402 resultados para proposed curriculum
Resumo:
This article reframes comprehension as a social and intellectual practice. It reviews literature on current approaches to reading instruction for linguistically and culturally diverse and low socioeconomic students, noting the current policy emphasis on the teaching of comprehension as autonomous skills and ‘strategies’. The Four Resources model (Freebody & Luke, 1990) is used to situate comprehension instruction with an emphasis on student cultural and community knowledge, and substantive intellectual and sociocultural content in elementary and middle school curricula. Illustrations are drawn from research underway on the teaching of literacy in low socioeconomic schools.
Resumo:
Curriculum evaluation, as a field of study, is dynamic. For over the years it has been responsive to the developments in the conceptualization of curriculum and the associated processes of curriculum change. The concept of curriculum is integral to curriculum evaluation and can be defined in terms of what can and shall be taught to whom, when, where, how, and why. Much of the decision making relates to what knowledge is to be selected for inclusion in the curriculum.
Resumo:
Since 2002 QUT has sponsored a range of first year-focussed initiatives, most recently the Transitions In Project (TIP) which was designed to complement the First Year Experience Program and be a capacity building initiative. A primary focus of TIP was The First Year Curriculum Project: the review, development, implementation and evaluation of first year curriculum which has culminated in the development of a “Good Practice Guide” for the management of large first year units. First year curriculum initiates staff-student relationships and provides the scaffolding for the learning experience and engagement. Good practice in first year curriculum is within the control of the institution and can be redesigned and reviewed to improve outcomes. This session will provide a context for the First Year Curriculum Project and a concise overview of the suite of resources developed that have culminated in the Good Practice Guide.
Resumo:
Across continents and cultures and periods of history, religious beliefs have underpinned curriculum in institutions of education. More recently, the so-called culture wars and terrorism have moved religion to center stage. In both state and independent education sectors, deep-seated assumptions about the nature of reality, spirituality, ethics and knowledge converge and clash in the curriculum documents of science, history, literacy education, and the like. With a focus on textual genres of power, starting with antiquity, this chapter argues that little has changed through millennia as the secular mysticism of price has replaced theology today in constraining the potentials of education.
Resumo:
There is no denying that the information technology revolution of the late twentieth century has arrived. Whilst not equitably accessible for many, others hold high expectations for the contributions online activity will make to student learning outcomes. Concurrently, and not necessarily consequentially, the number of science and technology secondary school and university graduates throughout the world has declined substantially, as has their motivation and engagement with school science (OECD, 2006). The aim of this research paper is to explore one aspect of online activity, that of forum-based netspeak (Crystal, 2006), in relation to the possibilities and challenges it provides for forms of scientific learning. This paper reports findings from a study investigating student initiated netspeak in a science inspired multiliteracies (New London Group, 2000) project in one middle primary (aged 7-10 years) multi-age Australian classroom. Drawing on the theoretical description of the Five phases of enquiry proposed by Bybee (1997), an analytic framework is proffered that allows identification of student engagement, exploration, explanation, elaboration and evaluation of scientific enquiry. The findings provide insight into online forums for advancing learning in and motivation for science in the middle primary years.
Resumo:
In this chapter, we are particularly concerned with making visible the general principles underlying the transmission of Social Studies curriculum knowledge, and considering it in light of a high-stakes mandated national assessment task. Specifically, we draw on Bernstein’s theoretical concept of pedagogic models as a tool for analysing orientations to teaching and learning. We introduce a case in point from the Australian context: one state Social Studies curriculum vis-a-vis one part of the Year Three national assessment measure for reading. We use our findings to consider the implications for the disciplinary knowledge of Social Studies in the communities in which we are undertaking our respective Australian Research Council Linkage project work (Glasswell et al.; Woods et al.). We propose that Social Studies disciplinary knowledge is being constituted, in part, through power struggles between different agencies responsible for the production and relay of official forms of state curriculum and national literacy assessment. This is particularly the case when assessment instruments are used to compare and contrast school results in highly visible web based league tables (see, for example, http://myschoolaustralia.ning.com/).
Resumo:
RFID has been widely used in today's commercial and supply chain industry, due to the significant advantages it offers and the relatively low production cost. However, this ubiquitous technology has inherent problems in security and privacy. This calls for the development of simple, efficient and cost effective mechanisms against a variety of security threats. This paper proposes a two-step authentication protocol based on the randomized hash-lock scheme proposed by S. Weis in 2003. By introducing additional measures during the authentication process, this new protocol proves to enhance the security of RFID significantly, and protects the passive tags from almost all major attacks, including tag cloning, replay, full-disclosure, tracking, and eavesdropping. Furthermore, no significant changes to the tags is required to implement this protocol, and the low complexity level of the randomized hash-lock algorithm is retained.