{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,12,30]],"date-time":"2024-12-30T18:41:40Z","timestamp":1735584100151},"reference-count":15,"publisher":"ICT in Practice","issue":"1","license":[{"start":{"date-parts":[[2018,2,1]],"date-time":"2018-02-01T00:00:00Z","timestamp":1517443200000},"content-version":"unspecified","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IJCSES"],"abstract":"The United States Naval Academy (USNA) STEM Center for Education and Outreach addresses an urgent Navy and national need for more young people to pursue careers in STEM fields through world-wide outreach to 17,000 students and 900 teachers per year. To achieve this mission, the STEM Center has developed a hands-on and inquiry-based methodology to be used with K-12 educators at professional development workshops and with students through camps, festivals and fairs, and STEM days.According to recent data, math and computer science (CS) are the fastest growing fields among STEM careers (US Bureau of Labor Statistics, 2016). The Computer Science for All initiative (2016) urges communities to bring more computer science education into the classroom to meet the rapidly rising need for more CS graduates. As a result, the USNA STEM Center has developed a number of unplugged (without a computer) cybersecurity modules to promote engagement and increase awareness. Topic areas include encryption, networking and social media, viruses and malware, programming, hardware components, authentication and authorization, and hacking.This article describes the methodology for developing unplugged computer science activities and adapting computer science undergraduate curriculum for K-12 educators and students as an introduction to complex computer science topics.<\/jats:p>","DOI":"10.21585\/ijcses.v2i1.21","type":"journal-article","created":{"date-parts":[[2018,2,1]],"date-time":"2018-02-01T23:51:14Z","timestamp":1517529074000},"page":"3-13","source":"Crossref","is-referenced-by-count":10,"title":["Unplugged cybersecurity: An approach for bringing computer science into the classroom"],"prefix":"10.21585","volume":"2","author":[{"given":"Rachel E","family":"Fees","sequence":"first","affiliation":[]},{"given":"Jennifer A","family":"Da Rosa","sequence":"additional","affiliation":[]},{"given":"Sarah S","family":"Durkin","sequence":"additional","affiliation":[]},{"given":"Mark M","family":"Murray","sequence":"additional","affiliation":[]},{"given":"Angela L","family":"Moran","sequence":"additional","affiliation":[]}],"member":"9038","published-online":{"date-parts":[[2018,2,1]]},"reference":[{"key":"571","unstructured":"Bell, T., Alexander, J., Freeman, I. & Grimley, M. (2009). Computer science unplugged: School students doing real computing without computers. New Zealand Journal of Applied Computing and Information Technology, 13(1), 20-29."},{"key":"572","doi-asserted-by":"crossref","unstructured":"Diffie, W., & Hellman, M. (1976). New directions in cryptography. IEEE Transactions on Information Theory, 22(6), 644-654.","DOI":"10.1109\/TIT.1976.1055638"},{"key":"573","unstructured":"Diffie, B. W., Hellman, M. E., & Merkle, R. C. (1980). U.S. Patent No. US 4200770 A. Washington, DC: U.S. Patent and Trademark Office."},{"key":"574","unstructured":"MESA USA. (n.d.). Retrieved January 06, 2017, from http:\/\/www.mesausa.org\/"},{"key":"575","unstructured":"Mudrinich, E. (2012). Cyber 3.0: The Department of Defense strategy for operating in cyberspace and the attribution problem. Air Force Law Review 68, 167-206."},{"key":"576","unstructured":"National Science Foundation (2014). NCES Degrees Awarded by Degree Level and Field. [Data]. Retrieved from https:\/\/ncsesdata.nsf.gov\/webcaspar\/index.jsp?subHeader=WebCASPARHome"},{"key":"577","doi-asserted-by":"crossref","unstructured":"Rivest, R. L., Shamir, A., & Adleman, L. (1978). A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, 21(2), 120-126.","DOI":"10.1145\/359340.359342"},{"key":"578","unstructured":"Schneier, B. (1996). Applied cryptography: Protocols, algorithms, and source code in C. New York: Wiley."},{"key":"579","unstructured":"U.S. Bureau of Labor Statistics (2016, April 8). Employment projections: Employment by major occupational group. [Data]. Retrieved from https:\/\/www.bls.gov\/emp\/ep_table_101.htm"},{"key":"580","unstructured":"USNA STEM Center (2016a). Engineering design challenge: Logic gates [Activity handout created by the United States Naval Academy STEM Center for Education and Outreach]. Annapolis, MD. Copy in possession of the USNA STEM Center."},{"key":"581","unstructured":"USNA STEM Center (2016b). Flip floppin\u00e2\u20ac\u2122 binary counter [Activity handout created by the United States Naval Academy STEM Center for Education and Outreach]. Annapolis, MD. Copy in possession of the USNA STEM Center."},{"key":"582","unstructured":"USNA STEM Center (2016c). True colors solution [Activity handout created by the United States Naval Academy STEM Center for Education and Outreach]. Annapolis, MD. Copy in possession of the USNA STEM Center."},{"key":"583","unstructured":"The White House (2016a). Fact sheet: President Obama announces computer science for all initiative. The Office of the Press Secretary. Retrieved from https:\/\/www.whitehouse.gov\/the-press-office\/2016\/01\/30\/fact-sheet-president-obama-announces-computer-science-all-initiative-0"},{"key":"584","doi-asserted-by":"crossref","unstructured":"Yardi, S. & Bruckman, A. (2007). What is computing? Bridging the gap between teenagers\u00e2\u20ac\u2122 perceptions and graduate students\u00e2\u20ac\u2122 experiences. Proceedings of the third international workshop on computing education research - ICER '07. New York, NY: ACM","DOI":"10.1145\/1288580.1288586"},{"key":"585","doi-asserted-by":"crossref","unstructured":"Zambou, S., Britton, D. T., & Harting, M. (2016). Screen printed logic gates employing milled p-silicon as an active material. Flexible and Printed Electronics, 1(3), 1-9.","DOI":"10.1088\/2058-8585\/1\/3\/035002"}],"container-title":["International Journal of Computer Science Education in Schools"],"original-title":[],"link":[{"URL":"https:\/\/www.ijcses.org\/index.php\/ijcses\/article\/download\/21\/27","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.ijcses.org\/index.php\/ijcses\/article\/download\/21\/27","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,31]],"date-time":"2023-08-31T20:31:25Z","timestamp":1693513885000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.ijcses.org\/index.php\/ijcses\/article\/view\/21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,2,1]]},"references-count":15,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2018,2,1]]}},"URL":"https:\/\/doi.org\/10.21585\/ijcses.v2i1.21","relation":{},"ISSN":["2513-8359"],"issn-type":[{"value":"2513-8359","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,2,1]]}}}