Competency model development: The backbone of successful stealth assessments

IF 5.1 2区 教育学 Q1 EDUCATION & EDUCATIONAL RESEARCH
Seyedahmad Rahimi, Russell Almond, Andrea Ramírez-Salgado, Christine Wusylko, Lauren Weisberg, Yukyeong Song, Jie Lu, Ted Myers, Bowen Wang, Xiaomaon Wang, Marc Francois, Jennifer Moses, Eric Wright
{"title":"Competency model development: The backbone of successful stealth assessments","authors":"Seyedahmad Rahimi,&nbsp;Russell Almond,&nbsp;Andrea Ramírez-Salgado,&nbsp;Christine Wusylko,&nbsp;Lauren Weisberg,&nbsp;Yukyeong Song,&nbsp;Jie Lu,&nbsp;Ted Myers,&nbsp;Bowen Wang,&nbsp;Xiaomaon Wang,&nbsp;Marc Francois,&nbsp;Jennifer Moses,&nbsp;Eric Wright","doi":"10.1111/jcal.13025","DOIUrl":null,"url":null,"abstract":"<div>\n \n \n <section>\n \n <h3> Background</h3>\n \n <p>Stealth assessment is a learning analytics method, which leverages the collection and analysis of learners' interaction data to make real-time inferences about their learning. Employed in digital learning environments, stealth assessment helps researchers, educators, and teachers evaluate learners' competencies and customize the learning experience to their specific needs. This adaptability is closely intertwined with theories related to learning, engagement, and motivation. The foundation of stealth assessment rests on evidence-cantered design (ECD), consisting of four core models: the Competency Model (CM), Evidence Model, Task Model, and Assembly Model.</p>\n </section>\n \n <section>\n \n <h3> Objective</h3>\n \n <p>The first step in designing a stealth assessment entails producing operational definitions of the constructs to be assessed. The CM establishes a framework of latent variables representing the target constructs, as well as their interrelations. When developing the CM, assessment designers must produce clear descriptions of the claims associated with the latent variables and their states, as well as sketch out how the competencies can be measured using assessment tasks. As the designers elaborate on the assessment model, the CM definitions need to be revisited to make sure they work with the scope and constraints of the assessment. Although this is the first step, problems at this stage may result in an assessment that does not meet the intended purpose. The objective of this paper is to elucidate the necessary steps for CM development and to highlight potential challenges in the process, along with strategies for addressing them, particularly for designers without much formal assessment experience.</p>\n </section>\n \n <section>\n \n <h3> Method</h3>\n \n <p>This paper is a methodological exposition, showcasing five examples of CM development. Specifically, we conducted a qualitative retrospective analysis of the CM development procedure, wherein participants unfamiliar with ECD applied the framework and showcased their work. In a stealth assessment course, four groups of students (novice stealth assessment designers) engaged in developing stealth assessments for challenging-to-measure constructs across four distinct projects. During their CM development process, we observed various activities to pinpoint areas of difficulty.</p>\n </section>\n \n <section>\n \n <h3> Results</h3>\n \n <p>This paper presents five illustrative examples, including one for assessing physics understanding and four for the development of CMs for four complex competencies: (1) systems thinking, (2) online information credibility evaluation, (3) computational thinking, and (4) collaborative creativity. Each example represents a case in CM development, offering valuable insights.</p>\n </section>\n \n <section>\n \n <h3> Conclusion</h3>\n \n <p>The paper concludes by discussing several guidelines derived from the examples discussed. Emphasizing the importance of dedicating ample time to fine-tune CMs can significantly enhance the accuracy of assessments related to learners' knowledge and skills. It underscores the significance of qualitative phases in crafting comprehensive stealth assessments, such as CMs, alongside the quantitative statistical modeling and technical aspects of these assessments.</p>\n </section>\n </div>","PeriodicalId":48071,"journal":{"name":"Journal of Computer Assisted Learning","volume":"40 6","pages":"2772-2789"},"PeriodicalIF":5.1000,"publicationDate":"2024-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Computer Assisted Learning","FirstCategoryId":"95","ListUrlMain":"https://onlinelibrary.wiley.com/doi/10.1111/jcal.13025","RegionNum":2,"RegionCategory":"教育学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"EDUCATION & EDUCATIONAL RESEARCH","Score":null,"Total":0}
引用次数: 0

Abstract

Background

Stealth assessment is a learning analytics method, which leverages the collection and analysis of learners' interaction data to make real-time inferences about their learning. Employed in digital learning environments, stealth assessment helps researchers, educators, and teachers evaluate learners' competencies and customize the learning experience to their specific needs. This adaptability is closely intertwined with theories related to learning, engagement, and motivation. The foundation of stealth assessment rests on evidence-cantered design (ECD), consisting of four core models: the Competency Model (CM), Evidence Model, Task Model, and Assembly Model.

Objective

The first step in designing a stealth assessment entails producing operational definitions of the constructs to be assessed. The CM establishes a framework of latent variables representing the target constructs, as well as their interrelations. When developing the CM, assessment designers must produce clear descriptions of the claims associated with the latent variables and their states, as well as sketch out how the competencies can be measured using assessment tasks. As the designers elaborate on the assessment model, the CM definitions need to be revisited to make sure they work with the scope and constraints of the assessment. Although this is the first step, problems at this stage may result in an assessment that does not meet the intended purpose. The objective of this paper is to elucidate the necessary steps for CM development and to highlight potential challenges in the process, along with strategies for addressing them, particularly for designers without much formal assessment experience.

Method

This paper is a methodological exposition, showcasing five examples of CM development. Specifically, we conducted a qualitative retrospective analysis of the CM development procedure, wherein participants unfamiliar with ECD applied the framework and showcased their work. In a stealth assessment course, four groups of students (novice stealth assessment designers) engaged in developing stealth assessments for challenging-to-measure constructs across four distinct projects. During their CM development process, we observed various activities to pinpoint areas of difficulty.

Results

This paper presents five illustrative examples, including one for assessing physics understanding and four for the development of CMs for four complex competencies: (1) systems thinking, (2) online information credibility evaluation, (3) computational thinking, and (4) collaborative creativity. Each example represents a case in CM development, offering valuable insights.

Conclusion

The paper concludes by discussing several guidelines derived from the examples discussed. Emphasizing the importance of dedicating ample time to fine-tune CMs can significantly enhance the accuracy of assessments related to learners' knowledge and skills. It underscores the significance of qualitative phases in crafting comprehensive stealth assessments, such as CMs, alongside the quantitative statistical modeling and technical aspects of these assessments.

能力模型开发:成功隐形评估的支柱
隐性评估是一种学习分析方法,它通过收集和分析学习者的交互数据来实时推断他们的学习情况。在数字化学习环境中,隐性评估可以帮助研究人员、教育工作者和教师评估学习者的能力,并根据他们的具体需求定制学习体验。这种适应性与学习、参与和动机的相关理论密切相关。隐性评估的基础是以证据为导向的设计(ECD),包括四个核心模型:能力模型(CM)、证据模型、任务模型和组装模型。能力模型建立了一个潜在变量框架,代表了目标建构及其相互关系。在开发潜变量模型时,测评设计者必须清楚地描述与潜变量及其状态相关的主张,并勾勒出如何利用测评任务来测量能力。随着设计者对评估模型的不断完善,CM 定义也需要重新审视,以确保它们与评估的范围和限制相适应。尽管这是第一步,但这一阶段出现的问题可能会导致评估无法达到预期目的。本文旨在阐明CM开发的必要步骤,并强调这一过程中的潜在挑战,以及应对这些挑战的策略,尤其是对于没有太多正式评估经验的设计者而言。具体来说,我们对CM开发过程进行了定性回顾分析,让不熟悉幼儿发展的参与者应用该框架并展示他们的作品。在一门隐性评估课程中,四组学生(隐性评估设计新手)参与了四个不同项目中具有挑战性的测量建构的隐性评估开发。在他们开发CM的过程中,我们观察了各种活动,以确定困难所在。本文介绍了五个示例,包括一个评估物理理解的示例和四个开发CM的示例,涉及四种复杂的能力:(1) 系统思维,(2) 在线信息可信度评估,(3) 计算思维和(4) 协作创造力。本文最后讨论了从所讨论的示例中得出的若干指导原则。本文强调了用充足的时间来微调CM的重要性,这可以大大提高与学习者的知识和技能相关的评估的准确性。它强调了在制作综合隐形评估(如CMs)时,定性阶段与定量统计建模和这些评估的技术方面的重要性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
Journal of Computer Assisted Learning
Journal of Computer Assisted Learning EDUCATION & EDUCATIONAL RESEARCH-
CiteScore
9.70
自引率
6.00%
发文量
116
期刊介绍: The Journal of Computer Assisted Learning is an international peer-reviewed journal which covers the whole range of uses of information and communication technology to support learning and knowledge exchange. It aims to provide a medium for communication among researchers as well as a channel linking researchers, practitioners, and policy makers. JCAL is also a rich source of material for master and PhD students in areas such as educational psychology, the learning sciences, instructional technology, instructional design, collaborative learning, intelligent learning systems, learning analytics, open, distance and networked learning, and educational evaluation and assessment. This is the case for formal (e.g., schools), non-formal (e.g., workplace learning) and informal learning (e.g., museums and libraries) situations and environments. Volumes often include one Special Issue which these provides readers with a broad and in-depth perspective on a specific topic. First published in 1985, JCAL continues to have the aim of making the outcomes of contemporary research and experience accessible. During this period there have been major technological advances offering new opportunities and approaches in the use of a wide range of technologies to support learning and knowledge transfer more generally. There is currently much emphasis on the use of network functionality and the challenges its appropriate uses pose to teachers/tutors working with students locally and at a distance. JCAL welcomes: -Empirical reports, single studies or programmatic series of studies on the use of computers and information technologies in learning and assessment -Critical and original meta-reviews of literature on the use of computers for learning -Empirical studies on the design and development of innovative technology-based systems for learning -Conceptual articles on issues relating to the Aims and Scope
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信