{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,7]],"date-time":"2025-11-07T09:37:35Z","timestamp":1762508255935,"version":"build-2065373602"},"reference-count":40,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2025,5,21]],"date-time":"2025-05-21T00:00:00Z","timestamp":1747785600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,5,21]],"date-time":"2025-05-21T00:00:00Z","timestamp":1747785600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"name":"University of Maryland, College of Education"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Tech Know Learn"],"published-print":{"date-parts":[[2025,12]]},"DOI":"10.1007\/s10758-025-09856-4","type":"journal-article","created":{"date-parts":[[2025,5,21]],"date-time":"2025-05-21T10:41:45Z","timestamp":1747824105000},"page":"2081-2102","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Designing About Data: Youth and Teacher Design Priorities for a Curricular Unit About Online Data Collection and Use"],"prefix":"10.1007","volume":"30","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0535-1876","authenticated-orcid":false,"given":"Merijke","family":"Coenraad","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,5,21]]},"reference":[{"issue":"CSCW1","key":"9856_CR1","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3579625","volume":"7","author":"Z Agha","year":"2023","unstructured":"Agha, Z., Badillo-Urquiola, K., & Wisniewski, P. J. (2023). \u201cStrike at the root\u201d: Co-designing real-time social media interventions for adolescent online risk prevention. Proceedings of the ACM on Human\u2013computer Interaction, 7(CSCW1), 1\u201332. https:\/\/doi.org\/10.1145\/3579625","journal-title":"Proceedings of the ACM on Human\u2013computer Interaction"},{"key":"9856_CR2","volume-title":"Race after technology: Abolitionist tools for the New Jim Code","author":"R Benjamin","year":"2019","unstructured":"Benjamin, R. (2019). Race after technology: Abolitionist tools for the New Jim Code. Polity Press."},{"doi-asserted-by":"crossref","unstructured":"Bj\u00f6rgvinsson, E., Ehn, P., & Hillgren, P.-A. (2010). Participatory design and \u201cdemocratizing innovation\u201d. In Proceedings of the 11th participatory design conference\u2014PDC\u201910 (pp. 41\u201350).","key":"9856_CR3","DOI":"10.1145\/1900441.1900448"},{"unstructured":"Children\u2019s Commissioner. (2018). Who knows what about me? https:\/\/www.childrenscommissioner.gov.uk\/wp-content\/uploads\/2018\/11\/cco-who-knows-what-about-me.pdf","key":"9856_CR4"},{"unstructured":"Children\u2019s Online Privacy Protection Rule (\u201cCOPPA\u201d), 15 U.S.C. \u00a7 6501 (1998). https:\/\/www.ftc.gov\/enforcement\/rules\/rulemaking-regulatory-reform-proceedings\/childrens-online-privacy-protection-rule","key":"9856_CR5"},{"issue":"7\u20138","key":"9856_CR6","doi-asserted-by":"publisher","first-page":"500","DOI":"10.1108\/ILS-03-2022-0024","volume":"123","author":"M Coenraad","year":"2022","unstructured":"Coenraad, M. (2022). \u201cThat\u2019s what techquity is\u201d: Youth perceptions of technological and algorithmic bias. Information and Learning Science, 123(7\u20138), 500\u2013525. https:\/\/doi.org\/10.1108\/ILS-03-2022-0024","journal-title":"Information and Learning Science"},{"doi-asserted-by":"crossref","unstructured":"Coenraad, M., & Weintrop, D. (2024). Talking Techquity: Teaching the Equity and Social Justice Impacts of Computing in Middle School Classrooms. In Proceedings of the 55th ACM Technical Symposium on Computer Science Education V. 1 (pp. 227\u2013233). Coenraad, M. (In Press). Teacher Adaptational in the Implementation of a Co-Designed Curriculum. Educational Designer.","key":"9856_CR99","DOI":"10.1145\/3626252.3630935"},{"key":"9856_CR7","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcci.2021.100353","author":"M Coenraad","year":"2021","unstructured":"Coenraad, M., Palmer, J., Eatinger, D., Weintrop, D., & Franklin, D. (2021). Using participatory design to integrate stakeholder voices in the creation of a culturally relevant computing curriculum. International Journal of Child-Computer Interaction. https:\/\/doi.org\/10.1016\/j.ijcci.2021.100353","journal-title":"International Journal of Child-Computer Interaction"},{"doi-asserted-by":"publisher","unstructured":"Coenraad, M., Palmer, J., Franklin, D., & Weintrop, D. (2019). Enacting identities: Participatory design as a context for youth to reflect, project, and apply their emerging identities. In Proceedings of interaction design and children 2019 (IDC \u201919) (pp. 185\u2013196). https:\/\/doi.org\/10.1145\/3311927.3323148","key":"9856_CR8","DOI":"10.1145\/3311927.3323148"},{"doi-asserted-by":"crossref","unstructured":"Druin, A. (1999). Cooperative inquiry: Developing new technologies for children with children. In CHI \u201999 proceedings of the ACM SIGCHI conference on human factors in computing system (pp. 592\u2013599). http:\/\/www.cs.umd.edu\/hcil","key":"9856_CR9","DOI":"10.1145\/302979.303166"},{"issue":"1","key":"9856_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1080\/01449290110108659","volume":"21","author":"A Druin","year":"2002","unstructured":"Druin, A. (2002). The role of children in the design of new technology. Behavior & Information Technology, 21(1), 1\u201325. https:\/\/doi.org\/10.1080\/01449290110108659","journal-title":"Behavior & Information Technology"},{"issue":"2","key":"9856_CR11","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1561\/1100000018","volume":"6","author":"JA Fails","year":"2012","unstructured":"Fails, J. A., Guha, M. L., & Druin, A. (2012). Methods and techniques for involving children in the design of new technology for children. Foundations and Trends in Human-Computer Interaction, 6(2), 85\u2013166. https:\/\/doi.org\/10.1561\/1100000018","journal-title":"Foundations and Trends in Human-Computer Interaction"},{"key":"9856_CR12","doi-asserted-by":"publisher","DOI":"10.1016\/j.chiabu.2021.105064","author":"D Finkelhor","year":"2021","unstructured":"Finkelhor, D., Jones, L., & Mitchell, K. (2021). Teaching privacy: A flawed strategy for children\u2019s online safety. Child Abuse & Neglect. https:\/\/doi.org\/10.1016\/j.chiabu.2021.105064","journal-title":"Child Abuse & Neglect"},{"key":"9856_CR13","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1016\/j.ijcci.2012.08.003","volume":"1","author":"ML Guha","year":"2013","unstructured":"Guha, M. L., Druin, A., & Fails, J. A. (2013). Cooperative Inquiry revisited: Reflections of the past and guidelines for the future of intergenerational co-design. International Journal of Child-Computer Interaction, 1, 14\u201323. https:\/\/doi.org\/10.1016\/j.ijcci.2012.08.003","journal-title":"International Journal of Child-Computer Interaction"},{"issue":"CSCW","key":"9856_CR14","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3359318","volume":"3","author":"CN Harrington","year":"2019","unstructured":"Harrington, C. N., Erete, S., & Piper, A. M. (2019). Deconstructing community-based collaborative design: Towards more equitable participatory design engagements. Proceedings of Computer Supported Collaborative Work, 3(CSCW), 1\u201325. https:\/\/doi.org\/10.1145\/3359318","journal-title":"Proceedings of Computer Supported Collaborative Work"},{"doi-asserted-by":"publisher","unstructured":"Iversen, O. S., Smith, R. C., & Dindler, C. (2018). From computational thinking to computational empowerment: A 21st century PD agenda. In PDC \u201918: Proceedings of the 15th participatory design conference\u2014Volume 1. https:\/\/doi.org\/10.1145\/3210586.3210592","key":"9856_CR15","DOI":"10.1145\/3210586.3210592"},{"unstructured":"John, L. K., Kim, T., & Barasz, K. (2018). Ads that don\u2019t overstep. Harvard Business Review. https:\/\/hbr.org\/2018\/01\/ads-that-dont-overstep","key":"9856_CR16"},{"doi-asserted-by":"crossref","unstructured":"Kumar, P. C., Chetty, M., Clegg, T. L., & Vitak, J. (2019). Privacy and security considerations for digital technology use in elementary schools. In CHI conference on human factors in computing systems proceedings (CHI 2019) (pp. 1\u201313).","key":"9856_CR17","DOI":"10.1145\/3290605.3300537"},{"doi-asserted-by":"publisher","unstructured":"Kumar, P. C., O\u2019Connell, F., Li, L., Byrne, V. L., Chetty, M., Clegg, T. L., & Vitak, J. (2023). Understanding research related to designing for children\u2019s privacy and security: A document analysis. In Interaction Design and Children (IDC \u201923)2 (pp. 335\u2013354). https:\/\/doi.org\/10.1145\/3585088.3589375","key":"9856_CR18","DOI":"10.1145\/3585088.3589375"},{"doi-asserted-by":"publisher","unstructured":"Kumar, P. C., & Schoenebeck, S. (2015). The modern day baby book: Enacting good mothering and stewarding privacy on Facebook. In Proceedings of the 2015 ACM international conference on computer-supported cooperative work and social computing (pp. 1302\u20131312). https:\/\/doi.org\/10.1145\/2675133.2675149","key":"9856_CR19","DOI":"10.1145\/2675133.2675149"},{"issue":"4","key":"9856_CR20","doi-asserted-by":"publisher","first-page":"175","DOI":"10.17645\/mac.v8i4.3236","volume":"8","author":"PC Kumar","year":"2020","unstructured":"Kumar, P. C., Subramaniam, M., Vitak, J., Clegg, T. L., & Chetty, M. (2020). Strengthening children\u2019s privacy literacy through contextual integrity. Media and Communication, 8(4), 175\u2013184. https:\/\/doi.org\/10.17645\/mac.v8i4.3236","journal-title":"Media and Communication"},{"doi-asserted-by":"publisher","unstructured":"Kumar, P. C., Vitak, J., Chetty, M., Clegg, T. L., Yang, J., McNally, B., & Bonsignore, E. (2018). Co-designing online privacy-related games and stories with children. In IDC 2018\u2014Proceedings of the 2018 ACM conference on interaction design and children (pp. 67\u201379). https:\/\/doi.org\/10.1145\/3202185.3202735","key":"9856_CR21","DOI":"10.1145\/3202185.3202735"},{"key":"9856_CR22","volume-title":"Qualitative research design: An interactive approach","author":"JA Maxwell","year":"2013","unstructured":"Maxwell, J. A. (2013). Qualitative research design: An interactive approach (3rd ed.). Sage Publications, Inc.","edition":"3"},{"key":"9856_CR23","doi-asserted-by":"publisher","DOI":"10.1016\/j.childyouth.2021.106170","author":"I Milkaite","year":"2021","unstructured":"Milkaite, I., De Wolf, R., Lievens, E., De Leyn, T., & Martens, M. (2021). Children\u2019s reflections on privacy and the protection of their personal data: A child-centric approach to data protection information formats. Children and Youth Services Review. https:\/\/doi.org\/10.1016\/j.childyouth.2021.106170","journal-title":"Children and Youth Services Review"},{"issue":"6","key":"9856_CR24","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1145\/153571.255960","volume":"36","author":"MMJ Muller","year":"1993","unstructured":"Muller, M. M. J., & Kuhn, S. (1993). Participatory design. Communications of the ACM, 36(6), 24\u201328. https:\/\/doi.org\/10.1145\/153571.255960","journal-title":"Communications of the ACM"},{"key":"9856_CR25","volume-title":"Weapons of math destruction: How big data increases inequality and threatens democracy","author":"C O\u2019Neil","year":"2016","unstructured":"O\u2019Neil, C. (2016). Weapons of math destruction: How big data increases inequality and threatens democracy. Crown."},{"issue":"1","key":"9856_CR26","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1142\/S1793206807000300","volume":"2","author":"WR Penuel","year":"2007","unstructured":"Penuel, W. R., Roschelle, J., & Shechtman, N. (2007). Designing formative assessment software with teachers: An analysis of the co-design process. Research and Practice in Technology Enhanced Learning, 2(1), 51\u201374. https:\/\/doi.org\/10.1142\/S1793206807000300","journal-title":"Research and Practice in Technology Enhanced Learning"},{"issue":"3\u20134","key":"9856_CR27","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1504\/IJSD.2020.115206","volume":"23","author":"V Petousi","year":"2020","unstructured":"Petousi, V., & Sifaki, E. (2020). Contextualising harm in the framework of research misconduct. Findings from discourse analysis of scientific publications. International Journal of Sustainable Development, 23(3\u20134), 149\u2013174. https:\/\/doi.org\/10.1504\/IJSD.2020.115206","journal-title":"International Journal of Sustainable Development"},{"unstructured":"Pew Research Center. (2018). Teens, social media & technology 2018. http:\/\/assets.pewresearch.org\/wpcontent\/uploads\/sites\/14\/2018\/05\/31102617\/PI_2018.05.31_TeensTech_FINAL.pdf","key":"9856_CR28"},{"issue":"3","key":"9856_CR29","doi-asserted-by":"publisher","first-page":"477","DOI":"10.1080\/10508406.2017.1307199","volume":"26","author":"N Pinkard","year":"2017","unstructured":"Pinkard, N., Erete, S., Martin, C. K., & McKinney de Royston, M. (2017). Digital Youth Divas: Exploring narrative-driven curriculum to spark middle school girls\u2019 interest in computational activities. Journal of the Learning Sciences, 26(3), 477\u2013516. https:\/\/doi.org\/10.1080\/10508406.2017.1307199","journal-title":"Journal of the Learning Sciences"},{"key":"9856_CR30","volume-title":"The coding manual for qualitative researchers","author":"J Salda\u00f1a","year":"2015","unstructured":"Salda\u00f1a, J. (2015). The coding manual for qualitative researchers (3rd ed.). Sage.","edition":"3"},{"issue":"1","key":"9856_CR31","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1080\/15710880701875068","volume":"4","author":"EB-N Sanders","year":"2008","unstructured":"Sanders, E.B.-N., & Stappers, P. J. (2008). Co-creation and the new landscapes of design. CoDesign, 4(1), 5\u201318. https:\/\/doi.org\/10.1080\/15710880701875068","journal-title":"CoDesign"},{"doi-asserted-by":"crossref","unstructured":"Scaife, M., Rogers, Y., Aldrich, F., & Davies, M. (1997). Designing for or designing with? Informant design for interactive learning environments. In CHI \u201997 proceedings of the ACM SIGCHI conference on human factors in computing system (pp. 343\u2013350). http:\/\/ldt.stanford.edu\/~jsulzen\/james-sulzen-portfolio\/classes\/ED229b\/Readings\/ED229B-Readings\/www.stanford.edu\/class\/ed229b\/fall00\/readings\/p343-scaife.pdf","key":"9856_CR32","DOI":"10.1145\/258549.258789"},{"unstructured":"Speicher, T., Ali, M., Venkatadri, G., Ribeiro, F., Arvanitakis, G., Benevenuto, F., Gummadi, K., Loiseau, P., & Mislove, A. (2018). Potential for discrimination in online targeted advertising. In FAT 2018\u2014Conference on fairness, Ac-countability, and transparency. https:\/\/hal.archives-ouvertes.fr\/hal-01955343","key":"9856_CR33"},{"key":"9856_CR34","doi-asserted-by":"publisher","DOI":"10.1007\/s10758-024-09765-y","author":"AO Sunday","year":"2024","unstructured":"Sunday, A. O., Agbo, F. J., & Suhonen, J. (2024). Co-design pedagogy for computational thinking education in K-12: A systematic literature review. Technology, Knowledge and Learning. https:\/\/doi.org\/10.1007\/s10758-024-09765-y","journal-title":"Technology, Knowledge and Learning."},{"key":"9856_CR35","doi-asserted-by":"publisher","first-page":"1143","DOI":"10.1126\/science.1128690","volume":"312","author":"RH Tai","year":"2006","unstructured":"Tai, R. H., Liu, C. Q., Maltese, A. V., & Fan, X. (2006). Planning early for careers in science. Science, 312, 1143\u20131144. https:\/\/doi.org\/10.1126\/science.1128690","journal-title":"Science"},{"key":"9856_CR36","doi-asserted-by":"publisher","first-page":"116","DOI":"10.1016\/j.ijhcs.2016.09.005","volume":"97","author":"M Van Mechelen","year":"2017","unstructured":"Van Mechelen, M., Derboven, J., Laenen, A., Willems, B., Geerts, D., & Vanden Abeele, V. (2017). The GLID method: Moving from design features to underlying values in co-design. International Journal of Human Computer Studies, 97, 116\u2013128. https:\/\/doi.org\/10.1016\/j.ijhcs.2016.09.005","journal-title":"International Journal of Human Computer Studies"},{"key":"9856_CR37","volume-title":"Technically wrong: Sexist apps, biased algorithms, and other threats of toxic tech","author":"S Wachter-Boettcher","year":"2017","unstructured":"Wachter-Boettcher, S. (2017). Technically wrong: Sexist apps, biased algorithms, and other threats of toxic tech. W.W. Norton & Company."},{"doi-asserted-by":"publisher","unstructured":"Wisniewski, P., Xu, H., Rosson, M. B., Perkins, D. F., & Carroll, J. M. (2016). Dear diary: Teens reflect on their weekly online risk experiences. In Proceedings of conference on human factors in computing systems (CHI 2016) (pp. 3919\u20133930). https:\/\/doi.org\/10.1145\/2858036.2858317","key":"9856_CR38","DOI":"10.1145\/2858036.2858317"},{"doi-asserted-by":"publisher","unstructured":"Yip, J. C., Sobel, K., Gao, X., Hishikawa, A. M., Lim, A., Meng, L., Ofiana, R. F., Park, J., & Hiniker, A. (2019). Laughing is scary, but farting is cute: A conceptual model of children\u2019s perspectives of creepy technologies. In CHI conference on human factors in computing systems proceedings (CHI 2019) (pp. 1\u201315). https:\/\/doi.org\/10.1145\/3290605.3300303","key":"9856_CR39","DOI":"10.1145\/3290605.3300303"}],"container-title":["Technology, Knowledge and Learning"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10758-025-09856-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10758-025-09856-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10758-025-09856-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,7]],"date-time":"2025-11-07T09:21:06Z","timestamp":1762507266000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10758-025-09856-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,5,21]]},"references-count":40,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2025,12]]}},"alternative-id":["9856"],"URL":"https:\/\/doi.org\/10.1007\/s10758-025-09856-4","relation":{},"ISSN":["2211-1662","2211-1670"],"issn-type":[{"type":"print","value":"2211-1662"},{"type":"electronic","value":"2211-1670"}],"subject":[],"published":{"date-parts":[[2025,5,21]]},"assertion":[{"value":"23 April 2025","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 May 2025","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors have no relevant financial or non-financial interests to disclose.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}]}}