WHILE YOU ARE WAITING Construct a question you

  • Slides: 17
Download presentation
WHILE YOU ARE WAITING • Construct a question you could use on Blackboard to

WHILE YOU ARE WAITING • Construct a question you could use on Blackboard to stimulate discussion

LEARNING TO TEACH ONLINE: APPLYING CONCEPTS THROUGH DISCUSSION FORUMS DR. LAUREN R. SHAPIRO

LEARNING TO TEACH ONLINE: APPLYING CONCEPTS THROUGH DISCUSSION FORUMS DR. LAUREN R. SHAPIRO

ONLINE ENVIRONMENT ASSESS FACTS/KNOWLEDGE • Assignments APPLICATION OF KNOWLEDGE • Class discussion • Assessments

ONLINE ENVIRONMENT ASSESS FACTS/KNOWLEDGE • Assignments APPLICATION OF KNOWLEDGE • Class discussion • Assessments • Instructor = guide • EXAMPLE: Name and describe 3 steps in Active Shooter Situation • Students = practice being ‘experts’

 • PROMOTING LEARNING THROUGH Creating questions or tasks DISCUSSION • unique, integrate, meaningful

• PROMOTING LEARNING THROUGH Creating questions or tasks DISCUSSION • unique, integrate, meaningful answers • apply information from sources • demonstrate scholarship (cite sources) • Clear instructions • Modeling and timely feedback • expected answer [seed] • expected responses to classmates

DEVELOPING QUESTIONS THAT PROMOTE LEARNING AND DISCUSSION TO SIMULATE IN-CLASS DISCUSSIONS • Goal is

DEVELOPING QUESTIONS THAT PROMOTE LEARNING AND DISCUSSION TO SIMULATE IN-CLASS DISCUSSIONS • Goal is to help students to develop flexible knowledge and critical thinking skills • What makes creating questions for online discussion so hard? • Let’s examine your questions

DO THESE QUESTIONS FIT THE REQUIREMENTS [UNIQUE, INTEGRATE, APPLY]? • Cosmetics and jewelry are

DO THESE QUESTIONS FIT THE REQUIREMENTS [UNIQUE, INTEGRATE, APPLY]? • Cosmetics and jewelry are considered the most likely items to be stolen. What makes these two categories so appealing? • Please explain the differences between Floor Wardens and a Fire Brigade. • Are deleted files ever gone? Why or why not? • Security is most often considered a proactive measure, not always for Law Enforcement. Please share your thoughts on this topic. • What is the difference in power between a civilian and law enforcement as it relates to making an arrest?

QUESTION/TASK AT GRADUATE LEVEL • Select a security violation or life safety incident from

QUESTION/TASK AT GRADUATE LEVEL • Select a security violation or life safety incident from 2014 -2019 [do not use an incident that another student is already using]. • Using all of the 3 required readings (Craighead, 2009 h, 2009 m; Gunter & Kidwell, 2004) and at least 1 other source from the 5 enrichment site/videos (ASIS International, 2018; Demars, 1982; National Fire Protection Association, 2010; Straub et al. , 2017) to explain: • a. ) whether private security employees in the building had developed a relationship with Law Enforcement Agents (LEAs) and/or Fire Authorities (FAs), provide some evidence to support your belief. • b. ) at least 2 ways that the private security employees worked with or helped LEAs and FAs to investigate the incident, provide some evidence to support your belief. Specify how their relationships contributed to the investigation. *References

CLEAR INSTRUCTIONS + MODELING (CITING) • You must use each of the 3 articles

CLEAR INSTRUCTIONS + MODELING (CITING) • You must use each of the 3 articles at least ONCE in every submission and you must have at least 2 of the articles used in EACH answer. • Specifically, you MUST include in-text citations for at least 2 of the 3 readings in answering question#1 and 2 of the 3 in answering question#2 AND you must include a reference list of all citations in the text (if you cited it, it should be in the reference list). • As per APA style, the first time you cite the source must have all of the authors (except when there are 6 and more), but thereafter sources with at least 3 authors can be cited by first author and "et al. " I have provided the correct way to cite above in the task instructions. • • In-text citations of the readings when starting a sentence would be: • Cellucci (2010) …. . • Mc. Kenzie (2006) …. . • Strom et al. (2010) …… In text citations of the readings when citing at the end of the sentence would be: • (Cellucci, 2010). • (Mc. Kenzie, 2006). • (Strom et al. , 2010).

REFERENCES (APA STYLE) References Craighead, G. (2009 a). High-rise building definition, development, and use.

REFERENCES (APA STYLE) References Craighead, G. (2009 a). High-rise building definition, development, and use. In High-rise security and fire life safety (pp. 1 - 26). Burlington, MA: Butterworth and Heinemann. Craighead, G. (2009 b). Security and fire life safety uniqueness of high rise buildings. In High-rise security and fire life safety (pp. 27 -60). Burlington, MA: Butterworth and Heinemann. Craighead, G. (2009 n). Laws, codes, standards, and guidelines. In High-rise security and fire life safety (pp. 601614). Burlington, MA: Butterworth and Heinemann. O'Hagan, J. T. (1973). One New York plaza: An architect's dream, a fire fighter's nightmare! WNYF magazine, 1, 4 -10. Price, B. (2018). Out of thin air: The potential for high-rise housing over rail lines. CTBUH Journal, 3, 34 -40.

SECURITY 101—TASK/QUESTION EXAMPLES • Choose an internal or external threat to an organization. Examples

SECURITY 101—TASK/QUESTION EXAMPLES • Choose an internal or external threat to an organization. Examples of external threats include hacking, theft, and active shooter/terrorism, Examples of internal threats include espionage, workplace violence from previous/current employees, employee theft, and embezzlement. Example 1: As a private security professional tasked with investigating this threat, explain your procedure. • In the first paragraph, select, specify, and describe threat and how it affects the company. Then walk me through (step by step) the process of investigating it (Nemeth, 2017 i). Please support your response with the required readings from chapter 9 (Nemeth, 2017 i). • In the second paragraph, indicate what potential legal ramifications will you need to be aware of during your investigation (Nemeth, 2017 e). Indicate how you will ensure to operate within the law based on chapter 5 (Nemeth, 2017 e). Example 2: Select, specify, and describe threat and explain its potential to cause problems. • Next, address what physical security measures you would implement to protect against this threat (Nemeth, 2017 g). • Finally, address what personnel security measures you would implement to protect against this threat (Nemeth, 2017 h).

SEC 310: TASK/QUESTION EXAMPLES • For this week, select a recent type of disaster

SEC 310: TASK/QUESTION EXAMPLES • For this week, select a recent type of disaster that occurred here in U. S. and a similar one abroad (e. g. , terrorist act in airport, fire in high rise residential building, flooding). BRIEFLY describe what occurred. • Next, describe the recovery procedures for the communities in terms of "housing, economic, and psychological recovery of residents and operational recovery of businesses in the area" (Lindell, Prater, & Perry, 2006 k, p. 308). Specify how they were the same and different, success in terms of length of time for recover, and amount of assistance provided by the government and insurance (Lindell et al. , 2006 k, 2006 m). Use Lindell et al. (2006 m) to guide your discussion of how countries vary in terms of both building standards and risk assessment, economic support available, and roles played by government and nongovernment organizations (GOs and NGOs) • Finally, based on the problems that emerged during the recovery process, provide 2 or 3 ways that having standards and compliance for emergency management would have improved the response and recovery process for this disaster in both countries (Lindell et al. , 2006 l).

FORMAT OF DISCUSSION FORUM ANSWERS AND REPLIES RULES FOR ANSWERS • Must use a

FORMAT OF DISCUSSION FORUM ANSWERS AND REPLIES RULES FOR ANSWERS • Must use a separate Discussion thread to answer • Must include each original question/task before the student’s answer • Must adhere to requirements for use of incidents e. g. , 2014 -2019), # and type of sources (e. g. , 2 required, 1 enrichment), etc. • Must include minimum # of words (e. g. , 350, 500) • Must include in-text citations for specified sources (i. e. , specified number of required readings and enrichment materials); • Must include reference list (i. e. , each in-text citation must have corresponding source in reference list, vice-a-versa) • Must use specified style (e. g. , APA) for in-text citations and reference list • Must be submitted by specific date and time (e. g. , Thursday, 5 pm) REPLIES • Must “reply” to a minimum of 2 classmates, provide evaluation of work with rationale/justification; • Each reply must be a minimum of 100 words; • Must include in-text citations for specified sources (i. e. , specified number of required readings and enrichment materials); • Must include a relevant question to keep discussion progressing; • Must include reference list (i. e. , each in-text citation must have corresponding source in reference list, vice-a-versa) • Must use specified style (e. g. , APA) for in-text citations and reference list • Must be submitted by specific date and time (e. g. , Sunday, 5 pm)

SEED EXAMPLE 1. Review a past incident, explain a. ) whether private security employees

SEED EXAMPLE 1. Review a past incident, explain a. ) whether private security employees in the building had developed a relationship with LEAs and FAs, provide some evidence to support your belief. Incident: On October 1, 2017, a lone gunman named Stephen Paddock opened fire on an open-air concert from a Las Vegas hotel room 400 meters away. The incident resulted in 59 deaths and another 851 injured. The Mandalay Bay hotel had established relationships with both local and federal law enforcement. Las Vegas Metro police department had adopted anti-terrorism training protocols along with private agencies, beginning in 2009, and worked with all area hotels. DHS hosted seven active shooter workshops in Las Vegas, drawing hundreds of private and public security agencies. The hotel security department held regular training with LEAs and FAs, and belonged to industry liaison groups, such as ASIS Las Vegas chapter, which met regularly and discussed common threats, best practices, and invited local and federal officials to speak or conduct training (Craighead, 2009 m; Gunter & Kidwell, 2004). As was observed in the Pulse nightclub attack in Orlando in June of 2016, the nature and strength of relationships, while unable to predict or prevent some attacks, are key to successful response and life-saving operations (Straub, Cambria, Castor et al. , 2017). Strong pre-existing relationships are essential to successful response operations (Straub, Cambria, Castor et al. , 2017). b. ) at least 2 ways that the private security employees worked with/helped LEAs and FAs to investigate the incident, provide some evidence to support your belief. Specify how their relationships contributed to the investigation. Private security employees helped LEAs investigate the shooting in two main ways. First, security at the Mandalay Bay provided LEAs with activity and incident reports which included noise complaints from the shooter on the night before the incident (Gunter & Kidwell, 2004). A hotel client called twice from to complain about loud music coming from the room below. Security confirmed the details of the complaints. Another way private security aided the investigation by reviewing recorded video from inside the hotel. Law enforcement requested access to all related video surrounding the incident, prior to, during, and after the shootings occurred (Craighead, 2009 h, 2009 m; Gunter & Kidwell, 2004). There was some initial discrepancy about the timeline of events immediately leading up to the shootings, including when hotel security first encountered Paddock. After an intense review of hotel security dispatch logs, hotel CCTV recordings, and police officer body camera recordings, LEAs determined that initial reports of the incident timeline needed adjusting (Craighead, 2009 h). **(include reference list)

[EXAMPLE REPLY] SECURITY IN HOUSES OF WORSHIP Most houses of worship, particularly in Judaism,

[EXAMPLE REPLY] SECURITY IN HOUSES OF WORSHIP Most houses of worship, particularly in Judaism, have relationships with local law enforcement (LE) as Jews have been targeted for most of their history (Craighead, 2009 m). I know this relationship with security existed with LE at every synagogue I have attended in the 8 states where I lived (Gunter & Kidwell, 2004). Evidence of this was also clear to me when I emerged from my synagogue in White Plains on the day the Pittsburgh TOL shooting occurred and saw police cars at all 5 synagogues. I do see various components missing from security at houses of worship. First, they, like most of the schools in the US, were not built for security (e. g. , lots of glass windows, multiple door access). So they are extremely vulnerable despite the presence of security guards (Craighead, 2009 m). Second, the congregations at houses of worship are there to pray and are not in the mindset to endorse safety and security (Craighead, 2009 m). Third, worshippers may have practiced fire drills but it almost unlikely that they have conducted active shooter drills nor would they have designated particular people to have specific responsibilities for emergencies (Gunter & Kidwell, 2004). Consequently, the security guard would be too busy fighting the assailant to handle evacuation and first aid responsibilities. It is for these reasons (and the fact that armed police officers were injured in the confrontation) that I disagree with the statement that “the presence of an armed guard would have prevented the carnage at TOL” mainly because armed police officers were injured engaging with the shooter. Moreover, the suggestion that worshippers should come to houses of worship armed is also troubling from a personal and social perspective. What is your perspective of how to counter mass shooting attacks in houses of worship? References Craighead, G. (2009 m). Liaison with law enforcement and fire authorities. In High-rise security and fire life safety (pp. 595 -600). Burlington, MA: Butterworth and Heinemann. Gunter, W. & Kidwell, J. (2004). Law enforcement and private security liaison: Partnerships for cooperation. Accessed at http: //www. ifpo. org/resource-links/articles-and-reports/securitymanagement-and-supervision/law-enforcement-and-private-security-liaison-partnerships-for-cooperation/ (on 1/24/2018).

STUDENT RESPONSE TO THE QUESTION IN MY REPLY I think the first step to

STUDENT RESPONSE TO THE QUESTION IN MY REPLY I think the first step to counter shooting in the house of worship should be to organize a volunteer security team among parishioners. Ideally, the team would include people with a variety of experience in law enforcement, military, logistics and medical backgrounds to help come up with a safety and security plan. Limit access for entry and exiting a place of worship so officials can have a better sense of who's coming and going. Give a local law enforcement agency a copy of your building's layout so it knows the entrances and how to find people in case of an emergency. Whenever possible, provide law enforcement with statistics of criminal acts, particularly crimes of larceny, that have occurred at the building (Craighead, 2009 m). Encourage tenants, residents, and guests to report crimes to law enforcement. (Craighead, 2009 m). Public reports are based on data generated at the local level. When these crimes are reported to law enforcement, such data will more accurately indicate what types of crimes are being committed in the community (Craighead, 2009 m). This will provide a clearer picture of crime and may assist law enforcement in justifying requests for additional law enforcement personnel and equipment (Craighead, 2009 m). Do think more security procedures should be implemented as it relates to worship environments? Reference: Craighead, G. (2009 m). Liaison with law enforcement and fire authorities. In High-rise security and fire life safety (pp. 595 -600). Burlington, MA: Butterworth and Heinemann.

GRADING RUBRICS 4/exceeds expectation 3/meets expectation 2/below expectation 1/limited evidence 0/no evidence Demonstrates poor

GRADING RUBRICS 4/exceeds expectation 3/meets expectation 2/below expectation 1/limited evidence 0/no evidence Demonstrates poor or absent knowledge of concepts, skills, and theories in the readings Did not participate and/or use required readings as sources Content Demonstrates excellent knowledge of concepts, skills, and theories described in the required readings Demonstrates fair knowledge of concepts, skills, and theories described in the readings Demonstrates significantly flawed knowledge of concepts, skills, and theories in the readings Support Statements are supported by in-text citations AND reference list in answers and reply; correct style Statements are partially supported by in-text citations and reference; may have some style errors Support is partially deficient in text citations, in reference list, and in style. Missing in-text citations of support and/or reference list; style errors. Did not participate and/or cite or make reference list of sources Writing is well organized, clear, concise, and focused Some significant but not major errors or omissions in writing organization, focus, and clarity Numerous errors or omissions - at least some major – in writing organization, focus, and clarity Did not participate Quantity Requirements fulfilled for each answer and response. Answers were 350 words or more for each question; minimum of 2 Responses to classmates of 100 words minimum with Question in each; answer and responses submitted by due date and time. Requirements basically fulfilled, missing 1 of the elements (number of words, number of submissions, inclusion of question, and/or timing of submissions). Requirements basically fulfilled, missing 2 of the elements (number of words, number of submissions, inclusion of question, and/or timing of submissions). Requirements partially fulfilled missing 3 elements (number of words, number of submissions, inclusion of question, and/or timing of submissions). Did not participate and/or missed deadlines completely

BLACKBOARD DEMONSTRATION • Let’s go to Blackboard to see examples and its impact for

BLACKBOARD DEMONSTRATION • Let’s go to Blackboard to see examples and its impact for students and for grading • EX 1: Question has limited options for answers [f 15 sec 270] • EX 2: One thread for answers and replies [f 15 sec 270] • EX 3: Task with replies [f 18 sec 740]