José Aznarte outlines UNED's efforts to develop a virtual examination hall called AVEX during the COVID-19 pandemic. He describes UNED's participatory process to establish ethical guidelines for using student data. While facial recognition raised legal and ethical concerns, AVEX used layered security including random questions, photos and interviews. Initial results found higher pass rates but potential fraud risks, requiring further analysis. Most students were satisfied with AVEX and felt it protected their privacy.
I4ADA 2019 - Presentation Cedric WachholzPaul van Heel
See https://i4ada.org for additional information and videorecordings of the presentations held at the Hague Summit for Accountability in the Digital Age
Proposed high level solutions to counter online examination fraud using digit...Ivans Kigwana
In this current digital age, most of the tasks are conducted electronically. Some academic institutions have not been left behind as they have adopted the norm of presenting exams via online means to students. The present-day paradigm creates opportunities for students to use this as an opening to cheat or commit online examination fraud because of the absence of exam proctors. Having electronic evidence would be vital if there was a disciplinary hearing into examination fraud. In the case when an institution is not prepared before-hand for such an incident, it is likely that there won’t be important electronic evidence that is admissible before the disciplinary committee. In this case, it could be damaging to the institution’s reputation and how it handles its academic affairs. In order to prepare institutions for such an incident, there should be proactive measures (digital forensic readiness measures) that need to be in place. These digital forensic readiness techniques can be used interchangeably because most, if not all of them, capture different kinds of data. So the institution needs a proper plan on what data might be useful before any technique can be implemented. Various factors such as cost of implementation and difficulty of implementation of these digital forensic readiness methods make its implementation even more difficult. This paper aims to explore the various ways how students commit online examination fraud and later propose high level digital forensic readiness techniques that can be used to capture as much information as possible before-hand which can later be used when there is need for a digital forensic investigation or perhaps suspicion of examination malpractice. We later evaluate the proposed techniques based on difficulty of implementation, cost of implementation and efficiency of operation of each particular technique. As motivation, we choose six (6) techniques which are explained in detail to help the reader understand why and how they can be used to suit a given digital forensic readiness purpose.
On 4 October 2016, as part of the GDPR Workshop series, the Brussels Privacy Hub hosted a workshop on implementation of the EU GDPR and Privacy Impact Assessment. Trilateral delivered a joint presentation by Rowena Rodrigues and Julia Muraszkewicz, exploring some of the challenges associated to DPIAs and EPIAs. The presentation was based upon two of Trilateral’s research projects: SATORI and iTRACK.
Ethics has to do with moral principles that control or influence a person’s behavior. Research ethics has taken a prime position in the process of research. Digital watermarking as a technology that embeds information, in machine-readable form, within the content of a digital media file could raise privacy issues if deployed in ways that fail to take privacy into account. Digital watermarking can be applied to different applications including digital signatures, fingerprinting, broadcast and publication monitoring, authentication, copy control, and secret communication. This paper brings to view various ethical concerns of digital watermarking such as privacy, piracy, deception and anonymity.
For the full video of this presentation, please visit:
https://www.embedded-vision.com/industry-analysis/video-interviews-demos/potential-impacts-privacy-regulation-and-litigation-vision-
For more information about embedded vision, please visit:
http://www.embedded-vision.com
Robert E. Cattanach, Partner at Dorsey & Whitney LLP, delivers the presentation "Potential Impacts of Privacy Regulation and Litigation on Vision Technology" at the Embedded Vision Alliance's December 2019 Vision Industry and Technology Forum. Cattanach provides insights into the fast-changing world of privacy regulation and litigation.
I4ADA 2019 - Presentation Cedric WachholzPaul van Heel
See https://i4ada.org for additional information and videorecordings of the presentations held at the Hague Summit for Accountability in the Digital Age
Proposed high level solutions to counter online examination fraud using digit...Ivans Kigwana
In this current digital age, most of the tasks are conducted electronically. Some academic institutions have not been left behind as they have adopted the norm of presenting exams via online means to students. The present-day paradigm creates opportunities for students to use this as an opening to cheat or commit online examination fraud because of the absence of exam proctors. Having electronic evidence would be vital if there was a disciplinary hearing into examination fraud. In the case when an institution is not prepared before-hand for such an incident, it is likely that there won’t be important electronic evidence that is admissible before the disciplinary committee. In this case, it could be damaging to the institution’s reputation and how it handles its academic affairs. In order to prepare institutions for such an incident, there should be proactive measures (digital forensic readiness measures) that need to be in place. These digital forensic readiness techniques can be used interchangeably because most, if not all of them, capture different kinds of data. So the institution needs a proper plan on what data might be useful before any technique can be implemented. Various factors such as cost of implementation and difficulty of implementation of these digital forensic readiness methods make its implementation even more difficult. This paper aims to explore the various ways how students commit online examination fraud and later propose high level digital forensic readiness techniques that can be used to capture as much information as possible before-hand which can later be used when there is need for a digital forensic investigation or perhaps suspicion of examination malpractice. We later evaluate the proposed techniques based on difficulty of implementation, cost of implementation and efficiency of operation of each particular technique. As motivation, we choose six (6) techniques which are explained in detail to help the reader understand why and how they can be used to suit a given digital forensic readiness purpose.
On 4 October 2016, as part of the GDPR Workshop series, the Brussels Privacy Hub hosted a workshop on implementation of the EU GDPR and Privacy Impact Assessment. Trilateral delivered a joint presentation by Rowena Rodrigues and Julia Muraszkewicz, exploring some of the challenges associated to DPIAs and EPIAs. The presentation was based upon two of Trilateral’s research projects: SATORI and iTRACK.
Ethics has to do with moral principles that control or influence a person’s behavior. Research ethics has taken a prime position in the process of research. Digital watermarking as a technology that embeds information, in machine-readable form, within the content of a digital media file could raise privacy issues if deployed in ways that fail to take privacy into account. Digital watermarking can be applied to different applications including digital signatures, fingerprinting, broadcast and publication monitoring, authentication, copy control, and secret communication. This paper brings to view various ethical concerns of digital watermarking such as privacy, piracy, deception and anonymity.
For the full video of this presentation, please visit:
https://www.embedded-vision.com/industry-analysis/video-interviews-demos/potential-impacts-privacy-regulation-and-litigation-vision-
For more information about embedded vision, please visit:
http://www.embedded-vision.com
Robert E. Cattanach, Partner at Dorsey & Whitney LLP, delivers the presentation "Potential Impacts of Privacy Regulation and Litigation on Vision Technology" at the Embedded Vision Alliance's December 2019 Vision Industry and Technology Forum. Cattanach provides insights into the fast-changing world of privacy regulation and litigation.
UN-Singapore Cyber Programme Training course on behalf of the: UN Office for Disarmament Affairs c/o gohg@un.org By: Abdul-Hakeem Ajijola info@consultancyss.com Singapore 15-16 July 2019 #UN #Singapore #Cyber Program #Norms Awareness Workshop for #ASEAN member States #UNODA #UNGGE 2015 #cybersecurity #AskAjijola #GCSC #GFCE @benjaminang @fitbintim @elinanoor #cyberdiplomacy
e-SIDES workshop at BDV Meet-Up, Sofia 14/05/2018e-SIDES.eu
The following presentation was given at the workshop "Technology solutions for privacy issues: what is the best way forward?" organized by e-SIDES at the BDVe Meet-up in Sofia on May 14, 2018. The workshop, chaired by Gabriella Cattaneo from IDC, involved stakeholders from ICT-18 projects.
Responsible Data for Children Training_PublicSlides_110922.pdfStefaan Verhulst
The Responsible Data for Children (RD4C) initiative—a collaboration between The GovLab and UNICEF to promote the more responsible handling of data for and about children—has spent much of 2022 developing ways to socialize and operationalize the principles that put the best interests of children and a child rights approach at the center of our data activities.. From publishing new case studies that provide detail on what a responsible data approach looks like in action to supporting UNICEF and UNHCR country offices in helping them implement a responsible data for children approach to their operations to expanding its offerings in different languages, we’ve sought to help organizations understand what responsible data for children means and how they can realize it in their day-to-day operations.
Today, RD4C is continuing this work with self-guided training. Based on the tutorials offered to UNICEF staff in early 2022, these slides are a resource for organizations seeking to understand ways to operationalize the RD4C principles and implement the RD4C tools.
Information Security Management in University Campus Using Cognitive SecurityCSCJournals
Nowadays, most universities offer free Internet connections, access to scientific databases, and advanced computer networks for the members of their community, which generates dynamic and complex scenarios. In this context, it is necessary to define proactive security strategies, as well as the integration of technology and research. This work presents a general vision of the experience adopted by the universities in the field of information security management using cognitive security.
#COVIDaction, a partnership between DFID’s Frontier Technology Hub, Global Disability (GDI) Hub, UCL Institute of Healthcare Engineering along with other collaborators will be working to build a technology and innovation pipeline to support action related to the COVID pandemic.
Sankey, M. 2023. Creating a new culture around authenticity and generative AI. Research Bazaar Northern Territory. Charles Darwin University. Darwin. 25-26 October.
Arief Karfianto - Proposed Security Model for Protecting Patients Data in Ele...idsecconf
This paper is a documentation of proposed security management for Electronic Health Records which includes security planning and policy, security program, risk management, and protection mechanism. Planning and policy are developed to provide a basic principle of security management at a hospital. The security program in this document includes Risk-Adaptable Access Control (RAdAC) and the implementation of security education, training and awareness (SETA). Regarding risk management, we perform risk identification, inventory of assets, information assets classification, and information assets value assessment, threat identification, and vulnerability assessment. For protection mechanism, we propose biometrics and signature as the authentication methods. The use of firewalls, intrusion detection system and encrypted data transmission is also suggested for securing data, application and network.
Overview of national cybercrime strategiesBenjamin Ang
This is an overview of national cybercrime strategies, presented at the INTERPOL ASEAN Cyber Capacity Development Project’s (ACCDP) Decision Makers Meeting. It reviews best practices in developing national cybersecurity and cybercrime strategies, key pillars to consider, the life-cycle of the strategy process, stakeholders to engage, and best practices.
Presentation by David Winickoff at the OECD Global Conference on Governance Innovation which took place in Paris on 13-14 January 2020. Further information is available at http://www.oecd.org/gov/regulatory-policy/oecd-global-conference-on-governance-innovation.htm.
Project Access Control ProposalPurposeThis course project i.docxstilliegeorgiana
Project: Access Control Proposal
Purpose
This course project is intended to assess your ability to comprehend and apply the basic concepts related to information security management, such as the following:
The ability to discern when a risk assessment should be performed and carrying out the task
Understanding user or customer access requirements, whether remote or local
Using a layered security approach to establish and maintain access controls
Working with other departments, such as the human resources department, to identify and implement methods to prevent unwarranted exposure to information by inappropriate personnel
Your ability to execute the tasks within these information security domains and others will be evaluated against the learning objectives as identified and described in previous lessons of instruction for this course. Required Source Information and Tools
Web References: Links to Web references in this Instructor Guide and related materials are subject to change without prior notice. These links were last verified on August 2, 2014.
The following tools and resources will be needed to complete this project:
· Course textbook
· Access to the Internet
· Access to the library
· Text sheet: Integrated Distributors Incorporated (access_project_ts_integrateddistributors)Learning Objectives and Outcomes
Successful completion of this project will ensure that you are capable of supporting the implementation and management of an information systems security framework. To be able to do so, you need to be able to do the following:
Relate how an access control policy framework is used to define authorization and access to an information technology (IT) infrastructure for compliance.
Mitigate risks to an IT infrastructure’s confidentiality, integrity, and availability with sound access controls.
Relate how a data classification standard influences an IT infrastructure’s access control requirements and implementation.
Develop an access control policy framework consisting of best practices for policies, standards, procedures, and guidelines to mitigate unauthorized access.
Define proper security controls within the User Domain to mitigate risks and threats caused by human nature and behavior.
Implement appropriate access controls for information systems within IT infrastructures.
Mitigate risks from unauthorized access to IT systems through proper testing and reporting.Project Checkpoints
The course project has a checkpoint strategy. Checkpoint deliverables allow you to receive valuable feedback on your interim work. In this project, you have four ungraded checkpoint deliverables. (See the syllabus for the schedule.) You may discuss project questions with the instructor, and you should receive feedback from the instructor on previously submitted work. The checkpoint deliverable ensures refinement of the final deliverables, if incorporated effectively. The final deliverable for this project is a professional report and a PowerPoint presenta ...
UN-Singapore Cyber Programme Training course on behalf of the: UN Office for Disarmament Affairs c/o gohg@un.org By: Abdul-Hakeem Ajijola info@consultancyss.com Singapore 15-16 July 2019 #UN #Singapore #Cyber Program #Norms Awareness Workshop for #ASEAN member States #UNODA #UNGGE 2015 #cybersecurity #AskAjijola #GCSC #GFCE @benjaminang @fitbintim @elinanoor #cyberdiplomacy
e-SIDES workshop at BDV Meet-Up, Sofia 14/05/2018e-SIDES.eu
The following presentation was given at the workshop "Technology solutions for privacy issues: what is the best way forward?" organized by e-SIDES at the BDVe Meet-up in Sofia on May 14, 2018. The workshop, chaired by Gabriella Cattaneo from IDC, involved stakeholders from ICT-18 projects.
Responsible Data for Children Training_PublicSlides_110922.pdfStefaan Verhulst
The Responsible Data for Children (RD4C) initiative—a collaboration between The GovLab and UNICEF to promote the more responsible handling of data for and about children—has spent much of 2022 developing ways to socialize and operationalize the principles that put the best interests of children and a child rights approach at the center of our data activities.. From publishing new case studies that provide detail on what a responsible data approach looks like in action to supporting UNICEF and UNHCR country offices in helping them implement a responsible data for children approach to their operations to expanding its offerings in different languages, we’ve sought to help organizations understand what responsible data for children means and how they can realize it in their day-to-day operations.
Today, RD4C is continuing this work with self-guided training. Based on the tutorials offered to UNICEF staff in early 2022, these slides are a resource for organizations seeking to understand ways to operationalize the RD4C principles and implement the RD4C tools.
Information Security Management in University Campus Using Cognitive SecurityCSCJournals
Nowadays, most universities offer free Internet connections, access to scientific databases, and advanced computer networks for the members of their community, which generates dynamic and complex scenarios. In this context, it is necessary to define proactive security strategies, as well as the integration of technology and research. This work presents a general vision of the experience adopted by the universities in the field of information security management using cognitive security.
#COVIDaction, a partnership between DFID’s Frontier Technology Hub, Global Disability (GDI) Hub, UCL Institute of Healthcare Engineering along with other collaborators will be working to build a technology and innovation pipeline to support action related to the COVID pandemic.
Sankey, M. 2023. Creating a new culture around authenticity and generative AI. Research Bazaar Northern Territory. Charles Darwin University. Darwin. 25-26 October.
Arief Karfianto - Proposed Security Model for Protecting Patients Data in Ele...idsecconf
This paper is a documentation of proposed security management for Electronic Health Records which includes security planning and policy, security program, risk management, and protection mechanism. Planning and policy are developed to provide a basic principle of security management at a hospital. The security program in this document includes Risk-Adaptable Access Control (RAdAC) and the implementation of security education, training and awareness (SETA). Regarding risk management, we perform risk identification, inventory of assets, information assets classification, and information assets value assessment, threat identification, and vulnerability assessment. For protection mechanism, we propose biometrics and signature as the authentication methods. The use of firewalls, intrusion detection system and encrypted data transmission is also suggested for securing data, application and network.
Overview of national cybercrime strategiesBenjamin Ang
This is an overview of national cybercrime strategies, presented at the INTERPOL ASEAN Cyber Capacity Development Project’s (ACCDP) Decision Makers Meeting. It reviews best practices in developing national cybersecurity and cybercrime strategies, key pillars to consider, the life-cycle of the strategy process, stakeholders to engage, and best practices.
Presentation by David Winickoff at the OECD Global Conference on Governance Innovation which took place in Paris on 13-14 January 2020. Further information is available at http://www.oecd.org/gov/regulatory-policy/oecd-global-conference-on-governance-innovation.htm.
Project Access Control ProposalPurposeThis course project i.docxstilliegeorgiana
Project: Access Control Proposal
Purpose
This course project is intended to assess your ability to comprehend and apply the basic concepts related to information security management, such as the following:
The ability to discern when a risk assessment should be performed and carrying out the task
Understanding user or customer access requirements, whether remote or local
Using a layered security approach to establish and maintain access controls
Working with other departments, such as the human resources department, to identify and implement methods to prevent unwarranted exposure to information by inappropriate personnel
Your ability to execute the tasks within these information security domains and others will be evaluated against the learning objectives as identified and described in previous lessons of instruction for this course. Required Source Information and Tools
Web References: Links to Web references in this Instructor Guide and related materials are subject to change without prior notice. These links were last verified on August 2, 2014.
The following tools and resources will be needed to complete this project:
· Course textbook
· Access to the Internet
· Access to the library
· Text sheet: Integrated Distributors Incorporated (access_project_ts_integrateddistributors)Learning Objectives and Outcomes
Successful completion of this project will ensure that you are capable of supporting the implementation and management of an information systems security framework. To be able to do so, you need to be able to do the following:
Relate how an access control policy framework is used to define authorization and access to an information technology (IT) infrastructure for compliance.
Mitigate risks to an IT infrastructure’s confidentiality, integrity, and availability with sound access controls.
Relate how a data classification standard influences an IT infrastructure’s access control requirements and implementation.
Develop an access control policy framework consisting of best practices for policies, standards, procedures, and guidelines to mitigate unauthorized access.
Define proper security controls within the User Domain to mitigate risks and threats caused by human nature and behavior.
Implement appropriate access controls for information systems within IT infrastructures.
Mitigate risks from unauthorized access to IT systems through proper testing and reporting.Project Checkpoints
The course project has a checkpoint strategy. Checkpoint deliverables allow you to receive valuable feedback on your interim work. In this project, you have four ungraded checkpoint deliverables. (See the syllabus for the schedule.) You may discuss project questions with the instructor, and you should receive feedback from the instructor on previously submitted work. The checkpoint deliverable ensures refinement of the final deliverables, if incorporated effectively. The final deliverable for this project is a professional report and a PowerPoint presenta ...
Overcoming Barriers to Online Engagement through carefull design and delivery...EADTU
Empower Webinar Week. Disclaimer: Funded by the European Union. Views and opinions expressed are however those of the author(s) only and do not necessarily reflect those of the European Union or the European Education and Culture Executive Agency (EACEA). Neither the European Union nor EACEA can be held responsible for them.
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Dr. Vinod Kumar Kanvaria
Exploiting Artificial Intelligence for Empowering Researchers and Faculty,
International FDP on Fundamentals of Research in Social Sciences
at Integral University, Lucknow, 06.06.2024
By Dr. Vinod Kumar Kanvaria
Unit 8 - Information and Communication Technology (Paper I).pdfThiyagu K
This slides describes the basic concepts of ICT, basics of Email, Emerging Technology and Digital Initiatives in Education. This presentations aligns with the UGC Paper I syllabus.
Macroeconomics- Movie Location
This will be used as part of your Personal Professional Portfolio once graded.
Objective:
Prepare a presentation or a paper using research, basic comparative analysis, data organization and application of economic information. You will make an informed assessment of an economic climate outside of the United States to accomplish an entertainment industry objective.
Model Attribute Check Company Auto PropertyCeline George
In Odoo, the multi-company feature allows you to manage multiple companies within a single Odoo database instance. Each company can have its own configurations while still sharing common resources such as products, customers, and suppliers.
This slide is special for master students (MIBS & MIFB) in UUM. Also useful for readers who are interested in the topic of contemporary Islamic banking.
Francesca Gottschalk - How can education support child empowerment.pptxEduSkills OECD
Francesca Gottschalk from the OECD’s Centre for Educational Research and Innovation presents at the Ask an Expert Webinar: How can education support child empowerment?
Operation “Blue Star” is the only event in the history of Independent India where the state went into war with its own people. Even after about 40 years it is not clear if it was culmination of states anger over people of the region, a political game of power or start of dictatorial chapter in the democratic setup.
The people of Punjab felt alienated from main stream due to denial of their just demands during a long democratic struggle since independence. As it happen all over the word, it led to militant struggle with great loss of lives of military, police and civilian personnel. Killing of Indira Gandhi and massacre of innocent Sikhs in Delhi and other India cities was also associated with this movement.
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
Synthetic Fiber Construction in lab .pptxPavel ( NSTU)
Synthetic fiber production is a fascinating and complex field that blends chemistry, engineering, and environmental science. By understanding these aspects, students can gain a comprehensive view of synthetic fiber production, its impact on society and the environment, and the potential for future innovations. Synthetic fibers play a crucial role in modern society, impacting various aspects of daily life, industry, and the environment. ynthetic fibers are integral to modern life, offering a range of benefits from cost-effectiveness and versatility to innovative applications and performance characteristics. While they pose environmental challenges, ongoing research and development aim to create more sustainable and eco-friendly alternatives. Understanding the importance of synthetic fibers helps in appreciating their role in the economy, industry, and daily life, while also emphasizing the need for sustainable practices and innovation.
Introduction to AI for Nonprofits with Tapp NetworkTechSoup
Dive into the world of AI! Experts Jon Hill and Tareq Monaur will guide you through AI's role in enhancing nonprofit websites and basic marketing strategies, making it easy to understand and apply.
4. TEACHING AND RESEARCH
• I’m ”profesor titular” at the Artificial Intelligence Department of UNED.
• I teach Data Mining and Machine Learning in master’s level.
• I also supervise PhD students and master’s theses.
• My main research line:
• Time series forecasting with deep learning & statistics
• Applied to common/shared problems: air quality, traffic intensity, epidemic
propagation…
• I coordinate some R&D projects:
• SOCAIRE (Municipality of Madrid)
• PreCoV2.org (Ministry of Health)
• Chair EMT/UNED for Air Quality and Sustainable Mobility
2/23
5. SERVICE AT RECTORATE
• Appointed in 2019 as deputy vicerector in charge of digitalisation and
innovation.
• Co-leading the ED3 institutional project (”Digital, Distant and Data-powered
Education”).
• Interface with IT department.
3/23
6. SERVICE AT RECTORATE
• Appointed in 2019 as deputy vicerector in charge of digitalisation and
innovation.
• Co-leading the ED3 institutional project (”Digital, Distant and Data-powered
Education”).
• Interface with IT department.
Actually…
3/23
7. SERVICE AT RECTORATE
• Appointed in 2019 as deputy vicerector in charge of digitalisation and
innovation.
• Co-leading the ED3 institutional project (”Digital, Distant and Data-powered
Education”).
• Interface with IT department.
Actually…
Many doubts about the use of AI tools for dealing with people’s data.
3/23
9. GENERAL INFORMATION
”National Distance Learning University” – UNED
• One of the biggest universities in Europe (>150.000 students)
• Founded 50 years ago (no digitalization)
• Mixed remote and face-to-face model:
• Network of regional centers (>50)
• Remote teaching during the course
• F2F exams
• Wide range of different student situations. Mostly not ”freshers” coming from
high-school.
4/23
11. ED3: DISTANT, DIGITAL AND DATA-POWERED EDUCATION (2019)
«Develop a framework for evidence-based interventions to improve
teaching/learning processes through response-able exploitation of data.
• Policies which guarantee that use of data takes into account potential social
and ethical consequences.
• Identify, gather, curate and make accesible all the data sources related with
teaching/learning processes, with different access rights for each profile.
• Analize data and prepare them for knowledge creation through exploratory
analysis and operational models.
• Promote interventions over teaching/learning processes based on evidences
resulting from data and the knowledge of the different stakeholders».
5/23
13. PARTICIPATORY PROCESS
• First things first: we needed a shared ethical common sense, which goes
beyond regulation, about what happens with data and how can we extract
value from it.
• We carried out a participatory process, open to the entire UNED community,
to agree upon a series of cautions that should be taken into account when
using data-based technologies.
6/23
14. PARTICIPATORY PROCESS
• First things first: we needed a shared ethical common sense, which goes
beyond regulation, about what happens with data and how can we extract
value from it.
• We carried out a participatory process, open to the entire UNED community,
to agree upon a series of cautions that should be taken into account when
using data-based technologies.
• Open during 2 months in 2020, >2.500 people participated.
• Used the ”Decidim” participatory software.
6/23
15. PARTICIPATORY PROCESS
• First things first: we needed a shared ethical common sense, which goes
beyond regulation, about what happens with data and how can we extract
value from it.
• We carried out a participatory process, open to the entire UNED community,
to agree upon a series of cautions that should be taken into account when
using data-based technologies.
• Open during 2 months in 2020, >2.500 people participated.
• Used the ”Decidim” participatory software.
• 9 basic cautions were proposed by the rectorate.
• During the process, these were rearranged in terms of the community’s
perception of their importance and new 4 with high support were added to
the document. 6/23
16. OUTCOME
An official document encoding a set of 13 cautions for the use of data-based
technologies, related with:
• care
• response-ability
• transparency
• consent
• property & control
• validity and trust
• participation
• privacy
• preventing potential adverse
impacts
• effective communication
• adaptability
• right to explanations
7/23
21. PRE-COVID19 EXAMINATION PROCEDURE
• Students choose one of two alternative dates and go to a regional center to
undertake an exam.
• Exams take place synchronously in halls and are invigilated by ad-hoc teams
of faculty staff.
• Students might be required to leave bagpacks, purses and other material
before entering the hall.
• Exams are scanned upon hand-over, gathered in a centralized computer
system and distributed to each course’s team.
9/23
22. AVEX: VIRTUAL EXAMINATION HALL
We needed a tool to reproduce the conditions of usual examination under
lockdown:
• Synchronous questionnaire distribution and response management.
• Variety of exam types (test, essay, math…).
• Proper identification of students.
• Anti-fraud measures.
10/23
23. AVEX: VIRTUAL EXAMINATION HALL
We needed a tool to reproduce the conditions of usual examination under
lockdown:
• Synchronous questionnaire distribution and response management.
• Variety of exam types (test, essay, math…).
• Proper identification of students.
• Anti-fraud measures.
These measures must be non-invasive (at least no more than exam halls).
10/23
24. AVEX: VIRTUAL EXAMINATION HALL
We needed a tool to reproduce the conditions of usual examination under
lockdown:
• Synchronous questionnaire distribution and response management.
• Variety of exam types (test, essay, math…).
• Proper identification of students.
• Anti-fraud measures.
These measures must be non-invasive (at least no more than exam halls).
Q: Can we delegate exam invigilation to an AI?
10/23
25. FACIAL RECOGNITION TECHNOLOGIES (FRT) IN EDUCATION
• First step: study the risks of facial recognition technologies for exam
invigilation.
• Facial recognition systems applied to surveillance are expanding.
• There are mounting evidences that these technologies can be problematic:
technical, legal and ethical difficulties.
11/23
26. RISKS OF FACIAL RECOGNITION TECHNOLOGIES
1. There is no clear legal framework for invasive surveillance technologies.
12/23
27. RISKS OF FACIAL RECOGNITION TECHNOLOGIES
1. There is no clear legal framework for invasive surveillance technologies.
1. The use of FRT might imply a violation of the legal principles of necessity and
proportionality.
12/23
28. RISKS OF FACIAL RECOGNITION TECHNOLOGIES
1. There is no clear legal framework for invasive surveillance technologies.
1. The use of FRT might imply a violation of the legal principles of necessity and
proportionality.
1. FRT can violate privacity rights.
12/23
29. RISKS OF FACIAL RECOGNITION TECHNOLOGIES
1. There is no clear legal framework for invasive surveillance technologies.
1. The use of FRT might imply a violation of the legal principles of necessity and
proportionality.
1. FRT can violate privacity rights.
1. FRT are naturally imprecise, and its software is fallible.
12/23
30. RISKS OF FACIAL RECOGNITION TECHNOLOGIES
1. There is no clear legal framework for invasive surveillance technologies.
1. The use of FRT might imply a violation of the legal principles of necessity and
proportionality.
1. FRT can violate privacity rights.
1. FRT are naturally imprecise, and its software is fallible.
1. FRT can produce automatization bias.
12/23
31. RISKS OF FACIAL RECOGNITION TECHNOLOGIES
1. There is no clear legal framework for invasive surveillance technologies.
1. The use of FRT might imply a violation of the legal principles of necessity and
proportionality.
1. FRT can violate privacity rights.
1. FRT are naturally imprecise, and its software is fallible.
1. FRT can produce automatization bias.
1. FRT can produce discriminations and violations of the equality principle.
12/23
32. RISKS OF FACIAL RECOGNITION TECHNOLOGIES
1. There is no clear legal framework for invasive surveillance technologies.
1. The use of FRT might imply a violation of the legal principles of necessity and
proportionality.
1. FRT can violate privacity rights.
1. FRT are naturally imprecise, and its software is fallible.
1. FRT can produce automatization bias.
1. FRT can produce discriminations and violations of the equality principle.
1. FRT can generate discriminations based on different functional abilities.
12/23
35. AVEX: VIRTUAL EXAMINATION HALL
• We underwent express development of our own technological solution: AvEx.
• In less than 6 weeks, first version operational.
• In first exam call, over 400.000 exams with few issues (~1%).
14/23
46. DISCUSSION
What do these results mean? Is the system less secure?
Hypotheses:
• More time to study in lockdown
• Changes in the assessment design and criteria
• More continuous evaluation
• Easier to attend exams
• Fraud?
20/23
47. STUDENT SATISFACTION
• 86% of students declares negative impacts of lockdown in study.
• 40% link it to mood status
• Students declare more difficulties to study:
• 54% due to work-related issues
• 35% due to illness
• 20% less time
21/23
48. STUDENT SATISFACTION
• 86% of students declares negative impacts of lockdown in study.
• 40% link it to mood status
• Students declare more difficulties to study:
• 54% due to work-related issues
• 35% due to illness
• 20% less time
• Elements hitting on performance:
21/23
49. STUDENT SATISFACTION
• Academic results:
• 50% similar, 25% better or much better
• 70% identify some positive element (more time, more motivation…)
22/23
50. STUDENT SATISFACTION
• Academic results:
• 50% similar, 25% better or much better
• 70% identify some positive element (more time, more motivation…)
• 67% is happy or very happy with AvEx
• Most students appreciate the efforts of UNED
• Young people have worse oppinion
22/23