Lecture in PhD Programme Life Science Education Research UMCU. Course Methods of Life Science Education Research. Utrecht, The Netherlands. abstract Audit trail procedures are applied as a way to check the validity of qualitative research designs, qualitative analyses, and the claims that are made. Audit trail procedures can be conducted based on the three criteria of visibility, comprehensibility, and acceptability (Akkerman et al., 2008). During an audit trail procedure, all documents and materials resulting from the data gathering and the data analysis are assessed by an auditor. In this presentation, we presented a summative audit trail procedure (Agricola, Prins, Van der Schaaf & Van Tartwijk, 2021), whereas in a second study we used a formative one (Agricola, Van der Schaaf, Prins & Van Tartwijk, 2022). For both studies, two different auditors were chosen. For the study presented in Agricola et al. (2021) the auditor was one of the PhD supervisors, while in that presented Agricola et al. (2022) was a junior researcher not involved in the project. The first auditor had a high level of expertise in the study’s topic and methodology. As a result, he was able to provide a professional and critical assessment report. Although the second auditor might be considered to be more objective than the first, as she was not involved in the project, more meetings were needed to explain the aim of the study and the aim of the audit trail procedure. There are many ideas about the criteria that qualitative studies should meet (De Kleijn en Van Leeuwen, 2018). I argue that procedures of checking for interrater agreement and understanding, the triangulation, and audit trail procedures can increase the internal validity of qualitative studies. Agricola, B. T., Prins, F. J., van der Schaaf, M. F., & van Tartwijk, J. (2021). Supervisor and Student Perspectives on Undergraduate Thesis Supervision in Higher Education. Scandinavian Journal of Educational Research, 65(5), 877-897. doi: https://doi.org/10.1080/00313831.2020.1775115 Agricola, B. T., van der Schaaf, M. F., Prins, F. J., & van Tartwijk, J. (2022). The development of research supervisors’ pedagogical content knowledge in a lesson study project. Educational Action Research. doi: https://doi.org/10.1080/09650792.2020.1832551 de Kleijn, R. A. M., & Van Leeuwen, A. (2018). Reflections and review on the audit procedure: Guidelines for more transparency. International Journal of Qualitative Methods, 17(1), 1-8. doi: https://doi.org/10.1177/1609406918763214 Akkerman, S., Admiraal, W., Brekelmans, M., & Oost, H. (2008). Auditing quality of research in social sciences. Quality & Quantity, 42(2), 257-274. doi: https://doi.org/10.1007/s11135-006-9044-4
Cybersecurity threat and incident managers in large organizations, especially in the financial sector, are confronted more and more with an increase in volume and complexity of threats and incidents. At the same time, these managers have to deal with many internal processes and criteria, in addition to requirements from external parties, such as regulators that pose an additional challenge to handling threats and incidents. Little research has been carried out to understand to what extent decision support can aid these professionals in managing threats and incidents. The purpose of this research was to develop decision support for cybersecurity threat and incident managers in the financial sector. To this end, we carried out a cognitive task analysis and the first two phases of a cognitive work analysis, based on two rounds of in-depth interviews with ten professionals from three financial institutions. Our results show that decision support should address the problem of balancing the bigger picture with details. That is, being able to simultaneously keep the broader operational context in mind as well as adequately investigating, containing and remediating a cyberattack. In close consultation with the three financial institutions involved, we developed a critical-thinking memory aid that follows typical incident response process steps, but adds big picture elements and critical thinking steps. This should make cybersecurity threat and incident managers more aware of the broader operational implications of threats and incidents while keeping a critical mindset. Although a summative evaluation was beyond the scope of the present research, we conducted iterative formative evaluations of the memory aid that show its potential.
In programmatic assessment (PA), an arrangement of different assessment methods is deliberately designed across the entire curriculum, combined and planned to support both robust decision-making and student learning. In health sciences education, evidence about the merits and pitfalls of PA is emerging. Although there is consensus about the theoretical principles of PA, programs make diverse design choices based on these principles to implement PA in practice, fitting their own contexts. We therefore need a better understanding of how the PA principles are implemented across contexts—within and beyond health sciences education. In this study, interviews were conducted with teachers/curriculum designers representing nine different programs in diverse professional domains. Research questions focused on: (1) design choices made, (2) whether these design choices adhere to PA principles, (3) student and teacher experiences in practice, and (4) context-specific differences between the programs. A wide range of design choices were reported, largely adhering to PA principles but differing across cases due to contextual alignment. Design choices reported by almost all programs include a backbone of learning outcomes, data-points connected to this backbone in a longitudinal design allowing uptake of feedback, intermediate reflective meetings, and decision-making based on a multitude of data-points made by a committee and involving multi-stage procedures. Contextual design choices were made aligning the design to the professional domain and practical feasibility. Further research is needed in particular with regard to intermediate-stakes decisions.
LINK