18.01.2013 Views

Maria Knobelsdorf, University of Dortmund, Germany - Didaktik der ...

Maria Knobelsdorf, University of Dortmund, Germany - Didaktik der ...

Maria Knobelsdorf, University of Dortmund, Germany - Didaktik der ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

We have learnt that we can both look for contexts where a certain<br />

topic is <strong>of</strong> relevance as well as screen an interesting context as to<br />

which topics <strong>of</strong> computer science education are relevant for it.<br />

Either way, it is a long way <strong>of</strong> selecting suitable aspects out <strong>of</strong> a<br />

wide choice <strong>of</strong> possible aspects and developing material which<br />

makes sense at a certain point <strong>of</strong> the learning process. If in doubt,<br />

one should decide on whether aspects are necessary for the<br />

following sections <strong>of</strong> the learning process. If this is not the case,<br />

they can be marked as optional. Whenever s<strong>of</strong>tware is involved,<br />

the s<strong>of</strong>tware should be easy to use, if possible without installation.<br />

We have by now presented our proposed learning arrangement in<br />

several hands-on workshops for computer science teachers<br />

throughout <strong>Germany</strong> and also in the journal LOG IN [16], which<br />

is widely distributed amongst computer science teachers<br />

throughout <strong>Germany</strong>. Since then, we have received a lot <strong>of</strong><br />

positive feedback from colleagues stating that their students are<br />

highly motivated to un<strong>der</strong>stand both the un<strong>der</strong>lying technology <strong>of</strong><br />

email as well as the different cryptographic algorithms. While we<br />

are happy to see our own impressions affirmed, we are indeed<br />

aware that this is only a first but nevertheless promising hint as to<br />

the potential <strong>of</strong> context-based learning <strong>of</strong> computer science in<br />

secondary school education. Reaching a stage where we now have<br />

several learning processes readily prepared and testes in class, it<br />

now seems important to validate our theses on context-based<br />

learning <strong>of</strong> computer science in a more through, scientific<br />

evaluation.<br />

6. REFERENCES<br />

[1] Arbeitskreis »Bildungsstandards« <strong>der</strong> Gesellschaft für<br />

Informatik (ed.), 2008. Grundsätze und Standards für die<br />

Informatik in <strong>der</strong> Schule – Bildungsstandards Informatik<br />

für die Sekundarstufe I. Empfehlungen <strong>der</strong> Gesellschaft<br />

für Informatik e. V. vom 24. Januar 2008. In LOG IN ,<br />

supplementary to vol. 150/151 (2008). Retrieved<br />

October 10, 2012. http://informatikstandards.de<br />

[2] Altrichter, H., Posch, P., Somekh, B. 1993. Teachers<br />

Investigate their Work: Introduction to the Method <strong>of</strong><br />

Action Research. Routledge, London, New York 1993.<br />

[3] Barab, S. and Squire, K. 2004. Introduction: Design-<br />

Based Research: Putting a Stake in the Ground. The<br />

Journal <strong>of</strong> learning sciences. 13,1 (2004), 1-14.<br />

[4] Brinda, T., Puhlmann, H., and Schulte, C., 2009.<br />

Bridging ICT and CS – Educational Standards for<br />

Computer Science in Lower Secondary Education. In<br />

ITiCSE '09: Proceedings <strong>of</strong> the 14th annual ACM<br />

SIGCSE conference on Innovation and technology in<br />

computer science education, 288-292.<br />

[5] Computer Science Teachers Association (CSTA) 2011.<br />

K-12 Computer Science Standards. Revised 2011.<br />

Retrieved October 10, 2012. http://csta.acm.org/<br />

Curriculum/sub/CurrFiles/CSTA_K-12_CSS.pdf<br />

[6] Cooper, S. and Cunningham, S. 2010. Teaching<br />

computer science in context. ACM Inroads 1, 5‐8.<br />

[7] Coy, W. 2005. Informatik … im Großen und Ganzen. In<br />

LOG IN 136 (2005), pp.17-23.<br />

[8] Diethelm, I., Borowski, C., and Weber, T. 2010.<br />

Identifying relevant CS contexts using the miracle<br />

question. In Proceedings <strong>of</strong> the 10th Koli Calling<br />

International Conference on Computing Education<br />

129<br />

Research. Koli Calling 10. ACM, New York, NY, USA,<br />

74‐75.<br />

[9] Diethelm, I. and Dörge, C. 2010. From Context to<br />

Competencies. In Key Competencies in the Knowledge<br />

Society, N. Reynolds and M. Turcsányi-Szabó, Eds. IFIP<br />

Advances in Information and Communication<br />

Technology. Springer Boston, 67–77.<br />

[10] Diethelm, I., Hildebrandt, C., and Krekeler, L. 2009.<br />

Implementation <strong>of</strong> Computer Science in Context - a<br />

research perspective regarding teacher-training. In Koli<br />

Calling 2009. 9th International Conference on<br />

Computing Education Research, A. Pears and C. Schulte,<br />

Eds., 96–99.<br />

[11] Diethelm, I., Schulte, C. and Witten, H. 2011. Informatik<br />

im Kontext (IniK) – Entwicklungen, Merkmale und<br />

Perspektiven. In Praxisberichte zur 14. GI-Fachtagung<br />

Informatik und Schule (INFOS), Münster 2011.<br />

[12] Engbring, D. 2005. Informatik im Kontext. In LOG IN,<br />

vol. 136 (2005), pp.28-33.<br />

[13] Esslinger, B., Gramm, A., Hornung, M. and Witten, H.<br />

2011. Asymmetrische Kryptographie für die Sek I - RSA<br />

(fast) ohne Mathematik? In Informatik mit Kopf, Herz<br />

und Hand. Praxisbeiträge zur 14. GI-Fachtagung<br />

Informatik und Schule (INFOS 2011) (Münster,<br />

<strong>Germany</strong>, September 13 - 15, 2011) Zentrum für Lehrerbildung<br />

<strong>der</strong> Universität Münster 2011, pp. 225-235.<br />

[14] Esslinger, B., Gramm, A., Hornung, M. and Witten, H.<br />

2012. Kann man RSA vertrauen? In LOG IN vol.<br />

172/173 (2012), in print.<br />

[15] Gramm, A. 2012. Animation <strong>of</strong> Asymmetric<br />

Cryptography. Retrieved October 10, 2012<br />

http://it-lehren.de/asymcrypt<br />

[16] Gramm, A., Hornung, M. and Witten, H. 2011. E-Mail<br />

(nur?) für Dich - Eine Unterrichtsreihe des Projekts<br />

Informatik im Kontext. In LOG IN , supplementary to<br />

vol. 169/170 (2011).<br />

[17] Guizdal, M. 2010. Does contextualized computing<br />

education help? ACM Inroads 1, 4, 4‐6.<br />

[18] mpfs – Medienpädagogischer Forschungsverbund<br />

Südwest (ed.), 2011. JIM-Studie 2011 – Jugend,<br />

Information, (Multi-)Media. Basisuntersuchung zum<br />

Medienumgang 12- bis 19-Jähriger. Stuttgart:<br />

Medienpädagogischer Forschungsverbund Südwest,<br />

2011, p. 32. Retrieved October 10, 2012.<br />

http://www.mpfs.de/fileadmin/JIM-pdf11/JIM2011.pdf<br />

[19] Parchmann, I., Gräsel, C., Baer, A., Demuth, R. and<br />

Ralle, B. 2007. Chemie im Kontext - a symbiotic<br />

implementation <strong>of</strong> a context-based teaching and learning<br />

approach. In International Journal <strong>of</strong> Science Education<br />

28, 09 (2007) pp. 1041-1062. DOI=<br />

http://doi.acm.org/10.1080/09500690600702512<br />

[20] Klieme, E. et al. 2004. The Development <strong>of</strong> National<br />

Educational Standards. An Expertise. Bundesministerium<br />

für Bildung und Forschung, Berlin.<br />

[21] Koubek, J. 2012. Website <strong>of</strong> the “Informatik im Kontext”<br />

project. Retrieved October 10, 2012.<br />

http://informatik-im-kontext.de

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!