Exploring_the_Relationship_Between_Collaborative_Discourse_Programming_Actions_and_Cybersecurity_and_Computational_Thinking_Knowledge
Exploring_the_Relationship_Between_Collaborative_Discourse_Programming_Actions_and_Cybersecurity_and_Computational_Thinking_Knowledge
Abstract Computational thinking (CT) skills are necessary of conceptual definitions, which is unlikely to produce a deep
for solving the real-world problems of today and are therefore understanding of these concepts that addresses the applicabil-
being incorporated into K-12 curricula. Cybersecurity is of sim- ity of cybersecurity concepts. Examples of such problems in-
ilar importance; however, it can be difficult for young learners clude students failing to recognize points of vulnerability be-
to grasp the required concepts and use them to construct mean- tween two communicating systems, and the need for reliable
ingful algorithms. We discuss our approach that combines a encryption methods intended to secure communication of in-
hands-on robotics platform with a block-based programming formation [5]. Similar problems arise in computational think-
environment to facilitate the learning and application of cyber- ing (CT), which requires gaining conceptual knowledge of
security and CT concepts. Throughout a week-long interven-
logical thinking, algorithmic thinking, pattern recognition, ab-
tion, high school students were introduced to cybersecurity and
CT and given the opportunity to apply this knowledge in a col-
straction, generalization, evaluation, and automation along
laborative setting to solve security problems on the robotics plat- with procedural knowledge for problem decomposition, arte-
form with instructor and peer support. A series of competitions fact creation, testing, debugging, and iteration [6].
between groups of students further motivated students to trans- Learning algorithmic thinking and programming is argua-
late their learned concepts to practice, often leading to break- bly a core requirement for K-12 students. AP CSP courses are
throughs as students incorporated new algorithms into their ex- a mechanism for accomplishing this [2], but successful curric-
isting projects to counteract previous security flaws. We present
ulum design requires forethought by educators and research-
evidence of the learning behaviors of several such groups
ers. It can be challenging to transfer complex ideas - such as
through mixed-method case studies integrating data collected
from learning performance, collaborative discourse, and analy- cyber-attacks and cyber-defenses - into usable granular
sis of program development. We discuss the impact of this ap- knowledge segments and their implementation in programs.
proach on cybersecurity and CT learning and then present fu- In addition, programs generated should be based on sound
ture directions for this work. knowledge of underlying cybersecurity principles and pro-
gramming practices, such as developing an algorithm, trans-
Keywords K-12 STEM education, educational robotics, cy- lating key ideas into programming constructs, and debugging
bersecurity, computational thinking, collaboration any issues that arise [7]. The cognitive load associated with
learning and combining these concepts for application tasks
I. INTRODUCTION can be too much for K-12 students without assistance.
Given the importance of computational platforms in our Our solution to these issues was to develop a block-based
everyday lives, students need to be introduced to cybersecu- programming environment (BBPE), NetsBlox [8], that is
rity principles while still in high school. There are also in- combined with a robotics platform, Roboscape [9], to situate
creasing demands for jobs in this field to combat the prolifer- learning and to link concepts and practices. The benefits of
ation of attacks, and to save companies billions of dollars per -documented in K-12 environments, often
year in cyber theft [1]. This need has been reflected in the de- leading to greater learning gains and increased interest in fu-
sign of AP Computer Science Principles (AP CSP) courses - ture computing courses [10, 11]. Similarly, educational robots
the latest suggested curriculum includes key security concepts have been shown to positively influence student learning of
[2]. Mishra et al. [3] specifically targeted this need by integrat- programming and other complex topics, particularly when in-
ing cybersecurity first principles into existing AP CSP corporated into a framework containing competitions and col-
courses. Another example is the series of GenCyber summer laboration [12]. The value of collaboration has been estab-
camps [4], which successfully brought cybersecurity to the lished in terms of assessment scores [13] and development of
forefront for both teachers and students. problem-solving skills [14]. By combining these elements, we
However, cybersecurity concepts are often abstract and have developed an intervention to encourage the learning of
difficult to understand from an operational viewpoint. The in- cybersecurity and CT concepts and practices in an engaging
ability to make these concepts explicit and related to everyday and collaborative manner. To evaluate the effects of this plat-
computing leads to this subject being taught by memorization form, we propose the following research questions:
S4 Uh huh S7
S9 Ok so how do we do that?
c) Group 3: S7 earned half-credit on the loops question
and no credit on the conditionals question on the pre-test. S8 That's hard
They performed better on the post-test, answering correctly
S9 That's hard right?
on the loops question and earning one-third of the points on
the conditionals question. S7 only answered correctly on the S8 That's the hard part
brute force question amongst the cybersecurity questions on
both pre- and post-test. S8 improved from half-credit on the
loops question to full credit by the post-test, and answered The programming actions data indicates that the group
correctly on the conditionals question each time. S8 answered took sixty-four actions during the ten-minute window
correctly on the DoS question on the post-test after failing to including this conversation. As indicated by the conversation,
do so on the pre-test, was consistently correct on the brute S8 was originally the only student significantly
force attacks question, and was consistently incorrect on the programming. However, S7 quickly began to contribute, such
encryption and decryption question. S9 consistently earned that by the end of the segment each of the two students had
half-credit on the loops question, and improved from no taken an approximately equivalent number of productive
credit to two-thirds credit on the conditionals question. They model-building actions. On the other hand, S9 only had four
had the same results as S7 on the cybersecurity questions. programming actions of those original sixty-four. The
sporadic collaboration and single leader situation of this
In terms of actions, S8 was the clear leader of the group, group provides some insight into RQ3 when combined with
performing 1774 actions (1157 MBAs) during group projects their poor pre- and post-test results.
throughout the week along with 305 during the morning of
day three and 276 during the morning of day two. Some d) Group 4: S10 started by answering all five questions
programming support was provided by S7 with 856 actions under review here correctly on the pre-test, but regressed to
overall (382 MBAs), 132 during the morning of day three, one-third of the credit on the conditionals question on the
and 140 during the morning of day four. However, S9 was post-test. S11 earned half-credit on the loops question and no
only minimally active, with 348 actions overall (171 MBAs), credit on the conditionals question on both pre- and post-tests.
They were able to improve on the DoS attack question from