Categories
Presentations

A data protection model for production learning analytics

[UPDATE: the full paper describing this approach has now been published in the Journal of Learning Analytics] [based on Doug Clow’s liveblog of the talk I did at the LAEP workshop in Amsterdam] I was a law student when I first came across learning analytics; the idea of being asked “do you consent to learning […]

Categories
Presentations

Learning from Software Vulnerabilities

The slides from our Networkshop session on Learning from Software Vulnerabilities are now available. All three talks showed how managing the process of finding, reporting and fixing vulnerabilities can improve the quality of software and the security of our systems. Graham Rymer and Jon Warbrick presented a case study of discovering and fixing a bug […]

Categories
Presentations

Prevent: What’s The Role of Technology?

Roughly what I said in my Digifest presentation yesterday Since the Prevent duty, to help those at risk of radicalisation, was applied to universities and colleges there has been a lot of discussion of what role technology can play. The first thing to note is that, although there is a section on “IT Policies” in […]

Categories
Presentations

Committee reports on draft Investigatory Powers Bill

At the LINX meeting yesterday I was invited to summarise the various Parliamentary Committees’ reports on the draft Investigatory Powers Bill. For more detail, see Graham Smith’s excellent commentary. All three reports find problems, though the pattern has changed from four years ago when the predecessor Communications Data Bill was considered. In 2012 the most […]

Categories
Presentations

Doing the Right Thing with Digital Students

[roughly what I said in a presentation yesterday to the Northern Universities’ Consortium] I’ve been a full or part-time student for more than thirty years. It’s interesting to reflect on how my student record has changed over that time. In 1981 university administrators no doubt put my typed application in a paper file. Each year […]

Categories
Presentations

Protecting privacy through incident response

At the FIRST conference this week I presented ideas on how effective incident response protects privacy. Indeed, since most common malware infects end user devices and hides itself, an external response team may be the only way the owner can learn that their private information is being read and copied by others. The information sources […]

Categories
Presentations

Big Data: Wrongs and Rights

Last week I gave a seminar “Big Data Wrongs and Rights” at Southampton University on how data protection law could provide support and guidance for universities’ use of learning analytics. The next day Jisc launched a Code of Practice on Learning Analytics, which puts many of the same ideas into practical form. After the seminar […]

Categories
Presentations

BYOD: What’s the Difference?

I’ve done a couple of presentations this week, comparing the risks and benefits of Bring Your Own Device (BYOD) with those that research and education organisations already accept in the ways we use organisation-managed mobile devices. As the title of my talk in Dundee asked, “BYOD: What’s the Difference” Nowadays, most of the significant risks […]

Categories
Presentations

Sharing Information to Protect Privacy

I was invited to give a presentation on legal and ethical issues around information sharing at TERENA’s recent security services workshop. The talk highlighted the paradox that sharing information is essential to protect the privacy of our users when their accounts or computers have been compromised, but that sharing can also harm privacy if it’s […]

Categories
Presentations

Opportunities and Choices: Digital Student Records and Privacy

I was recently invited by the Groningen Declaration Network to join a panel discussing privacy issues around the exchange of digital student records. Like the discussion, this summary is a collaborative effort by the panel team. Two main use cases were discussed during the meeting: transferring records between education institutions when students apply to or […]