Aerial Drone: an Effective Tool to Teach Information Technology and Cybersecurity through Project Based Learning to Minority High School Students in the U.S.

被引:15
作者
Bhuyan, Jay [1 ]
Wu, Fan [1 ]
Thomas, Cassandra [1 ]
Koong, Kai [1 ]
Hur, Jung Won [2 ]
Wang, Chih-hsuan [2 ]
机构
[1] Tuskegee Univ, Coll Business & Informat Sci, Tuskegee, AL 36088 USA
[2] Auburn Univ, Dept Educ Fdn Leadership & Technol, Auburn, AL 36849 USA
基金
美国国家科学基金会;
关键词
Drone; Minority students; K-12 computer science; STEM interest; Cybersecurity; SAMPLE-SIZE; SCIENCE; VALIDATION; ATTITUDES; INQUIRY; ALPHA;
D O I
10.1007/s11528-020-00502-7
中图分类号
G40 [教育学];
学科分类号
040101 ; 120403 ;
摘要
This paper describes the design, implementation, and results of an NSF funded Summer Academy from 2016 to 2018, which engaged, on an annual basis, 30 to 60 rising 10th and 11th grade high school science students in an innovative, technology-enriched Project Based Learning (PBL) environment. This Academy emphasized how tech gadgets work and the impact that technology can have on improving communities by immersing students in the exploration of one such device that is a growing phenomenon, the "aerial drone." In this Academy, the students learned various operations of the drone through Python programming language, and some cybersecurity issues and solutions. The student teams, under the guidance of diverse mentors, comprehensively fortified their STEM problem-solving skills and critical thinking. Both formative and summative evaluations for this Academy showed that it helped students improve their critical thinking ability and motivated them to pursue careers in STEM-related disciplines, specifically in information technology and cybersecurity areas.
引用
收藏
页码:899 / 910
页数:12
相关论文
共 41 条
[1]   Comparison of artificial neural networks and autoregressive model for inflows forecasting of Roseires Reservoir for better prediction of irrigation water supply in Sudan [J].
Abdellatif, Mawada E. ;
Osman, Yassin Z. ;
Elkhidir, Adil M. .
INTERNATIONAL JOURNAL OF RIVER BASIN MANAGEMENT, 2015, 13 (02) :203-214
[2]  
[Anonymous], 2017, ANN REPORT C FY 2016
[3]   A Review on Sample Size Determination for Cronbach's Alpha Test: A Simple Guide for Researchers [J].
Bujang, Mohamad Adam ;
Omar, Evi Diana ;
Baharum, Nur Akmal .
MALAYSIAN JOURNAL OF MEDICAL SCIENCES, 2018, 25 (06) :85-99
[4]  
Burrell D.N., 2018, International Journal of Hyperconnectivity and the Internet of Things, V2, P29, DOI [DOI 10.4018/IJHIOT.2018010103, https://doi.org/10.4018/978-1-7998-2466-4.ch063]
[5]   Architectural Approaches to Security: Four Case Studies [J].
Cervantes, Humberto ;
Kazman, Rick ;
Ryoo, Jungwoo ;
Choi, Duyoung ;
Jang, Duksung .
COMPUTER, 2016, 49 (11) :60-67
[6]  
Chen P., 2015, Journal of Urban Learning, Teaching, and Research, V11, P26, DOI 10.4324/9781315721606-24
[7]   Enterprise data breach: causes, challenges, prevention, and future directions [J].
Cheng, Long ;
Liu, Fang ;
Yao, Danfeng .
WILEY INTERDISCIPLINARY REVIEWS-DATA MINING AND KNOWLEDGE DISCOVERY, 2017, 7 (05)
[8]  
Cohen N., 2017, CYBERSECURITY ENGINE
[9]  
Funk C., 2018, WOMEN MEN STEM OFTEN
[10]   Social cognitive expectations and racial identity attitudes in predicting the math choice intentions of Black College students [J].
Gainor, KA ;
Lent, RW .
JOURNAL OF COUNSELING PSYCHOLOGY, 1998, 45 (04) :403-413