76 research outputs found

    A Dynamic Profile Questions Approach to Mitigate Impersonation in Online Examinations

    Get PDF
    © The Author(s) 2018 Open Access This article is distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.Online examinations are an integral component of many online learning environments, which face many security challenges. Collusion is seen as a major security threat to such examinations, when a student invites a third party to impersonate or abet in a test. This work aims to strengthen the authentication of students via the use of dynamic profile questions. The study reported in this paper involved 31 online participants from five countries over a five-week period. The results of usability and security analysis are reported. The dynamic profile questions were more usable than both the text-based and image-based questions (p < 0.01). An impersonation abuse scenario was simulated using email and mobile phone. The impersonation attack via email was not successful, however, students were able to share answers to dynamic profile questions with a third party impersonator in real time, which resulted in 93% correct answers. The sharing of information via phone took place in real time during an online test and the response time of an impersonator was significantly different (p < 0.01) than a student. The study also revealed that a response time factor may be implemented to identify and report impersonation attacks.Peer reviewe

    A Study into the Usability and Security Implications of Text and Image Based Challenge Questions in the Context of Online Examination

    Get PDF
    Open Access This article is distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.Online examinations are an integral component of online learning environments and research studies have identified academic dishonesty as a critical threat to the credibility of such examinations. Academic dishonesty exists in many forms. Collusion is seen as a major security threat, wherein a student invites a third party for help or to impersonate him or her in an online examination. This work aims to investigate the authentication of students using text-based and image-based challenge questions. The study reported in this paper involved 70 online participants from nine countries completing a five week online course and simulating an abuse case scenario. The results of a usability analysis suggested that i) image-based questions are more usable than text-based questions (p < 0.01) and ii) using a more flexible data entry method increased the usability of text-based questions (p < 0.01). An impersonation abuse scenario was simulated to test the influence of sharing with different database sizes. The findings revealed that iii) an increase in the number of questions shared for impersonation increased the success of an impersonation attack and the results showed a significant linear trend (p < 0.01). However, the number of correct answers decreased when the attacker had to memorize and answer the questions in an invigilated online examination or their response to questions was timed. The study also revealed that iv) an increase in the size of challenge question database decreased the success of an impersonation attack (p < 0.01).Peer reviewe

    Privacy and Usability of Image and Text Based Challenge Questions Authentication in Online Examination

    Get PDF
    In many online examinations, physical invigilation is often replaced with traditional authentication approaches for student identification. Secure and usable authentication approaches are important for high stake online examinations. A Profile Based Authentication Framework (PBAF) was developed and implemented in a real online learning course embedded with summative online examination. Based on users’ experience of using the PBAF in an online course, online questionnaires were used to collect participants' feedback on effectiveness, layout and appearance, user satisfaction, distraction and privacy concerns. Based on overall findings of the quantitative analysis, there was a positive feedback on the use of a hybrid approach utilizing image and text based challenge questions for better usability. However, the number of questions presented during learning and examination processes were reported to be too many and caused distraction. Participants expressed a degree of concern on sharing personal and academic information with little or no privacy concern on using favorite question

    Evaluating Security and Usability of Profile Based Challenge Questions Authentication in Online Examinations

    Get PDF
    © 2014 Ullah et al.; licensee Springer. This is an Open Access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/2.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly credited.Student authentication in online learning environments is an increasingly challenging issue due to the inherent absence of physical interaction with online users and potential security threats to online examinations. This study is part of ongoing research on student authentication in online examinations evaluating the potential benefits of using challenge questions. The authors developed a Profile Based Authentication Framework (PBAF), which utilises challenge questions for students’ authentication in online examinations. This paper examines the findings of an empirical study in which 23 participants used the PBAF including an abuse case security analysis of the PBAF approach. The overall usability analysis suggests that the PBAF is efficient, effective and usable. However, specific questions need replacement with suitable alternatives due to usability challenges. The results of the current research study suggest that memorability, clarity of questions, syntactic variation and question relevance can cause usability issues leading to authentication failure. A configurable traffic light system was designed and implemented to improve the usability of challenge questions. The security analysis indicates that the PBAF is resistant to informed guessing in general, however, specific questions were identified with security issues. The security analysis identifies challenge questions with potential risks of informed guessing by friends and colleagues. The study was performed with a small number of participants in a simulation online course and the results need to be verified in a real educational context on a larger sample sizePeer reviewedFinal Published versio

    Design, Privacy and Authentication of Challenge Questions in Online Examinations

    Get PDF
    Online examination is an essential part of the online learning and secure authentication is considered vital for the success of online learning. This study is part of an ongoing research on student authentication approaches and the use of challenge questions in online examination authentication. This paper presents the results of an empirical study based on “Profile Based Authentication Framework” (PBAF), which uses challenge questions for student authentication in online examination. The PBAF uses challenge questions related to personal, academic and professional information. These questions inform the usability, security and privacy of PBAF authentication approach. The results presented here summarizes the impact of questions design on the usability based on data collected from challenge questions authentication and a post-experiment survey on the data privac

    The Effective Use of Information Technology and Interactive Activities to Improve Learner Engagement

    Get PDF
    Student engagement in the learning process is the key to successful delivery of teaching and learning. Teachers face several challenges to engage learners in different disciplines, including computer science. This research conducts a review of BSc (Computer Science) programmes and introduces interactive activities to enhance learner engagement. The study was conducted using a repeated measure design involving 24 participants. The findings revealed that the use of technology, and collaborative and interactive activities in groups may positively influence learner engagement. The participants&rsquo; feedback before and after introduction of group tasks and interactive activities showed a significant (p &lt; 0.001) and increasing trend in response to questions-related learner engagement. The participants agreed that their learning experience and engagement enhanced with the use of technology and interactive and collaborative activities

    A Classification of Threats to Remote Online Examinations

    Get PDF
    This document is the Accepted Manuscript version of the following paper: Abrar Ullah, Hannah Xiao, and Trevor Barker, ‘A Classification of Threats to Remote Online Examinations’, in Proceedings of the 2016 IEEE 7th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON), 13-15 October 2016, Vancouver, Canada. Published by IEEE, available online via http://ieeexplore.ieee.org/document/7746085/ Copyright © 2016, IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.Summative online examinations is a high stake process which faces many security threats. The lack of face-toface interaction, monitoring or invigilation motivates many threats, which includes intrusion by hackers and collusion by students. This paper is based on a survey of literature to present a threat classification using security abuse case scenarios. Collusion is one of the challenging threats, when a student invites a third party collaborator to impersonate or aid a student to take an online test. While mitigation of all types of threats is important, the risk of collusion is increasingly challenging because it is difficult to detect such attacks.Final Accepted Versio

    Security and Usability of Authentication by Challenge Questions in Online Examination

    Get PDF
    Online examinations are an integral component of many online learning environments and a high-stake process for students, teachers and educational institutions. They are the target of many security threats, including intrusion by hackers and collusion. Collu-sion happens when a student invites a third party to impersonate him/her in an online test, or to abet with the exam questions. This research proposed a profile-based chal-lenge question approach to create and consolidate a student’s profile during the learning process, to be used for authentication in the examination process. The pro-posed method was investigated in six research studies using a usability test method and a risk-based security assessment method, in order to investigate usability attributes and security threats. The findings of the studies revealed that text-based questions are prone to usability issues such as ambiguity, syntactic variation, and spelling mistakes. The results of a usability analysis suggested that image-based questions are more usable than text-based questions (p < 0.01). The findings identified that dynamic profile questions are more efficient and effective than text-based and image-based questions (p < 0.01). Since text-based questions are associated with an individual’s personal information, they are prone to being shared with impersonators. An increase in the numbers of chal-lenge questions being shared showed a significant linear trend (p < 0.01) and increased the success of an impersonation attack. An increase in the database size decreased the success of an impersonation attack with a significant linear trend (p < 0.01). The security analysis of dynamic profile questions revealed that an impersonation attack was not successful when a student shared credentials using email asynchronously. However, a similar attack was successful when a student and impersonator shared information in real time using mobile phones. The response time in this attack was significantly different when a genuine student responded to his challenge questions (p < 0.01). The security analysis revealed that the use of dynamic profile questions in a proctored exam can influence impersonation and abetting. This view was supported by online programme tutors in a focus group study

    Survival Probabilities and Lifestyle of Lung and Throat Cancer Patients in Bangladesh

    Get PDF
    Purpose: In this study, we aimed to find out the survival probabilities and lifestyle of lung and throat cancer patients in Bangladesh. Methods: The dataset was collected from the several hospitals of eight divisional cities in Bangladesh using a semi-structured questionnaire in two time points initially and after 12 months. Descriptive statistical tools, Multiple Reponses analysis, Factor analysis and Kaplan –Meier survival curve were used to analyze the data. Results: The results revealed that prevalence of lung cancer is 6.7% and for throat it is 9.6%. It was observed that whose father had lung or throat cancer; they have more chance to be affected by the cancer. It was also found that median survival time of lung cancer (18.88 months) patients is more than that of throat cancer ( 10.67 months)  patients.  Communalities of Smoking (0.788) and fast food (0.785) were found highest compare to other lifestyle factors. Conclusions: Taken together, we conclude that survival probabilities of lung cancer patients are higher than throat cancer patients and smoking and fast food are highly related with lung and throat cancer. Therefore, we should avoid smoking and fast food to improve public health sectors in Bangladesh

    Causal Relationship between Foreign Direct Investment, Trade and Economic Growth: A Cross Country Analysis

    Get PDF
    The study empirically investigated the casual link between foreign direct investment, trade and economic growth in case of Pakistan, India and Bangladesh. For empirical purpose we used annual time series data for the years 1980-2010. In this study it is tried to find out that is there casual link between FDI trade and GDP in case of selected countries, and if causality exists then what is the direction of causality. ADF unit root test is used to check the stationarity of the data. Granger causality test has been used for estimating the casual relationship. Auto Regression Distributive Lag is used to estimate long run and short run relation among the variables. The empirical results revealed that all the variables are integrated of order one. Empirical results of Granger causality test revealed that in case of Pakistan there is bidirectional causality between FDI and economic growth and unidirectional causality from FDI to trade. In case of India there is unidirectional causality from economic growth to remittances and from remittances to trade. Furthermore, in case of Bangladesh there is unidirectional relationship between FDI to economic growth, trade to economic growth, remittances to economic growth and trade to FDI while bidirectional causality from between remittances and FDI and remittances and trade. Keywords: Gross Domestic Product; Foreign Direct Investment; Exports; Granger Causalit
    • 

    corecore