{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,25]],"date-time":"2025-06-25T11:27:44Z","timestamp":1750850864105,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":58,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,10,21]],"date-time":"2020-10-21T00:00:00Z","timestamp":1603238400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Secretariat of Universities and Research of the Department of Business and Knowledge of the Generalitat de Catalunya, and Ramon Llull Univ","award":["2020-URL-Proj- 058"],"award-info":[{"award-number":["2020-URL-Proj- 058"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,10,21]]},"DOI":"10.1145\/3434780.3436637","type":"proceedings-article","created":{"date-parts":[[2021,1,22]],"date-time":"2021-01-22T20:40:48Z","timestamp":1611348048000},"page":"730-737","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":15,"title":["Seven principles to foster privacy and security in educational tools: Local Educational Data Analytics"],"prefix":"10.1145","author":[{"given":"Daniel","family":"Amo","sequence":"first","affiliation":[{"name":"La Salle. Ramon Llull University, Spain"}]},{"given":"Ricardo","family":"Torres","sequence":"additional","affiliation":[{"name":"La Salle. Ramon Llull University, Spain"}]},{"given":"Xavier","family":"Canaleta","sequence":"additional","affiliation":[{"name":"La Salle. Ramon Llull University, Spain"}]},{"given":"Javier","family":"Herrero-Mart\u00edn","sequence":"additional","affiliation":[{"name":"Centro Superior de Estudios Universitarios La Salle, Spain"}]},{"given":"Cristina","family":"Rodr\u00edguez-Merino","sequence":"additional","affiliation":[{"name":"Servicio de Orientaci\u00f3n Psicopedag\u00f3gica. CALPA-La Salle. Universidad Aut\u00f3noma de Madrid, Spain"}]},{"given":"David","family":"Fonseca","sequence":"additional","affiliation":[{"name":"La Salle. Ramon Llull University, Spain"}]}],"member":"320","published-online":{"date-parts":[[2021,1,22]]},"reference":[{"key":"e_1_3_2_1_1_1","article-title":"The student's progress snapshot a hybrid text and visual learning analytics dashboard","author":"Amo Daniel","year":"2018","journal-title":"Int. J. Eng. Educ.34"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.3390\/su12062548"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3362789.3362823"},{"volume-title":"Francisco Jos\u00e9 Garc\u00eda-Pe\u00f1alvo, and Mar\u00eda Jos\u00e9 Casa\u00f1","year":"2019","author":"Amo Daniel","key":"e_1_3_2_1_4_1"},{"key":"e_1_3_2_1_5_1","unstructured":"D. Amo Filva. 2020. Privacidad y gesti\u00f3n de la identidad en procesos de anal\u00edtica de aprendizaje. Programa de Doctorado Formaci\u00f3n en la Sociedad del Conocimiento. Retrieved from https:\/\/repositorio.grial.eu\/bitstream\/grial\/1951\/1\/TesisDanielAmoFilva-LearningAnalytics-Blockchain_v43.pdf  D. Amo Filva. 2020. Privacidad y gesti\u00f3n de la identidad en procesos de anal\u00edtica de aprendizaje. Programa de Doctorado Formaci\u00f3n en la Sociedad del Conocimiento. Retrieved from https:\/\/repositorio.grial.eu\/bitstream\/grial\/1951\/1\/TesisDanielAmoFilva-LearningAnalytics-Blockchain_v43.pdf"},{"volume-title":"The Guardian. Retrieved","year":"2020","author":"Amoore Louise","key":"e_1_3_2_1_6_1"},{"volume-title":"otra manera de hacer escuela. La Salle ARLEP","author":"La Salle","key":"e_1_3_2_1_7_1"},{"volume-title":"Nuevo Contexto de Aprendizaje","author":"La Salle","key":"e_1_3_2_1_8_1"},{"volume-title":"Bolet\u00edn Oficial del Estado, n\u00fam. 294, 70. Retrieved","year":"2019","author":"del Estado Bolet\u00edn Oficial","key":"e_1_3_2_1_9_1"},{"volume-title":"Int. J. Eng. Sci.6375","year":"2016","author":"Bulla Chetan","key":"e_1_3_2_1_10_1"},{"volume-title":"Retrieved","year":"2020","author":"John","key":"e_1_3_2_1_11_1"},{"volume-title":"Recital 60 - Information obligation | General Data Protection Regulation (GDPR). Retrieved","year":"2020","author":"EP","key":"e_1_3_2_1_12_1"},{"volume-title":"LACE. Retrieved","year":"2016","author":"Drachsler Hendrik","key":"e_1_3_2_1_13_1"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2883851.2883893"},{"volume-title":"EDM 2011 - Proceedings of the 4th International Conference on Educational Data Mining, 355\u2013356","author":"Dyckhoff A. L.","key":"e_1_3_2_1_15_1"},{"volume-title":"Retrieved","year":"2016","author":"EP","key":"e_1_3_2_1_16_1"},{"volume-title":"Garc\u00eda-Pe\u00f1alvo","year":"2017","author":"Garc\u00eda-Holgado Alicia","key":"e_1_3_2_1_17_1"},{"volume-title":"Marc Alier, Fara\u00f3n Llorens, and Santiago Iglesias-PRadas.","year":"2015","author":"Garc\u00eda-Pe\u00f1alvo Francisco Jos\u00e9","key":"e_1_3_2_1_18_1"},{"volume-title":"Frederik Zuiderveen Borgesius, and Moniek Buijzen","year":"2020","author":"Gra\u00dfl Paul","key":"e_1_3_2_1_19_1"},{"key":"e_1_3_2_1_20_1","unstructured":"Eric Hughes. 1993. A cypherpunk's manifesto.  Eric Hughes. 1993. A cypherpunk's manifesto."},{"key":"e_1_3_2_1_21_1","first-page":"29","article-title":"El prosumidor. El actor comunicativo de la sociedad de la ubicuidad","volume":"11","author":"Islas-Carmona Jose Octavio","year":"2008","journal-title":"Palabra Clave"},{"volume-title":"Retrieved","year":"2020","key":"e_1_3_2_1_22_1"},{"key":"e_1_3_2_1_23_1","first-page":"2966","article-title":"Algorithmic bias? An empirical study of apparent gender-based discrimination in the display of stem career ads. Manage","volume":"65","author":"Lambrecht Anja","year":"2019","journal-title":"Sci."},{"volume-title":"ACM International Conference Proceeding Series, 436\u2013440","year":"2018","author":"Lang Charles","key":"e_1_3_2_1_24_1"},{"volume-title":"Handbook of Learning Analytics. SOLAR","author":"Lang Charles","key":"e_1_3_2_1_25_1"},{"key":"e_1_3_2_1_26_1","article-title":"Thousands of Chinese Students\u2019 Data Exposed on Internet","author":"Lin Liza","year":"2020","journal-title":"WSJ. Retrieved"},{"key":"e_1_3_2_1_27_1","first-page":"30","article-title":"Penetrating the Fog: Analytics in Learning and Education","volume":"46","author":"Long Philip","year":"2011","journal-title":"EDUCAUSE Review"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1177\/1461444816686328"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2020-0037"},{"volume-title":"The Washington Post. Retrieved","year":"2019","author":"MacMillan Douglas","key":"e_1_3_2_1_30_1"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.3390\/educsci5030221"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3362789.3362841"},{"volume-title":"Retrieved","year":"2020","author":"NYOB.","key":"e_1_3_2_1_33_1"},{"volume-title":"Appleinsider. Retrieved","year":"2019","author":"Owen Malcolm","key":"e_1_3_2_1_34_1"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1111\/bjet.12152"},{"volume-title":"Retrieved","year":"2020","author":"Pedre\u00f1o Andr\u00e9s","key":"e_1_3_2_1_36_1"},{"volume-title":"Retrieved","year":"2019","author":"Peir\u00f3 Karma","key":"e_1_3_2_1_37_1"},{"key":"e_1_3_2_1_38_1","unstructured":"Karma Peir\u00f3. 2020. ADA en acci\u00f3: treball de recerca a Catalunya. In Intel\u00b7lig\u00e8ncia artificial. Decisions automatitzades a Catalunya Autoritat Catalana de Protecci\u00f3 de Dades and Generalitat de Catalunya (eds.). Autoritat Catalana de Protecci\u00f3 de Dades Barcelona 100. Retrieved from https:\/\/apdcat.gencat.cat\/web\/.content\/04-actualitat\/noticies\/documents\/INFORME-INTELLIGENCIA-ARTIFICIAL-FINAL-WEB-OK.pdf  Karma Peir\u00f3. 2020. ADA en acci\u00f3: treball de recerca a Catalunya. In Intel\u00b7lig\u00e8ncia artificial. Decisions automatitzades a Catalunya Autoritat Catalana de Protecci\u00f3 de Dades and Generalitat de Catalunya (eds.). Autoritat Catalana de Protecci\u00f3 de Dades Barcelona 100. Retrieved from https:\/\/apdcat.gencat.cat\/web\/.content\/04-actualitat\/noticies\/documents\/INFORME-INTELLIGENCIA-ARTIFICIAL-FINAL-WEB-OK.pdf"},{"key":"e_1_3_2_1_39_1","first-page":"30","article-title":"Everywhere Surveillance\u2019: Global Surveillance Regimes as Techno-Securitization. Sci","volume":"29","author":"Petit Patrick","year":"2020","journal-title":"Cult. (Lond)."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/2330667.2330691"},{"volume-title":"The Chronicle. Retrieved","year":"2019","author":"Satisky Jake","key":"e_1_3_2_1_41_1"},{"volume-title":"Smart Innovation, Systems and Technologies","author":"Seanosky Jeremie","key":"e_1_3_2_1_42_1"},{"volume-title":"Retrieved","year":"2020","author":"Showbie Inc.","key":"e_1_3_2_1_43_1"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/2330601.2330661"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1177\/0002764213479366"},{"volume-title":"Joan Navarro, and Xavi Canaleta.","year":"2020","author":"de Torres G\u00f3mez Eduard","key":"e_1_3_2_1_46_1"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/3170358.3170367"},{"volume-title":"Weiss and Kristin Archick","year":"2016","author":"Martin","key":"e_1_3_2_1_48_1"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1080\/17439884.2017.1278020"},{"volume-title":"Big data in education: The digital future of learning, policy and practice","author":"Williamson Ben","key":"e_1_3_2_1_50_1"},{"key":"e_1_3_2_1_51_1","unstructured":"Y Combinator. Imagine K12. Retrieved September 16 2020 from http:\/\/www.imaginek12.com\/  Y Combinator. Imagine K12. Retrieved September 16 2020 from http:\/\/www.imaginek12.com\/"},{"volume-title":"Gender Biased Algorithms: Word Embedding Models","year":"2019","author":"Zagitova Viktoriia","key":"e_1_3_2_1_52_1"},{"volume-title":"Proceedings of the 14th USENIX Symposium on Networked Systems Design and Implementation, NSDI 2017, 283\u2013298","year":"2017","author":"Zheng Wenting","key":"e_1_3_2_1_53_1"},{"volume-title":"Retrieved","year":"2020","author":"We","key":"e_1_3_2_1_54_1"},{"volume-title":"Retrieved","year":"2020","author":"Analytics CryptPad","key":"e_1_3_2_1_55_1"},{"key":"e_1_3_2_1_56_1","unstructured":"Plickers. Retrieved September 16 2020 from https:\/\/get.plickers.com\/  Plickers. Retrieved September 16 2020 from https:\/\/get.plickers.com\/"},{"volume-title":"Telemat. Informatics 38","year":"2019","author":"Kompen Ricardo Torres","key":"e_1_3_2_1_57_1"},{"key":"e_1_3_2_1_58_1","unstructured":"Eduliticas. Retrieved September 16 2020 from https:\/\/eduliticas.com\/  Eduliticas. Retrieved September 16 2020 from https:\/\/eduliticas.com\/"}],"event":{"name":"TEEM'20: Eighth International Conference on Technological Ecosystems for Enhancing Multiculturality","acronym":"TEEM'20","location":"Salamanca Spain"},"container-title":["Eighth International Conference on Technological Ecosystems for Enhancing Multiculturality"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3434780.3436637","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3434780.3436637","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T17:49:41Z","timestamp":1750268981000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3434780.3436637"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,10,21]]},"references-count":58,"alternative-id":["10.1145\/3434780.3436637","10.1145\/3434780"],"URL":"https:\/\/doi.org\/10.1145\/3434780.3436637","relation":{},"subject":[],"published":{"date-parts":[[2020,10,21]]},"assertion":[{"value":"2021-01-22","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}