skip to main content
10.1145/3544548.3580777acmconferencesArticle/Chapter ViewAbstractPublication PageschiConference Proceedingsconference-collections
research-article

Uncovering Privacy and Security Challenges In K-12 Schools

Published: 19 April 2023 Publication History

Abstract

Increased use of technology in schools raises new privacy and security challenges for K-12 students—and harms such as commercialization of student data, exposure of student data in security breaches, and expanded tracking of students—but the extent of these challenges is unclear. In this paper, first, we interviewed 18 school officials and IT personnel to understand what educational technologies districts use and how they manage student privacy and security around these technologies. Second, to determine if these educational technologies are frequently endorsed across United States (US) public schools, we compiled a list of linked educational technology websites scraped from 15,573 K-12 public school/district domains and analyzed them for privacy risks. Our findings suggest that administrators lack resources to properly assess privacy and security issues around educational technologies even though they do pose potential privacy issues. Based on these findings, we make recommendations for policymakers, educators, and the CHI research community.

Supplementary Material

Supplemental Materials (3544548.3580777-supplemental-materials.zip)
MP4 File (3544548.3580777-talk-video.mp4)
Pre-recorded Video Presentation

References

[1]
Gunes Acar, Steven Englehardt, and Arvind Narayanan. 2020. No boundaries: data exfiltration by third parties embedded on web pages. Proceedings on Privacy Enhancing Technologies 2020, 4(2020), 220–238.
[2]
Gunes Acar, Christian Eubank, Steven Englehardt, Marc Juarez, Arvind Narayanan, and Claudia Diaz. 2014. The web never forgets: Persistent tracking mechanisms in the wild. In Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security. 674–689.
[3]
Güneş Acar, Brendan Van Alsenoy, Frank Piessens, Claudia Diaz, and Bart Preneel. 2015. Facebook tracking through social plug-ins. Technical report prepared for the Belgian Privacy Commission (2015), 1–24.
[4]
Access4Learning. 2022. Student Data Privacy Consortium. https://privacy.a4l.org/.
[5]
Frida Alim, Nate Cardozo, Gennie Gebhart, Karen Gullo, and Amul Kalia. 2017. Spying on Students: School Issued-Devices and Student Privacy. Technical Report. Electronic Frontier Foundation. 49pages. https://www.eff.org/files/2017/04/13/student-privacy-report.pdf.
[6]
Amelia Pak-Harvey. 2019. Nevada Students’ Information Exposed in Data Breach. Las Vegas Review-Journal (Aug. 2019). https://www.reviewjournal.com/local/education/nevada-students-information-exposed-in-data-breach-1817032/.
[7]
David G. Balash, Xiaoyuan Wu, Miles Grant, Irwin Reyes, and Adam J. Aviv. 2022. Security and Privacy Perceptions of Third-Party Application Access for Google Accounts. In 31st USENIX Security Symposium (USENIX Security 22). USENIX Association, Boston, MA, 3397–3414. https://www.usenix.org/conference/usenixsecurity22/presentation/balash.
[8]
Gabriel Basset, C. David Hylender, Philippe Langlois, Alexandre Pinto, and Suzanne Widup. 2021. 2021 Data Breach Investigations Report. https://www.verizon.com/business/resources/reports/2021/2021-data-breach-investigations-report.pdf.
[9]
Eileen Belastock. 2022. " Our Biggest Nightmare Is Here": Cyberattacks are targeting school districts. How can schools respond to keep data and systems secure?Education Next 22, 2 (2022), 44–50.
[10]
Faith Boninger and Alex Molnar. 2016. Learning to be watched: Surveillance culture at school. The eighteenth annual report on schoolhouse commercialism trends. National Center for Education Policy at the University of Colorado at Boulder. https://nepc. colorado. edu/files/publications/RB% 20Boninger-Molnar% 20Trends. pdf. Accessed 17(2016).
[11]
Ferry Boschman, Susan McKenney, and Joke Voogt. 2014. Understanding decision making in teachers’ curriculum design approaches. Educational technology research and development 62, 4(2014), 393–416.
[12]
Ben Burgess, Avi Ginsberg, Edward W. Felten, and Shaanan Cohney. 2022. Watching the watchers: bias and vulnerability in remote proctoring software. In 31st USENIX Security Symposium (USENIX Security 22). USENIX Association, Boston, MA, 571–588. https://www.usenix.org/conference/usenixsecurity22/presentation/burgess.
[13]
Kelly Caine. 2016. Local Standards for Sample Size at CHI. In Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems(CHI ’16). Association for Computing Machinery, New York, NY, USA, 981–992. https://doi.org/10.1145/2858036.2858498 https://doi.org/10.1145/2858036.2858498.
[14]
Irene L Chen and Libi Shen. 2016. The cyberethics, cybersafety, and cybersecurity at schools. International Journal of Cyber Ethics in Education (IJCEE) 4, 1(2016), 1–15.
[15]
Catalin Cimpanu. 2019. Over 500 US Schools Were Hit by Ransomware in 2019. https://www.zdnet.com/article/over-500-us-schools-were-hit-by-ransomware-in-2019/.
[16]
Shaanan Cohney, Ross Teixeira, Anne Kohlbrenner, Arvind Narayanan, Mihir Kshirsagar, Yan Shvartzshnaider, and Madelyn Sanfilippo. 2021. Virtual Classrooms and Real Harms: Remote Learning at {US}. Universities. In Seventeenth Symposium on Usable Privacy and Security (SOUPS 2021). 653–674.
[17]
Shaanan Cohney, Ross Teixeira, Anne Kohlbrenner, Arvind Narayanan, Mihir Kshirsagar, Yan Shvartzshnaider, and Madelyn Sanfilippo. 2021. Virtual Classrooms and Real Harms: Remote Learning at {U.S}. Universities. In Seventeenth Symposium on Usable Privacy and Security (SOUPS 2021). 653–674.
[18]
CommonSenseMedia. 2022. Common Sense District Privacy Program. https://privacy.commonsense.org/resource/for-districts-and-schools.
[19]
Sophia Cope, Jason Kelley, and Bill Budington. 2021. FPF’s 2020 Student Privacy Pledge: New Pledge, Similar Problems. https://www.eff.org/deeplinks/2021/09/fpfs-2020-student-privacy-pledge-new-pledge-similar-problems.
[20]
Joseph Cox. 2017. Hacker Steals Millions of User Account Details from Education Platform Edmodo. https://www.vice.com/en/article/ezjbwe/hacker-steals-millions-of-user-account-details-from-education-platform-edmodo.
[21]
Shivangi Dhawan. 2020. Online Learning: A Panacea in the Time of COVID-19 Crisis. Journal of Educational Technology Systems 49, 1 (Sept. 2020), 5–22. https://doi.org/10.1177/0047239520934018 https://doi.org/10.1177/0047239520934018.
[22]
Anirudh Ekambaranathan, Jun Zhao, and Max Van Kleek. 2021. “Money Makes the World Go around”: Identifying Barriers to Better Privacy in Children’s Apps From Developers’ Perspectives. In Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems(CHI ’21). Association for Computing Machinery, New York, NY, USA, 1–15. https://doi.org/10.1145/3411764.3445599
[23]
Federal Trade Commission. 2013. Children’s Online Privacy Protection Rule. https://www.ftc.gov/system/files/2012-31341.pdf.
[24]
Federal Trade Commission. 2020. Complying with COPPA: Frequently Asked Questions. https://www.ftc.gov/business-guidance/resources/complying-coppa-frequently-asked-questions.
[25]
Richard Gomer, Eduarda Mendes Rodrigues, Natasa Milic-Frayling, and M.C. Schraefel. 2013. Network Analysis of Third Party Tracking: User Exposure to Tracking Cookies through Search. In 2013 IEEE/WIC/ACM International Joint Conferences on Web Intelligence (WI) and Intelligent Agent Technologies (IAT). IEEE, Atlanta, GA, USA, 549–556. https://doi.org/10.1109/WI-IAT.2013.77 https://ieeexplore.ieee.org/document/6690064/.
[26]
Google. 2022. Puppeteer | Tools for Web Developers. https://developers.google.com/web/tools/puppeteer.
[27]
Holly Hobbs and Nick Marinos. 2021. As Remote Learning Increased, So Did the Cyber Threats Facing K-12 Schools. https://www.gao.gov/podcast/remote-learning-increased%2C-so-did-cyber-threats-facing-k-12-schools.
[28]
IETL. 2022. Illinois Education Technology Leaders. https://www.iletl.org/.
[29]
Illinois General Assembly. 2015. HB3527. https://www.ilga.gov/legislation/publicacts/fulltext.asp?Name=099-0460.
[30]
Illinois General Assembly. 2019. Student Online Personal Protection Act. https://www.ilga.gov/legislation/ilcs/ilcs3.asp?ActID=3806&ChapterID=17.
[31]
Jonathan Jackson and Laura Zieger. 2012. Teacher Acquisition of Educational Technology: An Activity Theory Perspective. In Society for Information Technology & Teacher Education International Conference. Association for the Advancement of Computing in Education (AACE), 2332–2339.
[32]
Jacqueline M. Nowicki, Sherri Doughty, Jennifer Gregory, and Jessica Mausner. 2020. Recent K-12 Data Breaches Show That Students Are Vulnerable to Harm. Technical Report GAO-20-644. United States Government Accountability Office. https://www.gao.gov/assets/gao-20-644.pdf.
[33]
Al Januszewski and Michael Molenda. 2013. Educational technology: A definition with commentary. Routledge.
[34]
Rebecca Jeong and Sonia Chiasson. 2020. ’Lime’, ’Open Lock’, and ’Blocked’: Children’s Perception of Colors, Symbols, and Words in Cybersecurity Warnings. In Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems. Association for Computing Machinery, New York, NY, USA, 1–13.
[35]
Georgios Kambourakis. 2013. Security and Privacy in m-Learning and Beyond: Challenges and State-of-the-art. International Journal of u-and e-Service, Science and Technology 6, 3(2013), 67–84.
[36]
G. Kelly, J. Graham, J. Bronfam, and S. Garton. 2018. 2018 State of Edtech Privacy Report. Technical Report. Common Sense Media, San Francisco, CA.
[37]
G. Kelly, J. Graham, J. Bronfam, and S. Garton. 2019. 2019 State of Edtech Privacy Report. Technical Report. Common Sense Media, San Francisco, CA.
[38]
Priya C. Kumar, Marshini Chetty, Tamara L. Clegg, and Jessica Vitak. 2019. Privacy and Security Considerations For Digital Technology Use in Elementary Schools. In Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems(CHI ’19). Association for Computing Machinery, New York, NY, USA, 1–13. https://doi.org/10.1145/3290605.3300537
[39]
Celeste Lawson, Colin Beer, Dolene Rossi, Teresa Moore, and Julie Fleming. 2016. Identification of ‘at risk’students using learning analytics: the ethical dilemmas of intervention strategies in a higher education institution. Educational Technology Research and Development 64, 5(2016), 957–968.
[40]
LearnPlatform. 2022. EdTech Top 40: Fall 2022 Report. Technical Report. 8 pages. https://learnplatform.com/top40.
[41]
California Legislature. 2020. California Privacy Rights Act. https://cpra.gtlaw.com/cpra-full-text/.
[42]
Douglas A. Levin. 2022. The State of K-12 Cybersecurity: Year in Review – 2022 Annual Report. Technical Report. K12 Security Information Exchange (K12 SIX). 30 pages. https://www.k12six.org/the-report.
[43]
Sonia Livingstone, Mariya Stoilova, and Rishita Nandagiri. 2019. Children’s data and privacy online: growing up in a digital age: an evidence review. London School of Economics and Political Science, Department of Media and Commmunications (2019).
[44]
Sonia Livingstone, Mariya Stoilova, and Rishita Nandagiri. 2019. Children’s Data and Privacy Online: Growing up in a Digital Age: An Evidence Review. London School of Economics and Political Science, London. https://www.lse.ac.uk/media-and-communications/assets/documents/research/projects/childrens-privacy-online/Evidence-review.pdf.
[45]
Sonia Livingstone, Mariya Stoilova, and Rishita Nandagiri. 2021. Data and privacy literacy: the role of the school in educating children in a datafied society. 219–236. https://doi.org/10.5771/9783748921639-219
[46]
Gil Abraham Lopez. 2021. INVESTIGATING THE RANSOMWARE INFECTION RATE OF K12 SCHOOL DISTRICTS DURING THE COVID PANDEMIC. (2021).
[47]
Jamie Manolev, Anna Sullivan, and Roger Slee. 2019. The datafication of discipline: ClassDojo, surveillance and a performative classroom culture. Learning, Media and Technology 44, 1 (2019), 36–51.
[48]
Sana Maqsood and Sonia Chiasson. 2021. “They Think It’s Totally Fine to Talk to Somebody on the Internet They Don’t Know”: Teachers’ Perceptions and Mitigation Strategies of Tweens’ Online Risks. In Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems(CHI ’21). Association for Computing Machinery, New York, NY, USA, 1–17. https://doi.org/10.1145/3411764.3445224
[49]
The Markup. 2022. Blacklight – The Markup. https://themarkup.org/blacklight.
[50]
Jonathan R. Mayer and John C. Mitchell. 2012. Third-Party Web Tracking: Policy and Technology. In 2012 IEEE Symposium on Security and Privacy. 413–427. https://doi.org/10.1109/SP.2012.47
[51]
Nora McDonald, Sarita Schoenebeck, and Andrea Forte. 2019. Reliability and Inter-rater Reliability in Qualitative Research: Norms and Guidelines for CSCW and HCI Practice. Proceedings of the ACM on Human-Computer Interaction 3, CSCW (Nov. 2019), 72:1–72:23. https://doi.org/10.1145/3359174
[52]
Meta. 2022. Meta Pixel - Documentation. https://developers.facebook.com/docs/meta-pixel/.
[53]
Nader Issa and Lauren FitzPatrick. 2022. Massive CPS Data Breach Exposes Records of 560,000 Students, Employees. Chicago Sun-Times (May 2022). https://chicago.suntimes.com/education/2022/5/20/23132983/cps-public-schools-data-breach-students-employees-records-battelle-kids.
[54]
NCES. 2022. U.S. Department of Education. Institute of Education Sciences, National Center for Education Statistics.https://nces.ed.gov/.
[55]
NewSchools Venture Fund. 2019. Education Technology Use in Schools; Student and Educator Perspectives. Technical Report. Gallup Inc. 64 pages. https://www.newschools.org/wp-content/uploads/2019/09/Gallup-Ed-Tech-Use-in-Schools-2.pdf.
[56]
Helen Nissenbaum. 2004. Privacy as contextual integrity. Wash. L. Rev. 79(2004), 119.
[57]
Mercy Ikhuoria Nwankwo. 2020. IT Security Managers’ Strategies for Mitigating Data Breaches in Texas School Districts. Ph. D. Dissertation. Walden University.
[58]
Maggie Oates, Yama Ahmadullah, Abigail Marsh, Chelse Swoopes, Shikun Zhang, Rebecca Balebako, and Lorrie Faith Cranor. 2018. Turtles, Locks, and Bathrooms: Understanding Mental Models of Privacy Through Illustration. Proceedings on Privacy Enhancing Technologies (2018). https://petsymposium.org/popets/2018/popets-2018-0029.php.
[59]
U.S. Department of Education. 2008. Organization of U.S. Education: The School Level.
[60]
Legislature of Louisiana. 2015. HB 718 (2015). https://www.legis.la.gov/legis/ViewDocument.aspx?d=960015.
[61]
Abelardo Pardo and George Siemens. 2014. Ethical and privacy principles for learning analytics. British Journal of Educational Technology 45, 3 (2014), 438–450.
[62]
Paula Maylahn. 2022. edTech Leadership Survey Report. Technical Report. The Consortium for School Network. 50 pages. https://www.cosn.org/edtech-topics/state-of-edtech-leadership/.
[63]
Lana Peterson, Cassie Scharber, Amy Thuesen, and Katie Baskin. 2020. A rapid response to COVID-19: one district’s pivot from technology integration to distance learning. Information and Learning Sciences 121, 5/6 (Jan. 2020), 461–469. https://doi.org/10.1108/ILS-04-2020-0131.
[64]
Alexi Pfeffer-Gillett. 2018. Peeling Back the Student Privacy Pledge. Duke Law and Technology Review 16, 1 (2018), 41.
[65]
Paul Prinsloo and Sharon Slade. 2014. Student data privacy and institutional accountability in an age of surveillance. In Using data to improve higher education. Brill Sense, 195–214.
[66]
Alan Rappeport. 2017. Up to 100,000 Taxpayers Compromised in Fafsa Tool Breach, I.R.S. Says. The New York Times (April 2017). https://www.nytimes.com/2017/04/06/us/politics/internal-revenue-service-breach-taxpayer-data.html.
[67]
Joel R Reidenberg and Florian Schaub. 2018. Achieving big data privacy in education. Theory and Research in Education 16, 3 (2018), 263–279.
[68]
Research and Markets. 2021. EdTech Market: Global Industry Analysis, Trends, Market Size, and Forecasts up to 2027. Technical Report 5401915. Infinium Global Research. 100 pages. https://www.researchandmarkets.com/reports/5401915/edtech-market-global-industry-analysis-trends.
[69]
Jason Ribeiro. 2016. Educational technology decision-making: Technology acquisition for 746,000 Ontario students. Canadian Journal of Educational Administration and Policy176 (02 2016).
[70]
Stan Riley. 2022. Independent School Districts in Texas: A Focused Ethnography on Cybersecurity Barriers. Ph. D. Dissertation. Northcentral University.
[71]
David Rosen and Aaron Santesso. 2018. School Surveillance and Privacy. In The Palgrave International Handbook of School Discipline, Surveillance, and Social Control. Springer, 491–507.
[72]
Alan Rubel and Kyle ML Jones. 2016. Student privacy in learning analytics: An information ethics perspective. The information society 32, 2 (2016), 143–159.
[73]
Johnny Saldañna. 2013. The Coding Manual for Qualitative Researchers (2nd ed ed.). SAGE, Los Angeles.
[74]
Irving Seidman. 2006. Interviewing as qualitative research: A guide for researchers in education and the social sciences. Teachers college press.
[75]
Asuman Senol, Gunes Acar, Mathias Humbert, and Frederik Zuiderveen Borgesius. 2022. Leaky Forms: A Study of Email and Password Exfiltration Before Form Submission. In 31st USENIX Security Symposium (USENIX Security 22). 1813–1830.
[76]
Libi Shen, Irene Chen, and Anchi Su. 2017. Cybersecurity and data breaches at schools. In Cybersecurity breaches and issues surrounding online threat protection. IGI Global, 144–174.
[77]
Erica Shuford, Tara Kavanaugh, Brian Ralph, Ebrima Ceesay, and Paul Watters. 2018. Measuring Personal Privacy Breaches Using Third-Party Trackers. In 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE). IEEE, New York, NY, USA, 1615–1618. https://doi.org/10.1109/TrustCom/BigDataSE.2018.00236 https://ieeexplore.ieee.org/document/8456104/.
[78]
Natasha Singer. 2014. ClassDojo Adopts Deletion Policy for Student Data. https://bits.blogs.nytimes.com/2014/11/18/classdojo-adopts-deletion-policy-for-student-data/.
[79]
Natasha Singer. 2014. Protecting Data Privacy at School and at Play. https://bits.blogs.nytimes.com/2014/12/02/protecting-data-privacy-at-school-and-at-play/.
[80]
Natasha Singer. 2015. Privacy Pitfalls as Education Apps Spread Haphazardly. https://www.nytimes.com/2015/03/12/technology/learning-apps-outstrip-school-oversight-and-student-privacy-is-among-the-risks.html.
[81]
Natasha Singer. 2015. Uncovering Security Flaws in Digital Education Products for Schoolchildren. https://www.nytimes.com/2015/02/09/technology/uncovering-security-flaws-in-digital-education-products-for-schoolchildren.html.
[82]
Natasha Singer. 2018. For Sale: Survey Data on Millions of High School Students. The New York Times (July 2018). https://www.nytimes.com/2018/07/29/business/for-sale-survey-data-on-millions-of-high-school-students.html.
[83]
Natasha Singer. 2022. A Cyberattack Illuminates the Shaky State of Student Privacy. The New York Times (July 2022). https://www.nytimes.com/2022/07/31/business/student-privacy-illuminate-hack.html.
[84]
K12 SIX. 2022. K12 Security Information EXchange (K12 SIX). https://www.k12six.org.
[85]
Sharon Slade and Paul Prinsloo. 2013. Learning analytics: Ethical issues and dilemmas. American Behavioral Scientist 57, 10 (2013), 1510–1529.
[86]
Konstantinos Solomos, Panagiotis Ilia, Soroush Karami, Nick Nikiforakis, and Jason Polakis. 2022. The Dangers of Human Touch: Fingerprinting Browser Extensions through User Actions. In 31st USENIX Security Symposium (USENIX Security 22). USENIX Association, Boston, MA, 717–733. https://www.usenix.org/conference/usenixsecurity22/presentation/solomos.
[87]
Valerie Steeves, Priscilla Regan, and Leslie Regan Shade. 2018. Digital surveillance in the networked classroom. In The Palgrave international handbook of school discipline, surveillance, and social control. Springer, 445–466.
[88]
Rachael Stickland and Leonie Haimson. 2019. State Student Privacy Report Card. Technical Report. Parent Coalition for Student Privacy. https://secureservercdn.net/198.71.233.31/t8b.b96.myftpupload.com/wp-content/uploads/2019/01/The-2019-State-Student-Privacy-Report-Card.pdf.
[89]
Faiza Tazi, Sunny Shrestha, Dan Norton, Kathryn Walsh, and Sanchari Das. 2021. Parents, Educators, & Caregivers Cybersecurity & Privacy Concerns for Remote Learning During COVID-19. In CHI Greece 2021: 1st International Conference of the ACM Greek SIGCHI Chapter(CHI Greece 2021). Association for Computing Machinery, New York, NY, USA, 1–5. https://doi.org/10.1145/3489410.3489426
[90]
The Federal Bureau of Investigation. 2020. FBI Warns of Teleconferencing and Online Classroom Hijacking During COVID-19 Pandemic. https://www.fbi.gov/contact-us/field-offices/boston/news/press-releases/fbi-warns-of-teleconferencing-and-online-classroom-hijacking-during-covid-19-pandemic.
[91]
J William Tucker and Amelia Vance. 2016. School Surveillance: The Consequences for Equity and Privacy. Education Leaders Report. Volume 2, No. 4.National Association of State Boards of Education (2016).
[92]
Unknown. 2022. Lightspeed Systmes: Leaders in Online Safety and Education Solutions. https://www.lightspeedsystems.com/.
[93]
U.S. Department of Education. 2021. Family Educational Rights and Privacy Act (FERPA). https://www2.ed.gov/print/policy/gen/guid/fpco/ferpa/index.html.
[94]
Human Rights Watch. 2022. "How Dare They Peep Into My Private Life?" Children’s Rights Violations by Governments that Endorsed Online Learning During the Covid-19 Pandemic. https://www.hrw.org/report/2022/05/25/how-dare-they-peep-my-private-life/childrens-rights-violations-governments#1436
[95]
Martin Weller. 2018. Twenty years of Edtech. Educause Review Online 53, 4 (2018), 34–48.
[96]
Zheng Yan, Yukang Xue, and Yaosheng Lou. 2021. Risk and Protective Factors for Intuitive and Rational Judgment of Cybersecurity Risks in a Large Sample of K-12 Students and Teachers. Computers in Human Behavior 121 (aug 2021), 106791. https://doi.org/10.1016/j.chb.2021.106791 https://www.sciencedirect.com/science/article/pii/S074756322100114X.
[97]
Jason C. Yip, Kiley Sobel, Xin Gao, Allison Marie Hishikawa, Alexis Lim, Laura Meng, Romaine Flor Ofiana, Justin Park, and Alexis Hiniker. 2019. Laughing Is Scary, but Farting Is Cute: A Conceptual Model of Children’s Perspectives of Creepy Technologies. In Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems(CHI ’19). Association for Computing Machinery, New York, NY, USA, 1–15. https://doi.org/10.1145/3290605.3300303
[98]
NBC New York. 2022. Data of More Than 800,000 NYC Public School Students Compromised in Data Hack. NBC New York (March 2022). https://www.nbcnewyork.com/news/local/data-of-more-than-800000-nyc-public-school-students-compromised-in-data-hack/3616939/.
[99]
Elana Zeide. 2018. Education technology and student privacy. The Cambridge handbook of consumer privacy(2018), 70–84.
[100]
Elana Zeide and Helen Nissenbaum. 2018. Learner privacy in MOOCs and virtual education. Theory and Research in Education 16, 3 (2018), 280–307.
[101]
Jun Zhao, Ge Wang, Carys Dally, Petr Slovak, Julian Edbrooke-Childs, Max Van Kleek, and Nigel Shadbolt. 2019. ‘I Make up a Silly Name’: Understanding Children’s Perception of Privacy Risks Online. In Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems(CHI ’19). Association for Computing Machinery, New York, NY, USA, 1–13. https://doi.org/10.1145/3290605.3300336

Cited By

View all
  • (2024)A Content and Quality Evaluation of Mobile Classroom Behavior Management ApplicationsJournal of Positive Behavior Interventions10.1177/10983007241230594Online publication date: 6-Mar-2024
  • (2024)Contemplating Cybersecurity Breaches in EdTech Products with a Focus on Student Privacy and Security2024 2nd International Conference on Intelligent Data Communication Technologies and Internet of Things (IDCIoT)10.1109/IDCIoT59759.2024.10467871(605-609)Online publication date: 4-Jan-2024
  • (2023)RedCapes: the Design and Evaluation of a Game Towards Improving Autistic Children's Privacy AwarenessProceedings of the Eleventh International Symposium of Chinese CHI10.1145/3629606.3629618(110-126)Online publication date: 13-Nov-2023

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
CHI '23: Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems
April 2023
14911 pages
ISBN:9781450394215
DOI:10.1145/3544548
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 19 April 2023

Permissions

Request permissions for this article.

Check for updates

Badges

  • Honorable Mention

Author Tags

  1. EdTech
  2. K-12
  3. educational technologies
  4. student data privacy

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Conference

CHI '23
Sponsor:

Acceptance Rates

Overall Acceptance Rate 6,121 of 26,002 submissions, 24%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)451
  • Downloads (Last 6 weeks)97
Reflects downloads up to 17 Oct 2024

Other Metrics

Citations

Cited By

View all
  • (2024)A Content and Quality Evaluation of Mobile Classroom Behavior Management ApplicationsJournal of Positive Behavior Interventions10.1177/10983007241230594Online publication date: 6-Mar-2024
  • (2024)Contemplating Cybersecurity Breaches in EdTech Products with a Focus on Student Privacy and Security2024 2nd International Conference on Intelligent Data Communication Technologies and Internet of Things (IDCIoT)10.1109/IDCIoT59759.2024.10467871(605-609)Online publication date: 4-Jan-2024
  • (2023)RedCapes: the Design and Evaluation of a Game Towards Improving Autistic Children's Privacy AwarenessProceedings of the Eleventh International Symposium of Chinese CHI10.1145/3629606.3629618(110-126)Online publication date: 13-Nov-2023

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Full Text

View this article in Full Text.

Full Text

HTML Format

View this article in HTML Format.

HTML Format

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media