Integrated Outreach: Increasing Engagement in Computer Science and Cybersecurity
Abstract
:1. Introduction and Context
2. Literature Review
- The Need for Outreach Programs and Open-Source Activities: Computer science literacy is lacking or lagging behind and many educators are struggling to provide quality computer science education, making outreach programs and quality open-source activities crucial for meeting the growing demand for computer science professionals.
- Outreach Experiences Support Continued Learning: Outreach programs support continued learning through instilling confidence and motivation, employing hands-on and student-centered activities, and promoting technical skills desirable by future employers.
- Sensible Learning Experiences for Diverse Students: Constructive outreach promotes sensible, novel, and cost-effective activities that fit the needs of many diverse students and promote their engagement.
2.1. The Need for Outreach Programs and Open-Source Activities
2.2. Outreach Experiences Support Continued Learning
2.3. Sensible Learning Experiences for Diverse Students
2.4. Research Questions and Instruments
- How does a week-long summer outreach program impact student interest in cybersecurity?
- How do summer outreach activities influence student security awareness and privacy practices?
- How do hands-on activities and student-centered labs impact student content knowledge after voluntary cybersecurity summer camps?
3. Methods and Context
3.1. Methods
3.2. Demographics and Context
4. Results
4.1. Qualitative Results: Field Note Observations and Improvements by Theme for 2018 Summer Camps
4.1.1. Theme 1: Adjusting for Initial Learning Curves
4.1.2. Theme 2: Maintaining Attention and Engagement
4.1.3. Theme 3: Providing Explicit Real-World Applications
4.1.4. Theme 4: Enhancing Incentives and Motivation
4.2. Quantitative Results: Descriptive Statistics for the 2019 Summer Camp
4.2.1. Q1: CIA Recall
4.2.2. Q2–4: CIA Applications
4.2.3. Q9: Online Security
4.2.4. Q10: Cybersecurity Interest
4.2.5. Camp Rating
5. Discussion
5.1. Research Question Discussion
5.2. Implications
5.3. Limitations
6. Conclusions
- Set the stage with baseline information in short (less than 20 minutes) of the topic;
- Connect the topic to the real-world and give explicit and varied examples;
- Have students create a real-world question (from the problem) to investigate;
- Allow students flexibility to change their questions as evidence is collected;
- Provide opportunities for students to practice and fail in a safe space and continue changing their question and collecting evidence;
- Encourage students to use the data collected and analyze it in different ways;
- Promote students’ ideas for improving designs, data collection, and analysis;
- Provide a space for students to share outcomes, lessons learned, potential impacts on society, career connections to the work, applications to other fields, and more;
- Give students choices of topics and sample questions as well as non-examples if they get stuck;
- Promote student engagement by allowing students to find a place of connection with the computer science (or any other) work;
- When possible and appropriate, foster student engagement in real-world scenarios through connections with experts in the field (such as industry professionals;
- Provide computer science activities that rely on computational thinking rather than only programming and stress the importance of responsible code use (from shared libraries, code banks, and widespread tool-kits);
- Be explicit about the real-world implications of each activity to solidify learning and encourage trying again or trying differently when student failure occurs.
Author Contributions
Funding
Conflicts of Interest
Appendix A. Instruments
Appendix A.1. GenCyber Wyoming Pre/Post Assessment Survey
- Q1.
- When talking about information security, what do the following letters represent C, I, and A:
- [ ]
- Command, Instruct, Affirm
- [ ]
- Conspiracy of Illegal Activity
- [ ]
- Central Intelligence Agency
- [ ]
- Confidentiality, Integrity, Availability
- [ ]
- Cooperation, Interrogation, Activation
- [ ]
- None of the above
- Q2.
- You’re about to play your favorite game but you get the message “host cannot connect to server...” This is an example of poor:
- [ ]
- Command
- [ ]
- Cooperation
- [ ]
- Instruction
- [ ]
- Integrity
- [ ]
- Availability
- [ ]
- None of the above
- Q3.
- You were finally able to connect to your favorite game, but when you start playing you realize that your profile contains random information. This is an example of poor:
- [ ]
- Integrity
- [ ]
- Information
- [ ]
- Instruction
- [ ]
- Confidentiality
- [ ]
- Cooperation
- [ ]
- Command
- [ ]
- None of the above
- Q4.
- Your friend asks you for your Hulu/Netflix/Amazon Prime/Spotify password and you share it. This is an example of poor:
- [ ]
- Integrity
- [ ]
- Cooperation
- [ ]
- Activation
- [ ]
- Confidentiality
- [ ]
- Instruction
- [ ]
- Availability
- [ ]
- None of the above
- Q5.
- When using the internet, it is possible to:
- [ ]
- Do or say anything you want
- [ ]
- Remain completely anonymous
- [ ]
- Hurt others or their property
- [ ]
- Transmit information secretly
- [ ]
- None of the above
- Q6.
- A castle is an example of:
- [ ]
- Layering
- [ ]
- Defense in Depth
- [ ]
- Principal of Least Privilege
- [ ]
- M-O-A-T
- [ ]
- Technology over Strength
- [ ]
- None of the above
- Q7.
- Cybersecurity deals with:
- [ ]
- Computers/Programming
- [ ]
- People/Social Interactions
- [ ]
- Money/Finance
- [ ]
- Power/Greed
- [ ]
- Politics/Laws & Regulations
- [ ]
- None of the Above
- Q8.
- Rank these defense strategies for creating secure products (games, computers, buildings, etc.) from 1 to 5, (1 being the best, 5 being the worst):
- [ ]
- Keep everything secret (obscurity)
- [ ]
- Pretend nothing will happen (denial)
- [ ]
- Build “Fort Knox” (only security matters)
- [ ]
- Know something will happen (acceptance)
- [ ]
- Design for Security (built in protection)
- Q9.
- Online surveys and “what _____ character are you” memes:
- [ ]
- Are funny
- [ ]
- Contain security questions
- [ ]
- Have no impact on you
- [ ]
- Share your data with the government
- Q10.
- Your interest in cybersecurity is:
- [ ]
- Non-existent (my parents made me do this)
- [ ]
- Minimal (I don’t know what this is about)
- [ ]
- Medium (It could be interesting)
- [ ]
- High (This is interesting/fun/exciting)
Appendix B. Camp Materials
Appendix B.1. Micro:Bit Labs
Appendix B.1.1. Micro:LockBox
Appendix B.1.2. Micro:Bots
Appendix B.2. Unplugged Activities
References
- Computer and Information Technology Occupations: Occupational Outlook Handbook; The Bureau of Labor Statistics: Washington, DC, USA, 2020.
- Falkner, K.; Vivian, R. A review of computer science resources for learning and teaching with K-12 computing curricula: An Australian case study. Comput. Sci. Educ. 2015, 25, 390–429. [Google Scholar] [CrossRef]
- Borowczak, M.; Burrows, A.C. Ants Go Marching—Integrating Computer Science into Teacher Professional Development with NetLogo. Educ. Sci. 2019, 9, 66. [Google Scholar] [CrossRef] [Green Version]
- Nelson, T.H.; Lesseig, K.; Slavit, D. Making Sense of STEM Education in a K-12 Context. In Proceedings of the 2016 NARST International Conference, Baltimore, MD, USA, 14–17 April 2016. [Google Scholar]
- Webb, M.; Davis, N.; Bell, T.; Katz, Y.J.; Reynolds, N.; Chambers, D.P.; Sysło, M.M. Computer science in K-12 school curricula of the 2lst century: Why, what and when? Educ. Inf. Technol. 2017, 22, 445–468. [Google Scholar] [CrossRef] [Green Version]
- Burrows, A.C.; Borowczak, M. Computer science and engineering: Utilizing action research and lesson study. Educ. Action Res. 2019, 27, 631–646. [Google Scholar] [CrossRef]
- Burrows, A.C.; Borowczak, M. Hardening Freshman Engineering Student Soft Skills. In Proceedings of the 2017 FYEE Conference, Daytona Beach, FL, USA, 6–8 August 2017. [Google Scholar]
- Binkley, M.; Erstad, O.; Herman, J.; Raizen, S.; Ripley, M.; Miller-Ricci, M.; Rumble, M. Defining twenty-first century skills. In Assessment and Teaching of 21st Century Skills; Springer: Dordrecht, The Netherlands, 2012; pp. 17–66. [Google Scholar]
- Vennix, J.; Den Brok, P.; Taconis, R. Perceptions of STEM-based outreach learning activities in secondary education. Learn. Environ. Res. 2017, 20, 21–46. [Google Scholar] [CrossRef] [Green Version]
- Nelson, K.; Sabel, J.; Forbes, C.; Grandgenett, N.; Tapprich, W.; Cutucache, C. How do undergraduate STEM mentors reflect upon their mentoring experiences in an outreach program engaging K-8 youth? Int. J. Stem Educ. 2017, 4, 3. [Google Scholar] [CrossRef] [PubMed] [Green Version]
- Dostis, M. Degree Alone Not Enough to Prepare Grads for Workforce. USA Today College. Available online: http://www.usatoday.com/story/news/nation/2013/10/31/more-than-a-college-degree/3324303/ (accessed on 20 November 2014).
- Caldwell, K.; McCoy, J.; Albers, L.; Smith, A.; Parry, E. The Impact Of K 12 Outreach Programs On Graduate In addition, Undergraduate Experiences. In Proceedings of the 2007 Annual Conference & Exposition, Honolulu, HI, USA, 24–27 June 2007; pp. 12–1430. [Google Scholar]
- Albers, L.; Smith, A.; Caldwell, K.; McCoy, J.; Bottomley, L.; Parry, E. The impact of out-of-school time (OST) math and science clubs on elementary and middle school students, teachers, schools and the undergraduate and graduate fellows that facilitate them. In Proceedings of the American Society for Engineering Education Annual Conference, Pittsburgh, PA, USA, 22–25 June 2008. [Google Scholar]
- Albers, L.A. The Creation and Evolution of an Energy Engineering and Education Outreach Model. Strateg. Plan. Energy Environ. 2015, 34, 63–71. [Google Scholar] [CrossRef]
- Lamberg, T.; Trzynadlowski, N. How STEM Academy Teachers Conceptualize and Implement STEM Education. J. Res. Stem Educ. 2015, 1, 45–58. [Google Scholar]
- Johnson, C.C.; Mohr-Schroeder, M.J.; Moore, T.J.; English, L.D. Handbook of Research on STEM Education; Routledge: Abingdon upon Thames, UK, 2020. [Google Scholar]
- Burrows, A.C.; Lockwood, M.; Borowczak, M.; Janak, E.; Barber, B. Integrated STEM: Focus on Informal Education and Community Collaboration through Engineering. Edu. Sci. 2018, 8, 4. [Google Scholar] [CrossRef] [Green Version]
- Burrows, A.C.; Slater, T. A proposed integrated STEM framework for contemporary teacher preparation. Teach. Educ. Pract. 2015, 28, 318–330. [Google Scholar]
- Michael, J.; Modell, H.I. Active Learning in Secondary and College Science Classrooms: A Working Model for Helping the Learner to Learn; Routledge: Abingdon upon Thames, UK, 2003. [Google Scholar]
- Fogg-Rogers, L.; Lewis, F.; Edmonds, J. Paired peer learning through engineering education outreach. Eur. J. Eng. Educ. 2017, 42, 75–90. [Google Scholar] [CrossRef]
- Langheinrich, J.; Bogner, F.X. Computer-related self-concept: The impact on cognitive achievement. Stud. Educ. Eval. 2016, 50, 46–52. [Google Scholar] [CrossRef]
- Lee, V.E.; Burkam, D.T. Gender differences in middle grade science achievement: Subject domain, ability level, and course emphasis. Sci. Educ. 1996, 80, 613–650. [Google Scholar] [CrossRef]
- Burkam, D.T.; Lee, V.E.; Smerdon, B.A. Gender and science learning early in high school: Subject matter and laboratory experiences. Am. Educ. Res. J. 1997, 34, 297–331. [Google Scholar] [CrossRef]
- Goldschmidt, M.; Bogner, F.X. Learning about genetic engineering in an outreach laboratory: Influence of motivation and gender on students’ cognitive achievement. Int. J. Sci. Educ. B 2016, 6, 166–187. [Google Scholar] [CrossRef]
- Schwortz, A.; Burrows, A.C. Authentic science experiences with STEM datasets: Post-secondary results and potential gender influences. Res. Sci. Tech. Educ. 2020, 40, 1–21. [Google Scholar] [CrossRef]
- Lasi, H.; Fettke, P.; Kemper, H.G.; Feld, T.; Hoffmann, M. Industry 4.0. Bus. Inf. Syst. Eng. 2014, 6, 239–242. [Google Scholar] [CrossRef]
- Michell, D.; Szabo, C.; Falkner, K.; Szorenyi, A. Towards a socio-ecological framework to address gender inequity in computer science. Comput. Educ. 2018, 126, 324–333. [Google Scholar] [CrossRef]
- Gumaelius, L.; Almqvist, M.; Árnadóttir, A.; Axelsson, A.; Conejero, J.A.; García-Sabater, J.P.; Klitgaard, L.; Kozma, C.; Maheut, J.; Marin-Garcia, J.; et al. Outreach initiatives operated by universities for increasing interest in science and technology. Eur. J. Eng. Educ. 2016, 41, 589–622. [Google Scholar] [CrossRef]
- Giannakos, M.N.; Pappas, I.O.; Jaccheri, L.; Sampson, D.G. Understanding student retention in computer science education: The role of environment, gains, barriers and usefulness. Educ. Inf. Technol. 2017, 22, 2365–2382. [Google Scholar] [CrossRef]
- Fayer, S.; Lacey, A.; Watson, A. STEM Occupations: Past, Present, In Addition, Future; Spotlight on Statistics from US Bureau of Labor Statistics; The Bureau of Labor Statistics: Washington, DC, USA, 2017. [Google Scholar]
- Dubina, K.S.; Morisi, T.L.; Wagoner, A.B. Projections overview and highlights, 2018–28. Mon. Labor Rev. 2019. [Google Scholar] [CrossRef]
- U.S. Bureau of Labor Statistics. Computer and Information Research Scientists: Occupational Outlook Handbook. 2019. Available online: https://www.bls.gov/ooh/computer-and-information-technology/computer-and-information-research-scientists.htm (accessed on 20 November 2020).
- Landry, J.P.; Barnett, H.L.; Chapman, D.L.; McCullough, R. Four Strategies for Driving a University Pre-College Computing Outreach Program. J. Inf. Syst. Educ. 2019, 30, 191–201. [Google Scholar]
- Aslam, F.; Adefila, A.; Bagiya, Y. STEM outreach activities: An approach to teachers’ professional development. J. Educ. Teach. 2018, 44, 58–70. [Google Scholar] [CrossRef]
- Disalvo, B.; Reid, C.; Roshan, P. They can’t find us: The search for informal CS education. In Proceedings of the SIGCSE 2014—45th ACM Technical Symposium on Computer Science Education, Atlanta, GA, USA, 5–8 March 2014; pp. 487–492. [Google Scholar]
- Burrows, A.C.; Borowczak, M.; Slater, T.F.; Haynes, C.J. Teaching computer science & engineering through robotics: Science & art form. Prob. Edu. 21st Century 2012, 47, 6–15. [Google Scholar]
- Forbes, M.H.; Sullivan, J.F.; Carlson, D.W. Ascertaining the Impact of P: 12 Engineering Education Initiatives: Student Impact through Teacher Impact. In Proceedings of the 2017 ASEE Annual Conference & Exposition, Columbus, OH, USA, 25–28 June 2017. [Google Scholar]
- Glynn, S.M.; Taasoobshirazi, G.; Brickman, P. Science motivation questionnaire: Construct validation with nonscience majors. J. Res. Sci. Teach. 2009, 46, 127–146. [Google Scholar] [CrossRef]
- Deci, E.L.; Ryan, R.M. The “what” and “why” of goal pursuits: Human needs and the self-determination of behavior. Psychol. Inq. 2000, 11, 227–268. [Google Scholar] [CrossRef]
- Nesiba, N.; Dana-Farley, J.; Muhyi, N.; Chen, J.; Ray, N.; Pontelli, E. Young Women in Computing: Creating a successful and sustainable pipeline. In Proceedings of the 2015 IEEE Frontiers in Education Conference (FIE), El Paso, TX, USA, 21–24 October 2015; pp. 1–9. [Google Scholar]
- Pajares, F. Self-efficacy beliefs in academic settings. Rev. Educ. Res. 1996, 66, 543–578. [Google Scholar] [CrossRef]
- Turner, P.R.; Fowler, K.; Wick, D.; Ramsdell, M.; Gotham, G.; Glasgow, E.; French, C. BOCES-University Partnership as a model for Educational Outreach: K-16 STEM Professional Development. In Proceedings of the Math and Science Symposium, Knoxville, TN, USA, October 2007. [Google Scholar]
- Lakanen, A.J.; Isomöttönen, V. Computer science outreach workshop and interest development: A longitudinal study. Inform. Educ. 2018, 17, 341–361. [Google Scholar] [CrossRef]
- Renninger, K.A.; Hidi, S. Revisiting the conceptualization, measurement, and generation of interest. Educ. Psychol. 2011, 46, 168–184. [Google Scholar] [CrossRef]
- Vennix, J.; Den Brok, P.; Taconis, R. Do outreach activities in secondary STEM education motivate students and improve their attitudes towards STEM? Int. J. Sci. Educ. 2018, 40, 1263–1283. [Google Scholar] [CrossRef] [Green Version]
- Sjaastad, J. Measuring the ways significant persons influence attitudes towards science and mathematics. Int. J. Sci. Educ. 2013, 35, 192–212. [Google Scholar] [CrossRef]
- Woods-Townsend, K.; Christodoulou, A.; Rietdijk, W.; Byrne, J.; Griffiths, J.B.; Grace, M.M. Meet the scientist: The value of short interactions between scientists and students. Int. J. Sci. Educ. 2016, 6, 89–113. [Google Scholar] [CrossRef] [Green Version]
- Straw, S.; Macleod, S. Evaluation of STEMNET’s Operations and Impacts 2011–2015: Summary Report; NFER: Slough, UK, 2015. [Google Scholar]
- Krogstad, J.; Tyler, K.; Johnson-Glauch, N.; Dean, L. Promoting Positive Outcomes in K-12 Outreach through Design. JOM 2019, 71. [Google Scholar] [CrossRef] [Green Version]
- Archer, L.; DeWitt, J.; Osborne, J.; Dillon, J.; Willis, B.; Wong, B. “Balancing acts”: Elementary school girls’ negotiations of femininity, achievement, and science. Sci. Educ. 2012, 96, 967–989. [Google Scholar] [CrossRef]
- Murphy, P.; Whitelegg, E. Girls in the Physics Classroom: A Review of the Research on the Participation of Girls in Physics; Institute of Physics: London, UK, 2006. [Google Scholar]
- Wolf, S.; Moss, F.P.; Manandhar, R.; Cooley, M.; Cooley, R.; Burrows, A.C.; Borowczak, M. Building Collaboration and Securing Interest in Computer Science Education through Outreach Opportunities. In Proceedings of the 2019 ASEE Annual Conference & Exposition, Tampa, Florida, USA, 16–19 June 2019. [Google Scholar]
- Laursen, S.; Liston, C.; Thiry, H.; Graf, J. What good is a scientist in the classroom? Participant outcomes and program design features for a short-duration science outreach intervention in K–12 classrooms. CBE Life Sci. Educ. 2007, 6, 49–64. [Google Scholar] [CrossRef] [PubMed] [Green Version]
- Computational Thinking and CS Unplugged. Available online: https://csunplugged.org/en/computational-thinking/ (accessed on 20 November 2020).
# Participants | # Females | # Males | |
---|---|---|---|
Camp 1 | 23 | 5 | 18 |
Camp 2 | 31 | 13 | 18 |
Camp 3 | 30 | 5 | 25 |
Total | 84 | 23 | 61 |
U.S. Grade Level | 5th | 6th | 7th | 8th | 9th | 10th | 11th | 12th |
---|---|---|---|---|---|---|---|---|
Age Range | 10–11 | 11–12 | 12–13 | 13–14 | 14–15 | 15–16 | 16–17 | 17–18 |
Camp 1 | 0 | 2 | 4 | 3 | 3 | 2 | 7 | 2 |
Camp 2 | 1 | 4 | 11 | 4 | 4 | 1 | 3 | 3 |
Camp 3 | 0 | 0 | 10 | 9 | 5 | 4 | 1 | 1 |
Total | 1 | 6 | 25 | 16 | 12 | 7 | 11 | 6 |
Rating | Comment (Spelling Errors Corrected) |
---|---|
3 | Longer lunch. |
Too much hand drawings. Not enough programming antivirus or firewalls. | |
I don’t think that I would do another one of these camps but it was definitely an experience that I would recommend to others if they haven’t done something like it already. | |
4 | I enjoyed the camp but felt there was a lack of focus on firewalls. What they are and how they work, and viruses, how to avoid them, and how to remove them before a complete wipe. |
This camp was really interesting and fun and I really liked it but there were some boring parts like the hand, but the programming and hacking were fun. | |
It was fun. | |
This camp was very fun. | |
Because it was fun but some minor adjustments would be better. | |
It was fun hacking and programming. | |
5 | The camp was interesting, the activities were mostly really fun. I also gained knowledge and skill that will help me in the real-world. |
I chose this due to some lack of explanation on somethings ex ciphers, overall it was great. | |
Because I would want to come back to this camp if I had the opportunity to and it teaches you about online services and how to protect your accounts. | |
Because it was fun to hack other peoples microbots. | |
I had a lot of fun and met friends. | |
It was exciting and I would totally do this again and it boosted my interest in cybersecurity. | |
I had amazing leaders who helped me and encouraged me. | |
Because I now am more interested and knowledgeable than I was before I started this camp. | |
I want to do this camp again to gain more knowledge. | |
Fun and interesting. | |
very fun/interesting and would like to do it again. | |
It was a blast and I learned so much. I learned a lot but it did not feel like school and I enjoyed it. I liked programming the Micro:Bits and the robots. Learning how to code was a ton of fun and it was very enjoyable. I would like to go to another camp like this because it had the best activities and was a nice way to spend a week in the summer. | |
We learned important information about safety and security, explored coding and hacking, and were informed about potential employment. | |
I loved this camp, it was super fun and informative. It had great projects. | |
It was interesting to me because I like computers. |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2020 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
Share and Cite
Wolf, S.; Burrows, A.C.; Borowczak, M.; Johnson, M.; Cooley, R.; Mogenson, K. Integrated Outreach: Increasing Engagement in Computer Science and Cybersecurity. Educ. Sci. 2020, 10, 353. https://doi.org/10.3390/educsci10120353
Wolf S, Burrows AC, Borowczak M, Johnson M, Cooley R, Mogenson K. Integrated Outreach: Increasing Engagement in Computer Science and Cybersecurity. Education Sciences. 2020; 10(12):353. https://doi.org/10.3390/educsci10120353
Chicago/Turabian StyleWolf, Shaya, Andrea Carneal Burrows, Mike Borowczak, Mason Johnson, Rafer Cooley, and Kyle Mogenson. 2020. "Integrated Outreach: Increasing Engagement in Computer Science and Cybersecurity" Education Sciences 10, no. 12: 353. https://doi.org/10.3390/educsci10120353
APA StyleWolf, S., Burrows, A. C., Borowczak, M., Johnson, M., Cooley, R., & Mogenson, K. (2020). Integrated Outreach: Increasing Engagement in Computer Science and Cybersecurity. Education Sciences, 10(12), 353. https://doi.org/10.3390/educsci10120353