Student Privacy and Learning Analytics

Investigating the Application of Privacy Within a Student Success Information System in Higher Education

Authors

  • Mary Francis Dakota State University
  • Mejai Avoseh University of South Dakota https://orcid.org/0000-0003-1463-9297
  • Karen Card University of South Dakota
  • Lisa Newland University of South Dakota
  • Kevin Streff Dakota State University

DOI:

https://doi.org/10.18608/jla.2023.7975

Keywords:

learning analytics, privacy, case study, student success information system, research paper

Abstract

This single-site case study will seek to answer the following question: how is the concept of privacy addressed in relation to a student success information system within a small, public institution of higher education? Three themes were found within the inductive coding process, which used interviews, documentation, and videos as data resources. Overall, the case study shows an institution in the early stages of implementing a commercial learning analytics system and provides suggestions for how it can be more proactive in implementing privacy considerations in developing policies and procedures.

References

Allen, A. L. (1988). Uneasy access: Privacy for women in a free society. Rowman & Littlefield.

Austin, L. M. (2019). Rereading Westin. Theoretical Inquiries in Law, 20(1), 53–81. https://doi.org/10.1515/til-2019-0003

Bellotti, V. (1997). Design for privacy in multimedia computing and communications environments. In P. E. Agre & M. Rotenberg (Eds.), Technology and privacy: The new landscape (pp. 63–98). MIT Press.

Burns, S. (2020, November 19). The evolving landscape of data privacy in higher education. EDUCAUSE. https://www.educause.edu/ecar/research-publications/the-evolving-landscape-of-data-privacy-in-higher-education/introduction

Castelli, C. J. (2014, October 3). NIST’s draft privacy-engineering concepts avoid defining privacy. Inside cybersecurity. https://insidecybersecurity.com/share/1850

Cavoukian, A. (2012). Privacy by design: From rhetoric to reality. Information and Privacy Commissioner, Ontario.

Cormack, A. N. (2016). A data protection framework for learning analytics. Journal of Learning Analytics, 3(1), 91–106. https://doi.org/10.18608/jla.2016.31.6

Data Quality Campaign. (2019, December 4). Time to act: Connecting policy to practice to make data work for students. https://dataqualitycampaign.org/resource/time-to-act-2019/

Daggett, L. M. (2008). FERPA in the twenty-first century: Failure to effectively regulate privacy for all students. Catholic University Law Review, 58, 59–113. https://scholarship.law.edu/cgi/viewcontent.cgi?referer=&httpsredir=1&article=3151&context=lawreview

Drachsler, H., & Greller, W. (2016). Privacy and analytics — it’s a DELICATE issue: A checklist for trusted learning analytics. Proceedings of the 6th International Conference on Learning Analytics and Knowledge (LAK ʼ16), 25–29 April 2016, Edinburgh, UK (pp. 89–98). ACM Press. https://doi.org/10.1145/2883851.2883893

Family Educational Rights and Privacy Act of 1974, 20 U.S.C. § 1232g (1974).

Ferguson, R., Hoel, T., Scheffel, M., & Drachsler, H. (2016). Guest editorial: Ethics and privacy in learning analytics. Journal of Learning Analytics, 3(1), 5–15. http://dx.doi.org/10.18608/jla.2016.31.2

Foster, C., & Francis, P. (2020). A systematic review on the deployment and effectiveness of data analytics in higher education to improve student outcomes. Assessment & Evaluation in Higher Education, 45(6), 822–841. https://doi.org/10.1080/02602938.2019.1696945

Gasevic, D., Dawson, S., & Jovanovic, J. (2016). Ethics and privacy as enablers of learning analytics. Journal of Learning Analytics, 3(1), 1–4. https://doi.org/10.18608/jla.2016.31.1

Grajek, S. (2020). Top 10 IT issues 2020: The drive to digital transformation begins. EDUCAUSE Review Special Report. https://er.educause.edu/-/media/files/articles/2020/1/er20sr201.pdf

Green, P., & Baumal, B. (2019). Legal, ethical and privacy issues affecting data sharing among Ontario’s higher education institutions in interinstitutional collaboration. College Quarterly, 22(2). https://files.eric.ed.gov/fulltext/EJ1221437.pdf

Hoel, T., & Chen, W. (2016). Privacy-driven design of learning analytics applications: Exploring the design space of solutions for data sharing and interoperability. Journal of Learning Analytics, 3(1), 139–158. https://doi.org/10.18608/jla.2016.31.9

Horvitz, E. (1999). Principles of mixed-initiative user interfaces. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI ʼ99), 15–20 May 2009, Pittsburgh, PA, USA (pp. 159–166). Human Factors in Computing Systems. https://doi.org/10.1145/302979.303030

Ifenthaler, D., & Schumacher, C. (2016). Student perceptions of privacy principles for learning analytics. Education Technology Research Development, 64, 923–938. https://doi.org/10.1007/s11423-016-9477-y

Jensen, C., Tullio, J., Potts, C., & Mynatt, E. D. (2005). STRAP: A structured analysis framework for privacy. GVU Technical Report. http://hdl.handle.net/1853/4450

Jones, K. M. L. (2019). Learning analytics and higher education: A proposed model for establishing informed consent mechanisms to promote student privacy and autonomy. International Journal of Education Technology in Higher Education, 16(1), 24. https://doi.org/10.1186/s41239-019-0155-0

Khalil, M., & Ebner, M. (2016). De-identification in learning analytics. Journal of Learning Analytics, 3(1), 129–138. https://doi.org/10.18608/jla.2016.31.8

Kim, D., Yoon, M., Jo, I.-H., & Branch, R. M. (2018). Learning analytics to support self-regulated learning in asynchronous online courses: A case study at a women’s university in South Korea. Computers & Education, 127, 233–251. https://doi.org/10.1016/j.compedu.2018.08.023

Kitto, K., Cross, S., Waters, Z., & Lupton, M. (2015). Learning analytics beyond the LMS: The connected learning analytics toolkit. Proceedings of the 5th International Conference on Learning Analytics and Knowledge (LAK ʼ15), 16–20 March 2015, Poughkeepsie, NY, USA (pp. 11–15). ACM Press. https://doi.org/10.1145/2723576.2723627

Kitto, K., & Knight, S. (2019). Practical ethics for building learning analytics. British Journal of Educational Technology, 50(6), 2855–2870. https://doi.org/10.1111/bjet.12868

Knight, S., Buckingham Shum, S., & Littleton, K. (2014). Epistemology, assessment, pedagogy: Where learning meets analytics in the middle space. Journal of Learning Analytics, 1(2), 23–47. https://doi.org/10.18608/jla.2014.12.3

Langheinrich, M. (2001). Privacy by design—Principles of privacy-aware ubiquitous systems. In G. D. Abowd, B. Brumitt, & S. Shafer (Eds.), Ubicomp 2001: Ubiquitous Computing (pp. 273–291). Springer Berlin Heidelberg. https://doi.org/10.1007/3-540-45427-6_23

Long, P., & Siemens, G. (2011). Penetrating the fog: Analytics in learning and education. EDUCAUSE Review, 46(5), 30–40.

Margulis, S. T. (2011). Three theories of privacy: An overview. In S. Trepte & L. Reinecke (Eds.), Privacy Online: Perspectives on Privacy and Self-Disclosure in the Social Web (pp. 9–17). Springer. https://doi.org/10.1007/978-3-642-21521-6_2

Moor, J. H. (1997). Towards a theory of privacy in the information age. Computers & Society, 27(3), 27–32. https://doi.org/10.1145/270858.270866

Nissenbaum, H. (2011). A contextual approach to privacy online. Daedalus, 140(4), 32–48. https://doi.org/10.1162/DAED_a_00113

Oakleaf, M. (2016). Getting ready & getting started: Academic librarian involvement in institutional learning analytics initiatives. The Journal of Academic Librarianship, 42(4), 472–475. https://doi.org/10.1016/j.acalib.2016.05.013

Pardo, A., & Siemens, G. (2014). Ethical and privacy principles for learning analytics. British Journal of Educational Technology, 45(3), 438–450. https://doi.org/10.1111/bjet.12152

Cerratto Pargman, T., & McGrath, C. (2021). Mapping the ethics of learning analytics in higher education: A systematic literature review of empirical research. Journal of Learning Analytics, 8(2), 123–139. https://doi.org/10.18608/jla.2021.1

Parks, C. (2017). Beyond compliance: Students and FERPA in the age of big data. Journal of Intellectual Freedom & Privacy, 2(2), 23–33. https://doi.org/10.5860/jifp.v2i2.6253

Pavlou, P. A. (2011). State of the information privacy literature: Where are we now and where should we go? MIS Quarterly, 35(4), 977–988. https://doi.org/10.2307/41409969

Prinsloo, P., & Slade, S. (2013). An evaluation of policy frameworks for addressing ethical considerations in learning analytics. Proceedings of the 3rd International Conference on Learning Analytics and Knowledge (LAK ’13), 8–12 April 2013, Leuven, Belgium (pp. 240–244). ACM Press. https://doi.org/10.1145/2460296.2460344

Prinsloo, P., & Slade, S. (2015). Student privacy self-management: Implications for learning analytics. Proceedings of the 5th International Conference on Learning Analytics and Knowledge (LAK ʼ15), 16–20 March 2015, Poughkeepsie, NY, USA (pp. 83–92). ACM Press. https://doi.org/10.1145/2723576.2723585

Privacy Technical Assistance Center. (2016). Protecting student privacy while using online educational services: Model terms of service. https://studentprivacy.ed.gov/sites/default/files/resource_document/file/TOS_Guidance_Mar2016.pdf

Romei, A., & Ruggieri, S. (2014). A multidisciplinary survey on discrimination analysis. The Knowledge Engineering Review, 29(5), 582–638. https://doi.org/10.1017/S0269888913000039

Rubel, A., & Jones, K. M. L. (2016). Student privacy in learning analytics: An information ethics perspective. The Information Society, 32(2), 143–159. https://doi.org/10.1080/01972243.2016.1130502

Saqr, M., Fors, U., & Tedre, M. (2017). How learning analytics can early predict under-achieving students in a blended medical education course. Medical Teacher, 39(7), 757–767. https://doi.org/10.1080/0142159X.2017.1309376

Sclater, N. (2016). Developing a code of practice for learning analytics. Journal of Learning Analytics, 3(1), 16–42. http://dx.doi.org/10.18608/jla.2016.31.3

Sclater, N., & Bailey, P. (2018). Code of practice for learning analytics. Jisc. https://repository.jisc.ac.uk/6985/1/Code_of_Practice_for_learning_analytics.pdf

Selwyn, N. (2019). What’s the problem with learning analytics? Journal of Learning Analytics, 6(3), 11–19. https://doi.org/10.18608/jla.2019.63.3

Shenton, A. K. (2004). Strategies for ensuring trustworthiness in qualitative research projects. Education for Information, 22(2), 63–75. https://doi.org/10.3233/EFI-2004-22201

Siemens, G. (2013). Learning analytics: The emergence of a discipline. American Behavioral Scientist, 57(10), 1380–1400. https://doi.org/10.1177/0002764213498851

Slade, S., & Prinsloo, P. (2013). Learning analytics: Ethical issues and dilemmas. American Behavioral Scientist, 57(10), 1510–1529. https://doi.org/10.1177/0002764213479366

Slade, S., & Tait, A. (2019). Global guidelines: Ethics in learning analytics. International Council for Open and Distance Education. https://www.aace.org/review/global-guidelines-ethics-in-learning-analytics/

Smith, H. J., Dinev, T., & Xu, H. (2011). Information privacy research: An interdisciplinary review. MIS Quarterly, 35(4), 989–1015. https://doi.org/10.2307/41409970

Society for Learning Analytics Research (SoLAR). (2021). What is learning analytics? https://www.solaresearch.org/about/what-is-learning-analytics/

Solove, D. J. (2002). Conceptualizing privacy. California Law Review, 90(4), 1087–1155. https://doi.org/10.2307/3481326

Solove, D. J. (2008). ‘I’ve got nothing to hide’ and other misunderstandings of privacy. San Diego Law Review, 44, 745–772. https://ssrn.com/abstract=998565

Steiner, C. M., Kickmeier-Rust, M. D., & Albert, D. (2016). LEA in private: A privacy and data protection framework for a learning analytics toolbox. Journal of Learning Analytics, 3(1), 66–90. https://doi.org/10.18608/jla.2016.31.5

Tene, O., & Polonetsky, J. (2013). Big data for all: Privacy and user control in the age of analytics. Northwestern Journal of Technology and Intellectual Property, 11(5), 239–274. https://scholarlycommons.law.northwestern.edu/njtip/vol11/iss5/1/

Tracy, S. J. (2010). Qualitative quality: Eight “big-tent” criteria for excellent qualitative research. Qualitative Inquiry, 16(10), 837–851. https://doi.org/10.1177/1077800410383121

Weimann, T., & Nagel, D. (2012). Agreeing on a definition for data protection in a globalized world. IEEE Technology and Society Magazine, 31(4), 39–42. https://doi.org/10.1109/MTS.2012.2225673

Welsh, S., & McKinney, S. (2015). Clearing the fog: A learning analytics code of practice. Proceedings of the 32nd Annual Conference of the Australasian Society for Computers in Learning and Tertiary Education (ASCILITE 2015), 29 November–2 December 2015, Perth, Western Australia (pp. 588–592). Australasian Society for Computers in Learning in Tertiary Education. https://www.researchgate.net/publication/290436709_Clearing_the_Fog_A_Learning_Analytics_Code_of_Practice

Yin, R. K. (2009). Case study research: Design and methods (4th ed.). Sage.

Downloads

Published

2023-12-12

How to Cite

Francis, M., Avoseh, M., Card, K., Newland, L., & Streff, K. (2023). Student Privacy and Learning Analytics: Investigating the Application of Privacy Within a Student Success Information System in Higher Education. Journal of Learning Analytics, 10(3), 102-114. https://doi.org/10.18608/jla.2023.7975

Issue

Section

Research Papers