{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T00:32:27Z","timestamp":1760661147923,"version":"build-2065373602"},"reference-count":90,"publisher":"Association for Computing Machinery (ACM)","issue":"7","license":[{"start":{"date-parts":[[2025,10,16]],"date-time":"2025-10-16T00:00:00Z","timestamp":1760572800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1951688, 1951311"],"award-info":[{"award-number":["1951688, 1951311"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Proc. ACM Hum.-Comput. Interact."],"published-print":{"date-parts":[[2025,10,18]]},"abstract":"<jats:p>The growing use of technology in K-8 classrooms highlights a parallel need for formal learning opportunities aimed at helping children use technology safely and protect their personal information. Even the youngest students are now using tablets, laptops, and apps to support their learning; however, there are limited curricular materials available for elementary and middle school children on digital privacy and security topics. To bridge this gap, we developed a series of micro-lessons to help K-8 children learn about digital privacy and security at school. We first conducted a formative study by interviewing elementary school teachers to identify the design needs for digital privacy and security lessons. We then developed micro-lessons--multiple 15-20 minute activities designed to be easily inserted into the existing curriculum--using a co-design approach with multiple rounds of developing and revising the micro-lessons in collaboration with teachers. Throughout the process, we conducted evaluation sessions where teachers implemented or reviewed the micro-lessons. Our study identifies strengths, challenges, and teachers' tailoring strategies when incorporating micro-lessons for K-8 digital privacy and security topics, providing design implications for facilitating learning about these topics in school classrooms.<\/jats:p>","DOI":"10.1145\/3757463","type":"journal-article","created":{"date-parts":[[2025,10,16]],"date-time":"2025-10-16T17:32:00Z","timestamp":1760635920000},"page":"1-40","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Creating and Evaluating Privacy and Security Micro-Lessons for Elementary School Children"],"prefix":"10.1145","volume":"9","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3429-5172","authenticated-orcid":false,"given":"Lan","family":"Gao","sequence":"first","affiliation":[{"name":"University of Chicago, Chicago, IL, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-0878-1487","authenticated-orcid":false,"given":"Elana B","family":"Blinder","sequence":"additional","affiliation":[{"name":"University of Maryland, College Park, MD, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0005-5774-3256","authenticated-orcid":false,"given":"Abigail","family":"Barnes","sequence":"additional","affiliation":[{"name":"University of Chicago, Chicago, IL, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-3912-3152","authenticated-orcid":false,"given":"Kevin","family":"Song","sequence":"additional","affiliation":[{"name":"University of Chicago, Chicago, IL, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6558-6944","authenticated-orcid":false,"given":"Tamara","family":"Clegg","sequence":"additional","affiliation":[{"name":"University of Maryland, College Park, MD, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9362-9032","authenticated-orcid":false,"given":"Jessica","family":"Vitak","sequence":"additional","affiliation":[{"name":"University of Maryland, College Park, MD, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0804-6110","authenticated-orcid":false,"given":"Marshini","family":"Chetty","sequence":"additional","affiliation":[{"name":"University of Chicago, Chicago, IL, USA"}]}],"member":"320","published-online":{"date-parts":[[2025,10,16]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcci.2022.100462"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3613904.3641962"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcci.2018.06.003"},{"key":"e_1_2_1_4_1","unstructured":"Ay\u00e7a Atabey and Louise Hooper. 2024. International regulatory decisions concerning EdTech companies' data practices. Technical Report. Digital Futures for Children centre 5Rights Foundation. http:\/\/eprints.lse.ac.uk\/123805\/1\/DFC_Brief_International_regulatory_decisions_final.pdf"},{"key":"e_1_2_1_5_1","unstructured":"Brooke Auxier Monica Anderson Andrew Perrin and Erica Turner. 2020. Parenting Children in the Age of Screens. Technical Report. Pew Research Center. https:\/\/www.pewresearch.org\/internet\/2020\/07\/28\/parenting-children-in-the-age-of-screens\/"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1080\/07380569.2022.2071233"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3501712.3530783"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3641004"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1191\/1478088706qp063oa"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1080\/2159676X.2019.1628806"},{"key":"e_1_2_1_11_1","volume-title":"J Carlson Powell, Anne Westbrook, and Nancy Landes.","author":"Bybee Rodger W","year":"2006","unstructured":"Rodger W Bybee, Joseph A Taylor, April Gardner, Pamela Van Scotter, J Carlson Powell, Anne Westbrook, and Nancy Landes. 2006. The BSCS 5E instructional model: Origins and effectiveness. Technical Report. Office of Science Education National Institutes of Health. https:\/\/bscs.org\/reports\/the-bscs-5e-instructional-model-origins-and-effectiveness\/"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1186\/s40594-023-00418-7"},{"key":"e_1_2_1_13_1","volume-title":"EdWeek Market Brief (May","author":"Cavanagh Sean","year":"2017","unstructured":"Sean Cavanagh. 2017. Amazon, Apple, Google, and Microsoft Battle for K-12 Market, and Loyalties of Educators. EdWeek Market Brief (May 2017). https:\/\/marketbrief.edweek.org\/sales-marketing\/amazon-apple-google-and-microsoft-battle-for-k-12-market-and-loyalties-of-educators\/2017\/05"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3544548.3580777"},{"key":"e_1_2_1_15_1","first-page":"00","article-title":"Why Does a Teacher Feel the Need to Post My Kid?'': Parents and Teachers Constructing Morally Acceptable Boundaries of Children's Social Media Presence","volume":"14","author":"Cino Davide","year":"2020","unstructured":"Davide Cino and Chiara Dalledonne Vandini. 2020. ''Why Does a Teacher Feel the Need to Post My Kid?'': Parents and Teachers Constructing Morally Acceptable Boundaries of Children's Social Media Presence. International Journal of Communication, Vol. 14, 00 (Feb. 2020), 1153-1172. https:\/\/ijoc.org\/index.php\/ijoc\/article\/view\/12493","journal-title":"International Journal of Communication"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1467247.1467277"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2020.106382"},{"key":"e_1_2_1_18_1","unstructured":"Sherry L Drader. 2022. Digital Citizenship for Elementary Students. Technical Report. Educational Leadership Student. https:\/\/cedar.wwu.edu\/edlead_stuschol\/1"},{"key":"e_1_2_1_19_1","unstructured":"Common Sense Education. 2024. Digital Citizenship. https:\/\/www.commonsense.org\/education\/digital-citizenship Accessed: 2024-05."},{"key":"e_1_2_1_20_1","unstructured":"National Center for Education Statistics. 2023. Characteristics of Public School Teachers. https:\/\/nces.ed.gov\/programs\/coe\/indicator\/clr\/public-school-teachers Accessed: 2024-06."},{"key":"e_1_2_1_21_1","unstructured":"National Center for Education Statistics. 2024. School Profiles. https:\/\/nces.ed.gov\/ccd\/schoolsearch\/ Accessed: 2024-07-01."},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1080\/07370008.2021.2010215"},{"key":"e_1_2_1_23_1","unstructured":"Google. 2024. Be Internet Awesome - A Program to Teach Kids Online Safety. https:\/\/beinternetawesome.withgoogle.com\/en_us Accessed: 2024-05."},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcci.2019.100146"},{"key":"e_1_2_1_25_1","unstructured":"Uwe Hasebrink Sonia Livingstone Leslie Haddon and Kjartan Olafsson. 2009. Comparing children's online opportunities and risks across Europe: Cross-national comparisons for EU Kids Online. EU Kids Online The London School of Economics and Political Science. http:\/\/eprints.lse.ac.uk\/24368\/1\/D3.2_Report-Cross_national_comparisons-2nd-edition.pdf"},{"key":"e_1_2_1_26_1","unstructured":"Erikson Institute. 2022. Technology and Young Children in the Digital Age. Technical Report. Erikson Institute. https:\/\/www.youthlead.org\/resources\/technology-and-young-children-digital-age"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2531602.2531674"},{"key":"e_1_2_1_28_1","volume-title":"Common Sense Media (2019)","author":"James Carrie","year":"2019","unstructured":"Carrie James, Emily Weinstein, and Kelly Mendoza. 2019. Teaching digital citizens in today's world: Research and insights behind the Common Sense K-12 Digital Citizenship Curriculum. Common Sense Media (2019), 2021-08."},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3613904.3642460"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.5210\/spir.v2023i0.13439"},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3134699"},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3202185.3202735"},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1108\/ILS-02-2022-0022"},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300537"},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/3585088.3589375"},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.17645\/mac.v8i4.3236"},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1080\/15710882.2016.1209528"},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3078072.3084333"},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/3549015.3554207"},{"key":"e_1_2_1_40_1","first-page":"229","volume-title":"Thirteenth Symposium on Usable Privacy and Security (SOUPS 2017","author":"Lastdrager Elmer","year":"2017","unstructured":"Elmer Lastdrager, In\u00e9s Carvajal Gallardo, Pieter Hartel, and Marianne Junger. 2017. How Effective is {Anti-Phishing} Training for Children?. In Thirteenth Symposium on Usable Privacy and Security (SOUPS 2017). USENIX, 229-239. https:\/\/www.usenix.org\/conference\/soups2017\/technical-sessions\/presentation\/lastdrager"},{"key":"e_1_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-35731-2_7"},{"key":"e_1_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/3613905.3650940"},{"key":"e_1_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1093\/acprof:oso\/9780195312805.003.0010"},{"key":"e_1_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1002\/9781119166900.ch38"},{"key":"e_1_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/3461778.3462084"},{"key":"e_1_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/3202185.3210772"},{"key":"e_1_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/3469821"},{"key":"e_1_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445224"},{"key":"e_1_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11528-022-00803-z"},{"key":"e_1_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.22215\/etd\/2023-15383"},{"key":"e_1_2_1_51_1","volume-title":"Proceedings of the 2024 Symposium on Usable Privacy and Security (SOUPS 2024","author":"McLeod Joy","year":"2024","unstructured":"Joy McLeod, Leah Zhang-Kennedy, and Elizabeth Stobert. 2024. Comparing Teacher and Creator Perspectives on the Design of Cybersecurity and Privacy Educational Resources. In Proceedings of the 2024 Symposium on Usable Privacy and Security (SOUPS 2024). USENIX Association. https:\/\/www.usenix.org\/conference\/soups2024\/presentation\/mcleod"},{"key":"e_1_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025735"},{"key":"e_1_2_1_53_1","unstructured":"Meta. 2024. Youth Safety. https:\/\/about.meta.com\/actions\/safety\/audiences\/youth Accessed: 2024-05."},{"key":"e_1_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSPW51379.2020.00027"},{"key":"e_1_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/3481357.3481520"},{"key":"e_1_2_1_56_1","volume-title":"Privacy in Context: Technology, Policy, and the Integrity of Social Life","author":"Nissenbaum Helen","unstructured":"Helen Nissenbaum. 2010. Privacy in Context: Technology, Policy, and the Integrity of Social Life. Stanford University Press."},{"key":"e_1_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.18357\/jcs.v36i2.15089"},{"key":"e_1_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702299"},{"key":"e_1_2_1_59_1","unstructured":"U.S. Department of Education. 2024. FERPA - Family Educational Rights and Privacy Act. https:\/\/www2.ed.gov\/policy\/gen\/guid\/fpco\/ferpa\/index.html Accessed: 2024-06."},{"key":"e_1_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/642611.642635"},{"key":"e_1_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISACC56298.2023.10084054"},{"key":"e_1_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/3397617.3398030"},{"key":"e_1_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcci.2021.100343"},{"key":"e_1_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.18178\/ijiet.2020.10.5.1393"},{"key":"e_1_2_1_65_1","unstructured":"Kate Raynes-Goldie and Matthew Allen. 2014. Gaming privacy: A Canadian case study of a co-created privacy literacy game for children. (2014). https:\/\/hdl.handle.net\/10536\/DRO\/DU:30065630"},{"key":"e_1_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1109\/TE.2022.3231019"},{"key":"e_1_2_1_67_1","unstructured":"Johnny Salda na. 2021. The coding manual for qualitative researchers. SAGE publications Ltd."},{"key":"e_1_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1080\/15710880701875068"},{"key":"e_1_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1145\/143457.143513"},{"key":"e_1_2_1_70_1","volume-title":"Cultural-historical activity theory approaches to design-based research","author":"Severance Samuel","unstructured":"Samuel Severance, William R Penuel, Tamara Sumner, and Heather Leary. 2018. Organizing for teacher agency in curricular co-design. In Cultural-historical activity theory approaches to design-based research. Routledge, 45-78."},{"key":"e_1_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1080\/09500693.2018.1470346"},{"key":"e_1_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1145\/2818048.2820007"},{"key":"e_1_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1145\/2998181.2998231"},{"key":"e_1_2_1_74_1","unstructured":"Nearpod Team. 2023. Digital Citizenship Week: Free Lessons and Activities for K-12. https:\/\/nearpod.com\/blog\/digital-citizenship-week-free-lessons\/ Accessed: 2024-06."},{"key":"e_1_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1109\/PST.2016.7906931"},{"key":"e_1_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1145\/3328778.3366816"},{"key":"e_1_2_1_77_1","doi-asserted-by":"publisher","DOI":"10.1145\/3610036"},{"key":"e_1_2_1_78_1","doi-asserted-by":"publisher","DOI":"10.1145\/3613904.3642283"},{"key":"e_1_2_1_79_1","doi-asserted-by":"publisher","DOI":"10.1145\/3555144"},{"key":"e_1_2_1_80_1","doi-asserted-by":"publisher","DOI":"10.1145\/3544548.3580933"},{"key":"e_1_2_1_81_1","volume-title":"Nineteenth Symposium on Usable Privacy and Security (SOUPS 2023","author":"Williams Olivia","year":"2023","unstructured":"Olivia Williams, Yee-Yin Choong, and Kerrianne Buchanan. 2023. Youth understandings of online privacy and security: A dyadic study of children and their parents. In Nineteenth Symposium on Usable Privacy and Security (SOUPS 2023). 399-416. https:\/\/www.usenix.org\/conference\/soups2023\/presentation\/williams"},{"key":"e_1_2_1_82_1","doi-asserted-by":"publisher","DOI":"10.1145\/2675133.2675293"},{"key":"e_1_2_1_83_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2021.106791"},{"key":"e_1_2_1_84_1","doi-asserted-by":"publisher","DOI":"10.1145\/3392063.3394420"},{"key":"e_1_2_1_85_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10763-014-9567-4"},{"key":"e_1_2_1_86_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcci.2017.05.001"},{"key":"e_1_2_1_87_1","doi-asserted-by":"publisher","DOI":"10.1145\/3427920"},{"key":"e_1_2_1_88_1","doi-asserted-by":"publisher","DOI":"10.1145\/2930674.2930716"},{"key":"e_1_2_1_89_1","doi-asserted-by":"publisher","DOI":"10.1145\/3501712.3535278"},{"key":"e_1_2_1_90_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300336"}],"container-title":["Proceedings of the ACM on Human-Computer Interaction"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3757463","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3757463","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,16]],"date-time":"2025-10-16T17:40:43Z","timestamp":1760636443000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3757463"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,16]]},"references-count":90,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2025,10,18]]}},"alternative-id":["10.1145\/3757463"],"URL":"https:\/\/doi.org\/10.1145\/3757463","relation":{},"ISSN":["2573-0142"],"issn-type":[{"value":"2573-0142","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,10,16]]},"assertion":[{"value":"2025-10-16","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}