Publication Date
| In 2026 | 0 |
| Since 2025 | 0 |
| Since 2022 (last 5 years) | 0 |
| Since 2017 (last 10 years) | 3 |
Descriptor
Author
| Baker, Elizabeth | 1 |
| Han, Jing | 1 |
| Iliadis, Andrew | 1 |
| Liao, Tony | 1 |
| Pedersen, Isabel | 1 |
| Reinicke, Bryan | 1 |
| Serapiglia, Anthony | 1 |
| Toothman, Callie | 1 |
Publication Type
| Journal Articles | 3 |
| Reports - Descriptive | 2 |
| Reports - Evaluative | 1 |
Education Level
| Higher Education | 2 |
| Postsecondary Education | 1 |
Audience
| Teachers | 1 |
Location
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Iliadis, Andrew; Liao, Tony; Pedersen, Isabel; Han, Jing – Journal of Communication Pedagogy, 2021
Machines produce and operate using complex systems of metadata that need to be catalogued, sorted, and processed. Many students lack the experience with metadata and sufficient knowledge about it to understand it as part of their data literacy skills. This paper describes an educational and interactive database activity designed for teaching…
Descriptors: Metadata, Databases, Learning Activities, Undergraduate Students
Serapiglia, Anthony – Information Systems Education Journal, 2018
The following is an applied database scenario based on a single season in the FIA Formula One (F1) World Championship of auto racing. This scenario builds database understanding and skills through data modeling, data acquisition, creation of a database schema through a database management system, query construction, and report creation. In the…
Descriptors: Database Management Systems, Database Design, Motor Vehicles, Competition
Reinicke, Bryan; Baker, Elizabeth; Toothman, Callie – Information Systems Education Journal, 2018
Professors teaching cyber security classes often face challenges when developing workshops for their students: How does one quickly and efficiently configure and deploy an operating system for a temporary learning/testing environment? Faculty teaching these classes spend countless hours installing, configuring and deploying multiple system…
Descriptors: Computer Security, Information Security, Computer Simulation, Workshops

Peer reviewed
