DIGICON 2020 Roundtable Discussion, Leveraging BIM & Other ...
Units 3 & 4 Software...
Transcript of Units 3 & 4 Software...
Units 3 & 4
Software Development
Planning for Unit 4 Outcome 2 DigiCon 28th July 2017
Chris Bucknell – Head of CDT; Coord., VCE – Haileybury College
Phil Feain – Curriculum Manager, Digital Technologies – VCAA
1. Introduction: What was learnt about Outcome 2 in 2016
• What you need
• Issues from 2016 School-based audit
2. Unit 4 Outcome 2: What is required to prepare students to write
a report
• Key knowledge
• Key skills
• VCAA descriptors
3. Developing an approach to writing a case study
• Understanding what is needed in the report
• Writing the case study
Agenda
Introduction
What was learnt in Unit 4 Outcome 2 in 2016?
Study Design 2016-2019 Advice for Teachers 2016-2019 School-assessed Coursework report 2016-2019
What you need
Unit 4 Outcome 2 – The task
Outcome 2: Interactions and impact
On completion of this unit the student should be able to analyse and explain the
dependencies between two information systems and evaluate the controls in place
in one information system to protect the integrity of its source data.
Task type:
In response to a case study, one of the following:
• a written report
• an annotated visual report.
Unit 4 Outcome 2
The purpose of this task is for students to produce a written report or an
annotated visual report in response to a case study.
The case study should provide details about:
• the interactions between information systems that share data
• the dependence on data integrity for one of the information systems
• data management practices in the storage
• communication and the disposal of data
• capabilities of the information systems in a networked environment and the
application of protocols when interacting with these information systems.
The case study
What teachers need to let students write about
When writing the case study, teachers should consider how it will enable
students to write about:
• the existing network environment
• interactions between information systems
• identifying the causes of conflict
• evaluating data management practices
• how legislation affects data management practices
• characteristics of data integrity and the impact of diminished data integrity on
the organisation
• how the organisation secures data and information
• evaluating how the information systems objectives are being met.
Writing the case study
Findings from Stage 3 and 4 Audit
• Majority of submitted tasks were commercially prepared ones
• All the submitted tasks, including the non-commercial tasks, required
revision
• Teachers experienced difficulty in writing appropriate case studies and
using prompts that were not overly detailed
• Several tasks referred to proposed information systems and lacked
sufficient details. This made it difficult for students to adequately
prepare a written report.
• It is recommended that the case study include existing information
systems that have sufficient detail to enable students to meet
requirements
Findings
Report format
• Many teachers stated that their students would be completing a written
report
• Often the written report was a series of questions or detailed
prompts/statements with mark allocations – not features of a written
report
• There were instances of an ‘exam style’ format outcomes with multiple
choice, short answer and case study questions – does not meet the
study design requirements.
The written report
Report format
• Appropriate prompts can be included for students to assist them in
writing the report; however, students should not be provided with
questions or detailed prompts that could be considered undue
assistance.
• For example, students could be directed to write a report that considers
the following areas:
• types of networks
• nature of security measures
• data interdependencies, etc.
Written report format
• The majority of the submitted tasks used the VCAA performance
descriptors for decision-making about assessment
• Some users of the commercial tasks chose to use commercially
developed marking guides
• A variety of marking schemes were used by teachers
• Outcome 2 is to be marked out of 100
• Submitted tasks varied with total scores out of 20, 30, 40, 67 and 100
• Marks for questions or prompts varied from one mark to 20 marks
• Some marking schemes were awkward and made differentiation
between student performance difficult as there was limited opportunity
for partial credit
• Marking schemes should be suitable for the task given with whole
marks awarded for responses
Assessment of case study
• Teachers are encouraged to become familiar with the relevant VCAA
course documentation including the study design, particularly the key
knowledge and the advice for teachers
• It is important to plan, deliver and assess content with these documents
in mind
• Students should also be given copies of these documents at the
commencement of the course
• While many teachers thought they were giving their students an
acceptable case study and prompts for them to write a written report, it
was apparent many teachers did not understand what should be
expected in a case study
• It is recommended that teachers make an effort to write their own case
studies following the appropriate VCAA documentation with suitable
prompts and marks allocated
Final comments
Purpose:
• Ensure assessment is conducted in line with VCAA principles of
assessment and requirements of the Study design using appropriately
designed tasks
• Because quality issues can arise, the audit process can help to identify
and address these
Stage 3: Online Questionnaire
• Collect information on the planned approach to assessment and
assessment practice – teachers need to refer to Study Design
• If OK then response is: Submission meets requirements
• If concerns, maybe not enough details, then response is: Further
evidence is required
• If serious concerns then response is: Submission requires immediate
follow-up
School-based Audit
• Based on the questions answered in questionnaire – Audit Panel
determine if details given indicate whether requirements are being met
or not
• If any doubt – Audit Panel will recommend Further Evidence at
Stage 4
School-based Audit
Stage 4: Further Evidence
• Submit further evidence based on online submission in Stage 3
• May be because of an aspect of assessment, information provided,
marking schemes, etc.
• If OK the response is: Further evidence meets requirements
• If concerns then response is: Further evidence may not meet
requirements and then resubmission or maybe on to Stage 1 (2018)
• Some teachers go to Stage 4 because their Online Questionnaire may
not be clear, may lack detail, provide incorrect details, etc.
• Sometimes looking at the task gives a good idea of what is going on
• Commercial tasks can be a concern and this can be seen at this stage
School-based Audit
Unit 4 Outcome 2
What is required to prepare students to write a report?
Unit 4 Outcome 2
Unit 4 Outcome 2
Unit 4 Outcome 2
Unit 4 Outcome 2
VCAA Descriptors
Developing an approach to
writing a case study
• This will take a while to write, but it is worthwhile
• Need to start at the beginning
• Ask the question – What are your students working towards?
• When planning the assessment you could start with the VCAA
descriptors
• Ask the question – What do students need to cover in their report?
• You could match the Key Knowledge to the descriptors
• Think of appropriate prompts to assist students in writing their
report
• Write the case study to include the details that are needed for
students to write the report
Where to start
VCAA Descriptors
Technically correct terminology is used to describe the networked environment
and describe the interactions generated by information systems.
• Describe the network environment
• Describe the services required of the information systems
• Describe how the information systems interact
Related Key Knowledge
• KK9 – the technical underpinnings of intranets, the internet and virtual private
networks
• KK10 – characteristics of wired and wireless networks
• KK3 – types of interactions (inputs and outputs) generated by information
systems
Descriptors 1
All techniques to identify causes of conflict and through evaluation of the
organisation’s data management practices.
• Explain the data management practices used including storage, communication
and disposal of data
• Identify and describe the causes of conflict
Related Key Knowledge
• KK6 – data management practices that cause conflict between information
systems, including data mining
Descriptors 2
Insightful understanding and application of relevant legislation documented in
data management practices.
• Identify and describe the key legislation that affects the data management
practices
• Discuss how this affects storage, communication and disposal of data
Related Key Knowledge
• KK5 – key legislation that affects how organisations control the storage,
communication and disposal of their data and information: the Privacy Act
1988, the Privacy and Data Protection Act 2014 and the Copyright Act 1968
Descriptors 3
Comprehensive description of data integrity characteristics and a very detailed
description of the impact of diminished data integrity.
• Identify and describe the five characteristics of data that have integrity
• Discuss the impact of diminished data integrity due to threats
• Security threats in Glossary (page 13)
Related Key Knowledge
• KK4 – characteristics of data that has integrity, including accuracy,
timeliness, reasonableness, authenticity, correctness
• KK8 – the impact of diminished data integrity on dependent systems
• KK11 – types and causes of accidental, deliberate and events-based threats
due to the integrity and security of data and information shared between
information systems
Descriptors 4
Thorough explanations of ways organisations secure data and information and
critical evaluation of the extent to which information systems objectives are being
met.
• Describe the physical and software controls used to secure the storage and
communication of data in a networked environment
• Also discuss protocols and tracing transactions
• Physical security controls in Glossary (page 12)
• Software security controls in Glossary (page 13)
• Describe how information systems objectives are being met
Related Key Knowledge
• KK12 – the physical and software controls used by organisations to secure the
storage and communication of data in a networked environment
• KK13 – the role of hardware, software and technical protocols in managing,
controlling and securing data shared between information systems
• KK14 – tools and techniques for tracing transactions between users of
information systems
• KK2 – goals and objectives of information systems
Descriptors 5
1. The network environment
2. Purposes of the information systems
3. Interactions between the information systems
4. Data management practices
5. Causes of conflict
6. Legislation affecting data management practices
7. Characteristics of data that have integrity
8. Impact of diminished data integrity due to threats
9. Security of data and information
10. Objectives of the information system
Appropriate report prompts
Think about:
• two existing information systems
• What is familiar to you? LMS, reporting system, role, enterprise system
• speak to your IT/Network manager
• choose the two systems and make them imperfect
• the objectives of the information systems
• What are the objectives?
• how the information systems interact
• How is data shared? Have problems in the details.
• the services required of the information systems
• What should the information systems do?
• the network environment
• describe the network and draw a diagram.
Developing a case study 1
Think about:
• data management practices
• discuss storage, communication and disposal of data
• have some problems with these practices in how they meet key
legislation
• causes of conflict
• be able to identify the causes of conflict
• be able to describe the causes of conflict
Developing a case study 2
Think about:
• key legislation that affects data management practices
• be able to identify and describe the key legislation
• are there privacy issues and copyright issues, etc?
• how this affects storage, communication and disposal
• link the issues above to storage, communication and disposal
Developing a case study 3
Think about:
• data integrity issues
• have some data integrity issues
• be able to identify and describe the characteristics of data integrity
• the impact of data integrity due to threats
• include issues with security of data
• discuss the impact of data integrity due to threats
Developing a case study 4
Think about:
• the physical and software controls used to secure the storage and
communication of data in the networked environment
• protocols and tracing transactions
• physical and software controls
• how the information systems objectives are being met
• evaluate how the information systems objectives are being met
Developing a case study 5
Questions