Uses of peer assessment in database teaching and learning

James Paterson, John Wilson, Petra Leimich

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Abstract

    This discussion paper introduces three very different methods and contexts for the use of peer assessment in introductory database classes, each of which is supported by different learning software tools. In the first case study, at Glasgow Caledonian University, Contributing Student Pedagogy is used, where students contribute to the learning of others through the collaborative creation of a bank of self-assessment questions. This is supported by the Peerwise software tool. Secondly, at the University of Strathclyde, students undertake formative assessment of others in providing feedback on an initial element of a larger coursework assessment. A number of virtual learning environments (VLEs) are capable of supporting this method through customisable discussion fora. Finally, at the University of Abertay Dundee, peer and self assessment are used in a group project to adjust the group grade for individual students. This is effected through the use of the WebPA software tool.
    Original languageEnglish
    Title of host publication Proceedings of the 27th British National Conference on Data Security and Security Data (BNCOD'10)
    EditorsL.M. MacKinnon
    PublisherSpringer-Verlag
    Pages135-146
    Number of pages12
    ISBN (Print)9783642257032
    DOIs
    Publication statusPublished - 2012

    Publication series

    NameLecture Notes in Computer Science
    PublisherSpringer Berlin Heidelberg
    Volume6121
    ISSN (Print)0302-9743

      Fingerprint

    Keywords

    • peer assesment
    • database teaching
    • contributing student pedagogy
    • self assesment
    • WebPA
    • PeerWise system
    • learning software

    Cite this

    Paterson, J., Wilson, J., & Leimich, P. (2012). Uses of peer assessment in database teaching and learning. In L. M. MacKinnon (Ed.), Proceedings of the 27th British National Conference on Data Security and Security Data (BNCOD'10) (pp. 135-146). (Lecture Notes in Computer Science ; Vol. 6121). Springer-Verlag. https://doi.org/10.1007/978-3-642-25704-9_17