{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,5]],"date-time":"2026-04-05T10:09:02Z","timestamp":1775383742584,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":14,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,10,16]],"date-time":"2019-10-16T00:00:00Z","timestamp":1571184000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Secretaria d?Universitats i Recerca of the Department of Business and Knowledge of the Generalitat de Catalunya","award":["2017 SGR 934"],"award-info":[{"award-number":["2017 SGR 934"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,10,16]]},"DOI":"10.1145\/3362789.3362823","type":"proceedings-article","created":{"date-parts":[[2019,10,31]],"date-time":"2019-10-31T12:20:52Z","timestamp":1572524452000},"page":"253-259","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":11,"title":["GDPR Security and Confidentiality compliance in LMS' a problem analysis and engineering solution proposal"],"prefix":"10.1145","author":[{"given":"Daniel","family":"Amo","sequence":"first","affiliation":[{"name":"Enginyeria, La Salle, Universitat Ram\u00f3n Llull, Barcelona"}]},{"given":"Marc","family":"Alier","sequence":"additional","affiliation":[{"name":"ESSI, UPC, Barcelona"}]},{"given":"Francisco Jos\u00e9","family":"Garc\u00eda-Pe\u00f1alvo","sequence":"additional","affiliation":[{"name":"Departamento de Inform\u00e1tica y Autom\u00e1tica, Universidad de Salamanca, Salamanca"}]},{"given":"David","family":"Fonseca","sequence":"additional","affiliation":[{"name":"Arquitectura, La Salle, Universitat Ram\u00f3n Llull, Barcelona"}]},{"given":"Mar\u00eda Jos\u00e9","family":"Casany","sequence":"additional","affiliation":[{"name":"ESSI, UPC, Barcelona"}]}],"member":"320","published-online":{"date-parts":[[2019,10,16]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"funded by tech execs, is closing schools, losing students - Business Insider","author":"AltSchool","year":"2017","unstructured":"AltSchool , funded by tech execs, is closing schools, losing students - Business Insider : 2017 . https:\/\/www.businessinsider.com\/altschool-why-parents-leaving-2017-11?IR=T. Accessed: 2019-04-07. AltSchool, funded by tech execs, is closing schools, losing students - Business Insider: 2017. https:\/\/www.businessinsider.com\/altschool-why-parents-leaving-2017-11?IR=T. Accessed: 2019-04-07."},{"key":"e_1_3_2_1_2_1","volume-title":"et al","author":"Amo D.","year":"2019","unstructured":"Amo , D. et al . 2019 . Personal Data Broker Instead of Blockchain for Students' Data Privacy Assurance. Springer , Cham. 371--380. Amo, D. et al. 2019. Personal Data Broker Instead of Blockchain for Students' Data Privacy Assurance. Springer, Cham. 371--380."},{"key":"e_1_3_2_1_3_1","unstructured":"Analytics - MoodleDocs: 2019. https:\/\/docs.moodle.org\/37\/en\/Analytics. Accessed: 2019-04-07.  Analytics - MoodleDocs: 2019. https:\/\/docs.moodle.org\/37\/en\/Analytics. Accessed: 2019-04-07."},{"key":"e_1_3_2_1_4_1","unstructured":"Brainwave-tracking start-up BrainCo in controversy over tests on Chinese schoolchildren: 2019. https:\/\/www.scmp.com\/tech\/start-ups\/article\/3005448\/brainwave-tracking-start-china-schoolchildren-controversy-working. Accessed: 2019-06-07.  Brainwave-tracking start-up BrainCo in controversy over tests on Chinese schoolchildren: 2019. https:\/\/www.scmp.com\/tech\/start-ups\/article\/3005448\/brainwave-tracking-start-china-schoolchildren-controversy-working. Accessed: 2019-06-07."},{"key":"e_1_3_2_1_5_1","unstructured":"Camera Above the Classroom: 2019. https:\/\/www.sixthtone.com\/news\/1003759\/camera-above-the-classroom. Accessed: 2019-04-07.  Camera Above the Classroom: 2019. https:\/\/www.sixthtone.com\/news\/1003759\/camera-above-the-classroom. Accessed: 2019-04-07."},{"key":"e_1_3_2_1_6_1","unstructured":"Chinese schools use facial-recognition gates to monitor pupils: 2019. https:\/\/www.dailymail.co.uk\/news\/article-7153981\/Chinese-schools-use-facial-recognition-gates-monitor-pupils.html. Accessed: 2019-06-07.  Chinese schools use facial-recognition gates to monitor pupils: 2019. https:\/\/www.dailymail.co.uk\/news\/article-7153981\/Chinese-schools-use-facial-recognition-gates-monitor-pupils.html. Accessed: 2019-06-07."},{"key":"e_1_3_2_1_7_1","volume-title":"Privacy and Confidentiality: The Importance of Context. The Monist","author":"Francis L.P.","unstructured":"Francis , L.P. Privacy and Confidentiality: The Importance of Context. The Monist . Oxford University Press . Francis, L.P. Privacy and Confidentiality: The Importance of Context. The Monist. Oxford University Press."},{"key":"e_1_3_2_1_8_1","volume-title":"2008 5th International Conference on Electrical Engineering, Computing Science and Automatic Control (Nov.","author":"Hernandez J.C.G.","year":"2008","unstructured":"Hernandez , J.C.G. and Chavez , M.A.L. 2008. Moodle security vulnerabilities . 2008 5th International Conference on Electrical Engineering, Computing Science and Automatic Control (Nov. 2008 ), 352--357. Hernandez, J.C.G. and Chavez, M.A.L. 2008. Moodle security vulnerabilities. 2008 5th International Conference on Electrical Engineering, Computing Science and Automatic Control (Nov. 2008), 352--357."},{"key":"e_1_3_2_1_9_1","unstructured":"Hoel T. and Chen W. 2016. Implications of the European Data Protection Regulations for Learning Analytics Design.  Hoel T. and Chen W. 2016. Implications of the European Data Protection Regulations for Learning Analytics Design."},{"key":"e_1_3_2_1_10_1","unstructured":"K-12 Cyber Incident Map: 2018. https:\/\/k12cybersecure.com\/map\/. Accessed: 2019-04-07.  K-12 Cyber Incident Map: 2018. https:\/\/k12cybersecure.com\/map\/. Accessed: 2019-04-07."},{"key":"e_1_3_2_1_11_1","volume-title":"Data Protection vs. Information Security","author":"Privacy","year":"2016","unstructured":"Privacy vs. Data Protection vs. Information Security : 2016 . https:\/\/blogs.upm.es\/sse\/2016\/11\/01\/privacy-vs-data-protection-vs-information-security\/. Accessed : 2019-06-07. Privacy vs. Data Protection vs. Information Security: 2016. https:\/\/blogs.upm.es\/sse\/2016\/11\/01\/privacy-vs-data-protection-vs-information-security\/. Accessed: 2019-06-07."},{"key":"e_1_3_2_1_12_1","unstructured":"Regulation (EU) 2016\/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data and repealing Directive 95\/46\/EC (General Da: 2016. https:\/\/eur-lex.europa.eu\/legal-content\/en\/TXT\/?uri=CELEX%3A32016R0679. Accessed: 2019-06-27.  Regulation (EU) 2016\/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data and repealing Directive 95\/46\/EC (General Da: 2016. https:\/\/eur-lex.europa.eu\/legal-content\/en\/TXT\/?uri=CELEX%3A32016R0679. Accessed: 2019-06-27."},{"key":"e_1_3_2_1_13_1","volume-title":"Article 6 EU General Data Protection Regulation (EU-GDPR). (Sep","author":"Vollmer N.","year":"2018","unstructured":"Vollmer , N. 2018. Article 6 EU General Data Protection Regulation (EU-GDPR). (Sep . 2018 ). Vollmer, N. 2018. Article 6 EU General Data Protection Regulation (EU-GDPR). (Sep. 2018)."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"crossref","unstructured":"Williamson B. Decoding ClassDojo: psycho-policy social-emotional learning and persuasive educational technologies. DOI:https:\/\/doi.org\/10.1080\/17439884.2017.1278020.    10.1080\/17439884.2017.1278020\nWilliamson B. Decoding ClassDojo: psycho-policy social-emotional learning and persuasive educational technologies. DOI:https:\/\/doi.org\/10.1080\/17439884.2017.1278020.","DOI":"10.1080\/17439884.2017.1278020"}],"event":{"name":"TEEM'19: Technological Ecosystems for Enhancing Multiculturality","location":"Le\u00f3n Spain","acronym":"TEEM'19","sponsor":["University of Salamanca University of Salamanca"]},"container-title":["Proceedings of the Seventh International Conference on Technological Ecosystems for Enhancing Multiculturality"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3362789.3362823","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3362789.3362823","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:44:55Z","timestamp":1750203895000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3362789.3362823"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,10,16]]},"references-count":14,"alternative-id":["10.1145\/3362789.3362823","10.1145\/3362789"],"URL":"https:\/\/doi.org\/10.1145\/3362789.3362823","relation":{},"subject":[],"published":{"date-parts":[[2019,10,16]]},"assertion":[{"value":"2019-10-16","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}