Privacy and E-Learning: A Pending Task
Abstract
:1. Introduction
2. Privacy in Educational Technologies: A Historical Perspective
2.1. A Beginning in Good Standing
2.2. LMS Migrations, 2000–07
2.3. Elearning Interoperability Standards, 2007–2010
2.4. LMS, Software as a Service and Cloud Computing, 2010–2020
3. Students under Surveillance
3.1. Surveillance Capitalism Enters Education
3.2. Examples of Surveillance in Education
3.2.1. Educational Apps That Collect, Extract, and May Use Student’s Data
- Not every school seeks “informed consent” from parents to enter their children’s data into the ClassDojo system. ClassDojo’s can be used to create a persistent behavioral record of each child across the duration of their schooling, and school managers can use these records to identify children by their behavioral profile. ClassDojo is already in partnership with Stanford University, which is using ClassDojo data to evaluate how well its content promotes children’s psychological development [24].
- The use of ClassDojo in classrooms impacts teacher–pupil contact time; with points awarded by clicking on the mobile app, teachers become responsible for data entry rather than interacting with pupils. Additionally, now is a time when children’s mental health has become a subject of serious concern. In this context, ClassDojo might reinforce the idea that it is the behavioral mindset of the child that needs to be corrected. The competition to be the firsts in a ClassDojo ranking (according to their accumulated dojo points) could easily become a further source of stress. In an attempt to monetize the service, ClassDojo is proposing “premium features” for parents and schools, although its vast databank also has potential for monetization. School managers might purchase reports to single out children for specific classes or special behavior programs. Local government departments could buy the data to compare schools’ performance [24].
3.2.2. Apps to Track Students
3.2.3. Big Data to Predict Student’s Enrolment
3.2.4. Facial Recognition Systems
3.2.5. E-Advertising in Education
3.3. Ethics, Privacy, and Learning Analytics
- Determination: decide on the purpose of learning analytics for your institution;
- Explain: define the scope of data collection and usage;
- Legitimate: explain how you operate within the legal frameworks, referring to the essential legislation;
- Involve: talk to stakeholders and give assurances about the data distribution and use;
- Consent: seek consent through clear consent questions;
- Anonymize: de-identify individuals as much as possible;
- Technical aspects: monitor who has access to data, especially in areas with high staff turnover;
- External partners: make sure externals provide the highest data security standards.
4. Legal Issues
4.1. FERPA
- Disclosure under the school official exception is informal—FERPA neither specifies how schools decide who is an authorized data recipient nor how to document such authorization or its scope. FERPA does not require a specification of the purposes served by disclosure or a threshold of applicability.
- Broad discretion over security and approval of data recipients—FERPA requires minimal oversight of data recipients or security requirements. Educational institutions should have “direct control” over third parties that access data. However, while it is suggested that schools control this feature with contracts, it is not a requirement. The standards for “direct control” are loosely defined in non-binding guidance.
- FERPA lets schools define under their own criteria what constitutes a “legitimate educational interest” required to share information with a school official. In practice, the bounds of what constitutes an appropriate “school official” data recipient and “legitimate educational interest” are not clearly defined.
- Compliance-oriented enforcement—When a privacy issue is detected, the Family Policy Compliance Office (FPCO) of the Department of Education notifies the institution, which then has “a reasonable period of time” to comply voluntarily with its FERPA obligations. If the entity does not comply, the FPCO can initiate “any legally available enforcement action” to compel compliance. At a practical level, this limits enforcement to the unlikely case of an educational institution intentionally and repeatedly violating FERPA after FPCO attempts to bring it into compliance.
- Limited regulatory scope—FERPA only applies to educational agencies or institutions that receive federal funds. It does not apply to the data recipients or to entities, such as Massive Open Online Courses (MOOCs) that collect and use information about students and do not receive federal funding. If a data recipient violates FERPA, the disclosing school is responsible for non-compliance with the law. In this case, the DOE can prohibit a publicly funded institution or agency from providing information to an entity found in violation of FERPA for at least five years. No punitive action is taken against private institutions.
4.2. GDPR
- The Seventh Article “Conditions for Consent”;
- The 32nd Recital, specifying that “Consent should be given by a clear affirmative act establishing a freely given, specific, informed and unambiguous indication of the data subject’s agreement to the processing of personal data relating to him or her, such as by a written statement, including by electronic means, or an oral statement”;
- The 42nd Recital, specifying that “For consent to be informed, the data subject should be aware at least of the identity of the controller and the purposes of the processing for which the personal data are intended”;
- The 43rd Recital, stating “Consent is presumed not to be freely given if it does not allow separate consent to be given to different personal data processing operations.”
- Issues with concepts—To exercise one’s rights granted by the GDPR, one needs to understand some concepts about data privacy and the implications of its use. Research shows that “students are not aware of the use of their data and metadata by others” and “do not know who can access them (their data), whether they are used for unwanted purposes.” Therefore, data privacy needs to be among the contents to learn in the curriculum if the students are to be able to exercise their GDPR rights [48].
- Threats to individual control—GDPR gives control to users to consent to data sharing and treatment. However, there are some threats to user consent, such as cookie acceptance, that diminishes user criteria to evaluate consent or automatically consent by information overload and information complexity. The GPDR fails to avoid these pitfalls with the right to explanation or the use of icons to simplify complex concepts. Icons can only provide a partial description of data treatment and processing, and explanation falls short to explain actual implications for an individual [49].
- The GDPR introduces in Article 25 the principle of data protection by design and by default. Most educational software does not comply with this principle. This means that many codes must be redesigned and refactored with data protection in mind by design and by default.
- The directive is designed to act in a punitive manner when a privacy breach is denounced. However, it does not require standards to be attained nor any measure of technical and organizational certification or quality assurance with regard to privacy.
5. Discussion
6. Conclusions
- Encryption of personal data on the server datastores—The personal information of the students is stored plain and unencrypted in many database systems. Any superuser, developer, sysadmin, or hacker who made it into the system has full access to it. This is a complex technical problem because many legacy codes and systems access these datasets, and we have also to address performance and scalability issues. A data storage system such as the “personal data broker” could be used to encrypt sensitive data in the LMS. The authors developed a prototype running on Moodle [53].
- Apply differential privacy techniques to the data logs—The LMS usually logs all the activity in the system. Every action every user (student, teacher, admin) has performed is recorded with a unique identifier for every user, which can be easily traced to the user identity. These logs feed learning analytics systems and are unencrypted of course. These logs should be anonymized, and differential privacy techniques should be applied when recording these logs, inserting noise, which would prevent the depersonalization of the information while allowing for statistical inferences to those researchers who are entrusted with the noise pattern [54].
- Masking the student’s identity under an alias—If students wish, for whatever justified reason, to make use of their right to object to this kind of exposure of their data, they would not be able to use the system. The current GDPR compliance implementations of most systems require the acceptance of terms of use to access the LMS. Therefore, this right is violated. Let us point out that the personal information of the student is not only accessed by academic staff. LMS programs are designed for interaction between students and teachers. The students gain access to a lot of personal information of their peers: access to course rosters, fellow students’ profiles, forum posts, wiki edits, etc. The authors developed a Moodle plugin prototype that enables the students who want or need to exercise their right to oppose to not lose their right to education, by enabling a system of alias profiles. Students can show themselves under alias identities to their peers [55].
- We need to establish privacy practices for the learning tools that interoperate with LMS. The privacy features present in protocols such as IMS LTI need to be enabled in the default configurations and strengthened. For untrusted LTI providers, web-bots acting as fake students could feed noise to the provider implementing a kind of differential privacy.
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
Abbreviations
AMS | Academic Management System |
AWS | Amazon Web Services |
AWS EC2 | Elastic Cloud Computing |
AWS S3 | AWS Simple Storage Service |
FERPA | Family Educational Rights and Privacy Act |
IMS CC | IMS Common Cartridge |
IMS LTI | IMS Learning Tools Interoperability |
GDPR | General Data Protection Regulation |
LMS | Learning Management System |
References
- García-Peñalvo, F.J.; Alier, M. Learning management system: Evolving from silos to structures. Interact. Learn. Environ. 2014, 22, 143–145. [Google Scholar] [CrossRef]
- Wang, Q.; Woo, H.L.; Quek, C.L.; Yang, Y.; Liu, M. Using the Facebook group as a learning management system: An exploratory study. Br. J. Educ. Technol. 2012, 43, 428–438. [Google Scholar] [CrossRef]
- Zeide, E. The structural consequences of big data-driven education. Big Data 2017, 5, 164–172. [Google Scholar] [CrossRef]
- Guzmán-Valenzuela, C.; Gómez-González, C.; Rojas-Murphy Tagle, A.; Lorca-Vyhmeister, A. Learning analytics in higher education: A preponderance of analytics but very little learning? Int. J. Educ. Technol. High. Educ. 2021, 18, 23. [Google Scholar] [CrossRef]
- Polonetsky, J.; Tene, O. Who is reading whom now: Privacy in education from books to MOOCs. Vanderbilt J. Entertain. Technol. Law 2014, 17, 927. [Google Scholar]
- Hill, P. State of Higher Ed LMS Market for US and Canada: Spring 2016 Edition. In eLiterate. 2016. Available online: https://eliterate.us/state-higher-ed-lms-market-spring-2016/ (accessed on 20 May 2021).
- Alier, M.; Mayol, E.; Casañ, M.J.; Piguillem, J.; Merriman, J.W.; Conde, M.Á.; García-Peñalvo, F.; Tebbens, G.; Severance, C. Clustering projects for eLearning interoperability. J. Univers. Comput. Sci. 2012, 18, 106–122. [Google Scholar]
- Casany, M.J.; Alier Forment, M.; Mayol, E.; Piguillem, J.; Galanis, N.; García-Peñalvo, F.J.; Conde González, M.Á. Moodbile: A framework to integrate m-learning applications with the LMS. J. Res. Pract. Inf. Technol. 2012, 44, 129–149. [Google Scholar]
- Common Cartridge: How Common Cartridge Benefits K-20 Institutions. Available online: https://www.imsglobal.org/activity/common-cartridge (accessed on 20 May 2021).
- Learning Tool Interoperability: IMS LTI 1.3 and LTI Advantage. Available online: http://www.imsglobal.org/activity/learning-tools-interoperability (accessed on 20 May 2021).
- Alier, M.; Casany, M.J.; Conde, M.A.; García-Peñalvo, F.J.; Severance, C. Interoperability for LMS: The missing piece to become the common place for e-learning innovation. Int. J. Knowl. Learn. 2010, 6, 130–141. [Google Scholar] [CrossRef]
- Casany, M.J.; Alier, M.; García-Peñalvo, F.J. SOA initiatives for eLearning. A Moodle Case. In Proceedings of the IEEE 23rd International Conference on Advanced Information Networking and Applications, AINA 2009, Bradford, UK, 26–29 May 2009; pp. 750–755. [Google Scholar]
- Timeline Amazon Web Services. In Wikipedia. Available online: https://en.wikipedia.org/wiki/Timeline_of_Amazon_Web_Services (accessed on 20 May 2021).
- LMS Market Share for US & Canadian Higher Ed. Institutions. Online Learning Distance Education Resoure. 2018. Available online: https://tonybates.wpengine.com/wp-content/uploads/LMS-market-trends-2.jpg (accessed on 20 May 2021).
- De Bruyckere, P. Gartner Hipe Cicle for Education. The Economy of Meaning. 2016. Available online: https://theeconomyofmeaning.com/2016/08/09/gartners-hype-cycle-for-education-2016/ (accessed on 26 August 2020).
- Siemens, G. Learning analytics: Envisioning a research discipline and a domain of practice. In Proceedings of the 2nd International Conference on Learning Analytics and Knowledge, Leuven, Belgium, 29 April–2 May 2012; pp. 4–8. [Google Scholar]
- Huotari, K.; Hamari, J. Defining gamification—A service marketing perspective. In Proceedings of the 16th International Academic MindTrek Conference, Tampere, Finland, 3–5 October 2012. [Google Scholar]
- Casteneda, L. Gamificación, Que Podria Haber Más Allá De Micro-Estimulitos. 2014. Available online: https://www.lindacastaneda.com/es/mushware/gamificacionesytic1314/ (accessed on 20 May 2021).
- Capuano, N.; Caballé, S. Adaptive learning technologies. AI Mag. 2020, 41, 96–98. [Google Scholar] [CrossRef]
- Zuboff, S. Big other: Surveillance capitalism and the prospects of an information civilization. J. Inf. Technol. 2015, 30, 75–89. [Google Scholar] [CrossRef]
- Drachsler, H.; Greller, W. Privacy and analytics: It′s a DELICATE issue a checklist for trusted learning analytics. In Proceedings of the Sixth International Conference on Learning Analytics & Knowledge, Edinburg, UK, 25–29 April 2016; pp. 89–98. [Google Scholar]
- Ravitch, D. Is inBloom engaged in identity theft. Diane’s Ravitch Blog. 2013. Available online: https://dianeravitch.net/2013/04/07/is-inbloom-engaged-in-identity-theft/ (accessed on 7 April 2021).
- CBP 2014. College Bescherming Persoonsgegevens Onderzoek. CBP Naar De Verwerking Van Persoonsgegevens Door Snappet Rapport Definitieve Bevindingen Van 14 Juli 2014 Met Corrigendum Van 27 Augustus 2014 Juli 2014. Available online: https://cbpweb.nl/sites/default/files/downloads/mijn_privacy/rap_2013_snappet.pdf (accessed on 20 May 2021).
- Williamson, B.; Rutherford, A. ClassDojo Poses Data Protection Concerns for Parents. Available online: https://blogs.lse.ac.uk/parenting4digitalfuture/2017/01/04/classdojo-poses-data-protection-concerns-for-parents/ (accessed on 16 August 2021).
- Cox, K. College contact-tracing app readily leaked personal data, report finds. ArsTechnica. 2020. Available online: https://arstechnica.com/tech-policy/2020/08/college-contact-tracing-app-readily-leaked-personal-data-report-finds/ (accessed on 7 April 2021).
- Cushing, T. Tracking college students everywhere they go on campus is the new normal. Techdirt. 2019. Available online: https://www.techdirt.com/articles/20191226/12031843636/tracking-college-students-everywhere-they-go-campus-is-new-normal.shtml (accessed on 7 April 2021).
- Cushing, T. University of Alabama is using a location-tracking app to punish students for leaving football games early. Techdirt. 2019. Available online: https://www.techdirt.com/articles/20190915/13384942992/university-alabama-is-using-location-tracking-app-to-punish-students-leaving-football-games-early.shtml (accessed on 7 April 2021).
- Geoffrey, A. Colleges are turning students’ phones into surveillance machines, tracking the locations of hundreds of thousands. Wash. Post. 2019. Available online: https://www.washingtonpost.com/technology/2019/12/24/colleges-are-turning-students-phones-into-surveillance-machines-tracking-locations-hundreds-thousands/ (accessed on 7 April 2021).
- McMillan, D.; Anderson, N. Student tracking, secret scores: How college admissions offices rank prospects before they apply. Wash. Post. 2020. Available online: https://www.washingtonpost.com/business/2019/10/14/colleges-quietly-rank-prospective-students-based-their-personal-data/ (accessed on 7 April 2021).
- MacMillan, D. Some colleges are tracking students before they even apply. Wash. Post. 2019. Available online: https://www.washingtonpost.com/podcasts/post-reports/some-colleges-are-tracking-students-before-they-even-apply/ (accessed on 7 April 2021).
- Barnds, W.K. Does big data know best? NSA and college admissions. Huffington Post. 2013. Available online: http://www.huffingtonpost.com/w-kent-barnds/does-big-data-know-bestn_b_3460096.html (accessed on 7 April 2021).
- Rubel, A.; Jones, K. Data analytics in higher education: Key concerns and open questions. Univ. St. Thomas J. Law Public Policy 2017, 11, 25. [Google Scholar]
- Satisky, J.A. Duke study recorded thousands of students′ faces. Now they′re being used all over the world. Chronicle. 2019. Available online: https://www.dukechronicle.com/article/2019/06/duke-university-facial-recognition-data-set-study-surveillance-video-students-china-uyghur (accessed on 7 April 2021).
- Owen, M. Facial recognition bolstered by mass database scraping, but not from apple. Apple Insider. 2019. Available online: https://appleinsider.com/articles/19/07/13/facial-recognition-bolstered-by-mass-database-scraping-but-not-from-apple (accessed on 7 April 2021).
- Lin, L. Thousands of chinese students′ data exposed on internet. Wall Str. J. 2020. Available online: https://www.wsj.com/articles/thousands-of-chinese-students-data-exposed-on-internet-11579283410 (accessed on 7 April 2021).
- Parry, M. Big data on campus. New York Times. 2012. Available online: https://www.nytimes.com/2012/07/22/education/edlife/colleges-awakening-to-the-opportunities-of-data-mining.html (accessed on 7 April 2021).
- New initiatives advance asu′s efforts to enhance student′s success. Arizona State University News. 2011. Available online: https://news.asu.edu/content/new-initiatives-advance-asus-efforts-enhance-student-success (accessed on 7 April 2021).
- Denley, T. Advising by algorithm. New York Times. 2012. Available online: https://archive.nytimes.com/www.nytimes.com/interactive/2012/07/18/education/edlife/student-advising-by-algorithm.html?ref=edlife (accessed on 7 April 2021).
- O’Neil, M. Data Breaches Put a Dent in Colleges′ Finances as well as Reputations. Available online: https://www.chronicle.com/article/data-breaches-put-a-dent-in-colleges-finances-as-well-as-reputations/ (accessed on 7 April 2021).
- Kamenetz, A. What parents need to know about big data and student privacy. NPR. 2014. Available online: https://www.npr.org/sections/alltechconsidered/2014/04/28/305715935/what-parents-need-to-know-about-big-data-and-student-privacy?t=1617701713223 (accessed on 7 April 2021).
- Pardo, A.; Siemens, G. Ethical and privacy principles for learning analytics. Br. J. Educ. Technol. 2014, 45, 438–450. [Google Scholar] [CrossRef]
- Prinsloo, P.; Slade, S. An evaluation of policy frameworks for addressing ethical considerations in learning analytics. In Proceedings of the LAK ‘13 Proceedings of the 3rd International Conference on Learning Analytics and Knowledge, New York, NY, USA, 8–13 April 2013. [Google Scholar]
- Slade, S.; Prinsloo, P. Learning analytics: Ethical issues and dilemmas. Am. Behav. Sci. 2013, 57, 1510–1529. [Google Scholar] [CrossRef] [Green Version]
- Willis, J.E., III. Ethics, Big Data, and Analytics: A Model for Application; Purdue University: West Lafayette, IN, USA, 2013. [Google Scholar]
- Amo Filvà, D. Privacidad Y Gestión de la Identidad en Procesos de Analítica de Aprendizaje, phd dissertartion, Programa de Doctorado Formación en la Sociedad del Conocimiento. Universidad de Salamanca. 2020. Available online: https://repositorio.grial.eu/handle/grial/1951 (accessed on 1 July 2021).
- Zeide, E. Student privacy principles for the age of big data: Moving beyond FERPA and FIPPs. Drexel Law Rev. 2015, 8, 101–160. [Google Scholar]
- Zeide, E. The limits of education purpose limitations. Univ. Miami Law Rev. 2016, 71, 496–526. [Google Scholar]
- Marković, M.G.; Debeljak, S.; Kadoić, N. Preparing students for the era of the General Data Protection Regulation (GDPR). TEM J. 2019, 8, 150. [Google Scholar] [CrossRef]
- van Ooijen, I.; Vrabec, H.U. Does the GDPR enhance consumers′ control over personal data? An analysis from a behavioral perspective. J. Consum. Policy 2019, 42, 91–107. [Google Scholar] [CrossRef] [Green Version]
- Negroponte, N.; Harrington, R.; McKay, S.R.; Christian, W. Being digital. Comput. Phys. 1997, 11, 261–262. [Google Scholar] [CrossRef] [Green Version]
- Cyphers, B. Google′s FLoC is a terrible idea. Electron. Front. Found. 2021. Available online: https://www.eff.org/deeplinks/2021/03/googles-floc-terrible-idea (accessed on 16 August 2021).
- Li, H.; Chen, Q.; Zhu, H.; Ma, D.; Wen, H.; Shen, X.S. Privacy leakage via de-anonymization and aggregation in heterogeneous social networks. IEEE Trans. Dependable Secur. Comput. 2017, 17, 350–362. [Google Scholar] [CrossRef]
- Amo, D.; Fonseca, D.; Alier, M.; García-Peñalvo, F.J.; Casañ, M.J.; Alsina, M. Personal data broker: A solution to assure data privacy in EdTech. In Proceedings of the International Conference on Human-Computer Interaction, Orlando, FL, USA, 26–31 July 2019; Springer International Publishing: Berlin/Heidelberg, Germany, 2019; pp. 3–14. [Google Scholar]
- Dwork, C.; Roth, A. The algorithmic foudation of differencial privacy. Found. Trends Theor. Comput. Sci. 2014, 9, 211–407. [Google Scholar] [CrossRef]
- Amo, D.; Alier, M.; García-Peñalvo, F.J.; Fonseca, D.; Casañ, M.J. Protected users: A moodle plugin to improve confidentiality and privacy support through user aliases. Sustainability 2020, 12, 2548. [Google Scholar] [CrossRef] [Green Version]
- Diamandis, P. THE 6 D′S. Available online: https://www.diamandis.com/blog/the-6ds (accessed on 7 April 2021).
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2021 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Alier, M.; Casañ Guerrero, M.J.; Amo, D.; Severance, C.; Fonseca, D. Privacy and E-Learning: A Pending Task. Sustainability 2021, 13, 9206. https://doi.org/10.3390/su13169206
Alier M, Casañ Guerrero MJ, Amo D, Severance C, Fonseca D. Privacy and E-Learning: A Pending Task. Sustainability. 2021; 13(16):9206. https://doi.org/10.3390/su13169206
Chicago/Turabian StyleAlier, Marc, Maria Jose Casañ Guerrero, Daniel Amo, Charles Severance, and David Fonseca. 2021. "Privacy and E-Learning: A Pending Task" Sustainability 13, no. 16: 9206. https://doi.org/10.3390/su13169206
APA StyleAlier, M., Casañ Guerrero, M. J., Amo, D., Severance, C., & Fonseca, D. (2021). Privacy and E-Learning: A Pending Task. Sustainability, 13(16), 9206. https://doi.org/10.3390/su13169206