68,120 research outputs found
ePortfolios: Mediating the minefield of inherent risks and tensions
The ePortfolio Project at the Queensland University of Technology (QUT) exemplifies an innovative and flexible harnessing of current portfolio thinking and design that has achieved substantial buy-in across the institution with over 23000 active portfolios. Robust infrastructure support, curriculum integration and training have facilitated widespread take-up, while QUTâs early adoption of ePortfolio technology has enabled the concomitant development of a strong policy and systems approach to deal explicitly with legal and design responsibilities. In the light of that experience, this paper will highlight the risks and tensions inherent in ePortfolio policy, design and implementation. In many ways, both the strengths and weaknesses of ePortfolios lie in their ability to be accessed by a wider, less secure audience â either internally (e.g. other students and staff) or externally (e.g. potential employees and referees). How do we balance the obvious requirement to safeguard students from the potential for institutionally-facilitated cyber-harm and privacy breaches, with this generationâs instinctive personal and professional desires for reflections, private details, information and intellectual property to be available freely and with minimal restriction? How can we promote collaboration and freeform expression in the blog and wiki world but also manage the institutional risk that unauthorised use of student information and work so palpably carries with it? For ePortfolios to flourish and to develop and for students to remain engaged in current reflective processes, holistic guidelines and sensible boundaries are required to help safeguard personal details and journaling without overly restricting studentsâ emotional, collaborative and creative engagement with the ePortfolio experience. This paper will discuss such issues and suggest possible ways forward
Student Privacy in Learning Analytics: An Information Ethics Perspective
In recent years, educational institutions have started using the tools of commercial data analytics in higher education. By gathering information about students as they navigate campus information systems, learning analytics âuses analytic techniques to help target instructional, curricular, and support resourcesâ to examine student learning behaviors and change studentsâ learning environments. As a result, the information educators and educational institutions have at their disposal is no longer demarcated by course content and assessments, and old boundaries between information used for assessment and information about how students live and work are blurring. Our goal in this paper is to provide a systematic discussion of the ways in which privacy and learning analytics conflict and to provide a framework for understanding those conflicts.
We argue that there are five crucial issues about student privacy that we must address in order to ensure that whatever the laudable goals and gains of learning analytics, they are commensurate with respecting studentsâ privacy and associated rights, including (but not limited to) autonomy interests. First, we argue that we must distinguish among different entities with respect to whom students have, or lack, privacy. Second, we argue that we need clear criteria for what information may justifiably be collected in the name of learning analytics. Third, we need to address whether purported consequences of learning analytics (e.g., better learning outcomes) are justified and what the distributions of those consequences are. Fourth, we argue that regardless of how robust the benefits of learning analytics turn out to be, students have important autonomy interests in how information about them is collected. Finally, we argue that it is an open question whether the goods that justify higher education are advanced by learning analytics, or whether collection of information actually runs counter to those goods
Recommended from our members
"The dearest of our possessions": applying Floridi's information privacy concept in models of information behavior and information literacy
This conceptual paper argues for the value of an approach to privacy in the digital information environment informed by Luciano Floridi's philosophy of information and information ethics. This approach involves achieving informational privacy, through the features of anonymity and obscurity, through an optimal balance of ontological frictions. This approach may be used to modify models for information behavior and for information literacy, giving them a fuller and more effective coverage of privacy issues in the infosphere. For information behavior, the Information Seeking and Communication Model, and the Information Grounds conception, are most appropriate for this purpose. For information literacy, the metaliteracy model, using a modification a privacy literacy framework, is most suitable
Spartan Daily, May 7, 2003
Volume 120, Issue 66https://scholarworks.sjsu.edu/spartandaily/9862/thumbnail.jp
Recommended from our members
MCTs and universities: new risks, new visibilities and new vulnerabilities
Universities have long used new technologies to enhance teaching but mobile communication technologies (MCTs) are posing new ethical and policy challenges. The capture functions on MCTs bring considerable benefits in terms of a student being able to play back and review what was said in the teaching rooms. However, the convergence and connectivity of web 2.0 and its successors add new, as yet largely uncharted dimensions. It not only extends the classroom but also renders previously bounded teaching and residential spaces porous as anybody who has access to these rooms and a MCT can capture and open to outside scrutiny what previously would have been relatively private spaces. This has contradictory ethical implications. Abuses of power and indiscretions can be held to account before wider public opinion. However, the capture and dissemination of sensitive personal information in the form of the opinions, beliefs and ideas of students and staff can expose individuals to risk. Furthermore, the technologies also enable acceptable content to be edited and/or reformed into mashups that may not be intended to be malicious but have the potential for reputational damage. This paper explores these issues first in terms of a range of events and incidents that highlight new vulnerabilities and visibilities. It then outlines some of the policy responses in the United States in terms of cyberbullying; in the UK under data protection; and the implications of a proposed new EU directive. However, it argues, that the fundamental limitation with all of these is that ultimately the institution does not own the device and therefore its control of how it is used is limited. The paper concludes with some preliminary findings on how a handful of British universities are adopting a proactive response here
Engineering at San Jose State University, Winter 2014
https://scholarworks.sjsu.edu/engr_news/1012/thumbnail.jp
- âŠ