<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Privacy of Crowdsourcing Educational Platforms in the Light of New EU Regulations</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Katerina Zdravkova</string-name>
          <email>katerina.zdravkova@finki.ukim.mk</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>University Ss. Cyril and Methodius, Faculty of Computer Science and Engineering Rudjer Boshkovikj 16</institution>
          ,
          <addr-line>1000 Skopje</addr-line>
          ,
          <country country="MK">Macedonia</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2018</year>
      </pub-date>
      <fpage>24</fpage>
      <lpage>25</lpage>
      <abstract>
        <p>Many crowdsourcing systems enable an anonymous access and opportunity to namelessly contribute self-generated content without providing any personal data. However, Internet browsers collect metadata on a large scale, including learning management systems (LMS), which collect and store many identity and contact data. System administrators and the teachers responsible for the courses can access them at any time. Interactive activities embedded in the LMS can reveal sensitive data, such as religious beliefs, political views, health, sexual orientation, race, or membership to organizations. They are visible to all the enrolled students. Educational organizations who are hosting LMS, also collect a lot of data that is usually transferred to third countries, but also transmitted to third parties, including university researchers or outside companies, often even governments. This paper examines the challenges of a prospective crowdsourcing platform intended for education, which must be taken into consideration by design. It presents examples of violated privacy in education, the student protection regulations, and the privacy concerns of learning management systems. The compliance of the most popular LMSs, MOOCs and crowdsourcing systems with GDPR are examined and compared. The paper concludes with the privacy policy guidelines of the prospective crowdsourcing educational platform in the light of GDPR.</p>
      </abstract>
      <kwd-group>
        <kwd>Crowdsourcing</kwd>
        <kwd>GDPR</kwd>
        <kwd>LMS</kwd>
        <kwd>rights of data subject</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>
        Many crowdsourcing systems enable an anonymous access
and opportunity to namelessly contribute self-generated
content without providing any personal data
        <xref ref-type="bibr" rid="ref14">(Halder,
2014)</xref>
        . However, Internet browsers, which support the
functioning of crowdsourcing platforms, collect metadata
on a large scale (Soltani and Seno, 2014). Digital traces
include: users’ IP address, their exact location, time zone
and language, the type of the used device (PC, laptop,
tablet, mobile), hardware features (CPU, graphics cards,
RAM specifications), the operating system, the screen
resolution, the battery level, the moment and the duration
of accessing the browser, as well as the installed browser
plugins. These facts generate a browser fingerprint, which
is a very accurate method to identify unique browsers and
track online activities
        <xref ref-type="bibr" rid="ref7">(Eckersley, 2010)</xref>
        . Moreover, servers
send HTTP cookies to user’s browser, such as the
authentication ones, user preferences and settings, which
are stored on the user’s computer. Since data collection and
cookie depositing are almost unavoidable, and permitted
according to most privacy protection laws, crowdsourcing
can be considered privacy safeguarded per se.
      </p>
      <p>
        New learning management systems collect and store a lot
of identity and contact data, such as: student ID, name,
email, picture, in addition to a list of server logs, all activities
undertaken, their duration, grades of learning assignments,
and the browser type and language
        <xref ref-type="bibr" rid="ref11">(Flanagan and Ogata,
2017)</xref>
        . System administrators and all the teachers
responsible for the course can access them at any time.
Educational organizations who are hosting LMSs collect
additional identifiable data. Student records are sometimes
extensive and completely incompatible to modern laws,
which tend to minimize the amount of personally
identifiable information. Moreover, the collected data are
usually transmitted to third parties via government
agencies, mainly to education researchers
        <xref ref-type="bibr" rid="ref17">(Joiner, 2018)</xref>
        .
Interactive activities embedded in the LMS, such as the
wikis, discussion forums and blogs are always associated
with the name and the picture of the content provider,
which can be either a teacher or another student enrolled
into the same course
        <xref ref-type="bibr" rid="ref20">(Poore, 2015)</xref>
        .
      </p>
      <p>
        When students equate their performance within the
interactive educational system with their behaviour in the
social media, they can accidentally reveal some sensitive
data, like their religious and political views, health status,
sexual orientation, race, and membership to organizations,
or intentionally impose their dogmas, enforced decisions,
or beliefs
        <xref ref-type="bibr" rid="ref25">(Zdravkova, 2016)</xref>
        . Once posted, this information
could remain visible to all the course participants. These
issues are a further privacy threat that is usually not
protected at all so far
        <xref ref-type="bibr" rid="ref6">(Drummond and Fischhoff, 2017)</xref>
        .
In 2016, EU approved the General Data Protection
Regulation (GDPR), which was enforced in May 2018
        <xref ref-type="bibr" rid="ref10">(European Commission, 2018)</xref>
        . It enhances the regulation
responsible for personally identifiable information,
processing and free movement. GDPR’s main purpose is
“to enhance data protection rights of individuals and to
improve business opportunities by facilitating the free flow
of personal data in the digital single market”. It harmonized
the protection of “fundamental rights and freedoms”, in the
context of technological developments, globalization,
increasing scale of data collection and sharing, regarding
the necessity of free flow of personal data, not only within
EU, but also towards third countries.
      </p>
      <p>Educational crowdsourcing systems are a symbiosis of
both. For educational purposes, most of the previously
mentioned data and metadata should inevitably be
collected. Responsible platforms should enable their
processing, accessing, sharing and transfer to third parties
and countries obeying precisely the privacy protection
principles. New EU regulations affect the creation of
privacy policies of educational crowdsourcing.</p>
      <p>This paper examines the challenges of a crowdsourcing
platform intended for education, which should be taken into
consideration prior to its launching. It continues with
examples of violated privacy in education, privacy
concerns of learning management systems, and student
protection regulations. In section 3, the compliance of the
most popular LMSs, MOOCs and crowdsourcing systems
with GDPR, is examined and compared. Section 4 is
dedicated to enetCollect’s affiliated organisations EURAC
and ILIAS. The paper concludes with the privacy policy
guidelines of a prospective crowdsourcing platform.</p>
    </sec>
    <sec id="sec-2">
      <title>Privacy in education</title>
      <p>
        One of the major imperatives of European higher education
area (EHEA) is student-centred learning, which promotes
supportive and inspiring learning environment based on
innovative teaching methods, pedagogical innovation and
digital technologies
        <xref ref-type="bibr" rid="ref2">(Bergan and Deca, 2018)</xref>
        . The
effectiveness of digitally supported education highly
depends on the well-established privacy protection
        <xref ref-type="bibr" rid="ref26">(Zeide
and Nissenbaum, 2018)</xref>
        . Privacy concerns additionally
grow due to the emergence of the MOOCs over the existing
online learning management systems
        <xref ref-type="bibr" rid="ref21">(Sandeen, 2013)</xref>
        .
They enable universal access, which amplifies their
disruptive nature
        <xref ref-type="bibr" rid="ref18">(Jones and Regner, 2016)</xref>
        . The
involvement of many non-educational institutions in the
MOOCs additionally aggravates the intention to establish
strict privacy policy regulations. The following subsections
observe three aspects: examples of violated privacy,
general privacy concerns of learning management systems,
and the privacy protection regulations applied to education.
2.1
      </p>
    </sec>
    <sec id="sec-3">
      <title>Violated privacy in education</title>
      <p>
        Suzanne Widup’s (2010) exhaustive report revealed that
from 2005 to 2009, more than 2 800 data breach incidents
occurred, 549 of them in educational organizations. The
amount of breached records exceeded 10 million
        <xref ref-type="bibr" rid="ref24">(Widup,
2010)</xref>
        . According to this report, one of the crucial reasons
for such a high occurrence of data violations in education
was the absence of monitoring systems that might prevent
the malicious use of student data. Another report has
recently proved that larger universities, universities with
more financial resources, and universities with weak
privacy policies were more susceptible to data breaches
        <xref ref-type="bibr" rid="ref19">(Mello, 2018)</xref>
        .
      </p>
      <p>
        DLA Piper study reports almost 60 000 data breaches in
Europe after the introduction of GDPR, more than one sixth
in UK
        <xref ref-type="bibr" rid="ref5">(DLA Piper, 2019)</xref>
        . Most notifications were spotted
among private and public organisations from the
Netherlands, Germany and UK. Even though the report
doesn’t highlight the type of the organisation, it is very
realistic that at least 10 000 belong to educational
establishments.
2.2
      </p>
    </sec>
    <sec id="sec-4">
      <title>Privacy concerns of learning environments</title>
      <p>
        Academic analytics became an inevitable and a very
reliable tool for assessment and auditing of education
        <xref ref-type="bibr" rid="ref3">(Campbell, DeBlois and Oblinger, 2007)</xref>
        . It is usually
combined with educational data mining “providing useful
insights into student behavior online”
        <xref ref-type="bibr" rid="ref1">(Baepler and
Murdoch, 2010)</xref>
        . The process of gathering, analysing, and
presenting student data is usually performed within
learning management systems. Student data have
nowadays expanded to big data
        <xref ref-type="bibr" rid="ref12 ref4">(Chen, Mao and Liu, 2014;
Godwin-Jones, 2017)</xref>
        . Their huge volume makes them a
fruitful arena for rich data analysis, which increases the
possibility of uncontrolled data mining and significantly
reduces privacy
        <xref ref-type="bibr" rid="ref15">(Johnson, 2014)</xref>
        .
      </p>
      <p>
        An additional problem is the redirection of the traditional
eLearning methods towards cloud services, where privacy
and security issues are a real challenge
        <xref ref-type="bibr" rid="ref22">(Sen, 2015)</xref>
        .
1 All the online resources, privacy policies and terms of use were
last retrieved on 10th April 2019.
      </p>
      <p>However, the greatest privacy challenge for the learners
and their teachers is the opportunity to generate interactive
content, where all the uploaded information is visible to all
other participants of the course, and the authorship is
associated to its creator. Even when the content is erased,
the traces of its existence remain permanent.
2.3</p>
    </sec>
    <sec id="sec-5">
      <title>Student protection regulations</title>
      <p>Most LMSs, MOOCs and crowdsourcing projects are
hosted in the US, and are used massively outside of them,
which led to the necessity to establish a reasonable
framework, in order to avoid some prospective
international conflicts. In spite of many regulations, such
as: FERPA, PPRA, IDEA and COPPA there is not a single
comprehensive federal U.S. law regulating the collection
and use of personal data (https://www.usa.gov/privacy)1.
To handle the problem, mutual EU-US and Swiss-US
privacy agreements have been established. They regulate
data privacy, safety and security, as well as cross-border
data transfers. The two frameworks are standardised for all
other European National Privacy regulations, so if one
organization is compliant with GDPR, it is very probable
that it also fulfils the national regulations.</p>
      <p>3.</p>
    </sec>
    <sec id="sec-6">
      <title>Compliance with GDPR</title>
      <p>
        The new EU privacy protecting regulations contain 99
articles divided into 11 chapters
        <xref ref-type="bibr" rid="ref10">(EC, 2018)</xref>
        . For the
prospective crowd-oriented learning system, it is essential
to study the “rights of data subject”, where “data subject”
is any “identified or identifiable natural person” (chapter
3), and the “transfers of personal data to third countries or
international organisations” (chapter 5). Article 85, which
deals with the “processing and freedom of expression and
information”, might also be decisive for enetCollect. If the
rights of data subject, and the cross border data transfers
are not carefully established, all the “remedies, liability and
penalties” from chapter 8 will be implemented. They can
be gigantic, like the fine of 50 million EUR, which was
imposed on Google by French data protection watchdog
        <xref ref-type="bibr" rid="ref5">(DLA Paper, 2019)</xref>
        .
      </p>
      <p>
        The basic rights of data subject of the most popular LMSs,
MOOCs and crowdsourcing systems are presented in Table
1, which appear at the end of the paper. GDPR rights are
clustered into five sections: transparency and modalities,
information and access to personal data, rectification and
erasure, right to object and automated individual
decisionmaking, and restrictions
        <xref ref-type="bibr" rid="ref10">(EC, 2018)</xref>
        . The compliance of the
educational systems with them is judged according to their
privacy notes and terms of use. The defined criteria for each
are presented in the following five paragraphs.
      </p>
      <p>The compliance with the transparency and modalities legal
items among other, means that the existence of an
appointed controller; provided written or oral information
related to data processing; provided information related to
data transfers to a third country or to an international
organisation; controller’s duty to protect data processing;
protection of data subject from any legal effects based
solely on automated processing; and implementation of
suitable measures to safeguard the data subject's rights and
freedom, and legitimate interests.
Information and access to personal data refer to: the
purpose of data collection; contact details of the controller;
the recipients of collected data; the period of storing the
data; the right to access the data; the right to demand an
erasure of personal data; the right to restrict processing;
detailed information of accessing data; and direct access to
collected data.</p>
      <p>Rectification and erasure clauses imply that the data subject
has the right to: demand a rectification of inaccurate
personal data; right to erasure (‘right to be forgotten’); right
to restriction of processing; notification that any of the
three later actions have been performed; and the right to
receive the personal data.</p>
      <p>The right to object and the automated individual
decisionmaking, are comprised of the rights to object data
processing at any time; and the rights to object data
processing for direct marketing purposes.</p>
      <p>Restriction refers to a limited scope of obligations in
special circumstances related to the fundamental rights and
freedoms; and safeguarding of democratic society.
Blackboard is one of the leading LMSs, and as said by
them, #1 Global Education Software Provider. With more
than 100 million users, Blackboard must guarantee the best
conditions, including privacy. Blackboard has a very strict
and detailed privacy, which is EU-U.S. Privacy Shield
certified. The compliance with GDPR is presented in the
21 pages long GDPR White Paper.</p>
      <p>Canvas is Instructure’s LMS with more than 18 million
users (instructure.com), intended for K-12 and university
students. In parallel with the privacy policy, Canvas has
extensions for the residents of the EU and Switzerland.
Canvas is also dedicated to adapting their own privacy
policy to GDPR. They are self-certified under the EU-U.S.
Privacy Shield. Recently, there were complaints about data
treatment and third parties (privacy.commonsense.org/
evaluation/canvas).</p>
      <p>With more than 300 million users and “world's largest
collection of language-learning data”, Duolingo is the
biggest educational community dedicated to language
learning, which presents completely crowdsourced
language courses ai.duolingo.com/). It has the most
comprehensive privacy policy, which carefully covers all
the privacy, safety and security rights of data subject,
(duolingo.com/privacy). In spite of the declared readiness
to protect users’ data, the application is criticized for
“thirdparty advertising or tracking services” (privacy.common
sense.org/evaluation/duolingo).</p>
      <p>
        Intended for K-12, Edmodo is another example of a
learning management system with detailed privacy policy
(go.edmodo.com/privacy-policy/) and terms of service.
These regulations are not fully compatible with GDPR, but
still offer significant rights to data subjects. In May 2017,
Edmodo suffered a severe data breach, which affected 77
million users
        <xref ref-type="bibr" rid="ref9">(EHL, 2017)</xref>
        .
      </p>
      <p>EdX is an open-source platform and MOOC provider with
more than 130 partners and 18 million users. They claim:
“edX is making a good faith effort to comply, given our
global reach with learners and partners.” The privacy
policy proves it (edx.org/edx-privacy-policy).</p>
      <p>FutureLearn is a digital educational platform “wholly
owned by The Open University” (future
learn.com/aboutfuturelearn). Highly experienced OU prepared a very
concise and fully GDPR compliant privacy policy
(about.futurelearn.com/terms/privacy-policy).</p>
      <p>Khan Academy is a global multilingual classroom for
millions of users. Their privacy policy is carefully
prepared, and it includes special clauses for European users
only (khanacademy.org/about/privacy-policy).</p>
      <p>
        Mechanical Turk’s privacy notice redirects towards
Amazon, whose privacy has not been recently updated,
(mturk.com/privacy-notice), thus it is hardly compliant
with GDPR. It might be crucial for their unethical acting
while harvesting Facebook profiles and manipulating
people
        <xref ref-type="bibr" rid="ref8">(EFF, 2018)</xref>
        .
      </p>
      <p>
        Moodle is the most popular open source LMS with almost
150 million registered users (moodle.net/stats/) who are
striving for the highest ethical standards. MoodleDocs
privacy rights are compatible with GDPR at all points. But,
this January, Moodle experienced an outage
        <xref ref-type="bibr" rid="ref13">(Greidanos,
2019)</xref>
        . Unlike Edmodo, it suffered from lack of reliability.
SAP SuccessFactors is a cloud provider with 120 million
users, whose cloud security and data privacy are carefully
designed and maintained, providing complete compliance
with privacy and security standards worldwide (www.suc
cessfactors.com/content/ssf-site/en/about/privacy.html).
In parallel with the rights of data subjects, the compliance
with the Article 85 of all the studied platforms was also
examined. After a very exhaustive examinations of their
corresponding policies, it was noticed that none mentions
the freedom of expression and information. An exception
is Moodle, which contains a word censorship filter,
intended to disable the submission of “obscene or other
unwanted words in the text” within forums and wikis
(https://docs.moodle.org/36/en/Word_censorship_filter). It
can be misused to restrict the free expression, because the
censor.php file can be tailored to disable some word strings.
Most observed educational and crowdsourcing systems
have shown a very high social responsibility and a serious
concern about privacy rights of their users. Unfortunately,
the abuse of users’ confidence has occurred in both
observed crowdsourcing systems.
      </p>
      <p>4.</p>
    </sec>
    <sec id="sec-7">
      <title>EnetCollect and new EU regulations</title>
      <p>The major motivation of this study was to discover the
deficiencies of the related educational platforms in order to
avoid them carefully while creating the enetCollect’s
crowd-oriented language learning system. It was concluded
that declaratively, all of them respect the rights of data
subject and pay attention to information security. Well
established policies and terms of use converge to some
general rules and recommendations, which should be taken
into consideration for the prospective platform.
It is very probable that the selection of the platform
provider will be done among the two technically most
engaged partners of the action: EURAC or ILIAS. Namely,
the official presentation of enetCollect is hosted by
EURAC (http://enetcollect.eurac.edu/), while the intranet
website is available from ILIAS (https://enetcollect.net/).
How much are they compliant to new EU regulations?
EURAC research has a privacy policy which has been
recently adjusted according to EU Regulation 2016/679
(eurac.edu/en/aboutus/Pages/Privacy.aspx). However, it
warns the users about the use of Google Analytics, without
an immediate possibility to “decline the use of cookies”.
Furthermore, the website “may use the third-party cookies”
including some social plugins. With these official
announcements, EURAC research disclaims responsibility
for any privacy violation.
Although ILIAS is a multi-language open-source LMS,
their privacy policy, or more precisely, the terms of service
are presented in German only (docu.ilias.de/ilias.php?cmd
=showTermsOfService&amp;cmdClass=ilstartupgui&amp;cmdNod
e=k8&amp;baseClass=ilStartUpGUI). The policy starts with the
intellectual property rights under GPL, carries on with the
limitations of inappropriate content, and continues with
data protection. The compliance with GDPR is not
explicitly highlighted, but all the rights of data subject are
carefully examined. The possibility of using the LMS by
people with blindness or visual impairments, which is
guaranteed by the Marrakesh Treaty in not enabled
(www.wipo.int/marrakesh_treaty/en/). This is the only
system, which reveals the responsible authority for all the
data protection issues (http://www.ldi.nrw.de).</p>
      <p>5.</p>
    </sec>
    <sec id="sec-8">
      <title>Conclusion</title>
      <p>EnetCollect’s crowdsourcing framework for language
learning can initially adopt EURAC’s prudent privacy
policy. Privacy notes should be accompanied with terms of
use, and with a rational acceptable use policy. Furthermore,
Marrakesh Treaty should also be taken into consideration,
to enable access to learning resources to all the learners and
teachers, without any disability discrimination. The
corresponding regulation for US, which is not a member of
the World Intellectual Property Organization is the
Equality Act (equalityhumanrights.com/en/equality-act).
All the pointed issues are primarily recommended for
enetCollect’s framework, but they are also applicable to all
the existing or new educational platforms worldwide,
including the crowd-oriented ones.</p>
      <p>After alerting the prospective users about all these
documents, a written consent about data privacy and
intellectual property should be obtained from all of them.
But first, the users should be properly introduced to the
documents and advised to read them carefully. To do so,
they should be as clear as possible, very concise and easily
comprehensible.</p>
      <p>
        To guarantee that all the sensitive student information are
safeguarded, the regulations defined should be obeyed with
no exclusions. Accountability measures should be strict.
Otherwise, enetCollect’s system will be one of those
experiments, which impose “privacy concerns and the
safety of student data as obstacles”
        <xref ref-type="bibr" rid="ref16">(Johnson et al, 2016)</xref>
        .
      </p>
    </sec>
    <sec id="sec-9">
      <title>Bibliographical References</title>
      <p>Rights of data Transparency and Access to personal Rectification and Right to object Restrictions
subject modalities data erasure
Blackboard Complete Complete Complete Complete
blackboard.com Partial compliance compliance compliance compliance compliance
Canvas Complete Complete
canvaslms.com Partial compliance compliance compliance Partial compliance
Duolingo Complete Complete Complete Complete
duolingo.com compliance compliance compliance compliance
Edmodo Complete
edmodo.com Partial compliance compliance Not designated Not designated
EdX Complete Complete Complete Complete
www.edx.org compliance compliance compliance compliance Not designated
FutureLearn Complete Complete Complete Complete Complete
futurelearn.com compliance compliance compliance compliance compliance
Khan Academy Complete Complete Complete Complete Complete
khanacademy.org compliance compliance compliance compliance compliance
Mechanical Turk
mturk.com Partial compliance Not designated Not designated Not designated Not designated
Moodle: Complete Complete Complete Complete Complete
Moodle.org compliance compliance compliance compliance compliance
SAPSuccessFactors Complete Complete Complete Complete Complete
successfactors.com compliance compliance compliance compliance compliance
Table 1: Rights of data subjects in learning management systems and crowdsourcing platform</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          <string-name>
            <surname>Baepler</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Murdoch</surname>
            ,
            <given-names>C. J.</given-names>
          </string-name>
          (
          <year>2010</year>
          ).
          <article-title>Academic analytics and data mining in higher education. Int. journal for the scholarship of teaching and learning: 4(2</article-title>
          ),
          <fpage>17</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          <string-name>
            <surname>Bergan</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Deca</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          (
          <year>2018</year>
          ).
          <article-title>Twenty years of Bologna and a decade of EHEA: what is next? European higher education area: The impact of past and future policies</article-title>
          (pp.
          <fpage>295</fpage>
          -
          <lpage>319</lpage>
          ). Springer, Cham.
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          <string-name>
            <surname>Campbell</surname>
            ,
            <given-names>J. P.</given-names>
          </string-name>
          , DeBlois,
          <string-name>
            <given-names>P. B.</given-names>
            , &amp;
            <surname>Oblinger</surname>
          </string-name>
          ,
          <string-name>
            <surname>D. G.</surname>
          </string-name>
          (
          <year>2007</year>
          ).
          <article-title>Academic analytics: A new tool for a new era</article-title>
          .
          <source>EDUCAUSE review</source>
          ,
          <volume>42</volume>
          (
          <issue>4</issue>
          ),
          <fpage>40</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          <string-name>
            <surname>Chen</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Mao</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Liu</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          (
          <year>2014</year>
          ).
          <article-title>Big data: A survey</article-title>
          .
          <source>Mobile networks and applications</source>
          ,
          <volume>19</volume>
          (
          <issue>2</issue>
          ),
          <fpage>171</fpage>
          -
          <lpage>209</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          <string-name>
            <surname>DLA Piper</surname>
          </string-name>
          (
          <year>2019</year>
          ).
          <article-title>DLA Piper GDPR data breach survey: https://www</article-title>
          .dlapiper.com/en/uk/insights/publications/2 019/01/gdpr
          <article-title>-data-breach-survey/</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          <string-name>
            <surname>Drummond</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Fischhoff</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          (
          <year>2017</year>
          ).
          <article-title>Individuals with greater science literacy and education have more polarized beliefs on controversial science topics</article-title>
          .
          <source>Proceedings of the National Academy of Sciences</source>
          ,
          <volume>114</volume>
          (
          <issue>36</issue>
          ):
          <fpage>9587</fpage>
          -
          <lpage>9592</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          <string-name>
            <surname>Eckersley</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          (
          <year>2010</year>
          ).
          <article-title>How unique is your web browser?</article-title>
          <source>International Symposium on Privacy Enhancing Technologies Symposium</source>
          , Springer:
          <fpage>1</fpage>
          -
          <lpage>18</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          <string-name>
            <surname>EFF</surname>
          </string-name>
          (
          <year>2018</year>
          ).
          <article-title>Yet another lesson from the Cambridge Analytica fiasco: Remove the barriers to user privacy control</article-title>
          , https://www.eff.org/deeplinks/2018/03/whywe-didnt
          <article-title>-make-fix-my-facebook-privacy-settings-tool</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          <string-name>
            <surname>EHL</surname>
          </string-name>
          , Edmodo Help Center (
          <year>2017</year>
          ).
          <article-title>Important notice about your Edmodo account</article-title>
          : https://support.edmodo.com/hc /en-us/articles/115007376848-
          <string-name>
            <surname>Important-Notice-AboutYour-</surname>
          </string-name>
          Edmodo-Account
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          <string-name>
            <surname>EC</surname>
          </string-name>
          ,
          <string-name>
            <surname>European Commission</surname>
          </string-name>
          (
          <year>2018</year>
          ).
          <article-title>Data protection: 2018 reform of EU data protection rules</article-title>
          , https://eurlex.europa.eu/eli/reg/2016/679/oj
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          <string-name>
            <surname>Flanagan</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Ogata</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          (
          <year>2017</year>
          ).
          <article-title>Integration of learning analytics research and production systems while protecting privacy</article-title>
          .
          <source>The 25th International Conference on Computers in Education</source>
          , New Zealand:
          <fpage>333</fpage>
          -
          <lpage>338</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          <string-name>
            <surname>Godwin-Jones</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          (
          <year>2017</year>
          ).
          <article-title>Scaling up and zooming in: Big data and personalization in language learning</article-title>
          .
          <source>Language Learning &amp; Technology, 21(1)</source>
          ,
          <fpage>4</fpage>
          -
          <lpage>15</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          <string-name>
            <surname>Greidanos</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          (
          <year>2019</year>
          ).
          <article-title>Moodle.org outage and data loss: https://moodle</article-title>
          .org/news/#p1535490
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          <string-name>
            <surname>Halder</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          (
          <year>2014</year>
          ).
          <article-title>Evolution of crowdsourcing: potential data protection, privacy and security concerns under the new media age</article-title>
          .
          <source>Revista Democracia Digital e Governo Eletrônico</source>
          ,
          <volume>1</volume>
          (
          <issue>10</issue>
          ):
          <fpage>377</fpage>
          -
          <lpage>393</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          <string-name>
            <surname>Johnson</surname>
            ,
            <given-names>J. A.</given-names>
          </string-name>
          (
          <year>2014</year>
          ).
          <article-title>The ethics of big data in higher education</article-title>
          .
          <source>International Review of Information Ethics</source>
          ,
          <volume>21</volume>
          (
          <issue>21</issue>
          ),
          <fpage>3</fpage>
          -
          <lpage>10</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          <string-name>
            <surname>Johnson</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Becker</surname>
            ,
            <given-names>S. A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Cummins</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Estrada</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Freeman</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Hall</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          (
          <year>2016</year>
          ).
          <source>NMC horizon report: 2016 higher education edition</source>
          (pp.
          <fpage>1</fpage>
          -
          <lpage>50</lpage>
          ).
          <source>The New Media Consortium.</source>
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          <string-name>
            <surname>Joiner</surname>
            ,
            <given-names>M. C.</given-names>
          </string-name>
          (
          <year>2018</year>
          ).
          <article-title>To see or not to see: the constant conflict between promoting public access to information whilst maintaining confidentiality, Student Records</article-title>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          <string-name>
            <surname>Jones</surname>
            ,
            <given-names>M. L.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Regner</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          (
          <year>2016</year>
          ).
          <article-title>Users or students? Privacy in university MOOCS</article-title>
          . Science and engineering ethics,
          <volume>22</volume>
          (
          <issue>5</issue>
          ):
          <fpage>1473</fpage>
          -
          <lpage>1496</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          <string-name>
            <surname>Mello</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          (
          <year>2018</year>
          ).
          <article-title>Data Breaches in Higher Education Institutions</article-title>
          , University of New Hampshire
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          <string-name>
            <surname>Poore</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          (
          <year>2015</year>
          ).
          <article-title>Using social media in the classroom: A best practice guide</article-title>
          .
          <source>Sage.</source>
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          <string-name>
            <surname>Sandeen</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          (
          <year>2013</year>
          ).
          <article-title>Assessment's place in the new MOOC world</article-title>
          .
          <source>Research &amp; practice in assessment, 8</source>
          ,
          <fpage>5</fpage>
          -
          <lpage>12</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          <string-name>
            <surname>Sen</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          (
          <year>2015</year>
          ).
          <article-title>Security and privacy issues in cloud computing. Cloud technology: concepts, methodologies, tools, and applications</article-title>
          (pp.
          <fpage>1585</fpage>
          -
          <lpage>1630</lpage>
          ).
          <source>IGI Global.</source>
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          <string-name>
            <surname>Soltani</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Seno</surname>
            ,
            <given-names>S. A. H.</given-names>
          </string-name>
          (
          <year>2017</year>
          ).
          <article-title>A survey on digital evidence collection and analysis</article-title>
          .
          <source>7th International Conference on Computer and Knowledge Engineering (ICCKE)</source>
          , IEEE:
          <fpage>247</fpage>
          -
          <lpage>253</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          <string-name>
            <surname>Widup</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          (
          <year>2010</year>
          ).
          <article-title>The leaking vault: Five years of data breaches</article-title>
          .
          <source>Digital Forensics Association</source>
          ,
          <fpage>1</fpage>
          -
          <lpage>42</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          <string-name>
            <surname>Zdravkova</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          (
          <year>2016</year>
          ).
          <article-title>Reinforcing social media based learning, knowledge acquisition and learning evaluation</article-title>
          .
          <source>Procedia - Social and Behavioral Sciences</source>
          ,
          <volume>228</volume>
          :
          <fpage>16</fpage>
          -
          <lpage>23</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          <string-name>
            <surname>Zeide</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Nissenbaum</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          (
          <year>2018</year>
          ).
          <article-title>Learner privacy in MOOCs and virtual education</article-title>
          .
          <source>Theory and Research</source>
          in Education,
          <volume>16</volume>
          (
          <issue>3</issue>
          ),
          <fpage>280</fpage>
          -
          <lpage>307</lpage>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>