My research project
In this video, four MA students present their MA projects concerning adolescents' use of English in and outside school: Shilan Ahmadian (2018), Katharina Køber Garvoll (2017), Anja Ramfjord Isaksen (2018), and Sturla Sagli (2017). The links are to their MA theses, which are available to everyone as open access publications.
My GDPR moment
In the videos below, nine MA students talk about their GDPR moment - their first hand experiences with how to protect the privacy of teachers and students who participated in the VOGUE research project, in line with the new GDPR requirements. We present these GDPR moments as five steps that were followed before, during and after data collection.
STEP 1 - GDPR Awareness
In the first video, visiting MA student Julia Reich from Germany talks about the importance of teaching students how to prevent research data from falling into the wrong hands.
(Video production: Larissa Lily/Magnus Heie, ILS)
STEP 2 - Planning Data Collection
Here, MA students Anna Verånica Andreassen and Kjersti Øvereng emphasise how they carefully planned how to transfer audio recordings from interviews thorough a secure dictaphone app developed by the University of Oslo. More information about the app here.
(Video production: Larissa Lily/Magnus Heie, ILS)
STEP 3 - Before, During and After Data Collection
In this video, MA students Julie Darras and Sindre Andre Abelvik explain how they secured data protection by following strict routines before, during and after recording English lessons at school, and online gaming sessions in students' homes.
(Video production: Larissa Lily/Magnus Heie, ILS)
STEP 4 - Transportation of Data
Here, MA students Kristine Masvie and Vilde Haug Almestad adress the precautions they took to secure participants' privacy when travelling with encrypted data between the research site and the Teaching Learning Video Lab at ILS, for final storage.
(Video production: Larissa Lily/Magnus Heie, ILS)
STEP 5 - Anonymising the Data
In this video, MA students Thea Holm and Ingrid Handeland explain how they secured participants' anonymity after data collection by replacing names with codes across a range of data sources as a final step in the data storage procedure.
(Video production: Larissa Lily/Magnus Heie, ILS)