Children are exposed to technology at home and school at very young ages, often using family mobile devices and educational apps. It is therefore critical that they begin learning about privacy and security concepts during their elementary school years, rather than waiting until they are older. Such skills will help children navigate an increasingly connected world and develop agency over their personal data, online interactions, and online security. In this paper, we explore how a simple technique---a ''Would Your Rather'' (WYR) game involving hypothetical privacy and security scenarios---can support children in working through the nuances of these types of situations and how educators can leverage this approach to support children's privacy and security learning. We conducted three focus groups with 21 children aged 7-12 using the WYR activity and interviewed 13 elementary school teachers about the use of WYR for facilitating privacy and security learning. We found that WYR provided a meaningful opportunity for children to assess privacy and security risks, consider some of the social and emotional aspects of privacy and security dilemmas, and assert their agency in a manner typically unavailable to children in an adult-centric society. Teachers highlighted connections between privacy and security dilemmas and children's social and emotional learning and offered additional insights about using this WYR technique in and beyond their classrooms. Based on these findings, we highlight four opportunities for using WYR to support children in engaging with privacy and security concepts from an early age.
Understanding Research Related to Designing for Children's Privacy and Security: A Document Analysis
Many children are growing up in a “digital-by-default” world, where technologies mediate many of their interactions. There is emerging consensus that those who design technology must support children’s privacy and security. However, privacy and security are complex concepts that are challenging to design for, and centering the interests of children is similarly difficult. Through a document analysis of 90 HCI publications, we examine what problems and solutions designing for children’s privacy and security addresses and how this research engages with children. Applying Solove’s privacy taxonomy, we find that research addresses a range of problems related to information collection, processing, dissemination, and invasion at the organizational, system, and individual levels. Children’s participation in this research is largely limited to providing feedback rather than helping to guide the research itself. Based on these findings, we offer recommendations for designers to sharpen their privacy and security contributions and center children in their work.
more »
« less
- Award ID(s):
- 1951688
- PAR ID:
- 10510817
- Publisher / Repository:
- ACM Digital Library
- Date Published:
- Journal Name:
- Proceedings of the 2023 ACM Interaction Design and Children (IDC) Conference
- ISBN:
- 9798400701313
- Page Range / eLocation ID:
- 335 to 354
- Subject(s) / Keyword(s):
- Children Privacy Security Surveillance Online safety Design Document analysis
- Format(s):
- Medium: X
- Location:
- Chicago IL USA
- Sponsoring Org:
- National Science Foundation
More Like this
-
-
Pervasive IoT applications enable us to perceive, analyze, control, and optimize the traditional physical systems. Recently, security breaches in many IoT applications have indicated that IoT applications may put the physical systems at risk. Severe resource constraints and insufficient security design are two major causes of many security problems in IoT applications. As an extension of the cloud, the emerging edge computing with rich resources provides us a new venue to design and deploy novel security solutions for IoT applications. Although there are some research efforts in this area, edge-based security designs for IoT applications are still in its infancy. This paper aims to present a comprehensive survey of existing IoT security solutions at the edge layer as well as to inspire more edge-based IoT security designs. We first present an edge-centric IoT architecture. Then, we extensively review the edge-based IoT security research efforts in the context of security architecture designs, firewalls, intrusion detection systems, authentication and authorization protocols, and privacy-preserving mechanisms. Finally, we propose our insight into future research directions and open research issues.more » « less
-
null (Ed.)Researchers and policymakers advocate teaching children about digital privacy, but privacy literacy has not been theorized for children. Drawing on interviews with 30 families, including 40 children, we analyze children’s perspectives on password management in three contexts—family life, friendship, and education—and develop a new approach to privacy literacy grounded in Nissenbaum’s contextual integrity framework. Contextual integrity equates privacy with appropriate flows of information, and we show how children’s perceptions of the appropriateness of disclosing a password varied across contexts. We explain why privacy literacy should focus on norms rather than rules and discuss how adults can use learning moments to strengthen children’s privacy literacy. We argue that equipping children to make privacy-related decisions serves them better than instructing them to follow privacy-related rules.more » « less
-
> Context • In 1972, Papert emphasized that “[t]he important difference between the work of a child in an elementary mathematics class and […]a mathematician” is “not in the subject matter […]but in the fact that the mathematician is creatively engaged […]” Along with creative, Papert kept saying children should be engaged in projects rather than problems. A project is not just a large problem, but involves sustained, active engagement, like children’s play. For Papert, in 1972, computer programming suggested a flexible construction medium, ideal for a research-lab/playground tuned to mathematics for children. In 1964, without computers, Sawyer also articulated research-playgrounds for children, rooted in conventional content, in which children would learn to act and think like mathematicians. > Problem • This target article addresses the issue of designing a formal curriculum that helps children develop the mathematical habits of mind of creative tinkering, puzzling through, and perseverance. I connect the two mathematicians/educators – Papert and Sawyer – tackling three questions: How do genuine puzzles differ from school problems? What is useful about children creating puzzles? How might puzzles, problem-posing and programming-centric playgrounds enhance mathematical learning? > Method • This analysis is based on forty years of curriculum analysis, comparison and construction, and on research with children. > Results • In physical playgrounds most children choose challenge. Papert’s ideas tapped that try-something-new and puzzle-it-out-for-yourself spirit, the drive for challenge. Children can learn a lot in such an environment, but what (and how much) they learn is left to chance. Formal educational systems set standards and structures to ensure some common learning and some equity across students. For a curriculum to tap curiosity and the drive for challenge, it needs both the playful looseness that invites exploration and the structure that organizes content. > Implications • My aim is to provide support for mathematics teachers and curriculum designers to design or teach in accord with their constructivist thinking. > Constructivist content • This article enriches Papert’s constructionism with curricular ideas from Sawyer and from the work that I and my colleagues have donemore » « less
-
null (Ed.)Research on interactions between caregivers and children have long been reported in science museum experiences. However, the interactions between caregivers and children in home environments are rarely investigated. By comparison, research on the experience of the engineering design challenge activities in a family context is even less. This case study aimed to examine interactions of two families in their home as they engaged with engineering design challenge kits that have the potential to support children’s foundational understanding of STEM concepts. Using social-cultural constructivism as a lens, about 370 minutes of video data was analyzed. Data coding revealed three types of interactions that facilitated children’s understanding of STEM concepts: teaching, build up, and synthesized moments. These three moments were interdependent but included different emphasis of caregivers’ and children’s engagement. Although there is a limitation of this study to generalize the findings, our results contribute to understand how caregivers and children play with the materials, tools, and their ideas in their home environments and how caregivers used different facilitation approaches without any training prior to engaging with the engineering kits.more » « less