際際滷

際際滷Share a Scribd company logo
Strategies 
for 
Dealing 
with 
Privacy 
in 
the 
context 
of 
LA 
Tore 
Hoel 
Oslo 
and 
Akershus 
University 
College 
of 
Applied 
Sciences 
Norway 
September 
2014
What 
is 
the 
problem 
with 
Privacy? 
2 
Medical 
Privacy 
Various 
methods 
have 
been 
used 
to 
protect 
patient's 
privacy. 
This 
1822 
drawing 
by 
Jacques-足Pierre 
Maygnier 
shows 
a 
"compromise" 
procedure, 
in 
which 
the 
physician 
is 
kneeling 
before 
the 
woman 
but 
cannot 
see 
her 
genitalia. 
(Wikipedia)
Privacy, 
Interoperability 
& 
Data 
Sharing 
"Silos, 
Acatl叩n, 
Hidalgo, 
M辿xico, 
2013-足10-足11, 
DD 
03" 
by 
Diego 
Delso 
-足 
Own 
work. 
Licensed 
under 
Creative 
Commons 
Attribution-足Share 
Alike 
3.0 
via 
Wikimedia 
Commons3
Control 
or 
Limitations? 
Privacy 
is 
out 
of 
scope 
for 
LA 
 
it 
is 
dealt 
with 
by 
basic 
infrastructure 
or 
front-足end 
applications 
"Silos, 
Acatl叩n, 
Hidalgo, 
M辿xico, 
2013-足10-足11, 
DD 
03" 
by 
Diego 
Delso 
-足 
Own 
work. 
Licensed 
under 
Creative 
Commons 
Attribution-足Share 
Alike 
3.0 
via 
Wikimedia 
Commons4 
I 
want 
control 
over 
my 
own 
data! 
I 
want 
to 
grant 
limited 
access 
to 
your 
data!
Privacy 
defined 
 Privacy 
is 
not 
simply 
an 
absence 
of 
information 
about 
us 
in 
the 
minds 
of 
others; 
rather 
it 
is 
the 
control 
we 
have 
over 
information 
about 
ourselves. 
-足-足Charles 
Fried 
 Privacy 
is 
a 
limitation 
of 
others 
access 
to 
an 
individual 
through 
information, 
attention, 
or 
physical 
proximity. 
-足-足Ruth 
Gavison 
5 
Or
Privacy 
as 
Contextual 
Integrity 
 Norms 
of 
Appropriateness 
 Norms 
of 
Distribution 
(Flow, 
transfer) 
 S 
shares 
information 
with 
R 
at 
Ss 
discretion 
 R 
requires 
S 
to 
share 
information 
 R 
may 
freely 
share 
information 
about 
S 
 R 
may 
not 
share 
information 
about 
S 
with 
anyone 
 R 
may 
share 
information 
about 
S 
under 
specified 
constraints 
 Information 
flow 
is/is 
not 
reciprocal 
 etc. 
6 Source: 
Helen 
Nissenbaum
Integrity 
 
respected 
or 
violated 
Contextual 
Integrity, 
is 
respected 
when 
norms 
of 
appropriateness 
and 
distribution 
are 
respected; 
it 
is 
violated 
when 
any 
of 
the 
norms 
are 
infringed. 
7
Contexts 
is 
the 
strategic 
word 
 
so 
what? 
 Contexts 
are 
Structured 
Social 
Settings 
(Institutions) 
 Characterized 
by 
roles, 
relationships, 
power 
structures, 
canonical 
activities, 
strategies, 
norms 
(rules), 
enforcement 
mechanisms, 
and 
internal 
values 
(goals, 
ends, 
purposes) 
(Nissenbaum) 
8 
Health-足care 
Education 
Politics 
Religious 
observance
More 
about 
contexts 
9 
 Evolve 
over 
time 
in 
cultures 
and 
societies, 
subject 
to 
historical, 
cultural, 
geographic 
contingencies 
 May 
be 
nested, 
overlap, 
conflict 
 May 
be 
more 
or 
less 
explicit, 
formalized, 
institutionalized 
 May 
be 
more 
or 
less 
complete
Education 
as 
context(s) 
 Learning, 
Education 
and 
Training 
 Levels 
 
K12, 
HE, 
LLL 
 Types 
of 
learning 
 Informal 
vs 
formal 
learning 
 Pedagogies 
 Learning 
styles 
10
Privacy 
a 
concern 
for 
LA 
research 
community? 
 Not 
really, 
it 
seems 
 LAK14 
papers: 
12 
of 
47 
contained 
word 
privacy 
 we 
anonymised 
data 
before 
analysis 
 barrier 
& 
restriction 
 users 
are 
束concerned損 
-足 
privacy 
as 
a 
risk 
 束Learners 
need 
to 
be 
convinced 
that 
they 
are 
reliable 
and 
will 
improve 
their 
learning 
without 
intruding 
into 
their 
privacy損 
(Ferguson, 
2014) 
 束Many 
myths 
surrounding 
the 
use 
of 
data, 
privacy 
infringement 
and 
ownership 
of 
data 
need 
to 
be 
dispelled 
and 
can 
be 
properly 
modulated 
once 
the 
values 
of 
learning 
analytics 
are 
realized損 
(Arnold, 
2014). 
11
LACE 
LA 
Quality 
Indicator 
study 
12 
Data 
Privacy 
 
a 
major 
area 
of 
concern (Scheffel 
et 
al., 
in 
press)
What 
are 
the 
optimal 
contexts 
for 
discussing 
Privacy 
in 
Education? 
13
Privacy 
by 
Design 
14 
 束The 
principles 
of 
data 
protection 
by 
design 
and 
data 
protection 
by 
default損 
(European 
Commisson, 
2012) 
 7 
Foundational 
Principles 
by 
PbD 
 Proactive 
not 
Reactive; 
Preventative 
not 
Remedial 
 Privacy 
as 
the 
Default 
Setting 
 Privacy 
Embedded 
into 
Design 
 Full 
Functionality 
-足 
Positive-足Sum, 
not 
Zero-足Sum 
 End-足to-足End 
Security 
-足 
Full 
Lifecycle 
Protection 
 Visibility 
and 
Transparency 
-足 
Keep 
it 
Open 
 Respect 
for 
User 
Privacy 
-足 
Keep 
it 
User-足Centric
Strategies 
for 
design 
of 
interoperable 
LA 
applications 
 Give 
Privacy 
priority 
 
Privacy 
is 
in 
scope! 
 Follow 
Privacy 
by 
Design 
principles 
 Be 
aware 
of 
contexts 
 Focus 
on 
well 
defined 
and 
autonomous 
contexts 
first 
 When 
multiple 
contexts 
are 
involved, 
go 
for 
lightweight, 
low-足 
ambitious 
solutions 
15
Questions 
 What 
are 
the 
relevant 
educational 
contexts 
from 
a 
Privacy 
perspective? 
 What 
contexts 
generate 
the 
most 
interesting 
data 
from 
a 
LA 
perspective? 
 If 
Social 
Media 
contexts 
are 
relevant 
for 
learning 
 
how 
do 
we 
avoid 
contextual 
integrity 
infringements? 
 How 
are 
responsibilities 
balanced 
between 
learner 
and 
institution 
when 
it 
comes 
to 
the 
different 
contexts 
of 
Learning, 
Education 
and 
Training? 
16
www.laceproject.eu 
@laceproject 
Strategies 
for 
Dealing 
with 
Privacy 
in 
the 
context 
of 
LA 
by 
Tore 
Hoel, 
Oslo 
and 
Akershus 
University 
College 
of 
Applied 
Sciences, 
was 
presented 
at 
EC-足TEL 
workshop, 
Graz, 
Austria, 
on 
16 
September 
2014. 
! 
tore.hoel@hioa.no 
@tore 
This 
work 
was 
undertaken 
as 
part 
of 
the 
LACE 
Project, 
supported 
by 
the 
European 
Commission 
Seventh 
Framework 
Programme, 
grant 
619424. 
These 
slides 
are 
provided 
under 
the 
Creative 
Commons 
Attribution 
Licence: 
http://creativecommons.org/ 
licenses/by/4.0/. 
Some 
images 
used 
may 
have 
different 
licence 
terms. 
17

More Related Content

Strategies for Dealing with Privacy in the context of Learning Analytics

  • 1. Strategies for Dealing with Privacy in the context of LA Tore Hoel Oslo and Akershus University College of Applied Sciences Norway September 2014
  • 2. What is the problem with Privacy? 2 Medical Privacy Various methods have been used to protect patient's privacy. This 1822 drawing by Jacques-足Pierre Maygnier shows a "compromise" procedure, in which the physician is kneeling before the woman but cannot see her genitalia. (Wikipedia)
  • 3. Privacy, Interoperability & Data Sharing "Silos, Acatl叩n, Hidalgo, M辿xico, 2013-足10-足11, DD 03" by Diego Delso -足 Own work. Licensed under Creative Commons Attribution-足Share Alike 3.0 via Wikimedia Commons3
  • 4. Control or Limitations? Privacy is out of scope for LA it is dealt with by basic infrastructure or front-足end applications "Silos, Acatl叩n, Hidalgo, M辿xico, 2013-足10-足11, DD 03" by Diego Delso -足 Own work. Licensed under Creative Commons Attribution-足Share Alike 3.0 via Wikimedia Commons4 I want control over my own data! I want to grant limited access to your data!
  • 5. Privacy defined Privacy is not simply an absence of information about us in the minds of others; rather it is the control we have over information about ourselves. -足-足Charles Fried Privacy is a limitation of others access to an individual through information, attention, or physical proximity. -足-足Ruth Gavison 5 Or
  • 6. Privacy as Contextual Integrity Norms of Appropriateness Norms of Distribution (Flow, transfer) S shares information with R at Ss discretion R requires S to share information R may freely share information about S R may not share information about S with anyone R may share information about S under specified constraints Information flow is/is not reciprocal etc. 6 Source: Helen Nissenbaum
  • 7. Integrity respected or violated Contextual Integrity, is respected when norms of appropriateness and distribution are respected; it is violated when any of the norms are infringed. 7
  • 8. Contexts is the strategic word so what? Contexts are Structured Social Settings (Institutions) Characterized by roles, relationships, power structures, canonical activities, strategies, norms (rules), enforcement mechanisms, and internal values (goals, ends, purposes) (Nissenbaum) 8 Health-足care Education Politics Religious observance
  • 9. More about contexts 9 Evolve over time in cultures and societies, subject to historical, cultural, geographic contingencies May be nested, overlap, conflict May be more or less explicit, formalized, institutionalized May be more or less complete
  • 10. Education as context(s) Learning, Education and Training Levels K12, HE, LLL Types of learning Informal vs formal learning Pedagogies Learning styles 10
  • 11. Privacy a concern for LA research community? Not really, it seems LAK14 papers: 12 of 47 contained word privacy we anonymised data before analysis barrier & restriction users are 束concerned損 -足 privacy as a risk 束Learners need to be convinced that they are reliable and will improve their learning without intruding into their privacy損 (Ferguson, 2014) 束Many myths surrounding the use of data, privacy infringement and ownership of data need to be dispelled and can be properly modulated once the values of learning analytics are realized損 (Arnold, 2014). 11
  • 12. LACE LA Quality Indicator study 12 Data Privacy a major area of concern (Scheffel et al., in press)
  • 13. What are the optimal contexts for discussing Privacy in Education? 13
  • 14. Privacy by Design 14 束The principles of data protection by design and data protection by default損 (European Commisson, 2012) 7 Foundational Principles by PbD Proactive not Reactive; Preventative not Remedial Privacy as the Default Setting Privacy Embedded into Design Full Functionality -足 Positive-足Sum, not Zero-足Sum End-足to-足End Security -足 Full Lifecycle Protection Visibility and Transparency -足 Keep it Open Respect for User Privacy -足 Keep it User-足Centric
  • 15. Strategies for design of interoperable LA applications Give Privacy priority Privacy is in scope! Follow Privacy by Design principles Be aware of contexts Focus on well defined and autonomous contexts first When multiple contexts are involved, go for lightweight, low-足 ambitious solutions 15
  • 16. Questions What are the relevant educational contexts from a Privacy perspective? What contexts generate the most interesting data from a LA perspective? If Social Media contexts are relevant for learning how do we avoid contextual integrity infringements? How are responsibilities balanced between learner and institution when it comes to the different contexts of Learning, Education and Training? 16
  • 17. www.laceproject.eu @laceproject Strategies for Dealing with Privacy in the context of LA by Tore Hoel, Oslo and Akershus University College of Applied Sciences, was presented at EC-足TEL workshop, Graz, Austria, on 16 September 2014. ! tore.hoel@hioa.no @tore This work was undertaken as part of the LACE Project, supported by the European Commission Seventh Framework Programme, grant 619424. These slides are provided under the Creative Commons Attribution Licence: http://creativecommons.org/ licenses/by/4.0/. Some images used may have different licence terms. 17