skip to main content
US FlagAn official website of the United States government
dot gov icon
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
https lock icon
Secure .gov websites use HTTPS
A lock ( lock ) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.


Search for: All records

Award ID contains: 1849768

Note: When clicking on a Digital Object Identifier (DOI) number, you will be taken to an external site maintained by the publisher. Some full text articles may not yet be available without a charge during the embargo (administrative interval).
What is a DOI Number?

Some links on this page may take you to non-federal websites. Their policies may differ from this site.

  1. This article describes the use of a comic book to anchor a cryptology and cybersecurity curriculum for upper elementary students. Perceptions about the comic book from 138 students across 11 afterschool programs were examined using survey, classroom observation, and interviews. Data analysis revealed that the comic book created a “macrocontext” to situate learners in an exciting adventure about cryptology and cybersecurity. Students found the characters relatable, and their perceptions were tightly tied to other components of the curriculum. Reading the word bubbles was chal- lenging at first, but got easier over time. This study illustrates how comic books can anchor unfamiliar STeM content for younger learners. 
    more » « less
  2. This convergent mixed method study investigates learner engagement during a blended, transmedia curriculum called CryptoComics which is designed to teach 3rd-5th graders about cryptology and cybersecurity. Curriculum design is presented through the lens of four engagement facilitators: (1) anchoring the curriculum with a comic book, (2) blending digital and unplugged media, (3) supporting situational interest via a transmedia narrative and (4) designing for social-cultural relevance. Latent profile analysis is used to develop profiles of learner engagement using quantitative indicators of cognitive and emotional engagement collected across 204 students at 13 implementation sites in the Eastern U.S. Qualitative indicators of engagement include teacher weekly check-ins submitted by 17 teachers working at the 13 implementation sites, student interviews, and classroom observations of 26 students participating in the curriculum at two local sites. Quantitative and qualitative results converge to suggest the majority of the students participating in the curriculum were highly engaged cognitively and emotionally. Qualitative data (1) suggest some third graders may be less cognitively engaged due to challenging content, (2) provide evidence for how design of the blended, transmedia curriculum supported, and some cases hindered, engagement, (3) highlight the importance of transitions between blended learning components in facilitating engagement and (4) uncover questions regarding one of the quantitative measures selected as an indicator of cognitive engagement. 
    more » « less
  3. K-12 teachers and students are vulnerable to cybersecurity attacks and mostly ill-prepared to deal with them. The CO- VID-19 pandemic has only increased these risks because of the reliance on digital technology in education and increased free time young children and adolescents spend online. Simultaneously, the U.S. is facing an extreme shortage of cybersecurity professionals. Given the rise of cyberattacks and the need for cybersecurity professionals, a concerted effort to prepare preservice teachers to integrate cybersecurity education across the K-12 curriculum is needed. In our vision for 2025, all preservice teachers across the country are prepared to integrate age-appropriate cybersecurity concepts, skills and career awareness in the curriculum regardless of their content area or grade level specialization. We propose a repository of stand-alone activities and full curricula developed through collaboration among K-12 educators, teacher educators, and cybersecurity experts that could be adopted across teacher education programs. We use the elementary grades as a con- text for providing examples of some activities that might be included in the repository. We also provide recommendations for developing such a repository and for individual teacher educators who want integrate cybersecurity education in pre-service teacher education right now. 
    more » « less