Skip to main content
Log in

Customization of Curriculum Materials in Science: Motives, Challenges, and Opportunities

  • Published:
Journal of Science Education and Technology Aims and scope Submit manuscript

Abstract

Exemplary science instructors use inquiry to tailor content to student’s learning needs; traditional textbooks treat science as a set of facts and a rigid curriculum. Publishers now allow instructors to compile pieces of published and/or self-authored text to make custom textbooks. This brings numerous advantages, including the ability to produce smaller, cheaper text and added flexibility on the teaching models used. Moreover, the internet allows instructors to decentralize textbooks through easy access to educational objects such as audiovisual simulations, individual textbook chapters, and scholarly research articles. However, these new opportunities bring with them new problems. With educational materials easy to access, manipulate and duplicate, it is necessary to define intellectual property boundaries, and the need to secure documents against unlawful copying and use is paramount. Engineers are developing and enhancing information embedding technologies, including steganography, cryptography, watermarking, and fingerprinting, to label and protect intellectual property. While these are showing their utility in securing information, hackers continue to find loop holes in these protection schemes, forcing engineers to constantly assess the algorithms to make them as secure as possible. As newer technologies rise, people still question whether custom publishing is desirable. Many instructors see the process as complex, costly, and substandard in comparison to using traditional text. Publishing companies are working to improve attitudes through advertising. What lacks is peer reviewed evidence showing that custom publishing improves learning. Studies exploring the effect of custom course materials on student attitude and learning outcomes are a necessary next step.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  • Agrawal R, Haas P, Kiernan J (2003) Watermarking relational data: framework, algorithms and analysis. VLDB J. doi:10.1007/s00778-003-0097-x

  • Ahmed N, Natarajan T, Rao KR (1974) Discrete Cosine Transform. IEEE Trans Comput C23:90–93

    Article  Google Scholar 

  • American Association for the Advancement of Science (1989) Science for all Americans: a project 2061 report on literacy goals in science, mathematics, and technology. AAAS, Washington DC

  • American Association for the Advancement of Science (1993) Benchmarks for science literacy. Oxford University Press, New York

  • Anderson R, Petitcolas F (1998) On the limits of steganography. IEEE J Sel Areas Commun 16(4):474–481

    Article  Google Scholar 

  • Barg A, Blakley G, Kabatiansky G (2003) Digital fingerprinting codes: problem statements, constructions, identification of traitors. IEEE Trans Inf Theory 49(4):852–865

    Article  Google Scholar 

  • Bender W, Gruhl D, Morimoto N, Lu A (1996) Techniques for data hiding. IBM Syst J 35(3 & 4):313–336

    Article  Google Scholar 

  • Benjamin R, Wigand R (1995) Electronic markets and virtual value chains on the information superhighway. Sloan Manage Rev 36(2):62–72

    Google Scholar 

  • Bergin DA (1999) Influences on Classroom Interest. Educ Psychol 34:87–98

    Article  Google Scholar 

  • Bernstein B (1990) Class, codes, and control: The structuring of pedagogic discourse, vol 4. Routledge, London

    Book  Google Scholar 

  • Breakwell GM, Beardsell S (1992) Gender, parental and peer influences upon science attitudes and activities. Public Underst Sci 1(2):183–197

    Article  Google Scholar 

  • Cengage Learning (2010) Top ten reasons to try a Cengage Learning custom solution. Online: http://custom.cengage.comhttp://custom.cengage.com. Accessed October 5, 2010

  • Christopher MM, Thomas JA, Tallent-Runnels MK (2004) Raising the bar: Encouraging high level thinking in online discussion forums. Roeper Rev 26(3):166–171

    Article  Google Scholar 

  • CK12 (2010) CK12 FlexBooks. Online: www.ck12.org/flexbooks. Accessed on December 24, 2010

  • Collberg C, Thomborson C (2000). Watermarking, Tamper-Proofing, and Obfuscation Tools for Software Protection. Technical Report TR00-03, The Department of Computer Science, University of Arizona

  • Cox I, Miller M, Bloom J, Fridrich J, Kalker T (2007). Digital watermarking and steganography, 2nd edn, The morgan kaufmann series in multimedia information and systems

  • Cuban L, Kirkpatrick H, Peck C (2001) High access and low use of technologies in high school classrooms: Explaining an apparent paradox. Am Educ Res J 38(4):813–834

    Article  Google Scholar 

  • Deighton J (1984) The interaction of advertising and evidence. J Consum Res 11:763–770

    Article  Google Scholar 

  • Dinkelacker J (1996). Soapbox: knowledge object economy. Netscape Communications. Mountain View, Ca. USA. http://people.netscape.com/jamie/index.html

  • Duch B (2001) Problem-based learning in physics: the power of students teaching students. In: NSTA (ed) Practicing Science: The Investigative Approach in College Science Teaching. NSTA Press: National Science Teachers Association, Virginia

    Google Scholar 

  • Duffee L, Aikenhead G (1992) Curriculum change, student evaluation, and teacher practical knowledge. Sci Educ 76:493–506

    Article  Google Scholar 

  • Duschl RA (2000) Making the nature of science explicit. In: Millar J, Leach J, Osborne J (eds) Improving science education: the contribution of research. Open University Press, Philadelphia

    Google Scholar 

  • Dweck CS (1986) Motivational processes affecting learning. Am Psychol 41:1040–1048

    Article  Google Scholar 

  • Godwin-Jones R (2003) Blogs and wikis: Environments for on-line collaboration. Lang Learn Technol 7(2):12–16

    Google Scholar 

  • Gruhl D, Bender W, Lu A (1996) Echo hiding. In: Anderson Ross J (ed) Information hiding: First international workshop, Vol. 1174 of Lecture Notes in Computer Science. Isaac Newton Institute, Cambridge, England, Springer-Verlag, Berlin, Germany

    Google Scholar 

  • Hawkes L, Yasinsac A, Cline C (2000) An Application of Visual Cryptography to Financial Documents, Technical Report TR001001, Florida State University

  • Hewings A (1990) Aspects of the language of economics textbooks. In: Dudley-Evans T, Henderson W (eds) The language of economics: The analysis of economics discourse. Modem English Publications and the British Council, London, pp 29–43

    Google Scholar 

  • Hoch S, Ha Y (1986) Consumer learning: advertising and the ambiguity of product experience. J Consum Res 13(2):221–233

    Article  Google Scholar 

  • Hsu CT, Wu JL (1999) Hidden digital watermarks in images. IEEE Trans Image Process 8(1):58–68

    Article  Google Scholar 

  • International Electrotechnical Commission (1989) Geneva, Switzerland. Digital audio interface, IEC 60958

  • International Planning and Research Corporation (2001) Sixth annual BSA global software piracy study. http://www.bsa.org/resources/2001-05-21.55.pdf

  • Jones G, Howe A et al (2000) Gender differences in students’ experiences, interests, and attitudes towards science and scientists. Sci Educ 84:180–192

    Article  Google Scholar 

  • Kahn D (1967) The Codebreakers, The Story of Secret Writing. Macmillan, New York

    Google Scholar 

  • Katriel T, Sanders RE (1990) The meta-communicative role of epigraphs in scientific text construction. In: Simons HW (ed) Rhetoric in the human sciences. Sage, London, pp 183–194

    Google Scholar 

  • Kipper G (2004) Investigator’s Guide to Steganography. CRC Press, LLC

    Google Scholar 

  • Kiyavash, N. & Moulin, P. (2006). A framework for optimizing nonlinear collusion attacks on fingerprinting systems. Proc. of the Conference on Information Sciences and Systems (CISS)

  • Koulaidis V, Tsatsaroni A (1996) A pedagogical analysis of science textbooks: How can we proceed? Res Sci Edu 26(1):55–71

    Article  Google Scholar 

  • Krajcik J, Blumenfeld P, Marx RW, Soloway E (1994) A collaborative model for helping science teachers learn project-based instruction. Elem School J 94(5):483–498

    Article  Google Scholar 

  • Kuhn T (1962) The structure of scientific revolutions. University of Chicago Press, Chicago

    Google Scholar 

  • Kuhn T (1963) The function of dogma in scientific research. In: Crombie AC (ed) Scientific change. Heinemann, London, pp 347–369

    Google Scholar 

  • Lederman NJ (1992) Students’ and teachers’ conceptions of the nature of science: A review of the research. J Res Sci Teach 29(4):331–359

    Article  Google Scholar 

  • Lederman NG (2007) Nature of science: Past, present, and future. In: Lederman NG, Abell SK (eds) Handbook of Research in Science Education. Lawrence Erlbaum, New Jersey

    Google Scholar 

  • Lederman NG, Abd-El-Khalick F, Bell RL, Schwartz R (2002) Views of nature of science questionnaire: Toward valid and meaningful assessment of learner’s conceptions of nature of science. J Res Sci Teach 39(6):497–521

    Article  Google Scholar 

  • Lunetta VN, Hofstein A, Clough MP (2007) Learning and teaching in the school science laboratory: An analysis of research, theory, and practice. In: Lederman NG, Abell SK (eds) Handbook of Research in Science Education. Lawrence Erlbaum, New Jersey

    Google Scholar 

  • Macq BM, Quisquater JJ (1995) Cryptology for digital TV broadcasting. Proc IEEE 83:954–957

    Article  Google Scholar 

  • Marion A, Hacking E (1998) Educational publishing and the worldwide web. J Interact Med Edu 98(2):1–40

    Google Scholar 

  • Mason M (1990) Dancing on air: Analysis of a passage from an economics textbook. In: Dudley-Evans T, Henderson W (eds) The language of economics: The analysis of economics discourse. Modem English Publications and the British Council, London, pp 16–28

    Google Scholar 

  • McComas WF, Clough MP, Almazroa H (2000) The role and character of the nature of science in science education. In: McComas WF (ed) The nature of science in science education: Rationales and strategies. Kluwer, Dordrecht, The Netherlands, pp 41–52

    Google Scholar 

  • Miller, M.H. (2010). California law encourages digital textbooks by 2020. Chronicle of Higher Education. Online: http://chronicle.com/blogs/wiredcampus/california-law-encourages-digital-textbooks-by-2020/20526, Accessed on December 24, 2010

  • Myers G (1992) Textbooks and the sociology of scientific knowledge. Eng Spec Purp 11:3–17

    Article  Google Scholar 

  • Naor M, Shamir A (1995) Visual cryptography. In: De Santis A (ed) Advances in Cryptology—EuroCrypt ‘94, vol 950. Springer, Berlin, pp 1–12 Lecture Notes in Computer Science

    Google Scholar 

  • National Research Council (1996) National science education standards. National Academy Press, Washington DC

    Google Scholar 

  • National Research Council (2000) Inquiry and the national science education standards. National Academy Press, Washington DC

    Google Scholar 

  • Needham Harper and Steers (1985) 1985 NH & S Lifestyle Study, Chicago, IL 60601

  • NSTA (2010) SciLinks. Online: www.scilinks.org. Accessed December 24, 2010

  • Osborne J, Collins S, Ratcliffe M, Millar R, Duschl RA (2003) What “ideas-about-science” should be taught in school science? A Delphi study of the expert community. J Res Sci Teach 40(7):692–720

    Article  Google Scholar 

  • Peticolas FAP, Anderson RJ, Kuhn MG (1998) Attacks on copyright marking systems. In Second Workshop on Information Hiding, Portland, Oregon

  • PhET. (2010). Interactive Simulations. Online: www.phet.colorado.edu Accessed December 24, 2010

  • Popper KR (1959) The logic of scientific discovery. Harper & Row, New York

    Google Scholar 

  • Roth WM (1994) Experimenting in a constructivist high school physics laboratory. J Res Sci Teach 31:197–223

    Article  Google Scholar 

  • Samuelson P (1995) Copyright and digital libraries. Commun ACM, 38(4): 15–21, 110

    Google Scholar 

  • Sandoval WA (2005) Understanding students’ practical epistemologies and their influence on learning through inquiry. Sci Educ 89:634–656

    Article  Google Scholar 

  • Schneider B (1996) Applied cryptography. Wiley, New York

    Google Scholar 

  • Shepard L (2000) The role of assessment in a learning culture. Educ Res 29(7):4–14

    Google Scholar 

  • Speckler MD (2008) Vision in action: how custom publishing works in higher education. Pearson Custom Publishing, Boston

    Google Scholar 

  • Spohrer, J., Sumner, T. and Buckingham, S. (1998). Educational Authoring Tools and the Educational Object Economy: Introduction to this Special Issue from the East/West Group. Journal of Interactive Media in Education, 98 (10). http://www-jime.open.ac.uk/98/10

  • Stefik M (1997) Letting loose the light: igniting commerce in electronic publication. Internet Dreams: Archetypes, Myths, and Metaphors. The MIT Press, Cambridge, MA

  • Tobias S (1990) They’re not dumb, they’re different: stalking the second tier. Research Corporation, Tucson, Arizona

    Google Scholar 

  • Tobin K, McRobbie CJ (1996) Cultural myths as constraints to the enacted science curriculum. Sci Educ 80:223–241

    Article  Google Scholar 

  • Van Driel JH, Beijaard D, Verloop N (2001) Professional development and reform in science education: The role of teachers’ practical knowledge. J Res Sci Teach 38(2):137–158

    Article  Google Scholar 

  • Von Glasserfeld E (1987) Learning as a constructivist activity. In: Claude IJ (ed) Problems of representation in teaching and learning math. Lawrence Erlbaum Associates, Washington, D.C., pp 3–17

    Google Scholar 

  • Wallace J, Louden W (1992) Science teaching and teachers’ knowledge: Prospects for reform of elementary classrooms. Sci Educ 76:507–521

    Article  Google Scholar 

  • Wang Y, Moulin P (2007) Capacity and optimal collusion attack channels for gaussian fingerprinting games, Proc. IS&T/SPIE Symposium on Electronic Imaging—Conference on Security, Steganography, and Watermarking of Multimedia Contents IX, San Jose, Ca

Download references

Acknowledgments

We would like to thank Tom Freeman for inspiring this article. Questions resulting from his extensive experience with college teaching and textbook publishing, and his desire to innovate curriculum materials, helped drive home the need for this article. We would also like to thank Lloyd Barrow for his support, and two anonymous reviewers for their helpful comments and suggestions.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to William L. Romine.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Romine, W.L., Banerjee, T. Customization of Curriculum Materials in Science: Motives, Challenges, and Opportunities. J Sci Educ Technol 21, 38–45 (2012). https://doi.org/10.1007/s10956-010-9278-8

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10956-010-9278-8

Keywords

Navigation