{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,14]],"date-time":"2026-05-14T22:49:09Z","timestamp":1778798949581,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":24,"publisher":"ACM","license":[{"start":{"date-parts":[[2025,4,25]],"date-time":"2025-04-25T00:00:00Z","timestamp":1745539200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"DARPA","award":["GR45872"],"award-info":[{"award-number":["GR45872"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,4,26]]},"DOI":"10.1145\/3706599.3720254","type":"proceedings-article","created":{"date-parts":[[2025,4,23]],"date-time":"2025-04-23T20:15:12Z","timestamp":1745439312000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Investigating the Security &amp; Privacy Risks from Unsanctioned Technology Use by Educators"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0002-1327-277X","authenticated-orcid":false,"given":"Easton","family":"Kelso","sequence":"first","affiliation":[{"name":"Arizona State University, Tempe, Arizona, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3045-5183","authenticated-orcid":false,"given":"Ananta","family":"Soneji","sequence":"additional","affiliation":[{"name":"Arizona State University, Tempe, Arizona, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-7100-7242","authenticated-orcid":false,"given":"Syed Zami-Ul-Haque","family":"Navid","sequence":"additional","affiliation":[{"name":"Arizona State University, Tempe, Arizona, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8832-1789","authenticated-orcid":false,"given":"Yan","family":"Shoshitaishvili","sequence":"additional","affiliation":[{"name":"Arizona State University, Tempe, Arizona, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1258-6470","authenticated-orcid":false,"given":"Sazzadur","family":"Rahaman","sequence":"additional","affiliation":[{"name":"University of Arizona, Tucson, Arizona, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8374-7596","authenticated-orcid":false,"given":"Rakibul","family":"Hasan","sequence":"additional","affiliation":[{"name":"Arizona State University, Tempe, Arizona, USA"}]}],"member":"320","published-online":{"date-parts":[[2025,4,25]]},"reference":[{"key":"e_1_3_3_2_2_2","unstructured":"[n. d.]. Video Conferencing Cloud Phone Webinars Chat Virtual Events | Zoom. https:\/\/zoom.us\/"},{"key":"e_1_3_3_2_3_2","first-page":"633","volume-title":"Seventeenth Symposium on Usable Privacy and Security (SOUPS 2021)","author":"Balash David\u00a0G.","year":"2021","unstructured":"David\u00a0G. Balash, Dongkun Kim, Darika Shaibekova, Rahel\u00a0A. Fainchtein, Micah Sherr, and Adam\u00a0J. Aviv. 2021. Examining the Examiners: Students\u2019 Privacy and Security Perceptions of Online Proctoring Services. In Seventeenth Symposium on Usable Privacy and Security (SOUPS 2021). USENIX Association, 633\u2013652. https:\/\/www.usenix.org\/conference\/soups2021\/presentation\/balash"},{"key":"e_1_3_3_2_4_2","unstructured":"David\u00a0G. Balash Elena Korkes Miles Grant Adam\u00a0J. Aviv Rahel\u00a0A. Fainchtein and Micah Sherr. 2023. {Educators\u2019} Perspectives of Using (or Not Using) Online Exam Proctoring. 5091\u20135108. https:\/\/www.usenix.org\/conference\/usenixsecurity23\/presentation\/balash"},{"key":"e_1_3_3_2_5_2","unstructured":"Canvas. [n. d.]. Canva. https:\/\/app.learnplatform.com\/marketplace\/."},{"key":"e_1_3_3_2_6_2","doi-asserted-by":"publisher","DOI":"10.1145\/3544548.3580777"},{"key":"e_1_3_3_2_7_2","unstructured":"Educause. [n. d.]. Educause. https:\/\/www.educause.edu\/."},{"key":"e_1_3_3_2_8_2","unstructured":"Barbara Fedders. 2018. The Constant and Expanding Classroom: Surveillance in K-12 Public Schools. North Carolina Law Review 97 6 (2018) 1673\u20131726. https:\/\/heinonline.org\/HOL\/P?h=hein.journals\/nclr97&i=1722"},{"key":"e_1_3_3_2_9_2","volume-title":"Student Privacy Implications of School-Issued Devices and Student Activity Monitoring Software","author":"Hankerson DeVan\u00a0L.","year":"2021","unstructured":"DeVan\u00a0L. Hankerson, Cody Venzke, Elizabeth Laird, Hugh Grant-Chapman, and Dhanaraj Thakur. 2021. Student Privacy Implications of School-Issued Devices and Student Activity Monitoring Software. Technical Report. https:\/\/cdt.org\/insights\/ report-online-and-observed-student-privacy-implications-of-school-issued-devices-and- student-activity-monitoring-software\/"},{"key":"e_1_3_3_2_10_2","doi-asserted-by":"publisher","unstructured":"Rakibul Hasan. 2023. Understanding EdTech\u2019s Privacy and Security Issues: Understanding the Perception and Awareness of Education Technologies\u2019 Privacy and Security Issues. Proceedings on Privacy Enhancing Technologies 2023 4 (Oct. 2023) 269\u2013286. 10.56553\/popets-2023-0110","DOI":"10.56553\/popets-2023-0110"},{"key":"e_1_3_3_2_11_2","doi-asserted-by":"publisher","unstructured":"Rakibul Hasan and Mario Fritz. 2022. Understanding Utility and Privacy of Demographic Data in Education Technology by Causal Analysis and Adversarial-Censoring. Proceedings on Privacy Enhancing Technologies 2022 2 (April 2022) 245\u2013262. 10.2478\/popets-2022-0044","DOI":"10.2478\/popets-2022-0044"},{"key":"e_1_3_3_2_12_2","doi-asserted-by":"crossref","unstructured":"Easton Kelso Ananta Soneji Sazzadur Rahaman Yan Soshitaishvili and Rakibul Hasan. 2024. Trust because you can\u2019t verify:privacy and security hurdles in education technology acquisition practices(CCS\u201924). Association for Computing Machinery New York NY USA. Place: Salt Lake City USA.","DOI":"10.1145\/3658644.3690353"},{"key":"e_1_3_3_2_13_2","doi-asserted-by":"crossref","unstructured":"Susan McNeeley. 2012. Sensitive issues in surveys: Reducing refusals while increasing reliability and quality of responses to sensitive survey items. Handbook of survey methodology for the social sciences (2012) 377\u2013396.","DOI":"10.1007\/978-1-4614-3876-2_22"},{"key":"e_1_3_3_2_14_2","doi-asserted-by":"crossref","unstructured":"Anton\u00a0J Nederhof. 1985. Methods of coping with social desirability bias: A review. European journal of social psychology 15 3 (1985) 263\u2013280.","DOI":"10.1002\/ejsp.2420150303"},{"key":"e_1_3_3_2_15_2","unstructured":"OtterAI. [n. d.]. OtterAI. https:\/\/otter.ai\/."},{"key":"e_1_3_3_2_16_2","doi-asserted-by":"publisher","unstructured":"Britt Paris Rebecca Reynolds and Catherine McGowan. 2022. Sins of omission: Critical informatics perspectives on privacy in E\u2010Learning systems in higher education. 73 5 (April 2022) 708\u2013725. 10.1002\/asi.24575 Number of pages: 18 Place: USA Publisher: John Wiley & Sons Inc. tex.issue_date: May 2022.","DOI":"10.1002\/asi.24575"},{"key":"e_1_3_3_2_17_2","unstructured":"Qualtrics. [n. d.]. Qualtrics. www.qualtrics.com."},{"key":"e_1_3_3_2_18_2","doi-asserted-by":"publisher","DOI":"10.1145\/3613904.3642066"},{"key":"e_1_3_3_2_19_2","unstructured":"Reddit. [n. d.]. Reddit. https:\/\/www.reddit.com\/."},{"key":"e_1_3_3_2_20_2","unstructured":"Natalie Schwartz. 2023. Data breaches cost higher education and training organizations $3.7M on average in 2023. https:\/\/www.highereddive.com\/news\/data-breaches-cost-higher-education-colleges\/689499\/."},{"key":"e_1_3_3_2_21_2","doi-asserted-by":"publisher","unstructured":"Elisa Shioji Ani Meliksetyan Lucy Simko Ryan Watkins Adam Aviv and Shaanan Cohney. 2024. \"It\u2019s been lovely watching you\u201d: Institutional Decision-Making on Online Proctoring Software. IEEE Computer Society 18\u201318. 10.1109\/SP61157.2025.00018 ISSN: 2375-1207.","DOI":"10.1109\/SP61157.2025.00018"},{"key":"e_1_3_3_2_22_2","unstructured":"US Department of Education. [n. d.]. Family Educational Rights and Privacy Act (FERPA). https:\/\/www2.ed.gov\/policy\/gen\/guid\/fpco\/ferpa\/index.html."},{"key":"e_1_3_3_2_23_2","unstructured":"Wikipedia. 2024. Health Insurance Portability and Accountability Act. https:\/\/en.wikipedia.org\/wiki\/Health_Insurance_Portability_and_Accountability_Act."},{"key":"e_1_3_3_2_24_2","doi-asserted-by":"publisher","unstructured":"Ben Williamson Sian Bayne and Suellen Shay. 2020. The datafication of teaching in Higher Education: critical issues and perspectives. Teaching in Higher Education 25 4 (May 2020) 351\u2013365. 10.1080\/13562517.2020.1748811 Publisher: Routledge _eprint: https:\/\/doi.org\/10.1080\/13562517.2020.1748811.","DOI":"10.1080\/13562517.2020.1748811"},{"key":"e_1_3_3_2_25_2","doi-asserted-by":"publisher","DOI":"10.1145\/3689943.3695050"}],"event":{"name":"CHI EA '25: Extended Abstracts of the CHI Conference on Human Factors in Computing Systems","location":"Yokohama Japan","acronym":"CHI EA '25","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"]},"container-title":["Proceedings of the Extended Abstracts of the CHI Conference on Human Factors in Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3706599.3720254","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/abs\/10.1145\/3706599.3720254","content-type":"text\/html","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3706599.3720254","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3706599.3720254","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:18:51Z","timestamp":1750295931000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3706599.3720254"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,4,25]]},"references-count":24,"alternative-id":["10.1145\/3706599.3720254","10.1145\/3706599"],"URL":"https:\/\/doi.org\/10.1145\/3706599.3720254","relation":{},"subject":[],"published":{"date-parts":[[2025,4,25]]},"assertion":[{"value":"2025-04-25","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}