Updating search results...

Search Resources

67 Results

View
Selected filters:
Beartooth Highway Field Trip and Activities
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

During the course of the day, students examine the high-grade metasupracrustal rocks, related gneisses, and the late Archean granitoids and mafic dikes. We have prepared a number of exercises that might be done with classes at different levels. Depending on the background and preparation of your class you might want to emphasize different learning skills specific to the class level: observation, interpretation, integration (i.e. multiple lines of evidence focused on a given problem), and synthesis (i.e. relationship to the "big picture", drawing from the corpus of geologic knowledge). We have also prepared a compilation of our key scientific results, but these are under seal and we'd like you to do the exercises first as if you were students before taking a look at the supporting evidence.

(Note: this resource was added to OER Commons as part of a batch upload of over 2,200 records. If you notice an issue with the quality of the metadata, please let us know by using the 'report' button and we will flag it for consideration.)

Subject:
Biology
Life Science
Material Type:
Activity/Lab
Module
Provider:
Science Education Resource Center (SERC) at Carleton College
Provider Set:
Teach the Earth
Author:
Darrell Henry
Dave Mogk
Date Added:
12/30/2020
COMPare: a prospective cohort study correcting and monitoring 58 misreported trials in real time
Unrestricted Use
CC BY
Rating
0.0 stars

Discrepancies between pre-specified and reported outcomes are an important source of bias in trials. Despite legislation, guidelines and public commitments on correct reporting from journals, outcome misreporting continues to be prevalent. We aimed to document the extent of misreporting, establish whether it was possible to publish correction letters on all misreported trials as they were published, and monitor responses from editors and trialists to understand why outcome misreporting persists despite public commitments to address it. Methods We identified five high-impact journals endorsing Consolidated Standards of Reporting Trials (CONSORT) (New England Journal of Medicine, The Lancet, Journal of the American Medical Association, British Medical Journal, and Annals of Internal Medicine) and assessed all trials over a six-week period to identify every correctly and incorrectly reported outcome, comparing published reports against published protocols or registry entries, using CONSORT as the gold standard. A correction letter describing all discrepancies was submitted to the journal for all misreported trials, and detailed coding sheets were shared publicly. The proportion of letters published and delay to publication were assessed over 12 months of follow-up. Correspondence received from journals and authors was documented and themes were extracted. Results Sixty-seven trials were assessed in total. Outcome reporting was poor overall and there was wide variation between journals on pre-specified primary outcomes (mean 76% correctly reported, journal range 25–96%), secondary outcomes (mean 55%, range 31–72%), and number of undeclared additional outcomes per trial (mean 5.4, range 2.9–8.3). Fifty-eight trials had discrepancies requiring a correction letter (87%, journal range 67–100%). Twenty-three letters were published (40%) with extensive variation between journals (range 0–100%). Where letters were published, there were delays (median 99 days, range 0–257 days). Twenty-nine studies had a pre-trial protocol publicly available (43%, range 0–86%). Qualitative analysis demonstrated extensive misunderstandings among journal editors about correct outcome reporting and CONSORT. Some journals did not engage positively when provided correspondence that identified misreporting; we identified possible breaches of ethics and publishing guidelines. Conclusions All five journals were listed as endorsing CONSORT, but all exhibited extensive breaches of this guidance, and most rejected correction letters documenting shortcomings. Readers are likely to be misled by this discrepancy. We discuss the advantages of prospective methodology research sharing all data openly and pro-actively in real time as feedback on critiqued studies. This is the first empirical study of major academic journals’ willingness to publish a cohort of comparable and objective correction letters on misreported high-impact studies. Suggested improvements include changes to correspondence processes at journals, alternatives for indexed post-publication peer review, changes to CONSORT’s mechanisms for enforcement, and novel strategies for research on methods and reporting.

Subject:
Applied Science
Health, Medicine and Nursing
Material Type:
Reading
Provider:
Trials
Author:
Aaron Dale
Anna Powell-Smith
Ben Goldacre
Carl Heneghan
Cicely Marston
Eirion Slade
Henry Drysdale
Ioan Milosevic
Kamal R. Mahtani
Philip Hartley
Date Added:
08/07/2020
Carpentries Instructor Training
Unrestricted Use
CC BY
Rating
0.0 stars

A two-day introduction to modern evidence-based teaching practices, built and maintained by the Carpentry community.

Subject:
Applied Science
Computer Science
Education
Higher Education
Information Science
Mathematics
Measurement and Data
Material Type:
Module
Provider:
The Carpentries
Author:
Aleksandra Nenadic
Alexander Konovalov
Alistair John Walsh
Allison Weber
Amy E. Hodge
Andrew B. Collier
Anita Schürch
AnnaWilliford
Ariel Rokem
Brian Ballsun-Stanton
Callin Switzer
Christian Brueffer
Christina Koch
Christopher Erdmann
Colin Morris
Dan Allan
DanielBrett
Danielle Quinn
Darya Vanichkina
David Jennings
Eric Jankowski
Erin Alison Becker
Evan Peter Williamson
François Michonneau
Gerard Capes
Greg Wilson
Ian Lee
Jason M Gates
Jason Williams
Jeffrey Oliver
Joe Atzberger
John Bradley
John Pellman
Jonah Duckles
Jonathan Bradley
Karen Cranston
Karen Word
Kari L Jordan
Katherine Koziar
Katrin Leinweber
Kees den Heijer
Laurence
Lex Nederbragt
Maneesha Sane
Marie-Helene Burle
Mik Black
Mike Henry
Murray Cadzow
Neal Davis
Neil Kindlon
Nicholas Tierney
Nicolás Palopoli
Noah Spies
Paula Andrea Martinez
Petraea
Rayna Michelle Harris
Rémi Emonet
Rémi Rampin
Sarah Brown
Sarah M Brown
Sarah Stevens
Sean
Serah Anne Njambi Kiburu
Stefan Helfrich
Steve Moss
Stéphane Guillou
Ted Laderas
Tiago M. D. Pereira
Toby Hodges
Tracy Teal
Yo Yehudi
amoskane
davidbenncsiro
naught101
satya-vinay
Date Added:
08/07/2020
Cells Inquiry Activity
Conditional Remix & Share Permitted
CC BY-NC
Rating
0.0 stars

This is an inquiry activity that uses either pictures of cells or microscopes and slides to get students thinking about cell structure and function.  You could look at prokaryotic vs eukaryotic cells, plant vs animal or different types of cells found in one organism.  The objective is to have students begin to make the connection between sructure and function in cells.

Subject:
Biology
Material Type:
Lesson Plan
Author:
Deb Henry
Date Added:
06/07/2018
Climate Change Seminar
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

This course provides a broad overview of issues related to climate change, with an emphasis on those aspects most relevant to computer scientists. Topics include climate science, climate models and simulations, decision-making under uncertainty, economics, mitigation strategies, adaptation strategies, geoengineering, policy-making, messaging, and politics.The course will culminate in a presentation of a research project which might include a paper, a blog, software etc.

Subject:
Applied Science
Atmospheric Science
Engineering
Mathematics
Physical Science
Material Type:
Full Course
Provider:
MIT
Provider Set:
MIT OpenCourseWare
Author:
Drake, Henri
Edelman, Alan
Fernandez, John
Rivest, Ronald
Date Added:
09/01/2019
Common Sense Reasoning for Interactive Applications
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

This course will explore the state of the art in common sense knowledge, and class projects will design and build interfaces that can exploit this knowledge to make more usable and helpful interfaces.
This year's theme will be about how common sense knowledge differs in different languages and cultures, and how machine understanding of this knowledge can help increase communication between people, and between people and machines.

Subject:
Applied Science
Arts and Humanities
Computer Science
Engineering
Graphic Arts
Life Science
Physical Science
Material Type:
Full Course
Provider:
MIT
Provider Set:
MIT OpenCourseWare
Author:
Lieberman, Henry
Date Added:
09/01/2006
Common Sense Reasoning for Interactive Applications
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

This course will explore the state of the art in common sense knowledge, and class projects will design and build interfaces that can exploit this knowledge to make more usable and helpful interfaces.
Course requirements will consist of critiques of class readings (about 2 papers/week), and a final project (paper or computer implementation project). Grades will be based primarily on the projects, as well as a small component for class and online participation

Subject:
Applied Science
Computer Science
Engineering
Material Type:
Full Course
Provider:
MIT
Provider Set:
MIT OpenCourseWare
Author:
Lieberman, Henry
Date Added:
09/01/2002
Confronting the Challenges of Participatory Culture
Only Sharing Permitted
CC BY-ND
Rating
0.0 stars

Many teens today who use the Internet are actively involved in participatory cultures—joining online communities (Facebook, message boards, game clans), producing creative work in new forms (digital sampling, modding, fan videomaking, fan fiction), working in teams to complete tasks and develop new knowledge (as in Wikipedia), and shaping the flow of media (as in blogging or podcasting). A growing body of scholarship suggests potential benefits of these activities, including opportunities for peer-to-peer learning, development of skills useful in the modern workplace, and a more empowered conception of citizenship. Some argue that young people pick up these key skills and competencies on their own by interacting with popular culture; but the problems of unequal access, lack of media transparency, and the breakdown of traditional forms of socialization and professional training suggest a role for policy and pedagogical intervention. This report aims to shift the conversation about the "digital divide" from questions about access to technology to questions about access to opportunities for involvement in participatory culture and how to provide all young people with the chance to develop the cultural competencies and social skills needed. Fostering these skills, the authors argue, requires a systemic approach to media education; schools, afterschool programs, and parents all have distinctive roles to play.

Subject:
Business and Communication
Social Science
Sociology
Material Type:
Reading
Provider:
MIT
Provider Set:
MIT Press
Author:
Henry Jenkins
Date Added:
01/01/2009
Cybersecurity Essentials for Beginners - Concepts and Practice
Conditional Remix & Share Permitted
CC BY-NC
Rating
0.0 stars

This book on Cybersecurity is written for beginners. No college degree is required. Cybersecurity covers a broad spectrum of topics. This book intends to ease the initial learning curve using associable analogies in normal life and graphical and guided exercises. Completing the Cybersecurity study in this book can be accomplished in a self-paced learning manner outside of a classroom.

It is hoped that self-paced learning and/or the teaching of this book at various institutions will open the doors to a broader audience in their career development towards the job-rich cybersecurity industry. Further, it is hoped that by demystifying cybersecurity, people will build up their interests and confidence in transitioning into the cybersecurity industries from whatever field they are working in today.

Subject:
Applied Science
Architecture and Design
Career and Technical Education
Computer Science
Computing and Information
Technology
Material Type:
Activity/Lab
Diagram/Illustration
Lecture
Lesson
Unit of Study
Author:
Henry S Teng
Date Added:
03/30/2024
Cybersecurity Presentation Series: Part 1 USB Flash Drive Encryption
Conditional Remix & Share Permitted
CC BY-NC
Rating
0.0 stars

Have you ever felt uneasy or even dreadful after losing a USB flash drive that might contain sensitive information or data about your business?

This presentation will give you a tool to put you at ease when backing up a large number of files and data to a USB flash drive or stick. The tool is relatively easy to use on a USB drive, is based on encryption technology, and protects your business data from the prying eyes.

Attendees will learn about the following topics:
- A brief introduction to data encryption.
- A few encryption tools for a novice user.
- Demonstration on how to use an encryption/decryption tool called VeraCrypt to protect the data on a USB
flash drive.
- Pros and cons of encryption/decryption technology.

Subject:
Applied Science
Career and Technical Education
Computer Science
Computing and Information
Education
Educational Technology
Electronic Technology
Technology
Material Type:
Diagram/Illustration
Lecture
Unit of Study
Author:
Henry S. Teng
Date Added:
04/03/2024
Cybersecurity Presentation Series: Part 2 QuickBooks® & Security Controls
Conditional Remix & Share Permitted
CC BY-NC
Rating
0.0 stars

Today many small businesses benefit from QuickBooks (Desktop and Online) as a financial accounting and management tool to support their businesses. Among the number of business risks to manage, the protection of the financial data in QuickBooks is essential to the vitality of a company.

What can small business owners do in QuickBooks to manage these security risks?

Attendees to this webinar will learn about the following topics:
- Introduce a security architectural approach to QuickBooks data protection.
- Learn about the default data integrity protections built into QuickBooks.
- Practice stronger authentication into QuickBooks.
- Practice role-based access on QuickBooks accounting.
- Perform security monitoring and fraud detection using a rarely known native tool within QuickBooks.

Presentation Time: 50 minutes plus 10 minutes on Q&A.

Subject:
Accounting
Applied Science
Business and Communication
Career and Technical Education
Computer Science
Education
Educational Technology
Finance
Technology
Material Type:
Activity/Lab
Lesson Plan
Syllabus
Teaching/Learning Strategy
Unit of Study
Author:
Henry S. Teng
Date Added:
04/04/2024
Cybersecurity Presentation Series: Part 3 Protection against Ransomware
Conditional Remix & Share Permitted
CC BY-NC
Rating
0.0 stars

Back in May 2021 a cyber-attack known as ransomware shut down the fuel supplies of Colonial Pipeline for American Airlines and the northeast region for almost a week. Darkside, the perpetrator, demanded $4.4 Million from Colonial Pipeline before they would provide a key to unlock the frozen control and billing systems.
Businesses across a spectrum of industries, large and small, got concerned about their own situations and data protection. What can small businesses do to protect their digital assets against ransomware attacks?
Attendees will learn about the following topics:
• Background on ransomware.
• Current state-of-the-art Information Technology against ransomware.
• A risk-based protection strategy.
• Practical tools & tips against ransomware.

Subject:
Applied Science
Computer Science
Material Type:
Lesson
Author:
Henry S. Teng
Date Added:
04/09/2024
Cybersecurity Presentation Series: Part 5 HIPAA Healthcare Security Compliance
Conditional Remix & Share Permitted
CC BY-NC
Rating
0.0 stars

The Health Insurance Portability and Accountability Act of 1996 (HIPAA) is a federal law that requires the creation of national standards to protect sensitive patient health information from being disclosed without the patient’s consent or knowledge. The US Department of Health and Human Services (HHS) issued the HIPAA Privacy Rule to implement the requirements of HIPAA. The HIPAA Security Rule protects a subset of information covered by the Privacy Rule (URL: https://www.cdc.gov/phlp/publications/topic/hipaa.html).

Small businesses that deal with healthcare information must comply with HIPAA. What can small business owners do to manage the compliance risks, yet to be cost-effective?
 
Topics to be covered include:
- What are the business requirements for HIPAA security?
- What stages of IT audit do small businesses need to plan for HIPAA security compliance?
- What technology and tools can be used to protect HIPAA-related data and to assure compliance?
 
Presentation Time: 50 minutes plus 10 minutes Q&A.

Subject:
Applied Science
Computer Science
Material Type:
Diagram/Illustration
Lesson Plan
Author:
Henry S. Teng
Date Added:
04/13/2024
Data availability, reusability, and analytic reproducibility: evaluating the impact of a mandatory open data policy at the journal Cognition
Unrestricted Use
CC BY
Rating
0.0 stars

Access to data is a critical feature of an efficient, progressive and ultimately self-correcting scientific ecosystem. But the extent to which in-principle benefits of data sharing are realized in practice is unclear. Crucially, it is largely unknown whether published findings can be reproduced by repeating reported analyses upon shared data (‘analytic reproducibility’). To investigate this, we conducted an observational evaluation of a mandatory open data policy introduced at the journal Cognition. Interrupted time-series analyses indicated a substantial post-policy increase in data available statements (104/417, 25% pre-policy to 136/174, 78% post-policy), although not all data appeared reusable (23/104, 22% pre-policy to 85/136, 62%, post-policy). For 35 of the articles determined to have reusable data, we attempted to reproduce 1324 target values. Ultimately, 64 values could not be reproduced within a 10% margin of error. For 22 articles all target values were reproduced, but 11 of these required author assistance. For 13 articles at least one value could not be reproduced despite author assistance. Importantly, there were no clear indications that original conclusions were seriously impacted. Mandatory open data policies can increase the frequency and quality of data sharing. However, suboptimal data curation, unclear analysis specification and reporting errors can impede analytic reproducibility, undermining the utility of data sharing and the credibility of scientific findings.

Subject:
Applied Science
Information Science
Material Type:
Reading
Provider:
Royal Society Open Science
Author:
Alicia Hofelich Mohr
Bria Long
Elizabeth Clayton
Erica J. Yoon
George C. Banks
Gustav Nilsonne
Kyle MacDonald
Mallory C. Kidwell
Maya B. Mathur
Michael C. Frank
Michael Henry Tessler
Richie L. Lenne
Sara Altman
Tom E. Hardwicke
Date Added:
08/07/2020
Discover Psychology 2.0 - A Brief Introductory Text
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

This textbook presents core concepts common to introductory courses. The 15 units cover the traditional areas of intro-to-psychology; ranging from biological aspects of psychology to psychological disorders to social psychology. This book can be modified: feel free to add or remove modules to better suit your specific needs.

This book includes a comprehensive instructor's manual, PowerPoint presentations, a test bank, reading anticipation guides, and adaptive student quizzes.

Subject:
Psychology
Social Science
Material Type:
Textbook
Provider:
Diener Education Fund
Provider Set:
Noba
Author:
Cara Laney
David M. Buss
David Watson
Edward Diener
Elizabeth F. Loftus
Emily Hooker
George Loewenstein
Henry L. Roediger III
Jeanne Tsai
Kathleen B. McDermott
Mark E. Bouton
Max H. Bazerman
Richard E. Lucas
Robert Siegler
Robert V. Levine
Ross Thompson
Sarah Pressman
Sudeep Bhatia
Susan T. Fiske
Yoshihisa Kashima
Date Added:
12/08/2016
Elementary College Geometry
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

This text is intended for a brief introductory course in plane geometry. It covers the topics from elementary geometry that are most likely to be required for more advanced mathematics courses. The only prerequisite is a semester of algebra.

The emphasis is on applying basic geometric principles to the numerical solution of problems. For this purpose the number of theorems and definitions is kept small. Proofs are short and intuitive, mostly in the style of those found in a typical trigonometry or precalculus text. There is little attempt to teach theorem-proving or formal methods of reasoning. However the topics are ordered so that they may be taught deductively.

The problems are arranged in pairs so that just the odd-numbered or just the even-numbered can be assigned. For assistance, the student may refer to a large number of completely worked-out examples. Most problems are presented in diagram form so that the difficulty of translating words into pictures is avoided. Many problems require the solution of algebraic equations in a geometric context. These are included to reinforce the student's algebraic and numerical skills, A few of the exercises involve the application of geometry to simple practical problems. These serve primarily to convince the student that what he or she is studying is useful. Historical notes are added where appropriate to give the student a greater appreciation of the subject.

This book is suitable for a course of about 45 semester hours. A shorter course may be devised by skipping proofs, avoiding the more complicated problems and omitting less crucial topics.

Subject:
Geometry
Mathematics
Material Type:
Textbook
Provider:
CUNY Academic Works
Provider Set:
New York City College of Technology
Author:
Henry Africk
Date Added:
01/01/2013
Elementary College Geometry
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

This is a reviewed and visually enhanced version of Henry Africk's Elementary College Geometry book.
This text is intended for a brief introductory course in plane geometry. It covers the topics from elementary geometry that are most likely to be required for more advanced mathematics courses. The only prerequisite is a semester of algebra.

Subject:
Geometry
Mathematics
Material Type:
Textbook
Author:
Henry Africk
Date Added:
03/04/2021
Essay: The future of corporate governance
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

The current corporate governance models of today’s organizations are unfit for organizations of the future, and even today. What does this mean for directors and the management? Let’s have a look into the future, divided into long-term, middle-term, and short-term future lenses.

Subject:
Applied Science
Business and Communication
Career and Technical Education
Communication
Computer Science
Economics
Education
Electronic Technology
Finance
General Law
Higher Education
Information Science
Law
Management
Social Science
Special Education
Material Type:
Case Study
Primary Source
Reading
Syllabus
Date Added:
02/05/2019