ABSTRACT
The widespread adoption of Learning Analytics (LA) and Educational Data Mining (EDM) has somewhat stagnated recently, and in some prominent cases even been reversed following concerns by governments, stakeholders and civil rights groups about privacy and ethics applied to the handling of personal data. In this ongoing discussion, fears and realities are often indistinguishably mixed up, leading to an atmosphere of uncertainty among potential beneficiaries of Learning Analytics, as well as hesitations among institutional managers who aim to innovate their institution's learning support by implementing data and analytics with a view on improving student success. In this paper, we try to get to the heart of the matter, by analysing the most common views and the propositions made by the LA community to solve them. We conclude the paper with an eight-point checklist named DELICATE that can be applied by researchers, policy makers and institutional managers to facilitate a trusted implementation of Learning Analytics.
- Johnson, L., Smith, R., Willis, H., Levine, A., & Haywood, K. (2011). The 2011 Horizon Report. Austin, Texas: The New Media Consortium.Google Scholar
- Greller, W., & Drachsler, H. (2012). Translating Learning into Numbers: A Generic Framework for Learning Analytics. Educational Technology & Society, 15 (3), 42--57.Google Scholar
- New York Times, (2014) InBloom Student Data Repository to Close. April 21, 2014. Available at: http://bits.blogs.nytimes.com/2014/04/21/inbloom-student-data-repository-to-close/?_r=0Google Scholar
- College Bescherming Persoonsgegevens. Onderzoek CBP naar de verwerking van persoonsgegevens door Snappet. 2014. Available at: https://cbpweb.nl/sites/default/files/downloads/mijn_privacy/rap_2013_snappet.pdf.Google Scholar
- Venkatesh, V., & Davis, F. D. (2000). A theoretical extension of the technology acceptance model: Four longitudinal field studies. Management science, 46(2), 186--204. DOI 10.1287/mnsc.46.2.186.11926. Google ScholarDigital Library
- Scheffel, M., Drachsler, H., Stoyanov S., & Specht, M. (2014). Quality Indicators for Learning Analytics. Educational Technology & Society, 17 (4), 117--132.Google Scholar
- Drachsler, H., & Greller, W. (2012). The pulse of learning analytics: understandings and expectations from the stakeholders. In Proceedings of the 2nd international conference on learning analytics and knowledge (pp. 120--129). ACM. DOI 10.1145/2330601.2330634. Google ScholarDigital Library
- Prinsloo, P. & Slade, S. (2013). An evaluation of policy frameworks for addressing ethical considerations in Learning Analytics. In Proceedings of the 3rd Learning Analytics and Knowledge conference, Leuven, Belgium. DOI: 10.1145/2460296.2460344 Google ScholarDigital Library
- Slade, S. & Prinsloo, P. (2013). Learning analytics: ethical issues and dilemmas. American Behavioral Scientist, 57 (10), pp. 1510--1529. DOI: 10.1177/0002764213479366Google ScholarCross Ref
- Pardo, A. & Siemens, G. (2014). Ethical and privacy principles for Learning Analytics. British Journal of Educational Technology, 45(3), 438--450. DOI: 10.1111/bjet.12152.Google ScholarCross Ref
- Prinsloo, P. & Slade, S. (2015). Student privacy self-management: implications for Learning Analytics. In Proceedings of the 5th international conference on learning analytics and knowledge Pooghkeepsie, New York, USA. DOI: 10.1145/2723576.2723585 Google ScholarDigital Library
- Hoel, T. & Chen, W. (2015). Privacy in Learning Analytics -- Implications for System Architecture. In: Watanabe, T. and Seta, K. (Eds.) (2015). Proceedings of the 11th International Conference on Knowledge Management.Google Scholar
- Engelfriet, E., Jeunink, E., Maderveld, J. (2015). Handreiking Learning analytics onder de Wet bescherming persoonsgegevens. SURF report. https://www.surf.nl/kennisbank/2015/learning-analytics-onder-de-wet-bescherming-persoonsgegevens.htmlGoogle Scholar
- Sclater, N., & Bailey, P. (2015). Code of practice for learning analytics. Available at: https://www.jisc.ac.uk/guides/code-of-practice-for-learning-analyticsGoogle Scholar
- Open University UK (2014). Policy on Ethical use of Student Data for Learning Analytics. Available: http://www.open.ac.uk/students/charter/sites/www.open.ac.uk.students.charter/files/files/ecms/web-content/ethical-use-of-student-data-policy.pdfGoogle Scholar
- Kay, D., Korn, N., and Oppenheim, C. (2012). CETIS Analytics Series: Legal, Risk and Ethical Aspects of Analytics in Higher Education, serial number: ISSN 2051-9214 Vol 1, No 6. Available at: http://publications.cetis.org.uk/2012/500Google Scholar
- Slade, S., & Prinsloo, P. (2015). Student vulnerability, agency and learning analytics: an exploration. Journal of Learning Analytics, Special Issue on Ethics and Privacy.Google Scholar
- Steiner, C., Kickmeier-Rust, M. D., and Albert, D. (2015). LEA in Private: A Privacy and Data Protection Framework for a Learning Analytics Toolbox, Journal of Learning Analytics, Special Issue on Ethics and Privacy.Google Scholar
- Lauss, G., Bialobrzeski, A., Korkhaus, M., Snell, K., Starkbaum, J., Vermeer, A. E., Weigel, J., Gottweis, H., Helén, I., Taupitz, J. & Dabrock, P. (2013). Beyond Genetic Privacy. Past, Present and Future of Bioinformation Control Regimes. Available at: http://privategen.eu/uploads/media/PRIVATE_Gen_FINAL-REPORT_2013_02.pdfGoogle Scholar
- World Medical Association. (2001). World Medical Association Declaration of Helsinki. Ethical principles for medical research involving human subjects. Bulletin of the World Health Organization, 79(4), 373.Google Scholar
- National Commission for the Protection of Human Subjects of Biomedical and Behavioral Research, Bethesda, MD. (1978). The Belmont report: Ethical principles and guidelines for the protection of human subjects of research. ERIC Clearinghouse.Google Scholar
- Milgram, Stanley. Das Milgram-Experiment. Reinbek: Rowohlt, 1974.Google Scholar
- Zimbardo, P. G., Maslach, C., & Haney, C. (2000). Reflections on the Stanford prison experiment: Genesis, transformations, consequences. Obedience to authority: Current perspectives on the Milgram paradigm, 193--237.Google Scholar
- Kramer, A. D., Guillory, J. E., & Hancock, J. T. (2014). Experimental evidence of massive-scale emotional contagion through social networks. Proceedings of the National Academy of Sciences, 111(24), 8788--8790. DOI: 10.1073/pnas.1320040111.Google ScholarCross Ref
- Kleinsman, J., & Buckley, S. (2015). Facebook Study: A Little Bit Unethical But Worth It? Journal of Bioethical inquiry, 12, Issue 2, 179-182, DOI: 10.1007/s11673-015-9621-0.Google ScholarCross Ref
- Warren, S. D., & Brandeis, L. D. (1890). The right to privacy. Harvard law review, 193--220.Google Scholar
- Westin, A. F. (1968). Privacy and freedom. Washington and Lee Law Review, 25(1), 166.Google Scholar
- Flaherty, D. H. (1989). Protecting privacy in surveillance societies: The federal republic of Germany, Sweden, France, Canada, and the United States. UNC Press Books.Google Scholar
- Roessler, B. 2005. The Value of Privacy, Oxford: Polity Press.Google Scholar
- Nissenbaum, H. (2004). Privacy as Contextual Integrity. Washington Law Review 79(1). Available: https://www.nyu.edu/projects/nissenbaum/papers/washingtonlawreview.pdfGoogle Scholar
- Hildebrandt, M. (2006). 3. Privacy and Identity. Privacy and the criminal law, 43.Google Scholar
- European Commission (2014). New modes of learning and teaching in higher education. Luxembourg: Publications Office of the European Union 2014, 68 pp. ISBN 978-92-79-39789-9 DOI:10.2766/81897 http://ec.europa.eu/education/library/reports/modernisation-universities_en.pdfGoogle Scholar
- European Union: EU Data Protection Directive 95/46/EC. http://eur-lex.europa.eu/legal-content/EN/ALL/?uri=CELEX:31995L0046.Google Scholar
- Organisation for Economic Co-operation and Development. (2002). OECD Guidelines on the Protection of Privacy and Transborder Flows of Personal Data. OECD Publishing. http://www.oecd.org/sti/ieconomy/oecdguidelinesontheprotectionofprivacyandtransborderflowsofpersonaldata.htmGoogle Scholar
- Mayer-Schönberger, V., & Cukier, K. (2013). Big data: A revolution that will transform how we live, work, and think. Houghton Mifflin Harcourt.Google Scholar
- Mantelero, A. (2013). The EU Proposal for a General Data Protection Regulation and the roots of the 'right to be forgotten'. Computer Law & Security Review 29 (3): 229--235. Available at: https://www.academia.edu/3635569/The_EU_Proposal_for_a_General_Data_Protection_Regulation_and_the_roots_of_the_right_to_be_forgotten_Google ScholarCross Ref
- Koops, B. J. (2011). Forgetting footprints, shunning shadows: A critical analysis of the 'right to be forgotten' in big data practice. In: SCRIPTed, Vol. 8, No. 3, pp. 229--256, 2011; Tilburg Law School Research Paper No. 08/2012. Available at: http://dx.doi.org/10.2139/ssrn.1986719Google Scholar
- European Union: EU Data Retention Directive 2006/24/EC http://eur-lex.europa.eu/legal-content/EN/TXT/?uri=celex:32006L0024Google Scholar
- The Guardian (2010), Privacy no longer a social norm, says facebook founder. (January, 11, 2010) http://www.theguardian.com/technology/2010/jan/11/facebook-privacyGoogle Scholar
- Fuchs, C. (2015). Digital Labour and Karl Marx. Routledge.Google Scholar
- Arora, P. (2015). Bottom of the Data Pyramid: Big Data and the Global South. In: Discover Society, vol. 23. Available at: http://discoversociety.org/2015/08/03/bottom-of-the-data-pyramid-big-data-and-the-global-south/Google Scholar
- Casey, J., & Greller, W. (2015). Jane Austen and the Belly of the Beast Part 2 - Language and Power: Commodification, Technology and the Open Agenda in Higher Education. In: ISIS Summit Vienna 2015---The Information Society at the Crossroads. Multidisciplinary Digital Publishing Institute. Available at: http://sciforum.net/conference/isis-summit-vienna-2015/paper/2910/download/pdfGoogle Scholar
- Tene, O., & Polonetsky, J. (2012). Privacy in the age of big data: a time for big decisions. Stanford Law Review Online, 64, 63. Available at: https://www.stanfordlawreview.org/online/privacy-paradox/big-dataGoogle Scholar
- Ohm, P. (2010). Broken Promises of Privacy: Responding to the Surprising Failure of Anonymization, 57 UCLA L. Rev. 1701.Google Scholar
- Sweeney L. (2000). Simple Demographics Often Identify People Uniquely. Carnegie Mellon, Data Privacy Working Paper 3. http://dataprivacylab.org/projects/identifiability/.Google Scholar
- Narayanan, A., Shmatikov, V. (2008). Robust Deanonymization of Large Datasets (How to Break Anonymity of the Netflix Prize Dataset). The University of Texas at Austin February 5, 2008. http://arxiv.org/pdf/cs/0610105.pdfGoogle Scholar
- Narayanan, A., and Felten, E. W. (2014). No silver bullet: De-identification still doesn't work. http://randomwalker.info/publications/no-silver-bullet-de-identification.pdfGoogle Scholar
- Heerde, H. J. W. van (2010). Privacy-aware data management by means of data degradation - Making private data less sensitive over time. Ph.D. thesis, University of Twente, Enschede. http://www.vanheerde.eu/phdthesis.pdf.Google Scholar
- Hildebrandt, M. (2008). Profiling and the identity of the European citizen. In: Profiling the European citizen (pp. 303--343). Springer Netherlands. DOI: 10.1007/978-1-4020-6914-7.Google ScholarCross Ref
- Han, B.-C. (2015). The Transparency Society. Stanford University Press. ISBN: 9780804794602Google ScholarCross Ref
- Clay-Williams R., Colligan L. (2015). Back to basics: checklists in aviation and healthcare. BMJ Qual Saf 2015, 24: 428--431. DOI:10.1136/bmjqs-2015-003957Google ScholarCross Ref
- Friedman, B., ed. (1997). Human values and the design of computer technology. Cambridge University Press. Google ScholarDigital Library
Index Terms
- Privacy and analytics: it's a DELICATE issue a checklist for trusted learning analytics
Recommendations
The privacy paradox and its implications for learning analytics
LAK '20: Proceedings of the Tenth International Conference on Learning Analytics & KnowledgeLearning analytics promises to support adaptive learning in higher education. However, the associated issues around privacy protection, especially their implications for students as data subjects, has been a hurdle to wide-scale adoption. In light of ...
Student privacy self-management: implications for learning analytics
LAK '15: Proceedings of the Fifth International Conference on Learning Analytics And KnowledgeOptimizing the harvesting and analysis of student data promises to clear the fog surrounding the key drivers of student success and retention, and provide potential for improved student success. At the same time, concerns are increasingly voiced around ...
Ethical and privacy issues in the application of learning analytics
LAK '15: Proceedings of the Fifth International Conference on Learning Analytics And KnowledgeThe large-scale production, collection, aggregation, and processing of information from various learning platforms and online environments have led to ethical and privacy concerns regarding potential harm to individuals and society. In the past, these ...
Comments