License: CC BY-SA 4.0
arXiv:2401.09591v1 [cs.CY] 17 Jan 2024

Bringing Social Computing to Secondary School Classrooms

Kianna Bolante [email protected] University of WashingtonSeattleWashingtonUSA Kevin Chen [email protected] Cleveland STEM High SchoolSeattleWashingtonUSA Quan Ze Chen [email protected] University of WashingtonSeattleWashingtonUSA  and  Amy Zhang [email protected] University of WashingtonSeattleWashingtonUSA
(2024)
Abstract.

Social computing is the study of how technology shapes human social interactions. This topic has become increasingly relevant to secondary school students (ages 11–18) as more of young people’s everyday social experiences take place online, particularly with the continuing effects of the COVID-19 pandemic. However, social computing topics are rarely touched upon in existing middle and high school curricula. We seek to introduce concepts from social computing to secondary school students so they can understand how computing has wide-ranging social implications that touch upon their everyday lives, as well as think critically about both the positive and negative sides of different social technology designs.

In this report, we present a series of six lessons combining presentations and hands-on activities covering topics within social computing and detail our experience teaching these lessons to approximately 1,405 students across 13 middle and high schools in our local school district. We developed lessons covering how social computing relates to the topics of Data Management, Encrypted Messaging, Human-Computer Interaction Careers, Machine Learning and Bias, Misinformation, and Online Behavior. We found that 81.13% of students expressed greater interest in the content of our lessons compared to their interest in STEM overall. We also found from pre- and post-lesson comprehension questions that 63.65% learned new concepts from the main activity. We release all lesson materials on a website for public use. From our experience, we observed that students were engaged in these topics and found enjoyment in finding connections between computing and their own lives.

Social Computing Education, K-12 Education, Lesson Design
journalyear: 2024copyright: rightsretainedconference: Proceedings of the 55th ACM Technical Symposium on Computer Science Education V. 1; March 20–23, 2024; Portland, OR, USAbooktitle: Proceedings of the 55th ACM Technical Symposium on Computer Science Education V. 1 (SIGCSE 2024), March 20–23, 2024, Portland, OR, USAdoi: 10.1145/3626252.3630795isbn: 979-8-4007-0423-9/24/03ccs: Human-centered computing Collaborative and social computing theory, concepts and paradigms

1. Introduction

In today’s rapidly evolving digital world along with the impact that COVID-19 has had on technology use, social computing platforms have become an integral part of the lives of young individuals (Branscombe, 2020). It profoundly influences how they communicate, learn, and interact with the world around them. The pervasiveness of social media, online communities, and virtual spaces has not only transformed the way information is disseminated but has also presented unique challenges and opportunities for society at large. As the younger generation navigates this dynamic technological space, there is a growing imperative to equip them with the necessary skills, critical thinking abilities, and ethical foundations to engage responsibly and constructively in social computing environments.

The evolution of social computing has not only revolutionized how teens today use social technology to communicate but also seek information, collaborate on projects, and explore their interests in digital spaces. As such, educators should consider adapting their pedagogical approaches to accommodate this relevant topic to connect students to the broader social implications of computing and guide them through the potential pitfalls of social computing such as misinformation, cyberbullying, and privacy breaches.

This research paper delves into the critical intersection of education and social computing for secondary-level students (ages 11–18), aiming to create sustainable teaching resources that can foster a community of socially responsible and aware individuals online. To assess the effectiveness of our resources, we used pre- and post-surveys following Bloom’s Taxonomy, a hierarchical model applied to assess comprehension levels of educational objectives through a variety of methods (Forehand et al., 2005). Through a comprehensive review of prior and related work, lesson development, and reflective school visits, this research paper seeks to spark conversation on the implementation of social computing education for K–12 students. In doing so, we aim to enable a generation of informed digital citizens to effectively shape the ever-evolving landscape of social computing.

2. Related Work

2.1. Social Computing

The rise in youth digital presence has produced polarizing effects for many secondary school students. Although youth value the accessible media digital spaces provide (Hassoun et al., 2023; Davis, 2013), studies show that they are often exposed to violence, harassment, misinformation, and other harmful content while online (Ito, 2013; Hassoun et al., 2023; Freed et al., 2023). As these risks coincide with computer science (CS) and behavioral science, social computing education proves to be especially relevant to youth, and in particular, secondary school students (Yardi et al., 2008; Goldweber et al., 2013; Jayathirtha et al., 2022; Fisher et al., 2018; Ko et al., 2020), making it a leading motivator for this work.

Prior research in the realm of social computing education has been predominantly centered around the college-level demographic, specifically exploring ways to enhance interest and retention in computing disciplines (e.g., (Isenegger et al., 2021; Buckley et al., 2008)). In contrast, our work seeks to elevate the discourse on social technologies, fostering critical thinking and understanding among a younger range of students. Our objective is to prompt students to question and understand the processes involved in the creation and utilization of technologies, as well as their broader societal impacts.

2.2. Interdisciplinary Application

Social computing overlaps with a variety of fields that require the practice of computational thinking. While CS education traditionally focuses on highly technical aspects, with limited work expanding into blended fields (e.g., (Amoussou et al., 2010; Carr et al., 2020)), existing efforts emphasize social integration primarily within computing and programming courses. Other works often delve into integrating specific technical assignments and longer-term projects related to social topics into their respective courses. Rather than focusing on building technical skills through a social lens, we emphasize the high-level applications of social technologies through exploratory activities and discussion. This approach allows engagement from students interested in diverse interdisciplinary fields, encompassing humanities, science, mathematics, and career and technical education.

Our interdisciplinary approach goes beyond classrooms, reaching fairs, field days, and extracurricular activities. This unique method expands the impact of social computing education across diverse academic domains. To the extent of our knowledge, research has not been published with the integration of disciplines at a similar scope.

2.3. Pedagogical Practices

The importance of social computing education prompted us to practice culturally responsive pedagogy (CRP), a widely accepted paradigm in education (Ojeda-Ramirez et al., 2023; Webb and Gonzales, 2018) embracing identities and experiences integral to students. CRP is shown to improve student engagement and learning outcomes (Ojeda-Ramirez et al., 2023; Webb and Gonzales, 2018; Stevens et al., 2022; Williams et al., 2017). Additionally, our curriculum follows an independent modular structure: each lesson addresses a different social computing topic with several learning objectives that are taught within one hour. While some studies follow a modulated format (e.g., (Wang et al., 2023; Meads et al., 2023)) and others use an independent lesson format (e.g., (Petelka et al., 2022; Klassen and Fiesler, 2022)), our curriculum takes advantage of the benefits behind both structures. Our design allows flexibility in lessons being taught consecutively for a comprehensive course or individually as they fit into existing curricula. During our lessons, we utilized four methods of evaluation: educator feedback, instructor observations, and student pre- and post-surveys, all of which are commonly implemented in CS education (e.g., (Carr et al., 2020; Meads et al., 2023; Yardi et al., 2008; Giacaman et al., 2023; Basu et al., 2020; Petelka et al., 2022; Cao and Grabchak, 2023; Wang et al., 2023)). This wide array of perspectives allowed us to effectively improve our lessons.

3. Lesson Development

This section provides context on the design process of our social computing modules and an overview of each module’s content.

3.1. Collaborators

In order to create accurate, informative, and engaging content, we consulted with diverse perspectives in addition to our own.

Students. To guide the design of our materials, one of our coauthors is currently a high school student and another recently graduated from high school. These collaborators were able to provide insight from their personal experiences as individuals directly connected to the demographic this project seeks to impact.

Researchers. To assemble the specific social computing content and choose module topics, the remaining coauthors are social computing researchers. For specialized feedback on certain module topics, we consulted with researchers who work directly in our module topic fields. These collaborators provided accurate resources and expertise to help curate the social computing educational content.

Professional Educators. To ensure our materials are accessible and digestible to secondary school teachers, we received feedback on our lesson content and website design from educators who hosted us for school visits and a professional curriculum designer.

3.2. Design

Each of the six lessons follows an approximately one-hour format, designed for introductory levels with consistent content across all grades. With this structure, we aimed to prioritize factors like interactivity, reflection, and relevancy.

  • Introduction: Overview of the learning targets, a high-level background of the social computing topic, and examples.

  • Main Activity: Interactive activity inquiring into one of the main themes and learning targets.

  • Reflection: Class discussion on observations students made about the activity and its social implications.

  • Connection: Class discussion connecting lesson activities and objectives to students’ everyday lives.

  • Closing Activity: Interactive activity relating to another objective or theme, review of lesson content, and lesson wrap-up.

All activities were crafted to engage students in the “Apply,” “Evaluate,” and “Create” levels of Bloom’s Taxonomy, fostering higher-order thinking skills.

3.3. Content

We created six independent lessons on various computing topics and focused our content on how they relate to social computing.

3.3.1. Data Management.

With personal information easily accessible online (Moore, 2012), we introduce the concept of a “digital footprint” with strategies to keep information safe on the internet. In the first activity, students work in small groups to decipher clues unique to their group. Their goal is to uncover information on a fictional character’s life based on the pieces of information the character has publicly posted online. The class then assembles their clues to write a biography about the character. This activity demonstrates the vulnerabilities of publicizing information online. Then, students learn the ways digital footprints can be described and categorized. Finally, students apply this knowledge through the closing activity, where they match different data management scenarios to the various data categories.

3.3.2. Encrypted Messaging.

As many youth use online messaging services to communicate with others (Schiano et al., 2002), this module addresses the significance of encryption to keep information secure. The main activity is a class-wide simulation of asymmetric encryption. The class is divided into “Senders,” who send and receive written notes, and “Deliverers,” who deliver messages between Senders. The activity is broken into multiple rounds where a layer of security is added each time. After discussing the benefits of encryption from the activity, we introduce some concerns about encryption. In the closing activity, students use external resources and their peers to prepare for a class debate on the pros and cons of encryption.

3.3.3. Human-Computer Interaction (HCI) Careers.

Because technology has become increasingly ubiquitous, this module focuses on careers related to HCI. In the main activity, students think of technology they want to redesign or create to address an issue of their choice. The design worksheet guides them through a process of brainstorming, connecting to the real world, physical design and functionality, and revision with peers. During the revision process, we emphasize the need for diversity in science, technology, engineering, and math (STEM) fields (Allen-Ramdial and Campbell, 2014). By encouraging students to share and iterate on their ideas with peers, we show the importance of perspective in the design process. Finally, the closing activity asks students to create career posters summarizing a STEM-related career of their choice and how it connects to social computing.

3.3.4. Machine Learning and Bias.

Machine learning is rapidly being implemented in many everyday tools. However, machine learning tools contain a variety of underlying biases that can negatively impact users (Mehrabi et al., 2021). In the main activity, students grade sample high school résumés and then compare their grades and criteria to an online artificial intelligence résumé screener. We reveal some real-life examples of how résumé screeners have shown identity bias in the past and reveal the potential job barriers this could cause (Dastin, 2022). In the closing activity, students explore text-to-image generation where they discover biases in some of the images generated firsthand. We provided guiding prompts that revealed bias in the generated images and encouraged students to try out their own text prompts as well.

3.3.5. Misinformation.

There is an overwhelming amount of information consumed on a daily basis through online mediums, and it can be difficult to identify and filter misinformation (Wu et al., 2019). The main activity is a class-wide simulation of how misinformation is spread. In this activity, we separate the students into “Users,” who consume media, and “Sources,” who are companies that produce and present media. Sources strategically choose from a wide pool of articles containing both factual and misinformation headlines to pitch to Users. Users then go around to hear pitches and pick their top three Sources to give their money to based on what interests them the most. After calculating which types of articles got the most money, it is typically found that the Sources that pitched misinformation gain the most money. After learning about why misinformation is spread and strategies on how to identify it, we test the students on how well they can identify misinformation. By using the skills that were taught, they go through a mix of headlines and discuss as a class whether they believe the article is misinformation or not.

3.3.6. Online Behavior.

The secondary school age demographic is highly active on online platforms, thus this module explores the many beneficial and harmful effects online behavior has on youth (Lusk, 2010). The main activity is a “Choose Your Own Adventure” where groups of students make different choices around the classroom that lead to different endings. As they make choices as a group, students discuss the potential ramifications of each option to guide them through scenarios resembling scamming, online harassment, academic integrity, and social comparison. In the closing activity, students inspect different packets of social media captions and pick the one packet they feel is the most appealing to them. Each packet contains one caption that focuses on a more negative experience in comparison to the others, which makes students reluctant to choose certain packets. This activity helps students understand that social media is often unrepresentative of the real world, especially as online users tend to primarily share the highlights of their lives.

4. School Visits

We visited 13 different schools in our local area to pilot our lessons, reaching around 1,405 total middle and high school students. Since the end of 2022, we have conducted 24 visits across all schools.

4.1. Outreach

Two major announcements were sent to local secondary school teachers, expressing our willingness to teach social computing modules at schools. The first announcement in January ’22 resulted in 10 visit requests, while the second in May ’22 led to 38. The overwhelming response posed a challenge, as fulfilling all requests with limited people to teach was difficult. Ultimately, some visits had to be postponed to the next school year. Additionally, we collaborated with our university’s K–12 Outreach Committee, conducting secondary school visits, participating in fairs and workshops during Computer Science Education Week, and presenting at regional educator networking events.

From our outreach efforts, we had 48 total school visit requests. Misinformation was our most requested topic with 33.30% of teachers requesting it, followed by Machine Learning and Bias (27.10%), Online Behavior (16.70%), and Data Management (4.20%). Encrypted Messaging initially received no teaching requests, but after consulting with teachers, we successfully piloted the module at two schools. In total, we delivered all six modules to both middle and high school levels at least once.

Among the 24 high school visit requests, Machine Learning and Bias (37.50%) and Misinformation (29.17%) were the most requested modules by teachers. For the 24 middle school requests, the most sought-after modules were Misinformation (37.50%) and Online Behavior (37.50%).

4.2. Demographics

All school visits were in Seattle Public Schools, the largest public school district in the state, where students are equipped with devices like laptops and tablets for classroom instruction. Based on survey results, 64.40% of recorded students are in middle school (grades 6–8) and 35.60% are in high school (grades 9–12). Out of those students, 50.30% are Male, 43.70% are Female, and the remaining 6.00% self-identify as Non-Binary or another specified gender.

As it pertains to racial and ethnic diversity, we collected information from a wide range of backgrounds such as Black or African American (11.45%), East Asian (13.99%), Hispanic or Latino (10.24%), Middle Eastern or North African (2.43%), Native American or Alaska Native (1.98%), Native Hawaiian (0.99%), Pacific Islander (3.31%), South Asian (5.07%), Southeast Asian (11.34%), and White (66.48%). Students had the option to select more than one ethnic background.

4.3. Pre- and Post-Surveys

We administered optional pre- and post-surveys at the start and end of each lesson to assess students’ social computing comprehension, module feedback, and demographics. Guided by Bloom’s Taxonomy, our questions covered a spectrum of complexity, ensuring students grasped content through recognition, application, and creation.

Before the lesson started, we distributed the pre-survey. We asked students about their current knowledge of social computing and the specific social computing topic at hand through multiple-choice questions (MCQ) designed around each module’s three learning targets. These questions focused on the “Remember” category of Bloom’s Taxonomy, allowing students to demonstrate their ability to recall module concepts. We had 920 pre-survey responses across all school visits.

At the end of each lesson, we gave students time to complete the post-survey. We asked the same questions from the pre-survey in addition to a free-response question (FRQ) to demonstrate a deeper comprehension of the topic and a space to provide feedback on their experience with the lesson leveraging the “Understand” and “Analyze” levels of Bloom’s Taxonomy. We had 629 post-survey responses across all school visits. We suspect that the difference in the amount of pre- to post-survey responses is due to limited time at the end of class which rushed students and a lack of energy from students to complete a longer survey after enduring a full lesson.

5. Results

5.1. Comprehension Evaluation

To quantify student comprehension, we gave students the same three MCQs on their respective module topics before and after the lesson. The post-survey included an FRQ broken into three parts. Both MCQs and FRQs were graded from a range of 0–3 based on correctness and demonstrated understanding, as seen in Figure  1. Post-survey MCQ scores surpassed pre-survey results for all modules. For modules with closely aligned pre- and post-MCQ scores, it is likely attributed to higher percentages of students reporting having prior knowledge such as 70.42% for Misinformation and 46.43% for Online Behavior participants.

Through qualitative assessment, students made deep connections to the social computing topic they learned in their daily lives.

Learning about misinformation today[,] I have realized that in my own life[,] if I am intrigued by something, especially something that is flashy and crazy like how misinformation tends to be[,] I will put my effort and money into said thing[,] even if it hurts me later on. (Misinformation Participant: Grade 12)

5.1.1. Understanding of Social Computing

When students were asked to describe social computing and its impact on them, 50.60% of students did not have a clear understanding in the pre-survey. In the post-survey, only 11.10% of students were unsure and most were able to accurately connect social computing to the lesson topic. This student is one of many who showed a deep comprehension of the topic by describing its beneficial and harmful effects:

I would describe [social computing] as online systems/platforms that allow us to communicate and have both positive and negative impacts. I think that social computing impacts me positively by letting me communicate with my friends and family, but I think it also impacts me negatively in that I sometimes compare myself to others and that probably lowers my self-esteem. (Online Behavior Participant: Grade 10)

Figure 1. Student Pre- and Post-Survey Results by Lesson
Refer to caption

Student Pre- and Post-Survey Results by Lesson

Figure 1. Student Pre- and Post-Survey Results by Lesson

5.2. Pedagogy Preferences

To evaluate teaching practices that resonate most with students in accordance with learning social computing topics, we collected information on what helps them learn best. 70.20% of students reported that demonstrations where instructors show concepts to the class and answer questions benefit them. Other significant practices noted were instructors working with smaller groups (39.80%) and providing project-based assignments (38.50%). We kept these preferences in mind as we iterated and improved our lesson content by incorporating opportunities for instructor demonstrations and small group projects.

Figure 2. Student Self-Evaluation of Lesson Comprehension
Refer to caption

Student Self-Evaluation of Lesson Comprehension

Figure 2. Student Self-Evaluation of Lesson Comprehension

5.3. Student Interest

In addition to measuring comprehension, we collected information on students’ self-reported interest and understanding of the lesson in Figure  2 using a five-point scale of Strongly Disagree: 1 to Strongly Agree: 5. From this data, we discovered that 81.13% of students expressed greater lesson interest compared to their STEM interest and 63.65% learned new concepts after the lesson. The average change in the interest score from STEM to lesson was 0.22 with a standard deviation of 0.99.

Furthermore, it was observed that the majority of students identifying with historically underrepresented minority groups in technical fields (for Science and Statistics, 2019) demonstrated equal or increased interest in STEM post-participation. Specifically, 75.45% of Female and Non-Binary students expressed positive sentiments, and among the Non-White and Non-Asian demographic, 75.68% reported favorable views on STEM interest. These results highlight the effectiveness of our lessons in actively engaging and maintaining student interest in STEM.

6. Teaching Resources

After refining our materials through visits and incorporating feedback, our goal is to make them user-friendly for educators. Here, we outline the teaching resources we provide.

6.1. Lesson Materials

When developing each lesson, we created a lesson outline detailing content and timing, a slideshow with presenter notes, and related handouts. All of our lesson materials were created with Google Docs Editors, an effective office suite for educators that makes it convenient to download and remix for a teacher’s personal goals and use (Romero et al., 2018). Using this platform makes creating copies and personalizing our lessons fairly easy for educators.

6.2. External Resources

While developing our materials, we discovered various learning tools and resources relevant to our module topics. Our website acts as a centralized hub, listing related articles, online games, videos, and lesson plans. We aim to regularly update and expand these resources to make our website a comprehensive resource for social computing education.

6.3. Website

We created a user-friendly website, housing all resources for teachers. The website serves as a valuable tool for educators aiming to integrate our lessons into their curriculum. Find all materials posted at: https://social.cs.washington.edu/sfl-curriculum/.

In developing the site, we sought input from educators and researchers, refining it for optimal usability. Teachers reported increased confidence in presenting lessons after reviewing the materials. The website is structured with key sections: ”Home” for an overview, ”About Us” for project details, ”Modules” for specific lessons (see Figure  3), and ”Contact” for visit requests and team details. We aim to continuously seek feedback from teachers and students to enhance our resources. Future plans involve expanding external resources on the website and creating additional support materials, such as example lectures and activity simulations, to aid teachers in independent lesson delivery.

Figure 3. Section of the project website detailing lesson content, resources, and goals for the Online Behavior module
Refer to caption

Section of project website detailing lesson content, resources, and goals for the Online Behavior module

Figure 3. Section of the project website detailing lesson content, resources, and goals for the Online Behavior module

7. Reflection

This section offers insights and recommendations from our experience in designing and teaching social computing lessons.

Adaptability in lessons is key. Since each lesson is separated into distinct sections with multiple activities, it is easy to adapt the lessons for a wide range of time lengths. Throughout all the school visits, we taught 30 to 120-minute class periods. For shorter class sessions, we cut down content by removing the closing activity or limiting class reflection and discussion. For longer classes, we gave ample time for class discussion or taught an additional module altogether. With the adaptability of our social computing modules, we were able to always make use of all the class time.

The lessons are adaptable to diverse class settings, accommodating 8-60 students based on factors like graduating students or shared lessons among teachers. The classrooms also varied in layout, ranging from large tables to rows of desktops. Despite varying layouts, our lessons consistently boosted comprehension, proving effective. For larger classes, we recommend multiple instructors or assistants to ensure focus, especially during year-end sessions when students may seem disengaged.

Our last form of adaptability is to accommodate independent or collaborative participation for students. All of our lesson’s small group activities can be done individually if students prefer. During visits, a few students expressed comfort in doing certain activities alone instead of with peers. We observed that students were still able to actively learn and engage with the activity no matter what format they chose to participate in.

Independent lessons allow for year-round flexibility. When sending outreach emails to secondary school teachers district-wide, we had a significant amount of demand near the end of the year, in between semesters, or after Advanced Placement examinations. Many teachers emphasized the convenience of independent lessons by expressing how our lessons can easily be integrated during class on days they have more free time. All of the module topics are connected through the subject of social computing and can be taught consecutively to students. However, since the lessons do not build directly off one another, teachers have the freedom to choose individual lessons as they fit into their existing curriculum.

Students connect social computing to their own identities and values when given the space to. Many of our lesson activities were intentionally open-ended to allow for student self-expression. We found that students gravitated toward topics relating to their identities and interests when given creative prompts. This was particularly demonstrated in the main activity of our HCI Careers module, where most students designed technology aimed to help solve matters relating to their own cultural, ability, socioeconomic, and gender identities. From this observation, we highlight how social computing can directly tie into culturally responsive pedagogy.

Social computing is applicable beyond computing courses. To our surprise, most of our school visit requests were from teachers who did not teach computer science at their schools. Our visit requests were for a variety of class subjects such as English Language Arts (ELA), Psychology, Leadership, Health, Career Exploration, and all subjects of STEM.

Educators who hosted us detailed significant connections between our lesson modules and their current curricula, showing the importance of these topics within all academic subjects.

Students in science get exposed to a lot of misinformation–this was especially exacerbated by the isolation and social media influx during the COVID-19 pandemic with regards to biology. (Misinformation Reviewer: High School Biology Teacher)

The interactivity of our lessons allows for new depths of learning that complement the skills practiced in contrasting subjects.

I do [no]t think it seems natural to be in an ELA class[,] but we did an argument unit about artificial intelligence [(AI)] and it helped to see the information presented in a different way with more examples so it was wonderful. We read about it[,] but it’s a lot different to experience using an AI tool. (Machine Learning and Bias Reviewer: Middle School ELA Teacher)

Social computing is relevant to everybody. Even if certain students are not necessarily interested in building technical skills or learning how specific technologies work, technology still affects their everyday lives. By introducing the concept of social computing, we focus on the broader social implications of technology that connect to students. This student expands on social computing and its omnipresence in their life:

I did [no]t know the definition[,] but I have heard of the concepts. I would describe social computing as the idea and process of online information and data/communication digitally. It impacts me because I use the internet/digital platforms for entertainment, connecting with friends, and education, which means I am interacting with this digital web of computing daily. (Online Behavior Participant: Grade 10)

Ultimately, there is an evident disparity in how social computing is introduced in secondary-level classes. Many students from our study may have been aware of certain computing topics but did not acquire formal insight or education from their existing curricula.

8. Next Steps

This project highlights the impactful influence of social computing education on youth. We aim to extend our reach by persisting in local school visits and expanding efforts to raise awareness of social computing topics beyond our initial target audience.

In hopes of reaching students beyond our local area, we plan to offer virtual alternatives to our activities. For further breadth of lesson options, we are exploring the addition of Recommender Systems and Mental Health modules. For further impact on teachers, we are looking into opportunities to host workshops for educators on how to teach this content and are promoting these materials further to organizations and educators. We encourage them to integrate these materials into their classes, focusing on our most sought-after modules, including Misinformation, Machine Learning and Bias, and Online Behavior. We see a great opportunity to expand these resources to a much younger and older demographic and encourage members of the computing education community to adopt social computing concepts in their work.

Acknowledgements.
We extend our gratitude to the staff and faculty at Seattle Public Schools who contributed to outreach initiatives and supported school visits in the interest of social computing education.

References

  • (1)
  • Allen-Ramdial and Campbell (2014) Stacy-Ann A Allen-Ramdial and Andrew G Campbell. 2014. Reimagining the pipeline: Advancing STEM diversity, persistence, and success. BioScience 64, 7 (2014), 612–618.
  • Amoussou et al. (2010) Guy-Alain Amoussou, Myles Boylan, and Joan Peckham. 2010. Interdisciplinary computing education for the challenges of the future. In Proceedings of the 41st ACM technical symposium on Computer science education. 556–557.
  • Basu et al. (2020) Debarati Basu, Harinni K Kumar, Vinod K Lohani, N Dwight Barnette, Godmar Back, Dave McPherson, Calvin J Ribbens, and Paul E Plassmann. 2020. Integration and evaluation of spiral theory based cybersecurity modules into core computer science and engineering courses. In Proceedings of the 51st ACM Technical Symposium on Computer Science Education. 9–15.
  • Branscombe (2020) Mary Branscombe. 2020. The network impact of the global COVID-19 pandemic. The New Stack 14 (2020).
  • Buckley et al. (2008) Michael Buckley, John Nordlinger, and Devika Subramanian. 2008. Socially relevant computing. ACM SIGCSE Bulletin 40, 1 (2008), 347–351.
  • Cao and Grabchak (2023) Lijuan Cao and Michael Grabchak. 2023. Experience Report on Using WeBWorK in Teaching Discrete Mathematics. In Proceedings of the 54th ACM Technical Symposium on Computer Science Education V. 1. 861–867.
  • Carr et al. (2020) Valerie Carr, Morris Jones, and Belle Wei. 2020. Interdisciplinary computing: Applied computing for behavioral and social sciences. In Proceedings of the 51st ACM Technical Symposium on Computer Science Education. 400–406.
  • Dastin (2022) Jeffrey Dastin. 2022. Amazon scraps secret AI recruiting tool that showed bias against women. In Ethics of data and analytics. Auerbach Publications, 296–299.
  • Davis (2013) Katie Davis. 2013. Young people’s digital lives: The impact of interpersonal relationships and digital media use on adolescents’ sense of identity. Computers in Human Behavior 29, 6 (2013), 2281–2293.
  • Fisher et al. (2018) Douglas H Fisher, Jacqueline Cameron, Tamara Clegg, and Stephanie August. 2018. Integrating social good into CS education. In Proceedings of the 49th ACM Technical Symposium on Computer Science Education. 130–131.
  • for Science and Statistics (2019) National Center for Science and Engineering Statistics. 2019. Women, minorities, and persons with disabilities in science and engineering.
  • Forehand et al. (2005) Mary Forehand et al. 2005. Bloom’s taxonomy: Original and revised. Emerging perspectives on learning, teaching, and technology 8 (2005), 41–44.
  • Freed et al. (2023) Diana Freed, Natalie N Bazarova, Sunny Consolvo, Eunice J Han, Patrick Gage Kelley, Kurt Thomas, and Dan Cosley. 2023. Understanding Digital-Safety Experiences of Youth in the US. In Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems. 1–15.
  • Giacaman et al. (2023) Nasser Giacaman, Partha Roop, and Valerio Terragni. 2023. Evolving a Programming CS2 Course: A Decade-Long Experience Report. In Proceedings of the 54th ACM Technical Symposium on Computer Science Education V. 1. 507–513.
  • Goldweber et al. (2013) Michael Goldweber, John Barr, and Elizabeth Patitsas. 2013. Computer science education for social good. In Proceeding of the 44th ACM technical symposium on Computer science education. 15–16.
  • Hassoun et al. (2023) Amelia Hassoun, Ian Beacock, Sunny Consolvo, Beth Goldberg, Patrick Gage Kelley, and Daniel M Russell. 2023. Practicing Information Sensibility: How Gen Z Engages with Online Information. In Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems. 1–17.
  • Isenegger et al. (2021) Kathleen Isenegger, Yeabtsega Birhane, Vidushi Ojha, Caroline Coxe, and Colleen M Lewis. 2021. Understanding and Expanding College Students’ Perceptions of Computing’s Social Impact. In 2021 Conference on Research in Equitable and Sustained Participation in Engineering, Computing, and Technology (RESPECT). IEEE, 1–10.
  • Ito (2013) Mizuko Ito. 2013. Hanging out, messing around, and geeking out: Kids living and learning with new media. The MIT press.
  • Jayathirtha et al. (2022) Gayithri Jayathirtha, Joanna Goode, Nicki Washington, Shana V White, Aman Yadav, and Cecilé Sadler. 2022. Supporting the Integration of Social Justice Topics within K-12 Computing Education. In Proceedings of the 54th ACM Technical Symposium on Computer Science Education V. 2. 1206–1207.
  • Klassen and Fiesler (2022) Shamika Klassen and Casey Fiesler. 2022. ” Run Wild a Little With Your Imagination” Ethical Speculation in Computing Education with Black Mirror. In Proceedings of the 53rd ACM Technical Symposium on Computer Science Education-Volume 1. 836–842.
  • Ko et al. (2020) Amy J Ko, Alannah Oleson, Neil Ryan, Yim Register, Benjamin Xie, Mina Tari, Matthew Davidson, Stefania Druga, and Dastyni Loksa. 2020. It is time for more critical CS education. Commun. ACM 63, 11 (2020), 31–33.
  • Lusk (2010) Brooke Lusk. 2010. Digital natives and social media behavior: an overview. The prevention researcher 17, S1 (2010), 3–7.
  • Meads et al. (2023) Andrew Meads, Yu-Cheng Tu, and Gillian Dobbie. 2023. Moving a Bootcamp-Style Computer Science Programme Online: An Experience Report. In Proceedings of the 54th ACM Technical Symposium on Computer Science Education V. 1. 785–791.
  • Mehrabi et al. (2021) Ninareh Mehrabi, Fred Morstatter, Nripsuta Saxena, Kristina Lerman, and Aram Galstyan. 2021. A survey on bias and fairness in machine learning. ACM computing surveys (CSUR) 54, 6 (2021), 1–35.
  • Moore (2012) Shelley C Moore. 2012. Digital Footprints on the Internet. International Journal of Childbirth Education 27, 3 (2012).
  • Ojeda-Ramirez et al. (2023) Santiago Ojeda-Ramirez, Jennifer Tsan, Donna Eatinger, Sharin Jacob, Dana Saito-Stehberger, Diana Franklin, and Mark Warschauer. 2023. Describing Elementary Students’ Spheres of Influence in Scratch’About Me’Projects. In Proceedings of the 54th ACM Technical Symposium on Computer Science Education V. 1. 333–339.
  • Petelka et al. (2022) Justin Petelka, Megan Finn, Franziska Roesner, and Katie Shilton. 2022. Principles matter: integrating an ethics intervention into a computer security course. In Proceedings of the 53rd ACM Technical Symposium on Computer Science Education-Volume 1. 474–480.
  • Romero et al. (2018) E Romero, JS Artal-Sevil, JM Mir, and JM Artacho. 2018. Improving Learning through G Suite for Education. Use of ‘Google Universe’Apps in the Classroom. In INTED2018 Proceedings. IATED, 7719–7728.
  • Schiano et al. (2002) Diane J Schiano, Coreena P Chen, Ellen Isaacs, Jeremy Ginsberg, Unnur Gretarsdottir, and Megan Huddleston. 2002. Teen use of messaging media. In CHI’02 extended abstracts on Human factors in computing systems. 594–595.
  • Stevens et al. (2022) Taylor Stevens, Olga Gkountouna, and Myeong Lee. 2022. Exploring Secondary Teachers’ Needs and Values in Culturally Responsive Teaching. In Companion Publication of the 2022 Conference on Computer Supported Cooperative Work and Social Computing. 140–144.
  • Wang et al. (2023) Wei Wang, Kathy B Ewoldt, Mimi Xie, Alberto M Mestas-Nuñez, Sean Soderman, and Jeffrey Wang. 2023. Virtual Summer Camp for High School Students with Disabilities-An Experience Report. In Proceedings of the 54th ACM Technical Symposium on Computer Science Education V. 1. 458–464.
  • Webb and Gonzales (2018) Alla Webb and Ray Gonzales. 2018. Striving for excellence in introductory Computer Science courses using culturally responsive teaching (CRT). In Proceedings of the 49th ACM Technical Symposium on Computer Science Education. 408–409.
  • Williams et al. (2017) Andrew B Williams, Kathleen Baert, and Adrianna Williams. 2017. Culturally responsive social robotics instruction for middle school girls. In Proceedings of the Companion of the 2017 ACM/IEEE International Conference on Human-Robot Interaction. 323–324.
  • Wu et al. (2019) Liang Wu, Fred Morstatter, Kathleen M Carley, and Huan Liu. 2019. Misinformation in social media: definition, manipulation, and detection. ACM SIGKDD explorations newsletter 21, 2 (2019), 80–90.
  • Yardi et al. (2008) Sarita Yardi, Pamela Krolikowski, Taneshia Marshall, and Amy Bruckman. 2008. An HCI approach to computing in the real world. Journal on Educational Resources in Computing (JERIC) 8, 3 (2008), 1–20.