging cyber threats.
  • 6. Purpose of the Research • determine the causes, • build a web-based education program based on best practice for emerging cyber threats, • emphasize the importance of Internet security, and • encourage students’ awareness by share knowledge about Internet security resources and by implementing a mandatory cyber security activity
  • 7. Goals of the Research Upon completion of the Cyber Security program, students will understand: • Basic Internet terminologies, tools, and resources; • Primary Internet security problems and implications; • How to recognize cyber threats; • What does “the Internet is forever means”; • The importance of password protection; • Spam and Phishing?
  • 9. Goals of the Research Spam and Phishing?
  • 11. Data Collection Methods Survey QuestionPro Online Program http://www.questionpro.com/aki ra/ShowResults?id=161974)
  • 12. Data Collection Method: Cyber Activities
  • 13. Sharing of the Results
  • 14. Week 3 Assignment: Analyze Action Research Questions /Thoughts/ Comments
  • 15. References Creswell, J. W. (2013). Qualitative inquiry and research design: Choosing among five approaches. Thousand Oaks, CA: Sage Publications. Creswell, J.W. (2012). Educational research: planning, conducting and evaluating quantitative and qualitative research (4th Ed.). Boston, MA: Pearson Education Inc. Jang-Jaccard, J., & Nepal, S. (2014). A survey of emerging threats in cybersecurity. Journal of Computer and System Sciences, 80(5), pp. 973–993. http://dx.doi.org/ 10.1016/j.jcss.2014.02.005
  • 16. References Lodico, M., Spaulding, D., & Voegtle, K. (2010). Methods in educational research: From theory to practice (Laureate Education, Inc., custom ed.). San Francisco: John Wiley &Sons. Mazzarello, S., Fralick, M., & Clemons, M. (2016). A simple approach for eliminating spam. Current Oncology, 23(1), e75-e76. https://doi:10.3747/co.23.2860 Mills, G. E. (2014). Action research: A guide for the teacher researcher (5th eds.). London: Pearson Education Limited.
  • 17. References National Center for Education Statistics. (2016, May). Indicators of school crime and safety. Retrieved from Ng Chong, G., Kanagasundram, S., Yee Hway, A., Tan Loong, H., & Teoh Kar, M. (2016). Cyber bullying: A new social menace. ASEAN Journal of Psychiatry, 17(1), 104-115. Retrieved fromhttps://umexpert.um.edu.my/file/publication/00012227_134529.pdf Ott, K. (2017, 03). The internet endureth forever. Sojourners Magazine, 46, pp. 30-33. Retrieved from file:///C:/Users/educa/Desktop/EduProposals/The%20Internet.pdf
  • 18. References Prieger, J. (2013). The impact of government policies on access to broadband. School of public policy working papers. Retrieved from http://digitalcommons.pepperdine.edu/cgi/viewcontent.cgi?article=1043&contex t=sppworkingpapers Shillair, R., Cotten, S. R., Tsai, H. S., Alhabash, S., LaRose, R., & Rifon, N. J. (2015). Online safety begins with you and me: Convincing Internet users to protect themselves. Computers in Human Behavior, 48, pp. 199-207. https://doi.org/10.1016/j.chb.2015.01.046 The Importance of Passwords (n.d.). University of Ottawa, Canada. Retrieved from https://it.uottawa.ca/accounts/password-tips
  • 19. References Tomczyk, Ł., & Kopecký, K. (2016). Children and youth safety on the Internet: Experiences from Czech Republic and Poland. Telematics and Informatics, 33, pp. 822-833. Retrieved from https://www.researchgate.net/profile/Lukasz_Tomczyk/publication/285288746_ Children_and_Youth_Safety_on_Internet_Experiences_from_Czech_Republic_ and_Poland/links/56d3138108aeb52500d1829c/Children-and-Youth-Safety-on- Internet-Experiences-from-Czech-Republic-and-Poland.pdf

Editor's Notes

  1. [Speaker notes]. Hello, everyone! I’m Orlanda Haynes. Thanks for joining the presentation on “Analyze Action Research.” This presentation is an example of an action research project within an educational setting. The design allows for self-reflective inquiries about teaching and learning practices, for example, in real-world settings and in real-time. Educators and administrators used the framework to get insights and knowledge about teaching methods. They usually use the information, for instance, to improve practices or to lend credence to current classroom policies (Creswell, 2012). The primary aim of the research is to effectively address specific problems or issues in applied settings (Mills, 2014). The discussion, today, includes when to use action research, primary types of action research, a sample action research project, a sample action research problem statement, the purpose of the research, Goals of the research the participants. data collection methods, and sharing of the results. Brochures, which include a references list, are located at the refreshment booth, and a session for questions, thoughts, and comments will follow the discussion. Now, let us begin.
  2. [Speaker notes]. When is it appropriate to use action research? In most instances, best practices recommend action research to address specific problems in applied settings, to create reflective opportunities about problems or issues, to offer means to staff development (e.g., education practitioners), and to improve work related practice, in part, by being participants.
  3. [Speaker notes]. In teaching and learning environments, practical research occurs when the aim is to improve teaching methods, to help students learn more effectively, and to create educational settings that are both proactive and content relevant. Usually, projects involve small-scaled and narrowly focused plans to address specific issues or problems (Creswell, 2012).   On the other hand, participatory inquiries refer to plans designed to address social, organizational, or community problems. The primary purpose is to improve people’s lives by empowering them to create solutions that address specific problems or issues (Lodico, Spaulding, & Voegtle, 2010; Mills, 2014). For example, an issue of interest could be to discuss and to devise an effective plan to repeal “public schools’ text book publication laws” that allow the omission of important historical figures and cultural events.
  4. [Speaker notes]. Most schools rely on Internet access for all manners of teaching, learning, and communication needs (Prieger, 2013). Tomczyk and Kopecký (2016) noted that “ . . . Systematic use of . . . Electronic media begins . . . At the age of 7–11” (Abstract). They went on to say that “The very devices that are easily used . . . Become an open door for unscrupulous forces to steal information and seize control of machines for nefarious purposes. [The] problem is multi-faceted” . . . .   Shillair, Tsai, Alhabash, LaRose, and Rifon (2015) conducted a study entitled “Online Safety Begins with You and Me: Convincing Internet Users to Protect Themselves.” Most online schools, colleges, and universities post messages on their websites about how students can protect themselves while engaging in cyber environments (Ng Chong, Kanagasundram, Yee Hway, Loong, & Teoh Kar, 2016; Prieger, 2013; Shillair et al., 2015; Tomczyk & Kopecký, 2016). Despite these measures, administrators at XYZ Middle school district (in 2016) reported an alarming increase in students complaints about the lack of internet security, especially password protection. To address the problem, in January of 2018, the board approved an action research plan that included a mandatory cyber security program (for both students and staff) and an annual district-wide survey to include all staff as well as students and parent.  
  5. [Speaker notes]. (Read slide text out-loud).
  6. [Speaker notes]. (Read slide text out-loud).
  7. [Speaker notes]. (Read slide text out-loud).
  8. [Speak Notes] To emphasize the emerging threats of cyber communication, The University of Ottawa, Canada, published the article “The Importance of Passwords ”. They noted that students should not create common passwords, such as yellow123, because common colors joined by standard sequence of numbers are too easy for hackers.
  9. [Speak Notes] (Read slide text out-loud). Most students are familiar with junk mail. Unauthorized advertisements from companies and individuals via standard mail or other third party mail delivery services (Mazzarello, Fralick, & Clemons, 2016). Spam is its equivalent—via emails and text messaging. But how do they obtain your addresses? You might ask. Commercial mailing lists vendors are the most common source. But Internet software that is designed to identify and compile verifiable electronic addresses is also available. Research shows that phishing share similar characteristics as far as being unsolicited and the delivery source. However, the purpose is different. Most business communities label the act a scam, in part, because hackers and cyber thieves shop for personal information, such as passwords, credit cards, bank account, and social security numbers for the sole purpose of committing fraud (Mazzarello, Fralick, & Clemons, 2016;Tomczyk, & Kopecký, 2016).
  10. [Speaker notes]. (Read slide text out-loud). Students and staff will complete two online surveys (e.g., before and after the research) based on closed-ended questions, and a cyber security online activity followed by a standardized exam. Researchers will ask parents, via phone or email, to take part in the surveys, but the cyber security online activity will be optional but recommended. They will also issue passwords to all participants and follow standard research protocol for conducting research with human subjects.
  11. [Speaker notes].
  12. [Speak Notes] (Read the slide text out-loud and remind research participants that all information regarding the research project will be emailed to them two weeks prior to the start date.). Please follow this link: https://sos.fbi.gov./. Pay close attention to the instructions. After completing all sections, take the quiz. The game only allows for one attempt. For an addition resource, click the link below (Internet security tutorial): http://www.netsmartz.org/Presentations/Tweens
  13. [Speaker notes]. (Read the slide text out-load). The lead researcher should draft a research report and present the findings at XYZ school board meeting (time and date to be decided). In addition, he/she should give a certified copy to all board members two weeks prior to the meeting date. Please contact the research director for further guidance. The report should include the following: The Context/ Background Literature review Practice to Improve Description of action plan and implementation procedures Data collection methods Data analysis and results Reflection, implications, and recommendations References  
  14. [Speaker notes]. This concludes the presentation. Let’s take a few moments for questions, thoughts, or comments.
  15. [Speaker notes]