Incorporating Cyber Principles into Middle and High School Curriculum
Keywords:
cyber security, professional development, cyber citizens, cyber literacy, high schoolAbstract
Although many practicing teachers have not experienced teacher preparation programs that teach cyber security (Pusely & Sadera, 2011) or are familiar with cyber principles (Author), embedding these ideas into instruction in a variety of content areas is essential for promoting cyber literacy and citizenship. This study explores a professional development program that provided middle and high school teachers across disciplines with opportunities to explore, first as learners and then as educators, cyber citizenship and programming concepts with explicit connections to the cybersecurity principles and concepts. Participating teachers experienced inquiry-based learning, focused classroom discourse, and collaborative learning that centered on GenCyber Cybersecurity First Principles and GenCyber Cybersecurity Concepts (GenCyber, 2019). Results indicated the professional development enabled teachers to iteratively reflect on best practices in cyber education while learning and applying the content of GenCyber Principles within the context of their own field of study.
Downloads
References
Alfieri, L., Brooks, P.J., Aldrich, N.J., & Tenenbaum, H.R. (2011). Does discovery-based instruction enhance learning? Journal of Educational Psychology, 103, 1-18.
Creswell, J. W. (2012). Qualitative inquiry & research design: Choosing among five approaches (4th ed.). Thousand Oaks, CA: Sage.
(Bamford, A. (2005). Cyber-bullying: [Students as young as eight are describing cases of cyber-bullying, cyber-stalking and virtual teasing.]. Classroom, 1, 18-19.
GenCyber, 2019 GenCyber CPF. (2019). Retrieved July 14, 2020, from https://www.gen-cyber.com/proposals/rfp/gc-2019/
International Society for Technology in Education. (2000). ISTE national educational technology standards (NETS). Eugene, OR: International Society for Technology in Education.
Keselman, A. (2003). Supporting inquiry learning by promoting normative understanding of multivariable causality
Journal of Research in Science Teaching, 40, 898-921.
Kessel Schneider, S., O’Donnell, L., & Smith, E. (2015). Trends in cyberbullying and school bullying victimization
in a regional census of high school students, 2006–2012. Journal of School Health, 85, 611–620.
Konak, A. (2018). Experienctial learning builds cybersecurity self –efficacy in K-12 students. Journal of
Cybersecurity Education, Research and Practice, 1(6), 1-16.
Levin, Douglas A. (2020). “The State of K-12 Cybersecurity: 2019 Year in Review.” Arlington, VA: EdTech
Strategies, LLC/The K-12 Cybersecurity Resource Center. Available online at:
https://k12cybersecure.com/year-in-review/
Newman, L. H. (2020, June 1). Schools already struggled with cybersecurity. Then came Covid-19. Wired.
https://www.wired.com/story/schools-already-struggled-cybersecurity-then-came-covid-19/
National Science Foundation (NSF). (2020). Cybersecurity: Tech, tools and training to safeguard the future.
https://www.nsf.gov/news/special_reports/cybersecurity/index.jsp
Marshall, J. C., Smart, J. & Horton, R. M. (2010). The design and validation of equip: An instrument to
assess inquiry-based instruction. International Journal of Science and Mathematics Education, 8, 299–321. https://doi.org/10.1007/s10763-009-9174-y
Pólya, G. (1945). How to solve it: A new aspect of mathematical method. Princeton, N.J: Princeton University Press.
Pusey, P., & Sadera, W. A. (2011-2012). Cyberethics, cybersafety, and cybersecurity: Preservice teacher knowledge,
preparedness, and the need for teacher education to make a difference. Journal of Digital Learning in
Teacher Education, 28(2), 82–88.
Readiness and Emergency Management for Schools (REMS) Technical Assistance (TA) Center. (2017).
“Cybersecurity considerations for K-12 schools and school districts fact sheet”.
https://rems.ed.gov/docs/Cybersecurity_K-12_Fact_Sheet_508C.PDF.
Thompson, J. Herman, G. L., Scheponik, T., Golaszewski, E., Sherman, A. T., DeLatte, D., Patsourakos, K. Phatak,
D., & Oliva, L. (2018). Student misconceptions about cybersecurity concepts: Analysis of think-aloud
interviews with students. Journal of Cybersecurity Education, Research and Practice, 1(5), 1-29.
Wright, C. (2020, September 2). As cyberattacks persist, $15 million contract for online school platform never signed.
Miami Herald. https://www.miamiherald.com/news/local/education/article245434515.html
Published
How to Cite
Issue
Section
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).