{"id":13185,"date":"2018-06-07T08:24:58","date_gmt":"2018-06-07T08:24:58","guid":{"rendered":"http:\/\/jenrossity.net\/blog\/?p=13185"},"modified":"2018-06-21T14:34:30","modified_gmt":"2018-06-21T14:34:30","slug":"surveillance-trust-technology-higher-education-futures","status":"publish","type":"post","link":"http:\/\/jenrossity.net\/blog\/?p=13185","title":{"rendered":"surveillance, trust &#038; technology: higher education futures"},"content":{"rendered":"<p>Several of the research and writing projects and discussions I&#8217;ve been involved with this year have directly or indirectly addressed issues of trust and surveillance, and this is an area of work I&#8217;m planning to develop further, along with a number of great colleagues.<\/p>\n<p>In <a href=\"http:\/\/jenrossity.net\/blog\/?page_id=9767\">several talks this year<\/a>, at Strathclyde in Glasgow; the University of Sydney; and the Networked Learning Conference in Zagreb, I&#8217;ve been drawing on our <a href=\"https:\/\/onlineteachingmanifesto.wordpress.com\/the-text\/\">Manifesto for Teaching Online<\/a> to develop my thinking about plagiarism detection and attendance monitoring &#8211; two routine processes which are becoming increasingly intensive and often invasive in most universities. For example, Hamish Macleod and I recently argued that<\/p>\n<div class=\"page\" title=\"Page 1\">\n<div class=\"layoutArea\">\n<div class=\"column\">\n<p style=\"padding-left: 30px;\">Logics of surveillance are strongly at work in practices which attempt to regulate student behaviour through the exposure of their writing to algorithmic scanning and monitoring. These logics frame students as in need of careful monitoring to ensure learning and teaching runs smoothly, and framing academic writing as a space of dishonesty which is both rampant and solvable through technology. Routines of plagiarism detection intervene negatively in one of the central facets of student-teacher relationships: the production and assessment of student work. Where these relationships become risk-averse and mutually suspicious, trust is blocked or lost and not easily regained. (<a href=\"http:\/\/www.networkedlearningconference.org.uk\/abstracts\/ross.html\">Ross and Macleod 2018, 235<\/a>)<\/p>\n<\/div>\n<\/div>\n<\/div>\n<p>We end that paper by arguing that we need to find &#8220;ways to re-sensitise ourselves and our students to the values we want to prioritise in our classrooms, and offering means by which students can voice their responses to surveillance cultures in higher education; and [address] issues at strategic levels within our institutions and the sector more widely by developing robust mechanisms for engaging in critical debate, discussion about and review of technology platforms and practices&#8221;. This second point echoes one of the key observations made by Laura Czerniewicz at her keynote address in Zagreb last month:<\/p>\n<p>https:\/\/twitter.com\/jar\/status\/995998339819859968<\/p>\n<p>My talk in Zagreb (Hamish couldn&#8217;t make it, being retired and all!) generated quite a lot of interest, and it&#8217;s clear this is resonating with people from across a number of higher education contexts:<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"474\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">Here at <a href=\"https:\/\/twitter.com\/hashtag\/nlc2018?src=hash&amp;ref_src=twsrc%5Etfw\">#nlc2018<\/a> <a href=\"https:\/\/twitter.com\/PetarPjandric?ref_src=twsrc%5Etfw\">@PetarPjandric<\/a> says work by <a href=\"https:\/\/twitter.com\/jar?ref_src=twsrc%5Etfw\">@jar<\/a> was very provocative piece about surveillance and software &#8211; surveillance will be next hot topic in education- ping <a href=\"https:\/\/twitter.com\/Cristinacost?ref_src=twsrc%5Etfw\">@cristinacost<\/a> \ud83d\ude42<\/p>\n<p>&mdash; Helen Crump (@crumphelen) <a href=\"https:\/\/twitter.com\/crumphelen\/status\/996411086529277952?ref_src=twsrc%5Etfw\">May 15, 2018<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>I&#8217;ve been involved in a number of intense discussions on these issues, during my seminars in Glasgow and Sydney, and with colleagues in the UK and North America (including <a href=\"https:\/\/er.educause.edu\/articles\/2017\/8\/digital-sanctuary-protection-and-refuge-on-the-web\">Amy Collier<\/a> and <a href=\"https:\/\/www.veletsianos.com\/2018\/03\/27\/what-do-you-do-in-anticipation-of-social-media-privacy-concerns-and-scandals\/\">George Veletsiano<\/a>s). A highlight was a discussion with David Lyon and <a href=\"http:\/\/www.sscqueens.org\/people\/sava-saheli-singh\">Sava Saheli Singh<\/a>\u00a0at Queen&#8217;s University in Canada last month. David&#8217;s latest work on <a href=\"https:\/\/www.wiley.com\/en-gb\/The+Culture+of+Surveillance%3A+Watching+as+a+Way+of+Life-p-9780745671727\">surveillance culture<\/a> is greatly informing my thinking. Colleagues closer to home are also doing fantastic work in related areas &#8211; <a href=\"https:\/\/wonkhe.com\/blogs\/digital-sanctuary-and-anonymity-on-campus\/\">Sian Bayne on anonymity<\/a>; <a href=\"https:\/\/www.de.ed.ac.uk\/project\/learning-analytics-report-card\">Jeremy Knox on learning analytics<\/a>, <a href=\"https:\/\/www.de.ed.ac.uk\/project\/data-bodies-library\">Phil Sheail on data bodies in the library<\/a>, <a href=\"https:\/\/www.theguardian.com\/education\/shortcuts\/2018\/apr\/30\/classdojo-do-we-really-need-an-app-that-could-make-classrooms-overly-competitive\">Ben Williamson on monitoring in the school classroom<\/a>.<\/p>\n<p>The relationship of trust and technology in higher education is one that, in my view, requires a lot more attention.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"474\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">Tensions between technological possibilities, being surveilled and the importance of trust between institution, teacher and students &#8211; trust needs space for risk <a href=\"https:\/\/twitter.com\/jar?ref_src=twsrc%5Etfw\">@jar<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/nlc2018?src=hash&amp;ref_src=twsrc%5Etfw\">#nlc2018<\/a><\/p>\n<p>&mdash; Tim Fawns (@timbocop) <a href=\"https:\/\/twitter.com\/timbocop\/status\/996320688976875520?ref_src=twsrc%5Etfw\">May 15, 2018<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>It&#8217;s emerging as a key issue not only in the context of technologies of monitoring and surveillance, but in other more surprising places &#8211; like the current blockchain craze, which is generating new discussions about all sort of things&#8230;<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"474\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\"><a href=\"https:\/\/twitter.com\/hashtag\/Blockchain?src=hash&amp;ref_src=twsrc%5Etfw\">#Blockchain<\/a>: Designing the Future of University Value <a href=\"https:\/\/twitter.com\/EdinburghUni?ref_src=twsrc%5Etfw\">@EdinburghUni<\/a> with <a href=\"https:\/\/twitter.com\/NearFutureTeach?ref_src=twsrc%5Etfw\">@NearFutureTeach<\/a> <a href=\"https:\/\/t.co\/BStVVNCSXp\">https:\/\/t.co\/BStVVNCSXp<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/diged?src=hash&amp;ref_src=twsrc%5Etfw\">#diged<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/elearning?src=hash&amp;ref_src=twsrc%5Etfw\">#elearning<\/a> <a href=\"https:\/\/t.co\/DWlsNVTLso\">pic.twitter.com\/DWlsNVTLso<\/a><\/p>\n<p>&mdash; NearFutureTeaching (@NearFutureTeach) <a href=\"https:\/\/twitter.com\/NearFutureTeach\/status\/924942221224407040?ref_src=twsrc%5Etfw\">October 30, 2017<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>&#8230;but perhaps less than it should about what kinds of models of trust (or trustlessness) we are inviting into the academy with these new technologies. Helen Murphy, one of the participants on my<a href=\"https:\/\/digitalfutures.de.ed.ac.uk\"> Digital Futures for Learning course<\/a> this year, developed an excellent Open Educational Resource on this topic:\u00a0<a href=\"https:\/\/educationandtheblockchain.weebly.com\">https:\/\/educationandtheblockchain.weebly.com<\/a><\/p>\n<p>She says:<\/p>\n<div class=\"paragraph\"><strong>the blockchain is often described as &#8216;trustless&#8217;<\/strong>. We might think of what it means to be &#8216;trustless&#8217; in two ways:<\/div>\n<div>\n<div class=\"wsite-multicol\">\n<div class=\"wsite-multicol-table-wrap\">\n<table class=\"wsite-multicol-table\">\n<tbody class=\"wsite-multicol-tbody\">\n<tr class=\"wsite-multicol-tr\">\n<td class=\"wsite-multicol-col\">\n<div class=\"paragraph\"><strong>First, data.<\/strong><br \/>\nThe data in the blockchain is <strong>immutable<\/strong> and transparent, permanent and unalterable. Data in the blockchain is added by consensus, and because it is distributed there is no single copy of the data. In theory, it can be accessed by anyone. So it is trustless in the sense that no trust is required: it can be taken for granted that the data is accurate and permanent.<\/div>\n<\/td>\n<td class=\"wsite-multicol-col\">\n<div class=\"paragraph\"><strong>\u200bSecond, decentralisation.<\/strong><br \/>\nWith the blockchain, there is no need for a centralised authority (such as a bank or university) to verify transactions. Instead all of this verification can be done independently, by the technology and the mechanisms by which it works. So it is trustless because it does not require any trust in these third-party institutions.<\/div>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>(Murphy 2018)<\/p>\n<\/div>\n<\/div>\n<p>I&#8217;m doing some work with colleagues in Digital Education and Information Services on exploring the potential and issues around <a href=\"https:\/\/www.blockcerts.org\">blockcert technology<\/a>, and these questions of trust and trustlessness are figuring strongly.<\/p>\n<p>So, look out for more writing on this from me and others in the near future!<\/p>\n<p>One of the most important things, I think, is beginning to speculate and design futures for higher education that are &#8216;beyond surveillance&#8217;<span style=\"font-weight: 400;\">. Importantly (and thanks to Peter Goodyear in Sydney for highlighting how important this point is), this doesn&#8217;t mean alternatives that require us to return to imagined better analog times \u00a0&#8211; instead, we need to develop trusting <em>digital<\/em> futures and approach our technologies critically and creatively to help us do so. \u00a0I, and others, will be working on this over the next year &#8211; get in touch if you want to discuss!<\/span><\/p>\n<p><strong>References:<\/strong><\/p>\n<p>Lyon, D. 2018.\u00a0The Culture of Surveillance: Watching as a Way of Life. Polity Press.<\/p>\n<p>Murphy, H. 2018. Education and the Blockchain.\u00a0<a href=\"https:\/\/educationandtheblockchain.weebly.com\">https:\/\/educationandtheblockchain.weebly.com<\/a><\/p>\n<p>Ross, J. and Macleod, H. 2018.\u00a0<a href=\"http:\/\/www.networkedlearningconference.org.uk\/abstracts\/ross.html\">Surveillance, (dis)trust and teaching with plagiarism detection technology<\/a>. Proceedsing of\u00a0<a href=\"http:\/\/www.networkedlearningconference.org.uk\">Networked Learning 2018<\/a>, Zagreb.<\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Several of the research and writing projects and discussions I&#8217;ve been involved with this year have directly or indirectly addressed issues of trust and surveillance, and this is an area of work I&#8217;m planning to develop further, along with a number of great colleagues. In several talks this year, at Strathclyde in Glasgow; the University &hellip; <a href=\"http:\/\/jenrossity.net\/blog\/?p=13185\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">surveillance, trust &#038; technology: higher education futures<\/span> <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[87,86],"tags":[],"class_list":["post-13185","post","type-post","status-publish","format-standard","hentry","category-projects","category-research-ideas"],"_links":{"self":[{"href":"http:\/\/jenrossity.net\/blog\/index.php?rest_route=\/wp\/v2\/posts\/13185","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/jenrossity.net\/blog\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/jenrossity.net\/blog\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/jenrossity.net\/blog\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"http:\/\/jenrossity.net\/blog\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=13185"}],"version-history":[{"count":5,"href":"http:\/\/jenrossity.net\/blog\/index.php?rest_route=\/wp\/v2\/posts\/13185\/revisions"}],"predecessor-version":[{"id":13223,"href":"http:\/\/jenrossity.net\/blog\/index.php?rest_route=\/wp\/v2\/posts\/13185\/revisions\/13223"}],"wp:attachment":[{"href":"http:\/\/jenrossity.net\/blog\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=13185"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/jenrossity.net\/blog\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=13185"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/jenrossity.net\/blog\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=13185"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}