4 April 2019 at 11:55am
[Re-purposing an unused introduction to my full paper - "See no... Hear no... Track no..: Ethics and the Intelligent Campus" - that was published in the Journal of Information Rights, Policy and Practice this week]
7 February 2019 at 2:35pm
Earlier this week I did a presentation to a group from Dutch Universities on the ethics work that Jisc has done alongside its studies, pilots and services on the use of data.
23 June 2017 at 8:53am
An interesting query arrived about when to advertise role-based, rather than individual, e-mail addresses. Do role-based ones feel too impersonal, for example, because senders don't know who they are dealing with?
19 April 2017 at 9:44am
At Jisc's Learning Analytics Network meeting last month I presented an updated version of my suggested legal model for Learning Analytics.
4 May 2016 at 3:15pm
More than a decade ago the e-Privacy Directive mentioned "location data" in the context of telecommunications services. At the time that was almost entirely about mobile phone locations - data processed by just a handful of network providers - but nowadays many more organisations are able to gather location data about wifi-enabled devices in range of their access points.
28 April 2016 at 7:29am
[UPDATE: the full paper describing this approach has now been published in the Journal of Learning Analytics] [based on Doug Clow’s liveblog of the talk I did at the LAEP workshop in Amsterdam]
20 November 2015 at 8:38am
[roughly what I said in a presentation yesterday to the Northern Universities’ Consortium] I’ve been a full or part-time student for more than thirty years. It's interesting to reflect on how my student record has changed over that time.
19 June 2015 at 3:53pm
At the FIRST conference this week I presented ideas on how effective incident response protects privacy. Indeed, since most common malware infects end user devices and hides itself, an external response team may be the only way the owner can learn that their private information is being read and copied by others. The information sources used by incident responders – logfiles, network flows, etc.
Subscribe to Privacy