Skip to content
Biology · 11th Grade

Active learning ideas

Threats to Biodiversity

Students remember biodiversity threats best when they see them as interconnected, place-based problems rather than abstract concepts. Active learning turns global data into local stories, letting students trace habitat loss from their own neighborhood to tropical forests through shared case studies and hands-on mapping.

Common Core State StandardsHS-LS2-7HS-ESS3-4
30–50 minPairs → Whole Class4 activities

Activity 01

Gallery Walk45 min · Small Groups

Gallery Walk: Five Threats, Five Case Studies

Post five stations around the room, each featuring a real biodiversity crisis (Amazon deforestation, Burmese pythons in Florida, Gulf dead zone, coral bleaching, Atlantic bluefin tuna overharvest). Students rotate with recording sheets, identify the primary threat mechanism at each station, and rank threats by severity with justification.

Analyze how habitat fragmentation contributes to biodiversity loss.

Facilitation TipDuring the Gallery Walk, place one printed case study and one threat label at each station to physically separate the concept from the example, forcing students to match them thoughtfully.

What to look forPresent students with three short scenarios describing different threats (e.g., a new housing development, a shipment of exotic pets, increased industrial emissions). Ask students to identify the primary threat in each scenario and briefly explain why.

UnderstandApplyAnalyzeCreateRelationship SkillsSocial Awareness
Generate Complete Lesson

Activity 02

Think-Pair-Share30 min · Pairs

Think-Pair-Share: Fragmentation Mapping

Provide satellite imagery of a fragmented forest region (available from USGS Earth Explorer). Students individually identify habitat patches, estimate connectivity, and predict which species would be most affected. Pairs then compare predictions before a whole-class debrief on corridor design.

Explain the impact of invasive species on native ecosystems.

Facilitation TipFor Fragmentation Mapping, provide a single sheet with pre-drawn local patches and colored pencils so students can immediately see isolation effects without getting bogged down in drawing.

What to look forPose the question: 'If you had limited conservation funds, how would you prioritize addressing threats to biodiversity in your local region? Justify your choices by referencing the interconnectedness of these threats.'

UnderstandApplyAnalyzeSelf-AwarenessRelationship Skills
Generate Complete Lesson

Activity 03

Jigsaw50 min · Small Groups

Jigsaw: Invasive Species Expert Groups

Assign each group one invasive species in the US (kudzu, emerald ash borer, Asian carp, zebra mussel). Groups research ecological impact, economic cost, and control efforts, then regroup to share with students who studied different species. Each group produces a one-page brief.

Evaluate the relative importance of different threats to global biodiversity.

Facilitation TipIn the Jigsaw, assign each expert group a different invasive species pathway graphic to analyze before they teach their home group, ensuring every student engages with evidence before discussion.

What to look forOn an index card, have students write the definition of one key vocabulary term in their own words and then provide a specific example of that threat from a US ecosystem.

UnderstandAnalyzeEvaluateRelationship SkillsSelf-Management
Generate Complete Lesson

Activity 04

Case Study Analysis35 min · Individual

Data Analysis: IUCN Red List Trends

Students access IUCN Red List summary statistics and plot the number of species in each threat category over time. They identify which taxonomic groups show the steepest decline and construct an argument for which threat is most urgent based on the data.

Analyze how habitat fragmentation contributes to biodiversity loss.

What to look forPresent students with three short scenarios describing different threats (e.g., a new housing development, a shipment of exotic pets, increased industrial emissions). Ask students to identify the primary threat in each scenario and briefly explain why.

AnalyzeEvaluateCreateDecision-MakingSelf-Management
Generate Complete Lesson

Templates

Templates that pair with these Biology activities

Drop them into your lesson, edit them, and print or share.

A few notes on teaching this unit

Teachers should begin with local examples before scaling to global patterns, because students grasp abstract statistics more easily when tied to familiar landscapes. Avoid starting with definitions; instead, let students construct meanings through mapping and data analysis first. Research shows that when students trace real introduction pathways or overlay habitat corridors on maps, their understanding of unintentional threats and connectivity deepens more than with lectures alone.

By the end of these activities, students will identify primary drivers of biodiversity loss, explain how fragmentation differs from destruction, and justify conservation priorities using real data and local examples. They will also recognize that many threats are unintentional and require preventive action, not just clean-up.


Watch Out for These Misconceptions

  • During the Fragmentation Mapping activity, watch for students who color all patches the same, assuming that habitat quality is unchanged within fragments.

    Have students label each patch with a habitat quality score based on edge effects, patch size, and connectivity before drawing movement arrows, so they see that smaller or more isolated patches often have lower quality even if they look intact.

  • During the Jigsaw: Invasive Species Expert Groups, watch for the assumption that all invasive species were introduced deliberately for a purpose.

    Ask each group to trace the documented pathway of their species using NOAA or USGS maps of shipping lanes or pet trade routes, then present how accidental introductions led to harm, shifting the focus from control to prevention.

  • During the Data Analysis: IUCN Red List Trends, watch for students interpreting climate change as a future risk rather than an ongoing driver.


Methods used in this brief