You are on page 1of 10

Which Strategies are Used in the Design of

Technical LA Infrastructure?: A Qualitative


Interview Study
1st George-Petru Ciordas-Hertel
Educational Technologies
DIPF |Leibniz Institute for Research and Information in Education
Frankfurt am Main, Germany
orcid.org/0000-0003-1589-7845
ciordas@dipf.de

2nd Jan Schneider


Educational Technologies
DIPF |Leibniz Institute for Research and Information in Education
Frankfurt am Main, Germany
orcid.org/0000-0002-1229-2579
schneider.jan@dipf.de

3rd Hendrik Drachsler


Educational Technologies
DIPF |Leibniz Institute for Research and Information in Education
Frankfurt am Main, Germany
orcid.org//0000-0001-8407-5314
drachsler@dipf.de

Abstract—In order to obtain a holistic perspective on learning, sign strategy, data protection, privacy, GDPR, qualitative inter-
technical infrastructure at an institutional level can be advanta- view study
geous for Learning Analytics (LA). If personal data is collected
and processed in such infrastructure, legal requirements are of I. I NTRODUCTION
crucial importance. Recent studies have examined various aspects
of LA infrastructure, such as ethical trade-offs and stakeholder In recent decades, a growing number of educational institu-
needs. However, strategies for designing technical LA infrastruc- tions have been using Learning Management Systems (LMSs)
ture at the institutional level and strategies for dealing with data such as Moodle1 to promote students with online learning
protection regulations have been lacking so far, although they
are crucial for the adoption of LA in Europe. The purpose facilities. The users of these LMSs create digital traces that can
of this paper is to examine three research questions: (RQ1) be utilized for Learning Analytics (LA). LA was established
which strategies are currently used to design LA infrastructure; with the purposes of understanding and optimizing learning
(RQ2) how data protection and privacy affect the design of LA and the environments in which it occurs by collecting, measur-
infrastructure; and (RQ3) how could technical measures support ing, analyzing, and reporting data about learners and their con-
the adoption of LA. These research questions were investigated by
conducting eleven interviews with LA infrastructure developers texts [1]. Small data is often a starter for LA infrastructure [2].
representing eight different higher education institutions and However, most LMSs do not have suitable tools for analyzing
ten different infrastructures. According to RQ1, the paper first the usage of data, nor can they be integrated with other LMSs
examines the domain specificity of LA infrastructure and the four to gain a holistic perspective on learning. In order to gain
design strategies used. The paper also examines, according to a more holistic perspective, more advanced infrastructure at
RQ2, the interviewees’ awareness of data protection, the conflict
with users’ consent, and the data subject rights. Finally, the an institutional level is suitable. Therefore, we consider it
paper presents, in line with RQ3, the results of the strategies essential to acquire data from multiple heterogeneous data
in dealing with trust, stakeholder expectations, and engagement. sources such as LMSs, student registration, survey systems,
Researchers and infrastructure developers can use and adopt and library information systems, but also potentially cameras
these findings to improve their strategies for developing technical and sensors [3] that equip the lecture halls. This type of
LA infrastructure with regard to data protection, privacy, and
trust. infrastructure design at the institutional level is subject to data

Index Terms—learning analytics, technical infrastructure, de- 1 https://moodle.com

978-1-7281-0930-5/20/$31.00 ©2020 IEEE 27–30 April, 2020, Porto, Portugal


2020 IEEE Global Engineering Education Conference (EDUCON)
Page 96

Authorized licensed use limited to: University of Vermont Libraries. Downloaded on July 26,2020 at 00:18:50 UTC from IEEE Xplore. Restrictions apply.
characteristics of high volume, high velocity, and variety. Such literature and define the concepts used in this paper. Section III
requirements qualify infrastructure as Big Data infrastructure then describes the methodology used to conduct the interviews.
with all the associated challenges [4]. As there is a difference After that, section IV will report on the main findings of the
between organizational and technical infrastructure, we want interviews. Finally, the paper will conclude with a discussion
to make clear that this paper is solely investigating technical of the most important findings in section V.
infrastructure for LA.
II. R ELATED W ORKS
At present, European institutions must comply with the
GDPR [5]. When personal data is collected and processed, In a previously conducted structured literature review on LA
legal privacy requirements are of crucial importance. Article infrastructure [7] , we found many papers with drafts of LA
4 defines “personal data” as any information which is related infrastructure. However, we found little information about the
to an identified or identifiable natural person. These persons design considerations and whether and how the authors applied
are referred to in the GDPR as “data subjects”. Furthermore, and maintained data protection and privacy in practice.
article 6 of the GDPR defines the lawful bases of processing Over the past few years, there was plenty of literature
personal data. Among the lawful bases, the two bases “le- published on ethical frameworks, codes of ethical practice,
gitimate interests” and “data subject consent” fit in particular ethical consideration checklists, and ethical implications of
to the context of LA infrastructure in European institutions LA (e.g., [8]–[13]). Furthermore, there is literature concerned
of higher education. According to chapter 3 of the GDPR, with the challenge of defining universal principles for privacy
the GDPR grants data subjects certain rights they can execute and data protection in a cross-cultural context [14], [15].
under particular conditions. Table I lists these “data subject Several papers examine technical and social aspects that
rights” in detail. As data processing is at the core of any need to be considered for the adoption of LA at higher
LA infrastructure, article 25 of the GDPR applies. The GDPR education institutions (e.g., [16]–[18]).
introduces in article 25, the terms “data protection by design” In connection with this work, there is a paper by Johanes
and “data protection by default”. Privacy is to be distinguished et al. [6]. They conducted interviews with “builders” of LA
from data protection. Data protection is essentially a technical infrastructure to report on their personal experiences. Their
matter, while privacy is a legal matter. Data protection by findings primarily illuminate the themes: navigating designing
design declares that institutions have to take data protection decisions, ubiquitous ethics, and human impact. Where their
and privacy into account right from the beginning of software study focuses on how builders perceive their role and activity,
design and through the entire development process of products we wanted our study to provide insights into the substantial
that involve processing personal data. In addition, data protec- handling of data protection and privacy. Therefore, we have
tion by default specifies that only personal data is processed explicitly focused our questions on practicable, technically
that is necessary for the respective purpose of processing. With viable solutions for LA infrastructure.
these two principles, data protection and privacy can no longer Beyond that, we are not aware of any interview studies
be ex-post considerations but are an integral part of any LA with first-hand accounts that focus on experiences in designing
infrastructure design. technical LA infrastructure with data protection by design.
Recent studies on LA infrastructure examined several as- With this interview study, we intend to close this gap.
pects, such as ethical trade-offs and stakeholder needs [6].
III. M ETHODOLOGY
However, strategies used to design LA technically at an insti-
tutional level and strategies to deal with privacy constraints To learn more about strategies to design LA infrastructure,
were missing, although they are of crucial importance for including technical measures to address privacy concerns and
the adoption in Europe. Therefore, this paper examines the to support the adoption of such infrastructure, we conducted
strategies LA developers use to design LA infrastructure at eleven semi-structured interviews with LA infrastructure de-
scale in higher education. Further, it investigates the influence velopers (see table II).
of data protection and privacy on the design strategies these a) Interview Guide: The interview guide was designed
developers applied. Lastly, it explores how technical measures according to the three research questions mentioned in the
might support the adoption of LA. For this purpose, we introduction and reflected in a semi-structured way. The ques-
conducted a qualitative interview study to analyze and gain tions were open questions, inviting the interview partners (IPs)
the knowledge of these developers. We were investigating the to introduce their areas of focus. The interview guide was
following three research questions: piloted with one technical proficient IP. This enabled us to
refine the interview guide.
RQ1 Which strategies are currently used to design LA infras- b) Interview Partners: The IPs of this study were experts
tructure? in the development of LA infrastructure. They all are scholars
RQ2 How do data protection and privacy affect the design of who were developing or have been developing technical in-
LA infrastructure? frastructure for institutions in higher education. When we use
RQ3 How could technical measures support the adoption of the term develop, we refer to the design, implementation, or
LA? operation of infrastructure. We identified potential respondents
The following section will shortly summarize the related by conducting snowball sampling using a focused sampling

978-1-7281-0930-5/20/$31.00 ©2020 IEEE 27–30 April, 2020, Porto, Portugal


2020 IEEE Global Engineering Education Conference (EDUCON)
Page 97

Authorized licensed use limited to: University of Vermont Libraries. Downloaded on July 26,2020 at 00:18:50 UTC from IEEE Xplore. Restrictions apply.
TABLE I
A SHORT DESCRIPTION OF PARTICULAR ARTICLES AS SPECIFIED BY THE GDPR THAT FRAME THE DESIGN OF LA INFRASTRUCTURE . C ERTAIN
CONDITIONS NEED TO BE MET FOR QUALIFIED RIGHTS .

Article Data Subject Right Description


Art.15 Right of access Instructs the data controller to provide a copy of the personal data, free of charge, in an electronic format.
Art.16 Right to rectification Enforce the rectification of personal data.
Art.17 Right to erasure Entitles to have the data controller erase personal data (qualified right).
Art.18 Right to restriction Personal data may, except for storage, only be processed with consent (qualified right).
Art.20 Right to portability Demands a structured, commonly used and machine-readable format (qualified right).
Art.21 Right to object Stop at any time processing personal data on illegitimate grounds (qualified right).
Art.22 Automated decision making Not be subject to solely automated decision making, where legal or similarly significant effects are produced.
Art.25 Data protection by design Institutions have to take data protection and privacy into account right from the beginning of software design
and through the entire development process of products that involve processing personal data.
Art.25 Data protection by default Only personal data is processed that is necessary for the respective purpose of processing.

frame with multiple entry points [19]. As entry points, we satisfactorily categorized. Inductive and deductive approaches
chose authors from published literature and experts from con- allowed us to discover connections across coded categories.
ferences in the domain of LA corresponding to the themes of Another knowledgeable researcher from the field checked
the interview guide. Respondents across multiple institutions codes and categories for bias and misinterpretation. Wherever
and geographies with different infrastructures were selected this is relevant, we make the best effort to show alternative
to ensure thematic saturation. Finally, we conducted eleven or counter-balancing findings of multiple IPs. We state each
interviews with IPs located in Europe and Australia, represent- finding as verbatim as possible. Nevertheless, in order to
ing eight different institutions and ten different infrastructures. ease reading and increase comprehensibility, we removed filler
All but one IP were male. We show a summary of the IPs’ words, stutters, and repetitions. We emerged the categories
characteristics in table II. The column Role lists the role of within each theme by axial coding [21]. While the IPs empha-
the IPs as they stated it, or we were able to derive them. We, sized different aspects of their experiences, several IPs shared
first of all, differentiate between Leader and Researcher. All most of the experiences. Therefore, we believe that we can
of the IPs are actively involved in research, but we further give a sound overview. We demonstrate this by referring to
wanted to differentiate those who are empowered to set the the IPs for evidence.
direction, raise funding, and determine the overall vision. With d) Terminology: In the findings, we use the Big Data
the terms Learning and Technical, we additionally wanted to Value Chain (BDVC) [22] to map the statements of the Inter-
specify an IP’s contribution to the infrastructure as involved view Partners (IPs) for RQ1. The BDVC can be used to model
in the software development or technical design, respectively, the high-level activities that comprise any information system.
the educational or learning design. We, therefore, believe that the BDVC is a suitable model
for the design of LA infrastructure. The BDVC identifies
TABLE II the following key high-level activities: Data acquisition, data
T HIS TABLE SHOWS AN ANONYMIZED LIST OF THE INTERVIEW PARTNERS , analysis, data curation, data storage, and data usage. Data
THE LOCATION OF THEIR INSTITUTIONS , AND THEIR RESPECTIVE ROLES .
acquisition is the process of gathering, filtering, and cleaning
Interview Country Role data before it enters any storage solution where data analysis
IP01-NL Netherlands Learning & Technical Researcher can be performed. Data analysis is concerned with making
IP02-NL Netherlands Learning & Technical Leader the raw data obtained usable both for decision-making and
IP03-ES Spain Learning & Technical Researcher
for domain-specific use. Data analysis comprises the explo-
IP04-AU Australia Learning & Technical Researcher
IP05-EE Estonia Learning & Technical Researcher ration, transformation, and modeling of data with the aim of
IP06-NL Netherlands Technical Researcher highlighting and synthesizing relevant data and gaining useful
IP07-GB United Kingdom Learning Leader hidden information with high potential from a stakeholder
IP08-AU Australia Learning & Technical Leader
IP09-DE Germany Learning & Technical Leader
perspective. Data curation is the active management of data
IP10-AU Australia Learning & Technical Leader throughout its lifecycle to ensure that it meets the necessary
IP11-GB United Kingdom Learning & Technical Leader data quality requirements for its effective use. Data curation
processes can be divided into various activities such as content
c) Analysis: The interview sessions lasted from 40 to creation, selection, classification, transformation, validation,
150 minutes. After removing identifying information, a con- and long-term archiving. Data storage is the persistence and
tractor transcribed the recordings of the interviews. The data management of data in a scalable manner that meets the needs
synthesis process entailed refining the themes as well as of applications that require rapid access to the data. Data usage
identifying the codes by applying standard qualitative coding includes the data-driven activities that require access to data,
principles [20]. We grouped these codes then into broader its analysis, and the tools required to integrate the data analysis
categories. In an iterative process, we sorted, challenged, within the activity.
refined, and redefined the categories until all responses were As some of the IPs refer to data warehouses and data

978-1-7281-0930-5/20/$31.00 ©2020 IEEE 27–30 April, 2020, Porto, Portugal


2020 IEEE Global Engineering Education Conference (EDUCON)
Page 98

Authorized licensed use limited to: University of Vermont Libraries. Downloaded on July 26,2020 at 00:18:50 UTC from IEEE Xplore. Restrictions apply.
lakes as important technical concepts for LA infrastructure, IV. F INDINGS
we provide a definition here to get common ground on the This qualitative interview study intends to understand the
terminology. Amazon, one of the biggest providers of Big Data practices of the experts in LA infrastructure development
infrastructure, for example, defines a data warehouse as: beyond what is published in papers and documented online.
A data warehouse is a central repository of informa- According to the structure of the interview schedule, the
tion that can be analyzed to make better-informed findings are organized around the three research questions:
decisions. Data flows into a data warehouse from which strategies are currently used to design LA infrastructure
transactional systems, relational databases, and other (RQ1); how data protection and privacy affect the design of
sources, typically on a regular cadence. Business LA infrastructure (RQ2); and how could technical measures
analysts, data scientists, and decision-makers access support the adoption of LA (RQ3).
the data through business intelligence (BI) tools,
SQL clients, and other analytics applications.2 A. RQ1: Designing a Technical Infrastructure
Alternatively, a data infrastructure can be built as a data lake. From the answers of the IPs, we recognized that RQ1 has
Amazon, for example, defines a data lake as: two dimensions that are relevant for the design aspects of
A data lake allows you to store all your structured technical LA infrastructure. Those are the dimensions domain
and unstructured data, in one centralized repository, specificity and design strategies. In the following, we report
and at any scale. With a data lake, you can store the main outcomes of both dimensions.
your data as-is, without having to first structure the 1) Domain Specificity: Since this paper deals with the
data, based on potential questions you may have in design and development of LA infrastructure, we asked the IPs
the future. Data lakes also allow you to run different what it is that makes an infrastructure specific to LA. This is
types of analytics on your data like SQL queries, Big important since there is plenty of established technology and
Data analytics, full-text search, real-time analytics, software architecture in the industry that can be used as a basis
and machine learning to guide better decisions.3 for the design of LA infrastructure. In the following, we use
Furthermore, some IPs discussed the advantages and dis- the Big Data Value Chain (BDVC) [22] to map the statements
advantages of cloud computing. We, therefore, provide a of the IPs (see paragraph III-0d).
definition of the terms Infrastructure-as-a-Service (IaaS) and a) Data acquisition: Some IPs mentioned data acquisi-
Platform-as-a-Service (PaaS), which are mentioned in the tion as specific to education (IP05-EE, IP08-AU). This is in
following sections. IBM, a major provider of cloud solutions, their opinion because of the data models used by learning
defines IaaS as: applications, e.g., data model concerned with the relations
IaaS is a form of cloud computing that delivers fun- between people, and the heterogeneity of the data sources.
damental compute, network, and storage resources They state as well that the infrastructure needs to be more
to consumers on-demand, over the internet, and on a flexible to be able to adapt it to different upcoming learning
pay-as-you-go basis. IaaS enables end users to scale settings, e.g., new data sources, and new learning scenarios.
and shrink resources on an as-needed basis, reducing This quote showcases the specificity by referring to Amazon6 :
the need for high, up-front capital expenditures or With their data structure, how do they know whether
unnecessary “owned” infrastructure, especially in somebody learned something? It’s impossible.
the case of “spiky” workloads.4 b) Data analysis: Further IPs refer to the data analysis as
In contrast, IBM, for example, defines PaaS as: the differential high-level activity (IP05-EE, IP09-DE, IP11-
Platform-as-a-Service (PaaS) is a cloud computing GB). These IPs refer to the data analysis as being more com-
model that provides customers a complete plat- plex because of the complex behavior of the data subjects in
form — hardware, software, and infrastructure — learning processes. This reflects in their opinion in the data and
for developing, running, and managing applications makes synthesizing and extracting useful hidden information
without the cost, complexity, and inflexibility of far more difficult. The following quote demonstrates this:
building and maintaining that platform on-premises. ... what distinguishes Learning Analytics from other
The PaaS provider hosts everything — servers, net- forms of analytics is that learning is complex, and
works, storage, operating system software, databases the way how students learn is non-linear, which
— at their data center; the customer uses it all for a is odd at times. ... I think learning is much more
monthly fee based on usage and can purchase more complex than just consumer behavior.
resources on-demand as needed.5
c) Data curation: Most IPs explain that data curation is
These four terms are relevant and will be used extensively most specific to their LA infrastructure (IP01-NL, IP03-ES,
in later sections of this paper. IP04-AU, IP05-EE, IP06-NL, IP09-DE, IP10-AU). The IPs
2 https://aws.amazon.com/data-warehouse mention that the technical infrastructure is not domain-specific,
3 https://aws.amazon.com/big-data/what-is-a-data-lake but the classification and prediction is. The expertise of their
4 https://www.ibm.com/cloud/learn/iaas
5 https://www.ibm.com/cloud/learn/paas 6 https://www.amazon.com/

978-1-7281-0930-5/20/$31.00 ©2020 IEEE 27–30 April, 2020, Porto, Portugal


2020 IEEE Global Engineering Education Conference (EDUCON)
Page 99

Authorized licensed use limited to: University of Vermont Libraries. Downloaded on July 26,2020 at 00:18:50 UTC from IEEE Xplore. Restrictions apply.
work lies in their opinion in the selection, transformation, and weekly at 3:00 PM. Some other things happen daily
classification of the data. These activities result in specific in the morning. And then you get this connection
prediction models and indicators. As one IP explains: like for three students there are no grades. How is
We have the data, but how can we interpret the data? this possible? Well, because they enrolled within this
We have a system. It is quite open in the sense that period of time when one database has them, and the
it supports certain didactics, no problem, but it is other does not. So we know in 3 more days there
not aware of the didactics. And there are a lot of will be data for them. So you have many of those
problems we encounter. There is openness, which small ETL8 processes of transforming the data, and
is fine, I think, for the users and for the course it becomes very convoluted.
authors and course designers because they can make This convolution is the reason for their effort to promote a
all kinds of designs. How they like it, but it’s not fine collaborative design of technical infrastructure. The design
from the perspective of analyzing those data quite should, in their opinion, be the result of the collaboration of
easily. For example, we have courses where you all stakeholders, e.g., technical and learning experts, students,
can do assignments and you can rate assignments of teachers, and administration.
students. But those assignments can mean a lot of While some of the IPs focus on custom solutions to each
things. From our design in the learning management LA use case (IP01-NL, IP03-ES, IP05-EE, IP09-DE), e.g.,
system we can’t distinct between the one or the standalone tools or course-level analysis, others invest in
other. broader infrastructure at the department (IP07-GB, IP10-AU)
d) Data storage: Only one IP associated the activity of or institutional level (IP02-NL, IP04-AU, IP06-NL, IP08-AU,
data storage as specific to LA infrastructure. This IP mentioned IP11-GB). The IPs with custom solutions claim that each LA
that due to the number of students, the activity data has become use case has its specific requirements and needs, therefore
so large that the institution is forced to delete most raw data particular measures to support its pedagogy. In contrast, most
every week. The institution can preserve only the processed of the IPs consider a commonly shared infrastructure for LA
data. on micro, meso, and macro-level, i.e., course, department, and
e) Data usage: Only a minor number of statements men- institution-level, as feasible and beneficial. They declare that
tion data usage (IP05-EE, IP06-NL, IP09-DE). IPs distinguish LA is level-specific because of somewhat similar requirements
data usage for education as following a different intention resulting from the used tools and the context. Institutional
as opposed to, for example, marketing, where the aim is to level generic infrastructure promises them advantages such as
persuade the user. shared software development and operations investment, but
I think that there is a major difference between what some IPs were pointing out the dangers of trying to bring
we want in Learning Analytics and what they say about a one-size-fits-all solution. As one IP explains it:
Amazon does. Amazon wants to know more about To have a common infrastructure, you need to have
you to persuade you to do something. Learning common goals.
Analytics does not want to persuade you. It only What the IPs essentially argue is that technology can be shared,
wants to inform you about the decision making but LA can not be standardized. They are worried that putting
process. an extended effort into the standardization of LA infrastructure
In general, we can state that the IPs consider the technology might end up with an LA process, essentially only providing
and the design of technical infrastructure in LA to be domain answers to shallow questions:
agnostic. The domain specifics are, in the opinion of the I am quite skeptical because I think what they
IPs, defined in the capture of the pedagogy, the discovery are eventually getting towards is what we call the
of learning, the presentation of results, and the modeling of strategy information office model. Do you still have
intervention. a heartbeat? Are you still alive? These kinds of
2) Design Strategies: In our analysis of the interview things. But the more what I would call formative
transcripts, we were able to identify various strategies the IPs analytics to real kind of analytics, it helps you to
applied in their design of LA infrastructure. provide useful, actionable feedback, to help you to
Two IPs were talking about the convolution of their infras- go to the next step as a learner.
tructure processes (IP04-AU, IP05-EE). Over time their LA
More preferably, they argue that LA should provide useful,
infrastructure has grown in complexity, and technical dept7 .
actionable feedback to help the stakeholders to go to the next
This ended up in convoluted processes and inconsistent data
step to improve the learning. Therefore, LA infrastructure
states. This is how the IP puts it:
should stay flexible.
There are many transformations happening at dif- When the IPs talked about institutional level LA infrastruc-
ferent times. So certain things will get exported ture, they had two different concepts in mind. Most had set up
7 Technical debt is a concept in programming that reflects the additional or were heading towards a data warehouse concept. Only three
development effort that arises when easy-to-implement code is used in the
short term rather than applying the best overall solution. 8 Extract, transform, load

978-1-7281-0930-5/20/$31.00 ©2020 IEEE 27–30 April, 2020, Porto, Portugal


2020 IEEE Global Engineering Education Conference (EDUCON)
Page 100

Authorized licensed use limited to: University of Vermont Libraries. Downloaded on July 26,2020 at 00:18:50 UTC from IEEE Xplore. Restrictions apply.
IPs (IP04-AU, IP06-NL, IP08-AU) discussed the advantages of TABLE III
a data lake concept in comparison to a data warehouse concept. T HE FOUR STRATEGIES THE IP S USED FOR THE DESIGN OF THEIR LA
INFRASTRUCTURE
Especially one IP was discussing the struggles with identifying
learning from pre-aggregated views created by technology Design Strategy Description
experts without the learning domain expertise: Experiment A design to fit an experimental setup,
e.g., the study of biometric data from learners
... a real pain is we’re not given access to the raw Custom Application A design supporting learning in the
tables. We are given access to many views. That is restricted context of one application,
really a problem, because if I am given access to the e.g., an LMS course learning progress indication
Data Warehouse A design to synthesis pre-processed data
raw tables, I can learn the structure of the system. organized into a schema that describes the layout
Whereas if I am given the views, I really cannot and type of data
learn that. That is the problem because views are Data Lake A design to synthesis raw data without
pre-defining structure or schema when acquired
already pre-aggregated.
Confronted with similar issues, another IP was already in
the process of transforming the institution’s infrastructure into Not only is it hard for us to compete and keep up
a data lake. One reoccurring argument was preserving the with technological innovations, current infrastructure
usefulness of the data by keeping it as raw as possible. doesn’t really allow for research, collaboration and
Another argument mentioned was keeping track of the history sharing of data.
of change of data. This statement states the IP’s wider vision:
Further, the IP points out that a shared data lake of multiple
The idea is to have a Big Data lake ... have a lot of institutions could reduce the bias in the data of a single
data streams that are for management, for Learning institution as the data is informed by more than only one
Analytics, for researchers. They take out the data pedagogy.
they need and use the format or the systems which The four design strategies we could identify in the state-
are most suited for their application. ments of the IPs are summarized in table III.
When it came to the operation of the respective infrastruc-
ture, some IPs had also reported on the various considerations B. RQ2: Aligning with Data Protection and Privacy
of operating the infrastructure on-premise or in the cloud As we explained earlier, we are aware of the fact that
(IP01-NL, IP06-NL, IP08-AU). Specifically reported were the GDPR is not legally binding to all of the IPs. However,
the advantages of using an Infrastructure-as-a-Service (IaaS) we regard it as a framework for data protection and privacy
or a Platform-as-a-Service (PaaS) approach. One IP praised that should apply to any infrastructure that handles sensitive
the simplicity and performance of using PaaS compared to personal data. Data protection by design, as specified in the
previously developed on-premise LA infrastructure. The IP GDPR, was, in most cases, not a priority of the IPs. However,
was able to develop a prototype in days rather than weeks. the GDPR seems to have made the IPs take privacy more into
Other IPs also considered moving part of the infrastructure to consideration, where they did not before. In the following,
the cloud but rejected this for privacy and security concerns. we will report about challenges, implications, and conflicts of
Losing direct control of the data and stealing the data were interest in implementing privacy in LA infrastructure.
dominant phrases used. The outstanding infrastructure design Some IPs represent the opinion that the introduction of the
of one IP involves the cooperation of multiple educational GDPR has changed the general perception of privacy (IP06-
institutions to share a data pool. Where other institutions are NL, IP07-GB, IP08-AU, IP09-DE). In some cases, it even
concerned with the rapid development of technology, this IP seems that the GDPR made people recognize privacy for the
has developed a concept for a shared data lake infrastructure first time. Meanwhile, almost all IPs report that data subjects
hosted in the cloud, designed and operated in cooperation have never requested any GDPR related data subject rights
with industry partners. The cooperation with private software (IP01-NL, IP02-NL, IP03-ES, IP05-EE, IP08-AU, IP09-DE,
development and hosting partners is supposed to reduce the IP10-AU) to their best knowledge. In other cases, which are
investment of time and resources in order to keep up with all located in Europe, data subjects have so far only requested
innovations in technology. This reduction would instead be an export of their data (IP06-NL, IP07-GB, IP11-GB).
invested in improving the learning specifics of the infrastruc- There were two different opinions between the IPs regarding
ture. The IP told it this way: obtaining consent. Some IPs argue that they do not need the
The problem of this is that it hinders our ability to consent of the students to do LA because it is obligatory to
conduct research in a collaborative manner as well. the teaching-learning process. One IP states that those who
While we are sort of working on developing our own do not consent have the choice to pick another institution.
prototypes, it doesn’t really facilitate into university Even stronger is the argument that the university has a duty-
collaboration because it’s hard to share data or bring of-care that is balanced against the consent of a student.
data in or export particular prototypes or for it to Others seek to provide the user with individual automated
be used in other institutional contexts to understand privacy settings aligned with the data subject rights as specified
sort of how should models work in that context. by the GDPR. When we further investigated the motivation

978-1-7281-0930-5/20/$31.00 ©2020 IEEE 27–30 April, 2020, Porto, Portugal


2020 IEEE Global Engineering Education Conference (EDUCON)
Page 101

Authorized licensed use limited to: University of Vermont Libraries. Downloaded on July 26,2020 at 00:18:50 UTC from IEEE Xplore. Restrictions apply.
behind not specifically asking for the consent of the students, C. RQ3: Supporting the Adoption of LA
multiple concerns were raised. For one, the IPs are concerned One aspect mentioned by the IPs that plays a role in the
that even one student opting-out of LA might reduce or adaptation of LA was the veracity of the data (IP02-NL, IP04-
undermine the expressiveness of predictions (IP02-NL, IP03- AU, IP05-EE, IP11-GB). IPs claimed that data is a second
ES, IP04-AU, IP05-EE, IP07-GB). Furthermore, the quality pillar an institution can rely on next to the experiences of
of non-personalized LA services becomes reduced. Despite its staff. Further, they explained that data is a pillar the
these concerns, some of these IPs believe that most students institutional administration needs to first trust in order to make
will not disable LA when clearly explained and shown the use of it. One underlying problem mentioned was the historical
benefits of LA at the task. In addition to these concerns, the development of the software ecosystem. The data changed
IPs stated several technical issues. These include that some with so many upgrades that the administration believed it
data is technically necessary to ensure the functionality of the changed its meaning and got corrupted. Another problem
software, and therefore may not be subject to the requirements mentioned was that data sources were only accessible by
of privacy. An example of such data is the storage of name, specific technical staff, which were, therefore, the only ones
postal address, and e-mail address. This data is necessary to able to handle the data. In such cases, the IPs reasoned, seeking
contact a student. Another example mentioned was that user a technical solution to improve the adoption of LA would not
activity data is logged for security reasons. However, where the help, as it has to be taken into account that some stakeholders
institution might not always be able to restrict the acquisition do not even trust technology itself. The IPs explained that
of data; it could limit the LA processing of data: there could be several reasons for this, such as the lack of
It’s not possible to turn some data collection mech- even essential technical expertise.
anisms off. All the consent can be is: What are you Similar to this situation, IPs explained that stakeholders
using it for? You can’t turn off the activity stream they encountered in some cases did not trust LA because
in your VLE. But you can say: Don’t use this to the analytical results provided by LA did not match their
give me any help. Just use this to answer support expectations. Therefore, the IPs argued that LA needs to allow
questions when the VLE breaks. I don’t want my inspection and comprehension of the prediction model, which
tutor to see this information. they explained might not be given, for example, in the case of
a neuronal network model. Approaches applied by the IPs to
The introduction of the GDPR has partially unsettled the tackle such lack of trust in the data and the analytical process
European IPs. They were uncertain how they should apply the were co-creation and full transparency. An IP formulated it as
GDPR in practice. This uncertainty caused some institutions to follows:
hesitate with the implementation of personalized LA or even
Universities will be able to provide legitimacy to the
stop already established LA. The right to be forgotten was
tool-set they are developing, or we are developing
mentioned in most cases by the IPs. For these IPs, this right
together. Co-creation and full transparency, I think
seems to be in contradiction with other legal regulations, such
ideally should not only include the user and the
as the requirement of traceability, e.g., the institution has a
people who are offering the tools, but also the ones
legal obligation to keep student records for a certain number
who are developing the tools.
of years, but students have a right to be forgotten. Likewise,
there is uncertainty concerning data ownership. The IPs asked Engaging the instructors and the administration into decisions
themselves how an institution can decide which data is owned and ideas increased their adoption and appreciation to LA
by whom, e.g., if one student mentions another by name in a within the institution. Furthermore, the IPs noted that being
forum post. To other IPs, it is quite apparent that the students fully transparent to the data subjects as well as enabling user
consented by enrollment to the data collection. The argument integration and user interaction might raise their understanding
is that since the institution collected data by consent, it should of LA applications. Thus, they might start to utilize these
be the owner of the data. A few IPs intended to automate the applications and start to understand or see the benefits of it.
data subject rights and give the students direct agency. These The IPs argued that implementing LA solely from the
IPs concentrated on technical issues such as how to identify perspective of a technical engineer, does not live up to its
data or keep track of consent in the distributed ecosystem of an social impact. One example given was that of high impact
institution. They were also trying to figure out how to enforce consequences based on 80 percent accuracy out of a black-
the GDPR in closed-source third-party software utilizing an box model. The IPs pointed out that LA is not ubiquitous
API9 . Concerning LA, an option mentioned was to isolate the but restricted to its data sources. Thus this needs to be taken
LA infrastructure from the institutional software ecosystem into account for any claim LA makes. Therefore, many IPs
with distinct data flows in and out. This way, every data subject had spoken out in favor of putting more effort into improving
right could be implemented independently within the context the comprehensibility of LA for the students (IP01-NL, IP02-
of the LA infrastructure. NL, IP03-ES, IP04-AU, IP09-DE, IP11-GB). One approach
mentioned was to be transparent about the process. This
included showing where the data was acquired from, how it is
9 Application-Programming-Interface processed, and which the metrics are that feed the indicators.

978-1-7281-0930-5/20/$31.00 ©2020 IEEE 27–30 April, 2020, Porto, Portugal


2020 IEEE Global Engineering Education Conference (EDUCON)
Page 102

Authorized licensed use limited to: University of Vermont Libraries. Downloaded on July 26,2020 at 00:18:50 UTC from IEEE Xplore. Restrictions apply.
This certainly favors simple infrastructure. It was argued that we interpret the statements of the IPs, LA seems to have
if done well, technical services around transparency enable no specific technical requirements that do not also apply to
data subjects to investigate. The investigation might raise regular Big Data infrastructure. Additionally, the IPs explained
their confidence and enables them to engage more with LA. where to put the focus on when designing infrastructure
The same group of IPs, however, had also put forward some for learning. The crucial parts are capturing the semantics,
arguments against more transparency. One IP feared that the identifying the need to support from analyzing the data with
students would concentrate on targeting the metrics: the stakeholders, and presenting the results or an intervention
If you’re going to use any of these analytics for to the stakeholder at the right time. In our study, the IPs told us
grading. Then it’s immediately a big gamble. If about their diverse strategies used to design LA infrastructure.
you’re going to say, we’re going to use automated The strategies are dependent on the context and the use cases
systems that will say, how engaging your messages in which LA was done. We identified four design strategies:
are in discussions? How do you count engagement? experimental, custom application, data warehouse, and data
We just count the number of characters. Oh, really? lake design. Experimental LA designs are done to serve a
Okay. I’m just gonna randomly type. ... As soon specific use case or educational design. Therefore, the design
as people know this is how you measure it, by the can include any technology, software architecture, or data
number, then it becomes a bad measure because now format that fits the expertise of the team. Similar conditions
suddenly everybody will target to have that metric apply to LA performed as or within a particular application. At
satisfied. So then it becomes a bad metric. another scale is LA infrastructure based on a data warehouse
design. In this design strategy, data is acquired from various
This goes along with the argument of some IPs that students
data sources in one place in a highly structured way. The
should not see all their data because this might influence
benefit of a data warehouse is that the usage pattern feels
their behavior around LA. An analogous example mentioned
familiar to most IT staff. The issue with this design seems
was that doctors also do not reveal to their patients all the
to be the ETL processes feeding the data warehouse. Be-
diseases they suspect to be related to their symptoms. Some
cause of experiences with convoluted processes and corrupted
IPs even advise against implementing an extended amount of
data, some IPs promoted the co-creation of LA for the data
technical measures and notices about inspection possibilities
warehouse design strategy. However, the data warehouse can
and transparency into the user interfaces. Instead of raising the
only provide particular views on the collected data what also
user’s trust in the application, they argue, that such emphasis
limits the potential insights of LA. The fact that the data
might raise awareness of possible negative consequences.
they are working with is already pre-processed hampers, in
Therefore, such an effort might increase scrutiny and even
their opinion, the validity of their research. Therefore, some
anxiety towards LA.
IPs have been considering the data lake design as the most
An appealing aspect mentioned is the role of a trusted
effective strategy. A data lake can provide full access to the
third party. Such a trustee could generate trust if stakeholders
raw data without any restrictions on their LA design. This
do not fully grasp the processes of an institution for the
design might advance LA by proving “a source of truth”,
reasons given above, or the institution does not want to be
as one IP stated. Nevertheless, the architecture of data lakes
transparent to protect their intellectual property. An example
might be challenging for IT staff, while the benefits are clear
given for such a trustee was a certification authority that issues
to researchers. There were additional discussions about the
digital certificates. A trustee could inspect certain aspects of
usage of cloud computing and their impact on privacy, security,
infrastructure and certify the correctness and conscientiousness
and trust. Pearson et al. [23], for example, are suggesting
of those.
transferable approaches include addressing Data Security Mit-
At last, one aspect that was very important to the IPs and
igation by the fully homomorphic encryption scheme [24] and
was mentioned by them several times was the aspect of trust
Cross-Layer Interaction and Enforcement by machine-readable
in the principles of the institution:
policies via policy languages like XACML10 .
If you want to develop trust, it’s not only about The second reason why we conducted this study was to
developing agency and interaction, but people also understand the influence of data protection and privacy on the
need to understand sort of the underlying, if you like, design of LA infrastructure. There are two groups in the IPs.
principles or values that are used to inform certain One group did not want to invest in further technical privacy
recommendations or data collections, data storage, measures. On the one hand, they believed to act on legitimate
use of data, all these kind of things. interests. On the other hand, they were worried about the
consequences of further involving the data subjects. The other
V. D ISCUSSION
group sought to force the interaction of students with technical
The first reason why we conducted this study was to gain privacy measures. They wanted to engage the data subject in
insights into the strategies LA developers use to design and order to raise their agency. Experiment and custom application
implement LA infrastructure at an institutional level in higher designs are a closed system with clear objectives. Therefore,
education. The IPs stated that general Big Data infrastructure
is suitable to design institutional level LA infrastructure. As 10 https://www.oasis-open.org/standards#xacmlv3.0

978-1-7281-0930-5/20/$31.00 ©2020 IEEE 27–30 April, 2020, Porto, Portugal


2020 IEEE Global Engineering Education Conference (EDUCON)
Page 103

Authorized licensed use limited to: University of Vermont Libraries. Downloaded on July 26,2020 at 00:18:50 UTC from IEEE Xplore. Restrictions apply.
privacy regulations can be handled easier. In a data warehouse [2] T. Broos, K. Verbert, G. Langie, C. Van Soom, and T. De Laet, “Small
design identifying and fulfilling privacy regulations might be data as a conversation starter for learning analytics,” Journal of Research
in Innovative Teaching & Learning, vol. 10, no. 2, pp. 94–106, 2017.
not so hard to handle since data structure and processes are [3] D. Di Mitri, J. Schneider, M. Specht, and H. Drachsler, “From signals
straight and transparent from the perspective of the IT staff. to knowledge: A conceptual model for multimodal learning analytics,”
This does not seem to apply equally to a data lake design. Journal of Computer Assisted Learning, vol. 34, no. 4, pp. 338–349,
aug 2018. [Online]. Available: http://doi.wiley.com/10.1111/jcal.12288
The IPs mentioned several technical challenges, such as data [4] B. Kei and D. Editor, Big Data and Learning Analytics in Higher
identification, enforceability, and data ownership. An issue not Education, B. Kei Daniel, Ed. Cham: Springer International Publishing,
discussed was that of the implications of fulfilling the rights 2017. [Online]. Available: http://link.springer.com/10.1007/978-3-319-
06520-5
of the data subject. Singh and Cobbe [25], for example, argue [5] C. o. t. E. Union and E. Parliament, “Regulation (EU) 2016/679
that data controllers must also take into account all security of the European Parliament and of the Council of 27 April 2016
risks in fulfilling the rights of the data subject, in particular on the protection of natural persons with regard to the processing
of personal data and on the free movement of such data, and
concerning the disclosure of the technical infrastructure or the repealing Directive 95/46/EC (General Da,” Official Journal of the
controller’s organizational processes to data thieves. Research European Union, vol. L119, pp. 1–88, 2016. [Online]. Available:
conducted by the DEFeND-Project11 , in particular, has been https://eur-lex.europa.eu/eli/reg/2016/679/oj
[6] P. Johanes and C. Thille, “The heart of educational data infrastructures
working on the issue of designing a data protection by design - Conscious humanity and scientific responsibility, not infinite data and
platform for GDPR compliance. Piras et al. [26] are proposing limitless experimentation,” British Journal of Educational Technology,
the design of an architecture for a platform, which can reuse vol. 50, no. 6, pp. 2959–2973, nov 2019. [Online]. Available:
https://onlinelibrary.wiley.com/doi/abs/10.1111/bjet.12862
and integrate peculiarities of heterogeneous tools, and support [7] G.-P. Ciordas-Hertel, J. Schneider, S. Ternier, and H. Drachsler,
organizations in achieving GDPR compliance. “Adopting trust in learning analytics infrastructure: A structured
The third and last reason why we conducted this study was literature review,” Journal of Universal Computer Science,
vol. 25, no. 13, pp. 1668–1686, dec 2019. [Online]. Available:
the investigation of how technical measures might support the http://www.jucs.org/jucs 25 13/adopting trust in learning
adoption of LA. Firstly, the introduction of LA cannot be [8] R. Ferguson, T. Hoel, M. Scheffel, and H. Drachsler, “Guest editorial:
achieved by implementing technical measures alone. At the Ethics and privacy in learning analytics,” Journal of Learning
Analytics, vol. 3, no. 1, pp. 5–15, apr 2016. [Online]. Available:
social level, trust must be built between the various stakehold- http://epress.lib.uts.edu.au/journals/index.php/JLA/article/view/4912
ers in LA. Secondly, in order to raise engagement with LA, [9] H. Drachsler and W. Greller, “Privacy and analytics,” in Proceedings
the IPs promoted co-creation and direct engagement with LA. of the Sixth International Conference on Learning Analytics &
Knowledge - LAK ’16, vol. 25-29-Apri. New York, New
The direct feedback of the addressee about the correctness, York, USA: ACM Press, 2016, pp. 89–98. [Online]. Available:
usefulness, or comprehensibility of the LA process and the http://dl.acm.org/citation.cfm?doid=2883851.2883893
interventions could give LA a boost. For example, enabling [10] N. Sclater, “Developing a code of practice for learning analytics,”
Journal of Learning Analytics, pp. 16–42, apr 2016. [Online]. Available:
data subjects to label patterns of learning identified in the http://epress.lib.uts.edu.au/journals/index.php/JLA/article/view/4512
acquired data could be useful to improve the training data [11] P. Prinsloo and S. Slade, “Ethics and Learning Analytics: Charting
of prediction models. Thirdly, simplicity, and sophistication the (Un)Charted,” in Handbook of Learning Analytics. Society for
Learning Analytics Research (SoLAR), may 2017, pp. 49–57. [Online].
in the design of infrastructure increases confidence in the Available: https://solaresearch.org/hla-17/hla17-chapter4
results and enables comprehensibility. It can be challenging [12] K. Kitto and S. Knight, “Practical ethics for building
to disclose decision-making processes if they are opaque or learning analytics,” British Journal of Educational Technology,
vol. 50, no. 6, pp. 2855–2870, nov 2019. [Online]. Available:
even based on unfounded assumptions. Any infrastructure https://onlinelibrary.wiley.com/doi/abs/10.1111/bjet.12868
is vulnerable to accumulate technical debt over time, which [13] S. Slade, P. Prinsloo, and M. Khalil, “Learning analytics at
ultimately drives to convoluted processes [27]. Thirdly, where the intersections of student trust, disclosure and benefit,” in
Proceedings of the 9th International Conference on Learning
full transparency is not possible or desirable, or where the Analytics & Knowledge - LAK19. New York, New York,
institution faces problems with its reputation, a trustee could USA: ACM Press, 2019, pp. 235–244. [Online]. Available:
enable and consolidate trust through the vouching mechanism. http://dl.acm.org/citation.cfm?doid=3303772.3303796
[14] T. Hoel, D. Griffiths, and W. Chen, “The Influence of Data Protection
Finally, as so many IPs have stressed, when it is not clear and Privacy Frameworks on the Design of Learning Analytics
to data subjects why their personal data is requested, or how Systems,” in Proceedings of the Seventh International Learning
and by whom it is processed, this lack of control and visibility Analytics & Knowledge Conference on - LAK ’17. New York, New
York, USA: ACM Press, 2017, pp. 243–252. [Online]. Available:
of the institutions LA could lead to suspicion and ultimately http://dl.acm.org/citation.cfm?doid=3027385.3027414
distrust. As a critical aspect of trust is reputation, the basis of [15] T. Hoel and W. Chen, “Privacy and data protection in learning
every relationship in education is not only one of the technical analytics should be motivated by an educational maxim —
Towards a proposal,” Research and Practice in Technology Enhanced
measures but one of the principles. Learning, vol. 13, no. 1, p. 20, dec 2018. [Online]. Available:
https://telrp.springeropen.com/articles/10.1186/s41039-018-0086-8
R EFERENCES [16] D. Gašević, S. Dawson, and J. Jovanović, “Ethics and privacy as
enablers of learning analytics.” Journal of Learning Analytics,
[1] D. Gasevic, G. Siemens, and C. P. Rose, “Guest Editorial: Special vol. 3, no. 1, pp. 1–4, apr 2016. [Online]. Available:
Section on Learning Analytics,” IEEE Transactions on Learning http://epress.lib.uts.edu.au/journals/index.php/JLA/article/view/4956
Technologies, vol. 10, no. 1, pp. 3–5, jan 2017. [Online]. Available: [17] Y.-S. Tsai and D. Gasevic, “Learning analytics in higher education -
http://ieeexplore.ieee.org/document/7880729/ Challenges and policies,” in Proceedings of the Seventh International
Learning Analytics & Knowledge Conference on - LAK ’17. New
York, New York, USA: ACM Press, 2017, pp. 233–242. [Online].
11 https://www.defendproject.eu Available: http://dl.acm.org/citation.cfm?doid=3027385.3027400

978-1-7281-0930-5/20/$31.00 ©2020 IEEE 27–30 April, 2020, Porto, Portugal


2020 IEEE Global Engineering Education Conference (EDUCON)
Page 104

Authorized licensed use limited to: University of Vermont Libraries. Downloaded on July 26,2020 at 00:18:50 UTC from IEEE Xplore. Restrictions apply.
[18] J. Lester, C. Klein, H. Rangwala, and A. Johri, “Learning
Analytics in Higher Education,” ASHE Higher Education Report,
vol. 43, no. 5, pp. 9–135, dec 2017. [Online]. Available:
http://doi.wiley.com/10.1002/aehe.20121
[19] S. J. Taylor, R. Bogdan, and M. DeVault, Introduction to qualitative
research methods: A guidebook and resource, 3rd ed. Hoboken, NJ,
US: John Wiley & Sons Inc, 2015.
[20] J. Corbin and A. Strauss, Basics of Qualitative Research: Techniques
and Procedures for Developing Grounded Theory, 4th ed. SAGE
Publications, 2015.
[21] J. Saldaña, The Coding Manual for Qualitative Researchers, 2nd ed.,
J. Seaman, Ed. London: SAGE Publications, 2013. [Online]. Available:
www.sagepublications.com
[22] E. Curry, “The Big Data Value Chain: Definitions, Concepts,
and Theoretical Approaches,” in New Horizons for a Data-
Driven Economy: A Roadmap for Usage and Exploitation of
Big Data in Europe, J. M. Cavanillas, E. Curry, and W. Wahlster,
Eds. Cham: Springer International Publishing, 2016, pp. 29–
37. [Online]. Available: https://doi.org/10.1007/978-3-319-21569-3 3
http://link.springer.com/10.1007/978-3-319-21569-3 3
[23] S. Pearson and A. Benameur, “Privacy, Security and Trust
Issues Arising from Cloud Computing,” in 2010 IEEE Second
International Conference on Cloud Computing Technology and
Science. IEEE, nov 2010, pp. 693–702. [Online]. Available:
http://ieeexplore.ieee.org/document/5708519/
[24] C. Gentry, “Fully homomorphic encryption using ideal lattices,” in
Proceedings of the 41st annual ACM symposium on Symposium
on theory of computing - STOC ’09. New York, New
York, USA: ACM Press, 2009, p. 169. [Online]. Available:
http://portal.acm.org/citation.cfm?doid=1536414.1536440
[25] J. Singh and J. Cobbe, “The Security Implications of Data Subject
Rights,” IEEE Security & Privacy, vol. 17, no. 6, pp. 21–30, nov 2019.
[Online]. Available: https://ieeexplore.ieee.org/document/8755390/
[26] L. Piras, M. G. Al-Obeidallah, A. Praitano, A. Tsohou, H. Mouratidis,
B. Gallego-Nicasio Crespo, J. B. Bernard, M. Fiorani, E. Magkos,
A. C. Sanz, M. Pavlidis, R. D’Addario, and G. G. Zorzino,
“DEFeND Architecture: A Privacy by Design Platform for GDPR
Compliance,” in Trust, Privacy and Security in Digital Business,
ser. Lecture Notes in Computer Science, S. Gritzalis, E. R. Weippl,
S. K. Katsikas, G. Anderst-Kotsis, A. M. Tjoa, and I. Khalil, Eds.
Cham: Springer International Publishing, 2019, vol. 11711, pp. 78–93.
[Online]. Available: http://link.springer.com/10.1007/978-3-030-27813-
7 http://link.springer.com/10.1007/978-3-030-27813-7 6
[27] Z. Li, P. Avgeriou, and P. Liang, “A systematic mapping study
on technical debt and its management,” Journal of Systems and
Software, vol. 101, pp. 193–220, mar 2015. [Online]. Available:
https://linkinghub.elsevier.com/retrieve/pii/S0164121214002854

978-1-7281-0930-5/20/$31.00 ©2020 IEEE 27–30 April, 2020, Porto, Portugal


2020 IEEE Global Engineering Education Conference (EDUCON)
Page 105

Authorized licensed use limited to: University of Vermont Libraries. Downloaded on July 26,2020 at 00:18:50 UTC from IEEE Xplore. Restrictions apply.

You might also like