SlideShare a Scribd company logo
1 of 27
Leadership conference 2018
The Wicked
Problem of
Learning
Data Privacy
Jenn Stringer, MLIS
University of California, Berkeley
IMS Global: Samantha Birk, IMS Global, John Fritz, University of Maryland, Baltimore County, Oliver Heyer, University of California, Berkeley, Virginia Lacefield, University of Kentucky,
Virginia Lacefield, University of Kentucky, Adam Recktenwald, University of Kentucky, Marianne Schroeder, University of British Columbia
University of California (UC): Mary Ellen Kreher, UC Office of the President, Jim Phillips UC, Santa Cruz, James Williamson, UC, Los Angeles
Academic Data
Personally identifiable records, e.g,
transcripts (course work, GPA,
major), enrollments, academic plan,
SAT scores etc.
Student Information & Advising
Systems
Learning Data
Personally identifiable user activity,
e.g., Page views, Discussion posts,
Quiz responses, Video views etc.
recorded in LMS’s and other 3rd party
learning applications
Learning Record Store
Institutional Data
Aggregate, often deidentified,
historical records
e.g. Graduation rates, yield,
application data, demographics,
race/ethnicity
Enterprise Data Warehouse
Learning Data in Context
3
“Learning data refers to data
generated by students,
faculty, and/or staff that
relates to and documents the
teaching and learning
experience and academic
achievement. It can be used
alone or combined with the
student record and other
data points to support
student success and
research.” 1
1 https://www.imsglobal.org/learning-data-analytics-key-principles
Learning Analytics Defined
“Learning analytics is the measurement, collection, analysis and reporting of data about
learners and their contexts, for purposes of understanding and optimising learning and the
environments in which it occurs.”2
21st International Conference of Learning Analytics & Knowledge, Banff, Alberta 2011
● increase ability to make
institutional decisions
● impact student outcomes
● empower students to make
changes to their behavior that
positively affects their learning
● enable faculty to support students
and make changes to their
courses based on data
● support faculty teaching and
pedagogy
● support educational research
Why do we care?
Learning Data
● “Old Days”
○ local hosting meant local logs
○ ad-hoc reporting mainly for systems issues
● “Cloud SaaS”
○ logs not local and not accessible
○ vendors use to improve systems and troubleshoot issues
● Contracts
○ if we have them -- not always specific about ownership of this kind of data
○ they do have security and privacy language
● No Contract?
○ goodluck! - at the whim of the third party provider no security/privacy guarantees
● What: “ Clickstream Data” “Logfile Data”
● Who: Vendors, the institution, libraries, publishers, other third-parties
7
Someone is Collecting A LOT of
data
8
9
“If it is free, you are not the
customer. You are the
product.”4
4http://blogs.harvard.edu/futureoftheinternet/2012/03/21/meme-patrol-when-something-online-is-free-youre-not-the-customer-youre-the-product/
5http://mfeldstein.com/popular-discussion-platform-piazza-getting-pushback-selling-student-data/
6http://mfeldstein.com/piazza-response-blog-post-student-privacy/
7http://mfeldstein.com/university-responses-piazza-good-bad-web-site-changes/
12
13
A little better …
15
A little better …
Learning Data
● Just the data please
○ even if we have “ownership” we need “access”
○ logfile ‘dumps” for historic reporting (nightly, monthly, etc.)
○ realtime for early warning systems, advising, student alerts, etc.
● Standards
○ LTI - enables interoperability
○ Caliper and xAPI - defines learner activity to enable analysis across systems
The University of California should have
a say in how suppliers collect, use, and
manage our data.
● 10 Campuses
● 150 Academic Disciplines
● 238,700 Students
● 44,517 Academic Staff
Who are “we”? The UC System
University of California: Learning Data Privacy
Principles
1. Ownership: The University of California (UC), its faculty, and students retain ownership of the data and subsequent
computational transformations of the data they produce. Individual data owners have the right to determine how their data will
be used. The UC acts as stewards of data on behalf of its faculty and students.
2. Ethical Use: Learning data collection, use, and computational transformation are governed by pedagogical and instructional
concerns, with an aim toward student success through prescriptive, descriptive, or predictive methodologies. As with grades
and other sensitive data, uses of learning analytics should be pursued on a “need to know” basis.
3. Transparency: Data owners have a right to understand the specific methods and purposes for which their data are collected,
used and transformed, including what data are being transmitted to third-party service providers (and their affiliated partners)
and the details of how algorithms are applied that shape summaries, particularly outputs and visualizations.
4. Freedom of Expression: Faculty and students retain the right to communicate and engage with each other in the learning
process without the concern that their data will be mined for unintended or unknown purposes.
5. Protection: Stewards, on behalf of data owners, will ensure learning data are secure and protected in alignment with all
federal, state, and university regulations regarding secure disposition.
6. Access and Control: Data owners have the right to access their data. Given that faculty and students own their learning data
and share in its disposition, access to and ultimate authority and control of the data rests with the faculty and student owners,
and the data stewards acting on their behalf. Data retention access and control practices will be governed under UC policies
and supplier contractual agreements.
20
http://bit.ly/UCLearningDataPrivacyPrinciples
University of California:Learning Data Recommended
Practices
1. Ownership: Service providers will recognize learning data ownership and access as a right of the faculty and students.
2. Usage Right: Through a user’s profile setting, service providers will enable users to control the use of their intellectual property. Thus,
it will be the user’s choice to grant terms such as, “a royalty-free, transferable, perpetual, irrevocable, non-exclusive, worldwide license
to reproduce, modify, publish, publicly display, make derivative works.”
3. Opt-in: Other than those data elements distinctly required for instruction, where appropriate, students will have a choice about the use
of learning data collected by faculty and service providers in an "opt in" rather than "opt out" approach.
4. Interoperable Data: Service providers will provide learning data to the institution in recognized standard interoperability format(s) to
minimize integration costs, support cross-platform and cross-application uses, and promote institutional and academic analysis and
research.
5. Data without Fees: Service providers will not charge the faculty, students, or other university learning data stewards for the right of
access, including the delivery of these data to the University.
6. Transparency: Service providers will inform the UC about the learning data they collect and how these data will be used, which in the
course of an academic term shall be based on pedagogical concerns and curricular improvement.
7. Service Provider Security: All service provider platforms on which student learning data are stored will conform with UC and state
mandated security procedures governing the reporting of unexpected incidents and corrections that may occur.
8. Campus Security: UC learning data stewards will ensure that all faculty and student data are stored securely in conformance with
University data security policy. Learning data stewards will report any learning data security incidents as appropriate to faculty and
students, and will provide information about their remedy.
21
IMS Global Learning Data & Analytics Key
Principles
1. Ownership: Faculty, staff, and students generate and own their learning data. As governed by institutional policies, individuals, being
owners of the data they generate, have the right to access, port, and control the disposition of their data stored by the institution, its
service providers, and their affiliated partners.
2. Stewardship: As stewards of learning data, institutions should have a data governance plan and governance policies that protect the
data and the interests of its owners. These should transcend, but encompass, existing protocols, such as IRB.
3. Governance: Learning data use and retention will be governed by institutional policies, and faculty and students retain the right of
data access and retrieval.
4. Access: Learning data, whether generated locally or in a vendor-supplied system, is strategic to an institution’s business and
mission and must be available to the institution.
5. Interoperability: The collection, use, and access to learning data requires institutional and supplier collaboration, which is
dependent upon interoperability standards, protocols, data formats, and content to achieve institutions goals.
6. Efficacy: Learning data collection, use, and computational transformation is aimed at student and instructor success and
instructional concerns through prescriptive, descriptive, or predictive methodologies.
7. Security & Privacy: Individuals’ security and privacy relating to collecting, using, and algorithmically transforming learning data is
fundamental and must not be treated as optional. It must also be balanced with the effective use of the data.
8. Transparency: Individuals have the right to understand the specific reasons, methods, and purposes for which their learning data is
collected, used, and transformed. This includes any learning data being shared with third-party service providers and other
institutional affiliates or partners. Individuals also have the right to know how their data is transformed and/or used thru processes
such as summative or algorithmic modifications, particular outputs, and visualizations.
22
https://www.imsglobal.org/learning-data-analytics-ke
principles
We Are Not Alone...
● [2011] - Asilomar Convention for Learning Research in Higher Education - http://asilomar-highered.info/
● [2012] - Asilomar II: Student Data and Records in the Digital Era - https://sites.stanford.edu/asilomar/
● Responsible Use of Student Data in Higher Education - http://ru.stanford.edu/ (Stanford CAROL & Ithaka
S+R)
● DELICATE Framework - http://www.laceproject.eu/blog/ethics-privacy-in-learning-analytics-a-delicate-issue/
(Learning Analytics Community Exchange)
● IMS Global Learning Data & Analytics Key Principles - http://www.imsglobal.org/learning-data-analytics-key-
principles
IMS Global Learning Data & Analytics Key
Principles
https://www.imsglobal.org/learning-data-analytics-key-principles
1. Ownership: Faculty, staff, and students generate and own their learning data. As governed by institutional policies, individuals,
being owners of the data they generate, have the right to access, port, and control the disposition of their data stored by the
institution, its service providers, and their affiliated partners.
2. Stewardship: As stewards of learning data, institutions should have a data governance plan and governance policies that
protect the data and the interests of its owners. These should transcend, but encompass, existing protocols, such as IRB.
3. Governance: Learning data use and retention will be governed by institutional policies, and faculty and students retain the right
of data access and retrieval.
4. Access: Learning data, whether generated locally or in a vendor-supplied system, is strategic to an institution’s business and
mission and must be available to the institution.
5. Interoperability: The collection, use, and access to learning data requires institutional and supplier collaboration, which is
dependent upon interoperability standards, protocols, data formats, and content to achieve institutions goals.
6. Efficacy: Learning data collection, use, and computational transformation is aimed at student and instructor success and
instructional concerns through prescriptive, descriptive, or predictive methodologies.
7. Security & Privacy: Individuals’ security and privacy relating to collecting, using, and algorithmically transforming learning data
is fundamental and must not be treated as optional. It must also be balanced with the effective use of the data.
8. Transparency: Individuals have the right to understand the specific reasons, methods, and purposes for which their learning
data is collected, used, and transformed. This includes any learning data being shared with third-party service providers and
other institutional affiliates or partners. Individuals also have the right to know how their data is transformed and/or used thru
processes such as summative or algorithmic modifications, particular outputs, and visualizations.
IMS Global Learning Data & Analytics Key
Principles
https://www.imsglobal.org/learning-data-analytics-key-principles
1. Ownership: Faculty, staff, and students generate and own their learning data. As governed by institutional policies, individuals,
being owners of the data they generate, have the right to access, port, and control the disposition of their data stored by the
institution, its service providers, and their affiliated partners.
2. Stewardship: As stewards of learning data, institutions should have a data governance plan and governance policies that
protect the data and the interests of its owners. These should transcend, but encompass, existing protocols, such as IRB.
3. Governance: Learning data use and retention will be governed by institutional policies, and faculty and students retain the right
of data access and retrieval.
4. Access: Learning data, whether generated locally or in a vendor-supplied system, is strategic to an institution’s business and
mission and must be available to the institution.
5. Interoperability: The collection, use, and access to learning data requires institutional and supplier collaboration, which is
dependent upon interoperability standards, protocols, data formats, and content to achieve institutions goals.
6. Efficacy: Learning data collection, use, and computational transformation is aimed at student and instructor success and
instructional concerns through prescriptive, descriptive, or predictive methodologies.
7. Security & Privacy: Individuals’ security and privacy relating to collecting, using, and algorithmically transforming learning data
is fundamental and must not be treated as optional. It must also be balanced with the effective use of the data.
8. Transparency: Individuals have the right to understand the specific reasons, methods, and purposes for which their learning
data is collected, used, and transformed. This includes any learning data being shared with third-party service providers and
other institutional affiliates or partners. Individuals also have the right to know how their data is transformed and/or used thru
processes such as summative or algorithmic modifications, particular outputs, and visualizations.
Libraries and Learning
Data/Analytics
“Though few academic libraries are encountering it just yet, it is only a matter of time before
higher education institutions integrate learning analytics at every level of the organization.”8
“Learning analytics initiatives pose a myriad of ethical questions. For example, are institutions
who possess learning data required to act on it? Might learning data be used to “profile”
students?”8
“At institutions that have committed to a learning analytics future, librarians can also ask
questions to clarify the library’s role as well as advocate for library inclusion in learning
analytics processes.”8
8 Bell, Steven. Keeping up with … Learning Analytics. ACRL Blog. http://www.ala.org/acrl/publications/keeping_up_with/learning_analytics
9 Oakleaf, Megan. “Getting Ready and Getting Started: Academic Librarian Involvement in Institutional Learning Analytics Initiatives.” Journal of Academic Librarianship. 42(4). 2016.
jisc.ac.uk
One Castlepark, Tower Hill, Bristol BS2 0JA
customerservices@jisc.ac.uk
T 020 3697 5800
Jenn Stringer, MLIS
University of California, Berkeley

More Related Content

What's hot

UCL’s research IT management systems architecture review aligned with Open Sc...
UCL’s research IT management systems architecture review aligned with Open Sc...UCL’s research IT management systems architecture review aligned with Open Sc...
UCL’s research IT management systems architecture review aligned with Open Sc...Jisc
 
Certifying and Securing a Trusted Environment for Health Informatics Research...
Certifying and Securing a Trusted Environment for Health Informatics Research...Certifying and Securing a Trusted Environment for Health Informatics Research...
Certifying and Securing a Trusted Environment for Health Informatics Research...Jisc
 
NHS-HE forum information governance working group
NHS-HE forum information governance working groupNHS-HE forum information governance working group
NHS-HE forum information governance working groupJisc
 
Connected health cities
Connected health citiesConnected health cities
Connected health citiesJisc
 
Why science needs open data – Jisc and CNI conference 10 July 2014
Why science needs open data – Jisc and CNI conference 10 July 2014Why science needs open data – Jisc and CNI conference 10 July 2014
Why science needs open data – Jisc and CNI conference 10 July 2014Jisc
 
Infrastructure requirements for open scholarship – Jisc and CNI conference 10...
Infrastructure requirements for open scholarship – Jisc and CNI conference 10...Infrastructure requirements for open scholarship – Jisc and CNI conference 10...
Infrastructure requirements for open scholarship – Jisc and CNI conference 10...Jisc
 
DAF Survey Results, research data network
DAF Survey Results, research data networkDAF Survey Results, research data network
DAF Survey Results, research data networkJisc RDM
 
Griffiths lace workshop-eden-2016
Griffiths lace workshop-eden-2016Griffiths lace workshop-eden-2016
Griffiths lace workshop-eden-2016Dai Griffiths
 
NHS SE presentation
NHS SE presentationNHS SE presentation
NHS SE presentationJisc
 
Lessons from Journal Research Data Policy Registry Pilot
Lessons from Journal Research Data Policy Registry PilotLessons from Journal Research Data Policy Registry Pilot
Lessons from Journal Research Data Policy Registry PilotJisc RDM
 
Lessons from the UK: Data access, patient trust & real-world impact with heal...
Lessons from the UK: Data access, patient trust & real-world impact with heal...Lessons from the UK: Data access, patient trust & real-world impact with heal...
Lessons from the UK: Data access, patient trust & real-world impact with heal...Varsha Khodiyar
 
Towards Open Research
Towards Open ResearchTowards Open Research
Towards Open ResearchJisc RDM
 
H2020 open-data-pilot
H2020 open-data-pilotH2020 open-data-pilot
H2020 open-data-pilotSarah Jones
 
Academy of Social Sciences chief execs - April 2011
Academy of Social Sciences chief execs - April 2011Academy of Social Sciences chief execs - April 2011
Academy of Social Sciences chief execs - April 2011Jisc
 
Architecture and Standards
Architecture and StandardsArchitecture and Standards
Architecture and StandardsARDC
 
Grampian safe haven, research data network
Grampian safe haven, research data networkGrampian safe haven, research data network
Grampian safe haven, research data networkJisc RDM
 
Workshop intro090314
Workshop intro090314Workshop intro090314
Workshop intro090314Philip Bourne
 
RDAP 16: Sustainability of data infrastructure: The history of science scienc...
RDAP 16: Sustainability of data infrastructure: The history of science scienc...RDAP 16: Sustainability of data infrastructure: The history of science scienc...
RDAP 16: Sustainability of data infrastructure: The history of science scienc...ASIS&T
 

What's hot (20)

UCL’s research IT management systems architecture review aligned with Open Sc...
UCL’s research IT management systems architecture review aligned with Open Sc...UCL’s research IT management systems architecture review aligned with Open Sc...
UCL’s research IT management systems architecture review aligned with Open Sc...
 
Certifying and Securing a Trusted Environment for Health Informatics Research...
Certifying and Securing a Trusted Environment for Health Informatics Research...Certifying and Securing a Trusted Environment for Health Informatics Research...
Certifying and Securing a Trusted Environment for Health Informatics Research...
 
NHS-HE forum information governance working group
NHS-HE forum information governance working groupNHS-HE forum information governance working group
NHS-HE forum information governance working group
 
Connected health cities
Connected health citiesConnected health cities
Connected health cities
 
Why science needs open data – Jisc and CNI conference 10 July 2014
Why science needs open data – Jisc and CNI conference 10 July 2014Why science needs open data – Jisc and CNI conference 10 July 2014
Why science needs open data – Jisc and CNI conference 10 July 2014
 
Infrastructure requirements for open scholarship – Jisc and CNI conference 10...
Infrastructure requirements for open scholarship – Jisc and CNI conference 10...Infrastructure requirements for open scholarship – Jisc and CNI conference 10...
Infrastructure requirements for open scholarship – Jisc and CNI conference 10...
 
DAF Survey Results, research data network
DAF Survey Results, research data networkDAF Survey Results, research data network
DAF Survey Results, research data network
 
Griffiths lace workshop-eden-2016
Griffiths lace workshop-eden-2016Griffiths lace workshop-eden-2016
Griffiths lace workshop-eden-2016
 
NHS SE presentation
NHS SE presentationNHS SE presentation
NHS SE presentation
 
UKSG 2018 Breakout - Setting your cites to open I4OC - Maccallum
UKSG 2018 Breakout - Setting your cites to open I4OC - MaccallumUKSG 2018 Breakout - Setting your cites to open I4OC - Maccallum
UKSG 2018 Breakout - Setting your cites to open I4OC - Maccallum
 
Lessons from Journal Research Data Policy Registry Pilot
Lessons from Journal Research Data Policy Registry PilotLessons from Journal Research Data Policy Registry Pilot
Lessons from Journal Research Data Policy Registry Pilot
 
Lessons from the UK: Data access, patient trust & real-world impact with heal...
Lessons from the UK: Data access, patient trust & real-world impact with heal...Lessons from the UK: Data access, patient trust & real-world impact with heal...
Lessons from the UK: Data access, patient trust & real-world impact with heal...
 
Towards Open Research
Towards Open ResearchTowards Open Research
Towards Open Research
 
H2020 open-data-pilot
H2020 open-data-pilotH2020 open-data-pilot
H2020 open-data-pilot
 
Academy of Social Sciences chief execs - April 2011
Academy of Social Sciences chief execs - April 2011Academy of Social Sciences chief execs - April 2011
Academy of Social Sciences chief execs - April 2011
 
Architecture and Standards
Architecture and StandardsArchitecture and Standards
Architecture and Standards
 
Grampian safe haven, research data network
Grampian safe haven, research data networkGrampian safe haven, research data network
Grampian safe haven, research data network
 
Tijerina-RDA-NISO-Task Groups-sept11
Tijerina-RDA-NISO-Task Groups-sept11Tijerina-RDA-NISO-Task Groups-sept11
Tijerina-RDA-NISO-Task Groups-sept11
 
Workshop intro090314
Workshop intro090314Workshop intro090314
Workshop intro090314
 
RDAP 16: Sustainability of data infrastructure: The history of science scienc...
RDAP 16: Sustainability of data infrastructure: The history of science scienc...RDAP 16: Sustainability of data infrastructure: The history of science scienc...
RDAP 16: Sustainability of data infrastructure: The history of science scienc...
 

Similar to Addressing the wicked problem of learning data privacy though principle and practice

Aim analytics panel (2017 Fall): Privacy & ethics
Aim analytics panel (2017 Fall): Privacy & ethicsAim analytics panel (2017 Fall): Privacy & ethics
Aim analytics panel (2017 Fall): Privacy & ethicsSungjin Nam
 
Researching Data Privacy in eLearning
Researching Data Privacy in eLearningResearching Data Privacy in eLearning
Researching Data Privacy in eLearningGabriela Grosseck
 
Researching Data Privacy in eLearning
Researching Data Privacy in eLearningResearching Data Privacy in eLearning
Researching Data Privacy in eLearningMalinka Ivanova
 
Data security issues, ethical issues and challenges to privacy in knowledge-i...
Data security issues, ethical issues and challenges to privacy in knowledge-i...Data security issues, ethical issues and challenges to privacy in knowledge-i...
Data security issues, ethical issues and challenges to privacy in knowledge-i...Tore Hoel
 
Student privacy self-management: Implications for learning analytics
Student privacy self-management: Implications for learning analyticsStudent privacy self-management: Implications for learning analytics
Student privacy self-management: Implications for learning analyticsUniversity of South Africa (Unisa)
 
Library Connect Webinar - Data Sharing
Library Connect Webinar - Data Sharing Library Connect Webinar - Data Sharing
Library Connect Webinar - Data Sharing Library_Connect
 
Learning analytics at the intersections of student trust, disclosure and benefit
Learning analytics at the intersections of student trust, disclosure and benefitLearning analytics at the intersections of student trust, disclosure and benefit
Learning analytics at the intersections of student trust, disclosure and benefitUniversity of South Africa (Unisa)
 
Exploring learning analytics: Jisc learning analytics service
Exploring learning analytics: Jisc learning analytics serviceExploring learning analytics: Jisc learning analytics service
Exploring learning analytics: Jisc learning analytics serviceJisc
 
Læringsanalyse - hva er det?
Læringsanalyse - hva er det?Læringsanalyse - hva er det?
Læringsanalyse - hva er det?Tore Hoel
 
Student data privacy manifesto
Student data privacy manifestoStudent data privacy manifesto
Student data privacy manifestoCaitlin Sharp
 
Jisc learning analytics service core slides
Jisc learning analytics service core slidesJisc learning analytics service core slides
Jisc learning analytics service core slidesPaul Bailey
 
Exploring learning analytics
 Exploring learning analytics Exploring learning analytics
Exploring learning analyticsJisc
 
Data Protection by Design and Default for Learning Analytics
Data Protection by Design and Default for Learning AnalyticsData Protection by Design and Default for Learning Analytics
Data Protection by Design and Default for Learning AnalyticsTore Hoel
 
Research Ethics and Use of Restricted Access Data
Research Ethics and Use of Restricted Access DataResearch Ethics and Use of Restricted Access Data
Research Ethics and Use of Restricted Access Datalibbiestephenson
 
A Study on Data Mining Techniques, Concepts and its Application in Higher Edu...
A Study on Data Mining Techniques, Concepts and its Application in Higher Edu...A Study on Data Mining Techniques, Concepts and its Application in Higher Edu...
A Study on Data Mining Techniques, Concepts and its Application in Higher Edu...IRJET Journal
 
144 presentation iee_tel2021
144 presentation iee_tel2021144 presentation iee_tel2021
144 presentation iee_tel2021Malinka Ivanova
 
What is Student Information System_ Purpose & Features _ Proctur.pdf
What is Student Information System_ Purpose & Features _ Proctur.pdfWhat is Student Information System_ Purpose & Features _ Proctur.pdf
What is Student Information System_ Purpose & Features _ Proctur.pdfProctur
 
Munassir etec647 e presentation
Munassir etec647 e presentationMunassir etec647 e presentation
Munassir etec647 e presentationMunassir Alhamami
 
The ethics of MOOC research: why we should involve learners
The ethics of MOOC research: why we should involve learnersThe ethics of MOOC research: why we should involve learners
The ethics of MOOC research: why we should involve learnersRebecca Ferguson
 
Krakow presentation speak_appsmngm_final
Krakow presentation speak_appsmngm_finalKrakow presentation speak_appsmngm_final
Krakow presentation speak_appsmngm_finalSpeakApps Project
 

Similar to Addressing the wicked problem of learning data privacy though principle and practice (20)

Aim analytics panel (2017 Fall): Privacy & ethics
Aim analytics panel (2017 Fall): Privacy & ethicsAim analytics panel (2017 Fall): Privacy & ethics
Aim analytics panel (2017 Fall): Privacy & ethics
 
Researching Data Privacy in eLearning
Researching Data Privacy in eLearningResearching Data Privacy in eLearning
Researching Data Privacy in eLearning
 
Researching Data Privacy in eLearning
Researching Data Privacy in eLearningResearching Data Privacy in eLearning
Researching Data Privacy in eLearning
 
Data security issues, ethical issues and challenges to privacy in knowledge-i...
Data security issues, ethical issues and challenges to privacy in knowledge-i...Data security issues, ethical issues and challenges to privacy in knowledge-i...
Data security issues, ethical issues and challenges to privacy in knowledge-i...
 
Student privacy self-management: Implications for learning analytics
Student privacy self-management: Implications for learning analyticsStudent privacy self-management: Implications for learning analytics
Student privacy self-management: Implications for learning analytics
 
Library Connect Webinar - Data Sharing
Library Connect Webinar - Data Sharing Library Connect Webinar - Data Sharing
Library Connect Webinar - Data Sharing
 
Learning analytics at the intersections of student trust, disclosure and benefit
Learning analytics at the intersections of student trust, disclosure and benefitLearning analytics at the intersections of student trust, disclosure and benefit
Learning analytics at the intersections of student trust, disclosure and benefit
 
Exploring learning analytics: Jisc learning analytics service
Exploring learning analytics: Jisc learning analytics serviceExploring learning analytics: Jisc learning analytics service
Exploring learning analytics: Jisc learning analytics service
 
Læringsanalyse - hva er det?
Læringsanalyse - hva er det?Læringsanalyse - hva er det?
Læringsanalyse - hva er det?
 
Student data privacy manifesto
Student data privacy manifestoStudent data privacy manifesto
Student data privacy manifesto
 
Jisc learning analytics service core slides
Jisc learning analytics service core slidesJisc learning analytics service core slides
Jisc learning analytics service core slides
 
Exploring learning analytics
 Exploring learning analytics Exploring learning analytics
Exploring learning analytics
 
Data Protection by Design and Default for Learning Analytics
Data Protection by Design and Default for Learning AnalyticsData Protection by Design and Default for Learning Analytics
Data Protection by Design and Default for Learning Analytics
 
Research Ethics and Use of Restricted Access Data
Research Ethics and Use of Restricted Access DataResearch Ethics and Use of Restricted Access Data
Research Ethics and Use of Restricted Access Data
 
A Study on Data Mining Techniques, Concepts and its Application in Higher Edu...
A Study on Data Mining Techniques, Concepts and its Application in Higher Edu...A Study on Data Mining Techniques, Concepts and its Application in Higher Edu...
A Study on Data Mining Techniques, Concepts and its Application in Higher Edu...
 
144 presentation iee_tel2021
144 presentation iee_tel2021144 presentation iee_tel2021
144 presentation iee_tel2021
 
What is Student Information System_ Purpose & Features _ Proctur.pdf
What is Student Information System_ Purpose & Features _ Proctur.pdfWhat is Student Information System_ Purpose & Features _ Proctur.pdf
What is Student Information System_ Purpose & Features _ Proctur.pdf
 
Munassir etec647 e presentation
Munassir etec647 e presentationMunassir etec647 e presentation
Munassir etec647 e presentation
 
The ethics of MOOC research: why we should involve learners
The ethics of MOOC research: why we should involve learnersThe ethics of MOOC research: why we should involve learners
The ethics of MOOC research: why we should involve learners
 
Krakow presentation speak_appsmngm_final
Krakow presentation speak_appsmngm_finalKrakow presentation speak_appsmngm_final
Krakow presentation speak_appsmngm_final
 

More from Jisc

Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxJisc
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jisc
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxJisc
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Jisc
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 
International students’ digital experience: understanding and mitigating the ...
International students’ digital experience: understanding and mitigating the ...International students’ digital experience: understanding and mitigating the ...
International students’ digital experience: understanding and mitigating the ...Jisc
 
Digital Storytelling Community Launch!.pptx
Digital Storytelling Community Launch!.pptxDigital Storytelling Community Launch!.pptx
Digital Storytelling Community Launch!.pptxJisc
 
Open Access book publishing understanding your options (1).pptx
Open Access book publishing understanding your options (1).pptxOpen Access book publishing understanding your options (1).pptx
Open Access book publishing understanding your options (1).pptxJisc
 
Scottish Universities Press supporting authors with requirements for open acc...
Scottish Universities Press supporting authors with requirements for open acc...Scottish Universities Press supporting authors with requirements for open acc...
Scottish Universities Press supporting authors with requirements for open acc...Jisc
 
How Bloomsbury is supporting authors with UKRI long-form open access requirem...
How Bloomsbury is supporting authors with UKRI long-form open access requirem...How Bloomsbury is supporting authors with UKRI long-form open access requirem...
How Bloomsbury is supporting authors with UKRI long-form open access requirem...Jisc
 
Jisc Northern Ireland Strategy Forum 2023
Jisc Northern Ireland Strategy Forum 2023Jisc Northern Ireland Strategy Forum 2023
Jisc Northern Ireland Strategy Forum 2023Jisc
 
Jisc Scotland Strategy Forum 2023
Jisc Scotland Strategy Forum 2023Jisc Scotland Strategy Forum 2023
Jisc Scotland Strategy Forum 2023Jisc
 
Jisc stakeholder strategic update 2023
Jisc stakeholder strategic update 2023Jisc stakeholder strategic update 2023
Jisc stakeholder strategic update 2023Jisc
 
JISC Presentation.pptx
JISC Presentation.pptxJISC Presentation.pptx
JISC Presentation.pptxJisc
 
Community-led Open Access Publishing webinar.pptx
Community-led Open Access Publishing webinar.pptxCommunity-led Open Access Publishing webinar.pptx
Community-led Open Access Publishing webinar.pptxJisc
 
The Open Access Community Framework (OACF) 2023 (1).pptx
The Open Access Community Framework (OACF) 2023 (1).pptxThe Open Access Community Framework (OACF) 2023 (1).pptx
The Open Access Community Framework (OACF) 2023 (1).pptxJisc
 
Are we onboard yet University of Sussex.pptx
Are we onboard yet University of Sussex.pptxAre we onboard yet University of Sussex.pptx
Are we onboard yet University of Sussex.pptxJisc
 
JiscOAWeek_LAIR_slides_October2023.pptx
JiscOAWeek_LAIR_slides_October2023.pptxJiscOAWeek_LAIR_slides_October2023.pptx
JiscOAWeek_LAIR_slides_October2023.pptxJisc
 
UWP OA Week Presentation (1).pptx
UWP OA Week Presentation (1).pptxUWP OA Week Presentation (1).pptx
UWP OA Week Presentation (1).pptxJisc
 
An introduction to Cyber Essentials
An introduction to Cyber EssentialsAn introduction to Cyber Essentials
An introduction to Cyber EssentialsJisc
 

More from Jisc (20)

Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
International students’ digital experience: understanding and mitigating the ...
International students’ digital experience: understanding and mitigating the ...International students’ digital experience: understanding and mitigating the ...
International students’ digital experience: understanding and mitigating the ...
 
Digital Storytelling Community Launch!.pptx
Digital Storytelling Community Launch!.pptxDigital Storytelling Community Launch!.pptx
Digital Storytelling Community Launch!.pptx
 
Open Access book publishing understanding your options (1).pptx
Open Access book publishing understanding your options (1).pptxOpen Access book publishing understanding your options (1).pptx
Open Access book publishing understanding your options (1).pptx
 
Scottish Universities Press supporting authors with requirements for open acc...
Scottish Universities Press supporting authors with requirements for open acc...Scottish Universities Press supporting authors with requirements for open acc...
Scottish Universities Press supporting authors with requirements for open acc...
 
How Bloomsbury is supporting authors with UKRI long-form open access requirem...
How Bloomsbury is supporting authors with UKRI long-form open access requirem...How Bloomsbury is supporting authors with UKRI long-form open access requirem...
How Bloomsbury is supporting authors with UKRI long-form open access requirem...
 
Jisc Northern Ireland Strategy Forum 2023
Jisc Northern Ireland Strategy Forum 2023Jisc Northern Ireland Strategy Forum 2023
Jisc Northern Ireland Strategy Forum 2023
 
Jisc Scotland Strategy Forum 2023
Jisc Scotland Strategy Forum 2023Jisc Scotland Strategy Forum 2023
Jisc Scotland Strategy Forum 2023
 
Jisc stakeholder strategic update 2023
Jisc stakeholder strategic update 2023Jisc stakeholder strategic update 2023
Jisc stakeholder strategic update 2023
 
JISC Presentation.pptx
JISC Presentation.pptxJISC Presentation.pptx
JISC Presentation.pptx
 
Community-led Open Access Publishing webinar.pptx
Community-led Open Access Publishing webinar.pptxCommunity-led Open Access Publishing webinar.pptx
Community-led Open Access Publishing webinar.pptx
 
The Open Access Community Framework (OACF) 2023 (1).pptx
The Open Access Community Framework (OACF) 2023 (1).pptxThe Open Access Community Framework (OACF) 2023 (1).pptx
The Open Access Community Framework (OACF) 2023 (1).pptx
 
Are we onboard yet University of Sussex.pptx
Are we onboard yet University of Sussex.pptxAre we onboard yet University of Sussex.pptx
Are we onboard yet University of Sussex.pptx
 
JiscOAWeek_LAIR_slides_October2023.pptx
JiscOAWeek_LAIR_slides_October2023.pptxJiscOAWeek_LAIR_slides_October2023.pptx
JiscOAWeek_LAIR_slides_October2023.pptx
 
UWP OA Week Presentation (1).pptx
UWP OA Week Presentation (1).pptxUWP OA Week Presentation (1).pptx
UWP OA Week Presentation (1).pptx
 
An introduction to Cyber Essentials
An introduction to Cyber EssentialsAn introduction to Cyber Essentials
An introduction to Cyber Essentials
 

Recently uploaded

Call Girls Bannerghatta Road Just Call 👗 7737669865 👗 Top Class Call Girl Ser...
Call Girls Bannerghatta Road Just Call 👗 7737669865 👗 Top Class Call Girl Ser...Call Girls Bannerghatta Road Just Call 👗 7737669865 👗 Top Class Call Girl Ser...
Call Girls Bannerghatta Road Just Call 👗 7737669865 👗 Top Class Call Girl Ser...amitlee9823
 
ELKO dropshipping via API with DroFx.pptx
ELKO dropshipping via API with DroFx.pptxELKO dropshipping via API with DroFx.pptx
ELKO dropshipping via API with DroFx.pptxolyaivanovalion
 
Smarteg dropshipping via API with DroFx.pptx
Smarteg dropshipping via API with DroFx.pptxSmarteg dropshipping via API with DroFx.pptx
Smarteg dropshipping via API with DroFx.pptxolyaivanovalion
 
April 2024 - Crypto Market Report's Analysis
April 2024 - Crypto Market Report's AnalysisApril 2024 - Crypto Market Report's Analysis
April 2024 - Crypto Market Report's Analysismanisha194592
 
Discover Why Less is More in B2B Research
Discover Why Less is More in B2B ResearchDiscover Why Less is More in B2B Research
Discover Why Less is More in B2B Researchmichael115558
 
Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...
Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...
Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...Valters Lauzums
 
VidaXL dropshipping via API with DroFx.pptx
VidaXL dropshipping via API with DroFx.pptxVidaXL dropshipping via API with DroFx.pptx
VidaXL dropshipping via API with DroFx.pptxolyaivanovalion
 
Call Girls Indiranagar Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
Call Girls Indiranagar Just Call 👗 7737669865 👗 Top Class Call Girl Service B...Call Girls Indiranagar Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
Call Girls Indiranagar Just Call 👗 7737669865 👗 Top Class Call Girl Service B...amitlee9823
 
FESE Capital Markets Fact Sheet 2024 Q1.pdf
FESE Capital Markets Fact Sheet 2024 Q1.pdfFESE Capital Markets Fact Sheet 2024 Q1.pdf
FESE Capital Markets Fact Sheet 2024 Q1.pdfMarinCaroMartnezBerg
 
Call Girls Jalahalli Just Call 👗 7737669865 👗 Top Class Call Girl Service Ban...
Call Girls Jalahalli Just Call 👗 7737669865 👗 Top Class Call Girl Service Ban...Call Girls Jalahalli Just Call 👗 7737669865 👗 Top Class Call Girl Service Ban...
Call Girls Jalahalli Just Call 👗 7737669865 👗 Top Class Call Girl Service Ban...amitlee9823
 
Vip Mumbai Call Girls Marol Naka Call On 9920725232 With Body to body massage...
Vip Mumbai Call Girls Marol Naka Call On 9920725232 With Body to body massage...Vip Mumbai Call Girls Marol Naka Call On 9920725232 With Body to body massage...
Vip Mumbai Call Girls Marol Naka Call On 9920725232 With Body to body massage...amitlee9823
 
ALSO dropshipping via API with DroFx.pptx
ALSO dropshipping via API with DroFx.pptxALSO dropshipping via API with DroFx.pptx
ALSO dropshipping via API with DroFx.pptxolyaivanovalion
 
Jual Obat Aborsi Surabaya ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Surabaya ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Surabaya ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Surabaya ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...ZurliaSoop
 
Al Barsha Escorts $#$ O565212860 $#$ Escort Service In Al Barsha
Al Barsha Escorts $#$ O565212860 $#$ Escort Service In Al BarshaAl Barsha Escorts $#$ O565212860 $#$ Escort Service In Al Barsha
Al Barsha Escorts $#$ O565212860 $#$ Escort Service In Al BarshaAroojKhan71
 
Generative AI on Enterprise Cloud with NiFi and Milvus
Generative AI on Enterprise Cloud with NiFi and MilvusGenerative AI on Enterprise Cloud with NiFi and Milvus
Generative AI on Enterprise Cloud with NiFi and MilvusTimothy Spann
 
Mg Road Call Girls Service: 🍓 7737669865 🍓 High Profile Model Escorts | Banga...
Mg Road Call Girls Service: 🍓 7737669865 🍓 High Profile Model Escorts | Banga...Mg Road Call Girls Service: 🍓 7737669865 🍓 High Profile Model Escorts | Banga...
Mg Road Call Girls Service: 🍓 7737669865 🍓 High Profile Model Escorts | Banga...amitlee9823
 
Call Girls Begur Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Begur Just Call 👗 7737669865 👗 Top Class Call Girl Service BangaloreCall Girls Begur Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Begur Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangaloreamitlee9823
 

Recently uploaded (20)

Anomaly detection and data imputation within time series
Anomaly detection and data imputation within time seriesAnomaly detection and data imputation within time series
Anomaly detection and data imputation within time series
 
Call Girls Bannerghatta Road Just Call 👗 7737669865 👗 Top Class Call Girl Ser...
Call Girls Bannerghatta Road Just Call 👗 7737669865 👗 Top Class Call Girl Ser...Call Girls Bannerghatta Road Just Call 👗 7737669865 👗 Top Class Call Girl Ser...
Call Girls Bannerghatta Road Just Call 👗 7737669865 👗 Top Class Call Girl Ser...
 
ELKO dropshipping via API with DroFx.pptx
ELKO dropshipping via API with DroFx.pptxELKO dropshipping via API with DroFx.pptx
ELKO dropshipping via API with DroFx.pptx
 
Smarteg dropshipping via API with DroFx.pptx
Smarteg dropshipping via API with DroFx.pptxSmarteg dropshipping via API with DroFx.pptx
Smarteg dropshipping via API with DroFx.pptx
 
April 2024 - Crypto Market Report's Analysis
April 2024 - Crypto Market Report's AnalysisApril 2024 - Crypto Market Report's Analysis
April 2024 - Crypto Market Report's Analysis
 
Discover Why Less is More in B2B Research
Discover Why Less is More in B2B ResearchDiscover Why Less is More in B2B Research
Discover Why Less is More in B2B Research
 
Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...
Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...
Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...
 
VidaXL dropshipping via API with DroFx.pptx
VidaXL dropshipping via API with DroFx.pptxVidaXL dropshipping via API with DroFx.pptx
VidaXL dropshipping via API with DroFx.pptx
 
Call Girls Indiranagar Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
Call Girls Indiranagar Just Call 👗 7737669865 👗 Top Class Call Girl Service B...Call Girls Indiranagar Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
Call Girls Indiranagar Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
 
FESE Capital Markets Fact Sheet 2024 Q1.pdf
FESE Capital Markets Fact Sheet 2024 Q1.pdfFESE Capital Markets Fact Sheet 2024 Q1.pdf
FESE Capital Markets Fact Sheet 2024 Q1.pdf
 
Call Girls Jalahalli Just Call 👗 7737669865 👗 Top Class Call Girl Service Ban...
Call Girls Jalahalli Just Call 👗 7737669865 👗 Top Class Call Girl Service Ban...Call Girls Jalahalli Just Call 👗 7737669865 👗 Top Class Call Girl Service Ban...
Call Girls Jalahalli Just Call 👗 7737669865 👗 Top Class Call Girl Service Ban...
 
Vip Mumbai Call Girls Marol Naka Call On 9920725232 With Body to body massage...
Vip Mumbai Call Girls Marol Naka Call On 9920725232 With Body to body massage...Vip Mumbai Call Girls Marol Naka Call On 9920725232 With Body to body massage...
Vip Mumbai Call Girls Marol Naka Call On 9920725232 With Body to body massage...
 
Call Girls In Shalimar Bagh ( Delhi) 9953330565 Escorts Service
Call Girls In Shalimar Bagh ( Delhi) 9953330565 Escorts ServiceCall Girls In Shalimar Bagh ( Delhi) 9953330565 Escorts Service
Call Girls In Shalimar Bagh ( Delhi) 9953330565 Escorts Service
 
(NEHA) Call Girls Katra Call Now 8617697112 Katra Escorts 24x7
(NEHA) Call Girls Katra Call Now 8617697112 Katra Escorts 24x7(NEHA) Call Girls Katra Call Now 8617697112 Katra Escorts 24x7
(NEHA) Call Girls Katra Call Now 8617697112 Katra Escorts 24x7
 
ALSO dropshipping via API with DroFx.pptx
ALSO dropshipping via API with DroFx.pptxALSO dropshipping via API with DroFx.pptx
ALSO dropshipping via API with DroFx.pptx
 
Jual Obat Aborsi Surabaya ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Surabaya ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Surabaya ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Surabaya ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Al Barsha Escorts $#$ O565212860 $#$ Escort Service In Al Barsha
Al Barsha Escorts $#$ O565212860 $#$ Escort Service In Al BarshaAl Barsha Escorts $#$ O565212860 $#$ Escort Service In Al Barsha
Al Barsha Escorts $#$ O565212860 $#$ Escort Service In Al Barsha
 
Generative AI on Enterprise Cloud with NiFi and Milvus
Generative AI on Enterprise Cloud with NiFi and MilvusGenerative AI on Enterprise Cloud with NiFi and Milvus
Generative AI on Enterprise Cloud with NiFi and Milvus
 
Mg Road Call Girls Service: 🍓 7737669865 🍓 High Profile Model Escorts | Banga...
Mg Road Call Girls Service: 🍓 7737669865 🍓 High Profile Model Escorts | Banga...Mg Road Call Girls Service: 🍓 7737669865 🍓 High Profile Model Escorts | Banga...
Mg Road Call Girls Service: 🍓 7737669865 🍓 High Profile Model Escorts | Banga...
 
Call Girls Begur Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Begur Just Call 👗 7737669865 👗 Top Class Call Girl Service BangaloreCall Girls Begur Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Begur Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
 

Addressing the wicked problem of learning data privacy though principle and practice

  • 2. The Wicked Problem of Learning Data Privacy Jenn Stringer, MLIS University of California, Berkeley IMS Global: Samantha Birk, IMS Global, John Fritz, University of Maryland, Baltimore County, Oliver Heyer, University of California, Berkeley, Virginia Lacefield, University of Kentucky, Virginia Lacefield, University of Kentucky, Adam Recktenwald, University of Kentucky, Marianne Schroeder, University of British Columbia University of California (UC): Mary Ellen Kreher, UC Office of the President, Jim Phillips UC, Santa Cruz, James Williamson, UC, Los Angeles
  • 3. Academic Data Personally identifiable records, e.g, transcripts (course work, GPA, major), enrollments, academic plan, SAT scores etc. Student Information & Advising Systems Learning Data Personally identifiable user activity, e.g., Page views, Discussion posts, Quiz responses, Video views etc. recorded in LMS’s and other 3rd party learning applications Learning Record Store Institutional Data Aggregate, often deidentified, historical records e.g. Graduation rates, yield, application data, demographics, race/ethnicity Enterprise Data Warehouse Learning Data in Context 3 “Learning data refers to data generated by students, faculty, and/or staff that relates to and documents the teaching and learning experience and academic achievement. It can be used alone or combined with the student record and other data points to support student success and research.” 1 1 https://www.imsglobal.org/learning-data-analytics-key-principles
  • 4. Learning Analytics Defined “Learning analytics is the measurement, collection, analysis and reporting of data about learners and their contexts, for purposes of understanding and optimising learning and the environments in which it occurs.”2 21st International Conference of Learning Analytics & Knowledge, Banff, Alberta 2011
  • 5. ● increase ability to make institutional decisions ● impact student outcomes ● empower students to make changes to their behavior that positively affects their learning ● enable faculty to support students and make changes to their courses based on data ● support faculty teaching and pedagogy ● support educational research Why do we care?
  • 6. Learning Data ● “Old Days” ○ local hosting meant local logs ○ ad-hoc reporting mainly for systems issues ● “Cloud SaaS” ○ logs not local and not accessible ○ vendors use to improve systems and troubleshoot issues ● Contracts ○ if we have them -- not always specific about ownership of this kind of data ○ they do have security and privacy language ● No Contract? ○ goodluck! - at the whim of the third party provider no security/privacy guarantees
  • 7. ● What: “ Clickstream Data” “Logfile Data” ● Who: Vendors, the institution, libraries, publishers, other third-parties 7 Someone is Collecting A LOT of data
  • 8. 8
  • 9. 9
  • 10. “If it is free, you are not the customer. You are the product.”4 4http://blogs.harvard.edu/futureoftheinternet/2012/03/21/meme-patrol-when-something-online-is-free-youre-not-the-customer-youre-the-product/
  • 12. 12
  • 13. 13
  • 15. 15
  • 17. Learning Data ● Just the data please ○ even if we have “ownership” we need “access” ○ logfile ‘dumps” for historic reporting (nightly, monthly, etc.) ○ realtime for early warning systems, advising, student alerts, etc. ● Standards ○ LTI - enables interoperability ○ Caliper and xAPI - defines learner activity to enable analysis across systems
  • 18. The University of California should have a say in how suppliers collect, use, and manage our data.
  • 19. ● 10 Campuses ● 150 Academic Disciplines ● 238,700 Students ● 44,517 Academic Staff Who are “we”? The UC System
  • 20. University of California: Learning Data Privacy Principles 1. Ownership: The University of California (UC), its faculty, and students retain ownership of the data and subsequent computational transformations of the data they produce. Individual data owners have the right to determine how their data will be used. The UC acts as stewards of data on behalf of its faculty and students. 2. Ethical Use: Learning data collection, use, and computational transformation are governed by pedagogical and instructional concerns, with an aim toward student success through prescriptive, descriptive, or predictive methodologies. As with grades and other sensitive data, uses of learning analytics should be pursued on a “need to know” basis. 3. Transparency: Data owners have a right to understand the specific methods and purposes for which their data are collected, used and transformed, including what data are being transmitted to third-party service providers (and their affiliated partners) and the details of how algorithms are applied that shape summaries, particularly outputs and visualizations. 4. Freedom of Expression: Faculty and students retain the right to communicate and engage with each other in the learning process without the concern that their data will be mined for unintended or unknown purposes. 5. Protection: Stewards, on behalf of data owners, will ensure learning data are secure and protected in alignment with all federal, state, and university regulations regarding secure disposition. 6. Access and Control: Data owners have the right to access their data. Given that faculty and students own their learning data and share in its disposition, access to and ultimate authority and control of the data rests with the faculty and student owners, and the data stewards acting on their behalf. Data retention access and control practices will be governed under UC policies and supplier contractual agreements. 20 http://bit.ly/UCLearningDataPrivacyPrinciples
  • 21. University of California:Learning Data Recommended Practices 1. Ownership: Service providers will recognize learning data ownership and access as a right of the faculty and students. 2. Usage Right: Through a user’s profile setting, service providers will enable users to control the use of their intellectual property. Thus, it will be the user’s choice to grant terms such as, “a royalty-free, transferable, perpetual, irrevocable, non-exclusive, worldwide license to reproduce, modify, publish, publicly display, make derivative works.” 3. Opt-in: Other than those data elements distinctly required for instruction, where appropriate, students will have a choice about the use of learning data collected by faculty and service providers in an "opt in" rather than "opt out" approach. 4. Interoperable Data: Service providers will provide learning data to the institution in recognized standard interoperability format(s) to minimize integration costs, support cross-platform and cross-application uses, and promote institutional and academic analysis and research. 5. Data without Fees: Service providers will not charge the faculty, students, or other university learning data stewards for the right of access, including the delivery of these data to the University. 6. Transparency: Service providers will inform the UC about the learning data they collect and how these data will be used, which in the course of an academic term shall be based on pedagogical concerns and curricular improvement. 7. Service Provider Security: All service provider platforms on which student learning data are stored will conform with UC and state mandated security procedures governing the reporting of unexpected incidents and corrections that may occur. 8. Campus Security: UC learning data stewards will ensure that all faculty and student data are stored securely in conformance with University data security policy. Learning data stewards will report any learning data security incidents as appropriate to faculty and students, and will provide information about their remedy. 21
  • 22. IMS Global Learning Data & Analytics Key Principles 1. Ownership: Faculty, staff, and students generate and own their learning data. As governed by institutional policies, individuals, being owners of the data they generate, have the right to access, port, and control the disposition of their data stored by the institution, its service providers, and their affiliated partners. 2. Stewardship: As stewards of learning data, institutions should have a data governance plan and governance policies that protect the data and the interests of its owners. These should transcend, but encompass, existing protocols, such as IRB. 3. Governance: Learning data use and retention will be governed by institutional policies, and faculty and students retain the right of data access and retrieval. 4. Access: Learning data, whether generated locally or in a vendor-supplied system, is strategic to an institution’s business and mission and must be available to the institution. 5. Interoperability: The collection, use, and access to learning data requires institutional and supplier collaboration, which is dependent upon interoperability standards, protocols, data formats, and content to achieve institutions goals. 6. Efficacy: Learning data collection, use, and computational transformation is aimed at student and instructor success and instructional concerns through prescriptive, descriptive, or predictive methodologies. 7. Security & Privacy: Individuals’ security and privacy relating to collecting, using, and algorithmically transforming learning data is fundamental and must not be treated as optional. It must also be balanced with the effective use of the data. 8. Transparency: Individuals have the right to understand the specific reasons, methods, and purposes for which their learning data is collected, used, and transformed. This includes any learning data being shared with third-party service providers and other institutional affiliates or partners. Individuals also have the right to know how their data is transformed and/or used thru processes such as summative or algorithmic modifications, particular outputs, and visualizations. 22 https://www.imsglobal.org/learning-data-analytics-ke principles
  • 23. We Are Not Alone... ● [2011] - Asilomar Convention for Learning Research in Higher Education - http://asilomar-highered.info/ ● [2012] - Asilomar II: Student Data and Records in the Digital Era - https://sites.stanford.edu/asilomar/ ● Responsible Use of Student Data in Higher Education - http://ru.stanford.edu/ (Stanford CAROL & Ithaka S+R) ● DELICATE Framework - http://www.laceproject.eu/blog/ethics-privacy-in-learning-analytics-a-delicate-issue/ (Learning Analytics Community Exchange) ● IMS Global Learning Data & Analytics Key Principles - http://www.imsglobal.org/learning-data-analytics-key- principles
  • 24. IMS Global Learning Data & Analytics Key Principles https://www.imsglobal.org/learning-data-analytics-key-principles 1. Ownership: Faculty, staff, and students generate and own their learning data. As governed by institutional policies, individuals, being owners of the data they generate, have the right to access, port, and control the disposition of their data stored by the institution, its service providers, and their affiliated partners. 2. Stewardship: As stewards of learning data, institutions should have a data governance plan and governance policies that protect the data and the interests of its owners. These should transcend, but encompass, existing protocols, such as IRB. 3. Governance: Learning data use and retention will be governed by institutional policies, and faculty and students retain the right of data access and retrieval. 4. Access: Learning data, whether generated locally or in a vendor-supplied system, is strategic to an institution’s business and mission and must be available to the institution. 5. Interoperability: The collection, use, and access to learning data requires institutional and supplier collaboration, which is dependent upon interoperability standards, protocols, data formats, and content to achieve institutions goals. 6. Efficacy: Learning data collection, use, and computational transformation is aimed at student and instructor success and instructional concerns through prescriptive, descriptive, or predictive methodologies. 7. Security & Privacy: Individuals’ security and privacy relating to collecting, using, and algorithmically transforming learning data is fundamental and must not be treated as optional. It must also be balanced with the effective use of the data. 8. Transparency: Individuals have the right to understand the specific reasons, methods, and purposes for which their learning data is collected, used, and transformed. This includes any learning data being shared with third-party service providers and other institutional affiliates or partners. Individuals also have the right to know how their data is transformed and/or used thru processes such as summative or algorithmic modifications, particular outputs, and visualizations.
  • 25. IMS Global Learning Data & Analytics Key Principles https://www.imsglobal.org/learning-data-analytics-key-principles 1. Ownership: Faculty, staff, and students generate and own their learning data. As governed by institutional policies, individuals, being owners of the data they generate, have the right to access, port, and control the disposition of their data stored by the institution, its service providers, and their affiliated partners. 2. Stewardship: As stewards of learning data, institutions should have a data governance plan and governance policies that protect the data and the interests of its owners. These should transcend, but encompass, existing protocols, such as IRB. 3. Governance: Learning data use and retention will be governed by institutional policies, and faculty and students retain the right of data access and retrieval. 4. Access: Learning data, whether generated locally or in a vendor-supplied system, is strategic to an institution’s business and mission and must be available to the institution. 5. Interoperability: The collection, use, and access to learning data requires institutional and supplier collaboration, which is dependent upon interoperability standards, protocols, data formats, and content to achieve institutions goals. 6. Efficacy: Learning data collection, use, and computational transformation is aimed at student and instructor success and instructional concerns through prescriptive, descriptive, or predictive methodologies. 7. Security & Privacy: Individuals’ security and privacy relating to collecting, using, and algorithmically transforming learning data is fundamental and must not be treated as optional. It must also be balanced with the effective use of the data. 8. Transparency: Individuals have the right to understand the specific reasons, methods, and purposes for which their learning data is collected, used, and transformed. This includes any learning data being shared with third-party service providers and other institutional affiliates or partners. Individuals also have the right to know how their data is transformed and/or used thru processes such as summative or algorithmic modifications, particular outputs, and visualizations.
  • 26. Libraries and Learning Data/Analytics “Though few academic libraries are encountering it just yet, it is only a matter of time before higher education institutions integrate learning analytics at every level of the organization.”8 “Learning analytics initiatives pose a myriad of ethical questions. For example, are institutions who possess learning data required to act on it? Might learning data be used to “profile” students?”8 “At institutions that have committed to a learning analytics future, librarians can also ask questions to clarify the library’s role as well as advocate for library inclusion in learning analytics processes.”8 8 Bell, Steven. Keeping up with … Learning Analytics. ACRL Blog. http://www.ala.org/acrl/publications/keeping_up_with/learning_analytics 9 Oakleaf, Megan. “Getting Ready and Getting Started: Academic Librarian Involvement in Institutional Learning Analytics Initiatives.” Journal of Academic Librarianship. 42(4). 2016.
  • 27. jisc.ac.uk One Castlepark, Tower Hill, Bristol BS2 0JA customerservices@jisc.ac.uk T 020 3697 5800 Jenn Stringer, MLIS University of California, Berkeley