메뉴 건너뛰기




Volumn 45, Issue 3, 2014, Pages 438-450

Ethical and privacy principles for learning analytics

Author keywords

[No Author keywords available]

Indexed keywords

EDUCATION; EDUCATIONAL TECHNOLOGY;

EID: 84898796786     PISSN: 00071013     EISSN: 14678535     Source Type: Journal    
DOI: 10.1111/bjet.12152     Document Type: Article
Times cited : (351)

References (48)
  • 3
    • 84883811672 scopus 로고    scopus 로고
    • An analysis of student privacy rights in the use of plagiarism detection systems
    • Brinkman, B., (2012). An analysis of student privacy rights in the use of plagiarism detection systems. Science and Engineering Ethics, 19, 3, 1255-1266.
    • (2012) Science and Engineering Ethics , vol.19 , Issue.3 , pp. 1255-1266
    • Brinkman, B.1
  • 4
    • 85013624586 scopus 로고    scopus 로고
    • Student models that invite the learner in: The SMILI:() open learner modelling framework
    • Bull, S., &, Kay, J., (2007). Student models that invite the learner in: the SMILI:() open learner modelling framework. International Journal of Artificial Intelligence in Education, 17, 2, 89-120.
    • (2007) International Journal of Artificial Intelligence in Education , vol.17 , Issue.2 , pp. 89-120
    • Bull, S.1    Kay, J.2
  • 6
    • 0005927431 scopus 로고    scopus 로고
    • Canadian Standards Association. Ontario: Canadian Standards Association. (No. CAN/CSA-Q830-96).
    • Canadian Standards Association (2001). Model code for the protection of personal information (pp. 7-8). Ontario: Canadian Standards Association. (No. CAN/CSA-Q830-96).
    • (2001) Model Code for the Protection of Personal Information , pp. 7-8
  • 8
    • 84874566936 scopus 로고    scopus 로고
    • The risks of absolute medical confidentiality
    • Crook, M. A., (2011). The risks of absolute medical confidentiality. Science and Engineering Ethics, 19, 1, 107-122.
    • (2011) Science and Engineering Ethics , vol.19 , Issue.1 , pp. 107-122
    • Crook, M.A.1
  • 9
    • 79952002261 scopus 로고    scopus 로고
    • A privacy threat analysis framework: Supporting the elicitation and fulfillment of privacy requirements
    • Deng, M., Wuyts, K., Scandariato, R., Preneel, B., &, Joosen, W., (2010). A privacy threat analysis framework: supporting the elicitation and fulfillment of privacy requirements. Requirements Engineering, 16, 1, 3-32.
    • (2010) Requirements Engineering , vol.16 , Issue.1 , pp. 3-32
    • Deng, M.1    Wuyts, K.2    Scandariato, R.3    Preneel, B.4    Joosen, W.5
  • 10
    • 61049562232 scopus 로고    scopus 로고
    • The structure of rights in directive 95/46/EC on the protection of individuals with regard to the processing of personal data and the free movement of such data
    • Elgesem, D., (1999). The structure of rights in directive 95/46/EC on the protection of individuals with regard to the processing of personal data and the free movement of such data. Ethics and Information Technology, 1, 283-293.
    • (1999) Ethics and Information Technology , vol.1 , pp. 283-293
    • Elgesem, D.1
  • 13
    • 84898823234 scopus 로고    scopus 로고
    • Ipsos MediaCT. Germany: Ipsos MediaCT.
    • Ipsos MediaCT. (2011). Mobile internet & smartphone adoption Vol. 2011 (pp. 1-12). Germany: Ipsos MediaCT.
    • (2011) Mobile Internet & Smartphone Adoption , vol.2011 , pp. 1-12
  • 14
    • 84876470686 scopus 로고    scopus 로고
    • Legal, risk and ethical aspects of analytics in higher education
    • Kay, D., Korn, N., &, Oppenheim, C., (2012). Legal, risk and ethical aspects of analytics in higher education. CETIS Analytics Series, 1, 6, 1-30.
    • (2012) CETIS Analytics Series , vol.1 , Issue.6 , pp. 1-30
    • Kay, D.1    Korn, N.2    Oppenheim, C.3
  • 15
  • 16
    • 67650337565 scopus 로고    scopus 로고
    • Exploring privacy concerns about personal sensing
    • H. Tokuda, M. Beigl, A. Friday, A. J. Bernheim Brush & Y. Tobe (Eds). Berlin: Springer Verlag.
    • Klasnja, P., Consolvo, S., &, Choudhury, T., (2009). Exploring privacy concerns about personal sensing. In, H. Tokuda, M. Beigl, A. Friday, A. J. Bernheim Brush, &, Y. Tobe, (Eds). International conference pervasive (pp. 176-183). Berlin: Springer Verlag.
    • (2009) International Conference Pervasive , pp. 176-183
    • Klasnja, P.1    Consolvo, S.2    Choudhury, T.3
  • 19
    • 0347301554 scopus 로고    scopus 로고
    • The nature of and conditions for online trust
    • DOI 10.1023/A:1022950813386
    • Koehn, D., (2003). The nature of and conditions for online trust. Journal of Business Ethics, 43, 1/2, 3-19. (Pubitemid 38097380)
    • (2003) Journal of Business Ethics , vol.43 , Issue.1-2 , pp. 3-19
    • Koehn, D.1
  • 21
    • 81055142557 scopus 로고    scopus 로고
    • Privacy by design: A matter of choice
    • S. Gutwirth, Y. Poullet & P. De Hert (Eds). Berlin: Springer Verlag.
    • Le Métayer, D., (2010). Privacy by design: a matter of choice. In, S. Gutwirth, Y. Poullet, &, P. De Hert, (Eds). Data Protection in a Profiled World (pp. 1-6). Berlin: Springer Verlag.
    • (2010) Data Protection in A Profiled World , pp. 1-6
    • Le Métayer, D.1
  • 22
    • 56649104920 scopus 로고    scopus 로고
    • The taste for privacy: An analysis of college student privacy settings in an online social network
    • Lewis, K., Kaufman, J., &, Christakis, N., (2008). The taste for privacy: an analysis of college student privacy settings in an online social network. Journal of Computer-Mediated Communication, 14, 1, 79-100.
    • (2008) Journal of Computer-Mediated Communication , vol.14 , Issue.1 , pp. 79-100
    • Lewis, K.1    Kaufman, J.2    Christakis, N.3
  • 23
    • 84891893652 scopus 로고    scopus 로고
    • TMI (too much information): The role of friction and familiarity in disclosing information
    • Martin, K. E., (2011). TMI (too much information): the role of friction and familiarity in disclosing information. Business & Professional Ethics Journal, 30, 1-2.
    • (2011) Business & Professional Ethics Journal , vol.30 , pp. 1-2
    • Martin, K.E.1
  • 24
    • 77953213147 scopus 로고    scopus 로고
    • Myths and fallacies of "personally identifiable information."
    • Narayanan, A., &, Shmatikov, V., (2010). Myths and fallacies of "personally identifiable information.". Communications of the ACM, 53, 6, 24.
    • (2010) Communications of the ACM , vol.53 , Issue.6 , pp. 24
    • Narayanan, A.1    Shmatikov, V.2
  • 25
    • 1842538795 scopus 로고    scopus 로고
    • Privacy as contextual integrity
    • Nissenbaum, H., (2004). Privacy as contextual integrity. Washington Law Review, 79, 1, 101-139.
    • (2004) Washington Law Review , vol.79 , Issue.1 , pp. 101-139
    • Nissenbaum, H.1
  • 26
    • 77957594024 scopus 로고    scopus 로고
    • Broken promises of privacy: Responding to the surprising failure of anonymization
    • Ohm, P., (2010). Broken promises of privacy: responding to the surprising failure of anonymization. UCLA Law Review, 57, 1701-1777.
    • (2010) UCLA Law Review , vol.57 , pp. 1701-1777
    • Ohm, P.1
  • 28
    • 0038037379 scopus 로고    scopus 로고
    • Unpacking "privacy" for a networked world
    • G. Cockton & P. Korhonen (Eds). (p.). New York: ACM Press. doi: 10.1145/642633.642635.
    • Palen, L., &, Dourish, P., (2003). Unpacking "privacy" for a networked world. In, G. Cockton, &, P. Korhonen, (Eds). Proceedings of the conference on Human factors in computing systems-CHI '03 (p. 129). New York: ACM Press. doi: 10.1145/642633.642635.
    • (2003) Proceedings of the Conference on Human Factors in Computing Systems - CHI '03 , pp. 129
    • Palen, L.1    Dourish, P.2
  • 29
    • 79957974421 scopus 로고    scopus 로고
    • About the e-privacy directive: Towards a third generation of data protection legislation?
    • Berlin: Springer Verlag.
    • Poullet, Y., (2010). About the e-privacy directive: towards a third generation of data protection legislation? Data Protection in a Profiled World (pp. 3-30). Berlin: Springer Verlag.
    • (2010) Data Protection in A Profiled World , pp. 3-30
    • Poullet, Y.1
  • 30
    • 84898823460 scopus 로고    scopus 로고
    • Privacy Rights Clearinghouse. (p.). New York: Harper Perennial.
    • Privacy Rights Clearinghouse (1999). Privacy rights handbook (p. 335). New York: Harper Perennial.
    • (1999) Privacy Rights Handbook , pp. 335
  • 31
    • 76649093048 scopus 로고    scopus 로고
    • Privacy, data protection, and the unprecedented challenges of ambient intelligence
    • Rouvroy, A., (2008). Privacy, data protection, and the unprecedented challenges of ambient intelligence. Studies in Ethics, Law, and Technology, 2, 1, 1-54.
    • (2008) Studies in Ethics, Law, and Technology , vol.2 , Issue.1 , pp. 1-54
    • Rouvroy, A.1
  • 32
    • 79957607728 scopus 로고    scopus 로고
    • Privacy, ethics, and analytics
    • Schwartz, P. M., (2011). Privacy, ethics, and analytics. IEEE Security & Privacy, 9, 3, 66-69.
    • (2011) IEEE Security & Privacy , vol.9 , Issue.3 , pp. 66-69
    • Schwartz, P.M.1
  • 33
    • 81355163763 scopus 로고    scopus 로고
    • Penetrating the fog: Analytics in learning and education
    • Siemens, G., &, Long, P., (2011). Penetrating the fog: analytics in learning and education. Educause Review, 48, 5, 31-40.
    • (2011) Educause Review , vol.48 , Issue.5 , pp. 31-40
    • Siemens, G.1    Long, P.2
  • 34
    • 84921819821 scopus 로고    scopus 로고
    • E-tailer customization: Convenient or creepy?
    • New York
    • Singer, N., (2012). E-tailer customization: convenient or creepy? New York Times, New York.
    • (2012) New York Times
    • Singer, N.1
  • 35
    • 84876460204 scopus 로고    scopus 로고
    • Learning analytics: Ethical issues and dilemmas
    • Slade, S., &, Prinsloo, P., (2013). Learning analytics: ethical issues and dilemmas. American Behavioral Scientist, 57, 10, 1510-1529.
    • (2013) American Behavioral Scientist , vol.57 , Issue.10 , pp. 1510-1529
    • Slade, S.1    Prinsloo, P.2
  • 36
    • 81355150537 scopus 로고    scopus 로고
    • Information privacy research: An interdisciplinary review
    • Smith, H. J., Dinev, T., &, Xu, H., (2011). Information privacy research: an interdisciplinary review. MIS Quarterly, 35, 4, 989-1015.
    • (2011) MIS Quarterly , vol.35 , Issue.4 , pp. 989-1015
    • Smith, H.J.1    Dinev, T.2    Xu, H.3
  • 37
    • 64849113360 scopus 로고    scopus 로고
    • Cambridge, MA: Harvard University Press.
    • Solove, D., (2008). Understanding privacy. Cambridge, MA: Harvard University Press.
    • (2008) Understanding Privacy
    • Solove, D.1
  • 40
    • 77950672457 scopus 로고    scopus 로고
    • Sun on privacy: Get over it
    • Retrieved March 24, 2014
    • Sprenger, P., (1999). Sun on privacy: "get over it". Wired Magazine. Retrieved March 24, 2014, from http://www.wired.com/politics/law/news/ 1999/01/17538
    • (1999) Wired Magazine
    • Sprenger, P.1
  • 41
    • 34548738978 scopus 로고    scopus 로고
    • Protecting people in research: A comparison between biomedical and traffic research
    • Svensson, S., &, Hansson, S. O., (2007). Protecting people in research: a comparison between biomedical and traffic research. Science and Engineering Ethics, 13, 1, 99-115.
    • (2007) Science and Engineering Ethics , vol.13 , Issue.1 , pp. 99-115
    • Svensson, S.1    Hansson, S.O.2
  • 42
    • 52149113254 scopus 로고    scopus 로고
    • Philosophical theories of privacy: Implications for an adequate online privacy policy
    • Tavani, H. T., (2007). Philosophical theories of privacy: implications for an adequate online privacy policy. Metaphilosophy, 38, 1, 1-22.
    • (2007) Metaphilosophy , vol.38 , Issue.1 , pp. 1-22
    • Tavani, H.T.1
  • 44
    • 84898770337 scopus 로고    scopus 로고
    • Consent 2.0. A better way of signing up for studies of your genes
    • (April 28). The Economist. New York
    • The Economist. (2012, April 28). Consent 2.0. A better way of signing up for studies of your genes. The Economist. New York.
    • (2012) The Economist
  • 45
    • 84861393010 scopus 로고    scopus 로고
    • The White House. (p.). Washington: US Government, The White House.
    • The White House (2012). Consumer data privacy in a networked world (p. 62). Washington: US Government, The White House.
    • (2012) Consumer Data Privacy in A Networked World , pp. 62
  • 46
    • 84862777858 scopus 로고    scopus 로고
    • Personalization and privacy: A survey of privacy risks and remedies in personalization-based systems
    • Toch, E., Wang, Y., &, Cranor, L. F., (2012). Personalization and privacy: a survey of privacy risks and remedies in personalization-based systems. User Modeling and User-adapted Interaction, 22, 1-2, 203-220.
    • (2012) User Modeling and User-adapted Interaction , vol.22 , Issue.12 , pp. 203-220
    • Toch, E.1    Wang, Y.2    Cranor, L.F.3
  • 48
    • 84883769033 scopus 로고    scopus 로고
    • Gaming, texting, learning? Teaching engineering ethics through students' lived experiences with technology
    • Voss, G., (2012). Gaming, texting, learning? Teaching engineering ethics through students' lived experiences with technology. Science and Engineering Ethics, 19, 3, 1375-1393.
    • (2012) Science and Engineering Ethics , vol.19 , Issue.3 , pp. 1375-1393
    • Voss, G.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.