<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">Unplugged institutions: towards a localization of the cloud for Learning Analytics privacy enhancement</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Daniel</forename><surname>Amo-Filvà</surname></persName>
							<email>daniel.amo@salle.url.edu</email>
							<affiliation key="aff0">
								<orgName type="department">La Salle</orgName>
								<orgName type="institution">Universitat Ramon Llull</orgName>
								<address>
									<settlement>Barcelona</settlement>
									<country key="ES">Spain</country>
								</address>
							</affiliation>
							<affiliation key="aff3">
								<orgName type="institution">earning Analytics Summer Institute Spain (LASI Spain)</orgName>
								<address>
									<addrLine>2022, June 20-21</addrLine>
									<postCode>2022</postCode>
									<settlement>Salamanca</settlement>
									<country key="ES">Spain</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">David</forename><surname>Fonseca</surname></persName>
							<affiliation key="aff0">
								<orgName type="department">La Salle</orgName>
								<orgName type="institution">Universitat Ramon Llull</orgName>
								<address>
									<settlement>Barcelona</settlement>
									<country key="ES">Spain</country>
								</address>
							</affiliation>
							<affiliation key="aff3">
								<orgName type="institution">earning Analytics Summer Institute Spain (LASI Spain)</orgName>
								<address>
									<addrLine>2022, June 20-21</addrLine>
									<postCode>2022</postCode>
									<settlement>Salamanca</settlement>
									<country key="ES">Spain</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Marc</forename><surname>Alier</surname></persName>
							<affiliation key="aff1">
								<orgName type="institution">Universitat Politècnica de Catalunya</orgName>
								<address>
									<settlement>Barcelona</settlement>
									<country key="ES">Spain</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Francisco</forename><forename type="middle">José</forename><surname>García-Peñalvo</surname></persName>
							<affiliation key="aff2">
								<orgName type="institution">Universidad de Salamanca</orgName>
								<address>
									<settlement>Salamanca</settlement>
									<country key="ES">Spain</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Mª</forename><forename type="middle">José</forename><surname>Casañ</surname></persName>
							<email>mjcasany@essi.upc.edu</email>
							<affiliation key="aff1">
								<orgName type="institution">Universitat Politècnica de Catalunya</orgName>
								<address>
									<settlement>Barcelona</settlement>
									<country key="ES">Spain</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">Unplugged institutions: towards a localization of the cloud for Learning Analytics privacy enhancement</title>
					</analytic>
					<monogr>
						<imprint>
							<date/>
						</imprint>
					</monogr>
					<idno type="MD5">C147C7E40503A6747E7E32919D2D8145</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2023-03-23T23:08+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>Learning Analytics</term>
					<term>Privacy</term>
					<term>Localization</term>
					<term>Cloud Computing</term>
					<term>Un-plugged Institutions</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>The debate on privacy issues in Learning Analytics processes has been going on for a long time. In academic terms, various researchers attempted to identify the origin of the problem, provide solutions, and propose alternatives. However, the problem is complex, not yet solved, and increasingly pressing and serious. We reflect on cloud computing technologies as a generator of privacy issues and new derivatives. We assume that the technology used in the cloud is aggravating the problem, not Learning Analytics itself. Considering data capitalism, we argue that it is hopelessly impossible to solve the privacy problem, nor even mitigate it, when educational institutions use data ubiquity services in the cloud. We point to the paradox of Learning Analytics as the in-compatibility factor with third-party cloud computing services, where the latter is the link to all the associated privacy issues. To mitigate privacy issues, we propose the deconstruction of cloud computing for its localization. The localization is the basis of a new concept related to the disconnection of educational institutions from the cloud. New technological perspectives, legal frameworks, and social, cultural, and political changes are required.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1.">Introduction</head><p>We need to talk. Privacy issues in Learning Analytics processes have long been debated. In 2010, three years before Pardo and Siemens linked ethical and privacy principles to Learning Analytics <ref type="bibr" target="#b0">[1]</ref>, Bach <ref type="bibr" target="#b1">[2]</ref> expressed some concerns about analyzing educational data: "Who should be able to access the data and view results? Which data should be reported anonymously? Which can be tagged to students for educational purposes?". Researchers have made different attempts to identify ethical and privacy problems <ref type="bibr" target="#b2">[3]</ref> and afterward provide possible solutions <ref type="bibr" target="#b3">[4,</ref><ref type="bibr" target="#b4">5]</ref>. However, beyond identifying ethical and privacy problems related to automated data processing in education and trying to solve them, these concerns are becoming increasingly serious and pressing. It seems that we are at the same starting point. As stated by Bach in 2013, "…any institution engaging in these <ref type="bibr">[…]</ref> activities should plan on developing a concurrent, and systematic, conversation that addresses for the institution how it approaches the ethical and legal issues that might arise along…". Bach was right then and now, after nine years from his asseverations: we are still in those initial conversations, now trying to define the role of the Chief Privacy and Chief Ethics Officers in an undeniable "shortage of leadership" <ref type="bibr" target="#b5">[6]</ref> (p. 113) regarding data treatment.</p><p>In this conceptual article, thus not a research paper, we briefly explore cloud computing as the problem and expose what we call unplugged institutions (from cloud computing) as a proposal for student privacy protection enhancement, thus advancing ethical and privacy concerns pointed out nine years ago.</p><p>The remainder of this paper is structured as follows: Section 2 explains how the cloud diminishes students' privacy. Section 3 presents how the cloud generates entropy in Learning Analytics processes. Section 4 reflects on the proposed concept of unplugged institutions. Finally, conclusions as Section 5 ends the paper.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.">The cloud is students' data hell</head><p>Students have a big problem regarding privacy, and academics have too much homework to be done. Alier et al. <ref type="bibr" target="#b6">[7]</ref> reveal some challenges that they state as a "pending task" in privacy and e-learning, being the surveillance capitalism one of the most dangerous to consider. Surveillance capitalism means "obtain and analyze as much data as possible of the user's activity in order to gain the ability to influence their behavior". In education, considering definitions of Learning Analytics such as the elaborated by Bach <ref type="bibr" target="#b1">[2]</ref> or Siemens <ref type="bibr" target="#b7">[8]</ref>, influencing the students' behavior is intended as positive; but surveillance capitalism makes it the worst practice.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.1.">Surveillance capitalism in the data capitalism era</head><p>The surveillance capitalism, under the data capitalism movement, is a long-standing problem once ago called the "dossier effect". This is defined by Goldberg et al. in 1997 as "dangerous" due "it is so easy to build a comprehensive profile of individuals," and "many will be tempted to take advantage of it" <ref type="bibr" target="#b8">[9]</ref> (p. 104). This "dossier effect" is exemplified in the educational context as applications that extract, collect and store student data that can be used by actors without any authorization. This student data, both personal and metadata, is used without permission to, among other, create profiles to predict enrollment, to deny tuitions to those students with lower financial status or to serve targeted advertisements <ref type="bibr" target="#b6">[7]</ref>. Data collected without permission has even been sold and used in the name of improving educational products as seen in the inBloom scandal, where "data (was) available to (New York) district-approved third parties to develop tools and dashboards so the data could more easily be used by classroom educators." <ref type="bibr" target="#b9">[10]</ref>. inBloom organization was closed due to breaking privacy rules.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.2.">Cloud computing is everywhere</head><p>All the processes mentioned above have a common denominator: cloud computing. The concept of "cloud computing" is the abstraction of a set of real computers as interconnected and hyperconnected servers that make available the use of developments under service in high efficiency to treat a massive number of requests and data. These servers and programs are managed by third parties that follow their ideology, ideas, and policies, or worse, follow other third parties' ideologies at different levels of depth. Therefore, in this article, we avoid defining these services as solutions since most of them impose unresolved problems of great magnitude related to privacy, security, and data ethics. Hence, we refer to cloud computing as those "public cloud" services ruled by the market.</p><p>Unfortunately, educational institutions migrate their educational infrastructures to cloud computing. The reasoning is different for each one, but mostly with arguments based on economics. Educational institutions shift from active controllers to passive users during this technological transition: they go from controlling infrastructures and data to delegating computing power and data management, treatment, and storage location. All educational institutions that move their infrastructures to third-party cloud computing lose absolute control of enrolled students data (and potentially to any user stored in the database) <ref type="bibr" target="#b10">[11]</ref> (pp. 263-265); by becoming passive users, the control of the data is inexistent, and management transferred to entities that grow in centralization and power. In the last three months of 2021, Amazon concentrated 33% of the cloud computing market share worldwide, followed by Microsoft, Google, and Alibaba. This growth in differences is constant; the shares of Microsoft and Google added together do not exceed the share of Amazon. Dindsdale makes it very clear "…the rising tide continues to lift all boats, but some are being lifted more swiftly than others." <ref type="bibr" target="#b11">[12]</ref>.</p><p>All third-party applications (cloud-based or not) mean a risk to educational data. However, onpremises third-party software and hardware, can be controlled in some manner or another by IT staff, even unplugged from the internet to avoid data transfers. Without local infrastructures, the necessary knowledge and experience in educational institutions IT staff to develop, implement, deploy, and manage technologies intended for education, will be transferred to third-party services IT staff. This fact generates an absolute dependency that grows longitudinally and exponentially. The longer the know-how remains in the hands of third parties, the higher the cost of returning the location of the infrastructures, and so power and control, to educational institutions. In a possible dystopian scenario, this outsourcing debt will be impossible to reduce or eliminate. This catastrophic scenario will consider full outsourcing of the connectivity with third-party internet-managed devices such as IoT or even those wi-fi devices that feed educational campuses with the internet. This kind of scenario would complete the transfer of power and control from local institutions to third parties, thus, generating power asymmetries. It is no longer about hardware or software beyond LMSs, but third-party applications that orbit the teaching-learning processes that store and analyze educational data. For each application used in the classroom, the risk of data leakage increases from installation to installation among students, and thus also the loss of power and control in these processes.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.3.">More actors, less privacy</head><p>The common denominator in the use of Learning Analytics is also the cloud computing associated with technologies within the Big Data movement such as IoT, Machine Learning, and Artificial Intelligence techniques that arises ethical and privacy issues <ref type="bibr" target="#b10">[11,</ref><ref type="bibr" target="#b12">13]</ref>. These technologies run in remote data centers adding actors all along with the data processing. Hence, as with many (unknown) actors, the user's privacy diminishes.</p><p>Unfortunately, the trend among institutions in education is to use third-party cloud computing services to provide educational technology solutions, thus, raising the number of (unknown) actors that may have access to data. In these terms, once again, the new wave of technological solutionism <ref type="bibr" target="#b13">[14]</ref> proves to be a failure, now in the form of cloud computing, considering ethical and privacy issues. Hence, considering the above, it is hopelessly impossible to solve or even mitigate the privacy problem in the cloud, considering that the more actors are involved, the less privacy is ensured. We dare to make this statement since cloud computing implies permanent and uncontrolled access to information from anywhere and by unknown actors.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.">Too much entropy: Learning Analytics in the cloud paradox</head><p>Bach <ref type="bibr" target="#b1">[2]</ref> defines Learning Analytics, in which could be the first public definition, as "…the use of advanced modeling techniques integrated with learning outcomes assessment to better understand student learning and more efficiently and meaningfully target instruction, curricula and support.". The meaning given to Learning Analytics (even considering the definition from SOLAR <ref type="bibr" target="#b14">[15]</ref>) implies that the teacher uses (any) specific students' data to provide personalized support of any kind at the agreed time. Thus, the very genesis of the concept of Learning Analytics undermines privacy to the minimum possible.</p><p>Enabling full privacy Learning Analytics is not nourished with data. Without fully identified student data, the teacher cannot articulate directed actions but rather general ones with general effects. With no identifying data, there is no personalized Learning Analytics. Therefore, considering the micro-level, Learning Analytics consists of data exchange between teachers (as responsible for success <ref type="bibr" target="#b15">[16]</ref>) and students.</p><p>Considering the above, using cloud computing in Learning Analytics breaks the rule of data exchange between teachers and students because data is [possibly] accessible by (unknown) third parties. In this sense, a paradox is outlined when Learning Analytics uses cloud computing. Since principals cannot reduce the actors involved, the uncertainty of access to data generates a high entropy (lack of order that let chaos in controlling users' privacy) and pushes to anonymize the data as the final solution. However, this anonymization is not possible because of the meaning given to Learning Analytics regarding the need for identifying students' data. Hence, Learning Analytics processes require privacy, but this privacy is impossible to provide when using cloud computing due to its definition.</p><p>Although some laws, such as the GDPR (General Data Protection Regulation, Regulation (EU) 2016/679), accept the pseudonymization of data, it is technically possible that third parties use multiple attributes to end up identifying students. This is what Rocher et al. <ref type="bibr" target="#b16">[17]</ref> conclude in its model of reidentification in incomplete and anonymized datasets with the effectiveness of 99.98%, thus, breaking the standards imposed by the GDPR. The legality is punitive and not preventive, so as a society we must rely on the acceptance and practice of this legal codex. However, countries have different legalities that can be seen as disobediences by each other, thus generating much more entropy, and a system with too much entropy collapses <ref type="bibr" target="#b17">[18]</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.">Unplugged institutions</head><p>The abovementioned is the foundation of the meaning of unplugged institutions: those totally or partially disconnected from the cloud that minimizes third-party actors not related to the institution itself. Thus, these unplugged institutions will execute Un-plugged Learning Analytics (ULA).</p><p>Prinsloo et al. <ref type="bibr" target="#b18">[19]</ref> point out that the solution is not technological, but a social change is necessary. Society requires that the laws support its decisions. It is the society that pushes new ways of legislating in response to its social desires. Other authors, such as Alier et al. <ref type="bibr" target="#b6">[7]</ref> point out the privacy problem at a social level: "we need to solve at a social and cultural level the ethical dilemma presented by data privacy" (p. 13). In European education, the GDPR regulates the data treatment and the data transfer to third countries. However, this legislation does not reference how to reduce actors. Thus, the current legislation cannot be a regulation for unplugged institutions. Therefore, new social, political, and cultural rules are required for those institutions [partially] free from cloud computing.</p><p>The idea of the unplugged institution requires profound social change, a new technological perspective, and new (or old) engineering to make it possible. New developments capable of reducing actors and improving student privacy in this regard will emerge from such foundations.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.1.">Turn off cloud computing</head><p>We are now in an infinite loop. As we have commented in the introduction, non-technological actions, and privacy-enhancing technologies (PET) are proposed in a techno-solutionism that leads us to an apparent advance. However, the problem remains unsolved. How can the technology that supports Learning Analytics use cloud computing to preserve the identity of students from third parties? The answer is (it seems to be) a negative due to profound uncertainty. To reduce the risk of the Learn-ing Analytics paradox, we must forbid cloud computing. This dilemma uncovers serious questions that (apparently) fight against the development of cloud computing, and perhaps this is the case in education and Learning Analytics processes (the technology per se is not an opportunity); among them, surely the most important: is it possible to reduce the high levels of entropy generated by the cloud computing in Learning Analytics?</p><p>Considering what has been stated in the previous sections, the answer to this question leads us to an irremediable total or partial disconnection of institutions from cloud computing, thus, move to unplugged institutions. If reducing the [privacy] risks [in the cloud] is unacceptable, it only remains to eliminate the risks. The way to do this is to reduce the intermediary actors in cloud technologies. The previous means getting out of the cloud as the more actors involved, the less privacy for students. It is necessary to initiate a relocation of power over technologies, services, and data. This movement implicitly implies new ways of thinking and understanding automated data processing.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.">Conclusions</head><p>The concept of unplugged institutions as a solution to (some) social, cultural, and political problems regarding data privacy is an alternative to the technical problematics created by a techno-solutionism of faith in cloud computing. The economic costs of infrastructures are reduced when migrating services to the cloud. Besides, the risks and harmful effects on students are increased. Hence, the economic reduction is subsidized by students' data.</p><p>The proposal assumes that, in the educational system, the closer the data is to third-party cloud computing, the more unknown actors will appear, and the more entropy will generate. Besides, the closer the student's data is to the teacher, the less actors will be involved, and the less entropy will arise. Therefore, we establish a connection between privacy and proximity. Reducing data proximity solves or mitigates the problem of entropy in education. We communicated it in our previous work <ref type="bibr" target="#b10">[11]</ref> "…data proximity is therefore essential to ensure non-leakage, non-misuse, non-prohibited, or inappropriate storage, and non-processing without permission of any data generated…" (p. 270).</p><p>Without excluding cloud computing or considering an absolute localization, the proposal of unplugged institutions promotes a balance of those local and remote policies and techniques that help reduce the actors involved in Learning Analytics processes. Thus, "the unplugged institution" is not a technical proposal, although technology is an important part. As Alier et al. <ref type="bibr" target="#b6">[7]</ref> expose, the changes must be accompanied by debate in social, cultural, and political perspective; this argument is being shared by other authors such as Prinsloo et al. <ref type="bibr" target="#b18">[19]</ref> when they state that "we should approach data privacy as primarily a social problem" (p. 3). Likewise, we pointed out our commitment to local technologies and 7 regulatory principles <ref type="bibr" target="#b19">[20]</ref>. All these proposals are the beginning of alternatives to solve privacy issues that open new ways of looking, knowledge, and actions.</p></div>		</body>
		<back>
			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<analytic>
		<title level="a" type="main">Ethical and privacy principles for learning analytics</title>
		<author>
			<persName><forename type="first">A</forename><surname>Pardo</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Siemens</surname></persName>
		</author>
		<idno type="DOI">10.1111/bjet.12152</idno>
		<ptr target="https://doi.org/10.1111/bjet.12152" />
	</analytic>
	<monogr>
		<title level="j">British Journal of Educational Technology</title>
		<imprint>
			<biblScope unit="volume">45</biblScope>
			<biblScope unit="page" from="438" to="450" />
			<date type="published" when="2014">2014</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<analytic>
		<title level="a" type="main">Learning Analytics: Targeting Instruction, Curricula and Student Support</title>
		<author>
			<persName><forename type="first">C</forename><surname>Bach</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the The 8th International Conference on Education and Information Systems, Technologies and Applications: EISTA 2010</title>
				<meeting>the The 8th International Conference on Education and Information Systems, Technologies and Applications: EISTA 2010<address><addrLine>EISTA, Orlando, Florida, USA</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2010">2010</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<analytic>
		<title level="a" type="main">Learning Analytics: Ethical Issues and Dilemmas</title>
		<author>
			<persName><forename type="first">S</forename><surname>Slade</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Prinsloo</surname></persName>
		</author>
		<idno type="DOI">10.1177/0002764213479366</idno>
		<ptr target="https://doi.org/10.1177/0002764213479366" />
	</analytic>
	<monogr>
		<title level="j">American Behavioral Scientist</title>
		<imprint>
			<biblScope unit="volume">57</biblScope>
			<biblScope unit="page" from="1510" to="1529" />
			<date type="published" when="2013">2013</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<monogr>
		<author>
			<persName><forename type="first">D</forename><surname>Amo</surname></persName>
		</author>
		<ptr target="https://repositorio.grial.eu/bitstream/grial/1951/1/TesisDanielAmoFilva-LearningAnalytics-Blockchain_v43.pdf" />
		<title level="m">Privacidad y gestión de la identidad en procesos de analítica de aprendizaje con Blockchain</title>
				<imprint>
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<monogr>
		<title level="m" type="main">Personal Data Broker: A Solution to Assure Data Privacy in EdTech</title>
		<author>
			<persName><forename type="first">D</forename><surname>Amo</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Fonseca</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Alier</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><forename type="middle">J</forename><surname>García-Peñalvo</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">J</forename><surname>Casañ</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Alsina</surname></persName>
		</author>
		<editor>Zaphiris, P. y Loannou</editor>
		<imprint/>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<monogr>
		<title level="m">International Conference on Human-Computer Interaction</title>
				<meeting><address><addrLine>Orlando, USA</addrLine></address></meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2019">2019</date>
			<biblScope unit="page" from="3" to="14" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<analytic>
		<title level="a" type="main">Ethics and Privacy in Learning Analytics: The Rise of Chief Privacy and Chief Ethics Officers</title>
		<author>
			<persName><forename type="first">R</forename><forename type="middle">S</forename><surname>Timofte</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Ethical Use of Information Technology in Higher Education</title>
				<editor>
			<persName><forename type="first">L</forename><surname>Mâță</surname></persName>
		</editor>
		<meeting><address><addrLine>Singapore</addrLine></address></meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2022">2022</date>
			<biblScope unit="page" from="113" to="126" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<analytic>
		<title level="a" type="main">Learner Privacy, a pending assignment</title>
		<author>
			<persName><forename type="first">M</forename><surname>Alier</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">J</forename><surname>Casany</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Severance</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Amo</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the Eighth International Conference on Technological Ecosystems for Enhancing Multiculturality</title>
				<meeting>the Eighth International Conference on Technological Ecosystems for Enhancing Multiculturality<address><addrLine>New York, NY, USA</addrLine></address></meeting>
		<imprint>
			<publisher>Association for Computing Machin-ery</publisher>
			<date type="published" when="2020">2020</date>
			<biblScope unit="page" from="725" to="729" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<analytic>
		<title level="a" type="main">Learning Analytics: The Emergence of a Discipline</title>
		<author>
			<persName><forename type="first">G</forename><surname>Siemens</surname></persName>
		</author>
		<idno type="DOI">10.1177/0002764213498851</idno>
		<ptr target="https://doi.org/10.1177/0002764213498851" />
	</analytic>
	<monogr>
		<title level="j">American Behavioral Scientist</title>
		<imprint>
			<biblScope unit="volume">57</biblScope>
			<biblScope unit="page" from="1380" to="1400" />
			<date type="published" when="2013">2013</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<analytic>
		<title level="a" type="main">Privacy-enhancing technologies for the Internet</title>
		<author>
			<persName><forename type="first">I</forename><surname>Goldberg</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Wagner</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Brewer</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings IEEE COMPCON 97</title>
		<title level="s">Digest of Papers</title>
		<meeting>IEEE COMPCON 97<address><addrLine>San Jose, CA, USA</addrLine></address></meeting>
		<imprint>
			<publisher>IEEE</publisher>
			<date type="published" when="1997">1997</date>
			<biblScope unit="page" from="103" to="109" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<monogr>
		<author>
			<persName><forename type="first">B</forename><surname>Herold</surname></persName>
		</author>
		<ptr target="http://blogs.edweek.org/edweek/DigitalEducation/2014/04/inbloom_to_shut_down_amid_growing_data_privacy_concerns.html" />
		<title level="m">InBloom to Shut Down Amid Growing Data-Privacy Concerns</title>
				<imprint/>
	</monogr>
</biblStruct>

<biblStruct xml:id="b11">
	<analytic>
		<title level="a" type="main">Local Technology to Enhance Data Privacy and Security in Educational Technology</title>
		<author>
			<persName><forename type="first">D</forename><surname>Amo</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Prinsloo</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Alier</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Fonseca</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><forename type="middle">T</forename><surname>Kompen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">X</forename><surname>Canaleta</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Herrero-Martín</surname></persName>
		</author>
		<idno type="DOI">10.9781/ijimai.2021.11.006</idno>
		<ptr target="https://doi.org/10.9781/ijimai.2021.11.006" />
	</analytic>
	<monogr>
		<title level="j">International Journal of Interactive Multimedia and Artificial Intelligence</title>
		<imprint>
			<biblScope unit="volume">7</biblScope>
			<biblScope unit="page" from="262" to="273" />
			<date type="published" when="2021">2021</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b12">
	<monogr>
		<author>
			<persName><forename type="first">F</forename><surname>Richter</surname></persName>
		</author>
		<ptr target="https://www.statista.com/chart/18819/worldwide-market-share-of-leading-cloud-infrastructure-service-providers/" />
		<title level="m">Infographic: Amazon Leads $180-Billion Cloud Market</title>
				<imprint/>
	</monogr>
</biblStruct>

<biblStruct xml:id="b13">
	<analytic>
		<title level="a" type="main">Systematic Review of Existing IoT Architectures Security and Privacy Issues and Concerns</title>
		<author>
			<persName><forename type="first">F</forename><surname>Alshohoumi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Sarrab</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Alhamadani</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Al-Abri</surname></persName>
		</author>
		<idno type="DOI">10.14569/IJACSA.2019.0100733</idno>
		<ptr target="https://doi.org/10.14569/IJACSA.2019.0100733" />
	</analytic>
	<monogr>
		<title level="j">International Journal of Advanced Computer Science and Applications (IJACSA)</title>
		<imprint>
			<biblScope unit="volume">10</biblScope>
			<biblScope unit="page" from="232" to="251" />
			<date type="published" when="2019">2019</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b14">
	<monogr>
		<author>
			<persName><forename type="first">E</forename><surname>Morozov</surname></persName>
		</author>
		<title level="m">To save everything, click here: The folly of technological solutionism</title>
				<meeting><address><addrLine>New York, NY, USA</addrLine></address></meeting>
		<imprint>
			<publisher>PublicAffairs</publisher>
			<date type="published" when="2013">2013</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b15">
	<monogr>
		<author>
			<persName><surname>Solar</surname></persName>
		</author>
		<ptr target="https://solaresearch.org/about/" />
		<title level="m">About SoLAR</title>
				<imprint/>
	</monogr>
</biblStruct>

<biblStruct xml:id="b16">
	<analytic>
		<title level="a" type="main">Discourse-centric learning analytics: mapping the terrain</title>
		<author>
			<persName><forename type="first">S</forename><surname>Knight</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Littleton</surname></persName>
		</author>
		<idno type="DOI">10.18608/jla.2015.21.9</idno>
		<ptr target="https://doi.org/10.18608/jla.2015.21.9" />
	</analytic>
	<monogr>
		<title level="j">Journal of Learning Analytics</title>
		<imprint>
			<biblScope unit="volume">2</biblScope>
			<biblScope unit="page" from="185" to="209" />
			<date type="published" when="2015">2015</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b17">
	<analytic>
		<title level="a" type="main">Estimating the success of re-identifications in incomplete datasets using generative models</title>
		<author>
			<persName><forename type="first">L</forename><surname>Rocher</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">M</forename><surname>Hendrickx</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y.-A</forename><surname>De Montjoye</surname></persName>
		</author>
		<idno type="DOI">10.1038/s41467-019-10933-3</idno>
		<ptr target="https://doi.org/10.1038/s41467-019-10933-3" />
	</analytic>
	<monogr>
		<title level="j">Nat Commun</title>
		<imprint>
			<biblScope unit="volume">10</biblScope>
			<biblScope unit="page">3069</biblScope>
			<date type="published" when="2019">2019</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b18">
	<monogr>
		<author>
			<persName><forename type="first">L</forename><surname>Franceschi-Bicchierai</surname></persName>
		</author>
		<ptr target="https://www.vice.com/en/article/akvmke/facebook-doesnt-know-what-it-does-with-your-data-or-where-it-goes" />
		<title level="m">Facebook Doesn&apos;t Know What It Does With Your Data, Or Where It Goes: Leaked Document</title>
				<imprint>
			<date type="published" when="2022">2022</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b19">
	<analytic>
		<title level="a" type="main">The answer is (not only) technological: Considering student data privacy in learning analytics</title>
		<author>
			<persName><forename type="first">P</forename><surname>Prinsloo</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Slade</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Khalil</surname></persName>
		</author>
		<idno type="DOI">10.1111/bjet.13216</idno>
		<ptr target="https://doi.org/10.1111/bjet.13216" />
	</analytic>
	<monogr>
		<title level="j">British Journal of Educational Technology</title>
		<imprint>
			<biblScope unit="volume">00</biblScope>
			<biblScope unit="page" from="1" to="18" />
			<date type="published" when="2022">2022</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b20">
	<monogr>
		<author>
			<persName><forename type="first">D</forename><surname>Amo</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Torres</surname></persName>
		</author>
		<author>
			<persName><forename type="first">X</forename><surname>Canaleta</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Herrero-Martín</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Rodríguez-Merino</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Fonseca</surname></persName>
		</author>
		<title level="m">Seven principles to foster privacy and security in educational tools: Local Educational Data Analytics</title>
				<imprint>
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
