Student Evaluation of Teaching Program: Frequently Asked Questions
FAQ Heading link
-
The method to evaluate teaching assistants (TA’s) is decided by each department.
The method to evaluate teaching assistants (TA’s) is decided by each department.
- Some Departments may choose to evaluate a teaching assistant on the same form in a separate section just for TAs.
- Other departments may choose to have the teaching assistant conduct his/her own evaluation through a different CRN or class section.
- A department may elect to use a separate TA questionnaire evaluation for all TA led sections (CRN driven).
-
The Office for Faculty Affairs offers “module evaluations.”
The Office for Faculty Affairs offers “module evaluations.” These evaluations are set up for multi-instructor courses. When module evaluations are used, students only have to complete one evaluation with a separate section for each instructor (rather than a completely separate evaluation for each instructor). Each instructor will only receive their own evaluation results. This option is available when specifically requested by the departments. Please contact the Office for Faculty Affairs for more information.
-
Students receive an email invitation
Students receive an email invitation, inviting them to complete the evaluation for your course. We have chosen this approach because it is the most confidential, practical and accessible manner for our students.
-
UIC email is used as the primary tag to identify participating students during our data extraction.
UIC email is used as the primary tag to identify participating students during our data extraction. It is the most reliable method for reaching our students, since every UIC student is provided with a UIC email address. There is no way to tailor the system so students may select a preferred method of delivery. Please see the following for a more detailed explanation.
Non-UIC Email Accounts – Our course evaluation server is automated and derives its data from a central repository, there is no possibility to tailor the system so that certain students may choose a non-UIC email address.
Text Messaging – Not all students provide campus with their personal cell phone numbers nor are they required to do so. For this reason, cell phone numbers are not part of our data extraction and we do not send the invitations via text.
Bluestem Login to a Central Website – Confidentiality of the system is maintained via email delivery of a link and unique password so each student may access the course evaluation system anonymously. If we allowed students to access a central website with their UIC bluestem login ID and password, we would be able to identify the students and we would no longer comply with confidentiality requirements.
-
Campus controls when students access the system for practical reasons and for procedural regularity.
Campus controls when students access the system for practical reasons and for procedural regularity. Practically, the only way to provide students with passwords to access the system is by sending the passwords to them directly via email. Because UIC is a large campus, it is not feasible for us to distribute the passwords to students via slips of paper or other individualized means. Procedurally, it is important for all faculty to follow the course evaluation timeline set by campus as closely as possible for their courses to maintain uniformity across courses.