{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T14:06:04Z","timestamp":1774533964179,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":95,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,11,29]],"date-time":"2022-11-29T00:00:00Z","timestamp":1669680000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,11,29]]},"DOI":"10.1145\/3572921.3572937","type":"proceedings-article","created":{"date-parts":[[2023,4,6]],"date-time":"2023-04-06T20:28:32Z","timestamp":1680812912000},"page":"9-21","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":15,"title":["Learning in the Panopticon"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9044-1755","authenticated-orcid":false,"given":"Bingyi","family":"Han","sequence":"first","affiliation":[{"name":"SCHOOL OF COMPUTING AND INFORMATION SYSTEMS, THE UNIVERSITY OF MELBOURNE, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9044-6644","authenticated-orcid":false,"given":"George","family":"Buchanan","sequence":"additional","affiliation":[{"name":"ISCHOOL, THE UNIVERSITY OF MELBOURNE, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7522-1842","authenticated-orcid":false,"given":"Dana","family":"Mckay","sequence":"additional","affiliation":[{"name":"School of Computing Technologies, RMIT University, Australia"}]}],"member":"320","published-online":{"date-parts":[[2023,4,6]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Intelligence unleashed: An argument for AI in education","author":"Luckin R.","year":"2016","unstructured":"Luckin, R., , Intelligence unleashed: An argument for AI in education. 2016."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1002\/widm.1075"},{"key":"e_1_3_2_1_3_1","first-page":"15","volume":"202","author":"Margolis A.A.","unstructured":"Margolis, A.A., Zone of Proximal Development, Scaffolding and Teaching Practice. Cultural-Historical Psychology, 2020. 16(3): p. 15-26.","journal-title":"Teaching Practice. Cultural-Historical Psychology"},{"key":"e_1_3_2_1_4_1","volume-title":"Collaborative Aspects of Collecting and Reflecting on Behavioral Data. in Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems.","author":"Marcu G.","year":"2020","unstructured":"Marcu, G. and A.N. Spiller. Collaborative Aspects of Collecting and Reflecting on Behavioral Data. in Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems. 2020."},{"key":"e_1_3_2_1_5_1","first-page":"1380","volume":"201","author":"Siemens G.","unstructured":"Siemens, G., Learning analytics: The emergence of a discipline. American Behavioral Scientist, 2013. 57(10): p. 1380-1400.","journal-title":"American Behavioral Scientist"},{"key":"e_1_3_2_1_6_1","first-page":"1","volume":"201","author":"Bulger M.","unstructured":"Bulger, M., Personalized learning: The conversations we're not having. Data and Society, 2016. 22(1): p. 1-29.","journal-title":"Society"},{"key":"e_1_3_2_1_7_1","volume-title":"Penetrating the fog: Analytics in learning and education. EDUCAUSE review","author":"Siemens G.","year":"2011","unstructured":"Siemens, G. and P. Long, Penetrating the fog: Analytics in learning and education. EDUCAUSE review, 2011. 46(5): p. 30."},{"key":"e_1_3_2_1_8_1","first-page":"115","volume":"202","author":"Andrejevic M.","unstructured":"Andrejevic, M. and N. Selwyn, Facial recognition technology in schools: Critical questions and concerns. Learning, Media and Technology, 2020. 45(2): p. 115-128.","journal-title":"Technology"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.4324\/9781351252805-14"},{"key":"e_1_3_2_1_10_1","first-page":"516","volume":"201","author":"Mangaroska K.","unstructured":"Mangaroska, K. and M. Giannakos, Learning analytics for learning design: A systematic literature review of analytics-driven design to enhance learning. IEEE Transactions on Learning Technologies, 2018. 12(4): p. 516-534.","journal-title":"Learning Technologies"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3027385.3027392"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3375627.3375804"},{"key":"e_1_3_2_1_13_1","first-page":"48","volume":"201","author":"Wise A.","unstructured":"Wise, A., Y. Zhao, and S. Hausknecht, Learning analytics for online discussions: Embedded and extracted approaches. Journal of Learning Analytics, 2014. 1(2): p. 48-71.","journal-title":"Learning Analytics"},{"key":"e_1_3_2_1_14_1","first-page":"267","volume":"201","author":"Krach S.K.","unstructured":"Krach, S.K., M.P. McCreery, and H. Rimel, Examining teachers\u2019 behavioral management charts: A comparison of Class Dojo and paper-pencil methods. Contemporary School Psychology, 2017. 21(3): p. 267-275.","journal-title":"Contemporary School Psychology"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300537"},{"key":"e_1_3_2_1_16_1","volume-title":"Digital lessons? Public opinions on the use of digital technologies in Australian schools","author":"Selwyn N.","year":"2019","unstructured":"Selwyn, N., Digital lessons? Public opinions on the use of digital technologies in Australian schools. Melbourne, Monash University. Retrieved May, 2019. 10(2020): p. 2019-01."},{"key":"e_1_3_2_1_17_1","first-page":"1","volume":"201","author":"Dewan M.","unstructured":"Dewan, M., M. Murshed, and F. Lin, Engagement detection in online learning: a review. Smart Learning Environments, 2019. 6(1): p. 1-20.","journal-title":"Smart Learning Environments"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2020.102411"},{"key":"e_1_3_2_1_19_1","unstructured":"Dunne A. and F. Raby Speculative everything: design fiction and social dreaming. 2013: MIT press."},{"key":"e_1_3_2_1_20_1","volume-title":"New Directions in Third Wave Human-Computer Interaction","author":"Wong R.Y.","unstructured":"Wong, R.Y. and V. Khovanskaya, Speculative design in HCI: from corporate imaginations to critical orientations, in New Directions in Third Wave Human-Computer Interaction: Volume 2-Methodologies. 2018, Springer. p. 175-202."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3173807"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2971485.2971489"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702260"},{"key":"e_1_3_2_1_24_1","first-page":"345","volume":"199","author":"Kitzinger C.","unstructured":"Kitzinger, C. and D. Powell, Engendering infidelity: Essentialist and social constructionist readings of a story completion task. Feminism & Psychology, 1995. 5(3): p. 345-372.","journal-title":"Psychology"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025762"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025742"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3027385.3027450"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-93843-1_12"},{"key":"e_1_3_2_1_29_1","volume-title":"Informing the design of teacher awareness tools through causal alignment analysis","author":"Holstein K.","year":"2018","unstructured":"Holstein, K., B.M. McLaren, and V. Aleven, Informing the design of teacher awareness tools through causal alignment analysis. 2018, International Society of the Learning Sciences, Inc.[ISLS]."},{"key":"e_1_3_2_1_30_1","first-page":"36","volume":"201","author":"Manolev J.","unstructured":"Manolev, J., A. Sullivan, and R. Slee, The datafication of discipline: ClassDojo, surveillance and a performative classroom culture. Learning, Media and Technology, 2019. 44(1): p. 36-51.","journal-title":"Technology"},{"key":"e_1_3_2_1_31_1","unstructured":"Kaye K. Intel calls its AI that detects student emotions a teaching tool. Others call it 'morally reprehensible.'. 2022: Protocol."},{"key":"e_1_3_2_1_32_1","volume-title":"EdMedia+ Innovate Learning.","author":"Khalil M.","year":"2015","unstructured":"Khalil, M. and M. Ebner. Learning analytics: principles and constraints. in EdMedia+ Innovate Learning. 2015. Association for the Advancement of Computing in Education (AACE)."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3027385.3027434"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3303772.3303804"},{"key":"e_1_3_2_1_35_1","first-page":"1500","volume":"201","author":"Verbert K.","unstructured":"Verbert, K., , Learning analytics dashboard applications. American Behavioral Scientist, 2013. 57(10): p. 1500-1509.","journal-title":"American Behavioral Scientist"},{"key":"e_1_3_2_1_36_1","first-page":"5499","volume":"202","author":"Noroozi O.","unstructured":"Noroozi, O., , Multimodal data indicators for capturing cognitive, motivational, and emotional learning processes: A systematic literature review. Education and Information Technologies, 2020. 25(6): p. 5499-5547.","journal-title":"Information Technologies"},{"key":"e_1_3_2_1_37_1","first-page":"110","volume-title":"Journal of Universal Computer Science","author":"Park Y.","year":"2015","unstructured":"Park, Y. and I.-H. Jo, Development of the learning analytics dashboard to support students\u2019 learning performance. Journal of Universal Computer Science, 2015. 21(1): p. 110."},{"key":"e_1_3_2_1_38_1","first-page":"100758","volume-title":"The Internet and Higher Education","author":"Jivet I.","year":"2020","unstructured":"Jivet, I., , From students with love: An empirical study on learner goals, self-regulated learning and sense-making of learning analytics in higher education. The Internet and Higher Education, 2020. 47: p. 100758."},{"key":"e_1_3_2_1_39_1","volume-title":"Designing for Complementarity: Teacher and Student Needs for Orchestration Support in AI-Enhanced Classrooms","author":"Holstein K.","year":"2019","unstructured":"Holstein, K., B.M. McLaren, and V. Aleven, Designing for Complementarity: Teacher and Student Needs for Orchestration Support in AI-Enhanced Classrooms. 2019, Springer International Publishing. p. 157-171."},{"key":"e_1_3_2_1_40_1","volume-title":"Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work & Social Computing.","author":"Li X.","year":"2015","unstructured":"Li, X., , Massive Open Online Proctor: Protecting the Credibility of MOOCs certificates, in Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work & Social Computing. 2015, Association for Computing Machinery: Vancouver, BC, Canada. p. 1129\u20131137."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/3449208"},{"key":"e_1_3_2_1_42_1","first-page":"64","volume":"201","author":"Selwyn N.","unstructured":"Selwyn, N., Data entry: Towards the critical study of digital data and education. Learning, Media and Technology, 2015. 40(1): p. 64-82.","journal-title":"Technology"},{"key":"e_1_3_2_1_43_1","first-page":"510","volume":"202","author":"Kwet M.","unstructured":"Kwet, M. and P. Prinsloo, The \u2018smart'classroom: a new frontier in the age of the smart university. Teaching in Higher Education, 2020. 25(4): p. 510-526.","journal-title":"Higher Education"},{"key":"e_1_3_2_1_44_1","first-page":"1","volume":"201","author":"Jarke J.","unstructured":"Jarke, J. and A. Breiter, Editorial: the datafication of education. Learning, Media and Technology, 2019. 44(1): p. 1-6.","journal-title":"Technology"},{"key":"e_1_3_2_1_45_1","volume-title":"autonomy and automation: The irreducibility of pedagogy to information transactions. Studies in philosophy and education","author":"Lundie D.","year":"2016","unstructured":"Lundie, D., Authority, autonomy and automation: The irreducibility of pedagogy to information transactions. Studies in philosophy and education, 2016. 35(3): p. 279-291."},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/2723576.2723642"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/3461778.3462084"},{"key":"e_1_3_2_1_48_1","first-page":"329","volume":"202","author":"Dur\u00e1n J.M.","unstructured":"Dur\u00e1n, J.M. and K.R. Jongsma, Who is afraid of black box algorithms? On the epistemological and ethical basis of trust in medical AI. Journal of Medical Ethics, 2021. 47(5): p. 329-335.","journal-title":"Medical Ethics"},{"key":"e_1_3_2_1_49_1","first-page":"957","volume":"201","author":"Lawson C.","unstructured":"Lawson, C., , Identification of \u2018at risk'students using learning analytics: the ethical dilemmas of intervention strategies in a higher education institution. Educational Technology Research and Development, 2016. 64(5): p. 957-968.","journal-title":"Development"},{"key":"e_1_3_2_1_50_1","first-page":"159","volume":"201","author":"Prinsloo P.","unstructured":"Prinsloo, P. and S. Slade, Student vulnerability, agency, and learning analytics: An exploration. Journal of Learning Analytics, 2016. 3(1): p. 159-182.","journal-title":"Learning Analytics"},{"key":"e_1_3_2_1_51_1","first-page":"16","volume":"201","author":"Sclater N.","unstructured":"Sclater, N., Developing a Code of Practice for Learning Analytics. Journal of Learning Analytics, 2016. 3(1): p. 16-42.","journal-title":"Learning Analytics"},{"key":"e_1_3_2_1_52_1","volume-title":"Artificial intelligence and emerging technologies in schools","author":"Southgate E.","year":"2019","unstructured":"Southgate, E., , Artificial intelligence and emerging technologies in schools. 2019."},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/3479596"},{"key":"e_1_3_2_1_54_1","first-page":"633","volume":"201","author":"Whitelock\u2010Wainwright A.","unstructured":"Whitelock\u2010Wainwright, A., , The Student Expectations of Learning Analytics Questionnaire. Journal of Computer Assisted Learning, 2019. 35(5): p. 633-666.","journal-title":"Computer Assisted Learning"},{"key":"e_1_3_2_1_55_1","volume-title":"An exploratory latent class analysis of student expectations towards learning analytics services. The Internet and Higher Education","author":"Whitelock-Wainwright A.","year":"2021","unstructured":"Whitelock-Wainwright, A., , An exploratory latent class analysis of student expectations towards learning analytics services. The Internet and Higher Education, 2021: p. 100818."},{"key":"e_1_3_2_1_56_1","first-page":"1044","volume-title":"Journal of the Association for Information Science and Technology","author":"Jones K.M.","year":"2020","unstructured":"Jones, K.M., , \u201cWe're being tracked at all times\u201d: Student perspectives of their privacy in relation to learning analytics in higher education. Journal of the Association for Information Science and Technology, 2020. 71(9): p. 1044-1059."},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/3375462.3375536"},{"key":"e_1_3_2_1_58_1","volume-title":"Alyssa Friend Wise, Agathe Merceron, Dragan Ga\u0161evic, and George Siemens","author":"Macfadyen L.P.","year":"2022","unstructured":"Macfadyen, L.P., Institutional Implementation of Learning Analytics: Current State, Challenges, and Guiding Frameworks. by Charles Lang, Alyssa Friend Wise, Agathe Merceron, Dragan Ga\u0161evic, and George Siemens. 2nd ed. Vancouver, Canada: SOLAR, 2022.","edition":"2"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.compedu.2020.103933"},{"key":"e_1_3_2_1_60_1","first-page":"99","volume":"202","author":"Hagendorff T.","unstructured":"Hagendorff, T., The ethics of AI ethics: An evaluation of guidelines. Minds and Machines, 2020. 30(1): p. 99-120.","journal-title":"Machines"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/3461778.3462069"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376598"},{"key":"e_1_3_2_1_63_1","volume-title":"Editor","author":"Clarke V.","year":"2019","unstructured":"Clarke, V., , Editorial introduction to the special issue: using story completion methods in qualitative research. 2019, Taylor & Francis. p. 1-20."},{"key":"e_1_3_2_1_64_1","first-page":"136","volume":"201","author":"Braun V.","unstructured":"Braun, V., , Qualitative story completion: Possibilities and potential pitfalls. Qualitative Research in Psychology, 2019. 16(1): p. 136-155.","journal-title":"Psychology"},{"key":"e_1_3_2_1_65_1","first-page":"196","volume-title":"Proceedings of the Association for Information Science and Technology","author":"Ma Y.","year":"2019","unstructured":"Ma, Y., Relational privacy: Where the East and the West could meet. Proceedings of the Association for Information Science and Technology, 2019. 56(1): p. 196-205."},{"key":"e_1_3_2_1_66_1","volume-title":"Grounded theory: An exploration of process and procedure. Qualitative health research","author":"Walker D.","year":"2006","unstructured":"Walker, D. and F. Myrick, Grounded theory: An exploration of process and procedure. Qualitative health research, 2006. 16(4): p. 547-559."},{"key":"e_1_3_2_1_67_1","volume-title":"A qualititative approach to HCI research","author":"Adams A.","year":"2008","unstructured":"Adams, A., P. Lunt, and P. Cairns, A qualititative approach to HCI research. 2008."},{"key":"e_1_3_2_1_68_1","first-page":"159","volume":"201","author":"Prinsloo P.","unstructured":"Prinsloo, P. and S. Slade, Student Vulnerability, Agency and Learning Analytics: An Exploration. Journal of Learning Analytics, 2016. 3(1): p. 159-182.","journal-title":"Learning Analytics"},{"key":"e_1_3_2_1_69_1","volume-title":"Empirical validation of affect, behavior, and cognition as distinct components of attitude. Journal of personality and social psychology","author":"Breckler S.J.","year":"1984","unstructured":"Breckler, S.J., Empirical validation of affect, behavior, and cognition as distinct components of attitude. Journal of personality and social psychology, 1984. 47(6): p. 1191."},{"key":"e_1_3_2_1_70_1","first-page":"263","volume":"201","author":"Reidenberg J.R.","unstructured":"Reidenberg, J.R. and F. Schaub, Achieving big data privacy in education. Theory and Research in Education, 2018. 16(3): p. 263-279.","journal-title":"Education"},{"key":"e_1_3_2_1_71_1","first-page":"1510","volume":"201","author":"Slade S.","unstructured":"Slade, S. and P. Prinsloo, Learning analytics: Ethical issues and dilemmas. American Behavioral Scientist, 2013. 57(10): p. 1510-1529.","journal-title":"American Behavioral Scientist"},{"key":"e_1_3_2_1_72_1","volume-title":"\u201cThe fitbit version of the learning world\u201d. Frontiers in psychology","author":"Roberts L.D.","year":"2016","unstructured":"Roberts, L.D., , Student attitudes toward learning analytics in higher education:\u201cThe fitbit version of the learning world\u201d. Frontiers in psychology, 2016. 7: p. 1959."},{"key":"e_1_3_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1145\/2370216.2370224"},{"key":"e_1_3_2_1_74_1","volume-title":"territory, population: lectures at the Coll\u00e8ge de France","author":"Foucault M.","year":"1977","unstructured":"Foucault, M., Security, territory, population: lectures at the Coll\u00e8ge de France, 1977-78. 2007: Springer."},{"key":"e_1_3_2_1_75_1","volume-title":"Discipline and Punish: the Birth of the Prison","author":"Foucaul M.","year":"1979","unstructured":"Foucaul, M., Discipline and Punish: the Birth of the Prison. New York: Vintage, 1979."},{"key":"e_1_3_2_1_76_1","volume-title":"Handbook of Digital Higher Education.","author":"Corrin L.","year":"2022","unstructured":"Corrin, L., P.G. de Barba, and A. Brooker, Understanding the learner perspective to inform institutional learning analytics strategy and practice, in Handbook of Digital Higher Education. 2022, Edward Elgar Publishing. p. 248-259."},{"key":"e_1_3_2_1_77_1","volume-title":"Disparities in students","author":"Li W.","year":"2021","unstructured":"Li, W., , Disparities in students\u2019 propensity to consent to learning analytics. International Journal of Artificial Intelligence in Education, 2021: p. 1-45."},{"key":"e_1_3_2_1_78_1","volume-title":"The teacher's soul and the terrors of performativity. Journal of education policy","author":"Ball S.J.","year":"2003","unstructured":"Ball, S.J., The teacher's soul and the terrors of performativity. Journal of education policy, 2003. 18(2): p. 215-228."},{"key":"e_1_3_2_1_79_1","doi-asserted-by":"publisher","DOI":"10.1145\/3303772.3303798"},{"key":"e_1_3_2_1_80_1","doi-asserted-by":"crossref","unstructured":"Kwet M. Operation Phakisa education: Why a secret? Mass surveillance inequality and race in South Africa's emerging national e-Education system. Mass Surveillance Inequality and Race in South Africa's Emerging National E-Education System (December 4 2017) 2017.","DOI":"10.5210\/fm.v22i12.8054"},{"key":"e_1_3_2_1_81_1","volume":"200","author":"Solove D.J.","unstructured":"Solove, D.J., A taxonomy of privacy. U. Pa. L. Rev., 2005. 154: p. 477.","journal-title":"Rev."},{"key":"e_1_3_2_1_82_1","volume-title":"Internet surveillance, regulation, and chilling effects online: A comparative case study. Regulation, and Chilling Effects Online: A Comparative Case Study (May 27","author":"Penney J.","year":"2017","unstructured":"Penney, J., Internet surveillance, regulation, and chilling effects online: A comparative case study. Regulation, and Chilling Effects Online: A Comparative Case Study (May 27, 2017), 2017. 6(2)."},{"key":"e_1_3_2_1_83_1","volume":"201","author":"Sklansky D.A.","unstructured":"Sklansky, D.A., Too much information: How not to think about privacy and the Fourth Amendment. Calif. L. Rev., 2014. 102: p. 1069.","journal-title":"Rev."},{"key":"e_1_3_2_1_84_1","doi-asserted-by":"publisher","DOI":"10.3233\/978-1-61499-890-7-8"},{"key":"e_1_3_2_1_85_1","doi-asserted-by":"publisher","DOI":"10.1145\/2632048.2632107"},{"key":"e_1_3_2_1_86_1","volume-title":"World. in 10th Symposium On Usable Privacy and Security (SOUPS 2014","author":"Cranor L.F.","year":"2014","unstructured":"Cranor, L.F., {Parents\u2019} and {Teens\u2019} Perspectives on Privacy In a {Technology-Filled} World. in 10th Symposium On Usable Privacy and Security (SOUPS 2014). 2014."},{"key":"e_1_3_2_1_87_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3173768"},{"key":"e_1_3_2_1_88_1","doi-asserted-by":"publisher","DOI":"10.1093\/cybsec\/tyaa006"},{"key":"e_1_3_2_1_89_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03168-7_14"},{"key":"e_1_3_2_1_90_1","volume-title":"Student privacy in learning analytics: An information ethics perspective. The information society","author":"Rubel A.","year":"2016","unstructured":"Rubel, A. and K.M. Jones, Student privacy in learning analytics: An information ethics perspective. The information society, 2016. 32(2): p. 143-159."},{"key":"e_1_3_2_1_91_1","first-page":"26","volume":"201","author":"Stahl B.C.","unstructured":"Stahl, B.C. and D. Wright, Ethics and privacy in AI and big data: Implementing responsible research and innovation. IEEE Security & Privacy, 2018. 16(3): p. 26-33.","journal-title":"Privacy"},{"key":"e_1_3_2_1_92_1","first-page":"1","volume":"2022","author":"Baek C.","unstructured":"Baek, C. and S.J. Aguilar, Past, present, and future directions of learning analytics research for students with disabilities. Journal of Research on Technology in Education, 2022: p. 1-16.","journal-title":"Education"},{"key":"e_1_3_2_1_93_1","volume-title":"Remote Learning Accidentally Introduced a New Danger for LGBTQ Students. 2022 [cited 2022","author":"Carballo A.","year":"2022","unstructured":"Carballo, A. Remote Learning Accidentally Introduced a New Danger for LGBTQ Students. 2022 [cited 2022 Jun 14, 2022]; Available from: https:\/\/slate.com\/technology\/2022\/02\/remote-learning-danger-lgbtq-students.html."},{"key":"e_1_3_2_1_94_1","doi-asserted-by":"publisher","DOI":"10.1145\/3170358.3170375"},{"key":"e_1_3_2_1_95_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445362"}],"event":{"name":"OzCHI '22: 34th Australian Conference on Human-Computer Interaction","location":"Canberra ACT Australia","acronym":"OzCHI '22"},"container-title":["Proceedings of the 34th Australian Conference on Human-Computer Interaction"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3572921.3572937","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3572921.3572937","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T17:51:39Z","timestamp":1750182699000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3572921.3572937"}},"subtitle":["Examining the Potential Impacts of AI Monitoring on Students"],"short-title":[],"issued":{"date-parts":[[2022,11,29]]},"references-count":95,"alternative-id":["10.1145\/3572921.3572937","10.1145\/3572921"],"URL":"https:\/\/doi.org\/10.1145\/3572921.3572937","relation":{},"subject":[],"published":{"date-parts":[[2022,11,29]]},"assertion":[{"value":"2023-04-06","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}