MXPA03004820A - A computerized portfolio and assessment system. - Google Patents

A computerized portfolio and assessment system.

Info

Publication number
MXPA03004820A
MXPA03004820A MXPA03004820A MXPA03004820A MXPA03004820A MX PA03004820 A MXPA03004820 A MX PA03004820A MX PA03004820 A MXPA03004820 A MX PA03004820A MX PA03004820 A MXPA03004820 A MX PA03004820A MX PA03004820 A MXPA03004820 A MX PA03004820A
Authority
MX
Mexico
Prior art keywords
portfolio
user
computer
executable code
folders
Prior art date
Application number
MXPA03004820A
Other languages
Spanish (es)
Inventor
David Choban
Original Assignee
Nuventive Llc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nuventive Llc filed Critical Nuventive Llc
Publication of MXPA03004820A publication Critical patent/MXPA03004820A/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/06Asset management; Financial planning or analysis

Abstract

A method that is operative with a computer executable code to create a selectively accessible and user controlled portfolio folder. The method, which is a computer implemented method for sharing personal information through an electronic communication network between a user and one or more reviewers, includes the steps of: providing an electronic storage medium having a computer executable code for creating and viewing a selectively accessible electronic portfolio folder, establishing accounts for the users and the reviewers, allowing the user access to the computer executable code through the electronic communication network, allowing the user to create and/or edit one or more portfolio folders and place content in the portfolio folders, allowing the one or more reviewers access to the computer executable code through the electronic communication network, and allowing the one or more reviewrs to view the portfolio folders selected by the user.

Description

COMPUTED SYSTEM OF PORTFOLIOS AND EVALUATION Cross Reference to the Related Request This application claims the benefit of the United States Provisional Patent Application Serial Number 60/250, 342, filed on November 30, 2000.
BACKGROUND OF THE INVENTION Field of the Invention This invention relates to a method of sharing information through a network of electronic communications and, more specifically, to a method of sharing information in a portfolio folder in which a user selectively allows access to the portfolio folder.
Background Information Although apparently a perennial topic of conversation of parents and politicians, the educational system of the United States has recently emerged as one of the major reform projects of the new millennium. After almost two decades of exploratory efforts to improve education, demands to measure results and accountability have been heard from all segments of this society. Each time we are becoming an economy based on knowledge, instead of an economy based on labor power. Companies are under pressure to find and retain skilled workers. Educational institutions are the cornerstone of that economy and are increasingly under pressure to demonstrate their effectiveness in teaching, and to fill this need for a knowledgeable workforce. Educational institutions are being challenged to provide proof that they are achieving educational and institutional objectives. This includes providing evidence of the effectiveness of teaching professionals, as well as validating that students are achieving the required levels of skills and competencies. The school of the future will be able to demonstrate results, modify its processes in real time to meet changing educational objectives and meet the learning needs of the clientele of students who require an increasingly flexible and responsible educational system. ? In turn, with their respective level of education completed, the burden of competence and responsibility is transferred to the student. . The student must first exhibit sufficient skills to be considered for the next level of transition, either in employment or education, and then extend their educational investment to realize expectations. Therefore, it is up to the student or the parent to demand that the educational system or the institution be able to deliver the desired educational results. In the same way for the system or institution, it must show that it can provide the same. In order to achieve these goals, educational institutions must commit to a program of continuous internal evaluation. In the process of successful evaluation, educational goals are translated into departmental objectives that are the basis for adopting choices in academic history and teaching methods. Using the student's performance data, measuring the progress against the objectives will validate whether the choices were correct and to what extent. This is important not only because the evaluation of results is required for accreditation, but also to ensure that the educational goals established by the institution are undoubtedly being achieved. Given the wide acceptance of the evaluation process as a powerful tool for positive change in education, one must ask why the process is not a robust part of the educational planning process in most institutions today. In fact, although the process has been required for accreditation in colleges and universities for many years, "in a view of the evaluation efforts of 320 institutions that were in the accreditation process of the Central North Association of schools and colleges between 1997 and 1999, Associate Director Cecelia López found that virtually all institutions were just beginning several aspects of their evaluation programs or had only implementation to talk about. Only a small minority of institutions made full use of the evaluations in their educational planning and practices. "However, understanding the culture of the academy, some of the problems are clearly seen in the case of the Higher Education Institutions Commission, It requires an evaluation program for accreditation, the Commission does not prescribe a specific evaluation methodology, instead, it "asks each institution to structure an evaluation program around its established mission and its educational purposes." institutions are free to develop their own evaluation methodologies, the lack of prescribed structure and processes presents significant challenges, added to this the abstract concept of evaluation, and the challenge inherent in translating "educational goals and purposes" into measurable learning objectives such as part of the evaluation process.
The difficult nature of the assessment task coupled with the lack of time for evaluation by both teachers and students has significantly impeded the adoption of an effective evaluation process. One can almost imagine hearing the whine of teaching professionals and students across the nation realizing that they must bear the burden of a process that is usually not clear and which they are certain they do not have time to perform. Clearly the evaluation process needs to be structured, quick and easy to use or it will probably fail. With respect to students, they are increasingly challenged to demonstrate their skills and competencies for both educational and employment purposes. This will require an electronic means to relay complex information in a flexible and secure manner to a variety of audiences. Currently, information can be shared through an electronic communications network, such as the Internet. However, a user must display the information for general access, for example, by creating a web page, or by communicating directly with the interested party, for example, an email message. Currently there is no method that allows a user to control who can access the content displayed by the user. For example, a curriculum service should allow a user to upload their resume. But, after the curriculum is loaded, the user has no control over who sees the curriculum. This limits the job seeker's options if he or she is currently employed and does not want their current employer to know that they are looking for a job. Therefore, there is a need for a method of sharing information on an electronic communication network that allows the user to select who can see the information. There is another need for a computer-implemented method of sharing information about an electronic communications network that allows the user to select who can see the information. There is another need for a computerized network to create and provide access to a portfolio that includes a first computer that has a memory medium for storing a portfolio, including the average portfolio for the user to control the selective access by others to the information in the portfolio, and, a second computer in electronic communication with the first computer, accessing the second computer to the information in the portfolio to which the user has allowed access. There is another need for a method of creating and providing access to a computerized portfolio that includes the steps of, providing a computer that has computer software to guide a user to enter information related to the computerized portfolio on the computer, and entering the information. On the computer, and allowing other computers to have selective electronic access to the information in said portfolios, selective electronic access is controlled by the user.
SUMMARY OF THE INVENTION These and other needs are met by the described invention which provides a method that is operative with a computer executable code to create a portfolio folder of the user controlled and selectively accessible. The method, which is a computer-implemented method of sharing personal information through an electronic communications network between a user and one or more reviewers, includes the steps of: providing an electronic storage medium that has computer-executable code to create and view a selectively accessible electronic portfolio folder, establish accounts for users and reviewers, allow the user to access executable code by computer through an electronic communications network, allow the user to create and / or edit one or more folders in the portfolio and place the content in the folders of the portfolio, allowing the user to determine which reviewer can access portfolio folders, allow one or more reviewers to access executable code by computer through the electronic communications network, and allow one or more reviewers to view portfolio folders selected by the user. The disclosed invention also provides a computerized network for creating and providing access to a portfolio folder that includes a first computer having memory means for a computer executable code and for storing a folder of the portfolio, including computer executable code. that the user controls the selective access by others to the information in the folder of the portfolio, and a second computer in electronic communication with the first computer, the second computer accesses the information in the folder of the portfolio to which the user has allowed access. The disclosed invention also provides a method for creating and providing access to a computerized portfolio folder that includes the steps of providing a computer having computer software to guide a user to enter information related to the computerized portfolio folder on the computer, enter the information in the computer, and allow other computers to have selective electronic access to information in the folder of the portfolio, controlling the selective electronic access, the user. The disclosed invention also provides an evaluation process that includes the steps of providing a computer software program that handles the evaluation process and providing at least one computerized portfolio folder, wherein the program and the computerized portfolio are linked in a manner that the program can selectively access and download items from the computerized portfolio folder in the computer program so that the computer program can handle the evaluation. The described invention also provides a communication system that includes, a first computer used by a user in communication with an electronic communications network, a second computer used by a reviewer and in communication with a communication network, a server having a medium readable by computer and in communication with an electronic communications network, the first computer in communication with the server through the electronic communications network, the second computer in communication with the server through the electronic communications network, and, a computer executable code stored in the computer readable medium where the server is operative with computer executable code to create a portfolio folder selectively accessible and controlled by the user. The described invention also provides a hypertext markup language (HTML) page generated by a server that has a computer executable code, presenting the information HTML page that requests responses from a user, the responses communicated to the executable code by computer so that computer executable code performs the operational steps to create and view a selectively accessible electronic portfolio folder, establish accounts for users and reviewers, allow the user access to executable code by computer through the electronic communications network , allow the user to create and / or edit one or more portfolio folders and place content in the portfolio folders, allow the user to determine which reviewer can access the portfolio folders, allow the one or more reviewers to access the executable code by computer through the communications network ele ctronics, and allow the one or more reviewers to see the portfolios folders selected by the user.
BRIEF DESCRIPTION OF THE DRAWINGS A full understanding of the invention can be obtained from the following description of the preferred embodiments, when read in conjunction with the accompanying drawings in which: Figure 1 is a schematic view of the communication system. Figure 2 is a flow diagram showing the primary steps of the method. Figure 3 is a screen view showing an input screen for information. Figure 4 is a screen view showing an entry screen for selecting reviewers who are allowed access to a portfolio folder. Figure 5 is a schematic diagram of the initial steps of the method. Figure 6 is a schematic diagram of the secondary steps of the method. Figure 7 is a schematic diagram of the steps associated with the construction of a profile. Figure 8 is a schematic diagram of the steps associated with editing a profile. Figure 9 is a schematic diagram of the steps associated with building a portfolio folder. Figure 10 is a schematic diagram of the steps associated with adding content to a portfolio folder. Figure 11 is a schematic diagram of the steps associated with editing a profile. Figure 12 is a schematic diagram of the steps associated with handling a master portfolio. Figure 13 is a schematic diagram of the steps associated with reviewing a portfolio folder.
Description of Preferred Modalities The method includes an Internet-based computer-executable code for students to accumulate, exhibit, and grant access and control to samples of proficiency in academic or professional history requirements. An evaluation program application provides a template for implementing and managing the entire educational "evaluation process" which is required of colleges and universities for accreditation purposes. Computer-executable code establishes a standardized methodology for students to do "self-assessment" and to create, store, and access customized work presentations and student skills. Using wizard-style tools "the student can easily handle audio, video, text, and other file formats, displaying everything from writing samples to test scores to software programming samples, then these samples can be stored in several" Portfolio folders "that can be accommodated to create customized presentations for specific uses for which access can be selectively granted and controlled by the student." Examples of these uses could be academic history evaluation, application for graduate schools, placement of employment, or provide samples of work for institutional evaluation (the latter is automatically related to the evaluation software.) A robust security model allows the student to dynamically control access to their portfolio folders, this access varies from a single applicant, to defined groups of requests to access as a result of a pairing of a search on the web. Computer-executable code allows an individual to dynamically control what information about themselves they want to share, when to share it, and with whom they want to share it. Although capable of being a standalone application, the computer executable code is structured to work with the evaluation software. We expect the rapid and widespread adoption of computer executable code in schools that use this evaluation software as it satisfies a critical need for both institutions and students. In fact, based on the discussion with customers of existing evaluation software, we anticipate that a significant number of schools will require the use of of the executable code by computer. This relationship between the two applications allows the rapid growth of an installed base of student users as described later in the "Distribution / Sales" section. Computer-executable code allows students and institutions to derive value from the ability of easy and systematic access to data from academic histories and skill displays by students in a safe environment. Computer-executable code provides three immediate benefits to students and institutions. These are: Student Self-Assessment. Many schools and departments already require students to use portfolios for this purpose. Nevertheless, in all cases it is either a paper copy of the students' work or the student creates a web page. This makes the use of information difficult. Additionally, students are often left with the question of "how to do it". Computer-executable code provides students with a clear framework for handling their work samples, scheduling their learning experiences, providing information to their school for evaluation, providing detailed information for employment, etc. In the traditional model and use of computer executable code, students often lose access to all the data they collect when it becomes most beneficial, especially when the student is getting employment after graduation or presenting information for admission to a school. of graduates. Since the computer executable code will be owned by the student and controlled by him, this will eliminate this problem. Placement of Employment. The computer executable code provides the student with a "professional" portfolios of work samples for employment purposes that is much more robust than the simple curriculum. Many students have little or no work experience and few exhibits of achievement and competence. This makes it difficult for employers to verify their credentials. Computer executable code allows a student to provide adequate evidence of their skills and dexterity to prospective employers. In addition, computer executable code allows students to "tag" their portfolios with keywords. Prospective employers looking for candidates who meet certain criteria can use these keywords. For example, based on some keywords "tagged" by the user, prospective employers could search for all careers aimed at Computer Science, with a general average in points greater than 3.7 who have web development skills. Since institutional success is often judged on students' successful job placement, computer executable code also helps educational institutions achieve their goal. Institutional Recruitment Similar to an employer who hires an employee, educational institutions have the same search load as students with the best potential. As the computer executable code proliferates at K-12, the student will maintain a work collection to electronically provide the institutions as evidence of learning. This will provide the admissions offices with more data on prospective students as well as help reach a new student market beyond the geographic recruitment region. The user has the ability to store a series of electronic files, and via templates create different views of the portfolio. The different templates include, but are not limited to, Self-Assessment, School Application, Employment and Others (used for personalized views). Now, as students gather portfolios and relate them to a portfolio folder accessible by the evaluation software, the institution automatically has its portfolio evaluation data entered into the evaluation software. At the same time, the student has the ability to create other portfolios for personal purposes such as job placement and selectively control access to each portfolio. Computer-executable code, by design, is a storage receptacle for any number and type of electronic or computer files that reflect exhibits of a student's work. Those electronic records may consist of items such as tests, writing samples, or any other of these educational measurement displays that can be stored as an electronic file. Collectively, these items are used as measurement data with respect to student performance. However, computer executable code is not limited to the application in the educational field, but can also be used for evaluation in hospitals and businesses. According to the invention, the evaluation software and the computer executable code are linked so that the evaluation software program can selectively access and download articles of the executable code by computer so that the evaluation software can use the articles as measurement data in the evaluation process. This selective access and selective download provides an automated and flexible method to allow evaluation evaluators to sample items from the computerized portfolio. Access and selective downloading are preferably carried out using a rule-based machine. For example, in the educational setting, students enter written works and / or projects in executable code on the computer to document their own personal education experience. The machine based on evaluation software rules can be used by evaluation evaluators, such as school administrators, to go to the population of portfolios of portfolios to which permission has been granted by the user and selective access, for example, 10 percent of the final compositions of the first year, which are part of all student portfolios. In this way, the selection process is automated and flexible, and allows evaluation evaluators to collect data without the need to directly collect this data from students. As used herein, a "computer" includes devices associated with a computer that is coupled to a central processing unit (CPU), such as keyboards and mice, screens or other components to interact with humans, as well as computers such as a server that is typically accessed from a remote location. As used herein, "computer executable code" includes, but is not limited to, a computer program or a group of interacting programs used by a processor and stored in a medium such as a hard disk drive, disk compact, DVD, or an integrated circuit such as an electrically programmable read-only memory (EPROM). As used herein, an "electronic communications network" includes any linked computer system such as the Internet, an intranet, or a network of a school or a company. As used herein, a "computer-readable medium" includes, but is not limited to, hard disk drives, compact discs, DVDs, magnetic tape, floppy disk drives, and random access memory. As used herein, a "computer file" is an electronic storage medium for containing data that may be expressed as text, images, audio, video or any combination thereof. As used herein, "associate, associate" when used to describe an action by a computer, for example, "associating computer files with portfolio folder", means that the computer file is linked to, or may be accessed by, the portfolio folder. As used herein, a "page" means a static or interactive HTML screen that is displayed on a computer monitor. As shown in Figure 1, a communication system 1 and method for sharing personal information uses an electronic communications network 10 that is structured to allow communication between a user 20 and one or more reviewers 30 via a computer executable code 60 The computer executable code 60 is operative on a server 12 or remote computer. The user 20 has a first computer 22 that is coupled by a modem (not shown) or other communication device to the electronic communications network 10. The user 20 can enter information in the first computer 22 to create computer files 24. Additionally the computer files 24 can be created in a separate computer and transferring them to the first computer 22 or the user 20 can use the first computer to interact with the computer executable code 60 to create the computer files 24. There are two types of reviewers 30, a feedback reviewer 40 and an observing reviewer 50. As will be described later, a feedback reviewer 40 is capable of entering information, in the form of feedback reports 44, into computer executable code 60. The feedback reviewer 40 has a second computer 42 that is coupled by a modem (not shown) or another communication device to the electronic communications network 10. The feedback reviewer 40 can enter information on the second computer 42 to create feedback reports 44. The reviewer 50 has a third computer 52 which is coupled by a modem (not shown) or other communication device to the electronic communications network 10. Each user 20 and reviewer 30 will have an account that is tracked by computer executable code 60 The computer executable code 60 is stored on a computer readable medium 61 e it includes both the operation code 62, which is structured to interact with the user 20 and the reviewers 30, and with the stored computer files 64. The operation code 62 is structured to perform the steps detailed below. The stored computer files 64 include user computer files 24 and feedback reports 44, as well as additional computer files 24 created by operation code 62 to handle the user's computer files 24 and the feedback reports 44, track user and reviewer accounts, and other functions as described below. The computer executable code 60 is structured to receive the files of the user's computer 24 through the electronic communications network 10 and place the files of the user's computer 24 in the storage medium 6. The entire user's computer files 24 form the master portfolio 70. The computer executable code 60 is structured to request information regarding each computer file 24 placed on the storage medium 64. The set of all the computer files of the user 24 form the master portfolio 70. The computer executable code 60 is structured to request information with respect to each computer file 24 placed in the storage medium 64. This information is input via the 153 entry fields (described later ) that include descriptions. That is, the computer executable code 60 has a limited number of choices for certain 153 entry fields. Limited choices are used to create files of files that act as a means of identification and tracking. For example, an entry field 153 may request that the user identify his occupation among a list. Each occupation listed has an electronic tag 25 associated with the occupation. In this way the computer executable code 60 can easily classify and sort the information based on the tags 25. The computer executable code 60 then allows the user 20 to select individual computer files of the user 24 to associate them with one or more folders of the portfolio. 72A, 72B, 72C. The computer executable code 60 also tracks and classifies the reviewers 30. The computer executable code 60 can place the reviewers 30 in a group 31 based on a common characteristic. The computer executable code 60 provides a list of the reviewers 30 or groups of reviewers 31 to the user 20 and allows the user to select which reviewers 30 or groups of reviewers 31 can access the individual folders of the portfolios 72A, 72B, 72C. After portfolio portfolios 72 ?, 72B, 72C are created and access is authorized by user 20, computer executable code 60 is structured to allow reviewers 30 or reviewer groups 31 to access and view the folders of the portfolio 72?, 72B, 72C through the electronic communications network 10. In this way, as shown in Figure 2, the method that is implemented by a computer includes the steps of the user 20 opening an account 100. One or more reviewers 30 open an account 102. When a reviewer 30 or a group of reviewers 31, for example, a school, opens an account, computer executable code 60 identifies and organizes group 31 through an affiliation code 104. The executable code by computer 60 then allows the user 20 to load a plurality of computer files 24 thereby creating 106 a master portfolio 70. The computer executable code 60 then allows the user 20 to select 108 individual computer files 24 to be in the folders selected from portfolios 72 ?, 72B, 72C. The computer executable code 60 provides 110 a global list of all reviewers 30 or all groups of reviewers 31 to user 20. Computer executable code 60 then allows user 20 to select 112 which reviewers 30 or groups of reviewers 31 can access to the selected folders in portfolios 72A, 72B, 72C. Based on user input 20, computer executable code 60 then allows selected reviewers 30 or groups of reviewers 31 to access 114 selected folders from portfolios 72A, 72B, 72C. The reviewers 30 or groups of reviewers 31 can then see 116 the folders selected from portfolios 72 ?, 72B, 72C. After the initial folders of portfolio 72 ?, 72B, 72C are created, computer executable code 60 allows user 20 to edit 118 portfolio folders 72 ?, 72B, 72C or change which reviewers 30 or groups of reviewers 31 can access the portfolios folders 72 ?, 72B, 72C. The user 20 and the reviewers 30 interact with the computer executable code 60 using a computer 22, 42, 52 together with the electronic communications network 10. Typically, this interaction will occur using a web browser. That is, a computer executable code that is structured to interpret and present an HTML page. Figures 3 and 4 are screen views showing a typical web browser that connects to a computer executable code 60. The web browser includes a toolbar menu 130 and toolbar buttons 132 that can be used to navigate HTML pages and operate the web browser. These elements 130, 132 are part of the computer executable code of the web browser. Below the menu of the toolbar 130 and the buttons of the toolbar 132 is the HTML page 134A, 134B which represents the computer executable code 60. The HTML page 134 ?, 134B includes a primary menu 136. The primary menu 136 may have a plurality of options each with a plurality of levels, such as a first level menu 140, a second level menu 142, and a third level menu 144. As is known, a menu may only displaying the first level menu 140 until a user 20 uses an input device, such as a mouse, to select an option in the menu on which the one or more sub-levels 142, 144 of the menu are displayed. Additionally, there may be a secondary menu 150 that allows access to the options not shown in the primary menu 136. The information is displayed on the HTML page 134A, 135B as text, still images and video images. Additionally, audio information can be played through a speaker 152. The user 20 uses the first computer 22 to interact with the computer executable code 60 to create certain computer files 24. These computer files 24 are created by the user 20 entering information in the entry fields 153 such as the text box 154 (Figure 3), an option box 156 (Figure 3) which then provides a selection for the user 20, or an option box 158 (Figure 4) that either activates or deactivates a certain choice. The types of computer files 24 created are discussed in detail later. Additional computer files 24, such as an image 160, can be loaded into storage medium 64. The method described operates by allowing user 20 and reviewers 30 to interact with computer executable code 60 via menus 136, 150 and entry fields 153. The method can be used in many situations, for example engineers sharing ideas, with reviews by supervisors and sales people. However, as used herein, the user 20 will be a student, the feedback reviewers 40 will be the teachers of the students and the observer reviewers 50 will be potential employers. Initially, as schematically shown in Figure 5, computer executable code 60 allows the student user 20, or reviewer 30 as described below, to access a first page that includes a medium, such as a text box 154 , so that the user 20 or the reviewer 30 registers 200 in the system by entering a name and / or password that allows additional access to the executable code by computer 60. If the name and / or password are not encoded with the type of operator, ie the student user 20 or the reviewer 30, a second page will allow selection 202 of the type of operator. This selection 202 may only have to be made once, when the operator establishes his account. For example, if it is the first time the student user accesses the system, the computer executable code 60 will provide a temporary username and password. The computer executable code 60 prompts the student user 20, through various input fields 153, to establish an account 204 by entering initial personal information such as name, address, telephone number as well as a method of payment. When the user 20 is a student, the payment method may be a code supplied by the school of the student who has previously purchased a massive license. The payment method could be any other common means such as a credit card. As soon as this information is associated with the account, the information does not have to be entered again. By entering 200 a name and password, the computer executable code will access the file with the profile data and thus recognize the user 20 or the reviewer 30. At this point the student user 20 can select a username and password . The student user 20 will only be required to enter this information once. After the student user 20 enters this information, the computer executable code 60 creates a computer profile file 24 which is stored in the storage medium 64. At this point the student user 20 starts the session and executable code by computer 60 presents 205 to the student user 20 a first level menu 140. The first level menu 140 is shown schematically in figure 6. The first level menu 140 presents options in the menu / submenu format. Through the first level initial menu 140 the computer executable code allows the student user 20 to select between the options; portfolios 250, tools 330, and configuration 210. The second level menu under the configuration includes the options to build a master profile 212 and edit the profile 230. After selecting build a master profile 212, the student user is presented with a menu of third level 144A to build a master profile as shown schematically in Figure 7. A master profile can include many forms of information, however, for this example the options to build a master profile 212 allows the student user 20: see / edit basic demographic information 214, view / edit academic records 216, view / edit cultural background 218, view / edit travel experience 220, view / edit values and beliefs 222, view / edit pastimes 224, and view / edit family history 226 When the student user 20 selects one of the options to build a master profile from the third level menu 14 he or she will be prompted by various cam entry 153 to enter information. For example, when the student user 20 selects to view / edit basic demographic information 214, he or she will see and be able to edit information regarding their address, telephone number, grade level or other demographic information. The computer executable code 60 pastes 25 tags to this data as explained above. When the student user 20 selects to view / edit academic records 216, he or she will see and be able to edit information regarding their academic records such as academic histories, place in generation, or major or non-major subjects. The student user 20 can also load any computer file 24, for example documents or multimedia files. This creates the content of the master portfolio 70. When the student user 20 selects to view / edit cultural background 218, he or she will see and be able to edit information regarding their race, religion or national origin. When the student user selects to view / edit 220 travel experience, he or she will see and be able to edit information regarding their travel experience and whether or not they like to travel. When the student user 20 selects to see / edit values and beliefs 222, he or she will see and be able to edit information regarding their political affiliations or causes that they have supported. When the student user 20 selects to view / edit hobbies 224, he or she will see and be able to edit information regarding their hobbies and activities. When the student user 20 selects to view / edit family history 226, he or she will see and be able to edit information regarding their family and their history. Each of these entries becomes a computer file 24 or part of a computer file 24.
As shown in Figure 8, after allowing the student user 20 to select the configuration option 210, the computer executable code 60 also allows the student user to select the edit profile option 230. The computer executable code 60 presents then to the student user 20 options that allow the user to change the password 232 or change an affiliation 234 (described later). For example, to change a password, the computer executable code 60 allows the student user to enter a new password 232 ?. The computer executable code 60 then confirms 232B the new password before changing the 232C password. Any user of computer executable code 60 has access to a global list of reviewers 30. This list, however, is populated with a top-level list of reviewers. That is, the top list typically shows a single check box 158 for each organization that uses computer executable code 60. For example, the State University and the State Institute of Technology each will have a check box 158. The user 20 , however, can not access individuals affiliated with the organization until an affiliation code is used. An affiliation code is assigned to each predefined set of reviewers 30. For example, all teachers in a school can be an affiliation. The school provides the enrollment code to each student user 20. The computer executable code 60 allows the student user 20 to enter a code 236, confirm the code 238, and then allows the student user 20 to see the entire list of reviewers within of an affiliation. Thus, after the student user enters 236, the affiliation code for the State University, the check box 158 in the global reviewer list becomes a hierarchical tree of check boxes 158, as detailed below. . The affiliation code for each student user 20 is stored in the computer executable code 60 and controls the presentation of the information, for example, the student user 20 will have access to global templates, which are available to all users 20, and to templates created by the teachers 40 reviewers affiliated with the school. As shown in Figure 6, the computer executable code 60 also allows the student user 20 to select the portfolio option 250 from the first level menu 140. When the portfolio option 250 is selected, the computer executable code 60 allows the student user 20 selects the options: create a new portfolio 252 or edit an existing portfolio 254. As shown in Figure 9, when the student user 20 selects to create a new portfolio 252 the computer executable code 60 initially allows the student user 20 use a predefined template 256 to create a portfolio folder 72 ?. The template can be created, for example, by a teacher reviewer 40 and stored with the computer executable code 60. As will be described below, the computer executable code 60 allows the user to include certain elements 270 such as objectives 278 and the 280 goals, for example, write three short stories, in the folder portfolio 72A. By creating a template, a teacher reviewer 40 can ensure that each student user 20 in the class has the same number of goals 278 and goals 280. Additionally, a template will include predefined tags 25 for each item 270. Computer executable code 60 allows that the student user selects 257 a template from a list of global templates, which are available to all 20 users, or from a list of templates from the affiliated school. After the student user selects 257 the template that will be used, the computer executable code 60 allows the student user to select 258 which reviewers 30 can access the portfolio folder 72 ?. The 258 selection of reviewers is detailed below. Additionally, the computer executable code 60 will import general demographic data from the user's profile, for example an address, into the folder of portfolio 72 ?. After the template 257 is selected, and the permissions 258 are granted, the folder of the portfolio 72A is created 259. If the template is not used, the computer executable code 60 allows the student user to format 260 the folder of the portfolio 72A . Initially, the computer executable code 60 allows the student user 20 to enter general information 268 with respect to the portfolio folder, for example a name for the portfolio folder 72A. Additionally, the computer executable code 60 will import general demographic data from the user's profile, for example an address, into the folder of portfolio 72 ?. The computer executable code 60 then allows the student user 20 to add any number of content elements 270 to the folder of portfolio 72 ?. As shown in Figure 10, the computer executable code 60 is structured to allow the student user 20 to add an activity 272, add an assignment 274, add a course 276, add a goal 278, add a goal 280, add a strength / weakness 282, add a standard 284 or add a content file 286. The elements 270 are entered through several input fields 153. For example, a goal can be captured in a text box 154. These elements 270 are selected based on the intended use of the portfolio folder 72 ?. For example, a portfolio folder 72? intended to be reviewed by a teacher reviewer 40 may include elements 270 such as a number of subjects, the goals associated with each subject and the element of strength / weakness. In this way, the teacher reviewer 40 can compare the subject with the intended goal and comment on any improvement with respect to the strength / weakness of the student user 20. Conversely, a portfolio portfolio 72A intended to be reviewed by a likely employer 50 can Include a report and related files, such as backup material, so that the employer can see the basis of student user report 20. The computer executable code 60 then allows the student user 20 to select 264 which reviewers 30 can access the portfolio folder 72A. The computer executable code 60 includes a global list of all possible reviewers 30, however, as explained above, each account may only have access to certain individual reviewers 30 affiliated with the student user 20. For example, the student user 20 You will have an account that limits the available reviewers to the teacher 40 reviewers at your school based on the membership code which was previously entered. As such, the computer executable code 60 presents the student user with a limited list of individual reviewers 30. As shown in Figure 4, the computer executable code 60 presents reviewers 30 as an expandable hierarchy of choice boxes 158. For example, the student user can check the highest level choice box 158, as shown, to the entire school, or the user can extend the hierarchy to show departments within the school. Here, the computer executable code 60 allows the student user 20 to grant access to an entire department by checking the 158 choice box for the department. Alternatively, the computer executable code 60 allows the student user to extend the hierarchy again to show individual teacher reviewers 40 within each department. The computer executable code 60 allows the student user 20 to grant access to a specific teacher reviewer 40 by marking the appropriate choice box 158. As is known in the art., if a higher level of the hierarchy is selected, all the choices below this selection in the hierarchy will also be selected. This type of hierarchy can be used with respect to employers or other groups as well. That is, in opposition to a school / department / teacher hierarchy, a hierarchy of employer can be occupation / geographical region / company. To complete the creation 268 of the portfolio folder 72A, the computer executable code 60 allows the student user 20 to select 266 one or more computer files 24 from the master portfolio 70 to be associated with the portfolio folder 72A. The computer executable code 60 presents a list of all the files with tag and stored 64 together with an entry field 153, such as a check box 158. When selecting a stored file 64, the stored file 68 is associated with the folder of the portfolio 72A. As soon as the information in the general portfolio folder 262 is selected, the portfolio elements are entered 263, the reviewer's permits 264 are selected, and the associated content 266 with the portfolio portfolio 72A, portfolio folder 72? 268 is completed and stored by computer executable code 60. Portfolio folder 72A can be copied from one storage medium 64 to another. That is, the computer files 24 are stored in a location that is remote from both the student user 20 and the revisers 30. Typically, both the student user 20 and the reviewers 30 access the portfolio folder 72? using the electronic communications network 10. However, can there be a need to copy the portfolio folder 72? to another storage medium 64, such as to a CD-ROM. After the portfolio folder 72 is created, the computer executable code 60 allows the student user 20 to edit the portfolio folder 72A. As shown in Figure 11, when a folder in portfolio 72 is edited, after selecting the option to edit portfolio 254, the computer executable code 60 allows the student user 20 to select a portfolio 72A to edit 300. The computer executable code 60 then allows the student user 20 to edit the profile of the portfolio folder 302, edit the specific information of the profile 304, that is, edit any profile data that is incorporated in the folder of the portfolio, edit the content of portfolio 306, see feedback from feedback reviewers 40, edit the selection of reviewers who are allowed to see portfolio folder 310, or view the access record. Functions such as editing the information in portfolio 302 are carried out by editing the information originally entered by the student user 20. When editing the selection of the reviewers who are allowed to see the portfolio folder 310, the student user will be displays the list of reviewers 30 again and can make new selections by changing the appropriate check box 158. As will be described later when a feedback reviewer 40 reviews the portfolio, feedback reviewer 40 is allowed by computer executable code 60 leave a feedback report 44. The computer executable code 60 tracks who has had access to the portfolio folder 72? tracking user names. The computer executable code 60 allows the student user 20 to see 308 both the feedback report 44 and see a record 312 of who has had access to the portfolio folder 72A. The student user 20 can thus form an association between the elements of the content 270 within a folder of the portfolio 72A by relating 314 the elements 270. For example, the student user 20 creates 268 a new portfolio folder 72A and adds a goal 280 for writing effectively. After, the student user 20 writes a job in writing and associates that report with the portfolio folder 72A. After the written work receives a good grade, the student user 20 wishes to use this work in writing as an example of reaching the goal. The computer executable code 60 allows the student user 20 to relate these two elements to each other. As soon as the student user 20 has selected the option to relate content 314, the computer executable code 60 presents the student user with a list of the content elements 270 in the portfolio folder 72A including the report and the goal. The student user then selects the elements 270 using an input field 153, for example check boxes 158, to be related. The computer executable code 60 also allows the student user 20 to create his or her own feedback in the form of a reflection 318. Typically, a reflection would be a text file in which the student user 20 provides his or her own comments regarding the selected item 270. The computer executable code 60 also allows the student user to avoid 320 reflection. The final option in the first level menu 140, tools 330, is for file management. The computer executable code 60 allows the student user to select the 330 tools before presenting the second-level options of file management 332 and security 334 to the student user 20. If the student user selects the 332 file management option, ( see Figure 12) computer executable code 60 allows the student user to create directories 336 on storage medium 64, download 338 or load 340 computer files 24, move computer files 24 between directories 342 or renumber or erase 344 24 computer files of the directories. This file management is well known in the art. The computer executable code 60 also allows student user 20 to edit security 334 for various portfolio folders 78A. This option is a shortcut to edit the selection of reviewers who are allowed to see the portfolio folder 310 as described above. Alternatively, the computer executable code 60 may be accessed by a reviewer 30. The first time a reviewer 30 accesses computer executable code 60, reviewer 30 must establish an account 204. Reviewer groups 30 may be affiliated as described above. The computer executable code 60 is structured to store the associated reviewers 30 and presents the list of reviewers 30 in an organized hierarchy as described above. As soon as the reviewer 30 has established an account, the reviewer 30 accesses the executable code by computer 60 through the electronic communication network 10. After the reviewer 30 has been identified as the reviewer 400, the computer executable code 60 allows reviewer 30 to handle groups 402, check 404 for computer executable code 60, or see 406 a portfolio folder 72A that the reviewer is allowed to see by student user 20. The step of handling groups 402 is similar to the file management as described above. This allows the reviewer to organize the account. The computer executable code 60 also allows the reviewer to submit a query 404 which will cause the computer executable code 60 to search the portfolio folders 72 ?, 72B, 72C which has data that matches the query and to which the reviewer 30 has permission granted to see. An example of this query is, "locate all students whose main career is in English and have a second Japanese option." This information is stored in the labels 25 associated with the portfolios of the portfolio 72A, 72B, 72C. The computer executable code 60 returns the data to the reviewer 408. The reviewer can then process the data, for example, by exporting the data to an evaluation program. The computer executable code 60 also allows reviewer 30 to see 406 all portfolios of portfolio 72 ?, 72B, 72C that reviewer 30 is allowed to review. The computer executable code 60 allows reviewer 30 to select 410 portfolio folder 72A for review. The reviewer can access the different elements of the portfolio portfolio 72A. The elements 270 can be identified by hyperlinks or can be listed in an associated entry field 153, such as a check box 158. When the reviewer selects the item 270, the computer file 24 for the item 270 is transferred through the the electronic communications network 10 to the second computer 42 or the third computer 52 that is being used by the reviewer 30. If the reviewer is a feedback reviewer 40, the computer executable code 60 allows the feedback reviewer 40 to create 412 a feedback report 44 for the selected portfolio folder 72? or item 270 of portfolio folder 72A. The feedback report 44 is incorporated into the portfolio folder 72A or item 270 of the portfolio folder 72A. As described above, an example of a feedback reviewer 40 is a teacher commenting on the portfolio folder 72A of a student user 20. Alternatively, a reviewer 30 can be an observer reviewer 50 who can only see a folder of the portfolios 72A and the elements 270 in it. As described above, an example of an observer reviewer 50 is a potential employer reviewing the work done by a student user 20. The computer executable code 60 also allows a reviewer 30 to provide a template for a folder of portfolio 72 ?. A template provides the structure for the 270 elements for a portfolio folder 72A. These elements are chosen in a manner similar to that described above. However, when the template is full, the computer executable code 60 stores and sorts the template so that only users with the appropriate affiliation code can access the template. Continuing the student's example of the above, a feedback reviewer 40 such as a chemistry lab teacher, creates a template for a class that will perform five experiments. The template includes an assignment, an activity, an objective, and a standard for each experiment. The feedback reviewer 40 provides the computer files 24 with the objective and the standard. Each student user will write a written assignment for each assignment and a report on each laboratory activity or experiment. After each experiment, and after the student user has given the teacher reviewer permission to access portfolio folder 72, does the feedback reviewer 40 access the portfolio folder 72? for each student and compare the work in writing and the report with the established objective and standard. The teacher reviewer 40 can then write a feedback report 44. The feedback report 44 can then be viewed 308 by the student user 20. EXAMPLE: In operation, and again using the student-teacher-employer example of the above, the method works as follows. The computer executable code 60 is operational on the remote server 12. A student user 20, a teacher 40 feedback reviewer and a 50 employer observer reviewer each open an account 204 to use the computer executable code 60. Each student user 20 , a teacher 40 feedback reviewer and a 50 employer observer reviewer enter their initial information and are assigned user names and passwords. The student user 20 and the teacher 40 feedback reviewer also enter 234 school affiliation code. In this way, the computer executable code 60 will present the student user 20 with a list of teacher 40 reviewers for the school and any template created by a teacher 40 feedback reviewer will be available for the student user 20. The teacher 40 feedback reviewer uses then a second computer 42 for accessing the computer executable code 60 through the electronic communications network 10. The teacher 40 feedback reviewer creates a template to be used by each of its students to record their assignments. The template designed by the teacher feedback reviewer 40 includes a plurality of elements 270 that include a final report. The student user 20 using the first computer 22 accesses the executable code by computer 60 through the electronic communications network 10. Initially, the student user 20 has a copy of his resume as a computer file 24 on a floppy disk. The student user 20 accesses the executable code by computer 60 and clicks on the tools menu 330, then clicks on the file management option 332, and finally clicks on creating a folder option 336. The computer executable code 60 allows the student user 20 to create an online folder which names "curriculum". The student user 20 again clicks on the tools menu 330, then clicks on the file management option 332, and finally clicks on the file transfer option. At this point the computer executable code 60 allows the student user 20 to upload 340 their curriculum computer file 24 into the online curriculum folder. During the first day of classes, the teacher 40 feedback reviewer provides each student with the name of the template that will be used by the students of the teacher 40 feedback reviewer. The student user 20 again accesses the computer executable code 60 through of the electronic communications network 10. The student user 20 registers 200 and the executable code by computer 60 presents the first level menu 140. The student user 20 selects the portfolio option 250 and then selects the option to create a new one. portfolios 252 of the second level menu 142. The computer executable code 60 presents the student user with the option of using a template. The student user 20 selects this option 256 and enters the name of the template provided by the teacher feedback reviewer 40. The computer executable code 60 creates a portfolio folder 72A populated with the plurality of elements 270 that the teacher wishes to review. The computer executable code 60 then allows the student user to leave the teacher reviewer 258 to access the portfolio folder 72 ?. During the remainder of the semester the student user 20 completes several assignments for the teacher feedback feedback 40. Each of these assignments is loaded 340 through the computer executable code 60 in the storage medium 64 which can be accessed by the executable code. by computer 60. Also throughout the semester, the teacher 40 feedback reviewer accesses the computer executable code 60 through the electronic communications network 10 and opens the portfolio folder 72A created by the student user 20. The feedback reviewer Professor 40 reviews the 24 computer files created by student user 20 and creates 412 feedback for each assignment. Just before the end of the semester, the teacher 40 feedback reviewer gets sick and a second teacher 40A feedback reviewer takes care of the class. The second teacher 40 feedback reviewer? has its own account with the computer executable code 60. As the second teacher 40 feedback reviewer? Initially, I was not authorized to access the portfolio folder 72 ?, the student user 20 again accesses the executable code by computer 60 through the electronic communications network 10 and selects the portfolio option 250, then selects the option to edit portfolios 254. The student user 20 selects to edit the portfolio folder 72A for the class, and more specifically, selects the option to edit 310 the reviewers who are allowed to access the portfolio folder 72A. As described above, the computer executable code 60 presents the student user 20 with a list of teachers 40 feedback reviewers for the school and / or the department. Each teacher 40 feedback reviewer has a check box 158 adjacent to his name. The student user 20 selects the name of the second teacher 40 feedback reviewer? and check the appropriate check box 158. In this way, the student user 20 selects who can access the portfolio folder 72A. From this point forward, the second teacher 40 feedback reviewer? access the portfolio folder 72A through the electronic communications network 10. At the end of the semester the student user 20 submits a final report that receives a positive feedback report 44 from the second teacher 40A feedback reviewer. At the end of the semester, the student user 20 begins to look for a job. Initially, the student user 20 accesses the executable code by computer 60 as before. The student user then selects to create a new portfolio folder 252. Instead of using a template, the student user formats 260 the second portfolio folder 72B to include the 270 elements in the final report and curriculum. The student user 20 then selects to edit the second portfolio 72B and edits 306 the content thereof associating his resume and his final report to the second portfolio 72B. In this way, when the observer reviewer employer 50 accesses the computer executable code 60 through the electronic communication network 10, he will be able to see the second portfolio 72B. Additionally, because the feedback report is associated as the report, the observer reviewer 50 will be able to see the positive feedback. The student user 20 allows employers to access the second portfolio 72B selected reviewers from the global list of reviewers. That is, the student user 20 accesses the executable code by computer 60 through the electronic communications network 10 and selects the portfolio option 250, then selects the option to edit portfolios 254. The student user 20 selects to edit 300 the second folder from portfolios 72B, and more specifically, select the option to edit 310 to reviewers who are allowed access to portfolio folder 72B. As described above, the computer executable code 60 presents the student user 20 with a global list of observer reviewers 50. This list can be classified by different methods, for example, by geographic location or by type of industry. Each level in the hierarchy and each individual employer observer reviewer 50 have a check box 158 adjacent to their name. For this example, the 50 employer observer reviewer will be classified by geographic location, for example, east coast, center, west coast. Student user 20 selects to allow all employer observer reviewers 50 in the geographic region of the east coast to access the second portfolio folder 72B by checking the appropriate check box 158 associated with the east region. By selecting the regional check box 158, all employer observer reviewers 50 in that region will have access to the following folder in portfolio 72B. In this way, the student user 20 selects who can access the portfolio folder 72B. As soon as system 1 is established, system 1 can be used by additional reviewers 30 such as administrators for a school. ? provided that a substantial number of students use system 1, school administrators, acting as observer reviewers 50, may compile data regarding students to assess their academic performance. For example, if all first-year English learners are required to write a written end-of-semester paper, administrators, working through computer executable code 60, can collect a sampling of the final papers, or all of the Written works, accessing the folders of the student user portfolio 72 ?, given that the student user 20 has given permission to access portfolio 72 ?. Although the specific embodiments of the invention have been described in detail, it will be appreciated by those skilled in the art that various modifications and alternatives to those details could be developed in light of the overall teachings of the description. In accordance with the foregoing, the particular arrangements described are intended to be illustrative only and not limiting as to the scope of the invention that is given in full from the appended claims and any and all equivalents thereof.

Claims (97)

  1. CLAIMS 1. A computer-readable medium that contains computer-executable code to create a portfolio folder that is selectively accessible and user-controlled.
  2. 2. A computerized network to create and provide access to a portfolio folder comprising: a first computer that has a memory medium for a computer executable code and to store a portfolio folder, computer executable code includes means for the user controls the selective access by others to the information in the folder of the portfolio; and a second computer in electronic communication with the first computer, accessing the second computer the information in the folder of the portfolio to which the user has allowed access.
  3. 3. A method for creating and providing access to a computerized portfolio folder comprising: providing a computer having computer software to guide a user to enter information related to the computerized portfolio folder on the computer; enter the information on the computer; and allowing other computers to have selective electronic access to the information in the portfolio folder, with selective electronic access being controlled by the user.
  4. 4. An evaluation process comprising: providing a computer software program that handles the evaluation process; and provide at least one portfolio folder computerized; where the program and the computerized portfolio are linked so that this program can selectively access and download items from the computerized portfolio folder in the computer program so that the computer program can handle the evaluation.
  5. 5. A computer-implemented method of sharing personal information through an electronic communications network between a user and one or more reviewers, the method comprising the steps of: a) providing an electronic storage medium that has computer-executable code to create and view a selectively accessible electronic portfolio folder; b) establish accounts for users and reviewers; c) allow the user to access executable code by computer through the electronic communications network; d) allow the user to create and / or edit one or more folders in the portfolio and place content in the folder of the portfolio; e) allow the user to determine which reviewer can access the portfolios folders; f) allow one or more reviewers to access the executable code by computer through the electronic communications network; and g) allow one or more reviewers to see the portfolios folders selected by the user.
  6. 6. The computer implemented method of claim 5 wherein the step of allowing the user to create and / or edit one or more electronic portfolios includes the steps of: a) giving the user access via the electronic communications network to enter one or more computer data files in the electronic storage medium to create a master portfolio; and b) having the computer executable code mark each data file with a means of identification.
  7. The computer implemented method of claim 6 wherein the step of allowing the user to create and / or edit one or more electronic portfolios includes the additional steps of: a) having the computer executable code create an index of each file tagged in the master portfolio; and b) allow the user to select individual files from the master portfolio to associate with a folder in the portfolio.
  8. 8. The computer-implemented method of claim 7 wherein the step of allowing the user to create and / or edit one or more folders of the portfolio includes the additional step that the computer executable code provides a template for the portfolio folder.
  9. The computer implemented method of claim 7 wherein the step of allowing the user to create and / or edit one or more folders of the portfolio includes the additional step of allowing the user to create additional portfolio folders by associating the selected labeled files with one or more portfolio folders.
  10. The computer implemented method of claim 7 wherein the step that allows one or more reviewers to view the portfolio folder selected by the user includes the additional steps of: a) allowing one or more reviewers to access the portfolio of the portfolio portfolios through the electronic communications medium; and b) display the portfolio folder and the files associated with the reviewer.
  11. The computer implemented method of claim 10 wherein the step of establishing accounts for users and reviewers and the step of allowing the user to determine which reviewer can access portfolio folders includes the additional steps of: a) create and store an affiliation among a group of reviewers; and b) allow the user to allow the individual reviewers and / or affiliated reviewers to access the portfolio folder.
  12. The computer implemented method of claim 11 wherein the computer executable code presents the list of affiliated reviewers as a hierarchy.
  13. The computer implemented method of claim 12 wherein the step of allowing the user to determine which reviewer can access the portfolios of the portfolio includes the additional steps of: a) allowing the user to access the portfolio folder through of the electronic communications network; and b) allow the user to edit a reviewer's authorization to access portfolio folders.
  14. The computer implemented method of claim 12 wherein the step of allowing the user to create and / or edit one or more folders of the portfolio includes the steps of: a) allowing the user to access the portfolio folder through of the electronic communications network; and b) allow the user to edit the contents of the portfolio folder.
  15. 15. The computer-implemented method of claim 5 wherein the step of establishing accounts for users includes the steps of: a) allowing users to enter demographic information with respect to themselves; and b) allow reviewers to enter demographic information about themselves.
  16. 16. The computer-implemented method of claim 5 wherein the computer executable code presents the user or reviewer with one or more structured entry fields to record information provided by users and reviewers.
  17. 17. The computer-implemented method of claim 16 wherein the computer executable code allows the entity accessing the executable code by computer to identify itself as a user or reviewer.
  18. 18. The computer-implemented method of claim 17 wherein the step of allowing the user to create and / or edit one or more folders from the portfolio and place content in the folders of the portfolio includes the additional step of: a) the executable code by computer present to the user the first level of options selected from the group they include; portfolios, tools, and configuration.
  19. The computer implemented method of claim 18 wherein the step of allowing the user to create and / or edit one or more folders from the portfolio and place content in the portfolio folders includes the additional step of allowing the user to select the Portfolio option to select either create a new portfolio or edit an existing portfolio.
  20. The computer implemented method of claim 19 wherein the step of allowing the user to create and / or edit one or more folders from the portfolio and place content in the portfolio folders includes the additional step of allowing a user to select create a new portfolio select format a portfolio folder or use a predefined template.
  21. 21. The computer-implemented method of claim 20 wherein the step of allowing the user to create and / or edit one or more folders from the portfolio and place content in the folders of the portfolio includes the additional step of allowing a user who selects to use A predefined template creates a portfolio folder based on a predefined template.
  22. 22. The computer-implemented method of claim 20 wherein the step of allowing the user to create and / or edit one or more folders from the portfolio and place content in the portfolio folders includes the additional step of allowing a user to select format a folder in the portfolio perform the following steps: a) enter general information; b) select reviewers who are allowed access to the portfolio folder; and c) associate the content with the folders of the portfolio.
  23. 23. The computer-implemented method of claim 22 wherein the computer executable code allows the user to include in the selected content elements of the group consisting of: an activity, an assignment, a course, an objective, a goal, a strength / weakness, a standard, or a related file.
  24. The computer implemented method of claim 19 wherein the step of allowing the user to create and / or edit one or more folders from the portfolio and place content in the folders of the portfolio includes the additional step of allowing a user to select edit a portfolio: a) edit general information of the portfolio folder; b) edit specific profile information of the portfolio folder; c) edit the contents of the portfolio; d) the feedback related to the portfolio; e) edit which reviewer has permission to access the portfolio folder; f) see which reviewers have access to the portfolio folder; and g) create the related content.
  25. 25. The computer-implemented method of claim 24 wherein the step of editing one or more portfolio folders to include related content includes the additional step of allowing a user to: a) create a narrative reflection; and b) create an association between the content associated with the portfolio folder and a computer file within the master portfolio.
  26. 26. The computer-implemented method of claim 25 wherein when the step of editing which reviewer has permission to access the portfolio folder includes the step of presenting the users with a list of all the reviewers, structured the list in hierarchical format .
  27. The computer implemented method of claim 26 wherein each selection within the hierarchy has an associated entry field check box and wherein the user can select the individual within the hierarchy or whole levels within the hierarchy by checking the entry field check box associated with the name or level within the hierarchy.
  28. 28. The computer-implemented method of claim 18 wherein the step of allowing the user to create and / or edit one or more folders from the portfolio and place content in the folders of the portfolio includes the additional step of allowing a user to select the configuration option select to build a master profile or edit a profile.
  29. 29. The computer-implemented method of claim 28 wherein the step of allowing the user to create and / or edit one or more folders from the portfolio and place content in the folders of the portfolio includes the additional step of allowing the user who selects build a master profile: a) edit demographic information; b) edit academic records; c) edit cultural backgrounds; d) edit travel experience; e) edit values and beliefs; f) edit hobbies; and g) edit family history.
  30. 30. The computer-implemented method of claim 29 wherein the step of allowing the user to create and / or edit one or more folders from the portfolio and place, contained in the folders of the portfolio includes the additional step of allowing the user to: a) change the password used by the user; and b) edit an affiliation by entering an affiliation code where the affiliation code is associated with a predefined set of reviewers.
  31. The computer implemented method of claim 18 wherein the step of allowing the user to create and / or edit one or more folders from the portfolio and place content in the portfolio folders includes the additional step of allowing the user to select the tool option and allows the user to: a) perform file management functions; and b) edit options of security.
  32. 32. The computer-implemented method of claim 17 wherein the computer executable code presents the reviewer with the option of reviewing a portfolio to which the reviewer has been given permission to access.
  33. 33. The computer-implemented method of claim 32 wherein the computer executable code allows a reviewer to create a feedback report related to the portfolio folder.
  34. 34. The computer-implemented method of claim 5 wherein the step of allowing the user to determine which reviewer can access the folders of the portfolio includes the step of presenting the user with a list of all the reviewers., structured the list in a hierarchical format.
  35. 35. The computer implemented method of claim 34 wherein each selection within the hierarchy has an associated entry field check box and wherein the user can select an individual within the hierarchy or whole levels within the hierarchy by checking the entry field verification box associated with the name or level within the hierarchy.
  36. 36. A communication system comprising: a first computer used by a user and in communication with an electronic communications network; a second computer used by the reviewer and in communication with an electronic communications network; a server that has a computer-readable medium and in communication with an electronic communications network; the first computer in communication with the server through the electronic communications network; the second computer in communication with the server through the electronic communications network; and a computer executable code stored in the computer readable medium, wherein the server is operative with computer executable code to create a portfolio folder selectively accessible and controlled by the user.
  37. 37. The communication system of claim 36 wherein the server is operative with computer executable code to: a) provide an electronic storage medium that has a computer executable code to create and view a selectively accessible electronic portfolio folder; b) establish accounts for users and reviewers; c) allow the user to access executable code by computer through the electronic communication network; d) allow the user to create and / or edit one or more folders in the portfolio and place content in the folders of the portfolio; e) allow the user to determine which reviewer can access portfolio folders; f) allow one or more reviewers to access the executable code by computer through the electronic communications network; and g) allow one or more reviewers to view the portfolios folders selected by the user.
  38. 38. The communication system of claim 37 wherein the server is operative with the computer executable code to: a) give the user access via the electronic communications network to enter one or more computer data files in the middle of electronic storage to create a master portfolio; and b) having the computer executable code mark each data file with a means of identification.
  39. 39. The communication system of claim 38 wherein the server is operative with a computer executable code to: a) have the computer executable code create an index of each file labeled in the master portfolio; and b) allow the user to select individual files from the master portfolio to associate with a folder in the portfolio.
  40. 40. The communication system of claim 39 wherein the server is operative with computer executable code to provide a template for the portfolio folder.
  41. 41. The communication system of claim 39 wherein the server is operative with computer executable code to allow the user to create additional portfolio folders by associating selected tagged files with one or more folders of the portfolio.
  42. 42. The communication system of claim 39 wherein the server is operative with a computer executable code to: a) allow one or more reviewers to access the portfolio folder through the electronic communications medium; and b) display the portfolio folder and the associated files before the reviewer.
  43. 43. The communication system of claim 42 wherein the server is operative with computer executable code to: a) create and store an affiliation among a group of reviewers; and b) allow the user to allow individual reviewers and / or affiliated reviewers to access the portfolio folder.
  44. 44. The communications system of claim 43 wherein the server is operative with computer executable code to present the list of affiliated reviewers as a hierarchy.
  45. 45. The communication system of claim 44 wherein the server is operative with computer executable code to: a) allow the user to access the portfolio folder through the electronic communications network; and b) allow the user to edit the authorization for a reviewer to access the folders in the portfolio.
  46. 46. The communication system of claim 44 wherein the server is operative with computer executable code to: a) allow the user to access the portfolio folder through the electronic computer network; and b) allow the user to edit the contents of the portfolio folder.
  47. 47. The communication system of claim 37 wherein the server is operative with computer executable code to present the user or reviewer with one or more structured entry fields to record information provided by users and reviewers.
  48. 48. The communication system of claim 47 wherein the server is operative with the computer executable code to allow the entity accessing the executable code by computer to identify itself as a user or reviewer.
  49. 49. The communication system of claim 48 wherein the server is operative with computer executable code to present the user with the first level of options selected from the group that includes: portfolios, tools, and configuration.
  50. 50. The communication system of claim 49 wherein the server is operative with computer executable code allows the user to select the portfolio option to select either create a new portfolio or edit an existing portfolio.
  51. 51. The communication system of claim 49 wherein the server is operative with computer executable code to allow a user selecting the configuration option to select to build a master profile or edit a profile.
  52. 52. The communication system of claim 49 wherein the server is operative with computer executable code to enable the user to select the tools option and allow the user to: a) perform file management functions; and b) edit security options.
  53. 53. The communication system of claim 46 wherein the server is operative with computer executable code to present a reviewer with the option of reviewing a portfolio that the reviewer has been given permission to access.
  54. 54. The communication system of claim 45 wherein the server is operative with computer executable code allows a reviewer to create a feedback report related to the portfolio folder.
  55. 55. The communication system of claim 37 wherein the server is operative with computer executable code to present the user with a list of all the reviewers, structured the list in a hierarchical format.
  56. 56. The communication system of claim 55 wherein each selection within the hierarchy has an associated entry field check box in which the user can select the individual within the hierarchy or whole levels within the hierarchy. by checking the checkbox of the entry field associated with the name or level within the hierarchy.
  57. 57. An HTML page generated by a server that has a computer executable code, the HTML page presenting information that requests answers from a user, the answers are communicated to the executable code by computer so that the executable code by computer performs the steps comprising: a) providing an electronic storage medium having a computer executable code to create and view a selectively accessible electronic portfolio folder; b) establish accounts for users and reviewers; c) allow the user to access executable code by computer through the electronic communications network; d) allow the user to create and / or edit one or more folders in the portfolio and place content in the folders of the portfolio; e) allow the user to determine which reviewer can access portfolio folders; f) allow one or more reviewers to access the executable code by computer through the electronic communications network; and g) allow one or more reviewers to view the portfolios folders selected by the user.
  58. 58. The HTML page of claim 57 wherein the step of allowing the user to create and / or edit one or more electronic portfolios includes the steps of: a) giving the user access via the electronic communications network to enter one or more computer data files in the electronic storage medium to create a master portfolio; And b) make computer executable code mark each data file with a means of identification.
  59. 59. The HTML page of claim 58 wherein the step of allowing the user to create and / or edit one or more electronic portfolios includes the additional steps of: a) having the computer executable code create an index of each file labeled in the master portfolio; and b) allow the user to select individual files from the master portfolio to associate with a folder in the portfolio.
  60. 60. The HTML page of claim 59 wherein the step of allowing the user to create and / or edit one or more folders of the portfolio includes the additional step that the computer executable code provides a template for the portfolio folder.
  61. 61. The HTML page of claim 59 wherein the step of allowing the user to create and / or edit one or more folders of the portfolio includes the additional step of allowing the user to create additional portfolio folders by associating the labeled files with one or more portfolio files.
  62. 62. The HTML page of claim 59 wherein the step of allowing one or more reviewers to view a portfolio folder selected by the user includes the additional steps of: a) allowing one or more reviewers to access the portfolio folder through the means of electronic communications; and b) display the portfolio folder and the associated files before the reviewer.
  63. 63. The HTML page of claim 62 wherein the step of establishing user accounts and reviewers and the step of allowing the user to determine which reviewer can access portfolio folders includes the additional steps of: a) creating and store an affiliation among a group of reviewers; and b) allow the user to allow selected individual reviewers and / or affiliated reviewers to access the portfolio folder.
  64. 64. The HTML page of claim 63 wherein the computer executable code presents the list of affiliated reviewers as a hierarchy.
  65. 65. The HTML page of claim 64 wherein the step of allowing the user to determine which reviewer can access the portfolio folders includes the additional steps of: a) allowing the user to access the portfolio folder through the electronic communications network; and b) allow the user to edit the authorization for a reviewer to access the folders in the portfolio.
  66. 66. The HTML page of claim 64 wherein the step of allowing the user to create and / or edit one or more folders of the portfolio includes the steps of: a) allowing the user to access the folder of the portfolio through the electronic computer network; and b) allow the user to edit the contents of the portfolio folder.
  67. 67. The HTML page of claim 57 wherein the computer executable code presents the user or reviewer with one or more structured input fields to record information provided by users and reviewers.
  68. 68. The HTML page of claim 67 wherein the computer executable code allows the entity accessing the executable code by computer to identify itself as a user or a reviewer.
  69. 69. The HTML page of claim 68 wherein the step of allowing the user to create and / or edit one or more folders from the portfolio and place the content in the folders of the portfolio includes the additional step of: a) that the code executable by computer present to the user the first level of options selected from the group that includes: portfolios, tools, and configuration.
  70. 70. The HTML page of claim 69 wherein the step of allowing the user to create and / or edit one or more folders from the portfolio and place content in the folders of the portfolio includes the additional step of allowing the user to select the option of portfolios to select to create a new portfolio or edit an existing portfolio.
  71. 71. The HTML page of claim 69 wherein the step of allowing the user to create and / or edit one or more folders from the portfolio and place content in the folders of the portfolio includes the additional step of allowing a user to select the configuration option select build a master profile.
  72. 72. The HTML page of claim 69 wherein the step of allowing the user to create and / or edit one or more folders from the portfolio and place content in the folders of the portfolio includes the additional step of allowing the user to select the option of tools and allow the user to: a) perform file management functions; and b) edit security options.
  73. 73. The HTML page of claim 68 wherein the computer executable code presents a reviewer with the option of reviewer a portfolio to which the reviewer has been given permission to access.
  74. 74. The HTML page of claim 73 wherein the computer executable code allows a reviewer to create a feedback report related to the portfolio folder.
  75. 75. The HTML page of claim 57 wherein the step of allowing the user to determine which reviewer can access the folders of the portfolio includes the step of presenting the user with a list of all the reviewers, structured the list in a hierarchical format .
  76. 76. The HTML page of claim 75 wherein each selection within the hierarchy has an associated input field check box in which the user can select an individual within the hierarchy or whole levels within the hierarchy by marking the check box of the entry field associated with the name or level within the hierarchy.
  77. 77. A system for enabling selective communication between a user and a reviewer comprising: means for providing a storage medium having a computer executable code for creating and viewing a selectively accessible electronic portfolio folder; a means to establish accounts for users and reviewers; a means to allow the user to access the executable code by computer through the electronic communications network; a means to allow the user to create and / or edit one or more portfolio folders and place content in the portfolio folders; a means to allow the user to determine which reviewer can access portfolio folders; a means to allow one or more reviewers to access executable code by computer through the electronic communications network; and a means to allow one or more reviewers to see the portfolios folders selected by the user.
  78. 78. The system of claim 77 wherein the means for allowing the user to create and / or edit one or more electronic portfolios includes a means to: a) give the user access via the electronic communications network to enter one or more files from computers to electronic storage medium to create a master portfolio; and b) Have the computer executable code mark each data file with a means of identification.
  79. 79. The system of claim 78 wherein the means for allowing the user to create and / or edit one or more electronic portfolios includes a means to: a) cause the computer executable code to create an Index of each file labeled in the master portfolios; and b) allow the user to select individual files from the master portfolio to associate with a folder in the portfolio.
  80. 80. The system of claim 79 wherein the means for allowing the user to create and / or edit one or more portfolios of the portfolio includes a means for the computer executable code to provide a template for the portfolio folder.
  81. 81. The system of claim 79 wherein the means for allowing the user to create and / or edit one or more folders of the portfolio includes a means for allowing the user to create additional folders of the portfolio by associating the selected labeled files with one or more Portfolio folders.
  82. 82. The system of claim 79 wherein the means to allow one or more reviewers to see a portfolio folder selected by the user includes a means to: a) allow the one or more reviewers to view a portfolio folder through a means of electronic communications; and b) display the portfolio folder and the associated files before the reviewer.
  83. 83. The system of claim 82 wherein the means for establishing accounts for users and reviewers and the means for allowing the user to determine which reviewer can access portfolio folders includes a means to: a) create and store a Affiliation among a group of reviewers; and b) allow the user to allow selected individual reviewers and / or affiliated reviewers to access the portfolio folder.
  84. 84. The system of claim 83 wherein the computer executable code presents the list of affiliated reviewers as a hierarchy.
  85. 85. The system of claim 84 wherein the means for allowing the user to determine which reviewer can access the portfolios of the portfolio includes a means to: a) allow the user to access the portfolio folder through the network of electronic communications; and b) allow the user to edit the authorization for a reviewer to access the folders in the portfolio.
  86. 86. The system of claim 84 wherein the means for allowing the user to create / edit one or more folders of the portfolio includes a means for: a) allowing the user to access the portfolio folder through the electronic computer network; and b) allow the user to edit the contents of the portfolio folder.
  87. 87. The system of claim 77 wherein the computer executable code presents the user or reviewer with one or more structured entry fields to record information provided by users and reviewers.
  88. 88. The system of claim 87 wherein the computer executable code allows the entity to access computer executable code to identify itself as a user or reviewer.
  89. 89. The system of claim 88 wherein the means for allowing the user to create and / or edit one or more folders from the portfolio and place content in the portfolio folders includes a means for: a) that computer executable code present to the user the first level of options selected from the group that includes: portfolios, tools, and configuration.
  90. 90. The system of claim 89 wherein the means for allowing the user to create and / or edit one or more folders from the portfolio and place content in the portfolio folders includes a means to allow the user to select the portfolio option to select create a new portfolio or edit an existing portfolio.
  91. 91. The system of claim 89 wherein the means for allowing the user to create and / or edit one or more folders from the portfolio and place content in the portfolio folders includes a means to allow a user to select the configuration option , select build a master profile or edit a profile.
  92. 92. The system of claim 89 wherein the means for allowing the user to create and / or edit one or more folders from the portfolio and place content in the portfolio folders includes a means to allow a user to select the tools option and allow the user to: a) perform file management functions; and b) edit security options.
  93. 93. The system of claim 88 wherein the computer executable code presents a reviewer with the option of reviewing a portfolio that the reviewer has been given permission to access.
  94. 94. The system of claim 93 wherein the computer executable code allows a reviewer to create a feedback report related to the portfolio folder.
  95. 95. The system of claim 77 wherein the means to allow the user to determine which reviewer can access the portfolio folders includes a means to present the user with a list of all the reviewers, structured the list in a hierarchical format.
  96. 96. The system of claim 95 wherein each selection within the hierarchy has an associated entry field check box where the user can select an individual within the hierarchy or whole levels within the hierarchy by checking the box Check the entry field associated with the name or level within the hierarchy.
  97. 97. A system for enabling selective communication between a user and a reviewer comprising: a means for using an electronic communications network; and a means to allow a user to selectively allow access to a portfolio folder.
MXPA03004820A 2000-11-30 2001-11-30 A computerized portfolio and assessment system. MXPA03004820A (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US25034200P 2000-11-30 2000-11-30
PCT/US2001/044901 WO2002044855A2 (en) 2000-11-30 2001-11-30 A computerized portfolio and assessment system

Publications (1)

Publication Number Publication Date
MXPA03004820A true MXPA03004820A (en) 2004-12-03

Family

ID=22947331

Family Applications (1)

Application Number Title Priority Date Filing Date
MXPA03004820A MXPA03004820A (en) 2000-11-30 2001-11-30 A computerized portfolio and assessment system.

Country Status (5)

Country Link
JP (1) JP2004517395A (en)
AU (3) AU2002219962B2 (en)
CA (1) CA2432763A1 (en)
MX (1) MXPA03004820A (en)
WO (1) WO2002044855A2 (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB0222113D0 (en) 2002-09-24 2002-10-30 Koninkl Philips Electronics Nv Image recognition
JP2009223338A (en) * 2004-03-19 2009-10-01 Kanazawa Inst Of Technology Learning support device using portfolio
JP4599149B2 (en) * 2004-12-14 2010-12-15 学校法人金沢工業大学 Education support device, computer program, program storage medium
RU2689201C1 (en) * 2017-11-21 2019-05-24 федеральное государственное бюджетное образовательное учреждение высшего образования "Уральский государственный педагогический университет" System and method for creation of electronic student portfolio

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0806017A4 (en) * 1994-12-13 2000-08-30 Fs Holdings Inc A system for receiving, processing, creating, storing and disseminating investment information
US5706502A (en) * 1996-03-25 1998-01-06 Sun Microsystems, Inc. Internet-enabled portfolio manager system and method
US6076072A (en) * 1996-06-10 2000-06-13 Libman; Richard Marc Method and apparatus for preparing client communications involving financial products and services
US20020032640A1 (en) * 2000-02-03 2002-03-14 Lafore David W. Data processing system and method for managing broker transaction information
JP2001273180A (en) * 2000-03-27 2001-10-05 Suzuki Educational Software Co Ltd System capable of setting environment for file access by individual user

Also Published As

Publication number Publication date
WO2002044855A3 (en) 2002-11-28
JP2004517395A (en) 2004-06-10
AU2002219962B2 (en) 2008-07-31
AU2008203205A1 (en) 2008-08-07
AU1996202A (en) 2002-06-11
CA2432763A1 (en) 2002-06-06
AU2008203205B2 (en) 2010-06-17
WO2002044855A2 (en) 2002-06-06

Similar Documents

Publication Publication Date Title
US20120011162A1 (en) Computerized portfolio and assessment system
Picciano Educational research primer
Eisenberg et al. Organizational communication: Balancing creativity and constraint
Hernon et al. Action plan for outcomes assessment in your library
Pariafsai et al. Core competencies for construction project management: Literature review and content analysis
Daft Organization theory and design
Boer Career counseling over the Internet: An emerging model for trusting and responding to online clients
Kellam et al. Numeric data services and sources for the general reference librarian
Villagran et al. Cultural competence in LIS education: Case study of United States ranked schools
Al-Saleh Graduate students' information needs from electronic information resources in Saudi Arabia
AU2008203205B2 (en) A computerized portfolio and assessment system
Allan Supporting research students
Younge et al. On-the-job training of health professionals for electronic health record and electronic medical record use: A scoping review
Catalano Streamlining LIS research: A compendium of tried and true tests, measurements, and other instruments
Grefsheim et al. Affirming our commitment to research: the Medical Library Association's research policy statement: the process and findings
AU2002219962A1 (en) A computerized portfolio and assessment system
Babatope et al. Digital Library Education in Tertiary Institutions: Roadmap to Revolutionizing Nigerian University Library Services
Zinni Human resources management
Stidder Training to teach physical education in an opposite-sex secondary school: A qualitative analysis of trainee teachers’ experiences
Van der Veer Martens et al. Opening the black box of “relevance work”: A domain analysis
Uleanya et al. Leadership Issues: Investigation of the Etiology of Curriculum Delivery in Rural Institutions of Learning
Mong'are PROVISION OF LIBRARY AND INFORMATION SERVICES TO PART-TIME, POSTGRADUATE STUDENTS: A CASE OF JOMO KENYATTA MEMORIAL LIBRARY, UNIVERSITY OF NAIROBI, KENYA
Kiyingi A WEB-BASED TUTORIAL FOR CATALOGING FOR THE NATIONAL LIBRARY OF UGANDA
Katrikh Supporting Opportunities for Adult Readiness (SOAR): An Occupational Therapy Program for Transition Age Youth with Disabilities
Asato Intellectual freedom education in Japan and the United States: A comparative study