Principal’s Nominee & Assessment Leader Seminar 2014 February/March 2014 1 Dear Colleagues PRINCIPAL’S NOMINEE SEMINAR NZQA would like to welcome you to this year’s regional Principal’s Nominee Seminar. We look forward to being able to provide updates for this year and, in response to comment in your 2013 evaluations, to give you the opportunity to share ideas with colleagues on managing authenticity issues and on effective communication. NZQA appreciates the work that you do and hopes that the seminar will provide information and guidance that may assist you in your role within your school. We also hope that the seminar will be an opportunity for you to meet staff from other schools and serve as a valuable means of developing collegial support for each other. NZQA wishes you and your school’s community well for 2014. Warmest regards Ian Munro Manager School Quality Assurance & Liaison 2 Authenticity Why do students present inauthentic work? In what ways do students present inauthentic work? What is your process for managing authenticity? What does authentic work look like? 3 Authenticity Prevention Rationale Detection Outcome Investigation 4 Authenticity Prevention Rationale Plagiarism Outcome Investigation 5 Detection Authenticity Prevention Rationale Undue help Outcome • Teacher • Adult • Other student Investigation 6 Detection Authenticity Prevention Rationale Teacher practice Outcome • Incorrect curriculum level • Too much/too little Detection direction • Inadequate brief Investigation 7 Authenticity Prevention Rationale Assessment from public sources Outcome • TKI • Commercial • Subject associations Investigation 8 Detection NZQA Authenticity Resources 1. http://www.nzqa.govt.nz/about-us/publications/newsletters-and-circulars/assessmentmatters/authenticity-requirements-for-non-examination-external-assessment/ 2. http://www.nzqa.govt.nz/providers-partners/assessment-and-moderation/assessment-ofstandards/generic-resources/authenticity/ 3. http://www.nzqa.govt.nz/providers-partners/assessment-and-moderation/preventing-detectingacademic-fraud/ 9 Authentic work checklist Student’s Name Features of authentic work Content Work relates to the agreed topic Personal response or reference is adequate Evidence shows student has collected and interpreted own data Comments/observations/points are consistent Ideas include those in the class discussion or resources Oral questioning shows student can sustain the ideas from written work Student has not copied another student or allowed their work to be copied Structure Structure is coherent, sections and paragraphs flow logically No important link is missing, no section or paragraph is irrelevant Final version is consistent with early drafts All checkpoints were met (eg brainstorm, raw data recording, first draft) Language Vocabulary and syntax are appropriate for the student Spelling and paragraphing are appropriate for the student Submitted work is consistent with the student’s other work for the course The voice is the student’s own, not that of an academic or a professional writer Sources References and quotations are appropriate and acknowledged Sources are referenced 10 Y/N (Comment) Vocabulary and syntax are appropriate for the student student Submitted work is consistent with the student’s other work for the course Personal response or reference is adequate Standard Evidence shows student has collected and Date Spelling and paragraphing are appropriate for the Work relates to agreed topic LANGUAGE The voice is that of the interpreted own data CONTENT Name Comments/observations/points are consistent Ideas include those of class discussion or resources Oral questioning shows student can sustain the ideas from the written work Student has not copied another student or allowed their work to be copied Authentic student and not an academic Work or professional writer STRUCTURE References and quotations are appropriate and acknowledged Sources are referenced SOURCES Structure is coherent, sections and paragraphs flow logically No important link is missing, no section or paragraph is irrelevant Final version is consistent with early drafts All checkpoints were met (eg brainstorm, raw data recording, first draft) 11 External Assessment Breaches Investigations Expectations NZQA’s Exam Rules and Instructions provide the opportunity for candidates in external assessments to present authentic work in equitable conditions. They tell the candidates what we expect of them in relation to honest practice, authentic work, influencing, assisting or hindering another candidate and following instructions. These rules are communicated in writing and orally before the November exams. Principles Possible breach investigations are based on the following: natural justice by treating candidates fairly. Decisions that affect their rights are made using procedures based on the premise that: o a candidate’s reasons and/or explanation must be fairly heard o a person may not be both the prosecutor and the judge o all decisions must be made in good faith, without bias or prejudice. transparency by seeking candidates’ views and by keeping them informed at all stages of the investigative process. the right to privacy by giving protection to the person/s reporting a possible breach, along with the rights of any candidate being investigated. If a parent, caregiver or any other person contacts NZQA to discuss details, we require the candidate’s permission before we will disclose any information personal to them. Process When NZQA receives a report of a possible breach we: write to the candidate, including a copy of the report from the marker or exam centre outlining the possible breach and asking the candidate for their explanation of what happened explain what will happen while the report is being investigated withhold the candidate’s results for the standards that are the subject of the report. This suspends their release and use in qualifications until we reach an investigation outcome. We ask the candidate to read the report very carefully and decide if it is a fair account of what happened reply to us in writing, stating whether they agree or disagree with the report, giving their explanation of what happened and including any other information they want us to take into account. A form to help them structure their reply can be found at www.nzqa.govt.nz/breaches In addition, we may need to investigate more, ask for extra information, involve other people or meet with the candidate in person to help us make a decision. Where we need to meet with a candidate, NZQA includes an independent appointee. The investigative and decision-making process is outlined in the Assessment (including Examination) Rules for Schools with Consent to Assess, reviewed annually. Outcomes Outcomes are decided using all the information received about a reported possible breach, including examining evidence of loss of credibility of a candidate’s result. Where a breach occurs which does not affect result credibility, eg having a cell phone in their bag at the front of the room, the candidate may be given a warning. Where credibility may be affected, the decision to release or withhold results is peer-reviewed before it is confirmed. All decisions to withhold results are reviewed by a third party. We may withhold results for one or all of the standards in that examination session. In very serious cases, we may withhold results for all external standards. Only where results are withheld do we advise the outcome to the school’s Principal. The candidate has the right to request a review or to appeal the decision 12 EXTERNAL ASSESSMENTS By entering for NZQA external assessment you agree to follow our Rules for Candidates1.These ensure that the work you hand in for marking is authentic and means fair assessment conditions for all candidates. Rules for Candidates All work you hand in for marking must be your own or properly referenced. Follow all instructions of any supervisor. You are not allowed to have the following in any NZQA exam: o Cell phones – except in the emergency evacuation pack. o Notes in any form – written or electronic. o Any paper – except your Admission Slip. o Any other electronic device – except an approved calculator o Any dictionaries or translators. In an exam you are not allowed to: Talk to, communicate with or disturb other candidates Copy other candidate’s work Write to the marker including writing or drawing anything that could be viewed as offensive. Leave the exam room within the first 45 minutes of the exam. Portfolios and Submissions You must meet NZQA’s specifications, timelines and authentication requirements for work assessed externally by portfolio or submission. Your teacher will explain what this means for their subject. NZQA investigates reports of possible breach of these Rules for Candidates. More information on breaches can be found at: www.nzqa.govt.nz/breaches 1 For the complete NZQA rules for assessment and examinations see http://www.nzqa.govt.nz/about-us/our-role/legislation/nzqa-rules/assessment-and-examination-rules-for-schools-2014/7/ 13 Authenticity - Investigation and Outcome NZQA In our school – teachers, students and caregivers Expectations and how these are communicated Principles Process for investigation Outcomes 14 Authenticity: where to? How can I further develop best practice to manage authenticity in my school? Who is Responsible? Stakeholders What is the timeline? Senior Management (including Principal’s Nominee) 1. 2. Do all stakeholders have a common understanding of the school’s authenticity policy and processes? Have all stakeholders been informed about the school’s authenticity policy and processes? Action Subject Leaders of Learning Areas (HOD/TIC) 1. 2. 3. Do all leaders of learning areas activity promote best practice when dealing with authenticity issues? Do you know that all learning areas follow best practice when dealing with authenticity issues? Does subject leader’s moderation of internal assessment work for their learning area include authenticity checks? Action Classroom Teachers 1. 2. 3. 4. 5. 6. Do all teachers follow authenticity procedures in their assessment practice? How does the school know that teachers are following best practice when dealing with authenticity issues? Are all teachers consistent in dealing with authenticity issues in their assessment practice? Do teachers teach students appropriate authenticity methodology for their subject area including referencing? Do teachers follow check point processes to monitor authenticity in long term assessment activities? Do teachers signal authenticity issues to other stakeholders? Action Students 1. 2. 3. Do all students understand the implications of signing an authenticity statement for internal assessment activities? Does your school help students to understand what authenticity means? Do students feel comfortable reporting breaches of rules for assessment opportunities? Action Parents/Guardian 1. 2. Are parents/guardians aware of the appropriate support they can give to their children when helping them with assessment activities? (consider the role of paid Tutors) Are parents aware of the potential consequences if their children’s work is deemed to be not authentic? Action 15 Completed Effective communication 16 Communicating: Fees and financial assistance Why What To whom How When How to determine that communication is effective What next 17 Communicating: Authenticity Why What To whom How When How to determine that communication is effective What next 18 Communicating: Special assessment conditions Why What To whom How When How to determine that communication is effective What next 19 Communicating: Internal moderation Why What To whom How When How to determine that communication is effective What next 20 Communicating: External moderation Why What To whom How When How to determine that communication is effective What next 21 Communicating: Academic counselling and Vocational Pathways Why What To whom How When How to determine that communication is effective What next 22 Communicating: Data management Why What To whom How When How to determine that communication is effective What next 23 Communicating: Why What To whom How When How to determine that communication is effective What next 24 Communicating (some possible responses) Why To comply with NZQA or MoE requirements To ensure fair assessments To protect the school’s reputation To help consistency across subjects What Policy Procedures Information Form Web link To whom PN SMT Students Families BOT Teachers HoDs All staff How Student handbook Staff handbook Wall chart Presentation Assembly Meeting Email Intranet / shared drive One-on-one Checklist Handout Assessment cover sheet Secure login When February November Weekly Monthly Each term With each assessment Following NZQA prompt (eg circular or EmaiLink) How to determine effective communication Breaches of authenticity are identified Any late entries are appropriate and there are no unintentional entries No unconsented stds entered Any issues in external moderation reports are followed up Few appeals Improved results Sensible questions are asked Compliance with school procedures What next HOD workshop Review assessment guide Working group to review school approach Whole staff workshop 25 Updates 26 ______________________________________ ______________________________________ ______________________________________ ______________________________________ ______________________________________ ______________________________________ ______________________________________ ______________________________________ ______________________________________ ______________________________________ ______________________________________ ______________________________________ ______________________________________ ______________________________________ ______________________________________ ______________________________________ ______________________________________ ______________________________________ ______________________________________ ______________________________________ ______________________________________ ______________________________________ ______________________________________ ______________________________________ ______________________________________ ______________________________________ ______________________________________ 27 ______________________________________ ______________________________________ ______________________________________ ______________________________________ ______________________________________ ______________________________________ ______________________________________ ______________________________________ ______________________________________ ______________________________________ ______________________________________ ______________________________________ ______________________________________ ______________________________________ ______________________________________ ______________________________________ ______________________________________ ______________________________________ ______________________________________ ______________________________________ ______________________________________ ______________________________________ ______________________________________ ______________________________________ ______________________________________ ______________________________________ ______________________________________ 28 ______________________________________ ______________________________________ ______________________________________ ______________________________________ ______________________________________ ______________________________________ ______________________________________ ______________________________________ ______________________________________ ______________________________________ ______________________________________ ______________________________________ ______________________________________ ______________________________________ ______________________________________ ______________________________________ ______________________________________ ______________________________________ ______________________________________ ______________________________________ ______________________________________ ______________________________________ ______________________________________ ______________________________________ ______________________________________ ______________________________________ ______________________________________ 29 ______________________________________ ______________________________________ ______________________________________ ______________________________________ ______________________________________ ______________________________________ ______________________________________ ______________________________________ ______________________________________ ______________________________________ ______________________________________ ______________________________________ ______________________________________ ______________________________________ ______________________________________ ______________________________________ ______________________________________ ______________________________________ ______________________________________ ______________________________________ ______________________________________ ______________________________________ ______________________________________ ______________________________________ ______________________________________ ______________________________________ ______________________________________ 30 ______________________________________ ______________________________________ ______________________________________ ______________________________________ ______________________________________ ______________________________________ ______________________________________ ______________________________________ ______________________________________ ______________________________________ ______________________________________ ______________________________________ ______________________________________ ______________________________________ ______________________________________ ______________________________________ ______________________________________ ______________________________________ ______________________________________ ______________________________________ ______________________________________ ______________________________________ ______________________________________ ______________________________________ ______________________________________ ______________________________________ ______________________________________ 31 ______________________________________ ______________________________________ ______________________________________ ______________________________________ ______________________________________ ______________________________________ ______________________________________ ______________________________________ ______________________________________ ______________________________________ ______________________________________ ______________________________________ ______________________________________ ______________________________________ ______________________________________ ______________________________________ ______________________________________ ______________________________________ 32 Appendix Resource A Life without Facebook I eliminated my Facebook account as a sort of experiment. With Facebook and real life becoming increasingly mutual, what would I miss? What wouldn’t I miss? This didn’t begin as an impulsive decision with unexpected consequences, and I‘m not a Facebook hater by any stretch. I love and use social media, and am fascinated by what its explosion has enabled in a variety of arenas. My experiment has continued longer than I expected. I haven’t quit, purposefully not deleting my account entirely. But through extended deactivation, I have learnt some things: that I miss out on a lot of conversations now; that, somewhat ironically, I’m more focused now than before on my own life and needs; and that I’m not the only person who wonders, to F-B-ornot-to-FB? A recent New York Times article titled “The Facebook Resisters” profiled young-adult Facebook abstainers who point to concerns about privacy, alienation and information overload. But I’m interested in a broader question: in a world where it now seems more generally accepted to be on Facebook than not to be on, what’s it like to opt out? Since July, I haven’t felt like I need Facebook socially, but there is plenty I’m missing out on. During the many times when funny Facebook photos from parties or nights out come up when hanging out with friends, I feel like the only kid on the schoolyard without a TV, lost at sea while other kids recite lines from The Simpsons. I also frequently find myself playing catch-up when someone brings up an article someone else shared on Facebook. And there’s a whole world of flirting and getting-to-know-you that no longer exists for me. I miss the definite ease of communication with friends and acquaintances. I’ve used Facebook before to find sources for articles too, but no longer can. So, now my avenues of communication are more segmented: Twitter to keep in touch with some friends, mostly those I’ve met through work, and find cool articles people recommend; LinkedIn to organize my professional contacts; and old-fashioned phone and email to keep up and make plans with close friends. But it’s what I’ve actually enjoyed about being off Facebook that has surprised me most. I spend less time on my computer without Facebook’s source of infinite content. During real life experiences, what is or isn’t worth sharing on Facebook no longer lingers in the back of my mind, so I spend more time simply enjoying the present. In the final analysis, what my little experiment has shown me is that Facebook has become so ingrained in human life that it’s kind of like religion in a way. You can partake or not partake as much as you like, but the thing itself isn’t going anywhere. Your choice won’t change anything in the bigger picture, but I’ve found it fascinating to explore the differences in my own life. After several months, I’m going to keep the experiment going. It’s been fun to be deactivated, but I’m not going to delete. I’ll be back one day. But for now, I’m enjoying my life offline. 33 Resource B I was intrigued by a poet whose poetry I had difficulty understanding, the film ‘The Edge of love’ inspired me to research who Dylan Thomas was and find some reasons of why he was able to write such unusual poetry. Who was this Poet? Dylan Thomas Dylan Thomas was born on October 14, 1914, in Upland, Swansea. His father, David John Thomas taught English at Swansea Grammar School. His father, quick tempered and intimidating had a beautiful, sonorous voice for reading aloud (which Dylan inherited). Florence Hannah Williams, Thomas’s mother, was a tailor before she was married. Thomas was a troublesome child. He stole money from his mother’s purse, and lied about it. From 1925-1931 ,he attended Swansea grammar school, until he became aggressive and rebellious. In 1931 seventeen year old Dylan Thomas left school and became a reporter on the South Wales Evening Post, although he was not successful. He reported a lacrosse game once, except that he was in a pub and the game had been cancelled! He was later fired. He began drinking around the age of fifteen. He would sneak into pubs with a friend. He later entered amateur dramatics. In 1933, Thomas began publishing some of his poetry. He submitted a poem to a BBC competition, and it was read on the air. During 1934, he moved to London, where alcohol took over his life. While he was in London, Thomas published his first volume of 18 Poems. This was his first taste of success. Three years after living in London he met his future wife, Caitlin Macnamara. Thomas’s first broadcast was in 1937 for the BBC. His job was to read other poets’ work on the air. He began to read his own works with the company of well-known poets like Auden and Spencer. When World War II began, Thomas was worried that he would be drafted; fortunate for him he was judged medically unfit. Some of his neighbours thought that he was a “conchie” (conscientious objector) and was often attacked. For a while he thought that we would have to work in a Mauritius factory. Thomas said, “deary me, I’d rather be a poet any day and live on guile and beer.” Instead, he worked in a documentary film unit. During 1943, he began his career in freelance broadcasts on national radio. His voice was perfect. Being short of funds, Thomas always asked for his money in cash and in advance. In 1946, Thomas’ poem, Deaths and Entrances was a success for him. Soon he began touring though the United States. He was spending a lot of money on alcohol, was fired, and asked to moderate his lifestyle. The number of people who showed up for his tour confirmed his reputation as a charismatic leader of poetry that was charming but disruptive. Thomas was a heavy drunk, and on his last show in the U.S., he collapsed with alcohol poisoning, dying shortly after being taken to hospital in New York. He was thirty-six years old. In order tom understand Thomas’ poetry you have to understand his religious background. Karl Shapiro says that it is essential to know Thomas’ religious beliefs; otherwise you do not know what Thomas’ thoughts are reflecting on or from where they are coming. An example of his religious poetry is the poem Incarnate Devil. It is about the Garden of Eden, and the 34 snake, representing the devil, trying to persuade a man to eat the forbidden fruit. The fruit is god in disguise, and he comes from this fruit and turns into a fiddling warden. This poem has biblical influence including the Garden of Eden. Thomas could not have been inspired from anything but religion when he wrote this poem. Thomas’ welsh background was a direct influence on his poems. When he moved from Wales, he realized that his poetry was strongly affected by his welsh culture. In a note with his Collected Poems, he writes: I read somewhere of a shepherd who, when asked why he made, from within fairy rings, ritual observances to the moon to protect his flocks, replied: “I’d be a damn fool, if I didn’t!” These poems, with all their crudities, doubts and confusions, are written for the love of Man and in praise of God and I’d be a damn fool if they weren’t. The poem, Today, This Insect was written while Thomas was living in Whales, inspired from his welsh experiences, and his Welsh background. Today, This Insect is about an insect and his loss of ability to write. It says that his thoughts are not producing any sense and this is resulting in the destruction of Genesis and Eden. The insect feels he is a monster and is being destroyed by his feelings, or thoughts. This poem is also about Thomas being an alcoholic. He came to terms in this poem, saying that his alcoholism is blocking his thoughts and he is destroying his Welsh religion. This is stated when he talks about the destruction of Genesis and Eden. The “monster” is himself when he is under the influence, and this is when he destroys himself. Thomas’ poem, On a Wedding Anniversary, shows the relationship of a man and a woman, and how in spite of their love for each other, it is no longer lasting. He showed this with the description of a gloomy, stormy day, and described the closing of doors, which was symbolic of the lives of these two people. In another poem, The Tombstone Told When She Died, the death of a woman brings such pain to her true love that he spends his life thinking of her suicide and how he hurt her. He goes back to her grave, kisses death on the lips and joins his love. Thomas’ poems express great love and what people would do for each other. They are not all confusing and hard to understand, but great descriptions of what has gone on in the lives of many characters. 35