3278 Views
Icon for: Benjamin Dougherty

BENJAMIN DOUGHERTY

University of Cincinnati

Securing Cyberspace

NSF Awards: 1404766

2016 (see original presentation & discussion)

Grades 9-12

This is a video describing a unit I designed and implemented in the 2015-16 school year in which students explored how math is used in cybersecurity and cryptography.

This video has had approximately 115 visits by 103 visitors from 79 unique locations. It has been played 99 times.
activity map thumbnail Click to See Activity Worldwide
Map reflects activity with this presentation from the NSF 2016 STEM For All Video Showcase website, as well as the STEM For All Multiplex website.
Based on periodically updated Google Analytics data. This is intended to show usage trends but may not capture all activity from every visitor.
show more
Original Discussion from the NSF 2016 STEM For All Video Showcase
  • Icon for: Julie Steimle

    Julie Steimle

    Program Director, CEEMS
    May 16, 2016 | 11:40 a.m.

    Ben, this is Julie Steimle. I work on the CEEMS project with Debbie Liberi, who also runs the RET project. I am so happy you decided to submit a video the showcase. You did a great job!

  • Icon for: Pati Ruiz

    Pati Ruiz

    Facilitator
    May 17, 2016 | 08:54 a.m.

    From watching this video, I think you are working with High School students, is that right?
    I think that this is a great lesson, what course are you working in? Your grounding question makes me think it is a Math class?

    I also think that the ethical component is essential to this unit, thank you for including it! Did they enjoy hearing from an expert? How did students work on these different lessons? Did they work in small groups for the scavenger hunt?

    Also, I really like your application of the EDP in the unit and how students went back to re-work their solutions if they weren’t successful the first time. How do students respond to the unit? What did they like the best about the unit? Finally, are you sharing this with other teachers? If so, how?

  • Icon for: Jenna Marks

    Jenna Marks

    Facilitator
    May 17, 2016 | 09:27 a.m.

    I agree that this seems like a terrific unit that connects abstract math to a practical application. What was the age and ability level of your students? While I don’t know much about cryptography, this lesson seems most suited for higher ability high school students. However, it seems as though it could be scalable to younger populations as well. Do you agree?

    My own research concerns the benefits of teaching design thinking to students, so I was a huge fan of seeing how you incorporated the design process into your scavenger hunt. Did you explicitly explain this to your students? Did you find it challenging to motivate students to persist after repeated failure?

    Thank you!

  • Icon for: Avron Barr

    Avron Barr

    Facilitator
    May 17, 2016 | 07:55 p.m.

    Important topic and interesting video presentation. Thanks. Can you talk a bit about the student population for which this unit is appropriate?

  • Icon for: Barbara Ericson

    Barbara Ericson

    Senior Research Scientist
    May 19, 2016 | 03:52 p.m.

    I am curious if these activities were engaging for both males and females.

  • Further posting is closed as the event has ended.

Multiplex Discussion
  • Post to the Discussion

    Presenters and Facilitators, please login before contributing to the discussion.

    Name:

    Email:

    Role:
    NOTE: Your email will be kept private and will not be shared with any 3rd parties