skip to main content
10.1145/2883851.2883893acmotherconferencesArticle/Chapter ViewAbstractPublication PageslakConference Proceedingsconference-collections
research-article

Privacy and analytics: it's a DELICATE issue a checklist for trusted learning analytics

Published:25 April 2016Publication History

ABSTRACT

The widespread adoption of Learning Analytics (LA) and Educational Data Mining (EDM) has somewhat stagnated recently, and in some prominent cases even been reversed following concerns by governments, stakeholders and civil rights groups about privacy and ethics applied to the handling of personal data. In this ongoing discussion, fears and realities are often indistinguishably mixed up, leading to an atmosphere of uncertainty among potential beneficiaries of Learning Analytics, as well as hesitations among institutional managers who aim to innovate their institution's learning support by implementing data and analytics with a view on improving student success. In this paper, we try to get to the heart of the matter, by analysing the most common views and the propositions made by the LA community to solve them. We conclude the paper with an eight-point checklist named DELICATE that can be applied by researchers, policy makers and institutional managers to facilitate a trusted implementation of Learning Analytics.

References

  1. Johnson, L., Smith, R., Willis, H., Levine, A., & Haywood, K. (2011). The 2011 Horizon Report. Austin, Texas: The New Media Consortium.Google ScholarGoogle Scholar
  2. Greller, W., & Drachsler, H. (2012). Translating Learning into Numbers: A Generic Framework for Learning Analytics. Educational Technology & Society, 15 (3), 42--57.Google ScholarGoogle Scholar
  3. New York Times, (2014) InBloom Student Data Repository to Close. April 21, 2014. Available at: http://bits.blogs.nytimes.com/2014/04/21/inbloom-student-data-repository-to-close/?_r=0Google ScholarGoogle Scholar
  4. College Bescherming Persoonsgegevens. Onderzoek CBP naar de verwerking van persoonsgegevens door Snappet. 2014. Available at: https://cbpweb.nl/sites/default/files/downloads/mijn_privacy/rap_2013_snappet.pdf.Google ScholarGoogle Scholar
  5. Venkatesh, V., & Davis, F. D. (2000). A theoretical extension of the technology acceptance model: Four longitudinal field studies. Management science, 46(2), 186--204. DOI 10.1287/mnsc.46.2.186.11926. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Scheffel, M., Drachsler, H., Stoyanov S., & Specht, M. (2014). Quality Indicators for Learning Analytics. Educational Technology & Society, 17 (4), 117--132.Google ScholarGoogle Scholar
  7. Drachsler, H., & Greller, W. (2012). The pulse of learning analytics: understandings and expectations from the stakeholders. In Proceedings of the 2nd international conference on learning analytics and knowledge (pp. 120--129). ACM. DOI 10.1145/2330601.2330634. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Prinsloo, P. & Slade, S. (2013). An evaluation of policy frameworks for addressing ethical considerations in Learning Analytics. In Proceedings of the 3rd Learning Analytics and Knowledge conference, Leuven, Belgium. DOI: 10.1145/2460296.2460344 Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Slade, S. & Prinsloo, P. (2013). Learning analytics: ethical issues and dilemmas. American Behavioral Scientist, 57 (10), pp. 1510--1529. DOI: 10.1177/0002764213479366Google ScholarGoogle ScholarCross RefCross Ref
  10. Pardo, A. & Siemens, G. (2014). Ethical and privacy principles for Learning Analytics. British Journal of Educational Technology, 45(3), 438--450. DOI: 10.1111/bjet.12152.Google ScholarGoogle ScholarCross RefCross Ref
  11. Prinsloo, P. & Slade, S. (2015). Student privacy self-management: implications for Learning Analytics. In Proceedings of the 5th international conference on learning analytics and knowledge Pooghkeepsie, New York, USA. DOI: 10.1145/2723576.2723585 Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Hoel, T. & Chen, W. (2015). Privacy in Learning Analytics -- Implications for System Architecture. In: Watanabe, T. and Seta, K. (Eds.) (2015). Proceedings of the 11th International Conference on Knowledge Management.Google ScholarGoogle Scholar
  13. Engelfriet, E., Jeunink, E., Maderveld, J. (2015). Handreiking Learning analytics onder de Wet bescherming persoonsgegevens. SURF report. https://www.surf.nl/kennisbank/2015/learning-analytics-onder-de-wet-bescherming-persoonsgegevens.htmlGoogle ScholarGoogle Scholar
  14. Sclater, N., & Bailey, P. (2015). Code of practice for learning analytics. Available at: https://www.jisc.ac.uk/guides/code-of-practice-for-learning-analyticsGoogle ScholarGoogle Scholar
  15. Open University UK (2014). Policy on Ethical use of Student Data for Learning Analytics. Available: http://www.open.ac.uk/students/charter/sites/www.open.ac.uk.students.charter/files/files/ecms/web-content/ethical-use-of-student-data-policy.pdfGoogle ScholarGoogle Scholar
  16. Kay, D., Korn, N., and Oppenheim, C. (2012). CETIS Analytics Series: Legal, Risk and Ethical Aspects of Analytics in Higher Education, serial number: ISSN 2051-9214 Vol 1, No 6. Available at: http://publications.cetis.org.uk/2012/500Google ScholarGoogle Scholar
  17. Slade, S., & Prinsloo, P. (2015). Student vulnerability, agency and learning analytics: an exploration. Journal of Learning Analytics, Special Issue on Ethics and Privacy.Google ScholarGoogle Scholar
  18. Steiner, C., Kickmeier-Rust, M. D., and Albert, D. (2015). LEA in Private: A Privacy and Data Protection Framework for a Learning Analytics Toolbox, Journal of Learning Analytics, Special Issue on Ethics and Privacy.Google ScholarGoogle Scholar
  19. Lauss, G., Bialobrzeski, A., Korkhaus, M., Snell, K., Starkbaum, J., Vermeer, A. E., Weigel, J., Gottweis, H., Helén, I., Taupitz, J. & Dabrock, P. (2013). Beyond Genetic Privacy. Past, Present and Future of Bioinformation Control Regimes. Available at: http://privategen.eu/uploads/media/PRIVATE_Gen_FINAL-REPORT_2013_02.pdfGoogle ScholarGoogle Scholar
  20. World Medical Association. (2001). World Medical Association Declaration of Helsinki. Ethical principles for medical research involving human subjects. Bulletin of the World Health Organization, 79(4), 373.Google ScholarGoogle Scholar
  21. National Commission for the Protection of Human Subjects of Biomedical and Behavioral Research, Bethesda, MD. (1978). The Belmont report: Ethical principles and guidelines for the protection of human subjects of research. ERIC Clearinghouse.Google ScholarGoogle Scholar
  22. Milgram, Stanley. Das Milgram-Experiment. Reinbek: Rowohlt, 1974.Google ScholarGoogle Scholar
  23. Zimbardo, P. G., Maslach, C., & Haney, C. (2000). Reflections on the Stanford prison experiment: Genesis, transformations, consequences. Obedience to authority: Current perspectives on the Milgram paradigm, 193--237.Google ScholarGoogle Scholar
  24. Kramer, A. D., Guillory, J. E., & Hancock, J. T. (2014). Experimental evidence of massive-scale emotional contagion through social networks. Proceedings of the National Academy of Sciences, 111(24), 8788--8790. DOI: 10.1073/pnas.1320040111.Google ScholarGoogle ScholarCross RefCross Ref
  25. Kleinsman, J., & Buckley, S. (2015). Facebook Study: A Little Bit Unethical But Worth It? Journal of Bioethical inquiry, 12, Issue 2, 179-182, DOI: 10.1007/s11673-015-9621-0.Google ScholarGoogle ScholarCross RefCross Ref
  26. Warren, S. D., & Brandeis, L. D. (1890). The right to privacy. Harvard law review, 193--220.Google ScholarGoogle Scholar
  27. Westin, A. F. (1968). Privacy and freedom. Washington and Lee Law Review, 25(1), 166.Google ScholarGoogle Scholar
  28. Flaherty, D. H. (1989). Protecting privacy in surveillance societies: The federal republic of Germany, Sweden, France, Canada, and the United States. UNC Press Books.Google ScholarGoogle Scholar
  29. Roessler, B. 2005. The Value of Privacy, Oxford: Polity Press.Google ScholarGoogle Scholar
  30. Nissenbaum, H. (2004). Privacy as Contextual Integrity. Washington Law Review 79(1). Available: https://www.nyu.edu/projects/nissenbaum/papers/washingtonlawreview.pdfGoogle ScholarGoogle Scholar
  31. Hildebrandt, M. (2006). 3. Privacy and Identity. Privacy and the criminal law, 43.Google ScholarGoogle Scholar
  32. European Commission (2014). New modes of learning and teaching in higher education. Luxembourg: Publications Office of the European Union 2014, 68 pp. ISBN 978-92-79-39789-9 DOI:10.2766/81897 http://ec.europa.eu/education/library/reports/modernisation-universities_en.pdfGoogle ScholarGoogle Scholar
  33. European Union: EU Data Protection Directive 95/46/EC. http://eur-lex.europa.eu/legal-content/EN/ALL/?uri=CELEX:31995L0046.Google ScholarGoogle Scholar
  34. Organisation for Economic Co-operation and Development. (2002). OECD Guidelines on the Protection of Privacy and Transborder Flows of Personal Data. OECD Publishing. http://www.oecd.org/sti/ieconomy/oecdguidelinesontheprotectionofprivacyandtransborderflowsofpersonaldata.htmGoogle ScholarGoogle Scholar
  35. Mayer-Schönberger, V., & Cukier, K. (2013). Big data: A revolution that will transform how we live, work, and think. Houghton Mifflin Harcourt.Google ScholarGoogle Scholar
  36. Mantelero, A. (2013). The EU Proposal for a General Data Protection Regulation and the roots of the 'right to be forgotten'. Computer Law & Security Review 29 (3): 229--235. Available at: https://www.academia.edu/3635569/The_EU_Proposal_for_a_General_Data_Protection_Regulation_and_the_roots_of_the_right_to_be_forgotten_Google ScholarGoogle ScholarCross RefCross Ref
  37. Koops, B. J. (2011). Forgetting footprints, shunning shadows: A critical analysis of the 'right to be forgotten' in big data practice. In: SCRIPTed, Vol. 8, No. 3, pp. 229--256, 2011; Tilburg Law School Research Paper No. 08/2012. Available at: http://dx.doi.org/10.2139/ssrn.1986719Google ScholarGoogle Scholar
  38. European Union: EU Data Retention Directive 2006/24/EC http://eur-lex.europa.eu/legal-content/EN/TXT/?uri=celex:32006L0024Google ScholarGoogle Scholar
  39. The Guardian (2010), Privacy no longer a social norm, says facebook founder. (January, 11, 2010) http://www.theguardian.com/technology/2010/jan/11/facebook-privacyGoogle ScholarGoogle Scholar
  40. Fuchs, C. (2015). Digital Labour and Karl Marx. Routledge.Google ScholarGoogle Scholar
  41. Arora, P. (2015). Bottom of the Data Pyramid: Big Data and the Global South. In: Discover Society, vol. 23. Available at: http://discoversociety.org/2015/08/03/bottom-of-the-data-pyramid-big-data-and-the-global-south/Google ScholarGoogle Scholar
  42. Casey, J., & Greller, W. (2015). Jane Austen and the Belly of the Beast Part 2 - Language and Power: Commodification, Technology and the Open Agenda in Higher Education. In: ISIS Summit Vienna 2015---The Information Society at the Crossroads. Multidisciplinary Digital Publishing Institute. Available at: http://sciforum.net/conference/isis-summit-vienna-2015/paper/2910/download/pdfGoogle ScholarGoogle Scholar
  43. Tene, O., & Polonetsky, J. (2012). Privacy in the age of big data: a time for big decisions. Stanford Law Review Online, 64, 63. Available at: https://www.stanfordlawreview.org/online/privacy-paradox/big-dataGoogle ScholarGoogle Scholar
  44. Ohm, P. (2010). Broken Promises of Privacy: Responding to the Surprising Failure of Anonymization, 57 UCLA L. Rev. 1701.Google ScholarGoogle Scholar
  45. Sweeney L. (2000). Simple Demographics Often Identify People Uniquely. Carnegie Mellon, Data Privacy Working Paper 3. http://dataprivacylab.org/projects/identifiability/.Google ScholarGoogle Scholar
  46. Narayanan, A., Shmatikov, V. (2008). Robust Deanonymization of Large Datasets (How to Break Anonymity of the Netflix Prize Dataset). The University of Texas at Austin February 5, 2008. http://arxiv.org/pdf/cs/0610105.pdfGoogle ScholarGoogle Scholar
  47. Narayanan, A., and Felten, E. W. (2014). No silver bullet: De-identification still doesn't work. http://randomwalker.info/publications/no-silver-bullet-de-identification.pdfGoogle ScholarGoogle Scholar
  48. Heerde, H. J. W. van (2010). Privacy-aware data management by means of data degradation - Making private data less sensitive over time. Ph.D. thesis, University of Twente, Enschede. http://www.vanheerde.eu/phdthesis.pdf.Google ScholarGoogle Scholar
  49. Hildebrandt, M. (2008). Profiling and the identity of the European citizen. In: Profiling the European citizen (pp. 303--343). Springer Netherlands. DOI: 10.1007/978-1-4020-6914-7.Google ScholarGoogle ScholarCross RefCross Ref
  50. Han, B.-C. (2015). The Transparency Society. Stanford University Press. ISBN: 9780804794602Google ScholarGoogle ScholarCross RefCross Ref
  51. Clay-Williams R., Colligan L. (2015). Back to basics: checklists in aviation and healthcare. BMJ Qual Saf 2015, 24: 428--431. DOI:10.1136/bmjqs-2015-003957Google ScholarGoogle ScholarCross RefCross Ref
  52. Friedman, B., ed. (1997). Human values and the design of computer technology. Cambridge University Press. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Privacy and analytics: it's a DELICATE issue a checklist for trusted learning analytics

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in
          • Published in

            cover image ACM Other conferences
            LAK '16: Proceedings of the Sixth International Conference on Learning Analytics & Knowledge
            April 2016
            567 pages
            ISBN:9781450341905
            DOI:10.1145/2883851

            Copyright © 2016 ACM

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 25 April 2016

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • research-article

            Acceptance Rates

            LAK '16 Paper Acceptance Rate36of116submissions,31%Overall Acceptance Rate236of782submissions,30%

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader