skip to main content

Attention:

The NSF Public Access Repository (NSF-PAR) system and access will be unavailable from 11:00 PM ET on Thursday, October 10 until 2:00 AM ET on Friday, October 11 due to maintenance. We apologize for the inconvenience.


Title: Using a comic book to engage students in a cryptology and cybersecurity curriculum
This article describes the use of a comic book to anchor a cryptology and cybersecurity curriculum for upper elementary students. Perceptions about the comic book from 138 students across 11 afterschool programs were examined using survey, classroom observation, and interviews. Data analysis revealed that the comic book created a “macrocontext” to situate learners in an exciting adventure about cryptology and cybersecurity. Students found the characters relatable, and their perceptions were tightly tied to other components of the curriculum. Reading the word bubbles was chal- lenging at first, but got easier over time. This study illustrates how comic books can anchor unfamiliar STeM content for younger learners.  more » « less
Award ID(s):
1849768
NSF-PAR ID:
10399820
Author(s) / Creator(s):
; ; ; ; ; ; ;
Date Published:
Journal Name:
Journal of Research on Technology in Education
ISSN:
1539-1523
Page Range / eLocation ID:
1 to 19
Format(s):
Medium: X
Sponsoring Org:
National Science Foundation
More Like this
  1. This convergent mixed method study investigates learner engagement during a blended, transmedia curriculum called CryptoComics which is designed to teach 3rd-5th graders about cryptology and cybersecurity. Curriculum design is presented through the lens of four engagement facilitators: (1) anchoring the curriculum with a comic book, (2) blending digital and unplugged media, (3) supporting situational interest via a transmedia narrative and (4) designing for social-cultural relevance. Latent profile analysis is used to develop profiles of learner engagement using quantitative indicators of cognitive and emotional engagement collected across 204 students at 13 implementation sites in the Eastern U.S. Qualitative indicators of engagement include teacher weekly check-ins submitted by 17 teachers working at the 13 implementation sites, student interviews, and classroom observations of 26 students participating in the curriculum at two local sites. Quantitative and qualitative results converge to suggest the majority of the students participating in the curriculum were highly engaged cognitively and emotionally. Qualitative data (1) suggest some third graders may be less cognitively engaged due to challenging content, (2) provide evidence for how design of the blended, transmedia curriculum supported, and some cases hindered, engagement, (3) highlight the importance of transitions between blended learning components in facilitating engagement and (4) uncover questions regarding one of the quantitative measures selected as an indicator of cognitive engagement. 
    more » « less
  2. Through the artistic planning tool known to comic book artists and animators as storyboarding, students will embark on comic book–style adventures to plan, describe, and visualize the complex life of genes through the non-Mendelian concept of epistasis. Using storyboard templates, conceptual layouts, sketch booking, and cut-out genetic elements, students will construct their interpretation of the gene-gene interactions of epistasis. The incomplete story of the epistasis of human eye color will serve as the theme for this storyboard, which will also become its own assessment tool, inviting educators into a realm of a true STEAM experience. 
    more » « less
  3. Cybersecurity expertise continues to be relevant as a means to confront threats and maintain vital infrastructure in our increasingly digitized world. Public and private initiatives have prioritized building a robust and qualified cybersecurity workforce, requiring student buy-in. However, cybersecurity education typically remains siloed even within computer and information technology (CIT) curriculum. This paper's goal is to support endeavors and strategies of outreach to encourage interest in cybersecurity. To this end, we conducted a survey of 126 CIT students to investigate student perceptions of cybersecurity and its major crosscutting concepts (CCs). The survey also investigates the prevalence of preconceptions of cybersecurity that may encourage or dissuade participation of people from groups underrepresented in computing. Regardless of prior learning, we found that students perceive cybersecurity as a relatively important topic in CIT. We found student perspectives on conceptual foundations of cybersecurity were significantly different (p < .05) than when simply asked about "cybersecurity," indicating many students don't have an accurate internal construct of the field. Several previously studied preconceptions of cybersecurity were reported by participants, with one misconception - that cybersecurity "requires advanced math skills" - significantly more prevalent in women than men (p < .05). Based on our findings, we recommend promoting cybersecurity among post-secondary students by incorporating elements of cybersecurity into non-cybersecurity CIT courses, informed by pedagogical strategies previously used for other topics in responsible computing. 
    more » « less
  4. Artificial intelligence (AI) and cybersecurity are in-demand skills, but little is known about what factors influence computer science (CS) undergraduate students' decisions on whether to specialize in AI or cybersecurity and how these factors may differ between populations. In this study, we interviewed undergraduate CS majors about their perceptions of AI and cybersecurity. Qualitative analyses of these interviews show that students have narrow beliefs about what kind of work AI and cybersecurity entail, the kinds of people who work in these fields, and the potential societal impact AI and cybersecurity may have. Specifically, students tended to believe that all work in AI requires math and training models, while cybersecurity consists of low-level programming; that innately smart people work in both fields; that working in AI comes with ethical concerns; and that cybersecurity skills are important in contemporary society. Some of these perceptions reinforce existing stereotypes about computing and may disproportionately affect the participation of students from groups historically underrepresented in computing. Our key contribution is identifying beliefs that students expressed about AI and cybersecurity that may affect their interest in pursuing the two fields and may, therefore, inform efforts to expand students' views of AI and cybersecurity. Expanding student perceptions of AI and cybersecurity may help correct misconceptions and challenge narrow definitions, which in turn can encourage participation in these fields from all students. 
    more » « less
  5. Existing research has primarily delved into the realm of computer science outreach aimed at K-12 students, with a focus on both informal and non-formal approaches. However, a noticeable research gap exists when it comes to cybersecurity outreach tailored specifically for underserved secondary school students. This article addresses this void by presenting an iterative pilot of a cybersecurity curriculum. This innovative curriculum integrates a one-week summer camp and a series of 1.5-hour workshops designed to provide students with a comprehensive understanding of cybersecurity. The overarching goal of this approach is to foster wider participation in the field of computing, particularly in the realm of cybersecurity. This research aims to spark interest among students who may currently face limited access to computing resources. The cybersecurity lessons featured in this curriculum adhere to the standards set by Cyber.org, an organization supported by the Cybersecurity and Infrastructure Agency (CISA). Key topics covered include networking, the confidentiality, integrity, and availability (CIA) triad, and operating system security. This paper not only outlines the process of creating and implementing these cybersecurity lessons but also emphasizes the iterative refinement process they underwent. The discussion primarily revolves around the valuable insights gained from implementing this curriculum at two prominent public universities in the eastern United States. By bridging the research gap and focusing on practical applications, this initiative contributes significantly to the broader discourse on cybersecurity education for underserved secondary school students. 
    more » « less