62 research outputs found
From data subjects to data suspects: challenging e-proctoring systems as a university practice
E-proctoring is a set of software and tools to monitor studentsâ behaviour during online examinations. Many universities have implemented this type of invigilation in response to the lockdowns during the pandemic to guarantee the validity and the integrity of exams. However, the intrusiveness of such technology into the studentsâ personal environment along with major accuracy problems (e.g., in authenticating black students) has attracted the scrutiny of various European data protection authorities and, more recently, equality bodies. In this paper, we critically approach the European normative framework available in countering the risks and situations of harms generated by e-proctoring through the lenses of data protection and anti-discrimination law. This work, in particular, is one of the first to systematise and analyse the corpus of online proctoring-related decisions that have emerged in the EU over the past three years. After an overview of the technical aspects of such technology and an outline of the legal issues debated in the literature, the paper will reconstruct and discuss the convergences and divergences in how courts and independent authorities have assessed the lawfulness of online invigilation tools. In our analysis, we observe that such instruments were evaluated differently depending on the concrete features implemented. However, with some notable exceptions, the General Data Protection Regulation and the anti-discrimination framework have largely proven helpful to combat the most intrusive forms of e-proctoring deployment or to mitigate their risks. Nevertheless, to ensure a safer and fairer educational environment, we conclude that a few crucial issuesâincluding the effectiveness of the collective enforcement of rights, discriminatory effects for people not covered by a protected ground, and the governance of edTech within the universityâshould be further taken into account
From data subjects to data suspects: challenging e-proctoring systems as a university practice
E-proctoring is a set of software and tools to monitor studentsâ behaviour during online examinations. Many universities have implemented this type of invigilation in response to the lockdowns during the pandemic to guarantee the validity and the integrity of exams. However, the intrusiveness of such technology into the studentsâ personal environment along with major accuracy problems (e.g., in authenticating black students) has attracted the scrutiny of various European data protection authorities and, more recently, equality bodies. In this paper, we critically approach the European normative framework available in countering the risks and situations of harms generated by e-proctoring through the lenses of data protection and anti-discrimination law. This work, in particular, is one of the first to systematise and analyse the corpus of online proctoring-related decisions that have emerged in the EU over the past three years. After an overview of the technical aspects of such technology and an outline of the legal issues debated in the literature, the paper will reconstruct and discuss the convergences and divergences in how courts and independent authorities have assessed the lawfulness of online invigilation tools. In our analysis, we observe that such instruments were evaluated differently depending on the concrete features implemented. However, with some notable exceptions, the General Data Protection Regulation and the anti-discrimination framework have largely proven helpful to combat the most intrusive forms of e-proctoring deployment or to mitigate their risks. Nevertheless, to ensure a safer and fairer educational environment, we conclude that a few crucial issuesâincluding the effectiveness of the collective enforcement of rights, discriminatory effects for people not covered by a protected ground, and the governance of edTech within the universityâshould be further taken into account
From data subjects to data suspects : challenging e-proctoring systems as a university practice
Peer reviewedPublisher PD
Recommended from our members
A Simulation-based Methodology for the Assessment of Server-based Security Architectures for Mobile Ad Hoc Networks (MANETs)
This thesis was submitted for the award of Doctor of Philosophy and was awarded by Brunel University LondonA Mobile Ad hoc Network (MANET) is typically a set of wireless mobile nodes enabled to communicate dynamically in a multi-hop manner without any pre-existing network infrastructure. MANETs have several unique characteristics in contrast to other typical networks, such as dynamic topology, intermittent connectivity, limited resources, and lack of physical security. Securing MANETs is a critical issue as these are vulnerable to many different attacks and failures and have no clear line of defence. To develop effective security services in MANETs, it is important to consider an appropriate trust infrastructure which is tailored to a given MANET and associated application. However, most of the proposed trust infrastructures do not to take the MANET application context into account. This may result in overly secure MANETs that incur an increase in performance and communication overheads due to possible unnecessary security measures. Designing and evaluating trust infrastructures for MANETs is very challenging. This stems from several pivotal overlapping aspects such as MANET constraints, application settings and performance. Also, there is a lack of practical approaches for assessing security in MANETs that take into account most of these aspects. Based on this, this thesis provides a methodological approach which consists of well-structured stages that allows the exploration of possible security alternatives and evaluates these alternatives against dimensions to selecting the best option. These dimensions include the operational level, security strength, performance, MANET contexts along with main security components in a form of a multidimensional security conceptual framework. The methodology describes interdependencies among these dimensions, focusing specifically on the service operational level in the network. To explore these different possibilities, the Server-based Security Architectures for MANETs (SSAM) simulation model has been created in the OMNeT++ simulation language. The thesis describes the conceptualisation, implementation, verification and validation of SSAM, as well as experimentation approaches that use SSAM to support the methodology of this thesis. In addition, three different real cases scenarios (academic, emergency and military domains) are incorporated in this study to substantiate the feasibility of the proposed methodology. The outcome of this approach provides MANET developers with a strategy along with guidelines of how to consider the appropriate security infrastructure that satisfies the settings and requirements of given MANET context
Living in the Margins of the State
This thesis explores the various forms of state manifestation in the lives of the Uzbek population living in the borderlands of Kyrgyzstan. With a particular focus on the stateless persons amongst this group, the thesis examines how the state materialises, manifests and transcends the lives of Uzbeks living in the physical, social and legal margins of the state. Based on fieldwork conducted along the militarized Kyrgyz-Uzbek border from 2013â2014, the ethnography presented in this work illuminates how people are experiencing, interacting and dealing with such manifestations of the state as borders, document practices and citizenship regime.
This work addresses the scarcity of literature on statelessness in Central Asia and on rural Uzbek communities in Kyrgyzstan expanding the knowledge and understanding of the lived realities of this community by exploring how their worlds have been both shattered and coalesced through various political projects that temporarily both inhibits and facilities the existence of their cross-border social worlds.
This thesis explores how the state is shaping the lives of the people who have become entangled with the increased presence of the state in the form of physical border barriers, state documentation practices and the prevalent citizenship regime.
It particularly looks at the physical manifestation of the state boundaries, namely the borders and their morphology, illustrating how the physical presence of the borders have created new ways of socialising for a community whose lives transcend and spill over the state boundaries. By illuminating how the particular morphology of the border shapes and directs sociality, this work calls for more attention to the materiality of borders in the anthropological literature. Furthermore, this thesis advances the anthropological understanding of the stateâs manifestation process itself by illustrating itâs fluctuating presence. The thesis shows how through scrutinising peopleâs engagement with documents, the temporal dynamic of stateâs spatialising practices become visible. Finally, this thesis illustrates how the most prominent material artefact denoting the citizenship status, the passport, is central to the way people narrate their experiences of statelessness and to their understandings of citizenship status as such.
This work advances the study of statelessness by focusing on the statelessness experiences and understandings of this status, rather than its legal dimensions, and argues for the incorporation of a spatial dimension and documentation aspects in exploring how people situate their lives in spaces where the nation-state is not always the main point of reference. Attending to such material state manifestations as borders and documents, this thesis highlights how locating the state in its concrete expressions in everyday lives enables us to explore the ways the state becomes present and transcends the lives of people, and how people on their own behalf engage with these state manifestations.Doktorgradsavhandlin
Game Theory for Multi-Access Edge Computing:Survey, Use Cases, and Future Trends
Game theory (GT) has been used with significant success to formulate, and either design or optimize, the operation of many representative communications and networking scenarios. The games in these scenarios involve, as usual, diverse players with conflicting goals. This paper primarily surveys the literature that has applied theoretical games to wireless networks, emphasizing use cases of upcoming multiaccess edge computing (MEC). MEC is relatively new and offers cloud services at the network periphery, aiming to reduce service latency backhaul load, and enhance relevant operational aspects such as quality of experience or security. Our presentation of GT is focused on the major challenges imposed by MEC services over the wireless resources. The survey is divided into classical and evolutionary games. Then, our discussion proceeds to more specific aspects which have a considerable impact on the game's usefulness, namely, rational versus evolving strategies, cooperation among players, available game information, the way the game is played (single turn, repeated), the game's model evaluation, and how the model results can be applied for both optimizing resource-constrained resources and balancing diverse tradeoffs in real edge networking scenarios. Finally, we reflect on lessons learned, highlighting future trends and research directions for applying theoretical model games in upcoming MEC services, considering both network design issues and usage scenarios
- âŠ