{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,19]],"date-time":"2026-01-19T02:49:50Z","timestamp":1768790990539,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":103,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,5,11]],"date-time":"2024-05-11T00:00:00Z","timestamp":1715385600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"NSF","award":["2039616"],"award-info":[{"award-number":["2039616"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,5,11]]},"DOI":"10.1145\/3613904.3642460","type":"proceedings-article","created":{"date-parts":[[2024,5,11]],"date-time":"2024-05-11T08:38:25Z","timestamp":1715416705000},"page":"1-26","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["Teaching Middle Schoolers about the Privacy Threats of Tracking and Pervasive Personalization: A Classroom Intervention Using Design-Based Research"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4290-584X","authenticated-orcid":false,"given":"Sushmita","family":"Khan","sequence":"first","affiliation":[{"name":"School of Computing, Clemson University, United States"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3786-8121","authenticated-orcid":false,"given":"Mehtab","family":"Iqbal","sequence":"additional","affiliation":[{"name":"School of Computing, Clemson University, United States"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8406-9467","authenticated-orcid":false,"given":"Oluwafemi","family":"Osho","sequence":"additional","affiliation":[{"name":"School of Computing, Clemson University, United States"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-2803-0228","authenticated-orcid":false,"given":"Khushbu","family":"Singh","sequence":"additional","affiliation":[{"name":"College of Education, Clemson University, United States"}]},{"ORCID":"https:\/\/orcid.org\/0009-0005-9082-1199","authenticated-orcid":false,"given":"Kyra","family":"Derrick","sequence":"additional","affiliation":[{"name":"Clemson University, United States"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-3768-5592","authenticated-orcid":false,"given":"Philip","family":"Nelson","sequence":"additional","affiliation":[{"name":"Pandemic Response Accountability Committee, United States"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8640-9936","authenticated-orcid":false,"given":"Lingyuan","family":"Li","sequence":"additional","affiliation":[{"name":"School of Computing, Clemson University, United States"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3372-7778","authenticated-orcid":false,"given":"Emily","family":"Sidnam-Mauch","sequence":"additional","affiliation":[{"name":"School of Computing, Clemson University, United States"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2986-6468","authenticated-orcid":false,"given":"Nicole","family":"Bannister","sequence":"additional","affiliation":[{"name":"College of Education, Clemson University, United States"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3025-4194","authenticated-orcid":false,"given":"Kelly","family":"Caine","sequence":"additional","affiliation":[{"name":"School of Computing, Clemson University, United States"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1341-0669","authenticated-orcid":false,"given":"Bart","family":"Knijnenburg","sequence":"additional","affiliation":[{"name":"School of Computing, Clemson University, United States"}]}],"member":"320","published-online":{"date-parts":[[2024,5,11]]},"reference":[{"key":"e_1_3_3_3_1_1","doi-asserted-by":"publisher","DOI":"10.1108\/jcm-06-2015-1458"},{"key":"e_1_3_3_3_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.childyouth.2020.105695"},{"key":"e_1_3_3_3_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445226"},{"key":"e_1_3_3_3_4_1","doi-asserted-by":"publisher","DOI":"10.1080\/15248372.2010.516417"},{"key":"e_1_3_3_3_5_1","first-page":"29","article-title":"Design-based research and educational technology: Rethinking technology and the research agenda","volume":"11","author":"Amiel Tel","year":"2008","unstructured":"Tel Amiel and Thomas\u00a0C Reeves. 2008. Design-based research and educational technology: Rethinking technology and the research agenda. Journal of educational technology & society 11, 4 (2008), 29\u201340.","journal-title":"Journal of educational technology & society"},{"key":"e_1_3_3_3_6_1","volume-title":"Social Media & Technology","author":"Anderson Monica","year":"2018","unstructured":"Monica Anderson and Jingjing Jiang. 2018. Teens, Social Media & Technology 2018. Technical Report. PEW Research Center, Washington, D.C."},{"key":"e_1_3_3_3_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3349266.3351399"},{"key":"e_1_3_3_3_9_1","volume-title":"IEEE Computer Society Security and Privacy Workshops. IEEE","author":"Balebako Rebecca","year":"2012","unstructured":"Rebecca Balebako, Pedro Leon, Richard Shay, Blase Ur, Yang Wang, and Lorrie Cranor. 2012. Measuring the effectiveness of privacy tools for limiting behavioral advertising. In IEEE Computer Society Security and Privacy Workshops. IEEE, Citeseer, San Francisco, LA, USA."},{"key":"e_1_3_3_3_10_1","doi-asserted-by":"publisher","DOI":"10.1017\/9781108888295.012"},{"key":"e_1_3_3_3_11_1","volume-title":"On the theoretical breadth of design-based research in education. Educational psychologist 39, 4","author":"Bell Philip","year":"2004","unstructured":"Philip Bell. 2004. On the theoretical breadth of design-based research in education. Educational psychologist 39, 4 (2004), 243\u2013253."},{"key":"e_1_3_3_3_12_1","unstructured":"Benjamin Bloom. 1956. Bloom\u2019s taxonomy."},{"key":"e_1_3_3_3_13_1","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2017-0020"},{"key":"e_1_3_3_3_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300271"},{"key":"e_1_3_3_3_15_1","volume-title":"Design experiments: Theoretical and methodological challenges in creating complex interventions in classroom settings. The journal of the learning sciences 2, 2","author":"Brown L","year":"1992","unstructured":"Ann\u00a0L Brown. 1992. Design experiments: Theoretical and methodological challenges in creating complex interventions in classroom settings. The journal of the learning sciences 2, 2 (1992), 141\u2013178."},{"key":"e_1_3_3_3_16_1","volume-title":"Constructing Grounded Theory","author":"Charmaz Kathy","unstructured":"Kathy Charmaz. 2014. Constructing Grounded Theory (second ed.). SAGE Publications ltd, Thousand Oaks, California."},{"key":"e_1_3_3_3_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/FIE.2018.8659278"},{"key":"e_1_3_3_3_18_1","doi-asserted-by":"publisher","DOI":"10.1080\/19345747.2017.1300362"},{"key":"e_1_3_3_3_19_1","volume-title":"Design-based research: An emerging paradigm for educational inquiry. Educational researcher 32, 1","author":"Collective Based\u00a0Research","year":"2003","unstructured":"Design-Based\u00a0Research Collective. 2003. Design-based research: An emerging paradigm for educational inquiry. Educational researcher 32, 1 (2003), 5\u20138."},{"key":"e_1_3_3_3_20_1","doi-asserted-by":"publisher","DOI":"10.1021\/ed300686h"},{"key":"e_1_3_3_3_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2022.107423"},{"key":"e_1_3_3_3_22_1","doi-asserted-by":"publisher","DOI":"10.1080\/17439884.2012.658404"},{"key":"e_1_3_3_3_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300533"},{"key":"e_1_3_3_3_24_1","doi-asserted-by":"publisher","DOI":"10.1080\/00405841.2016.1148989"},{"key":"e_1_3_3_3_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3502718.3524782"},{"key":"e_1_3_3_3_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3159450.3159553"},{"key":"e_1_3_3_3_27_1","first-page":"131","article-title":"The logic of design research. Learning","volume":"4","author":"Easterday W","year":"2018","unstructured":"Matthew\u00a0W Easterday, Daniel\u00a0G Rees\u00a0Lewis, and Elizabeth\u00a0M Gerber. 2018. The logic of design research. Learning: Research and Practice 4, 2 (2018), 131\u2013160.","journal-title":"Research and Practice"},{"key":"e_1_3_3_3_28_1","doi-asserted-by":"publisher","DOI":"10.24251\/HICSS.2018.596"},{"key":"e_1_3_3_3_29_1","volume-title":"Discovering Statistics Using R","author":"Field P.","unstructured":"Andy\u00a0P. Field, Jeremy Miles, and Zo\u00eb Field. 2012. Discovering Statistics Using R. Sage, London ; Thousand Oaks, Calif."},{"key":"e_1_3_3_3_30_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chiabu.2021.105064"},{"key":"e_1_3_3_3_31_1","unstructured":"Mary Forehand. 2010. Bloom\u2019s Taxonomy. Global Text Zurich Switzerland 41\u201346."},{"key":"e_1_3_3_3_32_1","doi-asserted-by":"publisher","DOI":"10.1108\/00012530710752052"},{"key":"e_1_3_3_3_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2011.180"},{"key":"e_1_3_3_3_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3511047.3537680"},{"key":"e_1_3_3_3_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/3545945.3569750"},{"key":"e_1_3_3_3_36_1","first-page":"99","article-title":"Supporting Inclusive Learning Using Chatbots? A Chatbot- Led Interview Study","volume":"33","author":"Gupta Sambhav","year":"2022","unstructured":"Sambhav Gupta and Yu Chen. 2022. Supporting Inclusive Learning Using Chatbots? A Chatbot- Led Interview Study. Journal of Information Systems Education 33, 1 (2022), 99\u2013109.","journal-title":"Journal of Information Systems Education"},{"key":"e_1_3_3_3_37_1","doi-asserted-by":"publisher","DOI":"10.1080\/0969594970040304"},{"key":"e_1_3_3_3_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300645"},{"key":"e_1_3_3_3_39_1","doi-asserted-by":"publisher","DOI":"10.1080\/00461520.2022.2079128"},{"key":"e_1_3_3_3_40_1","volume-title":"Methodological alignment in design-based research. Educational psychologist 39, 4","author":"Hoadley M","year":"2004","unstructured":"Christopher\u00a0M Hoadley. 2004. Methodological alignment in design-based research. Educational psychologist 39, 4 (2004), 203\u2013212."},{"key":"e_1_3_3_3_41_1","volume-title":"Being digital citizens (2 ed.)","author":"Isin Engin","unstructured":"Engin Isin and Evelyn Ruppert. 2020. Being digital citizens (2 ed.). Rowman & Littlefield Publishers, Lanham, Maryland, US."},{"key":"e_1_3_3_3_42_1","doi-asserted-by":"publisher","DOI":"10.20368\/1971-8829"},{"key":"e_1_3_3_3_44_1","volume-title":"The practice of design-based research: Uncovering the interplay between design, research, and the real-world context. Educational psychologist 39, 4","author":"Joseph Diana","year":"2004","unstructured":"Diana Joseph. 2004. The practice of design-based research: Uncovering the interplay between design, research, and the real-world context. Educational psychologist 39, 4 (2004), 235\u2013242."},{"key":"e_1_3_3_3_45_1","volume-title":"Privacy and protection of marginalized social groups. Studies in Ethics, Law, and Technology 2, 3","author":"Karanja Stephen\u00a0Kabera","year":"2009","unstructured":"Stephen\u00a0Kabera Karanja. 2009. Privacy and protection of marginalized social groups. Studies in Ethics, Law, and Technology 2, 3 (2009)."},{"key":"e_1_3_3_3_46_1","doi-asserted-by":"crossref","unstructured":"Bart\u00a0P. Knijnenburg Reza Ghaiumy\u00a0Anaraky Daricia Wilkinson Moses Namara Yangyang He David Cherry and Erin Ash. 2022. Chapter 16 - User-Tailored Privacy. In Modern Socio-Technical Perspectives on Privacy (first ed.). Springer Nature Switzerland AG. Gewerbestrasse 11 6330 Cham Switzerland 367\u2013393.","DOI":"10.1007\/978-3-030-82786-1_16"},{"key":"e_1_3_3_3_47_1","doi-asserted-by":"publisher","DOI":"10.1111\/rego.12369"},{"key":"e_1_3_3_3_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/3134699"},{"key":"e_1_3_3_3_49_1","doi-asserted-by":"publisher","DOI":"10.1108\/ILS-02-2022-0022"},{"key":"e_1_3_3_3_50_1","volume-title":"The effect of social media influencers","author":"Lajnef Karima","year":"2023","unstructured":"Karima Lajnef. 2023. The effect of social media influencers\u2019 on teenagers Behavior: an empirical study using cognitive map technique. Current Psychology NA, NA (2023), 1\u201314."},{"key":"e_1_3_3_3_51_1","doi-asserted-by":"publisher","DOI":"10.1080\/00220671.2010.519409"},{"key":"e_1_3_3_3_52_1","doi-asserted-by":"crossref","unstructured":"Livingstone Stoilova and Nandagiri. 2019. Talking to Children About Data and Privacy Online: Research Methodology.","DOI":"10.1002\/9781119166900.ch38"},{"key":"e_1_3_3_3_53_1","unstructured":"Sonia Livingstone Mariya Stoilova and Rishita Nandagiri. 2019. Children\u2019s data and privacy online: growing up in a digital age: an evidence review."},{"key":"e_1_3_3_3_54_1","doi-asserted-by":"publisher","DOI":"10.1080\/13600834.2017.1321096"},{"key":"e_1_3_3_3_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/2207676.2207758"},{"key":"e_1_3_3_3_57_1","volume-title":"Diego\u00a0Murgia Diaz","author":"Marwick E","year":"2010","unstructured":"Alice\u00a0E Marwick, Berkman Center, Diego\u00a0Murgia Diaz, Berkman Center, John Palfrey, and Berkman Center. 2010. Youth, Privacy and Reputation."},{"key":"e_1_3_3_3_58_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.47"},{"key":"e_1_3_3_3_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/3459990.3460719"},{"key":"e_1_3_3_3_60_1","doi-asserted-by":"publisher","DOI":"10.1080\/1369118X.2016.1139614"},{"key":"e_1_3_3_3_61_1","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.2058326"},{"key":"e_1_3_3_3_62_1","volume-title":"Radical equations: Civil rights from Mississippi to the Algebra Project","author":"Moses Robert","unstructured":"Robert Moses and Charles\u00a0E Cobb. 2002. Radical equations: Civil rights from Mississippi to the Algebra Project. Beacon Press, Bostong, MA."},{"key":"e_1_3_3_3_63_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1548-1492.2009.01027.x"},{"key":"e_1_3_3_3_64_1","doi-asserted-by":"publisher","DOI":"10.1037\/tmb0000045"},{"key":"e_1_3_3_3_65_1","first-page":"711","article-title":"Explaining algorithmic decisions. Geo","volume":"4","author":"Nicholas Gabriel","year":"2019","unstructured":"Gabriel Nicholas. 2019. Explaining algorithmic decisions. Geo. L. Tech. Rev. 4 (2019), 711.","journal-title":"L. Tech. Rev."},{"key":"e_1_3_3_3_66_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.clsr.2022.105664"},{"key":"e_1_3_3_3_67_1","first-page":"703","article-title":"Kid\u2019s Privacy on the Internet: Collecting Children\u2019s Personal Data on the Internet and the Protection of Privacy. MultiMedia und Recht","volume":"5","author":"Nouwt Dr\u00a0Sjaak","year":"2002","unstructured":"Dr\u00a0Sjaak Nouwt. 2002. Kid\u2019s Privacy on the Internet: Collecting Children\u2019s Personal Data on the Internet and the Protection of Privacy. MultiMedia und Recht: Zeitschrift f{\\\"u}r Informations-, Telekommunikations- und Medienrecht 5, 11 (2002), 703\u2013709.","journal-title":"Zeitschrift f{\\\"u}r Informations-, Telekommunikations- und Medienrecht"},{"key":"e_1_3_3_3_68_1","doi-asserted-by":"publisher","DOI":"10.1207\/s15326985ep3904_7"},{"key":"e_1_3_3_3_69_1","doi-asserted-by":"publisher","DOI":"10.1145\/2740908.2742003"},{"key":"e_1_3_3_3_70_1","unstructured":"Department of Education. 2021. Dropout Rates by School \u2014 ed.sc.gov. https:\/\/ed.sc.gov\/districts-schools\/school-safety\/discipline-related-reports\/dropout-data\/2019-2021-state-dropout-data\/dropout-rates-by-school\/. [Accessed 17-11-2023]."},{"key":"e_1_3_3_3_71_1","doi-asserted-by":"publisher","DOI":"10.1145\/3097286.3097338"},{"key":"e_1_3_3_3_72_1","volume-title":"Exploring User Perceptions of Discrimination in Online Targeted Advertising. In 26th USENIX Security Symposium (USENIX Security 17)","author":"Plane C","year":"2017","unstructured":"Angelisa\u00a0C Plane, Elissa\u00a0M Redmiles, Michelle\u00a0L Mazurek, and Michael\u00a0Carl Tschantz. 2017. Exploring User Perceptions of Discrimination in Online Targeted Advertising. In 26th USENIX Security Symposium (USENIX Security 17). USENIX Association, Vancouver, BC, 935\u2013951. https:\/\/www.usenix.org\/conference\/usenixsecurity17\/technical-sessions\/presentation\/plane"},{"key":"e_1_3_3_3_73_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3173677"},{"key":"e_1_3_3_3_74_1","doi-asserted-by":"publisher","DOI":"10.1145\/3600211.3604761"},{"key":"e_1_3_3_3_75_1","doi-asserted-by":"crossref","unstructured":"Ron Ritchie. 1996. Research and the Teachers: A Qualitative Introduction to School-Based Research.","DOI":"10.2307\/3122471"},{"key":"e_1_3_3_3_76_1","doi-asserted-by":"publisher","DOI":"10.1093\/jigpal"},{"key":"e_1_3_3_3_77_1","volume-title":"Developing learning theory by refining conjectures embodied in educational designs. Educational psychologist 39, 4","author":"Sandoval A","year":"2004","unstructured":"William\u00a0A Sandoval. 2004. Developing learning theory by refining conjectures embodied in educational designs. Educational psychologist 39, 4 (2004), 213\u2013223."},{"key":"e_1_3_3_3_78_1","doi-asserted-by":"publisher","DOI":"10.1207\/s15326985ep3904_1"},{"key":"e_1_3_3_3_79_1","doi-asserted-by":"publisher","DOI":"10.1017\/9781108888295.002"},{"key":"e_1_3_3_3_80_1","unstructured":"SC. 2022. Standards \u2014 ed.sc.gov. https:\/\/ed.sc.gov\/instruction\/standards\/computer-science\/standards\/. [Accessed 27-Jun-2023]."},{"key":"e_1_3_3_3_81_1","volume-title":"Design-based research: A methodology to extend and enrich biology education research. CBE\u2014Life Sciences Education 19, 2","author":"Scott E","year":"2020","unstructured":"Emily\u00a0E Scott, Mary\u00a0Pat Wenderoth, and Jennifer\u00a0H Doherty. 2020. Design-based research: A methodology to extend and enrich biology education research. CBE\u2014Life Sciences Education 19, 2 (2020), es11."},{"key":"e_1_3_3_3_82_1","doi-asserted-by":"publisher","DOI":"10.1145\/3488042.3491040"},{"key":"e_1_3_3_3_83_1","first-page":"44","article-title":"Reification as the Birth of Metaphor","volume":"14","author":"Sfard Anna","year":"1994","unstructured":"Anna Sfard. 1994. Reification as the Birth of Metaphor. For the Learning of Mathematics 14, 1 (1994), 44\u201355.","journal-title":"For the Learning of Mathematics"},{"key":"e_1_3_3_3_84_1","doi-asserted-by":"publisher","DOI":"10.1145\/3091478.3091479"},{"key":"e_1_3_3_3_85_1","volume-title":"TRUST THE TEACHERS!Curriculum and Teaching Dialogue","author":"Singh Khushbu","year":"2022","unstructured":"Khushbu Singh, Emily Sidnam-Mauch, Mehtab Iqbal, Oluwafemi Osho, Sushmita Khan, Philip Nelson, Kyra Derrick, Kelly Caine, Bart\u00a0P Knijnenburg, and Nicole Bannister. 2022. TRUST THE TEACHERS!Curriculum and Teaching Dialogue: Volume 24, Numbers 1 & 2, 2022 NA, NA (2022), 269."},{"key":"e_1_3_3_3_86_1","unstructured":"South Carolina Department of Education. 2015. SCCCR Standards for Mathematics Final."},{"key":"e_1_3_3_3_87_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445333"},{"key":"e_1_3_3_3_88_1","volume-title":"Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems. Association for Computing Machinery","author":"Sun Kaiwen","year":"2021","unstructured":"Kaiwen Sun, Carlo Sugatan, Tanisha Afnan, Hayley Simon, Susan\u00a0A Gelman, Jenny Radesky, and Florian Schaub. 2021. \u201cThey See You\u2019re a Girl if You Pick a Pink Robot with a Skirt\u201d: A Qualitative Study of How Children Conceptualize Data Processing and Digital Privacy Risks. In Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems. Association for Computing Machinery, New York, NY, USA, 1\u201334."},{"key":"e_1_3_3_3_89_1","doi-asserted-by":"publisher","DOI":"10.1145\/3328778.3366816"},{"key":"e_1_3_3_3_90_1","doi-asserted-by":"publisher","DOI":"10.1207\/s15326985ep3904_4"},{"key":"e_1_3_3_3_91_1","volume-title":"Deciding on Personalized Ads: Nudging Developers About User Privacy. In Seventeenth Symposium on Usable Privacy and Security (SOUPS 2021","author":"Tahaei Mohammad","year":"2021","unstructured":"Mohammad Tahaei, Alisa Frik, Kami Vaniea, and Design Informatics. 2021. Deciding on Personalized Ads: Nudging Developers About User Privacy. In Seventeenth Symposium on Usable Privacy and Security (SOUPS 2021). USENIX Association, Web, 573\u2013596. https:\/\/www.usenix.org\/conference\/soups2021\/presentation\/tahaei"},{"key":"e_1_3_3_3_92_1","first-page":"410","article-title":"Design-Based Research in the Educational Field","volume":"12","author":"Tinoca Lu\u00eds","year":"2022","unstructured":"Lu\u00eds Tinoca, Jo\u00e3o Piedade, Sofia Santos, Ana Pedro, and Sara Gomes. 2022. Design-Based Research in the Educational Field: A Systematic Literature Review. Education Sciences 12, 6 (2022), 410.","journal-title":"A Systematic Literature Review. Education Sciences"},{"key":"e_1_3_3_3_93_1","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.2354339"},{"key":"e_1_3_3_3_94_1","doi-asserted-by":"publisher","DOI":"10.1145\/3298689.3346982"},{"key":"e_1_3_3_3_95_1","doi-asserted-by":"publisher","DOI":"10.1145\/3267357.3267370"},{"key":"e_1_3_3_3_96_1","volume-title":"Social Media & Technology","author":"Vogels A.","year":"2022","unstructured":"Emily\u00a0A. Vogels, Risa Gelles-Watnick, and Navid Massarat. 2022. Teens, Social Media & Technology 2022. Technical Report. PEW Research Center, Washington, D.C."},{"key":"e_1_3_3_3_97_1","doi-asserted-by":"publisher","DOI":"10.1145\/3314183.3323672"},{"key":"e_1_3_3_3_98_1","volume-title":"Understanding by Design","author":"Wiggins Grant","unstructured":"Grant Wiggins and Jay McTighe. 2005. Understanding by Design (second ed.). Assn. for Supervision & Curriculum Development, Alexandria, VA, USA."},{"key":"e_1_3_3_3_99_1","doi-asserted-by":"publisher","DOI":"10.15805\/addicta.2018.5.2.0050"},{"key":"e_1_3_3_3_100_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300303"},{"key":"e_1_3_3_3_101_1","volume-title":"Interaction Design and Children. ACM New York","author":"Zhao Jun","unstructured":"Jun Zhao, Blanche Duron, and Ge Wang. 2022. KOALA Hero: Inform Children of Privacy Risks of Mobile Apps. In Interaction Design and Children. ACM New York, NY, USA, New York, NY, USA, 523\u2013528."},{"key":"e_1_3_3_3_102_1","doi-asserted-by":"publisher","DOI":"10.1145\/3501712.3535278"},{"key":"e_1_3_3_3_103_1","volume-title":"Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems. Association for Computing Machinery","author":"Zhao Jun","year":"2019","unstructured":"Jun Zhao, Ge Wang, Carys Dally, Petr Slovak, Julian Edbrooke-Childs, Max Van\u00a0Kleek, and Nigel Shadbolt. 2019. I make up a silly name\u2019 Understanding Children\u2019s Perception of Privacy Risks Online. In Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems. Association for Computing Machinery, New York, NY, USA, 1\u201313."},{"key":"e_1_3_3_3_104_1","doi-asserted-by":"publisher","DOI":"10.1145\/3308557.3308667"},{"key":"e_1_3_3_3_105_1","doi-asserted-by":"publisher","DOI":"10.5555\/3241189.3241297"},{"key":"e_1_3_3_3_106_1","doi-asserted-by":"publisher","DOI":"10.1145\/3287324.3287486"}],"event":{"name":"CHI '24: CHI Conference on Human Factors in Computing Systems","location":"Honolulu HI USA","acronym":"CHI '24","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction","SIGACCESS ACM Special Interest Group on Accessible Computing"]},"container-title":["Proceedings of the CHI Conference on Human Factors in Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3613904.3642460","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3613904.3642460","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T23:56:48Z","timestamp":1750291008000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3613904.3642460"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,11]]},"references-count":103,"alternative-id":["10.1145\/3613904.3642460","10.1145\/3613904"],"URL":"https:\/\/doi.org\/10.1145\/3613904.3642460","relation":{},"subject":[],"published":{"date-parts":[[2024,5,11]]},"assertion":[{"value":"2024-05-11","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}