eMadrid 2015 27 01(UC3M) Michael Amigot - Digital badges and latest innovatio...
Similar to Seminario eMadrid 2015 09 10 sobre Serious Games (UCM) Manuel Freire - RAGE: Creación de una infraestructura de Learning Analytics para Serious Games
Similar to Seminario eMadrid 2015 09 10 sobre Serious Games (UCM) Manuel Freire - RAGE: Creación de una infraestructura de Learning Analytics para Serious Games (20)
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
Seminario eMadrid 2015 09 10 sobre Serious Games (UCM) Manuel Freire - RAGE: Creación de una infraestructura de Learning Analytics para Serious Games
1. RAGE: Building a Learning
Analytics Infrastructure for
Serious Games
seminario eMadrid del 2015.10.23
manuel.freire@fdi.ucm.es
2. Realizing an Applied Games Eco-system
● H2020, 20 partners, 9M € budget, ~1K man-months effort
● Ambitious goal
○ develop applied games assets for game developers
■ including analytics and many others that depend on it!
○ place assets in online repository
○ build a self-sustainable ecosystem around repository, connecting stakeholders
■ game-developers
■ education providers
■ learners
■ asset contributors
RAGE
http://rageproject.eu/
3. e-UCM
● In charge of WP2: User Data Analytics; ~7% of total effort (second-largest)
● Building on top of GLEANER
○ developed by Ángel Serrano at e-UCM
○ reference learning analytics platform for GALA NoE
http://www.e-ucm.es/
GLEANER’s
author
5. Users & Tasks: basic
● Admin: setup system
● Game dev: adds traces to game; configures analytics
● Instructor: gets students to play game, providing them with identification
● Student: plays game; also, identifies self to system
● Instructor: looks at student progress via analytics
● Game dev: improves game based on analytics
6. Users & Tasks: advanced
● Privacy & profiles
○ support “educational supervisor” profiles that can compare class aggregates
○ game dev should not see personably-identifiable information
○ students can access own data, but not others
○ system should not expose PI information even if database compromised
● Scalability
○ support large numbers of simultaneous players and analytics requests
○ resilience: no central points of failure
● Ecosystem
○ allow authorized “server-side” applications access to raw data, analytics
○ allow new types of analytics & visualizations
7.
8. RAGE Analytics
● Part of core assets to be developed
● Main LA assets
○ CITA: client-side tracking library (makes it easy to send traces to collector)
○ SISA: server-side storage and analytics (stores, analyzes collected traces)
○ SDA: server-side dashboard and analytics; must be highly customizable
■ heatmaps
■ level transitions
● Other assets depend on LA, can benefit from above
○ Real-time assessment: wants analytics data to perform “stealth assessment”
○ Emotion-detection: wants to display its own data in the SDA
○ ...
12. A2: Authorization & Authentication Server
● Gateway for all client-server communications
○ clients authenticate, receive auth code (JWT) to include in future requests
○ A2 proxies all service requests; simplifies configuration
○ initial “admin” can
■ create roles, users
■ assign roles to users
■ define new proxies for server-side components
○ proxied applications can mark specific endpoints as “do not require registration”
○ can be queried to check for permissions
● Why?
○ provides authentication/authorization for all services
○ single-sign on drastically simplifies security
18. Work in progress
● Deployment: check (and retry a few times)
server dependencies to increase resiliency
● Add analytics + visualizations as simple-to-deploy packages
(think Firefox Extensions)
● Add support for trace anonymization
● Documentation
20. Anonymization scheme
● each session, sensitive fields in traces are encrypted with new keys
○ student-id by default; others on-demand
● sensitive fields are only stored in encrypted format
○ enough for class comparisons
○ does not leak personally identifiable information… if developers mark sensitive fields as such
● (only) instructors can decrypt sensitive fields
○ with their private keys, which are only used client-side, and never sent to the server
Steps:
1. Server generates t_pub, t_priv pairs for teachers; stores only t_pub
2. Server generates random s_key for each session; stores t_pub(s_key)
3. Fields anonymized using symmetric s_key; s_key is lost when session closed
4. Sensitive fields can be de-anonymized by applying t_priv(t_pub(s_key))