Vol. 26 No. 2 (2012)
Research Articles

We are not numbers: The use of identification codes in online learning

Krista Francis
University of Calgary
Bio
Susan Darlene Moisey
Athabasca University
Bio

Published 2012-12-03

Keywords

  • Distance learning,
  • identity,
  • identification code,
  • FOIP,
  • privacy,
  • asynchronous text discussion
  • ...More
    Less

How to Cite

Francis, K., & Moisey, S. D. (2012). We are not numbers: The use of identification codes in online learning. International Journal of E-Learning & Distance Education Revue Internationale Du E-Learning Et La Formation à Distance, 26(2). Retrieved from https://ijede.ca/index.php/jde/article/view/801

Abstract

This paper discusses students’ experiences with the use of identification codes in a graduate course delivered asynchronously via the Internet. While teaching an introductory masters level graduate course in distance learning, the authors discovered that the learning management system, Moodle, was programmed to display identification codes rather than student names when in the Student View mode. Consequently, when students participated in Computer-Mediated Communication (CMC) text discussions, their posts were attributed to their computer-generated IDs. Investigation into the identification protocol revealed that the institution had adopted a policy of using identification codes to comply with Alberta’s Freedom of Information and Protection of Privacy (FOIP) Act. We wondered what it meant to graduate students to be identified by a computer generated code rather than by name. In the context of an asynchronous CMC discussion forum, we asked how the use of an identification code affected students’ sense of identity within the online learning environment. Analysis of their responses revealed categories relating to personal identity (depersonalization and anonymity), social identity (community, learning, and engagement), and questions concerning suitable names for identification purposes. Most learners felt strongly that they should not be known through a numeric code and that their name was more personable. Résumé Cette étude traite d’expériences vécues par des étudiants qui ont utilisé des codes d’identification dans un cours d’études supérieures donné de façon asynchrone par l’intermédiaire d’Internet. C’est en donnant un cours d’introduction en matière d’éducation à distance au niveau de la maîtrise que les auteurs ont découvert que le système de gestion de l’apprentissage, Moodle, était programmé pour afficher les codes d’identification plutôt que les noms d’étudiants lorsqu’on était en mode "Student View". Par conséquent, lorsque les étudiants participaient à une discussion de texte par voie de communication électronique, leurs postes étaient attribués à leurs identifiants générés par ordinateur. Une enquête sur le protocole d’identification a révélé que l’établissement avait adopté l’utilisation des codes d’identification pour se conformer à la loi sur l’accès à l’information et la protection des renseignements personnels (Freedom of Information and Protection of Privacy (FOIP) Act) de l’Alberta. Nous nous sommes demandé ce que cela pouvait représenter pour les étudiants d’études supérieures d’être identifiés par un code généré électroniquement, plutôt que par leur nom. Dans le contexte d’un forum de discussion asynchrone par ordinateur, nous leur avons demandé comment l’utilisation d’un code d’identité les influençait au niveau de leur sentiment d’identité dans le cadre de l’environnement d’apprentissage en ligne. L’analyse de leurs réponses a révélé diverses catégories en lien avec l’identité personnelle (dépersonnalisation et anonymat), l’identité sociale (communauté, apprentissage et implication), ainsi que des questions relatives à quels noms pourraient convenir à des fins d’identification. La plupart des étudiants étaient fortement d’avis qu’ils ne devraient pas être identifiés par un code numérique et que leur nom était un mode d’identification beaucoup plus sympathique

References

  1. Agarwal, R., & Ma, M. (2007). Through a glass darkly: Information technology design, identity verification, and knowledge contribution in online communities. Information Systems Research, 18(1), 42.
  2. Anderson, T. (2008). Social software technologies in distance education: Maximizing learning freedoms. In T. Evans, M. Haughey, & D. Murphy (Eds.), International handbook of distance education (pp. 167–184). Bingley, UK: Emerald.
  3. Barbour, M. K., & Hill, J. (2011). What are they doing and how are they doing it? Rural student experiences in virtual schooling. The Journal of Distance Education, 25(1). Retrieved from http://www.jofde.ca/index.php/jde/article/viewArticle/725/1248
  4. Blanchard, A. L., Welbourne, J. L., & Boughton, M. D. (2011). A model of online trust. Information, Communication & Society, 14(1), 76–106. doi:10.1080/13691181003739633
  5. Cohen, J., & Metzger, M. (1998). Social affiliation and the achievement of ontological security through interpersonal and mass. Critical Studies in Mass Communication, 15(1), 41.
  6. Conrad, D. (2002). Deep in the hearts of learners: Insights into the nature of online community. The Journal of Distance Education, 17(1), 1–19. Retrieved http://www.jofde.ca/index.php/jde/article/view/133
  7. Conrad, D. (2005). Building and Maintaining Community in Cohort-Based Online Learning. Journal of Distance Education, 20(1). Retrieved from http://www.jofde.ca/index.php/jde/article/viewArticle/78
  8. Crabhill, S. L. (2010). Situating social identity through language convergence in online groups. In T. Dumova & R. Fiordo (Eds.), Handbook of research on social interaction technologies and collaboration software: Concepts and trends (pp. 315–26). IGI Global.
  9. Gadamer, H.-G. (2004). Truth and method. (J. Weinsheimer & D. G. Marshall, Trans.) (Second.). New York, NY: Continuum International Publishing Group.
  10. Government of Alberta Freedom of Information and Protection of Privacy. , Chapter F-25 (2008). Retrieved from http://www.qp.alberta.ca/
  11. Gunawardena, C. N., & Zittle, F. J. (1997). Social presence as a predictor of satisfaction within a computer‐mediated conferencing environment. American Journal of Distance Education, 11(3), 8–26. doi:10.1080/08923649709526970
  12. Heisler, J. M., & Crabhill, S. L. (2006). Who are “stinkybug” and “Packerfan4”? Email pseudonyms and participants’ perceptions of demography, productivity, and personality. Journal of Computer-Mediated Communication, 12(1), 114–135. doi:10.1111/j.1083-6101.2006.00317.x
  13. Ke, F., Chávez, A. F., Causarano, P.-N. L., & Causarano, A. (2011). Identity presence and knowledge building: Joint emergence in online learning environments? International Journal of Computer-Supported Collaborative Learning, 6(3), 349–370. doi:10.1007/s11412-011-9114-z
  14. Moisey, S. D., Neu, C., & Cleveland-Innes, M. (2008). Community building and computer-mediated conferencing. The Journal of Distance Education, 22(2). Retrieved from http://www.jofde.ca/index.php/jde/article/view/10
  15. Owens, J., Hardcastle, L. A., & Richardson, B. (2009). Learning From a distance: The experience of remote students. The Journal of Distance Education, 23(3), 53–74. Retrieved from http://www.jofde.ca/index.php/jde/article/viewArticle/596/988
  16. Oxford University Press. (2011). Oxford English Dictionary (Online.). Oxford ; New York, N.Y.: Oxford University Press.
  17. Rogers, P., & Lea, M. (2005). Social presence in distributed group environments: the role of social identity. Behaviour & Information Technology, 24(2), 151–158. doi:10.1080/01449290410001723472
  18. Ross, J., Crane, C., & Roberston, D. (1995). Equity of access to computer-mediated distance education. The Journal of Distance Education, 10(2), 17–32. Retrieved from http://www.jofde.ca/index.php/jde/article/view/235
  19. Rourke, L., Anderson, T., Garrison, D. R., & Archer, W. (1999). Assessing social presence in asynchronous text-based computer conferencing. Journal of Distance Education, 14(2). Retrieved from http://www.jofde.ca/index.php/jde/article/view/153
  20. Sfard, A. (2008). Thinking as communication. Cambridge: Cambridge University Press.
  21. Sfard, A., & Prusak, A. (2005). Identity that makes a difference: Substantial learning as closing the gap between actual and designated identities. International Group for the Psychology of Mathematics Education (Vol. 1, pp. 37–52). Presented at the Conference of the International Group for the Psychology of Mathematics Education, Melbourne, Australia: International Group for the Psychology of Mathematics Education.
  22. Skeat, W. W. (1882). An etymological dictionary of the English language. London, UK: Oxford University Press. Retrieved from http://books.google.ca/ebooks/reader?id=A4M_AAAAMAAJ&printsec=frontcover&output=reader&pg=GBS.PP1
  23. Strauss, A., & Corbin, J. (1998). Basics of qualitative research techniques and procedures for developing grounded theory (Vol. second). Thousand Oaks, California: Sage Publications Ltd.
  24. Surry, D. W., Grubb, A. G., Ensminger, D. C., & Ouimette, J. (2009). Implementation of web-based learning in colleges of education: Barriers and enablers. Canadian Journal of Learning and Technology / La revue canadienne de l’apprentissage et de la technologie, 35(3). Retrieved from http://www.cjlt.ca/index.php/cjlt/article/view/543/266
  25. Turkle, S. (1995). Life on the screen: Identity in the age of the Internet. New York, NY: Simon & Schuster, Inc.
  26. Walther, J. B. (1992). Interpersonal Effects in Computer-Mediated Interaction: A Relational Perspective. Communication Research, 19(1), 52–90.
  27. Wenger, E. (1999). Communities of practice: learning, meaning, and identity. Cambridge University Press.