skip to main content
US FlagAn official website of the United States government
dot gov icon
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
https lock icon
Secure .gov websites use HTTPS
A lock ( lock ) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.


Title: Reconsidering Mathematical Authority
Who has mathematical authority in your classroom, and what does authority look like? Find out different ways you can help students gain authority.  more » « less
Award ID(s):
2218770
PAR ID:
10558880
Author(s) / Creator(s):
; ; ;
Publisher / Repository:
National Council of Teachers of Mathematics
Date Published:
Journal Name:
Mathematics Teacher: Learning and Teaching PK-12
Volume:
116
Issue:
11
ISSN:
0025-5769
Page Range / eLocation ID:
826 to 836
Format(s):
Medium: X
Sponsoring Org:
National Science Foundation
More Like this
  1. Abstract: We use the Adaptor-Innovator Theory and the Influence framework to interpret undergraduate physics laboratory students’ approaches to – and bids for – intellectual and directive authority. Students display behaviors that utilize structure and work within a defined system (adaptor) and, separately, behaviors that work outside the system (innovator), the latter often by engaging directly with equipment. Adaptors exhibit high authority by asserting experimental understanding, whereas innovators are attributed with high authority through their frequent, direct handling of the equipment. We interpret equitable collaborations as those in which students 1) have full access to the experimental or conversational floor adaptively or innovatively while being 2) acknowledged in their authority by their group. 
    more » « less
  2. Abstract: We use the Adaptor-Innovator Theory and the Influence framework to interpret undergraduate physics laboratory students’ approaches to – and bids for – intellectual and directive authority. Students display behaviors that utilize structure and work within a defined system (adaptor) and, separately, behaviors that work outside the system (innovator), the latter often by engaging directly with equipment. Adaptors exhibit high authority by asserting experimental understanding, whereas innovators are attributed with high authority through their frequent, direct handling of the equipment. We interpret equitable collaborations as those in which students 1) have full access to the experimental or conversational floor adaptively or innovatively while being 2) acknowledged in their authority by their group. 
    more » « less
  3. Abstract Although hydropower produces a relatively small portion of the electricity we use in the United States, it is a flexible and dispatchable resource that serves various critical functions for managing the electricity grid. Climate-induced changes to water availability will affect future hydropower production, and such changes could impact how the areas where the supply and demand of electricity are balanced, called balancing authority areas, are able to meet decarbonization goals. We calculate hydroclimate risk to hydropower at the balancing authority scale, which is previously underexplored in the literature and has real implications for decarbonization and resilience-building. Our results show that, by 2050, most balancing authority areas could experience significant changes in water availability in areas where they have hydropower. Balancing areas facing the greatest changes are located in diverse geographic areas, not just the Western and Northwestern United States, and vary in hydropower generation capacity. The range of projected changes experienced within each balancing area could exacerbate or offset existing hydropower generation deficits. As power producers and managers undertake increasing regional cooperation to account for introducing more variable renewable energy into the grid, analysis of risk at this regional scale will become increasingly salient. 
    more » « less
  4. There are water consequences across every life cycle stage of coal‐fired electricity consumption, from production and processing to combustion, which have not been studied with regional specificity. There is often a spatial decoupling between where coal is produced and processed versus where it is combusted for power generation, complicating any analysis to estimate the life cycle water implications of electricity consumption. Furthermore, electricity generated by coal‐fired power plants can be consumed within its own balancing authority or exported to another balancing authority. This analysis spatially resolves the water consumed and water withdrawn for coal mining, coal preparation, and power plant cooling from 1) where the coal is mined to where the coal is burned for power production and 2) where the electricity is generated to where the electricity is consumed. Although the largest portion of coal consumed came from the Northern Great Plains province, coal from this region consumes the least amount of water for mining and preparation compared with other provinces. Water withdrawals for cooling power plants within each balancing authority are driven by cooling technology. Due to the interconnected grid, there can be differences between attributing water footprint at the producer level versus the consumer level. 
    more » « less
  5. null (Ed.)
    Purpose This study aims to examine how social engineers use persuasion principles during vishing attacks. Design/methodology/approach In total, 86 examples of real-world vishing attacks were found in articles and videos. Each example was coded to determine which persuasion principles were present in that attack and how they were implemented, i.e. what specific elements of the attack contributed to the presence of each persuasion principle. Findings Authority (A), social proof (S) and distraction (D) were the most widely used persuasion principles in vishing attacks, followed by liking, similarity and deception (L). These four persuasion principles occurred in a majority of vishing attacks, while commitment, reciprocation and consistency (C) did not. Further, certain sets of persuasion principles (i.e. authority, distraction, liking, similarity, and deception and social proof; , authority, commitment, reciprocation, and consistency, distraction, liking, similarity and deception, and social proof; and authority, distraction and social proof) were used more than others. It was noteworthy that despite their similarities, those sets of persuasion principles were implemented in different ways, and certain specific ways of implementing certain persuasion principles (e.g. vishers claiming to have authority over the victim) were quite rare. Originality/value To the best of authors’ knowledge, this study is the first to investigate how social engineers use persuasion principles during vishing attacks. As such, it provides important insight into how social engineers implement vishing attacks and lays a critical foundation for future research investigating the psychological aspects of vishing attacks. The present results have important implications for vishing countermeasures and education. 
    more » « less