Customize Consent Preferences

We use cookies to help you navigate efficiently and perform certain functions. You will find detailed information about all cookies under each consent category below.

The cookies that are categorized as "Necessary" are stored on your browser as they are essential for enabling the basic functionalities of the site. ... 

Always Active

Necessary cookies are required to enable the basic features of this site, such as providing secure log-in or adjusting your consent preferences. These cookies do not store any personally identifiable data.

No cookies to display.

Functional cookies help perform certain functionalities like sharing the content of the website on social media platforms, collecting feedback, and other third-party features.

No cookies to display.

Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics such as the number of visitors, bounce rate, traffic source, etc.

No cookies to display.

Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.

No cookies to display.

Advertisement cookies are used to provide visitors with customized advertisements based on the pages you visited previously and to analyze the effectiveness of the ad campaigns.

No cookies to display.

Categories
Presentations

A data protection model for production learning analytics

[UPDATE: the full paper describing this approach has now been published in the Journal of Learning Analytics] [based on Doug Clow’s liveblog of the talk I did at the LAEP workshop in Amsterdam] I was a law student when I first came across learning analytics; the idea of being asked “do you consent to learning […]

Categories
Presentations

Learning from Software Vulnerabilities

The slides from our Networkshop session on Learning from Software Vulnerabilities are now available. All three talks showed how managing the process of finding, reporting and fixing vulnerabilities can improve the quality of software and the security of our systems. Graham Rymer and Jon Warbrick presented a case study of discovering and fixing a bug […]

Categories
Presentations

Prevent: What’s The Role of Technology?

Roughly what I said in my Digifest presentation yesterday Since the Prevent duty, to help those at risk of radicalisation, was applied to universities and colleges there has been a lot of discussion of what role technology can play. The first thing to note is that, although there is a section on “IT Policies” in […]

Categories
Presentations

Committee reports on draft Investigatory Powers Bill

At the LINX meeting yesterday I was invited to summarise the various Parliamentary Committees’ reports on the draft Investigatory Powers Bill. For more detail, see Graham Smith’s excellent commentary. All three reports find problems, though the pattern has changed from four years ago when the predecessor Communications Data Bill was considered. In 2012 the most […]

Categories
Presentations

Doing the Right Thing with Digital Students

[roughly what I said in a presentation yesterday to the Northern Universities’ Consortium] I’ve been a full or part-time student for more than thirty years. It’s interesting to reflect on how my student record has changed over that time. In 1981 university administrators no doubt put my typed application in a paper file. Each year […]

Categories
Presentations

Protecting privacy through incident response

At the FIRST conference this week I presented ideas on how effective incident response protects privacy. Indeed, since most common malware infects end user devices and hides itself, an external response team may be the only way the owner can learn that their private information is being read and copied by others. The information sources […]

Categories
Presentations

Big Data: Wrongs and Rights

Last week I gave a seminar “Big Data Wrongs and Rights” at Southampton University on how data protection law could provide support and guidance for universities’ use of learning analytics. The next day Jisc launched a Code of Practice on Learning Analytics, which puts many of the same ideas into practical form. After the seminar […]

Categories
Presentations

BYOD: What’s the Difference?

I’ve done a couple of presentations this week, comparing the risks and benefits of Bring Your Own Device (BYOD) with those that research and education organisations already accept in the ways we use organisation-managed mobile devices. As the title of my talk in Dundee asked, “BYOD: What’s the Difference” Nowadays, most of the significant risks […]

Categories
Presentations

Sharing Information to Protect Privacy

I was invited to give a presentation on legal and ethical issues around information sharing at TERENA’s recent security services workshop. The talk highlighted the paradox that sharing information is essential to protect the privacy of our users when their accounts or computers have been compromised, but that sharing can also harm privacy if it’s […]

Categories
Presentations

Opportunities and Choices: Digital Student Records and Privacy

I was recently invited by the Groningen Declaration Network to join a panel discussing privacy issues around the exchange of digital student records. Like the discussion, this summary is a collaborative effort by the panel team. Two main use cases were discussed during the meeting: transferring records between education institutions when students apply to or […]