1 / 17

While you are waiting

While you are waiting. Construct a question you could use on Blackboard to stimulate discussion. Learning to teach online: Applying concepts through discussion forums. Dr. Lauren r. shapiro. Online environment. assess facts/knowledge. Application of knowledge. Class discussion

dorjan
Télécharger la présentation

While you are waiting

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. While you are waiting • Construct a question you could use on Blackboard to stimulate discussion

  2. Learning to teach online: Applying concepts through discussion forums Dr. Lauren r. shapiro

  3. Online environment assess facts/knowledge Application of knowledge Class discussion Instructor = guide Students = practice being ‘experts’ • Assignments • Assessments • EXAMPLE: Name and describe 3 steps in Active Shooter Situation

  4. Promoting learning through discussion • Creating questions or tasks • unique, integrate, meaningful answers • apply information from sources • demonstrate scholarship (cite sources) • Clear instructions • Modeling and timely feedback • expected answer [seed] • expected responses to classmates

  5. Developing questions that promote learning and discussion to simulate in-class discussions • Goal is to help students to develop flexible knowledge and critical thinking skills • What makes creating questions for online discussion so hard? • Let’s examine your questions

  6. Do these questions fit the requirements [unique, integrate, apply]? • Cosmetics and jewelry are considered the most likely items to be stolen. What makes these two categories so appealing? • Please explain the differences between Floor Wardens and a Fire Brigade. • Are deleted files ever gone? Why or why not?     • Security is most often considered a proactive measure, not always for Law Enforcement. Please share your thoughts on this topic. • What is the difference in power between a civilian and law enforcement as it relates to making an arrest?

  7. question/task at graduate level • Select a security violation or life safety incident from 2014-2019 [do not use an incident that another student is already using]. • Using all of the 3 required readings (Craighead, 2009h, 2009m; Gunter & Kidwell, 2004) and at least 1 other source from the 5 enrichment site/videos (ASIS International, 2018; Demars, 1982; National Fire Protection Association, 2010; Straub et al., 2017) to explain: • a.)  whether private security employees in the building had developed a relationship with Law Enforcement Agents (LEAs) and/or Fire Authorities (FAs), provide some evidence to support your belief.  • b.) at least 2 ways that the private security employees worked with or helped LEAs and FAs to investigate the incident, provide some evidence to support your belief.  Specify how their relationships contributed to the investigation. *References

  8. Clear instructions + Modeling (citing) • You must use each of the 3 articles at least ONCE in every submission and you must have at least 2 of the articles used in EACH answer. • Specifically, you MUST include in-text citations for at least 2 of the 3 readings in answering question#1 and 2 of the 3 in answering question#2 AND you must include a reference list of all citations in the text (if you cited it, it should be in the reference list).  • As per APA style, the first time you cite the source must have all of the authors (except when there are 6 and more), but thereafter sources with at least 3 authors can be cited by first author and "et al."  I have provided the correct way to cite above in the task instructions. • In-text citations of the readings when starting a sentence would be: • Cellucci (2010) ….. • McKenzie (2006) ….. • Strom et al. (2010) …… • In text citations of the readings when citing at the end of the sentence would be: • (Cellucci, 2010). • (McKenzie, 2006). • (Strom et al., 2010).

  9. References (APA style) References Craighead, G. (2009a). High-rise building definition, development, and use. In High-rise security and fire life safety (pp. 1- 26).  Burlington, MA: Butterworth and Heinemann. Craighead, G. (2009b). Security and fire life safety uniqueness of high rise buildings. In High-rise security and fire life safety (pp. 27-60).  Burlington, MA:  Butterworth and Heinemann. Craighead, G. (2009n). Laws, codes, standards, and guidelines. In High-rise security and fire life safety (pp. 601-614). Burlington, MA: Butterworth and Heinemann. O'Hagan, J.T. (1973). One New York plaza: An architect's dream, a fire fighter's nightmare!  WNYF magazine, 1, 4-10. Price, B. (2018). Out of thin air: The potential for high-rise housing over rail lines. CTBUH Journal, 3, 34-40.

  10. Security 101—task/question examples • Choose an internal or external threat to an organization.Examples of external threats include hacking, theft, and active shooter/terrorism, Examples of internal threats include espionage, workplace violence from previous/current employees, employee theft, and embezzlement.   Example 1: As a private security professional tasked with investigating this threat, explain your procedure. • In the first paragraph, select, specify, and describe the threat and how it affects the company. Then walk me through (step by step) the process of investigating it (Nemeth, 2017i). Please support your response with the required readings from chapter 9 (Nemeth, 2017i).  • In the second paragraph, indicate what potential legal ramifications will you need to be aware of during your investigation (Nemeth, 2017e). Indicate how you will ensure to operate within the law based on chapter 5 (Nemeth, 2017e). Example 2: Select, specify, and describe the threat and explain its potential to cause problems. • Next, address what physical security measures you would implement to protect against this threat (Nemeth, 2017g). • Finally, address what personnel security measures you would implement to protect against this threat (Nemeth, 2017h).

  11. Sec 310: task/question examples • For this week, select a recent type of disaster that occurred here in U.S. and a similar one abroad (e.g., terrorist act in airport, fire in high rise residential building, flooding). BRIEFLY describe what occurred. • Next, describe the recovery procedures for the communities in terms of "housing, economic, and psychological recovery of residents and operational recovery of businesses in the area" (Lindell, Prater, & Perry, 2006k, p. 308).  Specify how they were the same and different,success in terms of length of time for recover, and amount of assistance provided by the government and insurance (Lindell et al., 2006k, 2006m).  Use Lindell et al. (2006m) to guide your discussion of how countries vary in terms of both building standards and risk assessment, economic support available, and roles played by government and non-government organizations (GOs and NGOs) • Finally, based on the problems that emerged during the recovery process, provide 2 or 3 ways that having standards and compliance for emergency management would have improved the response and recovery process for this disaster in both countries (Lindell et al., 2006l).

  12. Format of discussion forum Answers and replies Rules for answers replies Must “reply” to a minimum of 2 classmates, provide evaluation of work with rationale/justification; Each reply must be a minimum of 100 words; Must include in-text citations for specified sources (i.e., specified number of required readings and enrichment materials); Must include a relevant question to keep discussion progressing; Must include reference list (i.e., each in-text citation must have corresponding source in reference list, vice-a-versa) Must use specified style (e.g., APA) for in-text citations and reference list Must be submitted by specific date and time (e.g., Sunday, 5 pm) • Must use a separate Discussion thread to answer • Must include each original question/task before the student’s answer • Must adhere to requirements for use of incidents e.g., 2014-2019), # and type of sources (e.g., 2 required, 1 enrichment), etc. • Must include minimum # of words (e.g., 350, 500) • Must include in-text citations for specified sources (i.e., specified number of required readings and enrichment materials); • Must include reference list (i.e., each in-text citation must have corresponding source in reference list, vice-a-versa) • Must use specified style (e.g., APA) for in-text citations and reference list • Must be submitted by specific date and time (e.g., Thursday, 5 pm)

  13. Seed Example 1. Review a past incident, explain a.) whether private security employees in the building had developed a relationship with LEAs and FAs, provide some evidence to support your belief. Incident: On October 1, 2017, a lone gunman named Stephen Paddock opened fire on an open-air concert from a Las Vegas hotel room 400 meters away. The incident resulted in 59 deaths and another 851 injured. The Mandalay Bay hotel had established relationships with both local and federal law enforcement. Las Vegas Metro police department had adopted anti-terrorism training protocols along with private agencies, beginning in 2009, and worked with all area hotels. DHS hosted seven active shooter workshops in Las Vegas, drawing hundreds of private and public security agencies. The hotel security department held regular training with LEAs and FAs, and belonged to industry liaison groups, such as ASIS Las Vegas chapter, which met regularly and discussed common threats, best practices, and invited local and federal officials to speak or conduct training (Craighead, 2009m; Gunter & Kidwell, 2004). As was observed in the Pulse nightclub attack in Orlando in June of 2016, the nature and strength of relationships, while unable to predict or prevent some attacks, are key to successful response and life-saving operations (Straub, Cambria, Castor et al., 2017). Strong pre-existing relationships are essential to successful response operations (Straub, Cambria, Castor et al., 2017). b.) at least 2 ways that the private security employees worked with/helped LEAs and FAs to investigate the incident, provide some evidence to support your belief. Specify how their relationships contributed to the investigation. Private security employees helped LEAs investigate the shooting in two main ways. First, security at the Mandalay Bay provided LEAs with activity and incident reports which included noise complaints from the shooter on the night before the incident (Gunter & Kidwell, 2004).  A hotel client called twice from to complain about loud music coming from the room below. Security confirmed the details of the complaints.  Another way private security aided the investigation by reviewing recorded video from inside the hotel. Law enforcement requested access to all related video surrounding the incident, prior to, during, and after the shootings occurred (Craighead, 2009h, 2009m; Gunter & Kidwell, 2004). There was some initial discrepancy about the timeline of events immediately leading up to the shootings, including when hotel security first encountered Paddock. After an intense review of hotel security dispatch logs, hotel CCTV recordings, and police officer body camera recordings, LEAs determined that initial reports of the incident timeline needed adjusting (Craighead, 2009h). **(include reference list)

  14. [Example reply]Security in houses of worship Most houses of worship, particularly in Judaism, have relationships with local law enforcement (LE) as Jews have been targeted for most of their history (Craighead, 2009m). I know this relationship with security existed with LE at every synagogue I have attended in the 8 states where I lived (Gunter & Kidwell, 2004).  Evidence of this was also clear to me when I emerged from my synagogue in White Plains on the day the Pittsburgh TOL shooting occurred and saw police cars at all 5 synagogues.  I do see various components missing from security at houses of worship. First, they, like most of the schools in the US, were not built for security (e.g., lots of glass windows, multiple door access). So they are extremely vulnerable despite the presence of security guards (Craighead, 2009m).  Second, the congregations at houses of worship are there to pray and are not in the mindset to endorse safety and security (Craighead, 2009m). Third, worshippers may have practiced fire drills but it almost unlikely that they have conducted active shooter drills nor would they have designated particular people to have specific responsibilities for emergencies (Gunter & Kidwell, 2004). Consequently, the security guard would be too busy fighting the assailant to handle evacuation and first aid responsibilities. It is for these reasons (and the fact that armed police officers were injured in the confrontation) that I disagree with the statement that “the presence of an armed guard would have prevented the carnage at TOL” mainly because armed police officers were injured engaging with the shooter.   Moreover, the suggestion that worshippers should come to houses of worship armed is also troubling from a personal and social perspective. What is your perspective of how to counter mass shooting attacks in houses of worship? References Craighead, G. (2009m).   Liaison with law enforcement and fire authorities. In High-rise security and fire life safety (pp. 595-600). Burlington, MA: Butterworth and Heinemann. Gunter, W. & Kidwell, J. (2004). Law enforcement and private security liaison: Partnerships for cooperation.  Accessed at http://www.ifpo.org/resource-links/articles-and-reports/security-management-and-supervision/law-enforcement-and-private-security-liaison-partnerships-for-cooperation/  (on 1/24/2018).

  15. Student response to the question in my reply I think the first step to counter shooting in the house of worship should be to organize a volunteer security team among parishioners. Ideally, the team would include people with a variety of experience in law enforcement, military, logistics and medical backgrounds to help come up with a safety and security plan. Limit access for entry and exiting a place of worship so officials can have a better sense of who's coming and going. Give a local law enforcement agency a copy of your building's layout so it knows the entrances and how to find people in case of an emergency. Whenever possible, provide law enforcement with statistics of criminal acts, particularly crimes of larceny, that have occurred at the building (Craighead, 2009m). Encourage tenants, residents, and guests to report crimes to law enforcement. (Craighead, 2009m). Public reports are based on data generated at the local level. When these crimes are reported to law enforcement, such data will more accurately indicate what types of crimes are being committed in the community (Craighead, 2009m). This will provide a clearer picture of crime and may assist law enforcement in justifying requests for additional law enforcement personnel and equipment (Craighead, 2009m).  Do think more security procedures should be implemented as it relates to worship environments? Reference: Craighead, G. (2009m).   Liaison with law enforcement and fire authorities. In High-rise security and fire life safety (pp. 595-600). Burlington, MA: Butterworth and Heinemann.

  16. Grading rubrics

  17. Blackboard demonstration • Let’s go to Blackboard to see examples and its impact for students and for grading • EX1: Question has limited options for answers [f15 sec270] • EX2: One thread for answers and replies [f15 sec270] • EX3: Task with replies [f18 sec740]

More Related