From AAC&U Information Literacy VALUE Rubric and AAC&U Inquiry and Analysis VALUE Rubric Capstone - 4

Milestones - 3

Milestones - 2

Benchmark - 1

Corresponding Frame(s) from ​ACRL Framework for Information Literacy for Higher Education

Identifies a focused and manageable/doable topic that appropriately addresses relevant aspects of the topic.

Identifies a topic that while manageable/doable is too narrowly focused and leaves out relevant aspects of the topic.

Identifies a topic that is far too general and wide-ranging as to be manageable and doable.

Searching as Strategic Exploration

Identify a Focused Research Question

Identifies focused and manageable topic and key concepts to explore.

Determine the Extent of Information Needed

Types of information (sources) selected directly relate to concepts or answer research question(s).

Types of information (sources) selected relate to concepts or answer research question(s).

Types of information (sources) selected partially relate to concepts or answer research question(s).

Types of information (sources) do not relate to concepts or answer research question(s).

Authority is Constructed and Contextual

Identify and Articulate an Appropriate Research Methodology

All elements of research methodology are skillfully developed. Uses various research methods based on need, circumstance, and type of inquiry.

Critical elements of methodology are appropriately developed, however, more subtle elements are ignored or unaccounted for. Methods based on need, circumstance, and type of inquiry require further development.

Critical elements of methodology or theoretical framework are missing, incorrectly developed, or unfocused. Uses limited research methods based on need, circumstance, and type of inquiry.

Inquiry design demonstrates a misunderstanding of the methodology. Uses research methods that are inadequate or inappropriate for need, circumstance, and type of inquiry.

Research as Inquiry

Identify and Critically Evaluate Existing Research, Knowledge, and/or Views

Thoroughly identifies and evaluates own and others’ assumptions, which represent wide-ranging points of view and approaches.

Identifies own and others’ assumptions. Evaluates evidence and points of view to reveal patterns, differences, or similarities.

Questions some assumptions and recognizes different points of view, but identification and evaluation of evidence are unfocused.

Uses information from irrelevant or random sources that represents limited points of view. Evaluation of evidence is unsatisfactory or not present.

Authority is Constructed and Contextual

Organize and Synthesize Information Effectively

Communicates, organizes, and synthesizes information from sources to fully achieve a specific purpose. States logical conclusions clearly and with depth.

Communicates, organizes, and synthesizes information from sources to achieve a purpose. Conclusions are based only on inquiry findings.

Communicates and organizes information from sources. Conclusions are general and do not fully consider important patterns, differences, and similarities.

Communicates information from sources. Ideas are unorganized and/or taken out of context. Conclusions are general and illogical or unsupportable based on inquiry findings.

Information Has Value

Research as Inquiry

Access and Use Information Ethically and Legally

Reflect Upon and Meaningfully Articulate Limitations and Implications

Students use correctly all of the following information use strategies: use of citations and references; choice of paraphrasing, summary, or quoting; using information in ways that are true to original context; distinguishing between common knowledge and ideas requiring attribution. Demonstrates a comprehensive understanding of the ethical and legal restrictions on the use of published, confidential, and/or proprietary information.

Students use correctly three of the following strategies: use of citations and references; choice of paraphrasing, summary, or quoting; using information in ways that are true to original context; distinguishing between common knowledge and ideas requiring attribution. Demonstrates a satisfactory understanding of the ethical and legal restrictions on the use of published, confidential, and/or proprietary information.

Students use correctly two of the following strategies: use of citations and references; choice of paraphrasing, summary, or quoting; using information in ways that are true to original context; distinguishing between common knowledge and ideas requiring attribution. Demonstrates a nascent understanding of the ethical and legal restrictions on the use of published, confidential, and/or proprietary information.

Students use correctly one of the following strategies: use of citations and references; choice of paraphrasing, summary, or quoting; using information in ways that are true to original context; distinguishing between common knowledge and ideas requiring attribution. Demonstrates a limited understanding of the ethical and legal restrictions on the use of published, confidential, and/or proprietary information.

Information Creation as a Process

Insightfully discusses in detail relevant and supported limitations and implications. Compellingly supports meaningful contribution to scholarly conversation.

Discusses relevant and supported limitations and implications. Articulation of contribution to scholarly conversation requires further development.

Presents relevant and supported limitations and implications. Articulates a limited or imprecise understanding of contribution to scholarly conversation.

Presents limitations and implications, but they questionably relevant and unsupported. Inappropriately assigns value for contribution to scholarly conversation.

Information Creation as a Process

Information Has Value Scholarship as Conversation

Scholarship as Conversation

GELO 2 - Demonstrate understanding of the process of reflective discovery and the effective and ethical use of information in all its forms.

References Association of American Colleges & Universities. (n.d.). ​Inquiry and Analysis VALUE Rubric​. Retrieved from https://www.aacu.org/value/rubrics/inquiry-analysis Association of American Colleges & Universities. (n.d.). ​Quantitative Literacy VALUE Rubric​. Retrieved from https://www.aacu.org/value/rubrics/quantitative-literacy Association of College & Research Libraries. (2015). ​Framework for Information Literacy for Higher Education​. Retrieved from http://www.ala.org/acrl/standards/ilframework

VALUE Rubric - ACRL Framework for Information Literacy Sandbox

... Colleges & Universities. (n.d.). ​Quantitative Literacy VALUE Rubric​. Retrieved from https://www.aacu.org/value/rubrics/quantitative-literacy. Association of College & Research Libraries. (2015). ​Framework for Information Literacy for Higher Education​. Retrieved from http://www.ala.org/acrl/standards/ilframework.

113KB Sizes 0 Downloads 158 Views

Recommend Documents

Information Literacy Concepts
A fully editable copy of this resource is available under the above license at: .... to have a business librarian, a STEM librarian, and so on. ... others may require a small fee. ... Because so much information can be found online, and not.

Information Literacy Concepts
public service role, but they make up a big part of staff in any large .... only in school, but also in our daily lives. Just as ... Quality information sources will cite their statistical data .... science reporter on cable news, but these sources a

Developing a Framework for Evaluating Organizational Information ...
Mar 6, 2007 - Purpose, Mechanism, and Domain of Information Security . ...... Further, they argue that the free market will not force products and ...... Page 100 ...

Literacy Rubric - Last Revision - 11.5.2015.pdf
There was a problem previewing this document. Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item. Literacy Rubric ...

Rubric:
Instead of using levels, why not assess every assignment and/or project against a consistent rubric. When accompanied by authentic feedback, you will see the ...

MH-Z16 Datasheet - Sandbox Electronics
6.2PWM output (taking PWM output from 2000ppm as example):. CO2 output range: 0ppm-2000ppm. Cycle: 1004ms±5%. High level output for beginning:.

Stonehill Information Literacy Continuum.pdf
Sign in. Loading… Whoops! There was a problem loading more pages. Retrying... Whoops! There was a problem previewing this document. Retrying.

Transforming Interlibrary Loan Requests into Information Literacy ...
Transforming Interlibrary Loan Requests into Information Literacy Instruction Opportunities_Shreve_Mailander.pdf. Transforming Interlibrary Loan Requests into ...

HS-HE Information Literacy FT.pdf
developed a two-pronged authentic assessment approach to measure the information literacy (IL). levels and determine the information seeking habits of students while conducting research for. academic purposes. Librarians devised and developed an IL r

Native Client: A Sandbox for Portable, Untrusted x86 Native Code
This paper describes the design, implementation and eval- uation of Native Client, a sandbox for untrusted x86 native code. Native Client aims to give browser-based applications the computational performance of native applications with- out compromis

The Hidden Information State model: A practical framework for ...
Apr 16, 2009 - hence the distribution of grid points in belief space is very important. ..... other application-dependent data or code in a HIS dialogue manager.

A Framework for Information Extraction, Storage and ...
A Framework for Information Extraction, Storage and Retrieval. Samhaa R. El-Beltagy. Î¥. , Mohammed Said*, and Khaled Shaalan. Î¥. Î¥. Department of ...

The Hidden Information State model: A practical framework for ...
Apr 16, 2009 - POMDP-based spoken dialogue management ... HIS system for the tourist information domain is evaluated and compared with ..... Solid arrows denote conditional dependencies, open circles denote ... For example, the utterance ''I want an

The Hidden Information State model: A practical framework for ...
Apr 16, 2009 - called the Hidden Information State model which does scale and which can be used to build practical systems. A prototype .... The key advantage of the. POMDP formalism is that ... reviews the theory of POMDP-based dialogue management i

A Virtual Honeypot Framework - Center for Information Technology ...
ulates virtual computer systems at the network level. ... The configured services determine the vectors .... Figure 1: Honeyd receives traffic for its virtual honey-.