SlideShare a Scribd company logo
AVOIDING INVASIVE SURVEILLANCE, ENSURING TRUST: UNED’S
VIRTUAL EXAMINATION HALL (AVEX)
José L. Aznarte
14/06/2022
OUTLINE
About me
About my institution: UNED
Ethical framework for the use of data-based technologies
Assessment under COVID19
1/23
ABOUT ME
TEACHING AND RESEARCH
• I’m ”profesor titular” at the Artificial Intelligence Department of UNED.
• I teach Data Mining and Machine Learning in master’s level.
• I also supervise PhD students and master’s theses.
• My main research line:
• Time series forecasting with deep learning & statistics
• Applied to common/shared problems: air quality, traffic intensity, epidemic
propagation…
• I coordinate some R&D projects:
• SOCAIRE (Municipality of Madrid)
• PreCoV2.org (Ministry of Health)
• Chair EMT/UNED for Air Quality and Sustainable Mobility
2/23
SERVICE AT RECTORATE
• Appointed in 2019 as deputy vicerector in charge of digitalisation and
innovation.
• Co-leading the ED3 institutional project (”Digital, Distant and Data-powered
Education”).
• Interface with IT department.
3/23
SERVICE AT RECTORATE
• Appointed in 2019 as deputy vicerector in charge of digitalisation and
innovation.
• Co-leading the ED3 institutional project (”Digital, Distant and Data-powered
Education”).
• Interface with IT department.
Actually…
3/23
SERVICE AT RECTORATE
• Appointed in 2019 as deputy vicerector in charge of digitalisation and
innovation.
• Co-leading the ED3 institutional project (”Digital, Distant and Data-powered
Education”).
• Interface with IT department.
Actually…
Many doubts about the use of AI tools for dealing with people’s data.
3/23
ABOUT MY INSTITUTION: UNED
GENERAL INFORMATION
”National Distance Learning University” – UNED
• One of the biggest universities in Europe (>150.000 students)
• Founded 50 years ago (no digitalization)
• Mixed remote and face-to-face model:
• Network of regional centers (>50)
• Remote teaching during the course
• F2F exams
• Wide range of different student situations. Mostly not ”freshers” coming from
high-school.
4/23
ED3: DISTANT, DIGITAL AND DATA-POWERED EDUCATION (2019)
5/23
ED3: DISTANT, DIGITAL AND DATA-POWERED EDUCATION (2019)
«Develop a framework for evidence-based interventions to improve
teaching/learning processes through response-able exploitation of data.
• Policies which guarantee that use of data takes into account potential social
and ethical consequences.
• Identify, gather, curate and make accesible all the data sources related with
teaching/learning processes, with different access rights for each profile.
• Analize data and prepare them for knowledge creation through exploratory
analysis and operational models.
• Promote interventions over teaching/learning processes based on evidences
resulting from data and the knowledge of the different stakeholders».
5/23
ETHICAL FRAMEWORK FOR THE USE OF
DATA-BASED TECHNOLOGIES
PARTICIPATORY PROCESS
• First things first: we needed a shared ethical common sense, which goes
beyond regulation, about what happens with data and how can we extract
value from it.
• We carried out a participatory process, open to the entire UNED community,
to agree upon a series of cautions that should be taken into account when
using data-based technologies.
6/23
PARTICIPATORY PROCESS
• First things first: we needed a shared ethical common sense, which goes
beyond regulation, about what happens with data and how can we extract
value from it.
• We carried out a participatory process, open to the entire UNED community,
to agree upon a series of cautions that should be taken into account when
using data-based technologies.
• Open during 2 months in 2020, >2.500 people participated.
• Used the ”Decidim” participatory software.
6/23
PARTICIPATORY PROCESS
• First things first: we needed a shared ethical common sense, which goes
beyond regulation, about what happens with data and how can we extract
value from it.
• We carried out a participatory process, open to the entire UNED community,
to agree upon a series of cautions that should be taken into account when
using data-based technologies.
• Open during 2 months in 2020, >2.500 people participated.
• Used the ”Decidim” participatory software.
• 9 basic cautions were proposed by the rectorate.
• During the process, these were rearranged in terms of the community’s
perception of their importance and new 4 with high support were added to
the document. 6/23
OUTCOME
An official document encoding a set of 13 cautions for the use of data-based
technologies, related with:
• care
• response-ability
• transparency
• consent
• property & control
• validity and trust
• participation
• privacy
• preventing potential adverse
impacts
• effective communication
• adaptability
• right to explanations
7/23
Then…
8/23
Then… COVID19! :(
8/23
ASSESSMENT UNDER COVID19
PRE-COVID19 EXAMINATION PROCEDURE
9/23
PRE-COVID19 EXAMINATION PROCEDURE
• Students choose one of two alternative dates and go to a regional center to
undertake an exam.
• Exams take place synchronously in halls and are invigilated by ad-hoc teams
of faculty staff.
• Students might be required to leave bagpacks, purses and other material
before entering the hall.
• Exams are scanned upon hand-over, gathered in a centralized computer
system and distributed to each course’s team.
9/23
AVEX: VIRTUAL EXAMINATION HALL
We needed a tool to reproduce the conditions of usual examination under
lockdown:
• Synchronous questionnaire distribution and response management.
• Variety of exam types (test, essay, math…).
• Proper identification of students.
• Anti-fraud measures.
10/23
AVEX: VIRTUAL EXAMINATION HALL
We needed a tool to reproduce the conditions of usual examination under
lockdown:
• Synchronous questionnaire distribution and response management.
• Variety of exam types (test, essay, math…).
• Proper identification of students.
• Anti-fraud measures.
These measures must be non-invasive (at least no more than exam halls).
10/23
AVEX: VIRTUAL EXAMINATION HALL
We needed a tool to reproduce the conditions of usual examination under
lockdown:
• Synchronous questionnaire distribution and response management.
• Variety of exam types (test, essay, math…).
• Proper identification of students.
• Anti-fraud measures.
These measures must be non-invasive (at least no more than exam halls).
Q: Can we delegate exam invigilation to an AI?
10/23
FACIAL RECOGNITION TECHNOLOGIES (FRT) IN EDUCATION
• First step: study the risks of facial recognition technologies for exam
invigilation.
• Facial recognition systems applied to surveillance are expanding.
• There are mounting evidences that these technologies can be problematic:
technical, legal and ethical difficulties.
11/23
RISKS OF FACIAL RECOGNITION TECHNOLOGIES
1. There is no clear legal framework for invasive surveillance technologies.
12/23
RISKS OF FACIAL RECOGNITION TECHNOLOGIES
1. There is no clear legal framework for invasive surveillance technologies.
1. The use of FRT might imply a violation of the legal principles of necessity and
proportionality.
12/23
RISKS OF FACIAL RECOGNITION TECHNOLOGIES
1. There is no clear legal framework for invasive surveillance technologies.
1. The use of FRT might imply a violation of the legal principles of necessity and
proportionality.
1. FRT can violate privacity rights.
12/23
RISKS OF FACIAL RECOGNITION TECHNOLOGIES
1. There is no clear legal framework for invasive surveillance technologies.
1. The use of FRT might imply a violation of the legal principles of necessity and
proportionality.
1. FRT can violate privacity rights.
1. FRT are naturally imprecise, and its software is fallible.
12/23
RISKS OF FACIAL RECOGNITION TECHNOLOGIES
1. There is no clear legal framework for invasive surveillance technologies.
1. The use of FRT might imply a violation of the legal principles of necessity and
proportionality.
1. FRT can violate privacity rights.
1. FRT are naturally imprecise, and its software is fallible.
1. FRT can produce automatization bias.
12/23
RISKS OF FACIAL RECOGNITION TECHNOLOGIES
1. There is no clear legal framework for invasive surveillance technologies.
1. The use of FRT might imply a violation of the legal principles of necessity and
proportionality.
1. FRT can violate privacity rights.
1. FRT are naturally imprecise, and its software is fallible.
1. FRT can produce automatization bias.
1. FRT can produce discriminations and violations of the equality principle.
12/23
RISKS OF FACIAL RECOGNITION TECHNOLOGIES
1. There is no clear legal framework for invasive surveillance technologies.
1. The use of FRT might imply a violation of the legal principles of necessity and
proportionality.
1. FRT can violate privacity rights.
1. FRT are naturally imprecise, and its software is fallible.
1. FRT can produce automatization bias.
1. FRT can produce discriminations and violations of the equality principle.
1. FRT can generate discriminations based on different functional abilities.
12/23
FACIAL RECOGNITION TECHNOLOGIES IN EDUCATION
13/23
AVEX: VIRTUAL EXAMINATION HALL
14/23
AVEX: VIRTUAL EXAMINATION HALL
• We underwent express development of our own technological solution: AvEx.
• In less than 6 weeks, first version operational.
• In first exam call, over 400.000 exams with few issues (~1%).
14/23
SECURITY MEASURES
Layered security scheme:
• Wide question banks
• Reasoning-based questions
• Open-book exams
• Tight timing per question
15/23
SECURITY MEASURES
Layered security scheme:
• Wide question banks
• Reasoning-based questions
• Open-book exams
• Tight timing per question
• Randomization of q&a
• Sequential access
• Copy/paste disabled
• Random photographs
15/23
SECURITY MEASURES
Layered security scheme:
• Wide question banks
• Reasoning-based questions
• Open-book exams
• Tight timing per question
• Randomization of q&a
• Sequential access
• Copy/paste disabled
• Random photographs
• Sworn affidavit
• Plagiarism: text similarities
• Phone interview after the exam
15/23
SECURITY MEASURES
Layered security scheme:
• Wide question banks
• Reasoning-based questions
• Open-book exams
• Tight timing per question
• Randomization of q&a
• Sequential access
• Copy/paste disabled
• Random photographs
• Sworn affidavit
• Plagiarism: text similarities
• Phone interview after the exam
15/23
RESULTS (I)
First analysis (after 2 exam calls):
16/23
RESULTS (I)
First analysis (after 2 exam calls):
• Amount of exams: ↑~20% (of courses)
• Pass marks: ↑~40%
• Average marks: ↑~50%
• Remote sessions attendance: ↑~300%
• Disciplinary issues: ↑
16/23
RESULTS (II)
17/23
RESULTS (III)
18/23
RESULTS (IV)
19/23
DISCUSSION
What do these results mean? Is the system less secure?
20/23
DISCUSSION
What do these results mean? Is the system less secure?
Hypotheses:
• More time to study in lockdown
• Changes in the assessment design and criteria
• More continuous evaluation
• Easier to attend exams
• Fraud?
20/23
STUDENT SATISFACTION
• 86% of students declares negative impacts of lockdown in study.
• 40% link it to mood status
• Students declare more difficulties to study:
• 54% due to work-related issues
• 35% due to illness
• 20% less time
21/23
STUDENT SATISFACTION
• 86% of students declares negative impacts of lockdown in study.
• 40% link it to mood status
• Students declare more difficulties to study:
• 54% due to work-related issues
• 35% due to illness
• 20% less time
• Elements hitting on performance:
21/23
STUDENT SATISFACTION
• Academic results:
• 50% similar, 25% better or much better
• 70% identify some positive element (more time, more motivation…)
22/23
STUDENT SATISFACTION
• Academic results:
• 50% similar, 25% better or much better
• 70% identify some positive element (more time, more motivation…)
• 67% is happy or very happy with AvEx
• Most students appreciate the efforts of UNED
• Young people have worse oppinion
22/23
STUDENT SATISFACTION
Privacy protection is enabled under AvEx:
23/23
THANKS!
jlaznarte@dia.uned.es 23/23

More Related Content

Similar to Avoiding Invasive Surveillance, Ensuring Trust: ENSURING TRUST UNED’S AvEx

UN Singapore Cyber Programme 15 july19
UN Singapore Cyber Programme 15 july19UN Singapore Cyber Programme 15 july19
UN Singapore Cyber Programme 15 july19
consultancyss
 
Privacy and Security guidelines for Humanitarian Work with Undocumented Migrants
Privacy and Security guidelines for Humanitarian Work with Undocumented MigrantsPrivacy and Security guidelines for Humanitarian Work with Undocumented Migrants
Privacy and Security guidelines for Humanitarian Work with Undocumented Migrants
Sara Vannini
 
e-SIDES workshop at BDV Meet-Up, Sofia 14/05/2018
e-SIDES workshop at BDV Meet-Up, Sofia 14/05/2018e-SIDES workshop at BDV Meet-Up, Sofia 14/05/2018
e-SIDES workshop at BDV Meet-Up, Sofia 14/05/2018
e-SIDES.eu
 
Responsible Data for Children Training_PublicSlides_110922.pdf
Responsible Data for Children Training_PublicSlides_110922.pdfResponsible Data for Children Training_PublicSlides_110922.pdf
Responsible Data for Children Training_PublicSlides_110922.pdf
Stefaan Verhulst
 
UNISDR Scientific and Technical Advisory Group (STAG) Platform and Network Su...
UNISDR Scientific and Technical Advisory Group (STAG) Platform and Network Su...UNISDR Scientific and Technical Advisory Group (STAG) Platform and Network Su...
UNISDR Scientific and Technical Advisory Group (STAG) Platform and Network Su...
Global Risk Forum GRFDavos
 
National Strategies against Cyber Attacks - Philip Victor
National Strategies against Cyber Attacks - Philip VictorNational Strategies against Cyber Attacks - Philip Victor
National Strategies against Cyber Attacks - Philip Victor
Knowledge Group
 
Digital Competence framework for citizens (DIGCOMP )
Digital Competence framework for citizens (DIGCOMP )Digital Competence framework for citizens (DIGCOMP )
Digital Competence framework for citizens (DIGCOMP )
Riina Vuorikari
 
Usages of ICT : A user-oriented innovation process
Usages of ICT : A user-oriented innovation processUsages of ICT : A user-oriented innovation process
Usages of ICT : A user-oriented innovation processM@rsouin
 
Bl cybersecurity z_dooly
Bl cybersecurity z_doolyBl cybersecurity z_dooly
Bl cybersecurity z_dooly
zdooly
 
Information Security Management in University Campus Using Cognitive Security
Information Security Management in University Campus Using Cognitive SecurityInformation Security Management in University Campus Using Cognitive Security
Information Security Management in University Campus Using Cognitive Security
CSCJournals
 
Locus Charter Presentation
Locus Charter Presentation Locus Charter Presentation
Locus Charter Presentation
Suchith Anand
 
Teacher networks, teacher digital competence and professional development
Teacher networks, teacher digital competence and professional developmentTeacher networks, teacher digital competence and professional development
Teacher networks, teacher digital competence and professional development
Riina Vuorikari
 
Public deck
Public deckPublic deck
Public deck
Michael Klein
 
Creating a new culture around authenticity and generative AI
Creating a new culture around authenticity and generative AICreating a new culture around authenticity and generative AI
Creating a new culture around authenticity and generative AI
Charles Darwin University
 
Arief Karfianto - Proposed Security Model for Protecting Patients Data in Ele...
Arief Karfianto - Proposed Security Model for Protecting Patients Data in Ele...Arief Karfianto - Proposed Security Model for Protecting Patients Data in Ele...
Arief Karfianto - Proposed Security Model for Protecting Patients Data in Ele...
idsecconf
 
Privacy, Accountability and Trust Privacy, Accountability and Trust Privacy, ...
Privacy, Accountability and Trust Privacy, Accountability and Trust Privacy, ...Privacy, Accountability and Trust Privacy, Accountability and Trust Privacy, ...
Privacy, Accountability and Trust Privacy, Accountability and Trust Privacy, ...Karlos Svoboda
 
Overview of national cybercrime strategies
Overview of national cybercrime strategiesOverview of national cybercrime strategies
Overview of national cybercrime strategies
Benjamin Ang
 
David Winickoff, Session 1
David Winickoff, Session 1David Winickoff, Session 1
David Winickoff, Session 1
OECD Governance
 
Project Access Control ProposalPurposeThis course project i.docx
Project Access Control ProposalPurposeThis course project i.docxProject Access Control ProposalPurposeThis course project i.docx
Project Access Control ProposalPurposeThis course project i.docx
stilliegeorgiana
 
Trucano saber-ict - hdne drecording - 20-dec2011
Trucano   saber-ict - hdne drecording - 20-dec2011Trucano   saber-ict - hdne drecording - 20-dec2011
Trucano saber-ict - hdne drecording - 20-dec2011Valeria Kelly
 

Similar to Avoiding Invasive Surveillance, Ensuring Trust: ENSURING TRUST UNED’S AvEx (20)

UN Singapore Cyber Programme 15 july19
UN Singapore Cyber Programme 15 july19UN Singapore Cyber Programme 15 july19
UN Singapore Cyber Programme 15 july19
 
Privacy and Security guidelines for Humanitarian Work with Undocumented Migrants
Privacy and Security guidelines for Humanitarian Work with Undocumented MigrantsPrivacy and Security guidelines for Humanitarian Work with Undocumented Migrants
Privacy and Security guidelines for Humanitarian Work with Undocumented Migrants
 
e-SIDES workshop at BDV Meet-Up, Sofia 14/05/2018
e-SIDES workshop at BDV Meet-Up, Sofia 14/05/2018e-SIDES workshop at BDV Meet-Up, Sofia 14/05/2018
e-SIDES workshop at BDV Meet-Up, Sofia 14/05/2018
 
Responsible Data for Children Training_PublicSlides_110922.pdf
Responsible Data for Children Training_PublicSlides_110922.pdfResponsible Data for Children Training_PublicSlides_110922.pdf
Responsible Data for Children Training_PublicSlides_110922.pdf
 
UNISDR Scientific and Technical Advisory Group (STAG) Platform and Network Su...
UNISDR Scientific and Technical Advisory Group (STAG) Platform and Network Su...UNISDR Scientific and Technical Advisory Group (STAG) Platform and Network Su...
UNISDR Scientific and Technical Advisory Group (STAG) Platform and Network Su...
 
National Strategies against Cyber Attacks - Philip Victor
National Strategies against Cyber Attacks - Philip VictorNational Strategies against Cyber Attacks - Philip Victor
National Strategies against Cyber Attacks - Philip Victor
 
Digital Competence framework for citizens (DIGCOMP )
Digital Competence framework for citizens (DIGCOMP )Digital Competence framework for citizens (DIGCOMP )
Digital Competence framework for citizens (DIGCOMP )
 
Usages of ICT : A user-oriented innovation process
Usages of ICT : A user-oriented innovation processUsages of ICT : A user-oriented innovation process
Usages of ICT : A user-oriented innovation process
 
Bl cybersecurity z_dooly
Bl cybersecurity z_doolyBl cybersecurity z_dooly
Bl cybersecurity z_dooly
 
Information Security Management in University Campus Using Cognitive Security
Information Security Management in University Campus Using Cognitive SecurityInformation Security Management in University Campus Using Cognitive Security
Information Security Management in University Campus Using Cognitive Security
 
Locus Charter Presentation
Locus Charter Presentation Locus Charter Presentation
Locus Charter Presentation
 
Teacher networks, teacher digital competence and professional development
Teacher networks, teacher digital competence and professional developmentTeacher networks, teacher digital competence and professional development
Teacher networks, teacher digital competence and professional development
 
Public deck
Public deckPublic deck
Public deck
 
Creating a new culture around authenticity and generative AI
Creating a new culture around authenticity and generative AICreating a new culture around authenticity and generative AI
Creating a new culture around authenticity and generative AI
 
Arief Karfianto - Proposed Security Model for Protecting Patients Data in Ele...
Arief Karfianto - Proposed Security Model for Protecting Patients Data in Ele...Arief Karfianto - Proposed Security Model for Protecting Patients Data in Ele...
Arief Karfianto - Proposed Security Model for Protecting Patients Data in Ele...
 
Privacy, Accountability and Trust Privacy, Accountability and Trust Privacy, ...
Privacy, Accountability and Trust Privacy, Accountability and Trust Privacy, ...Privacy, Accountability and Trust Privacy, Accountability and Trust Privacy, ...
Privacy, Accountability and Trust Privacy, Accountability and Trust Privacy, ...
 
Overview of national cybercrime strategies
Overview of national cybercrime strategiesOverview of national cybercrime strategies
Overview of national cybercrime strategies
 
David Winickoff, Session 1
David Winickoff, Session 1David Winickoff, Session 1
David Winickoff, Session 1
 
Project Access Control ProposalPurposeThis course project i.docx
Project Access Control ProposalPurposeThis course project i.docxProject Access Control ProposalPurposeThis course project i.docx
Project Access Control ProposalPurposeThis course project i.docx
 
Trucano saber-ict - hdne drecording - 20-dec2011
Trucano   saber-ict - hdne drecording - 20-dec2011Trucano   saber-ict - hdne drecording - 20-dec2011
Trucano saber-ict - hdne drecording - 20-dec2011
 

More from EADTU

Communication and Marketing at Bifröst - Helga Guðrún Jónasdóttir
Communication and Marketing at Bifröst - Helga Guðrún JónasdóttirCommunication and Marketing at Bifröst - Helga Guðrún Jónasdóttir
Communication and Marketing at Bifröst - Helga Guðrún Jónasdóttir
EADTU
 
UNINETTUNO Plus+ Mobility - Asiye Yimamu
UNINETTUNO Plus+ Mobility - Asiye YimamuUNINETTUNO Plus+ Mobility - Asiye Yimamu
UNINETTUNO Plus+ Mobility - Asiye Yimamu
EADTU
 
Retention and Student Services at Open Universiteit – Nanda Boers
Retention and Student Services at Open Universiteit – Nanda BoersRetention and Student Services at Open Universiteit – Nanda Boers
Retention and Student Services at Open Universiteit – Nanda Boers
EADTU
 
Workshop AI use for Staff - Caroline Berger-Konen, Bettina Ötvös, Silke Wrede
Workshop AI use for Staff - Caroline Berger-Konen, Bettina Ötvös, Silke WredeWorkshop AI use for Staff - Caroline Berger-Konen, Bettina Ötvös, Silke Wrede
Workshop AI use for Staff - Caroline Berger-Konen, Bettina Ötvös, Silke Wrede
EADTU
 
Marketing and communications at JYUOpen – Anni Karhunen
Marketing and communications at JYUOpen – Anni KarhunenMarketing and communications at JYUOpen – Anni Karhunen
Marketing and communications at JYUOpen – Anni Karhunen
EADTU
 
Communications and Public Relations at theFernUniversitätin Hagen
Communications and Public Relations at theFernUniversitätin HagenCommunications and Public Relations at theFernUniversitätin Hagen
Communications and Public Relations at theFernUniversitätin Hagen
EADTU
 
Internationalisation at the FernUniversität
Internationalisation at the FernUniversitätInternationalisation at the FernUniversität
Internationalisation at the FernUniversität
EADTU
 
General Introduction on the FernUniversität in Hagen.pptx
General Introduction on the FernUniversität in Hagen.pptxGeneral Introduction on the FernUniversität in Hagen.pptx
General Introduction on the FernUniversität in Hagen.pptx
EADTU
 
Retention and Student Services at UniDistance - Céline Pellissier
Retention and Student Services at UniDistance - Céline PellissierRetention and Student Services at UniDistance - Céline Pellissier
Retention and Student Services at UniDistance - Céline Pellissier
EADTU
 
Retention and Student Services at Téluq - Annie Breton and Francois Ouelette
Retention and Student Services at Téluq - Annie Breton and Francois OueletteRetention and Student Services at Téluq - Annie Breton and Francois Ouelette
Retention and Student Services at Téluq - Annie Breton and Francois Ouelette
EADTU
 
Results of the EADTU Task Force on Retention and Student Services - George Ub...
Results of the EADTU Task Force on Retention and Student Services - George Ub...Results of the EADTU Task Force on Retention and Student Services - George Ub...
Results of the EADTU Task Force on Retention and Student Services - George Ub...
EADTU
 
e-Sealing at EADTU by Kamakshi Rajagopal
e-Sealing at EADTU by Kamakshi Rajagopale-Sealing at EADTU by Kamakshi Rajagopal
e-Sealing at EADTU by Kamakshi Rajagopal
EADTU
 
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
EADTU
 
Retention in Open and Distance Education - Andre BIederbeck
Retention in Open and Distance Education - Andre BIederbeckRetention in Open and Distance Education - Andre BIederbeck
Retention in Open and Distance Education - Andre BIederbeck
EADTU
 
Towards Personalised Education - Roland Ettema and Zuzanna Glogowska
Towards Personalised Education - Roland Ettema and Zuzanna GlogowskaTowards Personalised Education - Roland Ettema and Zuzanna Glogowska
Towards Personalised Education - Roland Ettema and Zuzanna Glogowska
EADTU
 
Personalisation of Education by AI and Big Data - Lourdes Guàrdia
Personalisation of Education by AI and Big Data - Lourdes GuàrdiaPersonalisation of Education by AI and Big Data - Lourdes Guàrdia
Personalisation of Education by AI and Big Data - Lourdes Guàrdia
EADTU
 
Student and staff mental wellbeing- Kate Lister.pptx
Student and staff mental wellbeing- Kate Lister.pptxStudent and staff mental wellbeing- Kate Lister.pptx
Student and staff mental wellbeing- Kate Lister.pptx
EADTU
 
ENCORE Workshop Webinar 26 February 2024
ENCORE Workshop Webinar 26 February 2024ENCORE Workshop Webinar 26 February 2024
ENCORE Workshop Webinar 26 February 2024
EADTU
 
Mobility opportunities with Erasmus+ (action line KA171 & KA171) - Larissa Sl...
Mobility opportunities with Erasmus+ (action line KA171 & KA171) - Larissa Sl...Mobility opportunities with Erasmus+ (action line KA171 & KA171) - Larissa Sl...
Mobility opportunities with Erasmus+ (action line KA171 & KA171) - Larissa Sl...
EADTU
 
Overcoming Barriers to Online Engagement through carefull design and delivery...
Overcoming Barriers to Online Engagement through carefull design and delivery...Overcoming Barriers to Online Engagement through carefull design and delivery...
Overcoming Barriers to Online Engagement through carefull design and delivery...
EADTU
 

More from EADTU (20)

Communication and Marketing at Bifröst - Helga Guðrún Jónasdóttir
Communication and Marketing at Bifröst - Helga Guðrún JónasdóttirCommunication and Marketing at Bifröst - Helga Guðrún Jónasdóttir
Communication and Marketing at Bifröst - Helga Guðrún Jónasdóttir
 
UNINETTUNO Plus+ Mobility - Asiye Yimamu
UNINETTUNO Plus+ Mobility - Asiye YimamuUNINETTUNO Plus+ Mobility - Asiye Yimamu
UNINETTUNO Plus+ Mobility - Asiye Yimamu
 
Retention and Student Services at Open Universiteit – Nanda Boers
Retention and Student Services at Open Universiteit – Nanda BoersRetention and Student Services at Open Universiteit – Nanda Boers
Retention and Student Services at Open Universiteit – Nanda Boers
 
Workshop AI use for Staff - Caroline Berger-Konen, Bettina Ötvös, Silke Wrede
Workshop AI use for Staff - Caroline Berger-Konen, Bettina Ötvös, Silke WredeWorkshop AI use for Staff - Caroline Berger-Konen, Bettina Ötvös, Silke Wrede
Workshop AI use for Staff - Caroline Berger-Konen, Bettina Ötvös, Silke Wrede
 
Marketing and communications at JYUOpen – Anni Karhunen
Marketing and communications at JYUOpen – Anni KarhunenMarketing and communications at JYUOpen – Anni Karhunen
Marketing and communications at JYUOpen – Anni Karhunen
 
Communications and Public Relations at theFernUniversitätin Hagen
Communications and Public Relations at theFernUniversitätin HagenCommunications and Public Relations at theFernUniversitätin Hagen
Communications and Public Relations at theFernUniversitätin Hagen
 
Internationalisation at the FernUniversität
Internationalisation at the FernUniversitätInternationalisation at the FernUniversität
Internationalisation at the FernUniversität
 
General Introduction on the FernUniversität in Hagen.pptx
General Introduction on the FernUniversität in Hagen.pptxGeneral Introduction on the FernUniversität in Hagen.pptx
General Introduction on the FernUniversität in Hagen.pptx
 
Retention and Student Services at UniDistance - Céline Pellissier
Retention and Student Services at UniDistance - Céline PellissierRetention and Student Services at UniDistance - Céline Pellissier
Retention and Student Services at UniDistance - Céline Pellissier
 
Retention and Student Services at Téluq - Annie Breton and Francois Ouelette
Retention and Student Services at Téluq - Annie Breton and Francois OueletteRetention and Student Services at Téluq - Annie Breton and Francois Ouelette
Retention and Student Services at Téluq - Annie Breton and Francois Ouelette
 
Results of the EADTU Task Force on Retention and Student Services - George Ub...
Results of the EADTU Task Force on Retention and Student Services - George Ub...Results of the EADTU Task Force on Retention and Student Services - George Ub...
Results of the EADTU Task Force on Retention and Student Services - George Ub...
 
e-Sealing at EADTU by Kamakshi Rajagopal
e-Sealing at EADTU by Kamakshi Rajagopale-Sealing at EADTU by Kamakshi Rajagopal
e-Sealing at EADTU by Kamakshi Rajagopal
 
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
 
Retention in Open and Distance Education - Andre BIederbeck
Retention in Open and Distance Education - Andre BIederbeckRetention in Open and Distance Education - Andre BIederbeck
Retention in Open and Distance Education - Andre BIederbeck
 
Towards Personalised Education - Roland Ettema and Zuzanna Glogowska
Towards Personalised Education - Roland Ettema and Zuzanna GlogowskaTowards Personalised Education - Roland Ettema and Zuzanna Glogowska
Towards Personalised Education - Roland Ettema and Zuzanna Glogowska
 
Personalisation of Education by AI and Big Data - Lourdes Guàrdia
Personalisation of Education by AI and Big Data - Lourdes GuàrdiaPersonalisation of Education by AI and Big Data - Lourdes Guàrdia
Personalisation of Education by AI and Big Data - Lourdes Guàrdia
 
Student and staff mental wellbeing- Kate Lister.pptx
Student and staff mental wellbeing- Kate Lister.pptxStudent and staff mental wellbeing- Kate Lister.pptx
Student and staff mental wellbeing- Kate Lister.pptx
 
ENCORE Workshop Webinar 26 February 2024
ENCORE Workshop Webinar 26 February 2024ENCORE Workshop Webinar 26 February 2024
ENCORE Workshop Webinar 26 February 2024
 
Mobility opportunities with Erasmus+ (action line KA171 & KA171) - Larissa Sl...
Mobility opportunities with Erasmus+ (action line KA171 & KA171) - Larissa Sl...Mobility opportunities with Erasmus+ (action line KA171 & KA171) - Larissa Sl...
Mobility opportunities with Erasmus+ (action line KA171 & KA171) - Larissa Sl...
 
Overcoming Barriers to Online Engagement through carefull design and delivery...
Overcoming Barriers to Online Engagement through carefull design and delivery...Overcoming Barriers to Online Engagement through carefull design and delivery...
Overcoming Barriers to Online Engagement through carefull design and delivery...
 

Recently uploaded

Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Dr. Vinod Kumar Kanvaria
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
tarandeep35
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
thanhdowork
 
Advantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO PerspectiveAdvantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO Perspective
Krisztián Száraz
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
EduSkills OECD
 
JEE1_This_section_contains_FOUR_ questions
JEE1_This_section_contains_FOUR_ questionsJEE1_This_section_contains_FOUR_ questions
JEE1_This_section_contains_FOUR_ questions
ShivajiThube2
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
David Douglas School District
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 

Recently uploaded (20)

Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
 
Advantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO PerspectiveAdvantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO Perspective
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
 
JEE1_This_section_contains_FOUR_ questions
JEE1_This_section_contains_FOUR_ questionsJEE1_This_section_contains_FOUR_ questions
JEE1_This_section_contains_FOUR_ questions
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 

Avoiding Invasive Surveillance, Ensuring Trust: ENSURING TRUST UNED’S AvEx

  • 1. AVOIDING INVASIVE SURVEILLANCE, ENSURING TRUST: UNED’S VIRTUAL EXAMINATION HALL (AVEX) José L. Aznarte 14/06/2022
  • 2. OUTLINE About me About my institution: UNED Ethical framework for the use of data-based technologies Assessment under COVID19 1/23
  • 4. TEACHING AND RESEARCH • I’m ”profesor titular” at the Artificial Intelligence Department of UNED. • I teach Data Mining and Machine Learning in master’s level. • I also supervise PhD students and master’s theses. • My main research line: • Time series forecasting with deep learning & statistics • Applied to common/shared problems: air quality, traffic intensity, epidemic propagation… • I coordinate some R&D projects: • SOCAIRE (Municipality of Madrid) • PreCoV2.org (Ministry of Health) • Chair EMT/UNED for Air Quality and Sustainable Mobility 2/23
  • 5. SERVICE AT RECTORATE • Appointed in 2019 as deputy vicerector in charge of digitalisation and innovation. • Co-leading the ED3 institutional project (”Digital, Distant and Data-powered Education”). • Interface with IT department. 3/23
  • 6. SERVICE AT RECTORATE • Appointed in 2019 as deputy vicerector in charge of digitalisation and innovation. • Co-leading the ED3 institutional project (”Digital, Distant and Data-powered Education”). • Interface with IT department. Actually… 3/23
  • 7. SERVICE AT RECTORATE • Appointed in 2019 as deputy vicerector in charge of digitalisation and innovation. • Co-leading the ED3 institutional project (”Digital, Distant and Data-powered Education”). • Interface with IT department. Actually… Many doubts about the use of AI tools for dealing with people’s data. 3/23
  • 9. GENERAL INFORMATION ”National Distance Learning University” – UNED • One of the biggest universities in Europe (>150.000 students) • Founded 50 years ago (no digitalization) • Mixed remote and face-to-face model: • Network of regional centers (>50) • Remote teaching during the course • F2F exams • Wide range of different student situations. Mostly not ”freshers” coming from high-school. 4/23
  • 10. ED3: DISTANT, DIGITAL AND DATA-POWERED EDUCATION (2019) 5/23
  • 11. ED3: DISTANT, DIGITAL AND DATA-POWERED EDUCATION (2019) «Develop a framework for evidence-based interventions to improve teaching/learning processes through response-able exploitation of data. • Policies which guarantee that use of data takes into account potential social and ethical consequences. • Identify, gather, curate and make accesible all the data sources related with teaching/learning processes, with different access rights for each profile. • Analize data and prepare them for knowledge creation through exploratory analysis and operational models. • Promote interventions over teaching/learning processes based on evidences resulting from data and the knowledge of the different stakeholders». 5/23
  • 12. ETHICAL FRAMEWORK FOR THE USE OF DATA-BASED TECHNOLOGIES
  • 13. PARTICIPATORY PROCESS • First things first: we needed a shared ethical common sense, which goes beyond regulation, about what happens with data and how can we extract value from it. • We carried out a participatory process, open to the entire UNED community, to agree upon a series of cautions that should be taken into account when using data-based technologies. 6/23
  • 14. PARTICIPATORY PROCESS • First things first: we needed a shared ethical common sense, which goes beyond regulation, about what happens with data and how can we extract value from it. • We carried out a participatory process, open to the entire UNED community, to agree upon a series of cautions that should be taken into account when using data-based technologies. • Open during 2 months in 2020, >2.500 people participated. • Used the ”Decidim” participatory software. 6/23
  • 15. PARTICIPATORY PROCESS • First things first: we needed a shared ethical common sense, which goes beyond regulation, about what happens with data and how can we extract value from it. • We carried out a participatory process, open to the entire UNED community, to agree upon a series of cautions that should be taken into account when using data-based technologies. • Open during 2 months in 2020, >2.500 people participated. • Used the ”Decidim” participatory software. • 9 basic cautions were proposed by the rectorate. • During the process, these were rearranged in terms of the community’s perception of their importance and new 4 with high support were added to the document. 6/23
  • 16. OUTCOME An official document encoding a set of 13 cautions for the use of data-based technologies, related with: • care • response-ability • transparency • consent • property & control • validity and trust • participation • privacy • preventing potential adverse impacts • effective communication • adaptability • right to explanations 7/23
  • 21. PRE-COVID19 EXAMINATION PROCEDURE • Students choose one of two alternative dates and go to a regional center to undertake an exam. • Exams take place synchronously in halls and are invigilated by ad-hoc teams of faculty staff. • Students might be required to leave bagpacks, purses and other material before entering the hall. • Exams are scanned upon hand-over, gathered in a centralized computer system and distributed to each course’s team. 9/23
  • 22. AVEX: VIRTUAL EXAMINATION HALL We needed a tool to reproduce the conditions of usual examination under lockdown: • Synchronous questionnaire distribution and response management. • Variety of exam types (test, essay, math…). • Proper identification of students. • Anti-fraud measures. 10/23
  • 23. AVEX: VIRTUAL EXAMINATION HALL We needed a tool to reproduce the conditions of usual examination under lockdown: • Synchronous questionnaire distribution and response management. • Variety of exam types (test, essay, math…). • Proper identification of students. • Anti-fraud measures. These measures must be non-invasive (at least no more than exam halls). 10/23
  • 24. AVEX: VIRTUAL EXAMINATION HALL We needed a tool to reproduce the conditions of usual examination under lockdown: • Synchronous questionnaire distribution and response management. • Variety of exam types (test, essay, math…). • Proper identification of students. • Anti-fraud measures. These measures must be non-invasive (at least no more than exam halls). Q: Can we delegate exam invigilation to an AI? 10/23
  • 25. FACIAL RECOGNITION TECHNOLOGIES (FRT) IN EDUCATION • First step: study the risks of facial recognition technologies for exam invigilation. • Facial recognition systems applied to surveillance are expanding. • There are mounting evidences that these technologies can be problematic: technical, legal and ethical difficulties. 11/23
  • 26. RISKS OF FACIAL RECOGNITION TECHNOLOGIES 1. There is no clear legal framework for invasive surveillance technologies. 12/23
  • 27. RISKS OF FACIAL RECOGNITION TECHNOLOGIES 1. There is no clear legal framework for invasive surveillance technologies. 1. The use of FRT might imply a violation of the legal principles of necessity and proportionality. 12/23
  • 28. RISKS OF FACIAL RECOGNITION TECHNOLOGIES 1. There is no clear legal framework for invasive surveillance technologies. 1. The use of FRT might imply a violation of the legal principles of necessity and proportionality. 1. FRT can violate privacity rights. 12/23
  • 29. RISKS OF FACIAL RECOGNITION TECHNOLOGIES 1. There is no clear legal framework for invasive surveillance technologies. 1. The use of FRT might imply a violation of the legal principles of necessity and proportionality. 1. FRT can violate privacity rights. 1. FRT are naturally imprecise, and its software is fallible. 12/23
  • 30. RISKS OF FACIAL RECOGNITION TECHNOLOGIES 1. There is no clear legal framework for invasive surveillance technologies. 1. The use of FRT might imply a violation of the legal principles of necessity and proportionality. 1. FRT can violate privacity rights. 1. FRT are naturally imprecise, and its software is fallible. 1. FRT can produce automatization bias. 12/23
  • 31. RISKS OF FACIAL RECOGNITION TECHNOLOGIES 1. There is no clear legal framework for invasive surveillance technologies. 1. The use of FRT might imply a violation of the legal principles of necessity and proportionality. 1. FRT can violate privacity rights. 1. FRT are naturally imprecise, and its software is fallible. 1. FRT can produce automatization bias. 1. FRT can produce discriminations and violations of the equality principle. 12/23
  • 32. RISKS OF FACIAL RECOGNITION TECHNOLOGIES 1. There is no clear legal framework for invasive surveillance technologies. 1. The use of FRT might imply a violation of the legal principles of necessity and proportionality. 1. FRT can violate privacity rights. 1. FRT are naturally imprecise, and its software is fallible. 1. FRT can produce automatization bias. 1. FRT can produce discriminations and violations of the equality principle. 1. FRT can generate discriminations based on different functional abilities. 12/23
  • 33. FACIAL RECOGNITION TECHNOLOGIES IN EDUCATION 13/23
  • 35. AVEX: VIRTUAL EXAMINATION HALL • We underwent express development of our own technological solution: AvEx. • In less than 6 weeks, first version operational. • In first exam call, over 400.000 exams with few issues (~1%). 14/23
  • 36. SECURITY MEASURES Layered security scheme: • Wide question banks • Reasoning-based questions • Open-book exams • Tight timing per question 15/23
  • 37. SECURITY MEASURES Layered security scheme: • Wide question banks • Reasoning-based questions • Open-book exams • Tight timing per question • Randomization of q&a • Sequential access • Copy/paste disabled • Random photographs 15/23
  • 38. SECURITY MEASURES Layered security scheme: • Wide question banks • Reasoning-based questions • Open-book exams • Tight timing per question • Randomization of q&a • Sequential access • Copy/paste disabled • Random photographs • Sworn affidavit • Plagiarism: text similarities • Phone interview after the exam 15/23
  • 39. SECURITY MEASURES Layered security scheme: • Wide question banks • Reasoning-based questions • Open-book exams • Tight timing per question • Randomization of q&a • Sequential access • Copy/paste disabled • Random photographs • Sworn affidavit • Plagiarism: text similarities • Phone interview after the exam 15/23
  • 40. RESULTS (I) First analysis (after 2 exam calls): 16/23
  • 41. RESULTS (I) First analysis (after 2 exam calls): • Amount of exams: ↑~20% (of courses) • Pass marks: ↑~40% • Average marks: ↑~50% • Remote sessions attendance: ↑~300% • Disciplinary issues: ↑ 16/23
  • 45. DISCUSSION What do these results mean? Is the system less secure? 20/23
  • 46. DISCUSSION What do these results mean? Is the system less secure? Hypotheses: • More time to study in lockdown • Changes in the assessment design and criteria • More continuous evaluation • Easier to attend exams • Fraud? 20/23
  • 47. STUDENT SATISFACTION • 86% of students declares negative impacts of lockdown in study. • 40% link it to mood status • Students declare more difficulties to study: • 54% due to work-related issues • 35% due to illness • 20% less time 21/23
  • 48. STUDENT SATISFACTION • 86% of students declares negative impacts of lockdown in study. • 40% link it to mood status • Students declare more difficulties to study: • 54% due to work-related issues • 35% due to illness • 20% less time • Elements hitting on performance: 21/23
  • 49. STUDENT SATISFACTION • Academic results: • 50% similar, 25% better or much better • 70% identify some positive element (more time, more motivation…) 22/23
  • 50. STUDENT SATISFACTION • Academic results: • 50% similar, 25% better or much better • 70% identify some positive element (more time, more motivation…) • 67% is happy or very happy with AvEx • Most students appreciate the efforts of UNED • Young people have worse oppinion 22/23
  • 51. STUDENT SATISFACTION Privacy protection is enabled under AvEx: 23/23