Guenter Hilmer - Phd Thesis - Glamorgan Dspace - University of ...

Guenter Hilmer - Phd Thesis - Glamorgan Dspace - University of ... Guenter Hilmer - Phd Thesis - Glamorgan Dspace - University of ...

dspace1.isd.glam.ac.uk
from dspace1.isd.glam.ac.uk More from this publisher
25.10.2012 Views

5.2 Design of the interview evaluation 5 EVALUATION METHODOLOGY • Creation of a QA-TLS The first task the test candidates were asked to undertake was the creation of a QA-TLS on paper. The creation of the QA-TLS was seen as giving the evaluation participants a first impression of the usage of the 3-Layer-Model. The exact task and the material can be found in the appendices in Appendix A.1 and in Appendix A.2. • Theoretical conversion of the QA-TLS from a Multiple-Choice-QA into a True-or-False-QA Another important issue of this evaluation was to show the participants the possibility of reusability of once authored material in different ways. This reuse was done in the simplest way by using different display styles for a specific TLS. • Creation of another TLS (lecture) The next logical step of testing the framework was to ask the candidates to create a TLS by themselves. Their capability of creating TLSs individually is another important indicator of their understanding the 3-Layer-Model. • Linking the created TLSs together Finally, after authoring and creating new material based on the 3-Layer- Model it was necessary to ask the candidates to link the different TLSs together to form a first EM. After fulfilling the tasks in the manual markup part of the evaluation session the test participants were asked to give the mid-test interview so that information about the test participants’ understanding of the 3-Layer-Model could be gained. Mid-test interview The mid-test interview is fitted into this evaluation to get a structured feedback about the manual markup task from the evaluation candidates. During the mid- test interview the participants were asked the following questions: 136

5.2 Design of the interview evaluation 5 EVALUATION METHODOLOGY • How would you grade the 3-Layer-Model in a sense of complexity? It is important for the evaluation of the test results to know how the test candidates graded the 3-Layer-Model. • What are the advantages or problems of the model? The identification of problems or advantages of the model is important for later improvement of the 3-Layer-Model. • What is your understanding of the tags of the QA-TLS? It would be a good indicator of the quality of the 3-Layer-Model if the test participants have a good understanding of the specific tags of the QA-TLS. • What are the advantages or problems of the QA-tags? It is not only important to know how the participants understood the QA- TLS, but also what they thought about the advantages and problems they discovered during their work on the manual markup task. • What is your understanding of the tags of the Lecture-TLS? Understanding several TLSs of the created framework is another important aspect of this evaluation. • What are the advantages or problems of the Lecture-tags? Similar to the QA-TLS it is important to know the advantages and problems of the Lecture-TLS to have the possibility of improving the framework in the future. • How easy was it for you to tag the QA material? The easier the tagging process is for the test participants, the better the EFTECS works for the educational experts. • How easy was it for you to tag the Lecture material? The easier the tagging process is for the test candidates, the better the opti- misation of the framework is for educational experts. • Do you have any additional comments? The participants were given the chance to express additional thoughts or 137

5.2 Design <strong>of</strong> the interview evaluation 5 EVALUATION METHODOLOGY<br />

• Creation <strong>of</strong> a QA-TLS<br />

The first task the test candidates were asked to undertake was the creation<br />

<strong>of</strong> a QA-TLS on paper. The creation <strong>of</strong> the QA-TLS was seen as giving the<br />

evaluation participants a first impression <strong>of</strong> the usage <strong>of</strong> the 3-Layer-Model.<br />

The exact task and the material can be found in the appendices in Appendix<br />

A.1 and in Appendix A.2.<br />

• Theoretical conversion <strong>of</strong> the QA-TLS from a Multiple-Choice-QA into a<br />

True-or-False-QA<br />

Another important issue <strong>of</strong> this evaluation was to show the participants the<br />

possibility <strong>of</strong> reusability <strong>of</strong> once authored material in different ways. This<br />

reuse was done in the simplest way by using different display styles for a<br />

specific TLS.<br />

• Creation <strong>of</strong> another TLS (lecture)<br />

The next logical step <strong>of</strong> testing the framework was to ask the candidates to<br />

create a TLS by themselves. Their capability <strong>of</strong> creating TLSs individually<br />

is another important indicator <strong>of</strong> their understanding the 3-Layer-Model.<br />

• Linking the created TLSs together<br />

Finally, after authoring and creating new material based on the 3-Layer-<br />

Model it was necessary to ask the candidates to link the different TLSs<br />

together to form a first EM.<br />

After fulfilling the tasks in the manual markup part <strong>of</strong> the evaluation session the<br />

test participants were asked to give the mid-test interview so that information<br />

about the test participants’ understanding <strong>of</strong> the 3-Layer-Model could be gained.<br />

Mid-test interview<br />

The mid-test interview is fitted into this evaluation to get a structured feedback<br />

about the manual markup task from the evaluation candidates. During the mid-<br />

test interview the participants were asked the following questions:<br />

136

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!