This disclosure relates to the field of systems and methods configured to process user interaction events across a platform of systems and learning resources to generate performance metrics for items responses generated by a groups of users.
The present invention provides systems and methods comprising one or more server hardware computing devices or client hardware computing devices, communicatively coupled to a network, and each comprising at least one processor executing specific computer-executable instructions within a memory.
An embodiment of the present invention includes a system including an analytics storage database and a plurality of computer servers. Each computer server of the plurality of computer servers implements a learning resource. Each learning resource is configured to monitor user interactions with the learning resource, and encode, based on the user interactions, user events, each user event including identifications of the user generating the user event, an assessment item, and the learning resource and including an indication of whether the user event is associated with a correct answer or an incorrect answer. The system includes a computer server implementing an event processor. The event processor is configured to receive, from the plurality of computer servers, a plurality of user events, and, for each user event parse each received user event to determine the identifications of the user generating the user event, the assessment item, and the learning resource, and the indication of whether the user event is associated with a correct answer or an incorrect answer. The events processor is configured to store, in the analytics storage database, a data record including the identification of the user generating the user event, the assessment item, the learning resource, and the indication of whether the user event is associated with a correct answer or an incorrect answer, receive, from a first learning resource, a request to generate an analytics report, determine, from the request, a first assessment item, retrieve, from the analytics storage database, a first set of data records associated with the first assessment item, determine a percentage of data records in the first set of data records associated with a correct answer, determine that the percentage of data records falls below a threshold percentage, and transmit to the first learning resource a report indicating that the first assessment item is associated with a challenging content.
Another embodiment includes a system including a computer server implementing a learning resource configured to monitor a user interaction with the learning resource, and encode, based on the user interactions, a user event including identifications of the user generating the user event, an assessment item, and the learning resource and including an indication of whether the user event is associated with a correct answer or an incorrect answer. The system includes a computer server implementing an event processor. The event processor is configured to receive, from the computer server, the user event, parse the user event to determine the identifications of the user generating the user event, the assessment item, and the learning resource, and the indication of whether the user event is associated with a correct answer or an incorrect answer, and store, in an analytics storage database, a data record including the identification of the user generating the user event, the assessment item, the learning resource, and the indication of whether the user event is associated with a correct answer or an incorrect answer.
An embodiment includes a method including receiving, from a learning resource, a user event, parsing the user event to determine identifications of the user generating the user event, an assessment item, and a learning resource, and an indication of whether the user event is associated with a correct answer or an incorrect answer, and storing, in an analytics storage database, a data record including the identification of the user generating the user event, the assessment item, the learning resource, and the indication of whether the user event is associated with a correct answer or an incorrect answer.
The present invention will now be discussed in detail with regard to the attached drawing figures that were briefly described above. In the following description, numerous specific details are set forth illustrating the Applicant's best mode for practicing the invention and enabling one of ordinary skill in the art to make and use the invention. It will be obvious, however, to one skilled in the art that the present invention may be practiced without many of these specific details. In other instances, well-known machines, structures, and method steps have not been described in particular detail in order to avoid unnecessarily obscuring the present invention. Unless otherwise indicated, like parts and method steps are referred to with like reference numerals.
In an embodiment, the present system and method is configured to assist instructors, learners, operators, and administrators to identify academic problem areas across educational experiences in a number of different platforms. Education participants may not have the time to analyze analytics about themselves or their content in order to arrive at a decision of what is the next best learning activity they can do in order to advance their academic goals. This may result in knowledge gaps where students or learners are struggling with content but teachers and learning platforms are unaware that students are finding particular content or assessments challenging and so may not provide adequate remediation.
Many of the current approaches to solving this problem entail showing all of the content (chapters, sections, modules, assessments, etc.) with various learning analytics associated with each object and then requiring the learner or instructor to interact with the learning analytics in the context of their content in order to analyze and decide where they should spend their time.
In the present system, as users (also referred to herein as learners) interact with items in assessments across collections of educational experiences their interactions—to the extent the interactions embody answers to assessment questions—include details (e.g., specific item selections and data entries) and an identification of the correctness on the given item (i.e., whether answer was a “correct answer” or an “incorrect answer”) are provided as events to a near real time event data stream. The data stream is communicated to a challenging content data processing system that captures and interrogates those activity events and calculates an average ‘correct on first try’ percent per item and an average ‘correct on first try’ per assessment using the item correct first try statistics. In this manner all items and assessments are given scores which can then be used to rank items and/or assessments when presenting to consumers.
The present system may be implemented in an environment in which multiple different educational resources provide different learning experiences. Such different learning resources may implement evaluations differently within varied educational content hierarchies. In such a diverse resource environment, conventional solutions would require each learning resource to implement its own unique systems and algorithms for surfacing content that may present particular difficulties for users. Using the present system, however, the multiple, different learning resources, are only required to transmit user events to the data stream for processing. The events are then analyzed by the challenging content data processing system, which generates identifications of potentially challenging assessment items or concepts that are then communicated back to the various learning resources in a manner that enables the resources to take appropriate action with the data received from the challenging content data processing system.
In this manner, the present challenging content data processing system operates as a centralized “clearinghouse” for all user events generated by users in a number of disparate learning resources. The challenging content data processing system is configured to process the events to generate unique challenging data reports that are consumable by each of the various learning resources.
Specifically, the present system is enabled through separation of a micro-services layer within the challenging content data processing system that provides the raw calculations and ranking of all content from the analytics experience aggregation layer which provides the filtering of content to a specific experience's content ranking requirements such as: aggregation level (chapter, section, module, assessment), cohort or individual learner's aggregation context (learner challenging items, and threshold setting to return only items above a given rank score for the given experience. The unique analytics experience aggregation layer is therefore configured to generate outputs usable by the various resources or product models interacting with the challenging content data processing system.
Server 102, client 106, and any other disclosed devices may be communicatively coupled via one or more communication networks 120. Communication network 120 may be any type of network known in the art supporting data communications. As non-limiting examples, network 120 may be a local area network (LAN; e.g., Ethernet, Token-Ring, etc.), a wide-area network (e.g., the Internet), an infrared or wireless network, a public switched telephone networks (PSTNs), a virtual network, etc. Network 120 may use any available protocols, such as (e.g., transmission control protocol/Internet protocol (TCP/IP), systems network architecture (SNA), Internet packet exchange (IPX), Secure Sockets Layer (SSL), Transport Layer Security (TLS), Hypertext Transfer Protocol (HTTP), Secure Hypertext Transfer Protocol (HTTPS), Institute of Electrical and Electronics (IEEE) 802.11 protocol suite or other wireless protocols, and the like.
The embodiments shown in
As shown in
As non-limiting examples, these security components 108 may comprise dedicated hardware, specialized networking components, and/or software (e.g., web servers, authentication servers, firewalls, routers, gateways, load balancers, etc.) within one or more data centers in one or more physical location and/or operated by one or more entities, and/or may be operated within a cloud infrastructure.
In various implementations, security and integration components 108 may transmit data between the various devices in the content distribution network 100. Security and integration components 108 also may use secure data transmission protocols and/or encryption (e.g., File Transfer Protocol (FTP), Secure File Transfer Protocol (SFTP), and/or Pretty Good Privacy (PGP) encryption) for data transfers, etc.).
In some embodiments, the security and integration components 108 may implement one or more web services (e.g., cross-domain and/or cross-platform web services) within the content distribution network 100, and may be developed for enterprise use in accordance with various web service standards (e.g., the Web Service Interoperability (WS-I) guidelines). For example, some web services may provide secure connections, authentication, and/or confidentiality throughout the network using technologies such as SSL, TLS, HTTP, HTTPS, WS-Security standard (providing secure SOAP messages using XML, encryption), etc. In other examples, the security and integration components 108 may include specialized hardware, network appliances, and the like (e.g., hardware-accelerated SSL and HTTPS), possibly installed and configured between servers 102 and other network components, for providing secure web services, thereby allowing any external devices to communicate directly with the specialized hardware, network appliances, etc.
Computing environment 100 also may include one or more data stores 110, possibly including and/or residing on one or more back-end servers 112, operating in one or more data centers in one or more physical locations, and communicating with one or more other devices within one or more networks 120. In some cases, one or more data stores 110 may reside on a non-transitory storage medium within the server 102. In certain embodiments, data stores 110 and back-end servers 112 may reside in a storage-area network (SAN). Access to the data stores may be limited or denied based on the processes, user credentials, and/or devices attempting to interact with the data store.
With reference now to
One or more processing units 204 may be implemented as one or more integrated circuits (e.g., a conventional micro-processor or microcontroller), and controls the operation of computer system 200. These processors may include single core and/or multicore (e.g., quad core, hexa-core, octo-core, ten-core, etc.) processors and processor caches. These processors 204 may execute a variety of resident software processes embodied in program code, and may maintain multiple concurrently executing programs or processes. Processor(s) 204 may also include one or more specialized processors, (e.g., digital signal processors (DSPs), outboard, graphics application-specific, and/or other processors).
Bus subsystem 202 provides a mechanism for intended communication between the various components and subsystems of computer system 200. Although bus subsystem 202 is shown schematically as a single bus, alternative embodiments of the bus subsystem may utilize multiple buses. Bus subsystem 202 may include a memory bus, memory controller, peripheral bus, and/or local bus using any of a variety of bus architectures (e.g. Industry Standard Architecture (ISA), Micro Channel Architecture (MCA), Enhanced ISA (EISA), Video Electronics Standards Association (VESA), and/or Peripheral Component Interconnect (PCI) bus, possibly implemented as a Mezzanine bus manufactured to the IEEE P1386.1 standard).
I/O subsystem 226 may include device controllers 228 for one or more user interface input devices and/or user interface output devices, possibly integrated with the computer system 200 (e.g., integrated audio/video systems, and/or touchscreen displays), or may be separate peripheral devices which are attachable/detachable from the computer system 200. Input may include keyboard or mouse input, audio input (e.g., spoken commands), motion sensing, gesture recognition (e.g., eye gestures), etc.
As non-limiting examples, input devices may include a keyboard, pointing devices (e.g., mouse, trackball, and associated input), touchpads, touch screens, scroll wheels, click wheels, dials, buttons, switches, keypad, audio input devices, voice command recognition systems, microphones, three dimensional (3D) mice, joysticks, pointing sticks, gamepads, graphic tablets, speakers, digital cameras, digital camcorders, portable media players, webcams, image scanners, fingerprint scanners, barcode readers, 3D scanners, 3D printers, laser rangefinders, eye gaze tracking devices, medical imaging input devices, MIDI keyboards, digital musical instruments, and the like.
In general, use of the term “output device” is intended to include all possible types of devices and mechanisms for outputting information from computer system 200 to a user or other computer. For example, output devices may include one or more display subsystems and/or display devices that visually convey text, graphics and audio/video information (e.g., cathode ray tube (CRT) displays, flat-panel devices, liquid crystal display (LCD) or plasma display devices, projection devices, touch screens, etc.), and/or non-visual displays such as audio output devices, etc. As non-limiting examples, output devices may include, indicator lights, monitors, printers, speakers, headphones, automotive navigation systems, plotters, voice output devices, modems, etc.
Computer system 200 may comprise one or more storage subsystems 210, comprising hardware and software components used for storing data and program instructions, such as system memory 218 and computer-readable storage media 216.
System memory 218 and/or computer-readable storage media 216 may store program instructions that are loadable and executable on processor(s) 204. For example, system memory 218 may load and execute an operating system 224, program data 222, server applications, client applications 220, Internet browsers, mid-tier applications, etc.
System memory 218 may further store data generated during execution of these instructions. System memory 218 may be stored in volatile memory (e.g., random access memory (RAM) 212, including static random access memory (SRAM) or dynamic random access memory (DRAM)). RAM 212 may contain data and/or program modules that are immediately accessible to and/or operated and executed by processing units 204.
System memory 218 may also be stored in non-volatile storage drives 214 (e.g., read-only memory (ROM), flash memory, etc.) For example, a basic input/output system (BIOS), containing the basic routines that help to transfer information between elements within computer system 200 (e.g., during start-up) may typically be stored in the non-volatile storage drives 214.
Storage subsystem 210 also may include one or more tangible computer-readable storage media 216 for storing the basic programming and data constructs that provide the functionality of some embodiments. For example, storage subsystem 210 may include software, programs, code modules, instructions, etc., that may be executed by a processor 204, in order to provide the functionality described herein. Data generated from the executed software, programs, code, modules, or instructions may be stored within a data storage repository within storage sub system 210.
Storage subsystem 210 may also include a computer-readable storage media reader connected to computer-readable storage media 216. Computer-readable storage media 216 may contain program code, or portions of program code. Together and, optionally, in combination with system memory 218, computer-readable storage media 216 may comprehensively represent remote, local, fixed, and/or removable storage devices plus storage media for temporarily and/or more permanently containing, storing, transmitting, and retrieving computer-readable information.
Computer-readable storage media 216 may include any appropriate media known or used in the art, including storage media and communication media, such as but not limited to, volatile and non-volatile, removable and non-removable media implemented in any method or technology for storage and/or transmission of information. This can include tangible computer-readable storage media such as RAM, ROM, electronically erasable programmable ROM (EEPROM), flash memory or other memory technology, CD-ROM, digital versatile disk (DVD), or other optical storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or other tangible computer readable media. This can also include nontangible computer-readable media, such as data signals, data transmissions, or any other medium which can be used to transmit the desired information and which can be accessed by computer system 200.
By way of example, computer-readable storage media 216 may include a hard disk drive that reads from or writes to non-removable, nonvolatile magnetic media, a magnetic disk drive that reads from or writes to a removable, nonvolatile magnetic disk, and an optical disk drive that reads from or writes to a removable, nonvolatile optical disk such as a CD ROM, DVD, and Blu-Ray® disk, or other optical media. Computer-readable storage media 216 may include, but is not limited to, Zip® drives, flash memory cards, universal serial bus (USB) flash drives, secure digital (SD) cards, DVD disks, digital video tape, and the like. Computer-readable storage media 216 may also include, solid-state drives (SSD) based on non-volatile memory such as flash-memory based SSDs, enterprise flash drives, solid state ROM, and the like, SSDs based on volatile memory such as solid state RAM, dynamic RAM, static RAM, DRAM-based SSDs, magneto-resistive RAM (MRAM) SSDs, and hybrid SSDs that use a combination of DRAM and flash memory based SSDs. The disk drives and their associated computer-readable media may provide non-volatile storage of computer-readable instructions, data structures, program modules, and other data for computer system 200.
Communications subsystem 232 may provide a communication interface from computer system 200 and external computing devices via one or more communication networks, including local area networks (LANs), wide area networks (WANs) (e.g., the Internet), and various wireless telecommunications networks. As illustrated in
In some embodiments, communications subsystem 232 may also receive input communication in the form of structured and/or unstructured data feeds, event streams, event updates, and the like, on behalf of one or more users who may use or access computer system 200. For example, communications subsystem 232 may be configured to receive data feeds in real-time from users of social networks and/or other communication services, web feeds such as Rich Site Summary (RSS) feeds, and/or real-time updates from one or more third party information sources (e.g., data aggregators). Additionally, communications subsystem 232 may be configured to receive data in the form of continuous data streams, which may include event streams of real-time events and/or event updates (e.g., sensor data applications, financial tickers, network performance measuring tools, clickstream analysis tools, automobile traffic monitoring, etc.). Communications subsystem 232 may output such structured and/or unstructured data feeds, event streams, event updates, and the like to one or more data stores that may be in communication with one or more streaming data source computers coupled to computer system 200.
The various physical components of the communications subsystem 232 may be detachable components coupled to the computer system 200 via a computer network, a FireWire® bus, or the like, and/or may be physically integrated onto a motherboard of the computer system 200. Communications subsystem 232 also may be implemented in whole or in part by software.
Due to the ever-changing nature of computers and networks, the description of computer system 200 depicted in the figure is intended only as a specific example. Many other configurations having more or fewer components than the system depicted in the figure are possible. For example, customized hardware might also be used and/or particular elements might be implemented in hardware, firmware, software, or a combination. Further, connection to other computing devices, such as network input/output devices, may be employed. Based on the disclosure and teachings provided herein, a person of ordinary skill in the art will appreciate other ways and/or methods to implement the various embodiments.
As disclosed in more detail below, the present system may process a data stream encoding descriptions of user events occurring within various learning resource systems (e.g., software applications configured to deliver content and learning assessments to a number of users and receive responses thereto). As described herein, these events are processed by a processing system to generate analytics data for user assessments across a number of different learning resources. In embodiments, these user actions are processed in real-time or near real-time.
Learning resources 304 are typically software applications or learning activities configured to interact with users (learners) to both provide educational content to the users and also deliver assessments to the users. The educational content may be in any suitable form such as written text, multimedia, simulations, and the like. Assessments are generally delivered to users by learning resources 304 in the form of a prompt (e.g., a written question or multimedia depicting a prompt) to which the user provides an input that is received as a response.
When using a learning resource 304, users typically connect to computer servers 302 using a user device (e.g., a laptop computer, desktop computer, tablet, mobile device, or the like) via a suitable network connection. Learning resources 304 deliver educational content and assessments to the user's device through the network connection.
As the user navigates through the various content and prompts delivered by a learning resource 304 (e.g., typically through a software application running on the user's device such as a web browser), the user executes particular actions with the learning resource 304 to interact with the provided content and assessments. The interactions may involve the user executing particular actions within the learning resource 304 thereby causing user events. Actions may involve the user, first, logging into a particular learning resource 304 to gain access to the resource. Other actions may include the user requesting to view particular learning content (e.g., by clicking on a request content link displayed on the user's device), scrolling through learning content, playing or pausing a multimedia content delivered by the learning resource 304, and the like. Events, which include all actions, could also include the user being idle for a particular amount of time within a user resource, or viewing a particular portion of a multimedia content or assessment. Assessment responses may also be user events. When a user logs out of a learning resource 304, that may still further be recorded as an event within the learning resource 304.
The various events a user may trigger within a learning resource 304 (e.g. by undertaking particular actions within the learning resource) may provide information regarding how users are interacting with learning content and assessments. Such information can be analyzed, for example, to determine a level of user engagement with the learning content, which can be mined or analyzed to determine which content requires modification, for example. The actions could further be analyzed to determine how much time users are spending reviewing particular elements of learning content or performing assessments, all of which could be utilized to refine and improve work assignments provided to users via a particular learning resource 304. And, additionally, the user events (particularly those in the form of assessment response actions) could be analyzed to identify problematic assessment content being generated by particular learning resources.
Rather than each learning resource 304 being required to implement their own analytics engines to process user events occurring within their platforms, the present system provides a centralized event processor 306 configured to parse and evaluate user events received from a number of different learning resources 304 to generate analytic reports that are consumable by each learning resource 304 separately.
During operation, therefore, the various learning resources 304 in environment 300 are configured to transmit all received user events to event processor 306. Specifically, the user event are transmitted to event queue intake 308, which is a data stream configured to transmit received event through event processor 306 for analysis. To provide a backup of user events passing through event processor 306, event queue intake 308 is configured to store duplicates of all received user events in event storage database 307.
Event processor 306 may be implemented as any suitable computer system (including single processor, multiprocessor, or distributed computing systems) for implementing software applications for processing and analyzing user event data from each of learning resources 304. Specifically, event processor 306 can include a number of different analytics modules 310a-310d for processing and analyzing received user event details. Different analytics modules 310 may be configured to determine a level of user engagement with particular types of content based on received user events, provide an analysis of how often users log into a particular learning resource 304 based on received user events, evaluate learning growth in particular students across a single learning resource 304 or multiple learning resources 304 based on received user events, and the like.
In the present embodiment, analytics module 310a is configured to analyze user events in different learning resources 304 to identify assessment content that is challenging or difficult for users.
To enable the operation of the various analytics modules 310, event processor 306 is configured to route all user events received via queue intake 308 to sorting entity 312.
Sorting entity 312 is a software module that stores a look-up table that identifies, for each analytics module 310 implemented by event processor 306, which user event types the analytics module 310 requires to operate. For example, an analytics module that determines how long user stay logged in to particular learning resources 304 may require access to all user events received from queue intake 308 that involve user logon or user logoff actions (in addition to others).
In the specific case of challenging content analytics module 310a, sorting entity 312 is configured to pass all user events involving responses to assessments received from queue intake 308 to challenging content analytics module 310a. User events involving assessment or assessment item responses (i.e., the user events that should be processed for challenging content) may be identified and distinguished from other user events (e.g., page scrolls or login/logout activity) can be identified by analyzing the user events for specific headers or encoding information, or for looking for user events containing certain data entries indicating that the user event is associated with an assessment response. For example, user events encoded to make certain predetermined schemas associated with assessment items responses may be identified by the sorting entity 312 to transmit those user events to challenging content analytics module 310a
To sort each received user event, sorting entity 312 is configured to inspect the data encoded within each user event to identify a user event type. Based upon the type, sorting entity 312 routes the user event to the one or more modules 310 that are configured to process and analyze user events of that type.
To illustrate, in an embodiment the structure of a user event associated with the complete of an assessment response may include a data packet encoded to store data values according to the information depicted in Table 1, below.
Upon receipt of a user event associated with a response to an assessment item from sorting entity 312, challenging content analytics module 310a is configured to parse the data identified in Table 1, above, and store the parsed data in a data record in an analytics storage database 314. The process of receiving, processing, and storing data encoded within an user event is further described and illustrated in
Specifically, event processor 306 includes an analytics report engine 316. Upon receipt of a request 318 for a challenging content report, event processor 306 is configured to parse the request to identify the requirement for the report, access the analytics storage database 314 to retrieve the data necessary to generate the report, compile the report, and transmit the report to the requesting learning resource 304. In some embodiments, a duplicate of the report may be stored in report stage database 351 enabling future comparisons with historically-generated report or comparisons of new approaches for identifying challenging content with historical approaches. Detail of this process is illustrated in
After receipt of the user event, in step 404 the user event is parsed to identify the data values corresponding to those defined in Table 1, above. Specifically, the user event is parsed to identify all data values identified in Table 1, above, including at least an Item_id, an Assessment_id, a Class_id, a User_id, a Date-Time, an Answer_id, a Correct-Status, and a Resource-ID associated with the user event.
Once parsed, the values identified in the user event (including all items defined in Table 1, above, and not limited to Item_id, the Assessment_id, the Class_id, the User_id, the Date-Time, the Answer_id, the Correct-Status, and the Resource-ID) are stored in an analytics data database (e.g., analytics storage 314).
In step 502 a request to generate a challenging content report is received. The report may be received from a learning resource (e.g., one of learning resources 304) of
For example, a particular request may identify a specific assessment item (e.g., a quiz question) to be evaluated, a particular assessment (e.g., a quiz or test) that contains or is associated with a number of different assessment items for which challenging content is to be identified, a particular class (e.g., associated with a particular set of users) for which the identified assessment items are to be evaluated for challenging content, a particular date range over which the identified assessment items are to be evaluated for challenging content, and the like.
If a particular assessment item is utilized by a number of different learning resources across a number of different assessments occurring in different classes, the report may be generated across all instances of the assessment ID across different learning resources and platforms. In that case a challenging content evaluation or repot may be generated based upon all uses of the assessment item regarding of which learning resource or platform the assessment appears in. In other cases, however, the request may constrain the report so as to only include an analysis of the assessment item for a particular class or group of students, for example.
Similarly, the request may constrain the results to be analyzed (and the ultimate report generated) to instances of responses to the assessment item or collection of items for users belonging to a particular organization (e.g., using the Organization-ID value from the stored user event data). This enables an analysis of challenging content for a group of employees belong to the same company, for example, or students attending the same school or university. In some cases, a number of different organizations could be included in the request enabling challenging content to be analyzed, for example, for a group of universities.
In a similar manner, the request may constrain the results to be analyzed (and the ultimate report generated) to instances of responses to the assessment item or collection of items for users belonging to a particular type of user, such as research assistants, employees, students, student athletes, etc. (e.g., using the Role-ID value from the stored user event data). This enables an analysis of challenging content for a group of users belonging to the same class or type of user. In some cases, a number of different user types could be included in the request enabling challenging content to be analyzed, for example, for a group of student athletes.
In some cases, the request may constrain the results to a particular geographical region (e.g., results for users in a particular state or geographical region), or across an entire country or group of countries.
Given the constraints identified in the request received in step 502, in step 504 a repository of analytics data (e.g., analytics storage database 314) is accessed to retrieve data associated with user events associated with assessment items matching or in accordance with the constraints that were defined in the received request.
In some embodiments, this data is filtered so that only a first user event involving the specific assessment item is retrieved and later user events associated with the same assessment item are filtered from (or otherwise removed from or deleted from) the data retrieved in step 504. This may involve only retaining, for each user_id contained within the set of analytics data retrieved in step 504 only the earliest user event associated with each assessment item (as identified by the date/time stamp associated with each user event). Later (as determined by the date/time stamp values) second, third, or greater user events contained within the data set may be discarded. In this manner, the data retrieved in step 504 (and filtered to remove users' subsequent user interactions with assessment items) may only include “first attempt” values. As such, the analytic report generate in accordance with method 500 will not include an analysis of second guesses or corrected answers.
In step 506, a first assessment item in the data retrieved in step 504 is identified. If the request originally received in step 502 identified a single assessment item for the generation of a challenging content report, the data retrieved in step 504 may only include data for that single assessment item.
If, however, the request identified a plurality of assessment items, the data retrieved in step 504 may include data for a number of different assessment items. For example, if the original request only identified a particular assessment (e.g., a quiz or test) for which the challenging content report was to be generated, the data retrieved in step 504 may include data for all assessment items contained within the identified assessment. If that is the case, method 500 operates to analyze the data associated with each assessment item separately.
Accordingly, in step 506 a first assessment item in the retrieved data is identified. With the first assessment item identified, in step 508 the assessment item is evaluated to determine the assessment item qualifies as challenging content. Any suitable evaluation method may be utilized. In an embodiment, the data associated with the item can be evaluated to determine a percentage of first-time user events for the assessment item are associated with a correct response (as identified by the Correct-Status tag). If the percentage of first-time user events for the assessment item that are associated with a correct response falls below a threshold (e.g., a predefined threshold percentage of 70%) the assessment item may be tagged as challenging content.
Alternatively, for assessment items that receive a real score, the data associated with the item can be evaluated to determine a percentage of first-time user events for the assessment item having achieved a score (e.g., Assessment_item_response score or Assessment_item_response score_adj) that exceeds a predetermined score threshold (different score thresholds may be defined for different learning domains). If the percentage of first-time user events for the assessment item that have scores exceeding the predetermined score threshold falls below a threshold (e.g., a predefined threshold percentage of 70%) the assessment item may be tagged as challenging content.
For assessment items having multiple sub-parts, the analysis could further involve determining for each sub-part whether a percentage of first-time user events for each assessment item sub-part has achieved a score (e.g., Assessment_item_part_response score or Assessment_item_part_response score_adj) that exceeds a predetermined score threshold (different score thresholds may be defined for different learning domains). If the percentage of first-time user events for the assessment item that have sub-part scores exceeding the predetermined score threshold falls below a threshold (e.g., a predefined threshold percentage of 70%) the assessment item may be tagged as challenging content.
In other embodiments, the threshold may be determined based upon historical performance of users undertaking the assessment item. For example, if, historically, an assessment item is answered correctly 80% of the time, the assessment item may be designated as challenging if the first-time user events for the assessment item that are associated with a correct response falls below 15% below that historical average value (in this example, 65%), the assessment item may be designated as challenging. In this case, the historical average value may be determined based upon all responses to the assessment item for all time, or for responses over a designated time frame (e.g., the historical average for the last two years).
With the assessment item evaluated in step 508, in step 510 it is determined whether additional assessment items are in the data retrieved in step 504. If not, the method proceeds to step 512 where a report is stored (e.g., in report storage database 351) and generated that indicates whether the assessment item evaluated in step 508 is tagged as challenging content. The report can then be transmitted to the learning resource from the request of step 502 was received.
By storing reports in step 512, a number of reports could be generated to identify challenging content using different sets of constraints or evaluation algorithms. The reports stored in report storage database 351 can then be compared to one another to optimize report generation algorithms on a go-forward basis.
If, however, in step 510 it is determined that additional assessment items are included in the data retrieved in step 504, the method moves to step 514 where a next assessment item is selected and method step 508 is repeated for the next assessment item to determine whether that assessment item is tagged as challenging content.
After all assessment items contained within the data retrieved in step 502 have been processed and evaluated, the method proceeds to step 512 to generate a report identifying each assessment item evaluated and an indication of whether the assessment items are tagged as challenging content. The report, once generated, is transmitted to the learning resource that generating the request of step 502.
Upon receipt of the reports generated by method 500, the learning resources can use the reports to generate informative reports to help users of the learning resource to identify challenging content. This could involve, for example, providing a dashboard for a teacher or other administrative user (e.g., an operator) of the learning resource to identify assessment items contained within a particular lesson segment that are designated as challenging. This information could be useful for a teacher or administrative user to designate additional learning material for users to review to enhance learning on the content associated with the challenging assessment items.
In a similar manner, learning resources can use the reports generated by method 500 to provide useful information for users of the learning resource. If the user is a student, for example, a learning resource could use the report to provide helpful information helping the student to identify challenging content enabling the student to spend more time studying material related to that challenging content.
To illustrate,
When selecting the November 17th assignment, the dashboard can provide a pop-up 608 as shown in
The present disclosure contemplates that a number of different approaches may be utilized to score assessment items (e.g., to generate the values “Assessment_item_response score”, “Assessment_item_response score_adj”, “Assessment_item_part_response score”, “Assessment_item_part_response score_adj”, and “Assessmen_item_response pass_fail”) contained in the corresponding user event) once completed by a user. To illustrate,
In category 704, the response is a response type enabling automated analysis and scoring of the response. Such response types may include multiple choice answer responses, or responses in which typed strings (e.g., a typed number or word) can be evaluated for correctness automatically. Responses belonging to that category are transmitted to an automated or systematic correctness evaluator 706, which is configured to apply an automated evaluation algorithm to the user's response to generate a score. That score, once generated, can be incorporated into the user event generated based upon the user 702's response and transmitted to data pipeline 708 (e.g., event processor 306) for processing.
In category 710, the response is a response type enabling partially automated analysis and scoring of the response. Such response types may include essay responses that can be evaluated, to some degree, automatically for scoring, but may require further human scoring to ensure the user's response is properly evaluated. In that case, responses belonging to that category are transmitted to automated or systematic correctness evaluator 706, which is configured to apply an automated evaluation algorithm to the user's response to generate a score and manual scoring evaluator 712 to perform manual scoring. The manual scoring may involve the manual scorer modifying or adjusting the score generated by systematic correctness evaluator 706 to generate an adjusted score (e.g., “Assessment_item_response score_adj” or “Assessment_item_part_response score_adj”) that, once generated, can be incorporated into the user event generated based upon the user 702's response and transmitted to data pipeline 708 (e.g., event processor 306) for processing.
In category 714, the response is a response type requiring manual scoring. Such response types may include composite activities (e.g., comprehensive essay responses) that cannot be evaluated automatically. Responses belonging to that category are transmitted to a manual scoring evaluator 712 to perform manual scoring. Once generated, the score can be incorporated into the user event generated based upon the user 702's response and transmitted to data pipeline 708 (e.g., event processor 306) for processing.
Other embodiments and uses of the above inventions will be apparent to those having ordinary skill in the art upon consideration of the specification and practice of the invention disclosed herein. The specification and examples given should be considered exemplary only, and it is contemplated that the appended claims will cover any other such embodiments or modifications as fall within the true scope of the invention.
The Abstract accompanying this specification is provided to enable the United States Patent and Trademark Office and the public generally to determine quickly from a cursory inspection the nature and gist of the technical disclosure and in no way intended for defining, determining, or limiting the present invention or any of its embodiments.