critical thinking

Submitted by Alexandria Chisholm on October 16th, 2020
Share this on: 
Short Description: 

The Penn State Berks Privacy Workshop Series focuses on privacy issues for students in the past, present, and future.  The Privacy Workshop spotlights privacy practices and concerns in the current moment; Digital Leadership explores future implications of past and current digital behaviors; Digital Shred provides tools to evaluate and mitigate the damage of past digital behaviors; and Digital Wellness focuses on privacy across the lifespan - bringing together the past, present, & future by finding a balance of technology & wellness, while aligning habits and goals.  Each workshop is grounded in theory – countering approaches that overpromise user control in the face of information asymmetries and the control paradox – and embrace students’ autonomy and agency by avoiding prescribed solutions, and instead encouraging decision-making frameworks.

Attachments: 
AttachmentSize
DigitalLeadershipLessonPlan_Chisholm_HartmanCaverly.pdfdisplayed 821 times157.89 KB
Learning Outcomes: 

In the Digital Leadership Workshop, students will be able to:

  1. recognize that online behavior is persistent and there is no guarantee that it will remain private (despite privacy settings)
  2. anticipate how perceptions of their online behavior can impact their personal and professional opportunities and make informed, intentional decisions regarding their activity
  3. align their online activity within the context of their future profession
  4. model constructive online behaviors as student leaders and future professionals
Discipline: 
Multidisciplinary

Information Literacy concepts:

Individual or Group:

Collaborators: 
Suggested Citation: 
Chisholm, Alexandria. "Digital Leadership Workshop." CORA (Community of Online Research Assignments), 2020. https://projectcora.org/assignment/digital-leadership-workshop.
Submitted by Yvonne Mery on October 6th, 2020
Share this on: 
Short Description: 

Developed in order to move students away from an outdated checklist approach to evaluating online content, we developed this tutorial to teach students how to read laterally and think critically. This tutorial consists of several small chunks of microlearning activities including an assignment. Students can complete as much or as little as they feel they need.

Learning Outcomes: 
  • Students will explain why online information needs to be evaluated for trustworthiness
  • Students will describe the strategy of lateral reading that fact checkers employ to verify trustworthiness
  • Students will describe the criteria of process, expertise, and aim
  • Students will apply the skill of lateral reading related to societal and political issues 
  • Students will evaluate different online articles for trustworthiness using the three criteria of process, expertise, and aim

 

 

 

 

 

Information Literacy concepts:

Individual or Group:

Course Context (e.g. how it was implemented or integrated): 

This tutorial and optional assignment can serve as a stand alone tutorial or can be used in the flipped classroom. 

Suggested Citation: 
Mery, Yvonne . "How Do I Evaluate Online Information by Reading Laterally?." CORA (Community of Online Research Assignments), 2020. https://projectcora.org/assignment/how-do-i-evaluate-online-information-reading-laterally.
Submitted by Alexandria Chisholm on March 23rd, 2020
Share this on: 
Short Description: 

The Penn State Berks Privacy Workshop Series focuses on privacy issues for students in the past, present, and future.  The Privacy Workshop spotlights privacy practices and concerns in the current moment; Digital Leadership explores future implications of past and current digital behaviors; Digital Shred provides tools to evaluate and mitigate the damage of past digital behaviors; and Digital Wellness focuses on privacy across the lifespan - bringing together the past, present, & future by finding a balance of technology & wellness, while aligning habits and goals.  Each workshop is grounded in theory – countering approaches that overpromise user control in the face of information asymmetries and the control paradox – and embrace students’ autonomy and agency by avoiding prescribed solutions, and instead encouraging decision-making frameworks.

Attachments: 
AttachmentSize
DigitalWellnessWheel.pdfdisplayed 4064 times1.78 MB
DigitalWellnessLessonPlan_Chisholm_HartmanCaverly.pdfdisplayed 2996 times172.74 KB
Learning Outcomes: 

In the Digital Wellness Workshop, students will be able to:

  1. evaluate & articulate their digital wellness priorities
  2. recognize that their relationship with technology can have real world impact on their personal wellbeing, including relationships, mental health, & professional aspirations
  3. align their online activity & habits within the context of their wellness goals
  4. model constructive online and offline behaviors as individuals, student leaders, and future professionals
Discipline: 
Multidisciplinary

Information Literacy concepts:

Individual or Group:

Collaborators: 
Suggested Citation: 
Chisholm, Alexandria. "Digital Wellness Workshop." CORA (Community of Online Research Assignments), 2020. https://projectcora.org/assignment/digital-wellness-workshop.
Submitted by Alexandria Chisholm on March 23rd, 2020
Share this on: 
Short Description: 

The Penn State Berks Privacy Workshop Series focuses on privacy issues for students in the past, present, and future.  The Privacy Workshop spotlights privacy practices and concerns in the current moment; Digital Leadership explores future implications of past and current digital behaviors; Digital Shred provides tools to evaluate and mitigate the damage of past digital behaviors; and Digital Wellness focuses on privacy across the lifespan - bringing together the past, present, & future by finding a balance of technology & wellness, while aligning habits and goals.  Each workshop is grounded in theory – countering approaches that overpromise user control in the face of information asymmetries and the control paradox – and embrace students’ autonomy and agency by avoiding prescribed solutions, and instead encouraging decision-making frameworks.

Attachments: 
AttachmentSize
PersonalDataIntegrityPlan_DigitalShred_PennStateBerks.pdfdisplayed 1145 times625.92 KB
DamageAssessment_IdealPortfolio_DigitalShred_PennStateBerks.pdfdisplayed 704 times786.93 KB
DigitalShredLessonPlan_Chisholm_HartmanCaverly_Glenn.pdfdisplayed 807 times165.59 KB
Learning Outcomes: 

In the Digital Shred Workshop, students will be able to:

  1. Reflect on and describe their digital privacy priorities in order to articulate the benefits and risks of their digital dossier
  2. Apply a growth mindset to critically examine their current data exhaust // digital footprint and recognize when change is needed
  3. Develop a Personal Data Integrity Plan that makes routine the process of auditing and updating their digital dossier in alignment with their privacy values
  4. Describe “digital shred” and its importance.
Discipline: 
Multidisciplinary

Information Literacy concepts:

Individual or Group:

Suggested Citation: 
Chisholm, Alexandria. "Digital Shred Workshop." CORA (Community of Online Research Assignments), 2020. https://projectcora.org/assignment/digital-shred-workshop.
Submitted by Melanie Hubbard on July 30th, 2019
Share this on: 
Short Description: 

The following are a series of scaffolded assignments that led to the creation of “Labyrinths of Times,” an online digital project: http://labyrinth.english.lmu.build/. Aspects of it, including the scaffolded approach, are helpful for teaching students how to write for the web.

Attachments: 
AttachmentSize
labyrinth_assignments.docxdisplayed 648 times28.15 KB
Learning Outcomes: 

To teach students how to succinctly articulate complex ideas and write for the web.

Discipline: 
English

Information Literacy concepts:

Individual or Group:

Course Context (e.g. how it was implemented or integrated): 

The assignment was a major project for Paul Harris' course on David Mitchell (ENGL 3998).

Additional Instructor Resources (e.g. in-class activities, worksheets, scaffolding applications, supplemental modules, further readings, etc.): 
Potential Pitfalls and Teaching Tips: 
Suggested Citation: 
Hubbard, Melanie. "Labyrinths of Time Digital and Writing Project." CORA (Community of Online Research Assignments), 2019. https://projectcora.org/assignment/labyrinths-time-digital-and-writing-project.
Submitted by Alexandria Chisholm on December 6th, 2018
Share this on: 
Short Description: 

This workshop delivers an action-oriented introduction to personal data privacy designed for new college students. The session is designed to reveal the systems in place to collect and analyze online behavioral data, and to unveil the real-world consequences of online profiling in contexts like sentiment shaping, consumer preferences, employment, healthcare, personal finance, and law enforcement. In lieu of a prescriptive approach, students analyze case studies to observe how online behaviors impact real-world opportunities and reflect on the benefits and risks of technology use to develop purposeful online behaviors and habits that align with their individual values. Developing knowledge practices regarding privacy and the commodification of personal information and embodying the core library values of privacy and intellectual freedom, the workshop promotes a proactive rather than reactive approach and presents a spectrum of privacy preferences across a range of contexts in order to respect students’ autonomy and agency in personal technology use.

Attachments: 
AttachmentSize
PersonalDataPlan_PennStateBerks.pdfdisplayed 1190 times622.24 KB
PrivacyWorkshopLessonPlan_Chisholm_Hartman-Caverly.pdfdisplayed 722 times189.3 KB
Learning Outcomes: 

Students will be able to: 1. recognize how their personal data and metadata are collected, along with the potential implications of such data collection 2. assess how their data is shared and make informed, intentional choices to safeguard their privacy 3. identify privacy issues facing our society 4. describe the positive case for privacy as a human right fundamental to individual well-being

Discipline: 
Multidisciplinary

Information Literacy concepts:

Individual or Group:

Collaborators: 
Suggested Citation: 
Chisholm, Alexandria. "Privacy Workshop." CORA (Community of Online Research Assignments), 2018. https://projectcora.org/assignment/privacy-workshop.
Submitted by Jeffrey Dowdy on June 11th, 2018
Share this on: 
Short Description: 

This session was part of an undergraduate, critical thinking and global perspectives course. The course is offered by various disciplines on campus. This instance focused on global challenges (The Seven Revolutions developed by csis.org). For the session the students applied two frameworks to data: authority is constructed and contextual and scholarship as conversation. Students learned about a data life cycle concept with emphasis on evaluation. One of the main goals in introducing the students to the life cycle of data (see attached) was to broaden their understanding of how to search for data. Students may encounter data via social media or in a magazine article. Often those formats are more accessible and present data in a way that is easier to understand. The exercise helps students to see how data can sometimes be manipulated in those formats, while also developing search techniques to track data to its source.

Attachments: 
AttachmentSize
Slide 2 gives an illustration of the data lifecycledisplayed 1098 times663.82 KB
Learning Outcomes: 

Employ credible resources in studying key global challenges

Individual or Group:

Course Context (e.g. how it was implemented or integrated): 

The data literacy session was part of a semester-long, scaffolded research paper on a specific global challenge. Students were encouraged to use data to back up their arguments and research.

Assessment or Criteria for Success
Assessment Short Description: 
One issue with the assignment in its present form: students misunderstood the first question of the assignment (Provide two examples of types of data that inform your research topic). Many interpreted 'types' to mean actual data sets or reports instead of brainstorming about what data could exist. One hurdle students face, as Daniel Russell research scientist for Google would put it, is understanding how search works and what it can do for them. Students must know what questions they can ask. The first question was intended to help them think about what they could ask. This will require more modeling in the introduction.
Potential Pitfalls and Teaching Tips: 

For future iterations of this topic, I would like for students to evaluate multiple examples of data used in journalistic writing. Both to understand how to write with data and to see how data can be employed to make a point or to support a story.

Suggested Citation: 
Dowdy, Jeffrey. "Data Literacy." CORA (Community of Online Research Assignments), 2018. https://projectcora.org/assignment/data-literacy.
Submitted by Melanie Hubbard on May 16th, 2018
Share this on: 
Short Description: 

This assignment requires students to apply their knowledge of antisemitic tropes to tweets with the final outcome of the assignment being a short analytical paper and a presentation.

Attachments: 
AttachmentSize
Antisemitism_Social Media_Assignment.docxdisplayed 676 times22.42 KB
AttachmentSize
Student Presentation Templatedisplayed 1000 times1.25 MB
"About Assignment" Presentationdisplayed 1213 times8.57 MB
Learning Outcomes: 

Students will gain: greater social media literacy (e.g. the ability to analyze the visual and textual aspects of tweets), the ability to identify antisemitic motifs on social media, and greater reasoning, writing, and oral presentation skills.

Individual or Group:

Course Context (e.g. how it was implemented or integrated): 

This assignment was designed for the class History of Antisemitism (JWST 4375) in Spring 2018. Students worked in pairs and each pair was given a single tweet selected by the digital scholarship librarian and approved by the faculty member.

The criteria for the tweets were: 1.) they had to be clearly antisemitic, 2.) they contained a visual, e.g. a meme, 3.) there was something significant about the tweeter or the receiver (if there was one), or both. For example, the tweeter was a known politician, or the receiver was a known journalist.

Students were given a Powerpoint template that they were required to follow, the intention being to keep them from getting too bogged down in the slide creation process and to help them structure themselves more effectively.

To introduce the assignment, the digital scholarship librarian presented some background on antisemitism and social media and then went through all of the tweets that were selected for the assignment. During this time, students were asked to begin analyzing what they were seeing and to identify ways they might start their research.

Additional Instructor Resources (e.g. in-class activities, worksheets, scaffolding applications, supplemental modules, further readings, etc.): 

Presentation template

Suggested Citation: 
Hubbard, Melanie. "Antisemitism on Social Media Essay." CORA (Community of Online Research Assignments), 2018. https://projectcora.org/assignment/antisemitism-social-media-essay.
Submitted by Amanda M. on May 11th, 2018
Share this on: 
Short Description: 

This lesson was developed for HIS484 (Topics in the History of Gender and
Sexuality/Pride in the time of HIV/AIDS) in the Spring of 2018. The students’ final assignment
culminated in a multimedia or digital research project on a topic of their choosing and heavily
relied on primary source and visual materials. This lesson focuses on how students, as content
curators and analysts, can engage in deeper analysis and contextualization of the sources they
present through their projects. Students collectively analyzed one example from a particular
resource that they are already acquainted with and considered the language used by both
systems of knowledge and the communities that they are studying, in order to help them form
thoughtful, critical, and reflective perspectives.

Attachments: 
AttachmentSize
Lesson plan with links to google doc worksheet and google slidesdisplayed 1227 times92.09 KB
Learning Outcomes: 

Students will be able to analyze and contextualize primary source and visual materials related to HIV/AIDS.
Students will be able to articulate how knowledge is socially constructed and contested and how/why language evolves over time.
Students will engage with art as a primary source related to their research topics.

Individual or Group:

Course Context (e.g. how it was implemented or integrated): 
Additional Instructor Resources (e.g. in-class activities, worksheets, scaffolding applications, supplemental modules, further readings, etc.): 

See full lesson plan/pdf

Potential Pitfalls and Teaching Tips: 

This worked well with a small class, but may be more challenging with a larger class. I would likely have students work in groups to evaluate different works of art using the google worksheet instead of doing one for the whole class.

Suggested Citation: 
M., Amanda. "Visual Aids and Descriptors in Primary Source Evaluation & Curation." CORA (Community of Online Research Assignments), 2018. https://projectcora.org/assignment/visual-aids-and-descriptors-primary-source-evaluation-curation.
Submitted by Ellen Carey on September 15th, 2017
Share this on: 
Short Description: 

UPDATE: PLEASE USE SIFT & PICK INSTEAD!

I created the SIFT & PICK Fact Checking & Source Evaluation process to improve upon P.R.O.V.E.N. SIFT & PICK better distinguishes between lateral reading to fact check information and vertical reading to select the best sources for specific information needs. It is briefer and better lends itself to teaching concepts such as information creation,  authority/expertise, bias, and scholarly conversation, in the context of source evaluation.

Ellen Carey 4/14/23

P.R.O.V.E.N. was designed to provide students with a source evaluation process that was grounded in both the ACRL Framework and Michael Caulfield's "Four Moves and a Habit" from his ebook, "Web Literacy for Student Fact-Checkers" (2017). The process included both strategies for fact-checking by examining other sources such as internet fact-checking tools, and strategies for analyzing the source itself by examining its purpose, relevance, objectivity, verifiability, expertise, and newness. The "P.R.O.V.E.N." acronym emphasized the process students could go through to demonstrate credibility based on their particular needs, rather than the state of a particular source (i.e. credible or not). The questions were designed to guide this evaluation process, not to serve as a checklist.

Attachments: 
AttachmentSize
PROVEN Source Evaluation Process - Feb 2021 Update.pdfdisplayed 4988 times233.85 KB
Learning Outcomes: 

After using the P.R.O.V.E.N. Source Evaluation Process students will be better able to: -Identify strategies for evaluating sources -Consider the purpose of a source -Identify the value of a particular source for their needs, based on its type, content, and age -Examine the objectivity and accuracy of a source and the authority of its authors

Discipline: 
Multidisciplinary

Individual or Group:

Course Context (e.g. how it was implemented or integrated): 

At Santa Barbara City College, we are in the process of switching from P.R.O.V.E.N. to the new SIFT & PICK Fact Checking & Source Evaluation process.

In the past, we used P.R.O.V.E.N. as a supplement to instruction on evaluating sources, at the reference desk, in our Library 101 course, or in other courses with research assignments. We used a abbreviated version of P.R.O.V.E.N. on most research guides but are in the process of switching to SIFT & PICK on all guides.

Potential Pitfalls and Teaching Tips: 

P.R.O.V.E.N. was designed to get students thinking beyond a black and white approach to source evaluation (i.e. thinking of a source as either credible or not credible). We found that P.R.O.V.E.N. worked best when we had the opportunity to teach source evaluation as a process of determining the appropriateness and usefulness of a particular source for a particular purpose. SIFT & PICK is designed to support that process more effectively.

Suggested Citation: 
Carey, Ellen. "P.R.O.V.E.N. Source Evaluation Process." CORA (Community of Online Research Assignments), 2017. https://projectcora.org/assignment/proven-source-evaluation-process.

Pages