Behavior screeners

Collecting and Analyzing Behavior Data By La Nae Olmstead & Jen Brown

Done for EVERY student. Ensuring that everyone has an equal opportunity to be considered for intervention. Pro-active and not reactive vs. using office discipline referrals Many screeners available you need to choose the one that fits your population’s needs



● Observable ● Measureable ● NO OPINIONS



FREQUENCY DATA Behavior Intervention Process: Step 1: Choose a data collection tool

The number of times the behavior occurs within a specific time period

Step 2: Collect Baseline data

1.

Step 3: Choose a behavior intervention

2.

Step 4: Progress Monitor for minimum of 3 weeks.

4.

3.

5. Step 5: Evaluate the effectiveness of the intervention

Tally Sheet Counter Paper clips in a pocket Rubber bands on your wrist Pages in a book

Grace’s Frequency Data jj Data Statement: According to a Frequency Data Collection Graph dated from 2/29/16 through 3/18/16, Grace decreased teacher interruptions from an average of 15.7 times per day to an average of 5.75 times per day. YOUR TURN: Write a data statement from Grace’s Frequency Data Graph.

Latency Data Statements





When analyzing the Latency Data Collection tool during the week of 11/5/16, La Nae took a total of 25 minutes to follow directions in math class. YOUR TURN: Using the Latency Data Collection Tool, write a data statement.

JEN HAS DIFFICULTY FOLLOWING DIRECTIONS. WHEN A DIRECTION IS GIVEN, SHE PUTS HER HEAD DOWN AND SAYS “I DON’T WANT TO DO IT”. I WANT TO KNOW HOW LONG IT TAKES FOR HER TO FOLLOW THE DIRECTION. WHAT DATA SHOULD I COLLECT?

1. FREQUENCY 2. DURATION 3. LATENCY

LA NAE CRIES WHEN SHE IS GIVEN THE DIRECTION TO WRITE IN HER DRAFT BOOK. I WANT TO KNOW HOW LONG HER CRYING LASTS. WHAT DATA SHOULD I COLLECT?

1. 2. 3.

FREQUENCY DURATION LATENCY

JEN CALLS HER PEERS AND TEACHERS NAMES DURING MATH INSTRUCTION. I WANT TO KEEP TRACK OF HOW MANY TIMES THIS OCCURS. WHAT DATA SHOULD I COLLECT?

1. 2. 3.

FREQUENCY DURATION LATENCY

REINFORCEMENT Conditions that exists when the behavior occurs

Antecedent (Triggers / Setting Events) Environmental Curricular/Instructional Social / Interactions PRECIPITATING VARIABLES

Behavior

Consequence Conditions that exists/occur after the behavior

http://www.behavior-doctor.org/

ABC Data Statements

Questions….. Thoughts….. La Nae: [email protected] Jen: [email protected]

Data! Data! Data! PD Powerpoint.pdf

... below to open or edit this item. Data! Data! Data! PD Powerpoint.pdf. Data! Data! Data! PD Powerpoint.pdf. Open. Extract. Open with. Sign In. Main menu.

4MB Sizes 3 Downloads 269 Views

Recommend Documents

data
Required to publish source code. Open ... 4TB compressed, split into daily tarballs. 97TB (! ... http://code.google.com/apis/bigquery/docs/dataset-mlab.html.

Data Warehouse and Data Mining Technology Data ...
IJRIT International Journal of Research in Information Technology, Vol. 1, Issue 2, February ... impact, relevance and need in Enterpr relevance and ... The data that is used in current business domains is not accurate, complete and precise.

500401-5 Data-Data processing.key.pdf
There was a problem previewing this document. Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item. 500401-5 ...

data warehousing & data mining -
1 (a) Describe three challenges to data mining regarding data mining methodology and user interaction issues. (b) Draw and explain the three-tier architecture ...

DATA WAREHOUSING AND DATA MINING.pdf
There was a problem previewing this document. Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item. DATA ...

Data Mining with Big Data
storage or memory. ... Visualization of data patterns, considerably 3D visual image, represents one of the foremost ... Big Data Characteristics: Hace Theorem.

PERENCANAAN DATA WAREHOUSE PEMETAAN DATA SISWA.pdf
PERENCANAAN DATA WAREHOUSE PEMETAAN DATA SISWA.pdf. PERENCANAAN DATA WAREHOUSE PEMETAAN DATA SISWA.pdf. Open. Extract.

DATA WAREHOUSING AND DATA MINING.pdf
There was a problem previewing this document. Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item. DATA ...

Data Security Model and Data Protection - HackInBo
Oct 29, 2016 - Credit Card Number DE_CCN. Tokenize. (expose first 6, last 4). Payments, CSR. 9 – 5,. M -F. EDW,. Hadoop. Unauthorized. Authorized. E-mail Address. DE_EMAIL. Tokenize All. HR, CSR,. DS_Haddop. EDW,. Hadoop. Unauthorized. Authorized.

Data Engineering
Jun 22, 2007 - Data. Engineering. June 2007 Vol. 30 No. 2. IEEE Computer Society ...... exploratory analysis of temporally-oriented network data (such as ...

/ Data Operations \
Jun 8, 2004 - provide uni?ed access to enterprise information systems 117 such as ..... NET plat forms and/or the Advanced Business Application Program.

Data Wrangling
Create DataFrame with a MuliIndex ... www.rstudio.com/wp-content/uploads/2015/02/data-wrangling-cheatsheet.pdf) WriVen by Irv Lusig, Princeton Consultants.

/ Data Operations \
Jun 8, 2004 - nectivity (“JDBC”) service, and legacy computer systems through the J 2EE ... Server) is often used to read the data and perhaps perform ..... forms and/or the Advanced Business Application Program ming (“ABAP”) platforms ...

Data Compression
Data Compression. Page 2. Huffman Example. ASCII. A 01000001. B 01000010. C 01000011. D 01000100. E 01000101. A 01. B 0000. C 0001. D 001. E 1 ...

Read eBook Big Data, Little Data, No Data: Scholarship ...
InformationWeek com News analysis and research for business technology ... arabic pages Research Resources A Subject Tracerâ„¢ Information Blog developed ... case studies from the sciences, social ... on the covers of Science, Nature, the.