skip to main content
10.1145/3434780.3436637acmotherconferencesArticle/Chapter ViewAbstractPublication PagesteemConference Proceedingsconference-collections
research-article

Seven principles to foster privacy and security in educational tools: Local Educational Data Analytics

Published:22 January 2021Publication History

ABSTRACT

The New Learning Context (NCA for its initials in Spanish, Nuevo Contexto de Aprendizaje) is the new pedagogical framework that is being designed and implemented at the La Salle Institutions since 2017. The main objective is to deploy the pedagogical design across all educational centers and stages. In the context of NCA, digital technology is another pillar in the educational structure, that is integrated into classrooms as both support and the means to develop learning competences. This integration of digital educational technology in schools and universities transforms learning contexts, but it also creates risks for all educational roles in terms of privacy and data security that must be addressed. In the last 9 years, technology adoption has been accompanied by a data-driven model of analysis and decision-making, as well as a migration to cloud computing. Cloud computing adds to this technological transformation the ubiquity of data, personal data, and metadata. This implies in many cases that third parties collect and process educational data from all the actors involved in the teaching-learning process on remote servers and data centers, outside the control of educational institutions. So this latest technology adoption unfortunately also facilitates leaks, misuse, and improper access to all data collected. In this paper, we propose seven principles as a fundamental framework for NCA, that we have called Local Educational Data Analytics (LEDA). Our aim is to solve or minimize the negative impact of the use of this educational technology, which is based on cloud computing and uses integrated data analysis processes. We also propose both technological solutions that comply with the framework and lines of research that will be incorporated into the NCA pilot tests during the academic year 20-21.

References

  1. Daniel Amo, Marc Alier, Maria José Casan, and M.J. Casañ. 2018. The student's progress snapshot a hybrid text and visual learning analytics dashboard. Int. J. Eng. Educ.34, Decision Making in Engineering Education using Learning Analytics (2018), 990–1000. Retrieved from https://www.ijee.ie/latestissues/Vol34-3/14_ijee3613.pdfGoogle ScholarGoogle Scholar
  2. Daniel Amo, Marc Alier, Francisco José García-Peñalvo, David Fonseca, and María José Casañ. 2020. Protected Users: A Moodle Plugin To Improve Confidentiality and Privacy Support through User Aliases. Sustainability 12, 6 (2020), 2548. DOI:https://doi.org/10.3390/su12062548Google ScholarGoogle ScholarCross RefCross Ref
  3. Daniel Amo, Marc Alier, Francisco José García-Peñalvo, David Fonseca, and María José Casany. 2019. GDPR security and confidentiality compliance in LMS’ a problem analysis and engineering solution proposal. In ACM International Conference Proceeding Series, ACM, New York, NY, USA, 253–259. DOI:https://doi.org/10.1145/3362789.3362823Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Daniel Amo, David Fonseca, Marc Alier, Francisco José García-Peñalvo, and María José Casañ. 2019. Personal data broker instead of blockchain for students’ data privacy assurance. Switzerland: Springer Nature. DOI:https://doi.org/10.1007/978-3-030-16187-3_36Google ScholarGoogle Scholar
  5. D. Amo Filva. 2020. Privacidad y gestión de la identidad en procesos de analítica de aprendizaje. Programa de Doctorado Formación en la Sociedad del Conocimiento. Retrieved from https://repositorio.grial.eu/bitstream/grial/1951/1/TesisDanielAmoFilva-LearningAnalytics-Blockchain_v43.pdfGoogle ScholarGoogle Scholar
  6. Louise Amoore. 2020. Why “Ditch the algorithm” is the future of political protest. The Guardian. Retrieved September 16, 2020 from https://www.theguardian.com/commentisfree/2020/aug/19/ditch-the-algorithm-generation-students-a-levels-politicsGoogle ScholarGoogle Scholar
  7. La Salle Distrito ARLEP. 2018. NCA, otra manera de hacer escuela. La Salle ARLEP, Madrid.Google ScholarGoogle Scholar
  8. La Salle Distrito ARLEP. 2020. NCA, Nuevo Contexto de Aprendizaje (La Salle A ed.). La Salle ARLEP, Madrid.Google ScholarGoogle Scholar
  9. Boletín Oficial del Estado. 2018. LOPDGDD BOE-A-2018-16673. Boletín Oficial del Estado, núm. 294, 70. Retrieved September 6, 2019 from https://www.boe.es/buscar/doc.php?id=BOE-A-2018-16673Google ScholarGoogle Scholar
  10. Chetan Bulla, Basavaraj Hunshal, and Sankalp Mehta. 2016. Adoption of Cloud Computing in Education System: A Survey. Int. J. Eng. Sci.6375, (2016). DOI:https://doi.org/10.4010/2016.1532Google ScholarGoogle Scholar
  11. John P. Carlin and Garrett M. Graff. 2018. Dawn of the code war: America's battle against Russia, China, and the rising global cyber threat. PublicAffairs, 480. Retrieved September 16, 2020 from https://www.publicaffairsbooks.com/titles/john-p-carlin/dawn-of-the-code-war/9781541773813/Google ScholarGoogle Scholar
  12. EP and the CEU. Recital 60 - Information obligation | General Data Protection Regulation (GDPR). Retrieved September 16, 2020 from https://gdpr-info.eu/recitals/no-60/Google ScholarGoogle Scholar
  13. Hendrik Drachsler. 2016. Ethics & Privacy in Learning Analytics - a DELICATE issue - LACE - Learning Analytics Community Exchange. LACE. Retrieved September 20, 2017 from http://www.laceproject.eu/blog/ethics-privacy-in-learning-analytics-a-delicate-issue/Google ScholarGoogle Scholar
  14. Hendrik Drachsler and Wolfgang Greller. 2016. Privacy and analytics: it's a DELICATE issue a checklist for trusted learning analytics. In Proceedings of the sixth international conference on learning analytics & knowledge, ACM Press, New York, New York, USA, 89–98. DOI:https://doi.org/10.1145/2883851.2883893Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. A. L. Dyckhoff, D. Zielke, M. A. Chatti, and U. Schroeder. 2011. eLAT: An exploratory learning analytics tool for reflection and iterative improvement of technology enhanced learning. In EDM 2011 - Proceedings of the 4th International Conference on Educational Data Mining, 355–356.Google ScholarGoogle Scholar
  16. EP and the CEU. 2016. Regulation (EU) 2016/679 GDPR. Official Journal of the European Union, 88. Retrieved June 27, 2019 from https://eur-lex.europa.eu/legal-content/en/TXT/?uri=CELEX%3A32016R0679Google ScholarGoogle Scholar
  17. Alicia García-Holgado and Francisco J. García-Peñalvo. 2017. Definición de ecosistemas de aprendizaje independientes de plataforma. In La innovación docente como misión del profesorado. Actas del IV Congreso Internacional sobre Aprendizaje, Innovación y Competitividad. CINAIC 2017 (4-6 de Octubre de 2017, Zaragoza, España), M. L. Sein-Echaluce Lacleta, Á. Fidalgo-Blanco and F. J. García-Peñalvo (eds.). Zaragoza, España: Servicio de Publicaciones Universidad de Zaragoza, Zaragoza, España: Servicio de Publicaciones Universidad de Zaragoza., 668–673. DOI:https://doi.org/10.26754/cinaic.2017.000001_143Google ScholarGoogle Scholar
  18. Francisco José García-Peñalvo, Ángel Hernández-García, Miguel Ángel Conde, Ángel Fidalgo-Blanco, María Luisa Sein-Echaluce, Marc Alier, Faraón Llorens, and Santiago Iglesias-PRadas. 2015. Mirando hacia el futuro: Ecosistemas tecnológicos de aprendizaje basados en servicios Looking into the future: Learning services-based technological ecosystems. In La Sociedad del Aprendizaje. Actas del III Congreso Internacional sobre Aprendizaje, Innovación y Competitividad. CINAIC 2015 (14-16 de Octubre de 2015, Madrid, España), Fundación General de la Universidad Politécnica de Madrid, Madrid, Spain, 553–558.Google ScholarGoogle Scholar
  19. Paul Graßl, Hanna Schraffenberger, Frederik Zuiderveen Borgesius, and Moniek Buijzen. 2020. Dark and bright patterns in cookie consent requests.Google ScholarGoogle Scholar
  20. Eric Hughes. 1993. A cypherpunk's manifesto.Google ScholarGoogle Scholar
  21. Jose Octavio Islas-Carmona. 2008. El prosumidor. El actor comunicativo de la sociedad de la ubicuidad. Palabra Clave 11, 1 (2008), 29–39.Google ScholarGoogle Scholar
  22. Kahoot. 2020. Kahoot! Learning Games & Make Learning Awesome! 1. Retrieved September 16, 2020 from https://kahoot.com/Google ScholarGoogle Scholar
  23. Anja Lambrecht and Catherine Tucker. 2019. Algorithmic bias? An empirical study of apparent gender-based discrimination in the display of stem career ads. Manage. Sci.65, 7 (2019), 2966–2981. DOI:https://doi.org/10.1287/mnsc.2018.3093Google ScholarGoogle Scholar
  24. Charles Lang, Leah P. Macfadyen, Sharon Slade, Paul Prinsloo, and Niall Sclater. 2018. The complexities of developing a personal code of ethics for learning analytics practitioners implications for institutions and the field. In ACM International Conference Proceeding Series, 436–440. DOI:https://doi.org/10.1145/3170358.3170396Google ScholarGoogle Scholar
  25. Charles Lang, George Siemens, Alyssa Wise, and Dragan Gasevic. 2017. Handbook of Learning Analytics. SOLAR, Society for Learning Analytics and Research. DOI:https://doi.org/10.18608/hla17Google ScholarGoogle Scholar
  26. Liza Lin. 2020. Thousands of Chinese Students’ Data Exposed on Internet. WSJ. Retrieved September 16, 2020 from https://www.wsj.com/articles/thousands-of-chinese-students-data-exposed-on-internet-11579283410Google ScholarGoogle Scholar
  27. Philip Long and George Siemens. 2011. Penetrating the Fog: Analytics in Learning and Education. EDUCAUSE Review 46, 30–32. Retrieved July 24, 2018 from https://er.educause.edu/articles/2011/9/penetrating-the-fog-analytics-in-learning-and-educationGoogle ScholarGoogle Scholar
  28. Deborah Lupton and Ben Williamson. 2017. The datafied child: The dataveillance of children and implications for their rights. New Media Soc.19, 5 (May 2017), 780–794. DOI:https://doi.org/10.1177/1461444816686328Google ScholarGoogle ScholarCross RefCross Ref
  29. Dominique Machuletz and Rainer Böhme. 2020. Multiple Purposes, Multiple Problems: A User Study of Consent Dialogs after GDPR. Proc. Priv. Enhancing Technol.2020, 2 (2020), 481–498. DOI:https://doi.org/10.2478/popets-2020-0037Google ScholarGoogle ScholarCross RefCross Ref
  30. Douglas MacMillan and Nick Anderson. 2019. College admissions officers rank prospective students based on web browsing, family finances and other data. The Washington Post. Retrieved September 16, 2020 from https://www.washingtonpost.com/business/2019/10/14/colleges-quietly-rank-prospective-students-based-their-personal-data/Google ScholarGoogle Scholar
  31. Robin Mayes, Gloria Natividad, and J. Spector. 2015. Challenges for Educational Technologists in the 21st Century. Educ. Sci.5, 3 (2015), 221–237. DOI:https://doi.org/10.3390/educsci5030221Google ScholarGoogle ScholarCross RefCross Ref
  32. Joan Navarro, Agustín Zaballos, David Fonseca, and Ricardo Torres-Kompen. 2019. Master as a Service: A Multidisciplinary Approach to Big Data Teaching. In Proceedings of the Seventh International Conference on Technological Ecosystems for Enhancing Multiculturality (TEEM’19), Association for Computing Machinery, New York, NY, USA, 534–538. DOI:https://doi.org/10.1145/3362789.3362841Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. NYOB. 2020. My Privacy is None of Your Business. Retrieved September 16, 2020 from https://noyb.eu/enGoogle ScholarGoogle Scholar
  34. Malcolm Owen. 2019. Facial recognition bolstered by mass database scraping, but not from Apple. Appleinsider. Retrieved September 16, 2020 from https://appleinsider.com/articles/19/07/13/facial-recognition-bolstered-by-mass-database-scraping-but-not-from-appleGoogle ScholarGoogle Scholar
  35. Abelardo Pardo and George Siemens. 2014. Ethical and privacy principles for learning analytics. Br. J. Educ. Technol.45, 3 (May 2014), 438–450. DOI:https://doi.org/10.1111/bjet.12152Google ScholarGoogle ScholarCross RefCross Ref
  36. Andrés Pedreño and Luis Moreno. 2020. Europa frente a EE.UU. y China. Prevenir el declive en la era de la inteligencia artificial. Retrieved September 16, 2020 from https://www.prevenireldeclive.com/Google ScholarGoogle Scholar
  37. Karma Peiró. 2019. És possible acabar amb els biaixos dels algorismes? (1a part). karmapeiro.com. Retrieved September 16, 2020 from https://www.karmapeiro.com/2019/06/17/es-possible-acabar-amb-els-biaixos-dels-algoritmes-1a-part/Google ScholarGoogle Scholar
  38. Karma Peiró. 2020. ADA en acció: treball de recerca a Catalunya. In Intel·ligència artificial. Decisions automatitzades a Catalunya, Autoritat Catalana de Protecció de Dades and Generalitat de Catalunya (eds.). Autoritat Catalana de Protecció de Dades, Barcelona, 100. Retrieved from https://apdcat.gencat.cat/web/.content/04-actualitat/noticies/documents/INFORME-INTELLIGENCIA-ARTIFICIAL-FINAL-WEB-OK.pdfGoogle ScholarGoogle Scholar
  39. Patrick Petit. 2020. ‘Everywhere Surveillance’: Global Surveillance Regimes as Techno-Securitization. Sci. Cult. (Lond).29, 1 (2020), 30–56. DOI:https://doi.org/10.1080/09505431.2019.1586866Google ScholarGoogle Scholar
  40. Raluca Ada Popa, Catherine M.S. Redfield, Nickolai Zeldovich, and Hari Balakrishnan. 2012. CryptDB: Processing queries on an encrypted database. Commun. ACM 55, 9 (2012), 103–111. DOI:https://doi.org/10.1145/2330667.2330691Google ScholarGoogle ScholarDigital LibraryDigital Library
  41. Jake Satisky. 2019. A Duke study recorded thousands of students’ faces. Now they're being used all over the world. The Chronicle. Retrieved September 16, 2020 from https://www.dukechronicle.com/article/2019/06/duke-university-facial-recognition-data-set-study-surveillance-video-students-china-uyghurGoogle ScholarGoogle Scholar
  42. Jeremie Seanosky, Daniel Jacques, Vive Kumar, and Kinshuk. 2016. Security and privacy in bigdata learning analytics: An affordable and modular solution. In Smart Innovation, Systems and Technologies, Springer Science and Business Media Deutschland GmbH, 43–55. DOI:https://doi.org/10.1007/978-3-319-30348-2_4Google ScholarGoogle Scholar
  43. Showbie Inc. 2020. Home - Socrative. Retrieved September 16, 2020 from https://www.socrative.com/Google ScholarGoogle Scholar
  44. George Siemens and Ryan S J d Baker. 2012. Learning analytics and educational data mining: towards communication and collaboration. In Proceedings of the 2nd international conference on learning analytics and knowledge, 252–254.Google ScholarGoogle ScholarDigital LibraryDigital Library
  45. Sharon Slade and Paul Prinsloo. 2013. Learning Analytics: Ethical Issues and Dilemmas. Am. Behav. Sci.57, 10 (2013), 1510–1529. DOI:https://doi.org/10.1177/0002764213479366Google ScholarGoogle ScholarCross RefCross Ref
  46. Eduard de Torres Gómez, Daniel Amo, Oriol Pando Bigas, Joan Navarro, and Xavi Canaleta. 2020. Diseño de un conector para Moodle para analizar el proceso de aprendizaje de tecnologías de acceso a servicios web. Actas las Jornadas sobre Enseñanza Univ. la Informática 5, 0 (2020). Retrieved from http://www.aenui.net/ojs/index.php?journal=actas_jenui&page=article&op=view&path%5B%5D=566Google ScholarGoogle Scholar
  47. Yi-Shan Tsai, Pedro Manuel Moreno-Marcos, Kairit Tammets, Kaire Kollom, and Dragan Gašević. 2018. SHEILA policy framework: informing institutional strategies and policy processes of learning analytics. In Proceedings of the 8th International Conference on Learning Analytics and Knowledge - LAK ’18, ACM Press, New York, New York, USA, 320–329. DOI:https://doi.org/10.1145/3170358.3170367Google ScholarGoogle ScholarDigital LibraryDigital Library
  48. Martin A. Weiss and Kristin Archick. 2016. U.S.-EU data privacy: From safe harbor to privacy shield. The European Union: Challenges and Prospects, 113–135.Google ScholarGoogle Scholar
  49. Ben Williamson. 2017. Decoding ClassDojo: psycho-policy, social-emotional learning and persuasive educational technologies. Learn. Media Technol.42, 4 (2017), 440–453. DOI:https://doi.org/10.1080/17439884.2017.1278020Google ScholarGoogle ScholarCross RefCross Ref
  50. Ben Williamson. 2017. Big data in education: The digital future of learning, policy and practice. SAGE Publications Ltd, London, UK.Google ScholarGoogle Scholar
  51. Y Combinator. Imagine K12. Retrieved September 16, 2020 from http://www.imaginek12.com/Google ScholarGoogle Scholar
  52. Viktoriia Zagitova and Alisa N Bokulich. 2019. Gender Biased Algorithms: Word Embedding Models’ impact on Gender Equality. (2019).Google ScholarGoogle Scholar
  53. Wenting Zheng, Ankur Dave, Jethro G. Beekman, Raluca Ada Popa, Joseph E. Gonzalez, and Ion Stoica. 2017. Opaque: An oblivious and encrypted distributed analytics platform. Proceedings of the 14th USENIX Symposium on Networked Systems Design and Implementation, NSDI 2017, 283–298. Retrieved September 16, 2020 from https://www.usenix.org/conference/nsdi17/technical-sessions/presentation/zhengGoogle ScholarGoogle Scholar
  54. We have released an open source OpenPGP library - ProtonMail Blog. Retrieved September 16, 2020 from https://protonmail.com/blog/openpgpjs-3-release/Google ScholarGoogle Scholar
  55. CryptPad Analytics & Privacy - What we can't know, what we must know, what we want to know | CryptPad Blog. Retrieved September 16, 2020 from https://blog.cryptpad.fr/2017/07/07/cryptpad-analytics-what-we-cant-know-what-we-must-know-what-we-want-to-know/Google ScholarGoogle Scholar
  56. Plickers. Retrieved September 16, 2020 from https://get.plickers.com/Google ScholarGoogle Scholar
  57. Ricardo Torres Kompen, Palitha Edirisingha, Xavier Canaleta, Maria Alsina, and Josep Maria Monguet. 2019. Personal learning Environments based on Web 2.0 services in higher education. Telemat. Informatics 38, (2019), 194–206. DOI:https://doi.org/https://doi.org/10.1016/j.tele.2018.10.003Google ScholarGoogle Scholar
  58. Eduliticas. Retrieved September 16, 2020 from https://eduliticas.com/Google ScholarGoogle Scholar
  1. Seven principles to foster privacy and security in educational tools: Local Educational Data Analytics

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      TEEM'20: Eighth International Conference on Technological Ecosystems for Enhancing Multiculturality
      October 2020
      1084 pages
      ISBN:9781450388504
      DOI:10.1145/3434780

      Copyright © 2020 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 22 January 2021

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
      • Research
      • Refereed limited

      Acceptance Rates

      Overall Acceptance Rate496of705submissions,70%

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    HTML Format

    View this article in HTML Format .

    View HTML Format