Open Access. Powered by Scholars. Published by Universities.®

Education Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 3 of 3

Full-Text Articles in Education

A Phenomenographic Study Of What It Means To Supervise Doctoral Students, April Wright, Jane Murray, Patricia Geale Nov 2009

A Phenomenographic Study Of What It Means To Supervise Doctoral Students, April Wright, Jane Murray, Patricia Geale

Jane Murray

We utilize the research methodology of phenomenography in this study to explore what doctoral supervisors understand supervision to be and how they enact this understanding in the practice of supervising students. Twenty interviews were undertaken with supervisors at three Australian universities to uncover “lived” experiences of doctoral research supervision. Five qualitatively different ways of conceiving supervisors’ roles emerged through phenomenographic analysis of the transcripts. Our findings suggest that while supervisors undertake similar tasks when supervising, they approach these tasks differently because of their qualitatively different understandings of what supervision is.


No Handshakes At Commencement: How About Elbow Bumps Instead?, Valerie Lucus Cem, Cbcp Jun 2009

No Handshakes At Commencement: How About Elbow Bumps Instead?, Valerie Lucus Cem, Cbcp

Valerie Lucus-McEwen CEM CBCP

No abstract provided.


Enhancing Authentic Assessment Through Information Technology, Beth Rubin Dec 2008

Enhancing Authentic Assessment Through Information Technology, Beth Rubin

Beth Rubin

This chapter provides a framework to analyze the opportunities to enhance authenticity when assessment is mediated by information technology (IT), as well as the limitations of IT mediation on authenticity. The potential degree of authenticity is determined by several aspects of the competence being assessed: the chronicity of access to and use of information; the durability of the display; the use of written, oral and non-verbal communication; and computer use. The framework is used to identify IT tools that enable more authentic assessment as well as sample approaches and limitations on authenticity.