agregador de noticias
The United States, Russia, China and the U.K. are all classified as "Endemic surveillance societies." India and France follow close behind as "Systemic failure to uphold safeguards." So it's clear there's a problem. We probably can't fix it within educational technology, but we need to address it. Tony Bates does address it, but he does so largely from an institutional perspective. "Institutions want to protect students from personal data collection for commercial purposes by private companies, tracking of their online learning activities by government agencies, or marketing and other unrequested commercial or political interruption to their studies." The thing is, I don't think we can trust the institutions any more than I trust the governments or the companies.[Link] [Comment]
Linking to an article by Mark Smithers called "Is lecture capture the single worst educational technology use in higher education?" Bex Ferriday argues that the technology simply preserves what was bad in traditional education. "The thought of filming a 3 hour lecture then slapping it onto a virtual learning system and expecting students to watch this in their own time seems more like a punishment than a good idea.... By filming your 3 hour diatribe on connecting muscles in the lower leg once, you never have to repeat the lecture again! Just point students towards the film and bingo!"[Link] [Comment]
So obviously some sort of work has been happening behind the scenes as Apple's operating system iOS 8.1.3 includes the following in today's update: "Adds new configuration options for Education standardized testing." It's not clear exactly what that means. None of the dozen or so sites I visited had any information over and above this exact phrase, and it's not mentioned at all in the 8.1.3 security update. I'd I had to guess, I'd say it has something to do with tamper-proof content that can be used for testing. If you want to pursue the full list, here's everything.[Link] [Comment]
Released today by the Federal Trade Commission (FTC) in the United States, this report (71 page PDF) looks at the provacy and security implications of the Internet of Things (IoT). The idea behind the IoT is that devices and appliances can have their own internet connections and exchange information with online services. A good example is the FitBit, which a person wears on their wrist, and which exchanges information about movement and exercise with the online service. The IoT is incredibly useful, but security issues abound. The FTC report recommends building security into the devices from the outset. It also recommends full disclosure on any personal information being tracked. Companies should train their employees in security, and respond to security threats appropriately. Additionally, companies should limit the data they collect (this is a concept known as 'data minimization'). They're not recommending legislation at this point (it would be "premature") but as Ars Technica points out, the FTC has the option of civil suits to encourage compliance.[Link] [Comment]
Today is Data Privacy Day, says Firefox, and to celebrate the moment they've launched Lightbeam: "Create a 'Wizard of Oz' moment by pulling back the curtain to see who’ s watching you on the Web. Turn on Mozilla’ s Lightbeam tool, visit a handful of websites to see who’ s tracking you, and then learn how to fight back. You’ ll never look at the Web the same way again!" I tried it out and it works quite well (you may need to reload the tool to get the graph to refresh). The circles are visited sites and the triangles are applications that are tracking you as you visit the sites.[Link] [Comment]
During the HOME conference Mapping the European MOOC Territory held on 27 November 2014 in Porto, participants discussed and agreed the text of a declaration about MOOCs and the opportunities they present in Europe.Interest Area: Higher Education Training & Work Learning & Society
This is the last of the SECTIONS criteria for selecting media for my online open textbook, Teaching in a Digital World. The last ‘S’ stands for Security and Privacy.
This is a change from earlier versions of the SECTIONS model, where ‘S’ stood for speed, in terms of how quickly a technology enabled a course to be developed.. However, the issues that I previously raised under speed have been included in Section 9.3, ‘Ease of Use’. This has allowed me to replace ‘Speed’ with ‘Security and privacy’, which have become increasingly important issues for education in a digital age.9.9.1 The need for privacy and security when teaching
Instructors and students need a private place to work online. Instructors want to be able to criticize politicians or corporations without fear of reprisal; students may want to keep rash or radical comments from going public or will want to try out perhaps controversial ideas without having them spread all over Facebook. Institutions want to protect students from personal data collection for commercial purposes by private companies, tracking of their online learning activities by government agencies, or marketing and other unrequested commercial or political interruption to their studies. In particular, institutions want to protect students, as far as possible, from online harassment or bullying. Creating a strictly controlled environment enables institutions to manage privacy and security more effectively.
Learning management systems provide password protected access to registered students and authorised instructors. Learning management systems were originally housed on servers managed by the institution itself. Password protected LMSs on secure servers have provided that protection. Institutional policies regarding appropriate online behaviour can be managed more easily if the communications are managed ‘in-house.’9.9.2 Cloud based services and privacy
However, in recent years, more and more online services have moved ‘to the cloud’, hosted on massive servers whose physical location is often unknown even to the institution’s IT services department. Contract agreements between an educational institution and the cloud service provider are meant to ensure security and back-ups.
Nevertheless, Canadian institutions and privacy commissioners have been particularly wary of data being hosted out of country, where it may be accessed through the laws of another country. There has been concern that Canadian student information and communications held on cloud servers in the USA may be accessible via the U.S. Patriot Act. For instance, Klassen (2011) writes:
Social media companies are almost exclusively based in the United States, where the provisions of the Patriot Act apply no matter where the information originates. The Patriot Act allows the U.S. government to access the social media content and the personally identifying information without the end users’ knowledge or consent.
The government of British Columbia, concerned with both the privacy and security of personal information, enacted a stringent piece of legislation to protect the personal information of British Columbians. The Freedom of Information and Protection of Privacy Act (FIPPA) mandates that no personally identifying information of British Columbians can be collected without their knowledge and consent, and that such information not be used for anything other than the purpose for which it was originally collected.
Concerns about student privacy have increased even more when it became known that countries were sharing intelligence information, so there remains a risk that even student data on Canadian-based servers may well be shared with foreign countries.
Perhaps of more concern though is that as instructors and students increasingly use social media, academic communication becomes public and ‘exposed’. Bishop (2011) discusses the risks to institutions in using Facebook:
- privacy is different from security, in that security is primarily a technical, hence mainly an IT, issue. Privacy needs a different set of policies that involves a much wider range of stakeholders within an institution, and hence a different (and more complex) governance approach from security;
- many institutions do not have a simple, transparent set of policies for privacy, but different policies set by different parts of the institution. This will inevitably lead to confusion and difficulties in compliance;
The controversy at Dalhousie University where dental students used Facebook for violent sexist remarks about their fellow women students is an example of the risks endemic in the use of social media.9.9.3 The need for balance
Although there may well be some areas of teaching and learning where it is essential to operate behind closed doors, such as in some areas of medicine or areas related to public security, or in discussion of sensitive political or moral issues, in general though there have been relatively few privacy or security problems when teachers and instructors have opened up their courses, have followed institutional privacy policies, and above all where students and instructors have used common sense and behaved ethically. Nevertheless, as teaching and learning becomes more open and public, the level of risk does increase.9.9.4 Questions for consideration
1. What student information am I obliged to keep private and secure? What are my institution’s policies on this?
2. What is the risk that by using a particular technology my institution’s policies concerning privacy could easily be breached? Who in my institution could advise me on this?
3. What areas of teaching and learning, if any, need I keep behind closed doors, available only to students registered in my course? Which technologies will best allow me to do this?Over to you
1. I couldn’t find more recent references on this issue than 2011, when it seemed to be a hot topic. Has anything significantly changed with regard to privacy and social media in education since 2011 that I should be aware of? Or have our institutions nailed it regarding sensible policies and practices? (Did I hear guffaws?) References would be particularly welcome.
2. If anyone would like to share their experiences regarding privacy issues as a result of using social media for teaching, please either send me an e-mail (for privacy reasons) or share a comment on this post.Up next
The final section on Chapter 9: Making decisions about what media to use. This will suggest a relatively simple approach for what is in effect a highly complex topic.
Yes, I know, you just can’t wait for this final episode. Keep tuned to this station.References
Klassen, V. (2011) Privacy and Cloud-Based Educational Technology in British Columbia Vancouver BC: BCCampus
Bates, T. (2011) Cloud-based educational technology and privacy: a Canadian perspective, Online Learning and Distance Education Resources,, March 25