{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,11]],"date-time":"2025-12-11T21:04:22Z","timestamp":1765487062698,"version":"3.37.3"},"reference-count":68,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100015539","name":"Australian Government","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100015539","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Cooperative Research Centre Program round 7"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Learning Technol."],"published-print":{"date-parts":[[2024]]},"DOI":"10.1109\/tlt.2024.3393766","type":"journal-article","created":{"date-parts":[[2024,4,25]],"date-time":"2024-04-25T17:43:20Z","timestamp":1714067000000},"page":"1615-1627","source":"Crossref","is-referenced-by-count":6,"title":["Preserving Both Privacy and Utility in Learning Analytics"],"prefix":"10.1109","volume":"17","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4794-8339","authenticated-orcid":false,"given":"Chen","family":"Zhan","sequence":"first","affiliation":[{"name":"Centre for Change and Complexity in Learning, University of South Australia, Adelaide SA, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6999-3547","authenticated-orcid":false,"given":"Sre\u0107ko","family":"Joksimovi\u0107","sequence":"additional","affiliation":[{"name":"Centre for Change and Complexity in Learning, University of South Australia, Adelaide SA, Australia"}]},{"given":"Djazia","family":"Ladjal","sequence":"additional","affiliation":[{"name":"Tank Stream Labs, Practera, Sydney NSW, Australia"}]},{"given":"Thierry","family":"Rakotoarivelo","sequence":"additional","affiliation":[{"name":"Data61, CSIRO, Eveleigh NSW, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4040-3360","authenticated-orcid":false,"given":"Ruth","family":"Marshall","sequence":"additional","affiliation":[{"name":"Tank Stream Labs, Practera, Sydney NSW, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6857-0582","authenticated-orcid":false,"given":"Abelardo","family":"Pardo","sequence":"additional","affiliation":[{"name":"UniSA STEM, University of South Australia, Mawson Lakes SA, Australia"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/3303772.3303784"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1177\/0002764213498851"},{"key":"ref3","first-page":"27","article-title":"The journey of learning analytics","volume":"6","author":"Joksimovi","year":"2019","journal-title":"HERDSA Rev. Higher Educ."},{"year":"2022","key":"ref4","article-title":"Autopsy for the failure that was inBloom"},{"article-title":"The legacy of inBloom","year":"2024","author":"Bulger","key":"ref5"},{"year":"2024","key":"ref6","article-title":"The Cambridge analytica files"},{"year":"2024","key":"ref7","article-title":"Cambridge analytica and Facebook: The scandal and the fallout so far"},{"author":"Sobers","key":"ref8","article-title":"89 must-know data breach statistics [2022]"},{"year":"2024","key":"ref9","article-title":"Regulation (EU) 2016\/679 of the European Parliament and of the Council"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1080\/00221546.2020.1770045"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1561\/0400000042"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.5334\/jime.502"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/2643132"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.18608\/hla17.011"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1177\/0002764213479366"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1111\/bjet.12152"},{"volume-title":"Policy on Ethical Use of Student Data for Learning Analytics","year":"2014","author":"Slade","key":"ref17"},{"year":"2024","key":"ref18","article-title":"Jisc"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/2883851.2883893"},{"article-title":"Code of practice for learning analytics","year":"2015","author":"Sclater","key":"ref20"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.18608\/jla.2016.31.5"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/s11423-016-9463-4"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1111\/bjet.13216"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1177\/2043820613513388"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/3027385.3027400"},{"key":"ref26","article-title":"The ethics of learning analytics in Australian higher education","volume":"26","author":"Corrin","year":"2019"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1111\/bjet.13388"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/3027385.3027414"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1177\/1477878518805308"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/BigData.2018.8621874"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/3284179.3284231"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TLT.2016.2607747"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/BigData47090.2019.9006190"},{"article-title":"State of edtech privacy report. Common sense privacy evaluation initiative. San Francisco, CA: Common sense","year":"2018","author":"Kelly","key":"ref34"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/1217299.1217302"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/69.971193"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660324"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2016.2536479"},{"key":"ref39","first-page":"901","article-title":"On k-anonymity and the curse of dimensionality","volume-title":"Proc. 31st Int. Conf. Very Large Data Bases","author":"Aggarwal","year":"2005"},{"year":"2022","key":"ref40","article-title":"Re-identification risk ready reckoner (R4)"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1111\/bjet.13223"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.29012\/jpc.686"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23535"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2020.2972505"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00025"},{"year":"2024","key":"ref46","article-title":"Practera"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.5555\/2969033.2969125"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978318"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1002\/widm.1479"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.3102\/0034654317740335"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1080\/23735082.2017.1286142"},{"volume":"958","volume-title":"Discovering Statistics Using R","author":"Field","key":"ref52"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.18637\/jss.v034.i12"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-3900-4_13"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-29084-8_112"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1016\/j.compedu.2015.07.002"},{"issue":"1","key":"ref57","article-title":"Package lme4","volume":"12","author":"Bates","year":"2015","journal-title":"Convergence"},{"key":"ref58","volume-title":"Akaike Information Criterion Statistics","volume":"81","author":"Sakamoto","year":"1986"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.2307\/2336267"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.18637\/jss.v015.i02"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1080\/03610910701539617"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1111\/j.0006-341X.2001.00120.x"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.4324\/9780203848852.ch13"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1177\/1536867x0700700205"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1080\/02664760120108719"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1126\/science.aac4716"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.3389\/fpsyg.2017.00862"},{"volume-title":"Artificial Intelligence Act.","year":"2021","author":"Madiega","key":"ref68"}],"container-title":["IEEE Transactions on Learning Technologies"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/4620076\/10376229\/10508498.pdf?arnumber=10508498","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,20]],"date-time":"2024-12-20T06:10:57Z","timestamp":1734675057000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10508498\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"references-count":68,"URL":"https:\/\/doi.org\/10.1109\/tlt.2024.3393766","relation":{},"ISSN":["1939-1382","2372-0050"],"issn-type":[{"type":"electronic","value":"1939-1382"},{"type":"electronic","value":"2372-0050"}],"subject":[],"published":{"date-parts":[[2024]]}}}