“Conceptual Reverse Engineering” of Online Learning Objects and Sequences for Practical Applications

“Conceptual Reverse Engineering” of Online Learning Objects and Sequences for Practical Applications

Copyright: © 2019 |Pages: 16
ISBN13: 9781522575283|ISBN10: 1522575286|ISBN13 Softcover: 9781522587491|EISBN13: 9781522575290
DOI: 10.4018/978-1-5225-7528-3.ch004
Cite Chapter Cite Chapter

MLA

Shalin Hai-Jew. "“Conceptual Reverse Engineering” of Online Learning Objects and Sequences for Practical Applications." Methods for Analyzing and Leveraging Online Learning Data, IGI Global, 2019, pp.73-88. https://doi.org/10.4018/978-1-5225-7528-3.ch004

APA

S. Hai-Jew (2019). “Conceptual Reverse Engineering” of Online Learning Objects and Sequences for Practical Applications. IGI Global. https://doi.org/10.4018/978-1-5225-7528-3.ch004

Chicago

Shalin Hai-Jew. "“Conceptual Reverse Engineering” of Online Learning Objects and Sequences for Practical Applications." In Methods for Analyzing and Leveraging Online Learning Data. Hershey, PA: IGI Global, 2019. https://doi.org/10.4018/978-1-5225-7528-3.ch004

Export Reference

Mendeley
Favorite

Abstract

For instructional designers, one of the early steps in any design involves an environmental scan to see what publicly available online learning objects, sequences, and raw materials exist for the topic. “Conceptual reverse engineering” involves analyzing the online learning objects and sequences to infer how those objects may have been created, what technologies were likely used, the probable learning objectives, the apparent target audience, the prospective costs/inputs, and other factors. This information may be used to understand the state of the art, to inform a competing design methods, to inform the selection of technologies, to budget design and development work, to decide whether or not to adopt available third-party learning objects, and other applications. This chapter describes the creation of the conceptual reverse engineering of online learning objects and sequences (CREOLOS), which includes a step for validating/invalidating the reverse-engineered design.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.