Intra-application partitioning in an eLearning environment - a discussion of critical aspects

In the course of the strengthened activities in eBusiness and the connected increasing awareness of privacy aspects, users of another application area become more and more sensitized of the problem field of the users' privacy $eLearning. With this paper we aim to increase the consciousness of the eLearning community for the relevance of preserving privacy by intra-application partitioning (IAP) in eLearning applications. This, especially, relates to collaborative eLearning environments where the contact to others is the basis of knowledge gathering and building, but, also implies an enhanced risk with respect to one's privacy. Therefore, we discuss concrete collaborative educational examples which illustrate that IAP by means of context recognition improves users' situation from a privacy perspective. Nevertheless, the paper discusses also critical aspects one has to consider when partitioning users' personal data and describes possible solutions. This allows for coming to the conclusion that intra-application data partitioning improves working in the application for the user but does not threaten the enforcement of crucial aspects.

[1]  Elke Franz,et al.  Access control in a privacy-aware eLearning environment , 2006, First International Conference on Availability, Reliability and Security (ARES'06).

[2]  Andreas Pfitzmann,et al.  Usable presentation of secure pseudonyms , 2005, DIM '05.

[3]  Andreas Pfitzmann,et al.  Privacy-Aware eLearning: Why and How , 2005 .

[4]  P. MacLeod A Discussion of the Problems of Identity and of Establishing Communities of Practice in Online Learning Contexts , 2005 .

[5]  Andreas Pfitzmann,et al.  Towards Privacy-Aware eLearning , 2005, Privacy Enhancing Technologies.

[6]  Sebastian Clauß,et al.  Identity management and its support of multilateral security , 2001, Comput. Networks.

[7]  Albrecht Schmidt,et al.  There is more to context than location , 1999, Comput. Graph..

[8]  Andreas Pfitzmann,et al.  Value exchange systems enabling security and unobservability , 1990, Comput. Secur..

[9]  David Chaum,et al.  Security without identification: transaction systems to make big brother obsolete , 1985, CACM.

[10]  David Chaum,et al.  Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.

[11]  A. Pfitzmann,et al.  Intra-Application Partitioning of Personal Data , 2005 .

[12]  Andreas Pfitzmann,et al.  Establishing a Privacy-Aware Collaborative eLearning Environment , 2005 .

[13]  Marit Hansen,et al.  Privacy-enhancing identity management , 2004, Inf. Secur. Tech. Rep..

[14]  Thomas Herrmann,et al.  The Role Concept as a Basis for Designing Community Systems , 2004, COOP.

[15]  A. Pfitzmann,et al.  Anonymity, Unlinkability, Unobservability, Pseudonymity, and Identity Management – A Consolidated Proposal for Terminology , 2002 .

[16]  Birgit Pfitzmann,et al.  Secure and Anonymous Electronic Commerce: Providing Legal Certainty in Open Digital Systems Without , 2000 .