Student privacy self-management (original) (raw)

Abstract

Optimizing the harvesting and analysis of student data promises to clear the fog surrounding the key drivers of student success and retention, and provide potential for improved student success. At the same time, concerns are increasingly voiced around the extent to which individuals are routinely and progressively tracked as they engage online. The Internet, the very thing that promised to open up possibilities and to break down communication barriers, now threatens to narrow it again through the panopticon of mass surveillance.

Loading...

Loading Preview

Sorry, preview is currently unavailable. You can download the paper by clicking the button above.

References (71)

  1. REFERENCES
  2. Ball, K., Haggerty, K.D. and Lyon, D. 2012. In Routledge handbook of surveillance studies. Routledge, Abingdon, UK.
  3. Barnard-Wills, D. 2012. In Surveillance and identity. Discourse, subjectivity and the state. Ashgate Publishing Ltd, Farnham, UK.
  4. Bellman, S., Johnson, E.J. and Lohse, G.L. 2001. On site: to opt-in or opt-out?: it depends on the question. Communications of the ACM, 44, 2, (2001), 25-27. Retrieved from http://dl.acm.org/citation.cfm?id=359241
  5. Bennett, C.J. 2001. Cookies, web bugs, webcams and cue cats: patterns of surveillance on the world wide web. Ethics and Information Technology, 3, (2001), 197-210.
  6. Bos, W. and Tarnai, C. 1999. Content analysis in empirical social research, International Journal of Educational Research, 31, (1999), 659-671.
  7. Buchanan, E.A. 2011. Internet research ethics: past, present and future. In The handbook of Internet studies, M.Consalvo and C.Ess, Eds. John Wiley, Oxford, UK, 83-108.
  8. Brandimarte, L., Acquisti, A. and Loewenstein, G. 2013. Misplaced confidences: privacy and the control paradox. Social Psychological and Personality Science, 4, (2013), 340-347. DOI: 10.1177/1948550612455931
  9. Cate, F.H. and Mayer-Schőnberger, V. 2013. Tomorrow's privacy. Notice and consent in a world of Big Data. International Data Privacy Law, 3(2), (2013), 67-73.
  10. Clow, D. 2013a. An overview of learning analytics, Teaching in Higher Education, 18, 6, (2013), 683-695. DOI: 10.1080/13562517.2013.827653.
  11. Clow, D. 2013b, November 13. Looking harder at Course Signals, Clow Blog. Retrieved from http://dougclow.org/2013/11/13/looking-harder-at-course- signals/
  12. Cockcroft, S. 2006. Information privacy: Culture, legislation and user attitudes. Australasian Journal of Information Systems, 14, 1, (2006), 55-68.
  13. Coll, S. 2014. Power, knowledge, and the subjects of privacy: understanding privacy as the ally of surveillance. Information, Communication & Society, 17, 10, (2014), 1250-1263. DOI: 10.1080/1369118X.2014.918636
  14. Coursera. 2014. Terms and conditions. Retrieved from https://authentication.coursera.org/auth/auth/normal/tos.php
  15. DeAngelis, W. 2014. Academic deans, codes of ethics, and … fiduciary duties? Journal for Academic Ethics, 12, (2014), 209-225. DOI: 10.1007/s10805-014-9212-4
  16. Downe-Wamboldt, B. 1992. Content analysis: method, applications, and issues, Health Care for Women International, 13, 3, (1992), 313-321. DOI: 10.1080/07399339209516006
  17. Drachsler, H. and Greller, W. 2014. The pulse of learning analytics understandings and expectations from the stakeholders. Proceedings of the 2nd International Conference on Learning Analytics and Knowledge, (2014), 120-129. Retrieved from http://dl.acm.org/citation.cfm?id=2330634
  18. edX. 2014. Terms of service (including Privacy policy). Retrieved from https://www.edx.org/edx-terms-service (Terms of service)
  19. Eggers, D. 2013. The circle. Penguin, London, UK.
  20. Elo, S. and Kyngäs, H. 2007. The qualitative content analysis process, Journal of Advanced Nursing, 62, (2007), 107-115. DOI: 10.1111/j.1365-2648.2007.04569.x.
  21. FutureLearn. 2014. Terms and conditions (including Privacy and Cookie Policy). Retrieved from https://about.futurelearn.com/terms/
  22. Gavison, R. 1980. Privacy and the limits of law. Yale Law Journal, 89, 421-471.
  23. Gump, J.E. 2001. The readability of typefaces and the subsequent mood or emotion created in the reader, Journal of Education for Business, 76, 5, (2001), 270-273. DOI: 10.1080/08832320109599647
  24. Haggerty, K.D. and Ericson, R.V. (Ed.). 2006. The new politics of surveillance and visibility. University of Toronto Press, Toronto, Canada.
  25. Haynes, A.W. 2006. Online privacy policies: contracting away control over personal information? Penn State Law Review, 111, 3, (2006), 587-624.
  26. Henman, P. 2004. Targeted!: Population segmentation, electronic surveillance and governing the unemployed in Australia. International Sociology, 19, (2004), 173-191. DOI: 10.1177/0268580904042899
  27. Hsieh, H-F. and Shannon, S.E. 2005. Three approaches to qualitative content analysis, Qualitative Health Research, 15, 9, (2005), 1277-1288. DOI: 10.1177/1049732305276687
  28. Irwin, J. 2014, October 7. Grooming students for a lifetime of surveillance. [Web log post]. Retrieved from http://modelviewculture.com/pieces/grooming-students-for- a-lifetime-of-surveillance
  29. Jongbloed, B., Enders, J. and Salerno, C. 2008. Higher education and its communities: interconnections, interdependencies and a research agenda. Higher Education, 56, (2008), 303-324.
  30. Kerr, I. and Barrigar, J. 2012. Privacy, identity and anonymity. In Routledge Handbook of Surveillance Studies, K.Ball, K.D. Haggerty and D.Lyon, Eds., Routledge, Abingdon, UK, 386-394. .
  31. Kharouf, H., Sekhon, H. and Roy, S.K. 2014. The components of trustworthiness for higher education: a transnational perspective. Studies in Higher Education. DOI: 10.1080/03075079.2014.881352
  32. Kitchen, R. 2013. Big data and human geography: opportunities, challenges and risks. Dialogues in Human Geography, 3, (2013), 262-267.
  33. Kruse, A. and Pongsajapan, R. 2012. Student-centered learning analytics. CNDLS Thought Papers. Retrieved from https://cndls.georgetown.edu/m/documents/thoughtpaper- krusepongsajapan.pdf
  34. Lee, B.A. 2014. Student-faculty academic conflicts: emerging legal theories and judicial review. Mississippi Law Journal, 83, (2014), 837-951.
  35. Lincoln, Y.S. and Guba, E.G. 1985. Naturalistic inquiry. London, UK: SAGE Publications.
  36. Lincoln, Y. S. and Guba, E. G. 1990. Judging the quality of case study reports. International Journal of Qualitative Studies in Education, 3, 1, (1990), 53-59. DOI: 10.1080/0951839900030105
  37. Liu, C., Marchewka, J.T., Lu, J. and Yu, C-S. 2004. Beyond concern: a privacy-trust-behavioral intention model of electronic commerce. Information & Management, 42, (2004), 127-142. DOI: 10.1016/j.im.2004.01.002
  38. Lupton, D. 2012, November 4. The quantified self- movement: some sociological perspectives. [Web log post]. Retrieved from http://simplysociology.wordpress.com/2012/11/04/the- quantitative-self-movement-some-sociological-perspectives/
  39. Lyon, D. (Ed.). 2006. Theorising surveillance. The panopticon and beyond. Cullumpton, UK: Willan Publishing.
  40. Lyon, D. 2007. Surveillance studies. An overview. Cambridge, UK: Polity Press.
  41. Mann, S. 2012, November 2. Eye am a camera: surveillance and sousveillance in the glass age. Time. Retrieved from http://techland.time.com/2012/11/02/eye-am-a-camera- surveillance-and-sousveillance-in-the-glassage/
  42. Marshall, S. 2014. Exploring the ethical implications of MOOCs. Distance Education, 35, 2, (2014), 250-262. DOI: 10.1080/01587919.2014.917706
  43. Marx, G.T. 1998. Ethics for the new surveillance. The Information Society: An International Journal, 14, 3, (1998), 171-185. DOI: 10.1080/019722498128809
  44. Marx, G.T. 2001. Murky conceptual waters: the public and the private. Ethics and Information Technology, 3, (2001), 157-169.
  45. McAleese, M et al 2014. Report to the European Commission on new modes of learning and teaching in Higher Education, October 2014 retrieved from http://ec.europa.eu/education/library/reports/modernisation- universities_en.pdf
  46. Mohamed, N. and Ahmad, I.H. 2012. Information privacy concerns, antecedents and privacy measure use in social networking sites: evidence from Malaysia. Computers in Human Behavior, 28, (2012), 2366-2375.
  47. Mont, M.C., Pearson, S., Bramhall, P. 2003. Towards accountable management of identity and privacy: Sticky policies and enforceable tracing services. Retrieved from http://pdf.aminer.org/000/151/916/towards\_accountable\_man agement_of_identity_and_privacy_sticky_policies_and.pdf
  48. Murphy, K. 2014, October 4. We want privacy, but can't stop sharing. The New York Times. [Web log post]. Retrieved from http://www.nytimes.com/2014/10/05/sunday- review/we-want-privacy-but-cant-stop- sharing.html?partner=rss&emc=rss&smid=tw-nytopinion
  49. Nissenbaum, H. 2004. Privacy as contextual integrity. Washington Law Review, 79, (2004), 119-158.
  50. Prinsloo, P. and Slade, S. 2013. An evaluation of policy frameworks for addressing ethical considerations in learning analytics. Paper presented at Learning Analytics and Knowledge Leuven, Belgium, 8-12 April, 2013. Retrieved from http://dl.acm.org/citation.cfm?id=2460344
  51. Raab, C.D. 2012. Regulating surveillance. The importance of principles. In Routledge Handbook of Surveillance Studies, K.Ball, K.D. Haggerty and D.Lyon, Eds., Routledge, Abingdon, UK, 377-385.
  52. Sewell, G. and Barker, J.R. 2001. Neither good, nor bad, but dangerous: surveillance as an ethical paradox. Ethics and Information Technology, 3, (2001), 183-196.
  53. Siemens, G. and Long, P. 2011. Penetrating the fog: Analytics in learning and education, EDUCAUSEreview, [online].
  54. September/October, Retrieved from http://www.elmhurst.edu/\~richs/EC/OnlineMaterials/SPS102 /Teaching%20and%20Learning/Penetrating%20the%20Fog. pdf
  55. Siemens, G. 2013. Learning analytics: The emergence of a discipline, American Behavioural Scientist, 57, 10, (2013), 1380-1400.
  56. Slade, S. and Prinsloo, P. 2013. Learning analytics: ethical issues and dilemmas. American Behavioral Scientist. DOI: 10.1177/0002764213479366
  57. Slade, P. and Prinsloo, P. 2014. Student perspectives on the use of their data: between intrusion, surveillance and care. Paper presented at 8th EDEN Research Workshop, 27-28 October, Oxford, UK.
  58. Solove, D.J. 2004. The digital person. Technology and privacy in the information age. New York, NY: New York University
  59. Solove, D.J. 2013. Introduction: Privacy self-management and the consent dilemma. Harvard Law Review 1880 (2013);
  60. Solove, D.J. 2004 The digital person. New York University Press, New York, NY.
  61. Sovern, J. 1999. Opting in, opting out, or no options at all: The fight for control of personal information. Washington Law Review, 74, (1999), 1033-1130. Retrieved from http://netcaucus.org/books/privacy2001/pdf/Sovern.pdf
  62. Stoddart, E. 2012. A surveillance of care. Evaluating surveillance ethically. In Routledge Handbook of Surveillance Studies, K.Ball, K.D. Haggerty and D.Lyon, Eds., Routledge, Abingdon, UK, 369-376.
  63. Taddei, S. and Contena, B. 2013. Privacy, trust and control: which relationships with online self-disclosure? Computers in Human Behaviour, 29, (2013), 821-826.
  64. Tene, O, and Polonetsky, J. 2012. Big data for all: Privacy and user control in the age of analytics. Northwestern Journal of Technology and Intellectual Property, 239, (2012), 1-36. Retrieved from http://papers.ssrn.com/sol3/papers.cfm?abstract\_id=2149364
  65. Trepte, S. and Reinecke, L. 2013. The reciprocal effects of social network site use and the disposition for self- disclosure: a longitudinal study. Computers in Human Behavior, 29, (2013), 1102-1112.
  66. Wang, R. 2013, June 10. Beware trading privacy for convenience. [Web log post]. Harvard Business Review. Retrieved from http://blogs.hbr.org/2013/06/beware-trading- privacy-for-con/
  67. Warren, S.D., and Brandeis, L.D. 1890. The right to privacy. Harvard Law Review, 4(5): 193-220.
  68. Westin, A.F. 2003. Social and political dimensions of privacy. Journal of Social Issues, 59(2), 431-453.
  69. Woodley, C. and Silvestri, M. 2014. The Internet is forever: student indiscretions reveal the need for effective social media policies in academia. American Journal of Distance Education, 28, 2, (2014), 126-138. DOI: 10.1080/08923647.2014.896587
  70. Zhang, Y. and Wildemuth, B.M. 2009 Qualitative analysis of content. In Applications of social research methods to questions in Information and Library Science, B. Wildemuth Ed., Libraries Unlimited, Westport, CT, 308-319.
  71. Zuckerman, E. 2014, October 6. Helen Nissenbaum on Ad Nauseum, resistance through obfuscation, and weapons of the weak. [Web log post]. Retrieved from http://www.ethanzuckerman.com/blog/2014/10/06/helen- nissenbaum-on-ad-nauseum-resistance-through-obfuscation- and-weapons-of-the-weak/