Free Essay

Scamper Method

In: Business and Management

Submitted By cheapjimmy
Words 1162
Pages 5
“Manipulation is the brother of creativity.”
~Michael Michalko, Thinkertoys: A Handbook for Creative Thinking Techniques

RATIONALE
Looking for a new spin on an old idea?
Trying to figure out how to solve a problem by working smarter not harder?
Then the SCAMPER strategy may be the answer you are looking for to spark your own creativity, and the creativity of your students.
SCAMPER is a mnemonic acronym that provides a structured way to assist students and teachers with understanding creative problem solving and developing extension‐building activities based on prior ideas and processes (Hale‐Evans, 2006). First proposed by Alex
Osborne in 1953, this thinking strategy was further developed by Bob Eberle and noted in his
1971 book, SCAMPER: Games for Imagination Development. Eberle states that much as the word scamper suggests “running playfully about as a child”, the strategy SCAMPER may also evoke the need “to run playfully about in one’s mind in search of ideas” (Eberle, 1984).
Why is creative problem solving useful to teach? Assisting ourselves and our students’ to be creative and critical thinkers are key goals of any teacher or school. Yet, you may ask, why is
SCAMPER so useful? Creative problem solving strategies involve “a system, a method, a plan for dealing with perplexing situations” (Erberle, 1984). The SCAMPER technique offers a systematic and practical way to stimulate divergent thinking, imagination, originality, and intuition while scaffolding students’ creative thinking for independent use on other tasks and assignments.
(Glenn, 1997)

HOW TO USE THE STRATEGY The SCAMPER Process
First, consider the target or challenge.
What do you want to change, modify, or update? This could be something you have created yourself or something that was has been discovered or made by someone else. A target could be an object, an idea, a process, or just about anything that you want to update.

SCAMPER Acronym
Adapted (Michalko, 2006)
Each of the letters in the acronym SCAMPER stands for a stage in the process. They include the following elements:

S
C

A

M

P
E
R

Substitute

Substitutions is a trial‐and‐error method where you can try things out, see if it works, then try something different.
Combine
Combining involves synthesis, the process of combining previous ideas or things together to create something new.
Adapt
Think about what is already known about the problem and how others are solving it. Become aware of the process others are using.
Modify (also,
When you modify and alter something, you reflect
Magnify or Minify) on what is needed to support and make it better, greater, simpler, or even more complex.
Magnifying will concentrate on making things bigger, thicker, stronger, or more intense.
Minifying will concentrate on makings lighter, slower, less frequent, or reduced in some capacity.
Put to other uses Consider ways that the target can be used other than originally intended.
Eliminate (also,
To remove or omit part or all of a particular quality.
If using elaborate, to add more details.
Elaborate)
Reverse (also,
When using reverse, focus on the opposite or
Rearrange)
contrary meaning. When using rearrange, consider how the change of order or sequence would affect the target or challenge.

Next go through each letter of the SCAMPER acronym using helper questions.
Ask yourself questions for each SCAMPER letter in order to gain perspective and practice in creative thinking. Mnemonic
Meaning
S
Substitute





Helper Questions
What can I substitute?
Who can I substitute?
Who else?





What else?
What other place?
What other time, routine, or process?

C

Combine







Combine what?
Combine ideas?
Combine purposes?
Combine materials?
Can anything be blended or ensemble?

A

Adapt






How is the problem currently solved?
How can it be made more accommodating? How can it be more compatible?
How can it be more consistent?

M

Modify (also, Magnify or
Minify)








How can this be altered for the better?
What can I modify?
Modify color?
Modify shape?
Change motion or sound?
Change size, form, or taste?

P

Put to other uses






What else can this be used?
What are those uses?
Who else could use it?
How would they use it?

E

Eliminate (also, Elaborate)







What should I add or take away?
What should I simplify or enrich?
Should it be plain or fancy?
How can I do these?
How will this affect the target?

R

Reverse (also, Rearrange)



What other arrangements might be better? What would happen if I flipped the order?
Rearranged the sequence, layout, or pattern? Turned it over or backwards?





Reflection
Upon completion of a SCAMPER activity, take the time to reflect on what has been accomplished. You may want to write or journal your thoughts and think about the changes that were made to the original problem or challenge. Noting specific instances of creative thinking can provide a powerful understanding and use of critical thinking skills.
SCAMPER Organizer

Blank Template

Elementary Example

Secondary Example ASSESSMENT Evaluating your own or your student’s SCAMPER organizer is the perfect way to assess the

understanding of not only the use of the strategy but also the development creative thinking and problem solving skills. While SCAMPER can be taught explicitly, teachers will also want to consider using them in the combination with other projects and activities to increase a focus on problem solving and innovative thinking.

RESOURCES S.C.A.M.P.E.R http://www.slideshare.net/angelamaiers/scamper‐1217523 This SlideShare presentation provides visuals to go along with the SCAMPER elements.
I Can Be An Inventor, Too! http://utminers.utep.edu/kbolten/lessons/pdf/1st/soc_studies/1st_ss_inventor.pdf By participating in the problem solving process and creating their own invention, students will learn that anyone who has an idea for a new product can be an inventor. The students will use a notebook to record ideas and a creative thinking technique called S.C.A.M.P.E.R.
SCAMPER Random Question Tool http://litemind.com/scamper‐tool/ Use this tool to get a random SCAMPER question to spark new ideas.
SCAMPER Mind Map http://litemind.com/wp‐content/uploads/misc/litemind‐scamper‐reference.pdf Think of it as a handy one‐page reference you can use whenever you are stuck or just need a kick start to get your creative juices flowing.
SCAMPER
http://creatingminds.org/tools/scamper.htm
The authors of this site give details on when to use the strategy of SCAMPER.
SCAMPER
http://wwwfp.education.tas.gov.au/English/scamper.htm
SCAMPER helps students ask questions that require them to think "beyond the lines" of a text.
As such, it helps develop their critical thinking skills and supports them in constructing their own imaginative texts. It is a useful cooperative learning tool and a great stimulus for role play.

REFERENCES Eberle, B. (1984). Help! In solving problems creatively at home and school. Carthage, IL: Good
Apple, Inc.
Glen, R. (1997). Scamper for student creativity. Education Digest, 62(6), 67–68.

Michalko, M. (2006). Thinker Toys. A handbook of creative‐thinking techniques. Berkeley, CA:
Ten Speed Press.

Similar Documents

Premium Essay

Scamper & Bell Method

...The Bell Method This is a visual display made by Chameleon Display for Louis Vuitton’s fall display window in London 2010. One could really like how simple they keep it, yet glamorous. It’s still the feeling of being expensive with the pink Chesterfield pattern and gold frames, gold background, and the golden legs and tail on the ostrich. The ostrich is very creatively made by going “through” the cage and ground and up on the outside. It kind of makes one feel like they’re expressing that they’re thinking outside of the box. Not everyone would think this window is perfect, it looks too much like a set-up, and there are no emotions like in Prada’s display. One could also think they shouldn’t be hiding the hat underneath her skirt, maybe they’d be better off putting it on her head when they are having it in the display anyway. And the mannequin should be in another color because it’s too alike the gloves on her leg. What someone maybe would like to add in this window is a couple of golden ostrich eggs, just to make a bit more of it. It is easy to see how one can be a fan of this window, especially with these modifications. I couldn’t find out who made this display, but it’s for Prada’s fall display window in London 2010. One would probably also like the simplicity in this display, but it doesn’t seem as luxurious as Louis Vuitton’s window. What one could like about this window is the pictures in the background. The intimacy one the photographs makes the display come...

Words: 341 - Pages: 2

Free Essay

The Journey of a Music Teacher

...Riki Shafier Professor Kimberlee Hoftiezer SOS-110 24 January 2016 Music Education: A Personal Journey For the past few years I have been taking different courses, learning many things and preparing myself for the life ahead of me.  As a soon-to-be college graduate, the future beckons, bright and inviting. There are endless career opportunities that await those who have put forth the effort to receive an education. The career goals toward which I am currently preparing are to become a highly sought-after piano teacher and piano-teacher trainer with a full roster of students, complete with a waiting list for those who wish to join my studio. I plan to build a fully- developed business model for my piano studio. This plan will include curricula for various ages and skill levels, as well as plans for accommodating specific needs of individual students. The plan will also have processes for the acceptance and rejection of potential students, registration and payment options, and online booking opportunities. This will be optimized through the use of technology. Technology, in all its many forms, has transformed the world we live in, and I anticipate that it will prove to be of great use to me in the development of my career goals. In the short-term, I will be able to train under experienced piano educators and teacher-trainers via Skype lessons and workshops, and use various training software programs to improve my technical and teaching skills. Additionally, I plan to...

Words: 849 - Pages: 4

Free Essay

Lol Girl

...Blue Pelican Java by Charles E. Cook Version 3.0.5h Copyright © 2004 - 2008 by Charles E. Cook; Refugio, Tx (All rights reserved) 1-1 “Blue Pelican Java,” by Charles E. Cook. ISBN 1-58939-758-4. Published 2005 by Virtualbookworm.com Publishing Inc., P.O. Box 9949, College Station, Tx 77842, US. ©2005, Charles E. Cook. All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, recording or otherwise, without the prior written permission of Charles E. Cook. Manufactured in the United States of America. Preface You will find this book to be somewhat unusual. Most computer science texts will begin with a section on the history of computers and then with a flurry of definitions that are just “so many words” to the average student. My approach with Blue Pelican Java is to first give the student some experience upon which to hang the definitions that come later, and consequently, make them more meaningful. This book does have a history section in Appendix S and plenty of definitions later when the student is ready for them. If you will look at Lesson 1, you will see that we go right to work and write a program the very first day. The student will not understand several things about that first program, yet he can immediately make the computer do something useful. This work ethic is typical of the remainder of the book. Rest assured that full understanding...

Words: 31284 - Pages: 126

Premium Essay

Research Paper

...Researching Variable Naming Rules Visual Basic You must use a letter as the first character. You can't use a space, period (.), exclamation mark (!), or the characters @, &, $, # in the name. Name can't exceed 255 characters in length. Generally, you shouldn't use any names that are the same as the functions, statements, and methods in Visual Basic. You end up shadowing the same keywords in the language. To use an intrinsic language function, statement, or method that conflicts with an assigned name, you must explicitly identify it. Precede the intrinsic function, statement, or method name with the name of the associated type library. For example, if you have a variable called Left, you can only invoke the Left function using VBA.Left. You can't repeat names within the same level of scope. For example, you can't declare two variables named age within the same procedure. However, you can declare a private variable named age and a procedure-level variable named age within the same module. Python  Must begin with a letter (a - z, A - B) or underscore (_)  Other characters can be letters, numbers or _  Case Sensitive  Can be any (reasonable) length  There are some reserved words which you cannot use as a variable name because Python uses them for other things.- See more at: http://www.w3resource.com/python/python-variable.php#sthash.5AXuVlWN.dpuf Java Variable names are case-sensitive. A variable's name can be any legal identifier — an unlimited-length...

Words: 724 - Pages: 3

Free Essay

Sd2720 Module 3 Working with Methods

...SD2720 Module 3 Working with Methods Click Link Below To Buy: http://hwcampus.com/shop/sd2720-module-3-working-with-methods/ SD2720 Module 3 Working with Methods and Encapsulation Lab 3.1 Creating a Method In this lab, you will complete two tasks related to Java methods. The tasks performed in this lab will help you use method overloading and understand ambiguous overloading. Task 1 Write a program for swapping two numbers. In the program: • Create a method by passing primitive values as parameters for checking the result. • Create another method by passing object references as parameters for checking the result. • Identify the difference between two outputs. Task 2 Write a Java program that accepts 10 numbers from the user and finds the greatest and smallest numbers among them. Create two methods, findGreatest() and findSmallest(), to find the greatest and smallest numbers, respectively. Task 3 Write a Java program that implements the following methods: • getNumbers()to accept two numbers from the user. • calculateHCD()to calculate the highest common divisor (HCD) of the two numbers. Please note that it should be a recursive function. • calculateLCM()to calculate the least common multiple (LCM) of the two numbers. Display()to display HCD and LCM. Submission Requirements: Compress your Java project folder and responses in a Microsoft Word document into one zipped folder and submit it to the instructor. Evaluation Criteria:...

Words: 384 - Pages: 2

Free Essay

Java Programming

...A Programmer’s Guide to Java™ SCJP Certification Third Edition This page intentionally left blank A Programmer’s Guide to Java™ SCJP Certification A Comprehensive Primer Third Edition Khalid A. Mughal Rolf W. Rasmussen Upper Saddle River, New Jersey • Boston • Indianapolis • San Francisco New York • Toronto • Montreal • London • Munich • Paris • Madrid Capetown • Sidney • Tokyo • Singapore • Mexico City Many of the designations used by manufacturers and sellers to distinguish their products are claimed as trademarks. Where those designations appear in this book, and the publisher was aware of a trademark claim, the designations have been printed with initial capital letters or in all capitals. The authors and publisher have taken care in the preparation of this book, but make no expressed or implied warranty of any kind and assume no responsibility for errors or omissions. No liability is assumed for incidental or consequential damages in connection with or arising out of the use of the information or programs contained herein. The publisher offers excellent discounts on this book when ordered in quantity for bulk purchases or special sales, which may include electronic versions and/or custom covers and content particular to your business, training goals, marketing focus, and branding interests. For more information, please contact: U.S. Corporate and Government Sales (800) 382-3419 corpsales@pearsontechgroup.com For sales outside the United...

Words: 15086 - Pages: 61

Free Essay

Visual Basic

...Visual Basic – Messages and data input/output Introduction One way for a user to communicate with a procedure is via a dialogue box. The easiest way to do this in VB is to use one of the pre-defined ones. VB has two kinds, a Message box and an Input box. Message box The MsgBox function displays a message, waits for the user to click a button and returns a value indicating which button has been chosen. The simplest MsgBox contains only a message string and an OK button. The general syntax is MsgBox(prompt [,buttons] [,title]), where the quantities within [] are optional arguments, with prompt: string expression displayed in the message (max length 1024 characters) buttons: numerical expression that is sum of values specifying the type of buttons to display, title: string expression displayed in the title bar. Some of the button values are given below. (For a full list see the Help file). Value Constant Display 0 vbOKOnly OK button only 1 vbOKCancel OK and Cancel buttons 3 vbYesNoCancel Yes, No and Cancel buttons 4 vbYesNo Yes and No buttons 32 vbQuestion Query icon 48 vbExclamation Warning message icon 0 vbDefaultButton1 First button is default 256 vbDefaultButton2 Second button is default 512 vbDefaultButton3 Third button is default The value returned by the MsgBox function depends on the button pressed. Some values are listed below. Button selected Value Constant OK 1 vbOK Cancel 2 vbCancel Yes 6 vbYes No 7 vbNo The MsgBox function can be used as a simple debug tool. To...

Words: 930 - Pages: 4

Premium Essay

Cis170 Final Exam Guide

.... MC 1. (TCO 13) Text files are what type of file? 4 Points : Sequential Random access Binary Consecutive Instructor Explanation: Lecture / Chapter 13 Edit 3. MC 1. Delete (TCO 13) To create an input file object, what kind of type would you use? 4 Points : ifstream ofstream fstream instream Instructor Explanation: Lecture / Chapter 13.1 Introduction Edit 4. MC 1. Delete (TCO 13) To create an output file object, what kind of type would you use? 4 Points : ifstream ofstream fstream instream Instructor Explanation: Lecture / Chapter 13.1 Introduction Edit 5. MC 1. Delete (TCO 13) The header file that defines the classes for processing and manipulating files is called the _____. 4 Points : Instructor Explanation: Chapter 13.1 Introduction Edit 6. 7. 8. MC 2. Delete (TCO 13) What do the following statements accomplish? ifstream theFile; theFile.open( myFile.txt , ios::in); 4 Points : Opens myFile in read mode Opens myFile in append mode Creates an empty file named myFile Opens a file in input mode to write to Instructor Explanation: Lecture / Chapter 13 Edit 9. MC 2. Delete (TCO 13) What do the following statements accomplish? ofstream theFile; theFile.open( myFile.txt , ios::out); 4 Points : Opens myFile in read mode Opens myFile in append mode Creates an empty file named myFile Opens a file in input mode to write to Instructor Explanation: Lecture / Chapter 13 Edit...

Words: 2540 - Pages: 11

Premium Essay

Pt1420 Unit 2 Research

...Kelli Okuly PT1420 Unit 2 Research Assignment 12-5-2014 Variable naming conventions vary from program to program. In Visual Basic the variable must begin with a letter and you cannot use a space, period (.), or the characters !, @, &, $, # in the name. Visual Basic variable names must be under 255 characters long. You shouldn't use any names that are the same as the functions, statements, and methods in Visual Basic. You end up shadowing the same keywords in the language. To use a basic language function, statement, or method that conflicts with an assigned name, you must explicitly identify it. Precede the fundamental function, statement, or method name with the name of the associated type library. For example, if you have a variable called “Left”, you can only use the “Left” function using “VBA.Left”. In Python, variables must begin with a letter or underscore (_). Other characters can be letters, numbers, or the underscore. Python variables are case sensitive and can be any length, within reason. There are several keywords in Python that are reserved for other functions and cannot be used as variables. For example; print, def, from, not, and return. Variables in Java are referred to as Identifiers. In Java the variable must begin with a letter, an underscore, or a dollar sign ($) although a letter is typically what is used. The other characters may be letters or numbers, no spaces or special characters are allowed. Java identifiers can be any length within...

Words: 405 - Pages: 2

Free Essay

Case Study

...Layout Planning Models, Algorithms and computerized l h d d Layout Planning References 1. Tompikins et al., Facility Planning, 3rd edition, John Wiley & Sons Ltd., Singapore,2003. i 2003 2. Richard L.Francis et al., Facility Layout and Location: an analytical d diti approch, 2nd edition, P ti H ll of I di Ltd 2002 h Prentice Hall f India Ltd., 2002. 3. Dr-Ing. Daniel Kitaw, Industrial Management and Engineering Economy 4-1 Introduction • The generation of layout alternatives is a critical step in the facilities planning process, since th l i th f iliti l i i the layout t selected will serve to establish the physical relationships between activities. 4-2 CONT’D • Which comes first, the material handling system or the facility layout?  Centralized versus decentralized storage of work in i process(WIP), t li (WIP) tooling, and supplies d li  Fixed path versus variable path handling  The degree of automation used in handling  The type of level of inventory control physical control, control, and computer control of materials. 4-3 Layout procedures • A number of different procedures have been developed to id the facilities l t aid th f iliti planner i d i i l in designing layouts. t  Construction type  Improvement type 4-4 Apples plant layout procedure • • • • • • • • • • Procure th b si d t P the basic data Analyze the basic data Design the productive process Plan the material flow pattern Consider the handling l h dli plan general material •...

Words: 2488 - Pages: 10

Free Essay

Fundamentals

...Assignment 1: Fundamentals of Effective Communication in the Workplace Professor BUS 100 – Introduction to Business May 13, 2014 I work for a defense attorney, and I experience effective communication on a daily basis via email with co-workers and clients. However, I do feel that face-to-face communication is highly effective and important. With face-to-face meeting, the co-workers and clients directly receive the message, and feedback is instantly provided. Resolutions can be made easier during a face-to-face meeting rather than via email or phone conversations. About six months ago I was part of a financial turn around that was a result of successful face-to-face communication. The firm’s office that I work for is called McCallum Law Offices, and my position in the department is senior paralegal and office manager. We work closely with the justice department and handling the financial and critical situations of our client’s lives. A main part of my job was to reconcile financial reports, and have the senior attorney approve them, and then submit them for reimbursement. We were having major issues with the financials and how they accounts were being handled. As with most offices now communication is usually handled via e-mail. When you start having issues like we were, there is only one way to handle this and that is for everyone to be face to face. So if there are any issues they can be resolved immediately. Attorney offices can become very hectic...

Words: 526 - Pages: 3

Free Essay

Nbgnhgbhg

...C# Development Rob Miles Edition 1.1 October 2009 Department of Computer Science University of Hull i Contents Introduction...................................................................................................................... 11 Welcome ............................................................................................................. 11 Reading the notes................................................................................................ 11 Getting a copy of the notes ................................................................................. 11 Computers 12 An Introduction to Computers .......................................................................................... 12 Hardware and Software ...................................................................................... 12 Data and Information ........................................................................................................ 13 Data Processing .................................................................................................. 13 Programmer’s Point:At the bottom there is always hardware ............................. 14 Programming Languages 15 What is Programming? ..................................................................................................... 15 From Problem to Program .................................................................................. 15 Programmer’s Point:The specification must always be there...

Words: 63379 - Pages: 254

Premium Essay

Craked. Com - 6 Ways Societ Brainwashes You

...Craked.com – 6 ways Society Brainwashes You In this article, 5 different methods of social engineering are explored. The first is “Chanting Slogans”. This is considered a method of brainwashing because when chanting a repetitive slogan, the repetitive task keeps your brain busy, instead of considering what has just been said by the analytical part of your brain. This is often used in political stump speeches and conventions with live audiences. The second method mentioned is “Slipping things into your Subconscious”. A sly technique used by headline writers to place and reinforce a certain idea in the reader’s head without them noticing. Also called “Source Amnesia” this method exploits the brain’s weak capacity to remember things, but not remember the context in which we learned them. The third process of social engineering the author considered was “Keeping You in Line with Shame”. This involves the “appeal to ridicule fallacy” where the speaker ridicules his/or her opponent’s point, and thus the listener is more likely to agree, in fear of being on the side of the ridicule. The fourth method analyzed is called “Black and White choices”. The psychology behind this is that when people are in debate, they paint an idea or person or place as all bad or all good. Therefore, people are less likely to consider the multiple complex layers of an idea if it is wholly labeled as “bad”. The last and final method is “Us versus Them”. This is the idea that humans naturally form groups within...

Words: 299 - Pages: 2

Free Essay

Object-Oriented Programming Mini Projects

...marks) In this project, you will be creating new classes that are derived from a class called BankAccount. A checking account is a bank account and a savings account is a bank account as well. This sets up a relationship called inheritance, where BankAccount is the superclass and CheckingAccount and SavingsAccount are subclasses. This relationship allows CheckingAccount to inherit attributes from BankAccount (like owner, balance, and accountNumber), but it can have new attributes that are specific to a checking account, like a fee for clearing a check. It also allows CheckingAccount to inherit methods from BankAccount, like deposit, that are universal for all bank accounts. You will write a withdraw method in CheckingAccount that overrides the withdraw method in BankAccount, in order to do something slightly different than the original withdraw method. You will use an instance variable called accountNumber in SavingsAccount to hide the accountNumber variable inherited from BankAccount. The UML diagram for the inheritance relationship is as follows: [pic] Task #1 Extending BankAccount 1. Copy the files AccountDriver.java and BankAccount.java from the Blackboard. BankAccount.java is complete and will not need to be modified. 2. Create a new class called CheckingAccount that extends BankAccount. 3. It should contain a static constant FEE that represents the cost of clearing one check. Set it equal to 15 cents. ...

Words: 1078 - Pages: 5

Free Essay

Java Programming

...occur in the protected code. Encapsulation is important in java due to its flexibility and it is easy to change with new requirement, the class has total control over what is stored in its field, one part of the code can be changed and the rest of the would not be affected and also encapsulation is useful since it is easy to maintain. Both the mutator and accessor method are used to enforce data encapsulation where their jobs is returning and setting the value state of an object. Mutator method is used to set the private field value. It is denoted by using set at the beginning of the method name. Example of a mutator method would be public void setSchool (String school). Accessor method is used to return the private field value. It is denoted by using get at the beginning of the method name. An example of accessor method would be public String getFirstName () Implicit parameter is the object on which the method is invoked whereas explicit parameter is the parameter of the method other than the object the method is invoking and is enclosed in a parentheses. To access an explicit parameter variable inside the method refer the parameter variable by its name. To illustrate what is an implicit and explicit parameter we use the following code: Person p = newPerson() p.name(“Chris”) chris is the explicit parameter while the obkect p is the implicit parameter. A constructor is used to create an object of the class that is in by initializing all the variables and also creates...

Words: 498 - Pages: 2