Context of practice
Type of context: face-to-face and blended teaching
Type of teaching: Degree in History of Art
Course: First year
Problem and objectives
Sending written work with images and Power Point presentations projected by the students during the practical sessions. Although it is repeatedly pointed out in class and appears in writing in Moodle, some students send the requested files via private mail or pretend to deliver them on external media such as pendrive devices.
Tools and resources
A specific mailbox is enabled on the Studium platform, which is accessed exclusively with institutional credentials, so that students can upload files. As it is a secure space, with secure password access and restricted to the USAL university community, it is the ideal tool.
Description of practice
To solve the problem, I do not download any document sent from external means or outside the platform enabled for this purpose in Studium. If necessary, I send an email from and to the institutional account to indicate/remind students of the official and secure method.
Expected results
We hope to encourage students from the first year of the Degree to use only official and secure means, and in their corresponding sections within Moodle.
Strengths or advantages
The first advantage is to avoid any leakage of data outside the scope of the subject and the institution. Possible means of contamination are also avoided by breaking the chain of cybersecurity guaranteed by Studium and institutional mail. Lastly, the above means are used to avoid saturating e-mail, to keep papers and presentations in the same repository and to take advantage of the Turnitin anti-plagiarism programme.
Risks or weaknesses
Some students disregard the guidelines and insist on sending material and communicating through external means. In many cases, these are foreign students or students in the process of enrolling who do not yet have institutional e-mail and, consequently, access to Studium. In such situations, I either extend the deadline or repeat in the classroom that I only accept @usal.es mail and Moodle reception.
Need for support
Thanks to the IUCE tutorials and courses on Studium, we do not need extra help to carry out this cybersecurity and data protection strategy, which is really simple, but must be complied with.
Others:
The vulnerability exposed in the course on cybersecurity and data protection, both for teachers and students, has been an important wake-up call not to take lightly these kinds of details that previously seemed unimportant or without apparent consequences. For reasons of practicality and lack of knowledge, we have been involved in situations of unprotected personal information and opportunities for infection of our devices.