SlideShare una empresa de Scribd logo
1 de 31
Researching Data Privacy
Models in eLearning
Malinka Ivanova, Technical University of Sofia
Gabriela Grosseck, West University of Timisoara
Carmen Holotescu, University Politehnica Timisoara
ITHET 2015, IEETeL2015, 11-13 June, 2015, Caparica, Lisbon, Portugal
Aim
To develop a model of students’ data privacy
supporting educators in educational settings
and not harming the students’ privacy
interests
Introduction
“e” world
Business
Finance
Health
Government
Justice
Society
Learning
collection of a
vast amount of
private data
Introduction
Registration
personal data:
full name
address
phone number
gender
ages
email address
Profile
Background
Preferences
learning progress
Tracking mechanisms
Adaptive technologies
Assistive technologies
Social networking in
education
Learning analytics
eLearning
Questions
• What kind of privacy data is enough for educators to manage a
successful learning process?
• What kind of data the students are predisposed to share in order to
successfully accomplish their learning activities?
Privacy aspects in eLearning
Privacy aspects in
eLearning
Data privacy to
protect learners
Data privacy to improve
learning
Privacy in health care and medicine
• Electronic health records - information is used for:
• diagnosis and treatment
• for improvement the existing healthcare system
• for development of healthcare policy
• for research in medical science
• This information is available for insurance companies, payment offices in
medical organizations, for the purposes of several government initiatives,
for statistical institutions
• The risks for patients:
• from an internal agent who does not possess such privileges or from an external
agent who steals information from the information system
• from an internal agent with privileges to process such data (Appari, Johnson, 2010)
Privacy in health care and medicine
• Security of data privacy could be achieved after applying a set of
actions:
• information systems security
• public policy
• intra- and inter-organizational productivity and quality
(Popoiu, Grosseck, Holotescu, 2012)
Privacy in Ecommerce
• Ecommerce activities:
• Administration
• Legislation for intellectual property protection
• Confidentiality
• Safety
• All these activities require user personal data that is stored in databases on
web servers
• Private information is collected automatically exploring the customer
preferences
• Information is sold to commerce and advertising companies
• Customers are in scope of spam and malware activities, hack and fishing
attacks (A. Cavoukian)
Privacy in Ecommerce
• From the side of selling and business companies, personal data can be protected
through combination of security actions:
• availability of policy about collection and usage of personal data
• collection and storage just of needed data
• passwords protection of business computers
• firewall installation
• restriction access to private data to authorized employees
• sending advertising emails to customers after permission to contact them
• using of privacy seal program
• use of secure servers and SSL encrypting technology
• securing of hosting services (e-Business Toolkit, 2013)
• Customer:
• authorization, authentication, secure transactions
• not just technical solutions, but also social, organizational, regulatory, economical (Ackerman,
Davis), and educational approaches
Privacy in eGovernment
• Steps for securing eGovernment systems:
• development of policy strategy
• realization of secure components and systems
• institutional supervision of security
• building a knowledge base “Privacy by Design”
• applying anonymization techniques for minimal data usage
• using of technical and legal approaches to avoid privacy risks when re-
identification of previously anonymized data is performed
• achievement of interoperability of different security tools (Jacobi, Jensen, Kool,
Munnichs, Weber, 2013)
Privacy
• There are a wide variety of models proposing solutions for protection
of private data and combining components of different measures and
actions
• It allows usage just of general data, hiding unnecessary information,
reaching pseudonymity or full anonymity
Measures to
protect users’
privacy
Data privacy
Economic
measures
Social measures
Legal measures
Institutional
measures
Technical
measures
Operational
measures
Privacy as an economic good, markets for
private data
Collecting, storing and using just needed data,
anonymity, social engineering
Legal rules, norms, regulations at national,
European and international level
Legal rules, policy within the framework of
companies, organizations
Information system, server security, restricted
access, secure transactions
Suitable combination of different measures
Educational
measures
Educate to share just needed data, other to
keep private
Privacy in eLearning
Privacy aspects
in eLearning
Data privacy
to protect
learners
Data privacy to
improve
learning
Learner keeps
information
private
Third party keeps
private data of
others
Privacy in eLearning
• Privacy risks
• use of unsecure TCP/IP protocols
• use of higher level of protocols like HTTP, SMTP, POP3, NNTP, browser’s
chattering, existing of invisible hyperlinks, cookies, implementation of
browsers (Working document of EC)
• email communication mechanisms and web surfing process
• privacy violations in organized Massive Open Online Courses (MOOCs)
initiatives where the enrolled students are subjects to a mass data collection
• online applications and services, communications platforms and business
models in context of cloud computing, search engines, social networks,
mobile Internet (Mendel, Puddephatt, Wagner, Hawtin and Torres, 2012)
Privacy in eLearning
• The violations:
• unauthorized access to data, stored in records with learner history
• unappropriated use of stored students’ generated content on institutional
servers
• usage of antivirus program with possibility to collect students’ data (Weippl and
Ebner, 2008)
• Web 2.0 software, placed on different servers in different countries
• records of students enrolled in MOOCs (Kolowichhttp,2014)
Privacy in eLearning
• Solutions
• eLearning environment to allow:
• pseudonymity
• anonymity
• information sharing based on trust
• giving cues with information about the actor role in a given context
• allowing cues with verbal and non-verbal information
• system has to give signal when a user much information shares
• to announce the right current author of the information
• system should educate in privacy
• bad behavior of students should be punished (Anwar, Greer, and Brooks, 2006)
Privacy in eLearning
• Collaborative and privacy-aware eLearning platform BluES is specially
developed to recognize the privacy issues (Borcea-Pfitzmann, Liesebach and
Pfitzmann, 2010)
• it guarantees private data to be processed from services in a minimal way
• it keeps transactions with their data, allowing transparency
Privacy for learning improvement
• All examples found in scientific papers - treat the role of anonymity to
stimulate and motivate learning
• Anonymity possesses disadvantages – will not be discussed here
• In the following learning scenarios: peer-to-peer learning, blended
learning, group and collaborative learning anonymity is an important
factor for learning
Survey and Results
• The survey is designed with two goals:
• to understand the students’ opinion whether their privacy is violated in a
learning process
• the main factors that define privacy and successful learning to be extracted
Survey and Results
• The questions are grouped in four categories:
(1) use of educational software (including social networks for
educational purposes) and sharing of private data
(2) what private data an educator should know to manage a successful
learning process
(3) the role of intelligent technologies in learning process and their
relationship with privacy
(4) possibilities for students to decide what kind of private data to
share
Survey and Results
Students’ predisposition to share private data in educational software
Survey and Results
Students’ predisposition to share educational background
Survey and Results
Students’ predisposition to give information about learning preferences
Survey and Results
Students’ answers about whether intelligent technologies could support their learning
Survey and Results
Students’ answers about whether intelligent technologies violate their privacy space
Survey and Results
Students’ opinion about whether they have to possess an opportunity to decide what kind of
personal data to share for educational purposes
Survey and Results
Students’ answers about the features of educational software allowing them to choose what
kind of private data to share
Data Privacy Model in
eLearning
Privacy in eLearning
Student side
-what information
share
-what relationships
make
-how his computer /
mobile device is
protected
Third parties side
-University – keeps and shares
just needed data with students’
agreement, secure information
system and databases
-Educator – operate with minimal
personal data, knowing of learning
preferences, styles, learning
progress
-Other students – use the shared
data
-Administrator – indirect
involved, keeps private data
Educational
software
-Ensuring
pseudonymity/
anonymity
-Tools for sharing
on trust
-Options for choice
of sharing
-To educate in
privacy
-To give hint when
much data are
shared
-Password
protection
-other technical
issues
Conclusion
• Data privacy should be reached after applying a suitable combination of
measures
• The main components in the model - proper attitudes of students and third
parties to data keeping and ensuring of secure computer and information
systems
• Educational software should offer several tools in support of data sharing,
tools for using just the necessary private data, tools for privileges
protection
• In eLearning privacy the principle: sharing on trust is important for the
organization of a successful learning
• Students want to trust educators, third parties and used educational
software
• Then the educators use the students’ private data to organize a learning
process adequate to the student’s learning needs
• Thank you for your attention!
Thanks for pictures:
http://healthworkscollective.com/keithtullyy/309681/how-technology-affecting-healthcare
http://www.datadesigngroup.com/wp-content/uploads/2014/12/ecommerce.png
http://ec.europa.eu/digital-agenda/en/public-services
https://e-estonia.com/wp-content/uploads/2014/04/eHealth.jpg
http://pedemonts.com.au/service-solutions/e-commerce/
http://ucfretrolab.org/2012/09/29/anonymity-and-online-gaming/
http://www.vi.net/blog/2013/04/could-cloud-computing-become-just-computing/
http://www.truste.com/blog/

Más contenido relacionado

La actualidad más candente

Digital Citizenship: Information, Communication and Media Literacy
Digital Citizenship: Information, Communication and Media LiteracyDigital Citizenship: Information, Communication and Media Literacy
Digital Citizenship: Information, Communication and Media LiteracyIna Smith
 
Presentation eLearning and ICT4D changing realities and challenges
Presentation eLearning and ICT4D changing realities and challengesPresentation eLearning and ICT4D changing realities and challenges
Presentation eLearning and ICT4D changing realities and challengesInge de Waard
 
Peel school district board school policy
Peel school district board school policyPeel school district board school policy
Peel school district board school policyiamprosperous
 
Chapter123final
Chapter123finalChapter123final
Chapter123finalDelapisa18
 
ICT General Capability ACSA 1 Nov 2012
ICT General Capability ACSA 1 Nov 2012ICT General Capability ACSA 1 Nov 2012
ICT General Capability ACSA 1 Nov 2012Trudy Sweeney
 
Critical perspectives on digital scholarships
Critical perspectives on digital scholarshipsCritical perspectives on digital scholarships
Critical perspectives on digital scholarshipsCarolynn Bruton
 

La actualidad más candente (7)

Digital Citizenship: Information, Communication and Media Literacy
Digital Citizenship: Information, Communication and Media LiteracyDigital Citizenship: Information, Communication and Media Literacy
Digital Citizenship: Information, Communication and Media Literacy
 
Presentation eLearning and ICT4D changing realities and challenges
Presentation eLearning and ICT4D changing realities and challengesPresentation eLearning and ICT4D changing realities and challenges
Presentation eLearning and ICT4D changing realities and challenges
 
Peel school district board school policy
Peel school district board school policyPeel school district board school policy
Peel school district board school policy
 
Accessing internet resources best practices
Accessing internet resources  best practicesAccessing internet resources  best practices
Accessing internet resources best practices
 
Chapter123final
Chapter123finalChapter123final
Chapter123final
 
ICT General Capability ACSA 1 Nov 2012
ICT General Capability ACSA 1 Nov 2012ICT General Capability ACSA 1 Nov 2012
ICT General Capability ACSA 1 Nov 2012
 
Critical perspectives on digital scholarships
Critical perspectives on digital scholarshipsCritical perspectives on digital scholarships
Critical perspectives on digital scholarships
 

Similar a Researching Data Privacy in eLearning

Aim analytics panel (2017 Fall): Privacy & ethics
Aim analytics panel (2017 Fall): Privacy & ethicsAim analytics panel (2017 Fall): Privacy & ethics
Aim analytics panel (2017 Fall): Privacy & ethicsSungjin Nam
 
144 presentation iee_tel2021
144 presentation iee_tel2021144 presentation iee_tel2021
144 presentation iee_tel2021Malinka Ivanova
 
Addressing the wicked problem of learning data privacy though principle and p...
Addressing the wicked problem of learning data privacy though principle and p...Addressing the wicked problem of learning data privacy though principle and p...
Addressing the wicked problem of learning data privacy though principle and p...Jisc
 
NAESP Conference - July 12, 2014
NAESP Conference - July 12, 2014NAESP Conference - July 12, 2014
NAESP Conference - July 12, 2014emilyensign
 
Student privacy self-management: Implications for learning analytics
Student privacy self-management: Implications for learning analyticsStudent privacy self-management: Implications for learning analytics
Student privacy self-management: Implications for learning analyticsUniversity of South Africa (Unisa)
 
e-Safety, Ofsted and the new Computing Curriculum for Governors 2014
e-Safety, Ofsted and the new Computing Curriculum for Governors 2014e-Safety, Ofsted and the new Computing Curriculum for Governors 2014
e-Safety, Ofsted and the new Computing Curriculum for Governors 2014Rebecca Avery
 
Ethics & Privacy issues in the context of Learning Analytics - Alan Berg, Mar...
Ethics & Privacy issues in the context of Learning Analytics - Alan Berg, Mar...Ethics & Privacy issues in the context of Learning Analytics - Alan Berg, Mar...
Ethics & Privacy issues in the context of Learning Analytics - Alan Berg, Mar...SURF Events
 
Data security issues, ethical issues and challenges to privacy in knowledge-i...
Data security issues, ethical issues and challenges to privacy in knowledge-i...Data security issues, ethical issues and challenges to privacy in knowledge-i...
Data security issues, ethical issues and challenges to privacy in knowledge-i...Tore Hoel
 
DWEL - Module 5 final.pptx
DWEL - Module 5 final.pptxDWEL - Module 5 final.pptx
DWEL - Module 5 final.pptxcaniceconsulting
 
005. Ethics, Privacy and Security
005. Ethics, Privacy and Security005. Ethics, Privacy and Security
005. Ethics, Privacy and SecurityArianto Muditomo
 
Keynote e-Safety, Ofsted and the new computing Curriculum
Keynote e-Safety, Ofsted and the new computing Curriculum Keynote e-Safety, Ofsted and the new computing Curriculum
Keynote e-Safety, Ofsted and the new computing Curriculum Rebecca Avery
 
Access denied? Managing access to the Web within the NHS in England: technolo...
Access denied? Managing access to the Web within the NHS in England: technolo...Access denied? Managing access to the Web within the NHS in England: technolo...
Access denied? Managing access to the Web within the NHS in England: technolo...Catherine Ebenezer
 
Education Privacy
Education Privacy Education Privacy
Education Privacy emilyensign
 
On the horizon for learning analytics
On the horizon for learning analyticsOn the horizon for learning analytics
On the horizon for learning analyticsRebecca Ferguson
 
Internet privacy ethics and online security
Internet privacy ethics and online securityInternet privacy ethics and online security
Internet privacy ethics and online securityPaul Berryman
 
SHEILA-CRLI seminar
SHEILA-CRLI seminarSHEILA-CRLI seminar
SHEILA-CRLI seminarYi-Shan Tsai
 

Similar a Researching Data Privacy in eLearning (20)

Aim analytics panel (2017 Fall): Privacy & ethics
Aim analytics panel (2017 Fall): Privacy & ethicsAim analytics panel (2017 Fall): Privacy & ethics
Aim analytics panel (2017 Fall): Privacy & ethics
 
144 presentation iee_tel2021
144 presentation iee_tel2021144 presentation iee_tel2021
144 presentation iee_tel2021
 
Addressing the wicked problem of learning data privacy though principle and p...
Addressing the wicked problem of learning data privacy though principle and p...Addressing the wicked problem of learning data privacy though principle and p...
Addressing the wicked problem of learning data privacy though principle and p...
 
NAESP Conference - July 12, 2014
NAESP Conference - July 12, 2014NAESP Conference - July 12, 2014
NAESP Conference - July 12, 2014
 
Student privacy self-management: Implications for learning analytics
Student privacy self-management: Implications for learning analyticsStudent privacy self-management: Implications for learning analytics
Student privacy self-management: Implications for learning analytics
 
e-Safety, Ofsted and the new Computing Curriculum for Governors 2014
e-Safety, Ofsted and the new Computing Curriculum for Governors 2014e-Safety, Ofsted and the new Computing Curriculum for Governors 2014
e-Safety, Ofsted and the new Computing Curriculum for Governors 2014
 
Ethics & Privacy issues in the context of Learning Analytics - Alan Berg, Mar...
Ethics & Privacy issues in the context of Learning Analytics - Alan Berg, Mar...Ethics & Privacy issues in the context of Learning Analytics - Alan Berg, Mar...
Ethics & Privacy issues in the context of Learning Analytics - Alan Berg, Mar...
 
Data security issues, ethical issues and challenges to privacy in knowledge-i...
Data security issues, ethical issues and challenges to privacy in knowledge-i...Data security issues, ethical issues and challenges to privacy in knowledge-i...
Data security issues, ethical issues and challenges to privacy in knowledge-i...
 
DWEL - Module 5 final.pptx
DWEL - Module 5 final.pptxDWEL - Module 5 final.pptx
DWEL - Module 5 final.pptx
 
Privacy, Encryption, and Anonymity in the Civil Legal Aid Context
Privacy, Encryption, and Anonymity in the Civil Legal Aid ContextPrivacy, Encryption, and Anonymity in the Civil Legal Aid Context
Privacy, Encryption, and Anonymity in the Civil Legal Aid Context
 
005. Ethics, Privacy and Security
005. Ethics, Privacy and Security005. Ethics, Privacy and Security
005. Ethics, Privacy and Security
 
Keynote e-Safety, Ofsted and the new computing Curriculum
Keynote e-Safety, Ofsted and the new computing Curriculum Keynote e-Safety, Ofsted and the new computing Curriculum
Keynote e-Safety, Ofsted and the new computing Curriculum
 
Access denied? Managing access to the Web within the NHS in England: technolo...
Access denied? Managing access to the Web within the NHS in England: technolo...Access denied? Managing access to the Web within the NHS in England: technolo...
Access denied? Managing access to the Web within the NHS in England: technolo...
 
Education Privacy
Education Privacy Education Privacy
Education Privacy
 
On the horizon for learning analytics
On the horizon for learning analyticsOn the horizon for learning analytics
On the horizon for learning analytics
 
9 mahmood shah risk 4 3
9 mahmood shah risk 4 39 mahmood shah risk 4 3
9 mahmood shah risk 4 3
 
Learning Analytics
Learning AnalyticsLearning Analytics
Learning Analytics
 
Internet privacy ethics and online security
Internet privacy ethics and online securityInternet privacy ethics and online security
Internet privacy ethics and online security
 
SHEILA-CRLI seminar
SHEILA-CRLI seminarSHEILA-CRLI seminar
SHEILA-CRLI seminar
 
Ba education
Ba educationBa education
Ba education
 

Más de Malinka Ivanova

Relationship between Students’ Creative Skill and Learning Performance
Relationship between Students’ Creative Skill and Learning PerformanceRelationship between Students’ Creative Skill and Learning Performance
Relationship between Students’ Creative Skill and Learning PerformanceMalinka Ivanova
 
Analysis and Modelling of CMOS Gm-C Filters through Machine Learning
Analysis and Modelling of CMOS Gm-C Filters through Machine LearningAnalysis and Modelling of CMOS Gm-C Filters through Machine Learning
Analysis and Modelling of CMOS Gm-C Filters through Machine LearningMalinka Ivanova
 
Cooling Water Control System Fuzzy Logic
Cooling Water Control System Fuzzy LogicCooling Water Control System Fuzzy Logic
Cooling Water Control System Fuzzy LogicMalinka Ivanova
 
Presentation Learning Analytics Open Educational Resources
Presentation Learning Analytics Open Educational ResourcesPresentation Learning Analytics Open Educational Resources
Presentation Learning Analytics Open Educational ResourcesMalinka Ivanova
 
Evaluation of e-assessment
Evaluation of e-assessmentEvaluation of e-assessment
Evaluation of e-assessmentMalinka Ivanova
 
Predictive Modeling Concerning Mobile Learning Advance
Predictive Modeling Concerning Mobile Learning AdvancePredictive Modeling Concerning Mobile Learning Advance
Predictive Modeling Concerning Mobile Learning AdvanceMalinka Ivanova
 
Fuzzy Set Theory and Fuzzy Logic for Activities Automation in Engineering Edu...
Fuzzy Set Theory and Fuzzy Logic for Activities Automation in Engineering Edu...Fuzzy Set Theory and Fuzzy Logic for Activities Automation in Engineering Edu...
Fuzzy Set Theory and Fuzzy Logic for Activities Automation in Engineering Edu...Malinka Ivanova
 
Development of the Personalized Recommender System COsys for Career Orientation
Development of the Personalized Recommender System COsys for Career OrientationDevelopment of the Personalized Recommender System COsys for Career Orientation
Development of the Personalized Recommender System COsys for Career OrientationMalinka Ivanova
 
CASE-BASED WORKFLOW MODELING IN SUPPORT OF AUTOMATION THE TEACHERS’ PERSONAL ...
CASE-BASED WORKFLOW MODELING IN SUPPORT OF AUTOMATION THE TEACHERS’ PERSONAL ...CASE-BASED WORKFLOW MODELING IN SUPPORT OF AUTOMATION THE TEACHERS’ PERSONAL ...
CASE-BASED WORKFLOW MODELING IN SUPPORT OF AUTOMATION THE TEACHERS’ PERSONAL ...Malinka Ivanova
 
INTELLIGENT TUTORING ININFORMAL SETTINGS:EMPIRICAL STUDY
INTELLIGENT TUTORING ININFORMAL SETTINGS:EMPIRICAL STUDYINTELLIGENT TUTORING ININFORMAL SETTINGS:EMPIRICAL STUDY
INTELLIGENT TUTORING ININFORMAL SETTINGS:EMPIRICAL STUDYMalinka Ivanova
 
EXPLORATION ON THE AFFECTIVE STATES AND LEARNING DURING AN AUGMENTED REALITY ...
EXPLORATION ON THE AFFECTIVE STATES AND LEARNING DURING AN AUGMENTED REALITY ...EXPLORATION ON THE AFFECTIVE STATES AND LEARNING DURING AN AUGMENTED REALITY ...
EXPLORATION ON THE AFFECTIVE STATES AND LEARNING DURING AN AUGMENTED REALITY ...Malinka Ivanova
 
Analysis of Personal Learning Networks in Support of Teachers Presence Optimi...
Analysis of Personal Learning Networks in Support of Teachers Presence Optimi...Analysis of Personal Learning Networks in Support of Teachers Presence Optimi...
Analysis of Personal Learning Networks in Support of Teachers Presence Optimi...Malinka Ivanova
 
Actualization of a Course Library through Influential Twitter Knowledge
Actualization of a Course Library through Influential Twitter KnowledgeActualization of a Course Library through Influential Twitter Knowledge
Actualization of a Course Library through Influential Twitter KnowledgeMalinka Ivanova
 
Дългата опашка и електронното обучение
Дългата опашка и електронното обучениеДългата опашка и електронното обучение
Дългата опашка и електронното обучениеMalinka Ivanova
 
Researching Emerging Technologies and Environments in Support of New Learni...
Researching Emerging Technologies  and Environments  in Support of New Learni...Researching Emerging Technologies  and Environments  in Support of New Learni...
Researching Emerging Technologies and Environments in Support of New Learni...Malinka Ivanova
 
Competences Mapping for Personal Learning Environment Management
Competences Mapping for Personal Learning Environment ManagementCompetences Mapping for Personal Learning Environment Management
Competences Mapping for Personal Learning Environment ManagementMalinka Ivanova
 
Google Wave Platform: Exploring the Settings for Personalized Learning
Google Wave Platform: Exploring the Settings for Personalized LearningGoogle Wave Platform: Exploring the Settings for Personalized Learning
Google Wave Platform: Exploring the Settings for Personalized LearningMalinka Ivanova
 
Facilitating Active Learning Utilizing the Online Environment of Nfomedia
Facilitating Active Learning Utilizing the Online Environment of NfomediaFacilitating Active Learning Utilizing the Online Environment of Nfomedia
Facilitating Active Learning Utilizing the Online Environment of NfomediaMalinka Ivanova
 
Defining Ontology Specification for Personal Learning Environment Forming
Defining Ontology Specification for Personal Learning Environment FormingDefining Ontology Specification for Personal Learning Environment Forming
Defining Ontology Specification for Personal Learning Environment FormingMalinka Ivanova
 

Más de Malinka Ivanova (20)

Imcl2021 paper1
Imcl2021 paper1Imcl2021 paper1
Imcl2021 paper1
 
Relationship between Students’ Creative Skill and Learning Performance
Relationship between Students’ Creative Skill and Learning PerformanceRelationship between Students’ Creative Skill and Learning Performance
Relationship between Students’ Creative Skill and Learning Performance
 
Analysis and Modelling of CMOS Gm-C Filters through Machine Learning
Analysis and Modelling of CMOS Gm-C Filters through Machine LearningAnalysis and Modelling of CMOS Gm-C Filters through Machine Learning
Analysis and Modelling of CMOS Gm-C Filters through Machine Learning
 
Cooling Water Control System Fuzzy Logic
Cooling Water Control System Fuzzy LogicCooling Water Control System Fuzzy Logic
Cooling Water Control System Fuzzy Logic
 
Presentation Learning Analytics Open Educational Resources
Presentation Learning Analytics Open Educational ResourcesPresentation Learning Analytics Open Educational Resources
Presentation Learning Analytics Open Educational Resources
 
Evaluation of e-assessment
Evaluation of e-assessmentEvaluation of e-assessment
Evaluation of e-assessment
 
Predictive Modeling Concerning Mobile Learning Advance
Predictive Modeling Concerning Mobile Learning AdvancePredictive Modeling Concerning Mobile Learning Advance
Predictive Modeling Concerning Mobile Learning Advance
 
Fuzzy Set Theory and Fuzzy Logic for Activities Automation in Engineering Edu...
Fuzzy Set Theory and Fuzzy Logic for Activities Automation in Engineering Edu...Fuzzy Set Theory and Fuzzy Logic for Activities Automation in Engineering Edu...
Fuzzy Set Theory and Fuzzy Logic for Activities Automation in Engineering Edu...
 
Development of the Personalized Recommender System COsys for Career Orientation
Development of the Personalized Recommender System COsys for Career OrientationDevelopment of the Personalized Recommender System COsys for Career Orientation
Development of the Personalized Recommender System COsys for Career Orientation
 
CASE-BASED WORKFLOW MODELING IN SUPPORT OF AUTOMATION THE TEACHERS’ PERSONAL ...
CASE-BASED WORKFLOW MODELING IN SUPPORT OF AUTOMATION THE TEACHERS’ PERSONAL ...CASE-BASED WORKFLOW MODELING IN SUPPORT OF AUTOMATION THE TEACHERS’ PERSONAL ...
CASE-BASED WORKFLOW MODELING IN SUPPORT OF AUTOMATION THE TEACHERS’ PERSONAL ...
 
INTELLIGENT TUTORING ININFORMAL SETTINGS:EMPIRICAL STUDY
INTELLIGENT TUTORING ININFORMAL SETTINGS:EMPIRICAL STUDYINTELLIGENT TUTORING ININFORMAL SETTINGS:EMPIRICAL STUDY
INTELLIGENT TUTORING ININFORMAL SETTINGS:EMPIRICAL STUDY
 
EXPLORATION ON THE AFFECTIVE STATES AND LEARNING DURING AN AUGMENTED REALITY ...
EXPLORATION ON THE AFFECTIVE STATES AND LEARNING DURING AN AUGMENTED REALITY ...EXPLORATION ON THE AFFECTIVE STATES AND LEARNING DURING AN AUGMENTED REALITY ...
EXPLORATION ON THE AFFECTIVE STATES AND LEARNING DURING AN AUGMENTED REALITY ...
 
Analysis of Personal Learning Networks in Support of Teachers Presence Optimi...
Analysis of Personal Learning Networks in Support of Teachers Presence Optimi...Analysis of Personal Learning Networks in Support of Teachers Presence Optimi...
Analysis of Personal Learning Networks in Support of Teachers Presence Optimi...
 
Actualization of a Course Library through Influential Twitter Knowledge
Actualization of a Course Library through Influential Twitter KnowledgeActualization of a Course Library through Influential Twitter Knowledge
Actualization of a Course Library through Influential Twitter Knowledge
 
Дългата опашка и електронното обучение
Дългата опашка и електронното обучениеДългата опашка и електронното обучение
Дългата опашка и електронното обучение
 
Researching Emerging Technologies and Environments in Support of New Learni...
Researching Emerging Technologies  and Environments  in Support of New Learni...Researching Emerging Technologies  and Environments  in Support of New Learni...
Researching Emerging Technologies and Environments in Support of New Learni...
 
Competences Mapping for Personal Learning Environment Management
Competences Mapping for Personal Learning Environment ManagementCompetences Mapping for Personal Learning Environment Management
Competences Mapping for Personal Learning Environment Management
 
Google Wave Platform: Exploring the Settings for Personalized Learning
Google Wave Platform: Exploring the Settings for Personalized LearningGoogle Wave Platform: Exploring the Settings for Personalized Learning
Google Wave Platform: Exploring the Settings for Personalized Learning
 
Facilitating Active Learning Utilizing the Online Environment of Nfomedia
Facilitating Active Learning Utilizing the Online Environment of NfomediaFacilitating Active Learning Utilizing the Online Environment of Nfomedia
Facilitating Active Learning Utilizing the Online Environment of Nfomedia
 
Defining Ontology Specification for Personal Learning Environment Forming
Defining Ontology Specification for Personal Learning Environment FormingDefining Ontology Specification for Personal Learning Environment Forming
Defining Ontology Specification for Personal Learning Environment Forming
 

Último

Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingTeacherCyreneCayanan
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 

Último (20)

Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 

Researching Data Privacy in eLearning

  • 1. Researching Data Privacy Models in eLearning Malinka Ivanova, Technical University of Sofia Gabriela Grosseck, West University of Timisoara Carmen Holotescu, University Politehnica Timisoara ITHET 2015, IEETeL2015, 11-13 June, 2015, Caparica, Lisbon, Portugal
  • 2. Aim To develop a model of students’ data privacy supporting educators in educational settings and not harming the students’ privacy interests
  • 4. Introduction Registration personal data: full name address phone number gender ages email address Profile Background Preferences learning progress Tracking mechanisms Adaptive technologies Assistive technologies Social networking in education Learning analytics eLearning
  • 5. Questions • What kind of privacy data is enough for educators to manage a successful learning process? • What kind of data the students are predisposed to share in order to successfully accomplish their learning activities?
  • 6. Privacy aspects in eLearning Privacy aspects in eLearning Data privacy to protect learners Data privacy to improve learning
  • 7. Privacy in health care and medicine • Electronic health records - information is used for: • diagnosis and treatment • for improvement the existing healthcare system • for development of healthcare policy • for research in medical science • This information is available for insurance companies, payment offices in medical organizations, for the purposes of several government initiatives, for statistical institutions • The risks for patients: • from an internal agent who does not possess such privileges or from an external agent who steals information from the information system • from an internal agent with privileges to process such data (Appari, Johnson, 2010)
  • 8. Privacy in health care and medicine • Security of data privacy could be achieved after applying a set of actions: • information systems security • public policy • intra- and inter-organizational productivity and quality (Popoiu, Grosseck, Holotescu, 2012)
  • 9. Privacy in Ecommerce • Ecommerce activities: • Administration • Legislation for intellectual property protection • Confidentiality • Safety • All these activities require user personal data that is stored in databases on web servers • Private information is collected automatically exploring the customer preferences • Information is sold to commerce and advertising companies • Customers are in scope of spam and malware activities, hack and fishing attacks (A. Cavoukian)
  • 10. Privacy in Ecommerce • From the side of selling and business companies, personal data can be protected through combination of security actions: • availability of policy about collection and usage of personal data • collection and storage just of needed data • passwords protection of business computers • firewall installation • restriction access to private data to authorized employees • sending advertising emails to customers after permission to contact them • using of privacy seal program • use of secure servers and SSL encrypting technology • securing of hosting services (e-Business Toolkit, 2013) • Customer: • authorization, authentication, secure transactions • not just technical solutions, but also social, organizational, regulatory, economical (Ackerman, Davis), and educational approaches
  • 11. Privacy in eGovernment • Steps for securing eGovernment systems: • development of policy strategy • realization of secure components and systems • institutional supervision of security • building a knowledge base “Privacy by Design” • applying anonymization techniques for minimal data usage • using of technical and legal approaches to avoid privacy risks when re- identification of previously anonymized data is performed • achievement of interoperability of different security tools (Jacobi, Jensen, Kool, Munnichs, Weber, 2013)
  • 12. Privacy • There are a wide variety of models proposing solutions for protection of private data and combining components of different measures and actions • It allows usage just of general data, hiding unnecessary information, reaching pseudonymity or full anonymity
  • 13. Measures to protect users’ privacy Data privacy Economic measures Social measures Legal measures Institutional measures Technical measures Operational measures Privacy as an economic good, markets for private data Collecting, storing and using just needed data, anonymity, social engineering Legal rules, norms, regulations at national, European and international level Legal rules, policy within the framework of companies, organizations Information system, server security, restricted access, secure transactions Suitable combination of different measures Educational measures Educate to share just needed data, other to keep private
  • 14. Privacy in eLearning Privacy aspects in eLearning Data privacy to protect learners Data privacy to improve learning Learner keeps information private Third party keeps private data of others
  • 15. Privacy in eLearning • Privacy risks • use of unsecure TCP/IP protocols • use of higher level of protocols like HTTP, SMTP, POP3, NNTP, browser’s chattering, existing of invisible hyperlinks, cookies, implementation of browsers (Working document of EC) • email communication mechanisms and web surfing process • privacy violations in organized Massive Open Online Courses (MOOCs) initiatives where the enrolled students are subjects to a mass data collection • online applications and services, communications platforms and business models in context of cloud computing, search engines, social networks, mobile Internet (Mendel, Puddephatt, Wagner, Hawtin and Torres, 2012)
  • 16. Privacy in eLearning • The violations: • unauthorized access to data, stored in records with learner history • unappropriated use of stored students’ generated content on institutional servers • usage of antivirus program with possibility to collect students’ data (Weippl and Ebner, 2008) • Web 2.0 software, placed on different servers in different countries • records of students enrolled in MOOCs (Kolowichhttp,2014)
  • 17. Privacy in eLearning • Solutions • eLearning environment to allow: • pseudonymity • anonymity • information sharing based on trust • giving cues with information about the actor role in a given context • allowing cues with verbal and non-verbal information • system has to give signal when a user much information shares • to announce the right current author of the information • system should educate in privacy • bad behavior of students should be punished (Anwar, Greer, and Brooks, 2006)
  • 18. Privacy in eLearning • Collaborative and privacy-aware eLearning platform BluES is specially developed to recognize the privacy issues (Borcea-Pfitzmann, Liesebach and Pfitzmann, 2010) • it guarantees private data to be processed from services in a minimal way • it keeps transactions with their data, allowing transparency
  • 19. Privacy for learning improvement • All examples found in scientific papers - treat the role of anonymity to stimulate and motivate learning • Anonymity possesses disadvantages – will not be discussed here • In the following learning scenarios: peer-to-peer learning, blended learning, group and collaborative learning anonymity is an important factor for learning
  • 20. Survey and Results • The survey is designed with two goals: • to understand the students’ opinion whether their privacy is violated in a learning process • the main factors that define privacy and successful learning to be extracted
  • 21. Survey and Results • The questions are grouped in four categories: (1) use of educational software (including social networks for educational purposes) and sharing of private data (2) what private data an educator should know to manage a successful learning process (3) the role of intelligent technologies in learning process and their relationship with privacy (4) possibilities for students to decide what kind of private data to share
  • 22. Survey and Results Students’ predisposition to share private data in educational software
  • 23. Survey and Results Students’ predisposition to share educational background
  • 24. Survey and Results Students’ predisposition to give information about learning preferences
  • 25. Survey and Results Students’ answers about whether intelligent technologies could support their learning
  • 26. Survey and Results Students’ answers about whether intelligent technologies violate their privacy space
  • 27. Survey and Results Students’ opinion about whether they have to possess an opportunity to decide what kind of personal data to share for educational purposes
  • 28. Survey and Results Students’ answers about the features of educational software allowing them to choose what kind of private data to share
  • 29. Data Privacy Model in eLearning Privacy in eLearning Student side -what information share -what relationships make -how his computer / mobile device is protected Third parties side -University – keeps and shares just needed data with students’ agreement, secure information system and databases -Educator – operate with minimal personal data, knowing of learning preferences, styles, learning progress -Other students – use the shared data -Administrator – indirect involved, keeps private data Educational software -Ensuring pseudonymity/ anonymity -Tools for sharing on trust -Options for choice of sharing -To educate in privacy -To give hint when much data are shared -Password protection -other technical issues
  • 30. Conclusion • Data privacy should be reached after applying a suitable combination of measures • The main components in the model - proper attitudes of students and third parties to data keeping and ensuring of secure computer and information systems • Educational software should offer several tools in support of data sharing, tools for using just the necessary private data, tools for privileges protection • In eLearning privacy the principle: sharing on trust is important for the organization of a successful learning • Students want to trust educators, third parties and used educational software • Then the educators use the students’ private data to organize a learning process adequate to the student’s learning needs
  • 31. • Thank you for your attention! Thanks for pictures: http://healthworkscollective.com/keithtullyy/309681/how-technology-affecting-healthcare http://www.datadesigngroup.com/wp-content/uploads/2014/12/ecommerce.png http://ec.europa.eu/digital-agenda/en/public-services https://e-estonia.com/wp-content/uploads/2014/04/eHealth.jpg http://pedemonts.com.au/service-solutions/e-commerce/ http://ucfretrolab.org/2012/09/29/anonymity-and-online-gaming/ http://www.vi.net/blog/2013/04/could-cloud-computing-become-just-computing/ http://www.truste.com/blog/