154 research outputs found
A technique for designing glossary activities with facial authentication
Nowadays, one of the key challenges for distance education is to be able to verify the students’ identity in order to check if they are actually who they claim to be when they are doing their online tasks and to avoid identity thief. This can be achieved through facial authentication software. In e-learning, thanks to this technology there is a way to confirm that the students are not committing fraud in their studies and besides to improve this kind of education by equaling its validity and prestige to traditional face-to-face education. The goal of this research is to avoid fake users that perform educational tasks on behalf of others in the Learning Management Systems (LMSs), and more specifically to develop a new technique to design activities with glossaries that properly allow control of the student learning process through facial authentication software. The presented technique is composed of several steps that guide instructors in the elaboration of this kind of activities. This work has used Moodle platform for the experimentation, and analyzes the experience of 67 students with the activities designed with the presented technique
Recommended from our members
Cybersecurity of Online Proctoring Systems
The online proctored examinations are adopted exceedingly in all forms of academic education and professional training. AI with Machine Learning technology take the leading role in supporting authentication, authorization, and operational control of proctored online examination. The paper discusses how administrative, physical, and technical controls can help mitigate related cybersecurity vulnerabilities of online proctoring systems (OPS). The paper considers two classes of OPS: fully automated AI-enabled systems and hybrid systems (automated AI-enabled with an expert live proctor in control). Based on the review of 20 online proctoring systems, the paper discusses methods and techniques of multi-factor authentication and authorizations, including the use of challenge-response, biometrics (face and voice recognition), and blockchain technology. The discussion of operational controls includes the use of lockdown browsers, webcam detection of behavioral signs of fraud, endpoint security, VPN and VM, screen-sharing and keyboard listening programs, technical controls to mitigate the absence of spatial (physical area) controls, compliance with regulations (GDPR), etc. Other topics discussed include confidentiality of the exam content, logging of control data, video and sound recording for auditing, limitations of endpoint-based security protection and detection techniques of behavior-based cheating and the effect of new intrusive technology on students’ privacy. In conclusion, the paper lists advanced features of online proctoring systems
DIGITAL PROCTORING IN HIGHER EDUCATION: A SYSTEMATIC LITERATURE REVIEW
To improve the academic integrity of online examination, digital proctoring systems have been implemented in higher education worldwide, particularly during the COVID-19 pandemic. In this paper, we conducted a literature review of the research on digital proctoring in higher education. We found 115 relevant publications in nine databases. We applied topic modeling methods to analyze the corpus which resulted in eight topics. The review shows that the previous studies focus largely on the systems’ development, adoption of the systems, the effects of proctored online exams on students’ performance, and the legal, ethical, security, and privacy issues of digital proctoring. The annual topic trends indicate future research concerns, such as systems’ development, online programs (MOOCs) and proctoring, along with various issues of using digital proctoring. The results of the review provide useful insights as well as implications for future research on digital proctoring, a crucial process for digitalizing higher education
CHEATING DETECTION IN ONLINE EXAMS BASED ON CAPTURED VIDEO USING DEEP LEARNING
Today, e-learning has become a reality and a global trend imposed and accelerated by the COVID-19 pandemic. However, there are many risks and challenges related to the credibility of online exams which are of widespread concern to educational institutions around the world. Online exam system continues to gain popularity, particularly during the pandemic, due to the rapid expansion of digitalization and globalization. To protect the integrity of the examination and provide objective and fair results, cheating detection and prevention in examination systems is a must. Therefore, the main objective of this thesis is to develop an effective way of detection of cheating in online exams. In this work, a system to track and prevent attempts to cheat on online exams is developed using artificial intelligence techniques. The suggested solution uses the webcam that is already connected to the computer to record videos of the examinee in real time and afterwards analyze them using different deep learning methods to find best combinations of models for face detection and classification if cheating/not cheating occurred. To evaluate the system, we use a benchmark dataset of exam videos from 24 participants who represented examinees in online exam. An object detection technique is used to detect face appeared in the image and crop the face portion, and then a deep learning based classification model is trained from the images to classify a face as cheating or not cheating. We have proposed an effective combination of data preprocessing, object detection, and classification models to obtain high detection accuracy. We believe that the suggested invigilation methodology can be used in colleges, institutions, and schools to look for and keep an eye on suspicious student behavior. Hopefully, by putting the proposed invigilation method into place, we can aid in eliminating and reducing cheating incidences as it undermines the integrity and fairness of the educational system
Recommended from our members
A case study on the decentralisation of lifelong learning using blockchain technology
Blockchain technology provides a decentralised peer-to-peer infrastructure, supporting openness, transparency, accountability, identity management and trust. As such, the Blockchain has the potential to revolutionise education in a number of ways. Blockchain technology offers opportunities to thoroughly rethink how we find educational content and training services online, how we register and pay for them, as well as how we get accredited for what we have learned and how this accreditation affects our career trajectory. This paper explores a case study on the decentralisation of lifelong learning using Blockchain technology. In particular, we investigate the different scenarios and requirements for making online education and lifelong learning more open and decentralised, while placing lifelong learners in control of their learning process and its associated data. Additionally, we discuss various approaches to the Semantic Blockchain and the applications of these approaches on education
Security and Usability of Authentication by Challenge Questions in Online Examination
Online examinations are an integral component of many online learning environments and a high-stake process for students, teachers and educational institutions. They are the target of many security threats, including intrusion by hackers and collusion. Collu-sion happens when a student invites a third party to impersonate him/her in an online test, or to abet with the exam questions. This research proposed a profile-based chal-lenge question approach to create and consolidate a student’s profile during the learning process, to be used for authentication in the examination process. The pro-posed method was investigated in six research studies using a usability test method and a risk-based security assessment method, in order to investigate usability attributes and security threats.
The findings of the studies revealed that text-based questions are prone to usability issues such as ambiguity, syntactic variation, and spelling mistakes. The results of a usability analysis suggested that image-based questions are more usable than text-based questions (p < 0.01). The findings identified that dynamic profile questions are more efficient and effective than text-based and image-based questions (p < 0.01). Since text-based questions are associated with an individual’s personal information, they are prone to being shared with impersonators. An increase in the numbers of chal-lenge questions being shared showed a significant linear trend (p < 0.01) and increased the success of an impersonation attack. An increase in the database size decreased the success of an impersonation attack with a significant linear trend (p < 0.01). The security analysis of dynamic profile questions revealed that an impersonation attack was not successful when a student shared credentials using email asynchronously. However, a similar attack was successful when a student and impersonator shared information in real time using mobile phones. The response time in this attack was significantly different when a genuine student responded to his challenge questions (p < 0.01). The security analysis revealed that the use of dynamic profile questions in a proctored exam can influence impersonation and abetting. This view was supported by online programme tutors in a focus group study
An Examination of Online Learning Security Requirements Within a Virtual Learning Environment of an Irish University
As the adoption of e-learning and need for lifelong learning increases, it is vital the administrator of a virtual learning environment continually ensures reliable and secure data. This case study engaged in the initial steps of analyzing the use and security needs of a virtual learning service within a university of Ireland. The university provided two virtual learning services which were comparatively analyzed, from a security and data protection perspective. In addition, survey results obtained from the university user community for one of the e-learning services were examined. Findings from the study were presented as user security requirements and recommendations, when planning future security initiatives of the e-learning services within the university
Recommended from our members
Impact of access control and copyright in e-learning from user’s perspective in the United Kingdom
This thesis was submitted for the award of Doctor of Philosophy and was awarded by Brunel University LondonThe widespread adoption of E-Learning has largely been driven by the recommendations of educational technologists seeking to convey the benefits of E-Learning as a valuable accessory to teaching and possible solution for distance-based education. Research in the E-Learning domain has mainly focused on providing and delivering content andinfrastructure. Security issues are usually not taken as central concern in most implementations either because systems are usually deployed in controlled environments, or because they take the one-to-one tutoring approach, not requiring strict security measures. The scope of this research work is to investigate the impact of Access Control and Copyright in E-Learning system. An extensive literature review, theories from the field of information systems, psychology and cognitive sciences, distance and online learning, as well as existing E-Learning models show that research in E-learning is still hardly concerned with the issues of security. It is obvious that E-learning receives a new meaning as technology advances and business strategies change. The trends of learning methods have also led to the adjustment of National Curriculum and standards. However, research has also shown that any strategy or development supported by the Internet requires security and is therefore faced with challenges. This thesis is divided into six Chapters. Chapter 1 sets the scene for the research rationale and hypotheses, and identifies the aims and objectives. Chapter 2 presents the theoretical background and literature review. Chapter 3 is an in-depth review of the methods and methodology with clear justification of their adaptation and explains the underlying principles. Chapter 4 is based on the results and limitations obtained from the six case studies observations supported with literature review and ten existing models, while Chapter 5 is focused on the questionnaire survey. Chapter 6 describes the proposed Dynamic E-Learning Access Control and Copyright Framework (DEACCF) and the mapping of the threats from the Central Computing and Telecommunications Agency (CCTA) Risk Analysis and Management Method (CRAMM) to Annualised Loss Expectancy (ALE). Chapter 7 presents the conclusions and recommendations, and the contribution to knowledge with further development plans for future work
Near Field Communication Applications
Near Field Communication (NFC) is a short-range, low power contactless communication between NFC-enabled devices that are held in the closed proximity to each other. NFC technology has been moving rapidly from its initial application areas of mobile payment services and contactless ticketing to the diversity of new areas. Three specific NFC tags highlighted in the thesis have different structures in terms of memory, security and usage in different applications. NFC information tags exploit the data exchange format NDEF standardized by NFC Forum.
NFC applications are rapidly stepping into novel and diverse application areas. Often they are deployed in combination with different devices and systems through their integrability and adaptability features.
The diverse application areas where NFC tags and cards are used cover smart posters, contactless ticketing, keys and access control, library services, entertainment services,
social network services, education, location based services, work force and retail management and healthcare.
In designing different NFC applications, it is necessary to take into consideration different design issues such as to choosing the NFC tools and devices according to the technical requirements of the application, considering especially the memory, security and price factors as well as their relation to the purpose and usage of the final product. The security aspect of the NFC tags is remarkably important in selecting the proper NFC device. The race between hackers attacking and breaking the security systems of programmable high level products and manufacturers to produce reliable secure systems
and products seems to never end. This has proven to be case, for example, for trying MIFARE Ultralight and DESFire MF3ICD40 tags.
An important consideration of studying the different applications of NFC tags and cards during the thesis work was to understand the ubiquitous character of NFC technology.Lähitunnistus yhteys tekniikka (NFC) on lyhyen tähtäimen, pienitehoinen, kontaktiton yhteydenpito NFC yhteensopivien laitteiden välillä, jossa laitteet pidetään toistensä välittömässä läheisyydessä tiedon siirtämiseksi niiden välillä. NFC-teknologia on siirtynyt nopeasti sen alkuperäisiltä toimialueilta eli mobiili maksupalvelujen ja kontaktittomien lippujen sovellusalueilta moninaisille uusille alueille. Kolmella NFC tagillä, joita on käsitelty tässä tutkielmassa, on muistin, turvallisuuden ja käytön kannalta erilaisiä rakenteita, joita käytetään eri sovelluksissa. NFC-tagit käyttävät tiedonvälityksessä NFC Forumin standardoimaa NDEF-tiedonvaihtoformaattia.
NFC sovellukset esiintyvät yhä enenevässä määrin nopeasti kehyttyvillä, uudenlaisilla ja monipuolisilla sovellusalueilla, usein yhdessä eri laitteiden ja järjestelmien kanssa. NFC on käytettävissä erinäisten laitteiden kanssa erilaisissa järjestelmäympäristöissä. Monipuoliset sovellusalueet, joissa muun muassa NFC-tagejä ja -kortteja käytetään sisältävät seuraavanlaisia sovelluksia: älykkäät julisteet, kontaktittomat liput, avaimet ja pääsynvalvonta, kirjastopalvelut, viihdepalvelut, sosiaalisen verkoston palvelut, kasvatukseen ja koulutukseen liittyvät palvelut, sijaintiperustaiset palvelut, työvoiman ja vähittäiskaupan hallinto-palvelut ja terveyspalvelut.
Erilaisten NFC-sovelluksien suunnittelussa on väistämätöntä ottaa erilaisia suunnitteluasioita huomioon kuten valita NFC-työkalut ja laitteet sovelluksen teknisten vaatimusten mukaan. Erilaiset tärkeät tekijät kuten muisti, tietoturvallisuusominaisuudet ja hinta ja niiden kaikkien
toimivuus lopputuotteen kannalta on otettava huomioon. Tietoturvallisuusnäkökohta on erityisen tärkeä oikean NFC laitteen valitsemisessa, sillä käynnissä on loputon kilpajuoksu hakkerien, jotka yrittävät rikkoa ohjelmoitavien korkeatasoisten laitteiden ja tuotteiden
tietoturvajärjestelmiä, ja valmistajien, jotka pyrkivät tuottamaan luotettavia varmoja järjestelmiä, välillä. Tietoturvariskiin liittyviä ongelmia on löydetty esimerkiksi MIFARE Ultralight ja DESFire MF3ICD40 tageista.
Tärkeä havainto, joka saatiin erilaisten NFC sovelluksien tutkimisesta, oli oivaltaa NFCteknologian potentiaalinen kaikkialle ulottuva, yleiskäyttöinen luonne
- …