Computer science is foundational, playing a crucial role in diverse fields such as science, business, arts, healthcare, and education. It uses computational techniques to solve complex problems, innovate, and engineer new products and solutions. As an interdisciplinary field, computer science involves the study and application of computers and computational systems, encompassing:
The theory, design, development, and application of software and software systems
Algorithmic processes and data analysis
Cybersecurity and the protection of information
Artificial intelligence and machine learning
Human-computer interaction and user experience design
Networking and communication technologies
Ethical considerations in technology
Computer science is for everyone because it equips individuals to innovate and create solutions across various fields. Whether you're interested in healthcare, art, engineering, or social sciences, computer science provides the tools and knowledge to enhance your work and contribute to society. Its principles are universally applicable, enabling anyone to become a problem solver and innovator in today's digital world.
My goal is to make computer science more accessible to both educators and students. As educators, we have the responsibility to prepare and protect students, especially online, which is why I have developed a professional development (PD) program and lesson plan to facilitate easy integration of computer science into the classroom.
Strand 4 Standard 2 (ISTE 1.2)
Learning Outcome:
Research, learn and teach above Digital Literacy and ISTE Strand and standards incorporating educational technology Pear Deck.
Experience and learn instructional strategies that increase student engagement.
Success Criteria:
I can demonstrate knowledge of online safety, digital security, and online privacy.
I can define security risks and Identify threats in the digital world
PD Overview: Participants investigate different common security risks (phishing, cyber attacks, malware) in a jigsaw activity. In groups, they create Public Service Announcement slides (using slides + Pear Deck) warning of the dangers of their chosen security risk. They present their PSA for shared learning and practice teaching. Participants play (time permitting) a Kahoot to further check for understanding ( an additional resource to use in their classroom) The PD ends with coming together to discuss any questions, concerns or constraints teachers and/or students may have when learning/teaching this content.
I designed this PD to address the need to have more educators prepared to teach digital literacy/cybersecurity to students promoting safe computing. This PD will cover an entire Strand and Standard in about an hour giving educators the knowledge and tools to immediately incorporate into their teaching practice.
Resource list of websites, technologies, readings:
Participants need their own laptops.
Participants will need Pear Deck Code to Join Live Lesson
This PD was designed with TPACK(Mishra & Koehler, 2006), in mind so participants can get a hands-on experience learning Digital Literacy content giving them the knowledge and technological tools they need to teach this Strand to their students. Participants will be actively learning by using interactive educational technology, instructional strategies, activities, discussions and presentations where they will collaborate, share and learn from each other. Participants are learning content and how to teach this content simultaneously.
Reference:
Koehler, M., Mishra, P., & Cain, W. (2013). What Is Technological Pedagogical Content Knowledge (TPACK)? The Journal of Education, 193(3), 13-19. http://www.jstor.org.proxy2.cl.msu.edu/stable/24636917
Understanding Cybersecurity Concepts
Students investigate 8 different common security risks (i.e. phishing, keylogging, malware) in a jigsaw activity. In groups, students create a Public Service Announcement using multimedia warning of the dangers of their assigned security risk. Then students are grouped with students who investigate other security risks and share their concepts (gallery walk). The activity ends with the class coming together to discuss the security risks as a whole.
For additional ideas on integrating computer science across various disciplines, please visit my computational thinking page.