Wyoming DOE Logo MIDAS Logo

Safety, Laws, and Ethics - Secondary
Material Image
Microcredential ID : 15
Stack
Impacts of Computing - Secondary
Credits
0.5 PTSB Recertification Credit

Description

This micro-credential represents the knowledge of how to teach the use of computing in a secondary classroom to support student learning of the fundamentals of digital citizenship and appropriate use of digital media in the early grades. As students progress, they learn about the legal and ethical issues that shape computing practices. Legal and ethical considerations of using computing devices influence behaviors that can affect the safety and security of individuals. Please locate "01. PROFICIENCY SCALE – Impacts of Computing – Safety, Laws, and Ethics" in the resources to view specific Wyoming Computer Science Content and Performance Standards and the CSTA Standards for Teachers included in this micro-credential.

Standards
  • Computer Science Teachers Assocation (CSTA) Standards for CS Teachers > Equity and Inclusion
    2a - Examine issues of equity in CS. Examine how systemic barriers and social and psychological factors contribute to inequitable access, engagement, and achievement in CS among marginalized groups. Reflect on how issues of equity manifest in their own CS teaching context.
  • Computer Science Teachers Assocation (CSTA) Standards for CS Teachers > Instructional Design
    4a - Analyze CS curricula. Analyze CS curricula for implementation in their classrooms in terms of CS standards alignment, accuracy, completeness of content, cultural relevance, and accessibility.
  • Computer Science Teachers Assocation (CSTA) Standards for CS Teachers > Instructional Design
    4b - Develop standards-aligned learning experiences. Design and adapt learning experiences that align to comprehensive K-12 CS standards.
  • Computer Science Teachers Assocation (CSTA) Standards for CS Teachers > Instructional Design
    4g - Inform instruction through assessment. Develop multiple forms and modalities of assessment to provide feedback and support. Use resulting data for instructional decision-making and differentiation.
  • Wyoming Content and Performance Standards > Safety, Law, & Ethics
    8.IC.SLE.01 - Using grade appropriate content and complexity, describe tradeoffs between allowing information to be public and keeping information private and secure.
  • Wyoming Content and Performance Standards > Safety, Law, & Ethics
    8.IC.SLE.02 - Using grade level appropriate content and complexity, discuss the legal, social, and ethical impacts associated with software development and use, including both positive and malicious intent.
  • Wyoming Content and Performance Standards > Safety, Law, & Ethics
    L1.IC.SLE.01 - Explain the beneficial and harmful effects that intellectual property laws can have on innovation.
  • Wyoming Content and Performance Standards > Safety, Law, & Ethics
    L1.IC.SLE.02 - Explain the privacy concerns related to the collection and generation of data through automated processes that may not be evident to users.
  • Wyoming Content and Performance Standards > Safety, Law, & Ethics
    L1.IC.SLE.03 - Evaluate the social and economic implications of privacy in the context of safety, law, or ethics.
  • Wyoming Content and Performance Standards > Safety, Law, & Ethics
    L1.IC.SLE.04 - Using grade level appropriate content and complexity, discuss the legal, social, and ethical impacts associated with software development and use, including both positive and malicious intent.
  • Wyoming Content and Performance Standards > Safety, Law, & Ethics
    L2.IC.SLE.01 - Debate laws and regulations that impact the development and use of software and technology.
  • Wyoming Content and Performance Standards > Safety, Law, & Ethics
    L2.IC.SLE.02 - Using grade level appropriate content and complexity, discuss the legal, social, and ethical impacts associated with software development and use, including both positive and malicious intent.
How To Earn This Microcredential

To earn this micro-credential you will process through the ADDIE learning model producing evidence that demonstrates your knowledge of the Wyoming Computer Science Content and Performance Standards and the CSTA Standards for Teachers. Through the ADDIE learning model you will analyze standards, design/develop and implement a lesson, collect student work artifacts, and evaluate your professional practices.

Fees
There will be no fee assessed for reviewing this microcredential.
Clarifications

The safety, laws, and ethics micro-credential is one of three micro-credentials that make up the impacts of computing stack. The impacts of computing stack is one of six micro-credential stacks which when completed will lead to a Computer Science Teacher Master Distinction.

Important Terms
Accessibility:

The design of products, devices, services, or environments for people with disabilities. Accessibility standards that are generally accepted by professional groups include the Web Content Accessibility Guidelines (WCAG) and Accessible Rich Internet Applications (ARIA) standards. [Wikipedia]

Algorithm:

A step-by-step process to complete a task

Computational artifact:

Anything created by a human using a computational thinking process and a computing device. A computational artifact can be, but is not limited to, a program, image, audio, video, presentation, or web page file.

Computer science:

The study of computing principles, design, and applications (hardware and software); the creation, access, and use of information through algorithms and problem-solving; and the impact of computing on society.

Culture:

A human institution manifested in the learned behavior of people, including their specific belief systems, language(s), social relations, technologies, institutions, organizations, and systems for using and developing resources.

Cultural practices:

The displays and behaviors of a culture.

Equity:

The state, quality, or ideal of being just, impartial, and fair.

Marginalized groups (in computer science):

The people who are commonly denied involvement in computer science, including women and non-binary people, Indigenous and Native peoples, Black people, Latinx, English language learners, students with disabilities, students who are neurodivergent, students from low socioeconomic backgrounds, and students who live in urban and rural areas.

Privilege:

The advantage or immunity, and related influence, that is granted or available only to a particular person or group.

Self efficacy:

An individual’s belief in his or her ability to succeed in specific situations or accomplish a task.

Systemic barriers:

Systemic barriers include the lack of computer science offerings, scheduling conflicts, prerequisite courses, school funding and resources, lack of qualified and experienced teachers, inadequate access to technology, additional course requirements for English learners and students with disabilities, and students being pulled out from computer science classes for additional services.

Unconscious bias:

Prejudice or unsupported judgments in favor of or against one thing, person, or group as compared to another, in a way that is usually considered unfair.

Universal design for learning (UDL):

A framework for designing curriculum to be broadly accessible to all students. (See UDL for Learning Guidelines + Computer Science/Computational Thinking in the resources)

Complete knowledge:

All of the skills listed in the proficient level of the Wyoming Computer Science Content and Performance Standards (see the resources) for the chosen standard.

K–14:

Refers to computer science standards ranging from kindergarten into postsecondary education.

Scope and sequence:

Scope refers to the topics and areas of development within a curriculum, and sequence is the order in which those skills are taught.

Grade band:

The computer science standards are written in grade bands (K–2, 3–5, 6–8, and 9–12). The standard committee (CSSRC) determined the standard to be met by the end of the grade band. In grades 9–12, there are level 1 and level 2 standards. Level 1 standards include introductory skills. Level 2 standards are intended for students who wish to advance their study of computer science.

Chosen grade band:

The teacher or earner can choose which secondary grade band and standard to focus their lesson around.

Supporting computer science standard:

There is a difference between supporting standards and performance standards. All students are expected to be instructed on supporting computer science standards, taught within the context of the performance standards. Supporting standards do not need to be assessed through the district assessment system. If no supporting standards are listed on the "Micro-credential Map by Grade Band" in the resources, this area becomes N/A.

Performance standards:

The Wyoming Content and Performance Standards serve several purposes. They articulate a set of expectations for what students should know and be able to do, enabling them to be prepared for college and career success; to live a life that contributes to the global community. These expectations are communicated to students, parents, educators, and all other Wyoming stakeholders, and provide a common understanding among educators as to what students should learn at particular grades. Standards do not dictate methodology, instructional materials used, or how the material is delivered. (See Wyoming Computer Science Content and Performance Standards in the resources.)

Modalities of assessment:

Modalities of assessment include written assessment, oral assessment, performance tasks or visual representations.

Forms of assessment:

These include formative, summative, or student self-assessment.

Systemic barriers:

These include the lack of CS offerings, scheduling conflicts, prerequisite courses, school funding and resources, lack of qualified and experienced teachers, inadequate access to technology, additional course requirements for English learners and students with disabilities, and students being pulled out from CS classes for additional services. [CSTA Teacher Standards]

Social and psychological factors:

These factors include biased beliefs about who can and cannot succeed in CS, isolation of underrepresented students, stereotype threat, lack of diverse representation in curriculum, and lack of diverse STEM role models and peer support networks. These factors can impact students’ perceived ability, aspirations, and performance. [CSTA Teacher Standards]

Background Scenario / How This Will Help You

This micro-credential collection provides earners with the opportunity to document their knowledge and skills in teaching computer science to students in grades 6–12. The content provides resources to support understanding.

Earners are encouraged to participate in additional learning opportunities if more extensive learning is needed. Additional learning opportunities may include free online resources, postsecondary courses, and local courses.

The micro-credential structure offers earners flexible pathways and timelines. Earners can complete the micro-credentials in any order that aligns with their classroom timelines and availability. Micro-credentials offer earners the opportunity to submit evidence and receive evaluator feedback. Earners are encouraged to resubmit evidence until mastery is earned. Each resubmission will be reviewed and updated feedback will be provided.

Evidence Options
Candidates are required to submit multiple pieces of evidence.
Category: Analyze

Complete the ADDIE learning model by preparing evidence for each of the following tasks below: ANALYZE, DESIGN/DEVELOP, IMPLEMENT, and EVALUATE. Once completed upload evidence for review.

Analyze: Standards:

Please complete "02. ANALYZE – Impacts of Computing – Safety, Law & Ethics" in the resources section below. All instructions are included in the worksheet. Once you have completed the worksheet, upload it in the evidence section as a PDF. The resource can be found by following this link: https://bit.ly/2T2C190.

Category: Design/Develop

Lesson Plan:

Find "03. DESIGN/DEVELOP" in the resources section below. All instructions are included in the worksheet. Once you are finished with this task, upload your lesson plan in the evidence section as a PDF. The resource can be found by following this link: https://bit.ly/2Urhzik.

Category: Implement

Implementation:

Implement the set of activities or lesson plan you designed. Submit evidence of student learning for your focus standard. Include evidence of students that have met the standard and students that have not met the standard. Examples include videos of students working, completed student worksheets, etc. Annotate each piece of evidence to demonstrate how you facilitated student achievement of the standard.

Category: Evaluate

Journal:

Find "04. EVALUATE – Worksheet" in the resources section below. All instructions are included in the worksheet. The resource can be found by following this link: https://bit.ly/3xMingf.


Review Criteria

Evidence submissions and reflections will be reviewed for alignment with the assignment guidelines and this proficiency scale, found here: https://bit.ly/3dbggui. This checklist will help you review your submission materials to ensure you address everything that is expected for this micro-credential: https://bit.ly/3Eyxayu.

Reflection Prompts

Please provide a self-assessment, a score from 1–4, on each component of the proficiency scale found here: https://bit.ly/3dbggui. Provide a few sentences stating where the pieces of evidence that support the scores for each component are located.

If you are resubmitting, please indicate what changes were made in the documents (e.g., highlight, text color) and include "Resubmission #" with the resubmission number in the file title when you upload.


Review Criteria

Proficiency scale: https://bit.ly/3dbggui. Checklist: https://bit.ly/3Eyxayu.

Content knowledge – CSTA 4a The teacher demonstrates accurate and complete knowledge of the content and skills of the standard being taught.

Inform instruction through assessment – CSTA 4g The teacher develops multiple forms and modalities of assessment to provide feedback and support. The teacher uses resulting data for instructional decision-making and differentiation.

Supporting standards The teacher identifies and explains the connection of supporting computer science standards to the standard being taught in their lesson.

Vertical alignment – CSTA 4b The teacher explains the relationship of the standard in the scope and sequence of computer science standards directly above and below chosen grade band.

Examine issues of equity in computer science – CSTA 2a The teacher examines how structural barriers and social and psychological factors contribute to at least one of the following: inequitable access, engagement, or achievement in computer science among marginalized groups. The teacher reflects on how issues of equity manifest in their own computer science teaching context.

Resources
Article – Digital Differences
https://www.pewresearch.org/internet/2012/10/17/digital-differences-2/

This presentation discusses how different demographic groups use technology.


Lesson Plan – Be Internet Awesome
https://storage.googleapis.com/gweb-interland.appspot.com/en-us/hub/pdfs/Google_BeInternetAwesome_DigitalCitizenshipSafety_2019Curriculum.pdf

The Be Internet Awesome curriculum is a collaboration between Google, The Net Safety Collaborative, and the Internet Keep Safe Coalition. The curriculum gives educators the tools and methods necessary to teach digital safety and citizenship fundamentals in the classroom. The lesson plans included are best suited for grades 2nd–6th, but educators with both older and younger students have found value in the curriculum, particularly with key vocabulary, class discussions (aged up or down), and gameplay.


Lesson Plan – Everything You Need to Teach Digital Citizenship
https://www.commonsense.org/education/digital-citizenship

Here are ready-to-teach free lessons to address K–12 digital citizenship.


Article – Tips for Protecting Kids and Teens from Identity Theft
https://www.connectsafely.org/tips-for-protecting-kids-and-teens-from-identity-theft/

This resource shares tips for protecting children from identify theft, including data security.


Article – The Educator’s Guide to Student Data Privacy
https://www.connectsafely.org/eduprivacy/

This guide is meant to help teachers utilize technology in the classroom while protecting their students’ privacy.


Webpage – Online Privacy and Safety
https://www.pewresearch.org/topics/privacy-and-safety/

The Pew Research Center provides reports, fact tanks, and presentations on the topic online privacy and safety.


Article – Data Privacy Will be the Most Important Issue in the Next Decade
https://www.forbes.com/sites/marymeehan/2019/11/26/data-privacy-will-be-the-most-important-issue-in-the-next-decade/?sh=54677c291882

Data privacy has become one of the defining social and cultural issues of our era.


Article – Reflecting on Online Privacy and Protection for Teachers and Students
https://www.etprofessional.com/reflecting-on-online-privacy-and-protection-for-teachers-and-students

Two categories of questions that you can use to promote discussion on the topic of online privacy and data protection. Category A looks at the teachers’ privacy issues and can be used in the staffroom or with teacher development groups. Category B looks at general privacy and data protection issues and can be used in a classroom discussion with students.


Research – PreK–12 Barriers
https://leakytechpipeline.com/barrier/pre-k-12-barriers/

Early disparities in prek–12 education limit the opportunities that all children have to engage with technology, take computer science and advanced STEM courses, and explore computing careers.


Research – Computing Whether She Belongs: Stereotypes Undermine Girls' Interest and Sense of Belonging in Computer Science
https://gap.hks.harvard.edu/computing-whether-she-belongs-stereotypes-undermine-girls%E2%80%99-interest-and-sense-belonging-computer

A classroom with a non-stereotypical look creates more inclusive signals of who belongs—increasing high school girls’ interest in computer science without deterring boys.


Article – Equity in Computer Science Education
https://k12cs.org/equity-in-computer-science-education/

Computer science for all students requires that equity be at the forefront of any reform effort. When equity exists, there are appropriate supports based on individual students’ needs so that all have the opportunity to achieve similar levels of success. Equity is not just about whether classes are available, but also about how those classes are taught, how students are recruited, and how the classroom culture supports diverse learners and promotes retention.


Article – When Women Stopped Coding
https://www.npr.org/sections/money/2014/10/21/357629765/when-women-stopped-coding

Modern computer science is dominated by men but it hasn't always been this way. What happened to women in computer science?


Research – Policymaking on Education Data Privacy: Lessons Learned
https://drive.google.com/file/d/1d913lvaPwyZ3fpAIm_4u8OO1a91jOypL/view

This report presents key lessons learned for state boards of education to consider in data privacy policymaking.


Tool – UDL for Learning Guidelines + Computer Science/Computational Thinking
https://ctrl.education.ufl.edu/wp-content/uploads/sites/5/2020/05/Copy-of-UDL-and-CS_CT-remix.pdf

UDL is a framework for designing curriculum to be broadly accessible to ALL students. Learn more about utilizing the UDL framework in computer science education.


Research – Searching for Computer Science: Access and Barriers in U.S. K-12 Education
https://services.google.com/fh/files/misc/searching-for-computer-science_report.pdf

This easy to read research looks into the access and barriers to computer science education. It provides visuals and real data from students, parents, teachers and administrators on their access and viewpoints of computer science.


Standards – CSTA Standards for Computer Science Teachers
https://www.csteachers.org/page/standards-for-cs-teachers

These standards are designed to provide clear guidance on effective and equitable computer science instruction in support of rigorous computer science education for all K–12 students.


Article – Assessing Students' Computational Thinking Application in Core Subject Areas
https://csforall.medium.com/assessing-students-computational-thinking-application-in-core-subject-areas-b6799b117493

This article discusses how computational thinking skills were integrated and assessed in New York City elementary schools.


Article – Assessment Considerations: A Simple Heuristic
https://jaredoleary.com/publications/assessment-considerations-a-simple-heuristic

This article discusses different types of assessments and what to consider when choosing an assessment.


Article – Differentiation: How Do I Use Data to Adjust Instruction for Groups and Individual Students?
https://practices.learningaccelerator.org/problem-of-practice/data-differentiation-how-do-i-use-data-to-inform-instruction-for-groups-and-individual-students

Step-by-step guide showing teachers how they can change their lessons or classroom based on data.


01. PROFICIENCY SCALE – Impacts of Computing – Safety, Law & Ethics
https://docs.google.com/document/d/15ehzp17N4R049Wl5Q4ggo0fJaSbmrMb0gV0KnDBg6es/copy

This scale is provided as a resource for learners to view micro-credential criterion and the performance descriptor levels for demonstration of mastery.


Micro-Credential Map By Grade Band
https://docs.google.com/spreadsheets/d/1E6pQDbFCQ42O1FUzQIakJS9CRKraHiORCXdUXmdcBCw/copy#gid=1114401374

The computer science standards are written in grade bands (K–2, 3–5, 6–8, and 9–12). The standard committee (CSSRC) determined the standard to be met by the end of each grade band. In grades 9-12, there are level 1 and level 2 standards. Level 1 standards include introductory skills. Level 2 standards are intended for students who wish to advance their study of computer science. The teacher or earner can choose which grade band and standard to focus their lesson on.


03. DESIGN/DEVELOP
https://docs.google.com/document/d/1Vboh_Hu3kK53uYJZCcQlDLCB6NTRwVPxvCyszP4zhUY/copy

Use this resource for the design/develop step of the ADDIE model.


04. EVALUATE – Worksheet
https://docs.google.com/document/d/1eevTS3Ay1X9nbtSvWvUjX7yj6DwaiZYEAAsyuNGlEb4/copy

Evaluate how effective your activities were at promoting student learning of the standards. Use specific examples from the artifacts you submitted in Implement and suggest any changes in practice or approach that you might make in the future based on your experience with this micro-credential.


02. ANALYZE – Impacts of Computing – Safety, Law & Ethics
https://docs.google.com/document/d/1OZEdsMCXe5T5X_pJF3eLb1macE_2mpEDDhgVrljW1bk/copy?usp=sharing

Analyze the student and teacher standards aligned with the Impacts of Computing – Safety, Law & Ethics micro-credential. Aligned standards and instructions for selecting a focus standard are outlined below the task description. There are two parts to this task.


Research – Teacher Perspectives on COVID-19’s Impact on K-12 Computer Science Instruction
https://www.kaporcenter.org/teacher-perspectives-on-covid-19s-impact-on-k-12-computer-science-instruction/#:~:text=OnwardUS-,Teacher%20Perspectives%20on%20COVID%2D19's%20Impact,K%2D12%20Computer%20Science%20Instruction&text=Teachers%20in%20rural%20schools

This report identified the issues and recommendations of K-12 computer science education in terms of equity and under representation such as gender, race, highpower, low-power, and rural districts.


Research – Path Not Found: Disparities in Access to Computer Science Courses in California High Schools
https://eric.ed.gov/?id=ED561181

This report provides new, detailed data on these disparities by student body demographics such as race, socioeconomic status, and primary language. The report also highlights low computer science enrollment in California's 20 largest school districts and offers recommendations to close these gaps in opportunity.


Standards – Wyoming Computer Science Content and Performance Standards
https://edu.wyoming.gov/wp-content/uploads/2021/04/2020-CS-WYCPS-with-all-PLDs-effective-04.07.21.pdf

Performance Level Descriptors (PLDs) describe the performance expectations of students for each of the four (4) performance level categories: advanced, proficient, basic, and below basic. These are a description of what students within each performance level are expected to know and be able to do. All PLDs are found in this document.


Video – Teen Voices: Who You're Talking to Online
https://youtu.be/DiI8Lj0_TGQ

In this video teens discuss how you really don't know who you are talking to if you are just talking to them online. It talks about the pros and cons of an online friend and how to be careful with what you share.


Video – The Three Big Ethical Concerns with Artificial Intelligence
https://youtu.be/1LyacmzB1Og

This brief video introduces three big ethical concerns about AI and it's uses.


Video – Ethics & AI: Privacy & the Future of Work
https://youtu.be/zNxw5gJtHLc

This video explores the ethics of developing AI responsibly and fairly while respecting peoples' privacy and livelihoods.


Article – "Unwrapping" the Standards: A Simple Way to Deconstruct Learning Outcomes
https://corwin-connect.com/2015/03/unwrapping-the-standards-a-simple-way-to-deconstruct-learning-outcomes/

“Unwrapping” is a simple method that all teachers in all grade levels can use to deconstruct the wording of any standard in order to know its meaning inside and out.


Sample Response – Completed Devices Micro-Credential
https://drive.google.com/file/d/1ESoWRRdNZRjruO2j-1eq4CUU3YoWLlh1/view?usp=sharing

This resource includes a sample response for analyze, design/develop, implement, and analyze as well as a sample reflection prompt response for the devices micro-credential.


Safety, Law, and Ethics Micro-credential Checklist
https://docs.google.com/document/d/1KBEVnAi6dZ4LKIlvYamjp2CQ27F_OZ8mi6xh85Qxl3U/copy

This checklist will help you review your submission materials to ensure you address everything that is expected for this micro-credential.

Earners
Jennifer Anderson

Jennifer Anderson
Abigail Bever

Abigail Bever
Jill Felbeck-Jones

Jill Felbeck-Jones
Kiesa Geyer

Kiesa Geyer
Abby Hurley

Abby Hurley
Debbie Jacobson

Debbie Jacobson
Walt Smith

Walt Smith

Wyoming Department of Education

122 W. 25th St. Suite E200

Cheyenne, WY 82002

Phone: (307) 777-7675 

© Copyright 2022 Wyoming Department of Education