{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,14]],"date-time":"2026-01-14T23:54:09Z","timestamp":1768434849393,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":36,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,3,13]],"date-time":"2017-03-13T00:00:00Z","timestamp":1489363200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,3,13]]},"DOI":"10.1145\/3027385.3027414","type":"proceedings-article","created":{"date-parts":[[2017,2,27]],"date-time":"2017-02-27T13:10:59Z","timestamp":1488201059000},"page":"243-252","source":"Crossref","is-referenced-by-count":35,"title":["The influence of data protection and privacy frameworks on the design of learning analytics systems"],"prefix":"10.1145","author":[{"given":"Tore","family":"Hoel","sequence":"first","affiliation":[{"name":"Oslo and Akershus University, Norway"}]},{"given":"Dai","family":"Griffiths","sequence":"additional","affiliation":[{"name":"University of Bolton, UK"}]},{"given":"Weiqin","family":"Chen","sequence":"additional","affiliation":[{"name":"University of Bergen, Norway"}]}],"member":"320","published-online":{"date-parts":[[2017,3,13]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"ADL (Advanced Distributed Learning). 2015. xAPI specification. Produced by the Experience API Working Group in support of the Office of the Deputy Assistant Secretary of Defense (Readiness) Advanced Distributed Learning Initiative. Retrieved from https:\/\/github.com\/adlnet\/xAPI-Spec\/blob\/master\/xAPI.md. Accessed: 2016-06-01. ADL (Advanced Distributed Learning). 2015. xAPI specification. Produced by the Experience API Working Group in support of the Office of the Deputy Assistant Secretary of Defense (Readiness) Advanced Distributed Learning Initiative. Retrieved from https:\/\/github.com\/adlnet\/xAPI-Spec\/blob\/master\/xAPI.md. Accessed: 2016-06-01."},{"key":"e_1_3_2_1_2_1","unstructured":"APEC. Undated. Asia-Pacific Economic Cooperation Electronic Commerce Steering Group Current Activities. Retrieved from http:\/\/www.apec.org\/groups\/committee-on-trade-and-investment\/electronic-commerce-steering-group.aspx. Accessed: 2016-06-01. APEC. Undated. Asia-Pacific Economic Cooperation Electronic Commerce Steering Group Current Activities. Retrieved from http:\/\/www.apec.org\/groups\/committee-on-trade-and-investment\/electronic-commerce-steering-group.aspx. Accessed: 2016-06-01."},{"key":"e_1_3_2_1_3_1","unstructured":"APEC. 2005. Privacy Framework. ISBN 981-05-4471-5 APEC. 2005. Privacy Framework. ISBN 981-05-4471-5"},{"key":"e_1_3_2_1_4_1","unstructured":"Baidu Encyclopedia. Undated. Personal Information Protection Act (In Chinese). Retrieved from http:\/\/baike.baidu.com\/subview\/2046064\/2046064.htm. Accessed: 2016-06-01. Baidu Encyclopedia. Undated. Personal Information Protection Act (In Chinese). Retrieved from http:\/\/baike.baidu.com\/subview\/2046064\/2046064.htm. Accessed: 2016-06-01."},{"key":"e_1_3_2_1_5_1","unstructured":"Cavoukian A. 2012. Privacy by Design: From Rhetoric to Reality. Retrieved from https:\/\/www.ipc.on.ca\/images\/Resources\/PbDBook-From-Rhetoric-to-Reality.pdf. Accessed: 2015-02-13. Cavoukian A. 2012. Privacy by Design: From Rhetoric to Reality. Retrieved from https:\/\/www.ipc.on.ca\/images\/Resources\/PbDBook-From-Rhetoric-to-Reality.pdf. Accessed: 2015-02-13."},{"key":"e_1_3_2_1_6_1","unstructured":"Dahl M. Undated. L\u00e6ringsanalyse. Memorandum published at the Norwegian Centre for ICT in Education website http:\/\/iktsenteret.no\/ressurser\/notat-laeringsanalyse. Accessed: 2016-06-01. Dahl M. Undated. L\u00e6ringsanalyse. Memorandum published at the Norwegian Centre for ICT in Education website http:\/\/iktsenteret.no\/ressurser\/notat-laeringsanalyse. Accessed: 2016-06-01."},{"key":"e_1_3_2_1_7_1","unstructured":"Datatilsynet. Undated. Personal Data Act. Act of 14 April 2000 No. 31 relating to the processing of personal data (Personal Data Act) Retrieved from https:\/\/www.datatilsynet.no\/English\/Regulations\/Personal-Data-Act-\/. Accessed: 2016-06-01. Datatilsynet. Undated. Personal Data Act. Act of 14 April 2000 No. 31 relating to the processing of personal data (Personal Data Act) Retrieved from https:\/\/www.datatilsynet.no\/English\/Regulations\/Personal-Data-Act-\/. Accessed: 2016-06-01."},{"key":"e_1_3_2_1_8_1","volume-title":"Proceedings of LAK '16","author":"Drachsler H.","year":"2016"},{"key":"e_1_3_2_1_9_1","unstructured":"European Commission. 2016. How does the data protection reform strengthen citizens' rights?. Retrieved from http:\/\/ec.europa.eu\/justice\/data-protection\/document\/factsheets_2016\/factsheet_dp_reform_citizens_rights_2016_en.pdf. Accessed: 2016-06-01. European Commission. 2016. How does the data protection reform strengthen citizens' rights?. Retrieved from http:\/\/ec.europa.eu\/justice\/data-protection\/document\/factsheets_2016\/factsheet_dp_reform_citizens_rights_2016_en.pdf. Accessed: 2016-06-01."},{"key":"e_1_3_2_1_10_1","unstructured":"European Commission. 2016. REGULATION (EU) 2016\/679 OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data and repealing Directive 95\/46\/EC (General Data Protection Regulation). European Commission. 2016. REGULATION (EU) 2016\/679 OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data and repealing Directive 95\/46\/EC (General Data Protection Regulation)."},{"key":"e_1_3_2_1_11_1","unstructured":"European Commission. 2015. Questions and Answers - Data protection reform. Retrieved from http:\/\/europa.eu\/rapid\/press-release_MEMO-15-6385_en.pdf. Accessed: 2016-06-01. European Commission. 2015. Questions and Answers - Data protection reform. Retrieved from http:\/\/europa.eu\/rapid\/press-release_MEMO-15-6385_en.pdf. Accessed: 2016-06-01."},{"key":"e_1_3_2_1_12_1","unstructured":"Finneran Dennedy M. Fox J. and Finneran T. 2014. The Privacy Engineers Manifesto: Getting from Policy to Code to QA to Value (1st ed.). Apress Berkely CA USA. ISBN:978-1-4302-6355-5. Finneran Dennedy M. Fox J. and Finneran T. 2014. The Privacy Engineers Manifesto: Getting from Policy to Code to QA to Value (1st ed.). Apress Berkely CA USA. ISBN:978-1-4302-6355-5."},{"key":"e_1_3_2_1_13_1","unstructured":"Griffiths D. Drachsler H. Kickmeier-Rust M. Steiner C. Hoel T. and Greller W. 2016. Is Privacy a Show-stopper for Learning Analytics? A Review of Current Issues and Solutions. Learning Analytics Review 6. Published by the LACE project. ISSN:2057-7494. Retrieved from http:\/\/www.laceproject.eu\/learning-analytics-review\/privacy-show-stopper. Accessed: 2016-06-01. Griffiths D. Drachsler H. Kickmeier-Rust M. Steiner C. Hoel T. and Greller W. 2016. Is Privacy a Show-stopper for Learning Analytics? A Review of Current Issues and Solutions. Learning Analytics Review 6. Published by the LACE project. ISSN:2057-7494. Retrieved from http:\/\/www.laceproject.eu\/learning-analytics-review\/privacy-show-stopper. Accessed: 2016-06-01."},{"key":"e_1_3_2_1_14_1","volume-title":"USA: McGraw-Hill Publishers.","author":"Hofstede G.","year":"2010","edition":"3"},{"key":"e_1_3_2_1_15_1","volume-title":"Proceedings of CollabTech 2016 and CRIWG 2016","author":"Hoel T.","year":"2016"},{"key":"e_1_3_2_1_16_1","volume-title":"Proceedings of the 24th International Conference on Computers in Education. India: Asia-Pacific Society for Computers in Education.","author":"Hoel T."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.18608\/jla.2016.31.9"},{"key":"e_1_3_2_1_18_1","volume-title":"Workshop paper in Chen, W. et al. (Eds.)","author":"Hoel T.","year":"2016"},{"key":"e_1_3_2_1_19_1","unstructured":"Hoel T. Chen W. and Cho Yong-Sang. 2016. Privacy Requirements for Learning Analytics - from Policies to Technical Solutions. Paper presented at Workshop on Ethics and Privacy for Learning Analytics Monday April 25th 2016 at the 6th International Conference on Learning Analytics and Knowledge (LAK '16) Edinburgh United Kingdom Hoel T. Chen W. and Cho Yong-Sang. 2016. Privacy Requirements for Learning Analytics - from Policies to Technical Solutions. Paper presented at Workshop on Ethics and Privacy for Learning Analytics Monday April 25th 2016 at the 6th International Conference on Learning Analytics and Knowledge (LAK '16) Edinburgh United Kingdom"},{"key":"e_1_3_2_1_20_1","unstructured":"Hoel T. and Chen W. 2015. Privacy in Learning Analytics - Implications for System Architecture --- In Watanabe T. and Seta K. (Eds.) Proceedings of the 11th International Conference on Knowledge Management. ISBN 978-4-9908620-0-8 Presented at ICKM 15 in Osaka Japan 4 -- 6 November 2015. Hoel T. and Chen W. 2015. Privacy in Learning Analytics - Implications for System Architecture --- In Watanabe T. and Seta K. (Eds.) Proceedings of the 11th International Conference on Knowledge Management. ISBN 978-4-9908620-0-8 Presented at ICKM 15 in Osaka Japan 4 -- 6 November 2015."},{"key":"e_1_3_2_1_21_1","unstructured":"Hoel T. and Chen W. 2014. Learning Analytics Interoperability-looking for Low-Hanging Fruits. In Liu C.-C. et al. (Eds.) Proceedings of the 22nd International Conference on Computers in Education. Japan Asia-Pacific Society for Computers in Education. Hoel T. and Chen W. 2014. Learning Analytics Interoperability-looking for Low-Hanging Fruits. In Liu C.-C. et al. (Eds.) Proceedings of the 22nd International Conference on Computers in Education. Japan Asia-Pacific Society for Computers in Education."},{"key":"e_1_3_2_1_22_1","volume-title":"China: Asia-Pacific Society for Computers in Education.","author":"Hoel T.","year":"2015"},{"key":"e_1_3_2_1_23_1","unstructured":"IMS Global. 2015. Caliper Analytics Background. Retrieved from http:\/\/www.imsglobal.org\/activity\/caliperram. Accessed: 2016-06-01. IMS Global. 2015. Caliper Analytics Background. Retrieved from http:\/\/www.imsglobal.org\/activity\/caliperram. Accessed: 2016-06-01."},{"key":"e_1_3_2_1_24_1","unstructured":"Information Commissioner's Office. Undated. Overview of the General Data Protection Regulation (GDPR). Retrieved from https:\/\/ico.org.uk\/for-organisations\/data-protection-reform\/overview-of-the-gdpr\/. Accessed: 2016-06-01. Information Commissioner's Office. Undated. Overview of the General Data Protection Regulation (GDPR). Retrieved from https:\/\/ico.org.uk\/for-organisations\/data-protection-reform\/overview-of-the-gdpr\/. Accessed: 2016-06-01."},{"key":"e_1_3_2_1_25_1","unstructured":"ISO\/IEC 20748-1. 2016. Information technology - learning education and training - Learning Analytics Interoperability - Part 1: Reference model. ISO\/IEC 20748-1. 2016. Information technology - learning education and training - Learning Analytics Interoperability - Part 1: Reference model."},{"key":"e_1_3_2_1_26_1","unstructured":"KERIS. 2014. Prospects for the Application of Learning Analytics (in Korean). Retrieved from http:\/\/www.keris.or.kr\/board\/pb_downloadNew.jsp?bbs_num=18451&ix=21990. Accessed: 2016-06-01. KERIS. 2014. Prospects for the Application of Learning Analytics (in Korean). Retrieved from http:\/\/www.keris.or.kr\/board\/pb_downloadNew.jsp?bbs_num=18451&ix=21990. Accessed: 2016-06-01."},{"key":"e_1_3_2_1_27_1","unstructured":"LACE. 2015. What are Learning Analytics? Retrieved from http:\/\/www.laceproject.eu\/faqs\/learning-analytics. Accessed 2016-06-01. LACE. 2015. What are Learning Analytics? Retrieved from http:\/\/www.laceproject.eu\/faqs\/learning-analytics. Accessed 2016-06-01."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"crossref","unstructured":"Mason J. Chen W. and Hoel T. 2016. Questions as data: illuminating the potential of learning analytics through questioning an emergent field. Research and Practice in Technology Enhanced Learning 1--14. Accessed: 2016-06-01. Mason J. Chen W. and Hoel T. 2016. Questions as data: illuminating the potential of learning analytics through questioning an emergent field. Research and Practice in Technology Enhanced Learning 1--14. Accessed: 2016-06-01.","DOI":"10.1186\/s41039-016-0037-1"},{"key":"e_1_3_2_1_29_1","unstructured":"OECD. 2013. Privacy Framework. Retrieved from http:\/\/www.oecd.org\/sti\/ieconomy\/oecd_privacy_framework.pdf. Accessed: 2016-06-01. OECD. 2013. Privacy Framework. Retrieved from http:\/\/www.oecd.org\/sti\/ieconomy\/oecd_privacy_framework.pdf. Accessed: 2016-06-01."},{"key":"e_1_3_2_1_30_1","unstructured":"Sclater P. and Bailey P. 2015. Code of practice for learning analytics. Jisc. Retrieved from https:\/\/www.jisc.ac.uk\/guides\/code-of-practice-for-learning-analytics. Accessed: 2016-06-01. Sclater P. and Bailey P. 2015. Code of practice for learning analytics. Jisc. Retrieved from https:\/\/www.jisc.ac.uk\/guides\/code-of-practice-for-learning-analytics. Accessed: 2016-06-01."},{"key":"e_1_3_2_1_31_1","unstructured":"Slade S. 2016. Applications of Student Data in Higher Education: Issues and Ethical Considerations. Ithaka S+R. Retrieved from http:\/\/sr.ithaka.org\/?p=283891. Accessed: 2016-06-01. Slade S. 2016. Applications of Student Data in Higher Education: Issues and Ethical Considerations. Ithaka S+R. Retrieved from http:\/\/sr.ithaka.org\/?p=283891. Accessed: 2016-06-01."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2209249.2209263"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2008.88"},{"key":"e_1_3_2_1_34_1","unstructured":"Special Eurobarometer 431. Undated. Data protection. Retrieved from http:\/\/ec.europa.eu\/public_opinion\/archives\/eb_special_439_420_en.htm#431. Accessed: 2016-06-01. Special Eurobarometer 431. Undated. Data protection. Retrieved from http:\/\/ec.europa.eu\/public_opinion\/archives\/eb_special_439_420_en.htm#431. Accessed: 2016-06-01."},{"key":"e_1_3_2_1_35_1","unstructured":"The Open University. 2014. Ethical use of Student Data for Learning Analytics Policy FAQs. Retrieved from http:\/\/www.open.ac.uk\/students\/charter\/sites\/www.open.ac.uk.students.charter\/files\/files\/ecms\/web-content\/ethical-student-data-faq.pdf. Accessed: 2016-02-01. The Open University. 2014. Ethical use of Student Data for Learning Analytics Policy FAQs. Retrieved from http:\/\/www.open.ac.uk\/students\/charter\/sites\/www.open.ac.uk.students.charter\/files\/files\/ecms\/web-content\/ethical-student-data-faq.pdf. Accessed: 2016-02-01."},{"key":"e_1_3_2_1_36_1","volume-title":"Chinese","author":"Wei L."}],"event":{"name":"LAK '17: 7th International Learning Analytics and Knowledge Conference","location":"Vancouver British Columbia Canada","acronym":"LAK '17"},"container-title":["Proceedings of the Seventh International Learning Analytics &amp; Knowledge Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3027385.3027414","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/dl.acm.org\/ft_gateway.cfm?id=3027414&ftid=1848406&dwn=1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:03:06Z","timestamp":1750215786000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3027385.3027414"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,3,13]]},"references-count":36,"alternative-id":["10.1145\/3027385.3027414","10.1145\/3027385"],"URL":"https:\/\/doi.org\/10.1145\/3027385.3027414","relation":{},"subject":[],"published":{"date-parts":[[2017,3,13]]}}}