Support of Case-Based Authentic Learning Activities: A Collaborative Case  Commenting Tool and a Collaborative Case Builder

Cases are widely used in professional education to engage learners with examples of real world practices. Collaboration in case-based learning can add to the authenticity of the experience by encouraging learners to synthesize multiple perspectives. In this paper, we present some of our experiences in collaborative case-based learning in the context of a usability engineering (UE) course. The work reported here is part of an ongoing project designing UE cases and learning activities that use them; more recently we have begun to explore the role of collaborative activities and tools in case- based learning. We describe the activities that were developed and fielded in two different UE courses, and two collaborative tools created to support these activities - a collaborative case browser and a collaborative case builder. Students were positive about both types of collaborative activities and offered suggestions for how to enhance effectiveness in the future.

[1]  Mary Beth Rosson,et al.  Notification and awareness: synchronizing task-oriented collaborative activity , 2003, Int. J. Hum. Comput. Stud..

[2]  Peng Liu,et al.  A Semi-Markov Survivability Evaluation Model for Intrusion Tolerant Database Systems , 2010, 2010 International Conference on Availability, Reliability and Security.

[3]  Betty Bekemeier,et al.  Making the case: leveraging resources toward public health system improvement in Turning Point states. , 2007, Journal of public health management and practice : JPHMP.

[4]  Etienne Wenger,et al.  Situated Learning: Legitimate Peripheral Participation , 1991 .

[5]  Peter J. Denning,et al.  Computing as a discipline , 1989, Computer.

[6]  Alan Robert Peslak A Study of Information Technology Integration , 2010 .

[7]  Wei-Fan Chen,et al.  Developing a Game-based Learning Environment in Classrooms: A Conceptual Model , 2010 .

[8]  R. Slavin Cooperative Learning: Theory, Research and Practice , 1990 .

[9]  Annemarie S. Palincsar,et al.  Social constructivist perspectives on teaching and learning. , 1998, Annual review of psychology.

[10]  P. Goodyear Psychological foundations for networked learning , 2001 .

[11]  J. Bransford How people learn , 2000 .

[12]  Allen B. Tucker,et al.  A summary of the acm/ieee-cs joint curriculum task force report: computing curricula 1991 , 1991 .

[13]  Wendy Ceccucci,et al.  An Empirical Study of Instant Messaging Behavior Using Diffusion of Innovation Theory , 2010 .

[14]  Girish H. Subramanian,et al.  User Perception Differences in Enterprise Resource Planning Implementations , 2010, J. Comput. Inf. Syst..

[15]  J.M. Carroll,et al.  Case Studies as Minimalist Information , 2006, IEEE Transactions on Professional Communication.

[16]  Dongwon Lee,et al.  Pairwise Constrained Clustering for Sparse and High Dimensional Feature Spaces , 2009, PAKDD.

[17]  Tom Carey,et al.  ACM SIGCHI Curricula for Human-Computer Interaction , 1992 .

[18]  Alan Robert Peslak An exploration of the legal and regulatory environment of privacy and security through active research, guided study, blog creation, and discussion , 2009 .

[19]  JOHN M. CARROLL,et al.  Usability Engineering : Design Rationale , Development , and Classroom Experience , 2005 .

[20]  Gary A. Davis,et al.  AN EMPIRICAL STUDY OF THE RELATIVE IMPORTANCE OF SPECIFIC TECHNOLOGY SKILLS, GENERAL BUSINESS SKILLS, AND GENERAL TECHNOLOGY SKILLS , 2009 .

[21]  Alan Robert Peslak,et al.  The Complexities of Effectively Teaching Client Server System Development , 2008 .

[22]  Linda Lohr,et al.  Psychology of learning for instruction , 2005 .

[23]  Mary Beth Rosson,et al.  Usability Engineering: Scenario-based Development of Human-Computer Interaction , 2001 .

[24]  Paul R. Klohr The Greening of Curriculum , 1971 .

[25]  Peng Liu,et al.  Evaluating survivability and costs of three virtual machine based server architectures , 2010, 2010 International Conference on Security and Cryptography (SECRYPT).

[26]  Susan M. Williams,et al.  Putting Case-Based Instruction Into Context: Examples From Legal and Medical Education , 1992 .

[27]  Wei-Fan Chen,et al.  The Effect of Concept Mapping on Students’ Online Hypermedia Learning: A Pilot Study , 2009 .

[28]  Wendy Ceccucci,et al.  Got Web 2.0? A Review of Web 2.0 Tools for the Information Systems Curriculum. , 2010 .

[29]  Alan R. Peslak A STUDY OF ERP SUCCESS FROM 2003 TO 2006 AS VIEWED BY TOP FINANCIAL EXECUTIVES , 2009 .

[30]  Donald A. Schön The Reflective turn : case studies in and on educational practice , 1991 .

[31]  Debra L. Smarkusky,et al.  The art of Alice: adding a musical component , 2009 .

[32]  Debra L. Smarkusky,et al.  An interdisciplinary approach in applying fundamental concepts , 2009, SIGITE '09.

[33]  J. Dewey Democracy and education : an introduction to the philosophy of education , 1961 .

[34]  C. Rogers,et al.  Case Methods in Teacher Education , 2010 .

[35]  Gary W. Strong,et al.  New directions in human-computer interaction: education, research, and practice , 1995, INTR.

[36]  Wei-Fan Chen,et al.  Non-native English Students’ Perceptions of Culture in the Online Asynchronous Discussion Board , 2009 .

[37]  David W. Johnson,et al.  AN OVERVIEW OF COOPERATIVE LEARNING , 2002 .

[38]  Alex Hai Wang,et al.  Detecting Spam Bots in Online Social Networking Sites: A Machine Learning Approach , 2010, DBSec.

[39]  J. Dewey Democracy and education : an introduction to philosophy of education / John Dewey , 1916 .

[40]  Brian E. Mennecke,et al.  Using group support systems to discover hidden profiles: an examination of the influence of group size and meeting structures on information sharing and decision quality , 1997, Int. J. Hum. Comput. Stud..

[41]  D. Scott McCrickard,et al.  Designing Attention-Centric Notification Systems: Five HCI Challenges , 2005 .

[42]  Thomas Herrmann,et al.  Intertwining perspectives and negotiation , 1999, GROUP.

[43]  Wei-Fan Chen Work in progress - creating expert systems in engineering education , 2009, 2009 39th IEEE Frontiers in Education Conference.

[44]  G. Stasser,et al.  Information sampling in structured and unstructured discussions of three- and six-person groups. , 1989 .

[45]  A. Collins,et al.  Situated Cognition and the Culture of Learning , 1989 .

[46]  Chris Jones,et al.  Networked Learning: Perspectives and Issues , 2001 .

[47]  P. Cobb,et al.  Cognitive and Situated Learning Perspectives in Theory and Practice , 1999 .

[48]  Wendy Ceccucci,et al.  An Empirical Study of Text Messaging Behavioral Intention and Usage , 2010 .

[49]  Wendy Ceccucci,et al.  An Empirical Study of Behavioral Factors Influencing Text Messaging Intention , 2010 .

[50]  Alan Robert Peslak,et al.  A LONGITUDINAL STUDY OF FINANCIAL EXECUTIVES' VIEWS ON INFORMATION SYSTEMS RETURNS AND KEY TECHNOLOGY ISSUES , 2010 .

[51]  Su Yan,et al.  A Stochastic Model of the Damage Propagation in Database Systems , 2009, Security and Management.

[52]  Alan Robert Peslak,et al.  A REVIEW OF INTERNET SHOPPING FACTORS: DO THE TECHNOLOGY ACCEPTANCE MODEL OR THEORY OF REASONED ACTION MODEL APPLY? , 2009 .

[53]  Allen B. Tucker,et al.  Computing Curricula 1991 , 1991, CACM.

[54]  Wendy Ceccucci,et al.  An Empirical Study of Instant Messaging (IM) Behavior Using Theory of Reasoned Action , 2010 .