{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,24]],"date-time":"2025-08-24T00:01:25Z","timestamp":1755993685465,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":95,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,8,12]],"date-time":"2024-08-12T00:00:00Z","timestamp":1723420800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Deutsche Telekom Stiftung"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,8,12]]},"DOI":"10.1145\/3632620.3671118","type":"proceedings-article","created":{"date-parts":[[2024,8,6]],"date-time":"2024-08-06T12:47:29Z","timestamp":1722948449000},"page":"326-342","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Learning an Explanatory Model of Data-Driven Technologies can Lead to Empowered Behavior: A Mixed-Methods Study in K-12 Computing Education"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3307-5271","authenticated-orcid":false,"given":"Lukas","family":"H\u00f6per","sequence":"first","affiliation":[{"name":"Paderborn University, Germany"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3009-4904","authenticated-orcid":false,"given":"Carsten","family":"Schulte","sequence":"additional","affiliation":[{"name":"Paderborn University, Germany"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6396-3491","authenticated-orcid":false,"given":"Andreas","family":"M\u00fchling","sequence":"additional","affiliation":[{"name":"Kiel University, Germany and Leibniz Institute for Science and Mathematics Education, Germany"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2024,8,12]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-65094-4_12"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1559-1816.2009.00485.x"},{"volume-title":"Self-Efficacy: The Exercise of Control","author":"Bandura Albert","key":"e_1_3_2_1_3_1","unstructured":"Albert Bandura. 1997. Self-Efficacy: The Exercise of Control. W.H. Freeman, New York."},{"key":"e_1_3_2_1_4_1","unstructured":"Albert Bandura. 2006. Guide for Constructing Self-Efficacy Scales. In Self-Efficacy Beliefs of Adolescents Tim Urdan and Frank Pajares (Eds.). IAP 307\u2013338."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.5210\/fm.v11i9.1394"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.tele.2017.04.013"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1002\/sce.20186"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3501712.3530783"},{"volume-title":"Assembling Consumption: Researching Actors","author":"Bode Matthias","key":"e_1_3_2_1_9_1","unstructured":"Matthias Bode and Dorthe\u00a0Brogaard Kristensen. 2016. The Digital Doppelg\u00e4nger within: A Study on Self-Tracking and the Quantified Self Movement. In Assembling Consumption: Researching Actors, Networks and Markets, Robin Canniford and Domen Bajde (Eds.). Routledge, Oxon, United Kingdom, 119\u2013135."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1002\/pra2.2017.14505401004"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1177\/001316448104100307"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-72079-9_1"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1080\/1369118X.2016.1154086"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1177\/2053951715622512"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1186\/s40594-023-00418-7"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","unstructured":"Michael\u00a0E. Caspersen Ira Diethelm Judith Gal-Ezer Andrew McGettrick Enrico Nardelli Don Passey Branislav Rovan and Mary Webb. 2022. Informatics Reference Framework for School. NSF. https:\/\/doi.org\/10.1145\/3592625","DOI":"10.1145\/3592625"},{"key":"e_1_3_2_1_17_1","unstructured":"Center For Self-Determination Theory. [n. d.]. Intrinsic Motivation Inventory (IMI). https:\/\/selfdeterminationtheory.org\/intrinsic-motivation-inventory\/ accessed: 2022-09-01."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1108\/INTR-05-2020-0269"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2017.12.001"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1037\/0033-2909.112.1.155"},{"volume-title":"Computational Thinking Education in K\u201312, Siu-Cheung Kong and Harold Abelson (Eds.)","author":"Dindler Christian","key":"e_1_3_2_1_21_1","unstructured":"Christian Dindler, Ole\u00a0Sejer Iversen, Michael\u00a0E. Caspersen, and Rachel\u00a0Charlotte Smith. 2022. Computational Empowerment. In Computational Thinking Education in K\u201312, Siu-Cheung Kong and Harold Abelson (Eds.). The MIT Press, 121\u2013140."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.7551\/mitpress\/13375.003.0014"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3392063.3394410"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1177\/1461444819833331"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","unstructured":"Stefania Druga and Amy\u00a0J Ko. 2021. How Do Children\u2019s Perceptions of Machine Intelligence Change When Training and Coding Smart Programs?. In Interaction Design and Children. ACM Athens Greece 49\u201361. https:\/\/doi.org\/10.1145\/3459990.3460712","DOI":"10.1145\/3459990.3460712"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-6091-900-8_2"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3437800.3439202"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/1-4020-5386-X_19"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1186\/s43058-020-00050-4"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cedpsych.2015.03.002"},{"volume-title":"Pedagogy of the Oppressed (repr ed.)","author":"Freire Paulo","key":"e_1_3_2_1_31_1","unstructured":"Paulo Freire. 2012. Pedagogy of the Oppressed (repr ed.). Bloomsbury, New York."},{"volume-title":"Structural Equation Modeling with Lavaan","author":"Gana Kamel","key":"e_1_3_2_1_32_1","unstructured":"Kamel Gana and Guillaume Broc. 2019. Structural Equation Modeling with Lavaan. ISTE, London."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1007\/s42330-018-0034-z"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1080\/09500690600702470"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0065-2601(06)38002-1"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3555576"},{"volume-title":"Vol.\u00a05","author":"Gro\u00dfe-B\u00f6lting Gregor","key":"e_1_3_2_1_37_1","unstructured":"Gregor Gro\u00dfe-B\u00f6lting and Andreas M\u00fchling. 2020. Students Perception of the Inner Workings of Learning Machines. In 2020 International Conference on Learning and Teaching in Computing and Engineering (LaTICE), Vol.\u00a05. IEEE Computer Society, Ho Chi Minh City."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3626252.3630937"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/1869746.1869747"},{"key":"e_1_3_2_1_40_1","first-page":"3737","article-title":"What Can I Really Do?\u201d Explaining the Privacy Paradox with Online Apathy","volume":"10","author":"Hargittai Eszter","year":"2016","unstructured":"Eszter Hargittai and Alice Marwick. 2016. \u201cWhat Can I Really Do?\u201d Explaining the Privacy Paradox with Online Apathy. Int. Journal of Communication 10 (2016), 3737\u20133757.","journal-title":"Int. Journal of Communication"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1080\/15427600701662983"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300645"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.5817\/CP2016-4-7"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1177\/20539517241232629"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1108\/ILS-06-2023-0075"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.15388\/infedu.2024.19"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1080\/10705519909540118"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/3210586.3210592"},{"key":"e_1_3_2_1_49_1","unstructured":"K\u201312 Computer Science Framework Steering Committee. 2016. K-12 Computer Science Framework. http:\/\/www.k12cs.org"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1177\/1461444820960068"},{"volume-title":"Open Data, Data Infrastructures & Their Consequences","author":"Kitchin Rob","key":"e_1_3_2_1_51_1","unstructured":"Rob Kitchin. 2014. The Data Revolution: Big Data, Open Data, Data Infrastructures & Their Consequences. SAGE Publications, Los Angeles, California."},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.1412583111"},{"volume-title":"Practice & Using Software","author":"Kuckartz Udo","key":"e_1_3_2_1_53_1","unstructured":"Udo Kuckartz. 2014. Qualitative Text Analysis: A Guide to Methods, Practice & Using Software. SAGE, Los Angeles."},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.2307\/2529310"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/3408877.3432513"},{"key":"e_1_3_2_1_56_1","unstructured":"Sonia Livingstone Mariya Stoilova and Rishita Nandagiri. 2019. Children\u2019s Data and Privacy Online: Growing up in a Digital Age. An Evidence Review."},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376727"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1037\/0096-3445.105.1.3"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1080\/02701367.1997.10608863"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.linged.2012.11.005"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1080\/02701367.1989.10607413"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcci.2023.100630"},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.caeai.2022.100095"},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/3487054"},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-25336-2_21"},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10676-021-09606-x"},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.caeai.2023.100142"},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.caeai.2021.100041"},{"key":"e_1_3_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1080\/08993408.2020.1783149"},{"key":"e_1_3_2_1_70_1","doi-asserted-by":"publisher","unstructured":"OECD. 2014. Summary of the OECD Privacy Expert Roundtable: Protecting Privacy in a Data-driven Economy: Taking Stock of Current Thinking. https:\/\/doi.org\/10.1787\/9789264196391-en","DOI":"10.1787\/9789264196391-en"},{"key":"e_1_3_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1177\/1461444818799523"},{"key":"e_1_3_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1080\/14681366.2020.1747527"},{"key":"e_1_3_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1145\/3372782.3406252"},{"key":"e_1_3_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1145\/1109540.1109556"},{"key":"e_1_3_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.caeai.2023.100145"},{"key":"e_1_3_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1145\/3377880"},{"volume-title":"Program or Be Programmed: Ten Commands for a Digital Age","author":"Rushkoff Douglas","key":"e_1_3_2_1_77_1","unstructured":"Douglas Rushkoff. 2010. Program or Be Programmed: Ten Commands for a Digital Age. OR Books, New York."},{"key":"e_1_3_2_1_78_1","doi-asserted-by":"publisher","DOI":"10.14763\/2020.2.1479"},{"key":"e_1_3_2_1_79_1","doi-asserted-by":"publisher","DOI":"10.1145\/3279720.3279733"},{"key":"e_1_3_2_1_80_1","doi-asserted-by":"publisher","DOI":"10.1145\/1288580.1288585"},{"volume-title":"Handbook of Motivation at School (2 ed.)","author":"Schunk H.","key":"e_1_3_2_1_81_1","unstructured":"Dale\u00a0H. Schunk, Maria\u00a0K. DiBenedetoo, Kathryn\u00a0R. Wentzel, and David\u00a0B. Miele. 2016. Self-Efficacy Theory in Education. In Handbook of Motivation at School (2 ed.). Routledge, New York, 34\u201354."},{"key":"e_1_3_2_1_82_1","volume-title":"Hidden Technical Debt in Machine Learning Systems. In NIPS\u201915: Proceedings of the 28th International Conference on Neural Information Processing Systems, Vol.\u00a02. 2503\u20132511","author":"Sculley D","year":"2015","unstructured":"D Sculley, Gary Holt, Daniel Golovin, Eugene Davydov, Todd Phillips, Dietmar Ebner, Vinay Chaudhary, Michael Young, Jean-Fran\u00e7ois Crespo, and Dan Dennison. 2015. Hidden Technical Debt in Machine Learning Systems. In NIPS\u201915: Proceedings of the 28th International Conference on Neural Information Processing Systems, Vol.\u00a02. 2503\u20132511."},{"key":"e_1_3_2_1_83_1","doi-asserted-by":"publisher","DOI":"10.14763\/2019.2.1410"},{"key":"e_1_3_2_1_84_1","doi-asserted-by":"publisher","DOI":"10.1109\/FIE44824.2020.9274138"},{"key":"e_1_3_2_1_85_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v33i01.33019795"},{"key":"e_1_3_2_1_86_1","doi-asserted-by":"publisher","DOI":"10.5210\/fm.v19i7.4901"},{"key":"e_1_3_2_1_87_1","doi-asserted-by":"publisher","DOI":"10.1145\/3459990.3460701"},{"key":"e_1_3_2_1_88_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcci.2021.100281"},{"key":"e_1_3_2_1_89_1","doi-asserted-by":"publisher","DOI":"10.1145\/3351287.3351291"},{"key":"e_1_3_2_1_90_1","doi-asserted-by":"publisher","DOI":"10.1037\/0033-2909.132.2.249"},{"key":"e_1_3_2_1_91_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dr.2009.12.001"},{"key":"e_1_3_2_1_92_1","doi-asserted-by":"publisher","DOI":"10.1006\/ceps.1999.1015"},{"volume-title":"The Relevance of Situated Expectancy-Value Theory to Understanding Motivation and Emotion in Different Contexts (1 ed.)","author":"Wigfield Allan","key":"e_1_3_2_1_93_1","unstructured":"Allan Wigfield and Jacquelynne\u00a0S. Eccles. 2023. The Relevance of Situated Expectancy-Value Theory to Understanding Motivation and Emotion in Different Contexts (1 ed.). Routledge, London, 3\u201318."},{"key":"e_1_3_2_1_94_1","doi-asserted-by":"publisher","DOI":"10.1145\/3311927.3323139"},{"volume-title":"The Age of Surveillance Capitalism: The Fight for a Human Future at the New Frontier of Power","author":"Zuboff Shoshana","key":"e_1_3_2_1_95_1","unstructured":"Shoshana Zuboff. 2019. The Age of Surveillance Capitalism: The Fight for a Human Future at the New Frontier of Power (first edition ed.). PublicAffairs, New York."}],"event":{"name":"ICER 2024: ACM Conference on International Computing Education Research","sponsor":["SIGCSE ACM Special Interest Group on Computer Science Education"],"location":"Melbourne VIC Australia","acronym":"ICER 2024"},"container-title":["Proceedings of the 2024 ACM Conference on International Computing Education Research - Volume 1"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3632620.3671118","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3632620.3671118","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,23]],"date-time":"2025-08-23T00:32:47Z","timestamp":1755909167000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3632620.3671118"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,8,12]]},"references-count":95,"alternative-id":["10.1145\/3632620.3671118","10.1145\/3632620"],"URL":"https:\/\/doi.org\/10.1145\/3632620.3671118","relation":{},"subject":[],"published":{"date-parts":[[2024,8,12]]},"assertion":[{"value":"2024-08-12","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}