SlideShare a Scribd company logo
Week 3 Assignment: Analyze Action Research
log Teaching and Learning
Orlanda Haynes
North Central University
School of Education
Ed. D Student
EDR 8204-3 - summer 2018
Copyright Note: All images used in this presentation have been confirmed to be either in the
public domain, of expired copyright status, licensed under the GNU Free Documentation
License, or using creative commons license
Speaker Notes
Hello, everyone! I’m Orlanda Haynes.
Thanks for joining the presentation on “Analyze Action Research.”
This presentation is an example of an action research project within
an education environment. The primary aim is to address specific
problems or issues (effectively) in applied settings and in real-time
(Creswell, 2012; Mills, 2014).
When to Use Action Research
• To address specific problems or
issues in applied settings
• To create reflective opportunities
about problems or issues
• To offer means to staff
development (e.g., education
practitioners)
• To improve work related practices,
in part, by being participants
Primary Types of Action Research
•Practical
•Participatory
In teaching and learning environments, practical research occurs when the aim is
to improve teaching methods, to help students learn more effectively, and to
create educational settings that are proactive and content relevant. Usually,
projects involve small-scaled and narrowly focused plans, which address specific
issues or problems (Creswell, 2012).
On the other hand, participatory inquiries refer to plans designed to address
social, organizational, or community problems. The primary purpose is to
improve people’s lives by empowering them to create solutions that address
specific problems or issues (Lodico, Spaulding, & Voegtle, 2010; Mills, 2014).
An issue of interest could be, for instance, to repeal public schools textbook
publication laws, which allow the omission of important historical figures and
cultural events.
Speaker Notes
A Sample Action
Research Project
Internet Safety
Grade levels
6th – 12th
Speaker Notes
Most schools rely on internet access for all manners of teaching,
learning, and communication needs (Prieger, 2013). Tomczyk and
Kopecký (2016) noted that “ . . . Systematic use of . . . Electronic
media begins . . . At the age of 7–11” (Abstract).
They went on to say that “The very devices that are easily used . . .
Become an open door for unscrupulous forces to steal information
and seize control of machines for nefarious purposes;[the] problem is
multi-faceted” . . . .
Speaker Notes
Moreover, Shillair et al. (2015) conducted a study entitled “Online
Safety Begins with You and Me: Convincing Internet Users to
Protect Themselves.” They discovered that most online schools,
colleges, and universities post messages on their websites about how
students should protect themselves while engaging in cyber
environments (Ng Chong, Kanagasundram, Yee Hway, Loong, &
Teoh Kar, 2016; Prieger, 2013; Shillair et al., 2015; Tomczyk &
Kopecký, 2016).
Speaker Notes
Despite these measures, however, administrators at XYZ Middle
school district (in 2016) reported an alarming increase in
students’ complaints about the lack of internet security,
especially password protection.
To address the problem, in January of 2018, the school board
approved an action research plan that included a mandatory
cybersecurity program (for both students and staff) and an annual
district-wide survey to include all staff as well as students and
parent.
A Sample Action Research Problem Statement
• Students in grades
levels six through
12th lack sufficient
Internet safety skills
to cope with
emerging cyber
threats.
Purpose of the Research
• To determine the cause of the problem
and to recommend an effective
solution
• To build a web-based education
program based on best practice for
emerging cyber-threats
• To emphasize the importance of
internet security and to encourage
students’ awareness by sharing
knowledge about internet security
resources and by implementing a
mandatory cyber-security activity
Goals of the Research
Upon completion of the Cyber
Security program, students will
understand:
• Basic Internet terminologies, tools,
and resources;
• Primary Internet security problems
and implications;
• How to recognize cyber-threats;
• What does “the Internet is forever
means”;
• The importance of password
protection; and
• Concepts of Spam and Phishing?
Why are
Passwords
Important?
Goals of the Research
Speaker Notes
Why are “passwords” important? They help protect end-users’ data
privacy when they engage in online activities (Shillair, et al., 2015).
The University of Ottawa, Canada, published the article “The
Importance of Passwords ” to emphasize current and emerging cyber
communication threats. They noted that students should not create
common passwords such as yellow123 because common colors
joined by standard sequence of numbers are too easy for cyber
hackers to steal and use inappropriately (The Importance of
Passwords, n.d.).
Goals of the Research
Spam and Phishing?
Speaker Notes
Most students are familiar with junk mail, which is unauthorized advertisements
from companies and individuals via standard mail or other third party mail
delivery services. Spam is its equivalent, which is usually sent via emails and
text messages (Mazzarello, Fralick, & Clemons, 2016). But how do they obtain
your addresses? You may ask.
Commercial, mailing-list vendors and internet software programs designed to
identify and compile electronic addresses are common sources. Likewise,
phishing share similar characteristics as far as being unsolicited and using
similar delivery options (Mazzarello, Fralick, & Clemons, 2016;Tomczyk, &
Kopecký, 2016). However, the purpose is different.
Speaker Notes
Most business communities, for instance, label the act a scam
because cyber hackers and cyberthieves shop for personal
information including passwords, credit cards and bank account
numbers, as well as social security numbers. Their sole purpose is to
commit fraud (Mazzarello, Fralick, & Clemons, 2016;Tomczyk, &
Kopecký, 2016).
The Participants
Students and Staff Parents
Speaker Notes
Students and staff will complete two online surveys (e.g., before and
after the research) based on closed-ended research questions and a
cybersecurity online activity; they will also complete a standardized
exam (Lodico, Spaulding, & Voegtle, 2010).
Researchers will ask parents, via phone or email, to take part in the
surveys; however, the cybersecurity online activity will be optional
although recommended. They will also issue passwords to all
participants and follow standard research protocol for conducting
research with human subjects (Mills, 2014).
Data Collection Methods
Survey
Question Pro Online Program
http://www.questionpro.com/aki
ra/ShowResults?id=161974)
Data Collection Method: Cyber Activities
Speaker Notes
Read the slide text out-loud and remind research participants that all
information regarding the research project will be emailed to them
two weeks prior to the start date.
Please follow this link: https://sos.fbi.gov./. Pay close attention to
the instructions. After completing all sections, take the quiz. The
game only allows for one attempt. For addition resources, click the
link below (internet security tutorial):
http://www.netsmartz.org/Presentations/Tweens
Sharing of the Results
Speaker Notes
The lead researcher should draft a research report and then present
the findings at XYZ next school-board meeting (time and date to be
decided) (Lodico, Spaulding, & Voegtle, 2010).
In addition, he/she should give a certified copy to all board members
two weeks prior to the meeting date (Lodico, Spaulding, & Voegtle,
2010). Please contact the research director for further guidance. The
report should include the following (see next slide):
Speaker Notes
•The research context and background data
•Literature review
•Practice to improve
•Description of action plan and implementation procedures
•Data collection methods
•Data analysis and results
•Reflection, implications, and recommendations
•References
Week 3 Assignment: Analyze Action Research
This concludes the presentation.
Let’s take a few moments for questions, thoughts, or comments.
References
Creswell, J. W. (2013). Qualitative inquiry and research design: Choosing
among five approaches. Thousand Oaks, CA: Sage Publications.
Creswell, J.W. (2012). Educational research: planning, conducting and
evaluating quantitative and qualitative research (4th Ed.). Boston, MA:
Pearson Education Inc.
Jang-Jaccard, J., & Nepal, S. (2014). A survey of emerging threats in
cybersecurity. Journal of Computer and System Sciences, 80(5), pp. 973–993.
http://dx.doi.org/ 10.1016/j.jcss.2014.02.005
References
Lodico, M., Spaulding, D., & Voegtle, K. (2010). Methods in educational
research: From theory to practice (Laureate Education, Inc., custom ed.). San
Francisco: John Wiley & Sons.
Mazzarello, S., Fralick, M., & Clemons, M. (2016). A simple approach for
eliminating spam. Current Oncology, 23(1), e75-e76.
https://doi:10.3747/co.23.2860
Mills, G. E. (2014). Action research: A guide for the teacher researcher (5th
eds.). London: Pearson Education Limited.
References
National Center for Education Statistics. (2016, May). Indicators of school crime
and safety. Retrieved from
Ng Chong, G., Kanagasundram, S., Yee Hway, A., Tan Loong, H., & Teoh Kar,
M. (2016). Cyber bullying: A new social menace. ASEAN Journal of
Psychiatry, 17(1), 104-115. Retrieved
fromhttps://umexpert.um.edu.my/file/publication/00012227_134529.pdf
Ott, K. (2017, 03). The internet endureth forever. Sojourners Magazine, 46, pp.
30-33. Retrieved from
file:///C:/Users/educa/Desktop/EduProposals/The%20Internet.pdf
References
Prieger, J. (2013). The impact of government policies on access to broadband.
School of public policy working papers. Retrieved from
http://digitalcommons.pepperdine.edu/cgi/viewcontent.cgi?article=1043&contex
t=sppworkingpapers
Shillair, R., Cotten, S. R., Tsai, H. S., Alhabash, S., LaRose, R., & Rifon, N. J.
(2015). Online safety begins with you and me: Convincing Internet users to
protect themselves. Computers in Human Behavior, 48, pp. 199-207.
https://doi.org/10.1016/j.chb.2015.01.046
The Importance of Passwords (n.d.). University of Ottawa, Canada.
Retrieved from https://it.uottawa.ca/accounts/password-tips
References
Tomczyk, Ł., & Kopecký, K. (2016). Children and youth safety on the Internet:
Experiences from Czech Republic and Poland. Telematics and Informatics, 33,
pp. 822-833. Retrieved from
https://www.researchgate.net/profile/Lukasz_Tomczyk/publication/285288746_
Children_and_Youth_Safety_on_Internet_Experiences_from_Czech_Republic_
and_Poland/links/56d3138108aeb52500d1829c/Children-and-Youth-Safety-on-
Internet-Experiences-from-Czech-Republic-and-Poland.pdf

More Related Content

PPT
Collaboration, information literacy, and troublesome knowledge: Threshold co...
PPTX
Student vulnerability, agency and learning analytics: an exploration
PPTX
Privacy-driven design of Learning Analytics applications – exploring the desi...
PPTX
THE USE OF CLOUD COMPUTING SYSTEMS IN HIGHER EDUCATION; The Lived Experien...
PPTX
Some Thoughts on Learning Analytics and Educational Data Mining
PPTX
Grand challenges for the Educational Data Mining and Learning Sciences Commun...
PDF
Creating & managing your scholarly web presence
PPTX
OLT conference Learning analytics
Collaboration, information literacy, and troublesome knowledge: Threshold co...
Student vulnerability, agency and learning analytics: an exploration
Privacy-driven design of Learning Analytics applications – exploring the desi...
THE USE OF CLOUD COMPUTING SYSTEMS IN HIGHER EDUCATION; The Lived Experien...
Some Thoughts on Learning Analytics and Educational Data Mining
Grand challenges for the Educational Data Mining and Learning Sciences Commun...
Creating & managing your scholarly web presence
OLT conference Learning analytics

What's hot (20)

PDF
EDRD*6000 - SlideShare Presentation - Paul Simon
PDF
Open Science and Ethics studies in SLE research
PDF
An Examination of the Prior Use of E-Learning Within an Extended Technology A...
PDF
A Multimedia Data Mining Framework for Monitoring E-Examination Environment
PPT
Information Literacy for Engineering Students
PPTX
Why ethics?
PDF
Time management of internet dependency among university students and its impa...
PDF
Turning Learning into Numbers - A Learning Analytics Framework
PDF
Promoting Reading Through Web Engagement
PPTX
Lak15workshop vulnerability
PPT
Technology and Student Affairs
PPTX
Towards Tangible Trusted Learning Analytics
PPTX
Developing a multiple-document-processing performance assessment for epistem...
PDF
Six dimensions of Learning Analytics
PDF
Academic Integrity Keynote
PPTX
Keynote speech - Carole Goble - Jisc Digital Festival 2015
PPTX
Learning Analytics – Ethical questions and dilemmas
PDF
edmedia2014-learning-analytics-keynote
PPT
Conole Inaugural Final
PDF
Dealing with the plague of plagiarism in nigeria
EDRD*6000 - SlideShare Presentation - Paul Simon
Open Science and Ethics studies in SLE research
An Examination of the Prior Use of E-Learning Within an Extended Technology A...
A Multimedia Data Mining Framework for Monitoring E-Examination Environment
Information Literacy for Engineering Students
Why ethics?
Time management of internet dependency among university students and its impa...
Turning Learning into Numbers - A Learning Analytics Framework
Promoting Reading Through Web Engagement
Lak15workshop vulnerability
Technology and Student Affairs
Towards Tangible Trusted Learning Analytics
Developing a multiple-document-processing performance assessment for epistem...
Six dimensions of Learning Analytics
Academic Integrity Keynote
Keynote speech - Carole Goble - Jisc Digital Festival 2015
Learning Analytics – Ethical questions and dilemmas
edmedia2014-learning-analytics-keynote
Conole Inaugural Final
Dealing with the plague of plagiarism in nigeria
Ad

Similar to EDR 8204 Week 3 Assignment: Analyze Action Research (20)

PPTX
EDR8204-3
PDF
Designing a Survey Study to Measure the Diversity of Digital Learners
PDF
Designing a Survey Study to Measure the Diversity of Digital Learners
DOCX
BSCS_IASN21C-24-25-Information-Assurance-and-Security-1 (1).docx
PPTX
Final year college project on a study on acceptance of e learning among grad...
PPTX
144 presentation iee_tel2021
PPT
Doing Your Part to Stay Safe Online
PPTX
Universal Design for Learning: A framework for addressing learner diversity
PPTX
Working with Social Media Data: Ethics & good practice around collecting, usi...
PPTX
PP for syncrinization
PPTX
Munassir etec647 e presentation
PDF
Irjet v4 i73A Survey on Student’s Academic Experiences using Social Media Data53
PPTX
Mseit advisory mtgoctober2013
PPTX
MOOCs & Learning Analytics
PPTX
Krakow presentation speak_appsmngm_final
DOCX
Computers in Human Behavior xxx (2012) xxx–xxxContents lists.docx
PPTX
Eurocall2014 SpeakApps Presentation - SpeakApps and Learning Analytics
PPTX
[DSC Europe 22] Machine learning algorithms as tools for student success pred...
PDF
Organizing to Get Analytics Right
PPTX
Keynote Presentation: Implementing learning analytics and learning design at ...
EDR8204-3
Designing a Survey Study to Measure the Diversity of Digital Learners
Designing a Survey Study to Measure the Diversity of Digital Learners
BSCS_IASN21C-24-25-Information-Assurance-and-Security-1 (1).docx
Final year college project on a study on acceptance of e learning among grad...
144 presentation iee_tel2021
Doing Your Part to Stay Safe Online
Universal Design for Learning: A framework for addressing learner diversity
Working with Social Media Data: Ethics & good practice around collecting, usi...
PP for syncrinization
Munassir etec647 e presentation
Irjet v4 i73A Survey on Student’s Academic Experiences using Social Media Data53
Mseit advisory mtgoctober2013
MOOCs & Learning Analytics
Krakow presentation speak_appsmngm_final
Computers in Human Behavior xxx (2012) xxx–xxxContents lists.docx
Eurocall2014 SpeakApps Presentation - SpeakApps and Learning Analytics
[DSC Europe 22] Machine learning algorithms as tools for student success pred...
Organizing to Get Analytics Right
Keynote Presentation: Implementing learning analytics and learning design at ...
Ad

More from eckchela (20)

PDF
Aspen University EDD830 Module 5 Discussion Question
PDF
EDD830-Leadership Theory: Module 3 Assignment
PDF
Why is leadership a key issue in management?
PDF
DPSY-6215-2 and PSYC-6215-2: Week 10 Discussion
DOCX
Walden University DPSY 6215/8215
PDF
DPSY 8215/ PSY Week 5 Discussion: Infancy and Childhood
PDF
DPSY 6215-2/ PSYC 6215-2 Week 2: Social and Cognitive Development
PDF
DPSY 6121/8121 Week 11 Dscussion
PDF
DPSY 6121-8121 Week 10 Final Project: Mitigation Plan
PDF
DPSY Week-9 Discussion 2: Generational Differences
PDF
DPSY 6121/8121 Discussion Week 7: Cyber-Victimization
PDF
DPSY 5111 6121-8121 Week 6 Discussion
PDF
DPSY 6121-8121-5121 Week 5 Discussion 1
PPTX
EL-7010 Week 1 Assignment: Online Learning for the K-12 Students
PDF
DPSY 5111-6111 Week 3 Assignment: Final Project: Mitigation Plan
DOCX
DPSY 8111/6112 Week 5 Assignment
PDF
DPSY-8111-DPSY 6111 Week 10 Project: Retirement Issues
PDF
Thread: Discussion - Week 8 – DPSY-6111-1/DPSY-5111-1
PDF
Thread: Discussion 1 - Week 7 – DPSY-6111-1/DPSY-5111-1
PDF
Thread: Discussion - Week 9 – DPSY-6111-1/DPSY-5111-1
Aspen University EDD830 Module 5 Discussion Question
EDD830-Leadership Theory: Module 3 Assignment
Why is leadership a key issue in management?
DPSY-6215-2 and PSYC-6215-2: Week 10 Discussion
Walden University DPSY 6215/8215
DPSY 8215/ PSY Week 5 Discussion: Infancy and Childhood
DPSY 6215-2/ PSYC 6215-2 Week 2: Social and Cognitive Development
DPSY 6121/8121 Week 11 Dscussion
DPSY 6121-8121 Week 10 Final Project: Mitigation Plan
DPSY Week-9 Discussion 2: Generational Differences
DPSY 6121/8121 Discussion Week 7: Cyber-Victimization
DPSY 5111 6121-8121 Week 6 Discussion
DPSY 6121-8121-5121 Week 5 Discussion 1
EL-7010 Week 1 Assignment: Online Learning for the K-12 Students
DPSY 5111-6111 Week 3 Assignment: Final Project: Mitigation Plan
DPSY 8111/6112 Week 5 Assignment
DPSY-8111-DPSY 6111 Week 10 Project: Retirement Issues
Thread: Discussion - Week 8 – DPSY-6111-1/DPSY-5111-1
Thread: Discussion 1 - Week 7 – DPSY-6111-1/DPSY-5111-1
Thread: Discussion - Week 9 – DPSY-6111-1/DPSY-5111-1

Recently uploaded (20)

PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PDF
O5-L3 Freight Transport Ops (International) V1.pdf
PPTX
Renaissance Architecture: A Journey from Faith to Humanism
PPTX
Institutional Correction lecture only . . .
PPTX
Microbial diseases, their pathogenesis and prophylaxis
PDF
O7-L3 Supply Chain Operations - ICLT Program
PPTX
Cell Structure & Organelles in detailed.
PDF
STATICS OF THE RIGID BODIES Hibbelers.pdf
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PDF
102 student loan defaulters named and shamed – Is someone you know on the list?
PDF
Basic Mud Logging Guide for educational purpose
PDF
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
PDF
VCE English Exam - Section C Student Revision Booklet
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PPTX
Introduction to Child Health Nursing – Unit I | Child Health Nursing I | B.Sc...
PDF
Pre independence Education in Inndia.pdf
PDF
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
O5-L3 Freight Transport Ops (International) V1.pdf
Renaissance Architecture: A Journey from Faith to Humanism
Institutional Correction lecture only . . .
Microbial diseases, their pathogenesis and prophylaxis
O7-L3 Supply Chain Operations - ICLT Program
Cell Structure & Organelles in detailed.
STATICS OF THE RIGID BODIES Hibbelers.pdf
Supply Chain Operations Speaking Notes -ICLT Program
102 student loan defaulters named and shamed – Is someone you know on the list?
Basic Mud Logging Guide for educational purpose
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
Abdominal Access Techniques with Prof. Dr. R K Mishra
VCE English Exam - Section C Student Revision Booklet
Final Presentation General Medicine 03-08-2024.pptx
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
Introduction to Child Health Nursing – Unit I | Child Health Nursing I | B.Sc...
Pre independence Education in Inndia.pdf
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf

EDR 8204 Week 3 Assignment: Analyze Action Research

  • 1. Week 3 Assignment: Analyze Action Research log Teaching and Learning Orlanda Haynes North Central University School of Education Ed. D Student EDR 8204-3 - summer 2018 Copyright Note: All images used in this presentation have been confirmed to be either in the public domain, of expired copyright status, licensed under the GNU Free Documentation License, or using creative commons license
  • 2. Speaker Notes Hello, everyone! I’m Orlanda Haynes. Thanks for joining the presentation on “Analyze Action Research.” This presentation is an example of an action research project within an education environment. The primary aim is to address specific problems or issues (effectively) in applied settings and in real-time (Creswell, 2012; Mills, 2014).
  • 3. When to Use Action Research • To address specific problems or issues in applied settings • To create reflective opportunities about problems or issues • To offer means to staff development (e.g., education practitioners) • To improve work related practices, in part, by being participants
  • 4. Primary Types of Action Research •Practical •Participatory
  • 5. In teaching and learning environments, practical research occurs when the aim is to improve teaching methods, to help students learn more effectively, and to create educational settings that are proactive and content relevant. Usually, projects involve small-scaled and narrowly focused plans, which address specific issues or problems (Creswell, 2012). On the other hand, participatory inquiries refer to plans designed to address social, organizational, or community problems. The primary purpose is to improve people’s lives by empowering them to create solutions that address specific problems or issues (Lodico, Spaulding, & Voegtle, 2010; Mills, 2014). An issue of interest could be, for instance, to repeal public schools textbook publication laws, which allow the omission of important historical figures and cultural events. Speaker Notes
  • 6. A Sample Action Research Project Internet Safety Grade levels 6th – 12th
  • 7. Speaker Notes Most schools rely on internet access for all manners of teaching, learning, and communication needs (Prieger, 2013). Tomczyk and Kopecký (2016) noted that “ . . . Systematic use of . . . Electronic media begins . . . At the age of 7–11” (Abstract). They went on to say that “The very devices that are easily used . . . Become an open door for unscrupulous forces to steal information and seize control of machines for nefarious purposes;[the] problem is multi-faceted” . . . .
  • 8. Speaker Notes Moreover, Shillair et al. (2015) conducted a study entitled “Online Safety Begins with You and Me: Convincing Internet Users to Protect Themselves.” They discovered that most online schools, colleges, and universities post messages on their websites about how students should protect themselves while engaging in cyber environments (Ng Chong, Kanagasundram, Yee Hway, Loong, & Teoh Kar, 2016; Prieger, 2013; Shillair et al., 2015; Tomczyk & Kopecký, 2016).
  • 9. Speaker Notes Despite these measures, however, administrators at XYZ Middle school district (in 2016) reported an alarming increase in students’ complaints about the lack of internet security, especially password protection. To address the problem, in January of 2018, the school board approved an action research plan that included a mandatory cybersecurity program (for both students and staff) and an annual district-wide survey to include all staff as well as students and parent.
  • 10. A Sample Action Research Problem Statement • Students in grades levels six through 12th lack sufficient Internet safety skills to cope with emerging cyber threats.
  • 11. Purpose of the Research • To determine the cause of the problem and to recommend an effective solution • To build a web-based education program based on best practice for emerging cyber-threats • To emphasize the importance of internet security and to encourage students’ awareness by sharing knowledge about internet security resources and by implementing a mandatory cyber-security activity
  • 12. Goals of the Research Upon completion of the Cyber Security program, students will understand: • Basic Internet terminologies, tools, and resources; • Primary Internet security problems and implications; • How to recognize cyber-threats; • What does “the Internet is forever means”; • The importance of password protection; and • Concepts of Spam and Phishing?
  • 14. Speaker Notes Why are “passwords” important? They help protect end-users’ data privacy when they engage in online activities (Shillair, et al., 2015). The University of Ottawa, Canada, published the article “The Importance of Passwords ” to emphasize current and emerging cyber communication threats. They noted that students should not create common passwords such as yellow123 because common colors joined by standard sequence of numbers are too easy for cyber hackers to steal and use inappropriately (The Importance of Passwords, n.d.).
  • 15. Goals of the Research Spam and Phishing?
  • 16. Speaker Notes Most students are familiar with junk mail, which is unauthorized advertisements from companies and individuals via standard mail or other third party mail delivery services. Spam is its equivalent, which is usually sent via emails and text messages (Mazzarello, Fralick, & Clemons, 2016). But how do they obtain your addresses? You may ask. Commercial, mailing-list vendors and internet software programs designed to identify and compile electronic addresses are common sources. Likewise, phishing share similar characteristics as far as being unsolicited and using similar delivery options (Mazzarello, Fralick, & Clemons, 2016;Tomczyk, & Kopecký, 2016). However, the purpose is different.
  • 17. Speaker Notes Most business communities, for instance, label the act a scam because cyber hackers and cyberthieves shop for personal information including passwords, credit cards and bank account numbers, as well as social security numbers. Their sole purpose is to commit fraud (Mazzarello, Fralick, & Clemons, 2016;Tomczyk, & Kopecký, 2016).
  • 19. Speaker Notes Students and staff will complete two online surveys (e.g., before and after the research) based on closed-ended research questions and a cybersecurity online activity; they will also complete a standardized exam (Lodico, Spaulding, & Voegtle, 2010). Researchers will ask parents, via phone or email, to take part in the surveys; however, the cybersecurity online activity will be optional although recommended. They will also issue passwords to all participants and follow standard research protocol for conducting research with human subjects (Mills, 2014).
  • 20. Data Collection Methods Survey Question Pro Online Program http://www.questionpro.com/aki ra/ShowResults?id=161974)
  • 21. Data Collection Method: Cyber Activities
  • 22. Speaker Notes Read the slide text out-loud and remind research participants that all information regarding the research project will be emailed to them two weeks prior to the start date. Please follow this link: https://sos.fbi.gov./. Pay close attention to the instructions. After completing all sections, take the quiz. The game only allows for one attempt. For addition resources, click the link below (internet security tutorial): http://www.netsmartz.org/Presentations/Tweens
  • 23. Sharing of the Results
  • 24. Speaker Notes The lead researcher should draft a research report and then present the findings at XYZ next school-board meeting (time and date to be decided) (Lodico, Spaulding, & Voegtle, 2010). In addition, he/she should give a certified copy to all board members two weeks prior to the meeting date (Lodico, Spaulding, & Voegtle, 2010). Please contact the research director for further guidance. The report should include the following (see next slide):
  • 25. Speaker Notes •The research context and background data •Literature review •Practice to improve •Description of action plan and implementation procedures •Data collection methods •Data analysis and results •Reflection, implications, and recommendations •References
  • 26. Week 3 Assignment: Analyze Action Research This concludes the presentation. Let’s take a few moments for questions, thoughts, or comments.
  • 27. References Creswell, J. W. (2013). Qualitative inquiry and research design: Choosing among five approaches. Thousand Oaks, CA: Sage Publications. Creswell, J.W. (2012). Educational research: planning, conducting and evaluating quantitative and qualitative research (4th Ed.). Boston, MA: Pearson Education Inc. Jang-Jaccard, J., & Nepal, S. (2014). A survey of emerging threats in cybersecurity. Journal of Computer and System Sciences, 80(5), pp. 973–993. http://dx.doi.org/ 10.1016/j.jcss.2014.02.005
  • 28. References Lodico, M., Spaulding, D., & Voegtle, K. (2010). Methods in educational research: From theory to practice (Laureate Education, Inc., custom ed.). San Francisco: John Wiley & Sons. Mazzarello, S., Fralick, M., & Clemons, M. (2016). A simple approach for eliminating spam. Current Oncology, 23(1), e75-e76. https://doi:10.3747/co.23.2860 Mills, G. E. (2014). Action research: A guide for the teacher researcher (5th eds.). London: Pearson Education Limited.
  • 29. References National Center for Education Statistics. (2016, May). Indicators of school crime and safety. Retrieved from Ng Chong, G., Kanagasundram, S., Yee Hway, A., Tan Loong, H., & Teoh Kar, M. (2016). Cyber bullying: A new social menace. ASEAN Journal of Psychiatry, 17(1), 104-115. Retrieved fromhttps://umexpert.um.edu.my/file/publication/00012227_134529.pdf Ott, K. (2017, 03). The internet endureth forever. Sojourners Magazine, 46, pp. 30-33. Retrieved from file:///C:/Users/educa/Desktop/EduProposals/The%20Internet.pdf
  • 30. References Prieger, J. (2013). The impact of government policies on access to broadband. School of public policy working papers. Retrieved from http://digitalcommons.pepperdine.edu/cgi/viewcontent.cgi?article=1043&contex t=sppworkingpapers Shillair, R., Cotten, S. R., Tsai, H. S., Alhabash, S., LaRose, R., & Rifon, N. J. (2015). Online safety begins with you and me: Convincing Internet users to protect themselves. Computers in Human Behavior, 48, pp. 199-207. https://doi.org/10.1016/j.chb.2015.01.046 The Importance of Passwords (n.d.). University of Ottawa, Canada. Retrieved from https://it.uottawa.ca/accounts/password-tips
  • 31. References Tomczyk, Ł., & Kopecký, K. (2016). Children and youth safety on the Internet: Experiences from Czech Republic and Poland. Telematics and Informatics, 33, pp. 822-833. Retrieved from https://www.researchgate.net/profile/Lukasz_Tomczyk/publication/285288746_ Children_and_Youth_Safety_on_Internet_Experiences_from_Czech_Republic_ and_Poland/links/56d3138108aeb52500d1829c/Children-and-Youth-Safety-on- Internet-Experiences-from-Czech-Republic-and-Poland.pdf