scholarly journals Secure E-Examination Systems Compared: Case Studies from Two Countries

10.28945/3705 ◽  
2017 ◽  
Vol 16 ◽  
pp. 107-125
Author(s):  
Andrew E. Fluck ◽  
Olawale Surajudeen Adebayo ◽  
Shafi'i Muhammad Abdulhamid

Aim/Purpose: Electronic examinations have some inherent problems. Students have expressed negative opinions about electronic examinations (e-examinations) due to a fear of, or unfamiliarity with, the technology of assessment, and a lack of knowledge about the methods of e-examinations. Background: Electronic examinations are now a viable alternative method of assessing student learning. They provide freedom of choice, in terms of the location of the examination, and can provide immediate feedback; students and institutions can be assured of the integrity of knowledge testing. This in turn motivates students to strive for deeper learning and better results, in a higher quality and more rigorous educational process. Methodology : This paper compares an e-examination system at FUT Minna Nigeria with one in Australia, at the University of Tasmania, using case study analysis. The functions supported, or inhibited, by each of the two e-examination systems, with different approaches to question types, cohort size, technology used, and security features, are compared. Contribution: The researchers’ aim is to assist stakeholders (including lecturers, invigilators, candidates, computer instructors, and server operators) to identify ways of improving the process. The relative convenience for students, administrators, and lecturer/assessors and the reliability and security of the two systems are considered. Challenges in conducting e-examinations in both countries are revealed by juxtaposing the systems. The authors propose ways of developing more effective e-examination systems. Findings: The comparison of the two institutions in Nigeria and Australia shows e-examinations have been implemented for the purpose of selecting students for university courses, and for their assessment once enrolled. In Nigeria, there is widespread systemic adoption for university entrance merit selection. In Australia this has been limited to one subject in one state, rather than being adopted nationally. Within undergraduate courses, the Nigerian scenario is quite extensive; in Australia this adoption has been slower, but has penetrated a wide variety of disciplines. Recommendations for Practitioners: Assessment integrity and equipment reliability were common issues across the two case studies, although the delivery of e-examinations is different in each country. As with any procedural process, a particular solution is only as good as its weakest attribute. Technical differences highlight the link between e-examination system approaches and pedagogical implications. It is clear that social, cultural, and environmental factors affect the success of e-examinations. For example, an interrupted electrical power supply and limited technical know-how are two of the challenges affecting the conduct of e-examinations in Nigeria. In Tasmania, the challenge with the “bring your own device” (BYOD) is to make the system operate on an increasing variety of user equipment, including tablets. Recommendation for Researchers: The comparisons between the two universities indicate there will be a productive convergence of the approaches in future. One key proposal, which arose from the analysis of the existing e-examination systems in Nigeria and Australia, is to design a form of “live” operating system that is deployable over the Internet. This method would use public key cryptography for lecturers to encrypt their questions online. Impact on Society : If institutions are to transition to e-examinations, one way of facilitating this move is by using computers to imitate other assessment techniques. However, higher order thinking is usually demonstrated through open-ended or creative tasks. In this respect the Australian system shows promise by providing the same full operating system and software application suite to all candidates, thereby supporting assessment of such creative higher order thinking. The two cases illustrate the potential tension between “online” or networked reticulation of questions and answers, as opposed to “offline” methods. Future Research: A future design proposition is a web-based strategy for a virtual machine, which is launched into candidates’ computers at the start of each e-examination. The new system is a form of BYOD externally booted e-examination (as in Australia) that is deployable over the Internet with encryption and decryption features using public key cryptography (Nigeria). This will allow lecturers to encrypt their questions and post them online while the questions are decrypted by the administrator or students are given the key. The system will support both objective and open-ended questions (possibly essays and creative design tasks). The authors believe this can re-define e-examinations as the “gold standard” of assessment.

2002 ◽  
Vol 41 (05) ◽  
pp. 414-418 ◽  
Author(s):  
I. Mavridis ◽  
C. Ilioudis ◽  
C. Georgiadis ◽  
G. Pangalos

Summary Objectives: Internet technologies provide an attractive infrastructure for efficient and low cost communications in regional health information networks. The advantages provided by the Internet come however with a significantly greater element of risk to the confidentiality and integrity of information. This is because the Internet has been designed primarily to optimize information sharing and interoperability, not security. The main objective of this paper is to propose the exploitation of public-key cryptography techniques to provide adequate security to enable secure healthcare Internet applications. Methods: Public-key cryptography techniques can provide the needed security infrastructure in regional health networks. In the regional health-care security framework presented in this paper, we propose the use of state-of-art Public Key Infrastructure (PKI) technology. Such an e-Health PKI consists of regional certification authorities that are implemented within the central hospitals of each region and provide their services to the rest of the healthcare establishments of the same region. Results: Significant experience in this area has been gained from the implementation of the PKI@AUTH project. Conclusions: The developed PKI infrastructure already successfully provides its security services to the AHEPA university hospital. The same infrastructure is designed to easily support a number of hospitals participating in a regional health information network.


Author(s):  
Jung S. Oh ◽  
Dean Q. Lewis ◽  
Daeyong Lee ◽  
Gary A. Gabriele

Abstract Many different types of snap-fits have been developed to replace conventional fasteners, and research efforts have been made to characterize their performance. It is often tedious to look for design equations for unique types of snap-fits to calculate the insertion and retention forces. If found, these equations tend to be long, complex, and difficult to use. For this reason, a snap-fit calculator has been created to help in designing integral attachment features. Studies of seven most commonly used snap-fits (annular snap, bayonet-and-finger, cantilever hook, cantilever-hole, compressive hook, L-shaped hook, and U-shaped, hook) were used to provide the equations implemented in this snap-fit calculator, more fasteners than any other snap-fit calculator available. This tool aids in designing snap-fits to meet specific loading requirements by allowing the designer to size the feature to obtain desired estimates for maximum insertion and retention forces. The software for this design tool was written in JAVA™ language that is independent of operating system platforms and can be distributed at a company site-wide over an intranet or worldwide over the Internet. This makes it easily accessible to a user, and universal upgrades can be achieved by simply updating the software at the server location. Designers will find this tool to be useful in the design process and the most convenient way to estimate the performance of snap-fits. This paper describes the development and operation of the IFP snap-fit calculator including several case studies comparing the calculated results to experimental data.


2018 ◽  
Vol 1 (2) ◽  
pp. 1-22
Author(s):  
Leonard J. Waks

Purpose —The purpose of this paper is to explain how the introduction of the Internet and digital tools renews and enriches John Dewey's experimentalist model for teaching and learning with particular attention to the place of and resources for higher order thinking. Design/Approach/Methods —The methods include a close exposition of Dewey's classical texts, and a thought experiment introducing ICT elements into Dewey's design diagrams for teaching and learning. Findings —Dewey's model has inherent difficulties, and that digital technologies helps resolve them. Originality/Value —With the Internet and new digital tools, teachers can design new virtual learning spaces and learning activities. Learners can use online information and communication tools to act more effectively using higher-order thinking skills.


2019 ◽  
Vol 16 (9) ◽  
pp. 3945-3954
Author(s):  
Priya Oberoi ◽  
Sumit Mittal ◽  
Rajneesh Kumar Gujral

Cloud security is one of the major issues which are affecting the acceptance of Cloud computing (CC). In spite of the number of benefits offered by CC, it also suffers from a myriad of security vulnerabilities. Security is the prime concern while we are accessing the resources from the Cloud through the Internet. This research work is primarily on IAAS (Infrastructure as a service). Here a protocol called Authenticated Routing on Cloud Network (ARCN) has been proposed, to secure the communication route between the client and service provider. The proposed protocol ARCN uses the public key cryptography to mitigate the various security attacks like malicious insider attacks, Spoofing, Falsified routes, DoS, etc.


2013 ◽  
pp. 126-147
Author(s):  
Reed H. Petty ◽  
Jiang Bian ◽  
Remzi Seker

Electronic forms of communications are becoming increasingly pervasive. The Internet links not only senders and receivers of e-mail, but also consumers to suppliers, businesses to businesses, citizens to governments, and so forth. The potential for communications to be intercepted, hijacked, emulated, or otherwise manipulated for nefarious purposes is an area of grave concern. The security of message traffic relies heavily upon encryption. Encryption relies upon keys. Public key infrastructure (PKI) addresses keys – how they are used, how they are exchanged, and how they are validated. Furthermore, public key cryptography provides confidentiality, integrity, authentication, and non-repudiation. In general, PKI is a broad subject matter and is constantly evolving to meet the rapid growth in today’s information world. This chapter is intended to reveal the mystery, and perhaps misconceptions, of the PKI as well as offering readers a broad high-level view of the PKI.


Sensors ◽  
2020 ◽  
Vol 20 (18) ◽  
pp. 5350
Author(s):  
Dae-Hwi Lee ◽  
Im-Yeong Lee

In the Internet of Things (IoT) environment, more types of devices than ever before are connected to the internet to provide IoT services. Smart devices are becoming more intelligent and improving performance, but there are devices with little computing power and low storage capacity. Devices with limited resources will have difficulty applying existing public key cryptography systems to provide security. Therefore, communication protocols for various kinds of participating devices should be applicable in the IoT environment, and these protocols should be lightened for resources-restricted devices. Security is an essential element in the IoT environment, so for secure communication, it is necessary to perform authentication between the communication objects and to generate the session key. In this paper, we propose two kinds of lightweight authentication and key agreement schemes to enable fast and secure authentication among the objects participating in the IoT environment. The first scheme is an authentication and key agreement scheme with limited resource devices that can use the elliptic curve Qu–Vanstone (ECQV) implicit certificate to quickly agree on the session key. The second scheme is also an authentication and key agreement scheme that can be used more securely, but slower than first scheme using certificateless public key cryptography (CL-PKC). In addition, we compare and analyze existing schemes and propose new schemes to improve security requirements that were not satisfactory.


2014 ◽  
Vol 651-653 ◽  
pp. 2510-2513 ◽  
Author(s):  
Li Ping Yang ◽  
Da Wei Xu ◽  
Wei Wang

Cloud computing is a model about the increase , usage and delivery of related services in Internet, usually provides dynamically scalable and often virtualized resources by the Internet. This paper first introduces the cloud computing technology, then discusses the system structure, system flow and system function, and finally expounds the cloud computing role and the realization of the examination system .


2016 ◽  
Vol 6 (3) ◽  
pp. 26-38
Author(s):  
Chia-Pei Wu

In this study, 60 students of an EFL writing course participated in a semester-long WebQuest authoring activity. This activity is designed for students to improve their English learning reading and writing skills in the process of WebQuest creation. The study discussed the use of the Internet technology to mediate classroom activities. The study then investigated how students enhanced their writing skills through WebQuest construction. The study also implemented higher order thinking skills by reflecting on their learning progress. Research data was collected from students' reflective journal, in-depth interview, and the final product of student-created WebQuests. The findings indicated that the experimental design facilitated and mediated classroom discussion and cooperative learning. In addition, it enhanced students' writing skills by reading on the Internet. The higher order thinking skills were also represented in students' WebQuest creativity.


Sign in / Sign up

Export Citation Format

Share Document