Skip to main content

Understanding Privacy Concerns in Online Courses: A Case Study of Proctortrack

  • Conference paper
  • First Online:
Global Security, Safety and Sustainability: Tomorrow's Challenges of Cyber Security (ICGS3 2015)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 534))

Included in the following conference series:

  • International Conference on Global Security, Safety, and Sustainability

Abstract

This study aims to investigate underlying causes of privacy concerns of online learners which emerged as a consequence from the launch of an automated proctoring technology by an educational institution. The privacy has become a vital issue in the modern age of information due to the complex, dynamic and fluid nature of privacy it is far from easy to define and understand what privacy means in certain situations. Consequently, designers of interactive systems often misunderstand privacy and even often ignore it, thus causing concerns for users. Using content analysis approach [1], qualitative data was collected and analysed from 130 online bloggers during the deployment phase of Proctortrack tool. The results and findings provide useful new insights into the nature and form of privacy concerns of online learners. Findings have theoretical as well as practical implications for the successful adoption of Massive Open Online Courses (MOOCs) and similar systems.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Graneheim, U.H., Lundman, B.: Qualitative content analysis in nursing research: concepts, procedures and measures to achieve trustworthiness. Nurse Educ. Today 24, 105–112 (2004)

    Article  Google Scholar 

  2. Coursera Help Center: Honor Code & Plagiarism (2015). https://learner.coursera.help/hc/en-us/articles/201223999-Honor-Code-Plagiarism. Accessed 1 June 2015

  3. Singer, N.: Online Test-Takers Feel Anti-Cheating Software’s Uneasy Glare (2015). http://www.nytimes.com/2015/04/06/technology/online-test-takers-feel-anti-cheating-softwares-uneasy-glare.html. Accessed 15 May 2015

  4. Change.org: The world’s platform for change (2015). https://www.change.org/. Accessed 12 June 2015

  5. Bertino, E., Paci, F., Ferrini, R.: Privacy-preserving digital identity management for cloud computing. IEEE Comput. Soc. Data Eng. Bull. 1–4 (2009)

    Google Scholar 

  6. Boyd, D.: Facebook’s privacy train wreck: exposure, invasion, and social convergence. Convergence 14(1), 13–20 (2008)

    Google Scholar 

  7. Rotenberg, M.: Protecting human dignity in the digital age. In: Proceedings of the Third United Nations Educational, Scientific and Cultural Organization Congress on Ethical, Legal and Societal Challenges of Cyberspace (2000). http://webworld.unesco.org/infoethics2000/report_151100.html. Accessed 2 June 2015

  8. Solove, J.D.: A taxonomy of privacy. Univ. Pa. L. Rev. 154(3), 477–564 (2006)

    Article  Google Scholar 

  9. Briggs, L.: Assessment tools for MOOCs. Campus Technology (2013). http://campustechnology.com/Articles/2013/09/05/Assessment-Tools-for-MOOCs.aspx. Accessed 15 Apr 2015

  10. Altbach, P.G.: MOOCs as neocolonialism: Who controls knowledge? [Blog post]. WorldWise (2013). http://chronicle.com/blogs/worldwise/moocs-as-neocolonialism-who-controls-knowledge/

  11. De Waard, I., Abajian, S., Gallagher, M., Hogue, R., ÖzdamarKeskin, N., Koutropoulos, A., Rodriguez, O.: Using mLearning and MOOCs to understand chaos, emergence, and complexity in education. Int. Rev. Res. Open Distance Learn. 12(7), 94–115 (2011). http://www.irrodl.org/index.php/irrodl/article/view/1046/2026

    Google Scholar 

  12. Koet, M., Ahn, G.-J., Shehab, M.: Privacy-enhanced user-centric identity management. In: Proceedings of IEEE International Conference on Communications, pp. 998–1002. IEEE Press (2009)

    Google Scholar 

  13. Warren, S.D., Brandeis, L.D.: The right to privacy. 4 Harv. L. Rev. 193, 195–196 (1890)

    Google Scholar 

  14. Son, J.: Y., and Kim, S., S., (2008) Internet users’ information privacy-protective responses: a taxonomy and a nomological model. MIS Q. 32(3), 503–529 (2008)

    Google Scholar 

  15. Carr, N.: The ethics of MOOC research [Blog post]. Rough Type (2012). http://www.roughtype.com/?p=2005. Accessed 10 Apr 2015

  16. Verificient: Automated Remote Proctoring Solutions, Proctortrack (2015). http://www.proctortrack.com/

  17. Schram, T.H.: Conceptualizing Qualitative In-quiry: Mindwork for Fieldwork in Education and the Social Sciences. Pearson, Upper Saddle River (2003)

    Google Scholar 

  18. Yin, R.K.: Applications of Case Study Research. Sage Publications Inc., Thousand Oaks (2012)

    Google Scholar 

  19. Taylor, B., Sinha, G., Ghoshal, T.: Research Methodology: (A Guide for Researchers in Management and Social Sciences). Asoke K. Ghosh, Prentice-Hall, New Delhi (2006)

    Google Scholar 

  20. Eisenhardt, K.M.: Building theories from case study research. Acad. Manag. Rev. 14, 532–550 (1989)

    Google Scholar 

  21. Liyanagunawardena, T.R., Adams, A.A., Williams, S.A.: MOOCs: A Systematic Study of the Published Literature 2008–2012. Int. Rev. Res. Open Distance Learn 14(3), 202–227 (2013). Irrodl

    Google Scholar 

  22. The New Media Consortium: The Horizon Report. USA: The New Media Consortium and EDUCAUSE Learning Initiative (2011)

    Google Scholar 

  23. Simons, H.: Cast study Research in Practice. Sage Publications Limited, London (2009)

    Google Scholar 

  24. Burges, R.G.: The Ethics of Educational Research. The Falmer Press, London (2005)

    Google Scholar 

  25. Franzosi, R.: Content analysis: Objective, systematic, and quantitative description of content. In: Franzosi, R. (ed.) Content Analysis. SAGE Benchmarks in Social Research Methods, pp. 2–43. Sage Publications, Thousand Oaks (2008)

    Google Scholar 

  26. Graneheim, U.H., Lundman, B.: Qualitative content analysis in nursing research: concepts, procedures and measures to achieve trustworthiness. Nurse Educ. Today 24, 105–112 (2004)

    Article  Google Scholar 

  27. Downe-Wamboldt, B.: Content analysis: method, applica-tions, and issues. Health Care Women Int. 13(3), 313–321 (1992)

    Article  Google Scholar 

  28. Kondracki, N.L., Wellman, N.S., Amundson, D.R.: Content analysis: review of methods and their applications in nutri-tion education. J. Nutr. Educ. Behav. 34(4), 224–230 (2002)

    Article  Google Scholar 

  29. Chinn, P.L., Kramer, M.K.: Theory and Nursing a Systematic Approach. Mosby Year Book, St. Louis (1999)

    Google Scholar 

  30. Elo, S., Kynga, H.: The qualitative content analysis process. J. Adv. Nurs. 62, 107–115 (2007)

    Article  Google Scholar 

  31. Burns, N., Grove, S.K.: The Practice of Nursing Research: Conduct, Critique and Utilization. Elsevier Saunders, St. Louis (2005)

    Google Scholar 

  32. Polit, D.F., Beck, C.T.: Nursing Research: Principles and Methods. Lippincott Williams & Wilkins, Philadelphia (2004)

    Google Scholar 

  33. Robson, C.: Real World Research: A Resource for Social Scientists and Practitioner–Researchers. Blackwell Publishers, Oxford (1993)

    Google Scholar 

  34. Burnard, P.: Teaching the analysis of textual data: an experiential approach. Nurse Educ. Today 16, 278–281 (1996)

    Article  Google Scholar 

  35. Fielding, N.G., Lee, R.M.: Computer Analysis and Qualitative Research. Sage, Thousand Oaks (1998)

    Google Scholar 

  36. Leech, N.L., Onwuegbuzie, A.J.: Beyond constant comparison qualitative data analysis: using NVivo. School Psychol. Q. 26(1), 70–84 (2011)

    Article  Google Scholar 

  37. Bandura, A.: Self-efficacy mechanism in human agency. Am. Psychol. 37, 122–147 (1982)

    Article  Google Scholar 

  38. Wikipedia: Self-efficacy (2015). https://en.wikipedia.org/wiki/Self-efficacy. Accessed 12 June 2015

  39. Ftc.gov: Federal Trade Commission | Protecting America’s Consumers (2015). https://www.ftc.gov/. Accessed 12 June 2015

  40. Hayes, F., Termini, V.: (2013). http://www.educause.edu/ero/article/ensuring-academic-integrity-distance-education-online-proctoring. Accessed 9 June 2015

  41. Negrea, S.: (2014). http://www.universitybusiness.com/article/online-proctoring-gaining-popularity-moocs

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Anwar ul Haq .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

ul Haq, A., Jamal, A., Butt, U., Majeed, A., Ozkaya, A. (2015). Understanding Privacy Concerns in Online Courses: A Case Study of Proctortrack. In: Jahankhani, H., Carlile, A., Akhgar, B., Taal, A., Hessami, A., Hosseinian-Far, A. (eds) Global Security, Safety and Sustainability: Tomorrow's Challenges of Cyber Security. ICGS3 2015. Communications in Computer and Information Science, vol 534. Springer, Cham. https://doi.org/10.1007/978-3-319-23276-8_12

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-23276-8_12

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-23275-1

  • Online ISBN: 978-3-319-23276-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics