SlideShare a Scribd company logo
Privacy and identity management in LearningAnlaytics processes with Blockchain
Amo. D.,García-Peñalvo, F.J.,Alier, M., Fonseca, D.,Casañ, M.J.
UniversitatLa Salle BCN– RamónLlull, Universidad de Salamanca,UniversitatPolitècnicadeCatalunya
The collection of students’ sensible data raises adverse reactions
againstLearningAnalyticsthat decreasesthe confidencein its adoption.
Thelaws and policiesthat surroundthe use of educationaldata are not
enough to ensure privacy, security, validity, integrity and reliability of
students data. This problem has been detected through literature
review and canbe solvedif a technologicallayer of automated checking
rules is addedabovethese policies. Theaim of this thesis is to research
about an emerging technology such as Blockchain to preserve the
identity of students and securetheir data. In a first stage a systematic
literature review will be conducted in order to set the context of the
research. Afterwards, and through the scientific method, we will
developa Blockchainbasedsolution to automate rules and constraints
with the aim to let students the governanceof their data and to ensure
data privacyandsecurity.
Solution
Blockchain
Context and motivation that drives the dissertation research
The motivation arises from the concerns of certain aspects about learning
analytics in regard totrust,integrity andprivacyof the data collected with
the aim to extend, standardize and accept their use in educational
environments.
LearningAnalytics
Different investigationsshow the possibilitiesof improving the educational
context through the use of educationaldata analysis. This analysisaims to
avoiddropouts,failuresandincreaseopportunities for successandlearning.
Thesepositivefacts doesnot leaveindifferent to potential beneficiaries.
Fragilityin data privacy
It is found that there is a distrust in the use of Learning Analysis. It is
uncertain how education technology companiesare using students data,
who is really being benefited,how this will affect to students in a short or
long term future and which level of privacy or security its being appliedto
securestudents data.
Dataprinciples andpolicyframeworks
The data generatedby the students is scattered and in the hands of other
entities, accordingto the tools usedin the learningprocess. Thishighlightsa
highly fragile environment in terms of the ethics of privacyand the identity
of students,andthat hasto do with the expositionto any entity that collect
educationalinteractions. No one can assurethat the information contained
in the logsis reliableandat the sametime is not sharedwith others.
The previous situation depicts a serious problem of fragility in terms of
certification,privacyandidentity of students:
• There is a clear fragmentation of educationaldata. The more tools are
usedthe more dispersedstudent’s data andthe lesscontrol overprivacy.
It is manifesteda low data protection.
• The data is freely accessedby third parties and even shared, where
students areclearlyidentified.
• Thereis no control over the data. Anyonewho hasaccessto the data can
modify it at their convenience. Consequently,no one canensurethat the
stored data is the original.
• There is no certification process. Anyone can certify some studies that
the student has not attended in the schoolor can present some studies
in which hehasnot attended.
Abstract
There is a clear disposition to set policy frameworks to ensure data
protection legality and preservestudents data privacy. Despitethe efforts
to set guidelinesand rules to assure students rights there are worrying
lacks that allow data leaks, hacks or transfer between companiesas a
businessmodel.
It is necessarya layerof control policiesandtechnologythat:
• Certify that the transaction between the student and the tool is valid
andimmutable.
• Givethe student the power to decidewho will act andin what way with
their own data.
Technological solution for technological problems
This thesis focuses its efforts on solving aspects related to data privacy
and the management of student identities. As said, the reason is its
relevance to foster a strong confidence in this scientific element and,
finally, the adoption, integration and use of analysis of learning data in
formal institutions in a natural way.
To increasethe trust in Learning Analytics it can be used technological
approachesfor the managementof student identity andthe privacyof the
data collected. Theprivacyof the data and the preservationof the identity
of the students are those that we consider most important to work on.
This will help to establish a minimum confidence before its possible
integration andnormalizationin the educationalinstitutions. Otheraspects
suchas the locationof storage,the ownershipof the data and its possible
use are also important to take into account when adopting a Learning
Analysisapproach.
The stack ofBlockchaintechnologies is a new paradigm with a chance to
provide a technological solution to the Learning Analytics ethics and trust
problems and other problems related to identity in education and training.
We foresee that the process of inquiry described in thedata principles and
policy frameworkscan be implemented and enforced using theBlockchain
andSmart Contractsas follows: The data and metadata about the learning
activities of a student can be secured cryptographically using the
Blockchainand the safeguard ofSmart Contracts.
Acknowledgements
With the support ofSecretariad’Universitatsi Recercadel Departamentd’Empresai Coneixementde la
GeneralitatdeCatalunyawith the help of 2017 SGR 934 GRETEL.
sensitivedata
students
interactions
LearningAnalytics
blockchain
business
tool
university/
school
Filters
Policies
Principles

More Related Content

PDF
INVESTIGATING THE DETERMINANTS OF COLLEGE STUDENTS INFORMATION SECURITY BEHAV...
PPTX
Aim analytics panel (2017 Fall): Privacy & ethics
PDF
Learning Analytics in action: ethics and privacy issues in the classroom
DOCX
Illustration ThinkstockiStockTeachers know all the terms.docx
PPT
Navigating Responsibility: Ethical Considerations in Data Science
PDF
Student Data Privacy Building A School Compliance Program Linnette Attai
DOCX
Student data privacy manifesto
DOCX
CHEPTER The Internet and ClientServer, Intranet & Cloud Computin.docx
INVESTIGATING THE DETERMINANTS OF COLLEGE STUDENTS INFORMATION SECURITY BEHAV...
Aim analytics panel (2017 Fall): Privacy & ethics
Learning Analytics in action: ethics and privacy issues in the classroom
Illustration ThinkstockiStockTeachers know all the terms.docx
Navigating Responsibility: Ethical Considerations in Data Science
Student Data Privacy Building A School Compliance Program Linnette Attai
Student data privacy manifesto
CHEPTER The Internet and ClientServer, Intranet & Cloud Computin.docx

Similar to Poster: Privacy and identity management in Learning Anlayticsprocesses with Blockchain (20)

DOC
BigData in Education - Sriraman Rajagopalan
PDF
A Study on Data Mining Techniques, Concepts and its Application in Higher Edu...
PPTX
1st Seminar Presentation By Ali Aijaz Shar [Autosaved].pptx
DOC
_Qualitative Research Methods by Cheryl Vierheilig
PPTX
Learning analytics at the intersections of student trust, disclosure and benefit
PPTX
On the horizon for learning analytics
PDF
Future of Data Analytics Education.pdf
PPTX
Aiec & csr presentation
PDF
The Future of Data Analytics Education_ Trends and Innovations (2).pdf
DOCX
Technology Enabled Learning to Improve Student Performance: A Survey
DOCX
Technology Enabled Learning to Improve Student Performance: A Survey
PPTX
144 presentation iee_tel2021
PDF
Recommendation of Data Mining Technique in Higher Education Prof. Priya Thaka...
PPTX
Use of data & analytics in the field
PDF
Open Science and Ethics studies in SLE research
PDF
Using data mining in e learning-a generic framework for military education
DOCX
Learning analytics summary document Prakash
PPTX
Student Opportunities- Year 7 to 10 WA Curriculum: Digital Technologies
PDF
Griffiths lace workshop-eden-2016
BigData in Education - Sriraman Rajagopalan
A Study on Data Mining Techniques, Concepts and its Application in Higher Edu...
1st Seminar Presentation By Ali Aijaz Shar [Autosaved].pptx
_Qualitative Research Methods by Cheryl Vierheilig
Learning analytics at the intersections of student trust, disclosure and benefit
On the horizon for learning analytics
Future of Data Analytics Education.pdf
Aiec & csr presentation
The Future of Data Analytics Education_ Trends and Innovations (2).pdf
Technology Enabled Learning to Improve Student Performance: A Survey
Technology Enabled Learning to Improve Student Performance: A Survey
144 presentation iee_tel2021
Recommendation of Data Mining Technique in Higher Education Prof. Priya Thaka...
Use of data & analytics in the field
Open Science and Ethics studies in SLE research
Using data mining in e learning-a generic framework for military education
Learning analytics summary document Prakash
Student Opportunities- Year 7 to 10 WA Curriculum: Digital Technologies
Griffiths lace workshop-eden-2016
Ad

More from Technological Ecosystems for Enhancing Multiculturality (20)

PDF
A Preliminary Study of Proof of Concept Practices and their connection with I...
PDF
Social networks as a promotional space for Spanish radio content. The case st...
PDF
Towards the study of sentiment in the public opinion of science in Spanish
PDF
A Three-Step Data-Mining Analysis of Top-Ranked Higher Education Institutions...
PPTX
Specifics of multimedia texts in the context of social networks media aesthetics
PDF
Combined Effects of Similarity and Imagined Contact on First-Person Testimoni...
PDF
Direct online political communication effects on civil participation in spain...
PPTX
University Media in Ecuador: Types, Functions and Self-determination
PDF
Like it or die: using social networks to improve collaborative learning in hi...
PPTX
Framing theory in studies of environmental information in press
PDF
Domain engineering for generating dashboards to analyze employment and employ...
PDF
Mapping the systematic literature studies about software ecosystems
PPTX
Tag-Based Browsing of Digital Collections with Inverted Indexes and Browsing ...
PPTX
A Multivocal Literature Review on the use of DevOps for e-learning systems
PPTX
Document Annotation Tools: Annotation Classification Mechanisms
PDF
Toward supporting decision-making under uncertainty in digital humanities wit...
PDF
Managing Uncertainty in the Humanities: Digital and Analogue Approaches
PDF
Representing Imprecise and Uncertain Knowledge in Digital Humanities: A Theor...
PDF
Dotmocracy and Planning Poker for Uncertainty Management in Collaborative Res...
PDF
Applying Commercial Computer Vision Tools to Cope with Uncertainties in a Cit...
A Preliminary Study of Proof of Concept Practices and their connection with I...
Social networks as a promotional space for Spanish radio content. The case st...
Towards the study of sentiment in the public opinion of science in Spanish
A Three-Step Data-Mining Analysis of Top-Ranked Higher Education Institutions...
Specifics of multimedia texts in the context of social networks media aesthetics
Combined Effects of Similarity and Imagined Contact on First-Person Testimoni...
Direct online political communication effects on civil participation in spain...
University Media in Ecuador: Types, Functions and Self-determination
Like it or die: using social networks to improve collaborative learning in hi...
Framing theory in studies of environmental information in press
Domain engineering for generating dashboards to analyze employment and employ...
Mapping the systematic literature studies about software ecosystems
Tag-Based Browsing of Digital Collections with Inverted Indexes and Browsing ...
A Multivocal Literature Review on the use of DevOps for e-learning systems
Document Annotation Tools: Annotation Classification Mechanisms
Toward supporting decision-making under uncertainty in digital humanities wit...
Managing Uncertainty in the Humanities: Digital and Analogue Approaches
Representing Imprecise and Uncertain Knowledge in Digital Humanities: A Theor...
Dotmocracy and Planning Poker for Uncertainty Management in Collaborative Res...
Applying Commercial Computer Vision Tools to Cope with Uncertainties in a Cit...
Ad

Recently uploaded (20)

PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
cuic standard and advanced reporting.pdf
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PPTX
Big Data Technologies - Introduction.pptx
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
20250228 LYD VKU AI Blended-Learning.pptx
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Mobile App Security Testing_ A Comprehensive Guide.pdf
Review of recent advances in non-invasive hemoglobin estimation
Advanced methodologies resolving dimensionality complications for autism neur...
The AUB Centre for AI in Media Proposal.docx
NewMind AI Weekly Chronicles - August'25 Week I
Understanding_Digital_Forensics_Presentation.pptx
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Dropbox Q2 2025 Financial Results & Investor Presentation
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Chapter 3 Spatial Domain Image Processing.pdf
cuic standard and advanced reporting.pdf
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Unlocking AI with Model Context Protocol (MCP)
Building Integrated photovoltaic BIPV_UPV.pdf
Big Data Technologies - Introduction.pptx

Poster: Privacy and identity management in Learning Anlayticsprocesses with Blockchain

  • 1. Privacy and identity management in LearningAnlaytics processes with Blockchain Amo. D.,García-Peñalvo, F.J.,Alier, M., Fonseca, D.,Casañ, M.J. UniversitatLa Salle BCN– RamónLlull, Universidad de Salamanca,UniversitatPolitècnicadeCatalunya The collection of students’ sensible data raises adverse reactions againstLearningAnalyticsthat decreasesthe confidencein its adoption. Thelaws and policiesthat surroundthe use of educationaldata are not enough to ensure privacy, security, validity, integrity and reliability of students data. This problem has been detected through literature review and canbe solvedif a technologicallayer of automated checking rules is addedabovethese policies. Theaim of this thesis is to research about an emerging technology such as Blockchain to preserve the identity of students and securetheir data. In a first stage a systematic literature review will be conducted in order to set the context of the research. Afterwards, and through the scientific method, we will developa Blockchainbasedsolution to automate rules and constraints with the aim to let students the governanceof their data and to ensure data privacyandsecurity. Solution Blockchain Context and motivation that drives the dissertation research The motivation arises from the concerns of certain aspects about learning analytics in regard totrust,integrity andprivacyof the data collected with the aim to extend, standardize and accept their use in educational environments. LearningAnalytics Different investigationsshow the possibilitiesof improving the educational context through the use of educationaldata analysis. This analysisaims to avoiddropouts,failuresandincreaseopportunities for successandlearning. Thesepositivefacts doesnot leaveindifferent to potential beneficiaries. Fragilityin data privacy It is found that there is a distrust in the use of Learning Analysis. It is uncertain how education technology companiesare using students data, who is really being benefited,how this will affect to students in a short or long term future and which level of privacy or security its being appliedto securestudents data. Dataprinciples andpolicyframeworks The data generatedby the students is scattered and in the hands of other entities, accordingto the tools usedin the learningprocess. Thishighlightsa highly fragile environment in terms of the ethics of privacyand the identity of students,andthat hasto do with the expositionto any entity that collect educationalinteractions. No one can assurethat the information contained in the logsis reliableandat the sametime is not sharedwith others. The previous situation depicts a serious problem of fragility in terms of certification,privacyandidentity of students: • There is a clear fragmentation of educationaldata. The more tools are usedthe more dispersedstudent’s data andthe lesscontrol overprivacy. It is manifesteda low data protection. • The data is freely accessedby third parties and even shared, where students areclearlyidentified. • Thereis no control over the data. Anyonewho hasaccessto the data can modify it at their convenience. Consequently,no one canensurethat the stored data is the original. • There is no certification process. Anyone can certify some studies that the student has not attended in the schoolor can present some studies in which hehasnot attended. Abstract There is a clear disposition to set policy frameworks to ensure data protection legality and preservestudents data privacy. Despitethe efforts to set guidelinesand rules to assure students rights there are worrying lacks that allow data leaks, hacks or transfer between companiesas a businessmodel. It is necessarya layerof control policiesandtechnologythat: • Certify that the transaction between the student and the tool is valid andimmutable. • Givethe student the power to decidewho will act andin what way with their own data. Technological solution for technological problems This thesis focuses its efforts on solving aspects related to data privacy and the management of student identities. As said, the reason is its relevance to foster a strong confidence in this scientific element and, finally, the adoption, integration and use of analysis of learning data in formal institutions in a natural way. To increasethe trust in Learning Analytics it can be used technological approachesfor the managementof student identity andthe privacyof the data collected. Theprivacyof the data and the preservationof the identity of the students are those that we consider most important to work on. This will help to establish a minimum confidence before its possible integration andnormalizationin the educationalinstitutions. Otheraspects suchas the locationof storage,the ownershipof the data and its possible use are also important to take into account when adopting a Learning Analysisapproach. The stack ofBlockchaintechnologies is a new paradigm with a chance to provide a technological solution to the Learning Analytics ethics and trust problems and other problems related to identity in education and training. We foresee that the process of inquiry described in thedata principles and policy frameworkscan be implemented and enforced using theBlockchain andSmart Contractsas follows: The data and metadata about the learning activities of a student can be secured cryptographically using the Blockchainand the safeguard ofSmart Contracts. Acknowledgements With the support ofSecretariad’Universitatsi Recercadel Departamentd’Empresai Coneixementde la GeneralitatdeCatalunyawith the help of 2017 SGR 934 GRETEL. sensitivedata students interactions LearningAnalytics blockchain business tool university/ school Filters Policies Principles