scholarly journals A Comprehensive Evaluation Rubric for Assessing Instructional Apps

10.28945/2097 ◽  
2015 ◽  
Vol 14 ◽  
pp. 021-053 ◽  
Author(s):  
Cheng-Yuan Lee ◽  
Todd Sloan Chener

There is a pressing need for an evaluation rubric that examines all aspects of educational apps designed for instructional purposes. In past decades, many rubrics have been developed for evaluating educational computer-based programs; however, rubrics designed for evaluating the instructional implications of educational apps are scarce. When an Internet search for existing rubrics was conducted, only two such rubrics were found, and the evaluation criteria used in those rubrics was not clearly linked to previously conducted research nor were their evaluative dimensions clearly defined. These shortcomings result in reviewers being unable to use those rubrics to provide teachers with a precise analysis of an educational app’s instructional potential. In response, this paper presents a comprehensive rubric with 24-evaluative dimensions tailored specifically to analyze the educational potential of instructional apps.

2009 ◽  
Vol 46 (1) ◽  
pp. 232-274 ◽  
Author(s):  
Sebnem Cilesiz

Computer use is a widespread leisure activity for adolescents. Leisure contexts, such as Internet cafés, constitute specific social environments for computer use and may hold significant educational potential. This article reports a phenomenological study of adolescents’ experiences of educational computer use at Internet cafés in Turkey. The purposes of the study were to understand and describe the phenomenon in depth and arrive at the essence of adolescents’ experiences with the phenomenon. Data were collected through series of in-depth phenomenological interviews with six adolescents and analyzed using phenomenal analysis. The results include potential benefits of Internet cafés as specific social leisure contexts of educational computer use for adolescent development. Implications for designing and studying computer-based informal learning environments are presented.


Author(s):  
Bernardinus Agus Arswimba

ABSTRACT Home visit is a responsive service that is urgent, so it needs to be implemented immediately to help students solve problems faced. If home visit is not done well, the problem will have a more complex impact on students. The purpose of the study was to determine the performance of counselors according to or not with the standards and professional counselor evaluation criteria for Comprehensive (Evaluation Model South Carolina) counseling guidance to make decisions or follow-up the programs that have been implemented. The research method used is descriptive evaluation using the Model Evaluation Discrepancy. This model measures the difference between performance standards and real conditions that have been implemented. The instrument of this research is using questionnaires and interviews. The results showed that home visits conducted by counselors at Santa Maria Malang Middle School in the category "close from standard". Keywords: home visit, model evaluation discrepancy


2006 ◽  
Vol 315-316 ◽  
pp. 864-867
Author(s):  
Shi An ◽  
J. Wang ◽  
J.P. Qian

Recognizing and evaluating the development level of a country’s precise finishing industry, is the prerequisite to the country’s decision-making on the development planning and guiding policies in this industry. This paper presents a Fuzzy Analytical Hierarchy Process (FAHP) Model on the base of “Expert Knowledge”. This model combines the advantages of Fuzzy Evaluation Method and Analytical Hierarchy Process (AHP), and can give relatively reliable evaluation results with incomplete information of the evaluation criteria. The application of the FAHP Model provide reliable comprehensive evaluation data.


2013 ◽  
pp. 63-101
Author(s):  
Marion A. Hersh ◽  
Barbara Leporini

This chapter presents an overview of accessibility and usability for educational computer-based games and the first survey of the accessibility and usability of digital educational games. The overview includes a discussion of accessibility and usability, both in general and in the specific context of educational games, as well as a brief presentation of issues relating to game design, including of mobile games. Since there are no previous studies of the accessibility and usability of educational computer-based games, studies of the accessibility and usability of the related areas of virtual learning environments, digital games for entertainment and PDF documents, are also presented. The overview of accessibility and usability and the results of the survey are used to draw up a structured list of 62 guidelines and recommendations, organised into three categories at the first level and ten at the second level. These guidelines and recommendations are illustrated by an example of their application to a fictitious new educational game.


Author(s):  
Hao Gong ◽  
Jianhua Liu ◽  
Xiaoyu Ding

Sufficient preload in a bolted joint is key to ensuring the reliability of mechanical products; however, under vibration, preload decrease often occurs. The mechanism of preload decrease has not yet been fully clarified. In this study, finite element models of bolted joints with and without helix angles were constructed to study the mechanism of preload decrease under transversal vibration. Based on the finite element analysis results, a new cause of preload decrease, denoted as stress release and redistribution, was discovered and explained in detail. The mechanism of preload decrease caused by stress release and redistribution, cyclic plasticity deformation and rotation loosening is studied systematically, and the typical mode of preload decrease is proposed. Based on the preload decrease curve, more comprehensive evaluation criteria are established, quantified using three parameters to represent the locking behavior of bolted joints. Finally, experiments were conducted to verify the reliability of the preload decrease results.


2011 ◽  
Vol 71-78 ◽  
pp. 3946-3949 ◽  
Author(s):  
Na Dong ◽  
Jing Zhang ◽  
Min Jiu Yu

A competitive contractor is the guarantee of project’s success, so how to choose a suitable contractor is critical for the owners. However, among the influencing factors considered in the selection, some can be quantitatively evaluated with clear evaluation criteria while others can only be qualitative evaluated so that no specific scores can be obtained. For the above reasons an improved fuzzy comprehensive evaluation method is proposed in which all assessment factors are divided into two categories and are evaluated with different criteria. The method integrates the advantage of quantitative evaluation and qualitative evaluation. Finally it is verified by a case and the result shows that the application of the improved fuzzy approach to choose contractor is effective and reasonable.


2020 ◽  
Vol 984 ◽  
pp. 183-188
Author(s):  
Rong Jun Zhang ◽  
Xiao Ke Wang ◽  
Jin Lin Zhao ◽  
Zheng Peng Zhou ◽  
Gang Chen

The composite flooding formula utilizes the characteristics of polymer flooding and surfactant flooding to compensate for the shortage of single component chemical flooding, reduce the oil-water interfacial tension to a certain extent, and broaden the maintenance range of low interfacial tension. The combined effects and synergies in the oil displacement process enhance oil recovery and allow it to adapt to a wider range of reservoir conditions. In this paper, the high surface active polymer-surfactant flooding formula suitable for the Chang 6 reservoir in Ansai Oilfield was evaluated. The general technical index of the viscoelastic surfactant fracturing fluid and the composite flooding surfactant were evaluated. The technical requirements are evaluation criteria, and comprehensive evaluation is made from several aspects such as salt tolerance, interfacial tension and emulsifying properties.


2020 ◽  
Vol 12 (6) ◽  
pp. 108
Author(s):  
Alessandra de Melo e Silva ◽  
João José Costa Gondim ◽  
Robson de Oliveira Albuquerque ◽  
Luis Javier García Villalba

The cyber security landscape is fundamentally changing over the past years. While technology is evolving and new sophisticated applications are being developed, a new threat scenario is emerging in alarming proportions. Sophisticated threats with multi-vectored, multi-staged and polymorphic characteristics are performing complex attacks, making the processes of detection and mitigation far more complicated. Thus, organizations were encouraged to change their traditional defense models and to use and to develop new systems with a proactive approach. Such changes are necessary because the old approaches are not effective anymore to detect advanced attacks. Also, the organizations are encouraged to develop the ability to respond to incidents in real-time using complex threat intelligence platforms. However, since the field is growing rapidly, today Cyber Threat Intelligence concept lacks a consistent definition and a heterogeneous market has emerged, including diverse systems and tools, with different capabilities and goals. This work aims to provide a comprehensive evaluation methodology of threat intelligence standards and cyber threat intelligence platforms. The proposed methodology is based on the selection of the most relevant candidates to establish the evaluation criteria. In addition, this work studies the Cyber Threat Intelligence ecosystem and Threat Intelligence standards and platforms existing in state-of-the-art.


Sign in / Sign up

Export Citation Format

Share Document