Legal Implications of Online Assessment

Author(s):  
Robert R. Hunt

At a time when information, including purloined test and assessment content, moves at “Internet speed,” test and assessment owners are usually comforted to know that the law provides meaningful protection if threshold test security measures are observed. This chapter explores the question of whether that protection extends to the use of online assessment which promise greater access, convenience and savings. Applying threshold security requirements derived from copyright and trade secret laws, this analysis indicates that in its widely practiced and current form, online assessment would fail to qualify for protections by which disclosure of text content could be swiftly condemned. Online test and assessment owners are cautioned to explore threshold security alternatives and to carefully weigh the importance of their tests, as well as investments in the creation and distribution of a test instrument, against the potential loss of test content.

Author(s):  
Jamie R. Mulkey ◽  
John Fremer

This chapter examines five main aspects of delivering secure tests and examinations via online methods. First, the importance of understanding the problem of test cheating is discussed. Existing guidelines that help shape computerized test delivery are reviewed for how they manage test administration processes. A taxonomy of different types of cheating is presented and solutions to important security issues in online assessment are considered. Last, future trends in deterring and detecting cheating are proposed. Furthermore, the authors hope that understanding the threats to online test security and considering the options to solve these problems, will provide a forum for reducing test theft and increasing integrity for test takers and test sponsors alike.


2017 ◽  
Author(s):  
JOSEPH YIU

The increasing need for security in microcontrollers Security has long been a significant challenge in microcontroller applications(MCUs). Traditionally, many microcontroller systems did not have strong security measures against remote attacks as most of them are not connected to the Internet, and many microcontrollers are deemed to be cheap and simple. With the growth of IoT (Internet of Things), security in low cost microcontrollers moved toward the spotlight and the security requirements of these IoT devices are now just as critical as high-end systems due to:


2020 ◽  
Vol 3 (1) ◽  
pp. 18-27
Author(s):  
Muhamad Hendra Febiawan ◽  
Agus Setiawan ◽  
Ardhin Primadewi

The academic world in Indonesia has growing rapidly which is marked by the development of science and technology. With all the facilities offered, technology has a positive and negative impact on life. One of negative impacts is plagiarism. The plagiarism often occurs among students, therefore detection of plagiarism needs to be done to avoid plagiarism. This reseacrh to detect the similarity of the text content of the document using the Levenshtein Distance algorithm. The type of document used is .pdf . The documents used are thesis proposals and publication papers. In the calculation speed test, the source document which count words 4405 with 3 comparative documents that have words 13465 count produces a calculation duration 3.57 seconds.


2014 ◽  
pp. 2099-2119
Author(s):  
Punam Bedi ◽  
Vandana Gandotra ◽  
Archana Singhal

This chapter discusses adoption of some proactive strategies in threat management for security of software systems. Security requirements play an important role for secure software systems which arise due to threats to the assets from malicious users. It is therefore imperative to develop realistic and meaningful security requirements. A hybrid technique has been presented in this chapter evolved by overlapping the strengths of misuse cases and attack trees for elicitation of flawless security requirements. This chapter also discusses an innovative technique using fuzzy logic as a proactive step to break the jinx of brittleness of present day security measures based on binary principle. In this mechanism, partially secure state evolved between safe state and failed state using fuzzy logic provides an alert signal to take appropriate additional preventive measures to save the system from entering into the failed state to the extent possible.


2015 ◽  
pp. 875-896
Author(s):  
Kristian Beckers ◽  
Isabelle Côté ◽  
Ludger Goeke ◽  
Selim Güler ◽  
Maritta Heisel

Cloud computing systems offer an attractive alternative to traditional IT-systems, because of economic benefits that arise from the cloud's scalable and flexible IT-resources. The benefits are of particular interest for SME's. The reason is that using Cloud Resources allows an SME to focus on its core business rather than on IT-resources. However, numerous concerns about the security of cloud computing services exist. Potential cloud customers have to be confident that the cloud services they acquire are secure for them to use. Therefore, they have to have a clear set of security requirements covering their security needs. Eliciting these requirements is a difficult task, because of the amount of stakeholders and technical components to consider in a cloud environment. Therefore, the authors propose a structured, pattern-based method supporting eliciting security requirements and selecting security measures. The method guides potential cloud customers to model the application of their business case in a cloud computing context using a pattern-based approach. Thus, a potential cloud customer can instantiate our so-called Cloud System Analysis Pattern. Then, the information of the instantiated pattern can be used to fill-out our textual security requirements patterns and individual defined security requirement patterns, as well. The presented method is tool-supported. Our tool supports the instantiation of the cloud system analysis pattern and automatically transfers the information from the instance to the security requirements patterns. In addition, they have validation conditions that check e.g., if a security requirement refers to at least one element in the cloud. The authors illustrate their method using an online-banking system as running example.


Author(s):  
Eric Shepherd ◽  
John Kleeman ◽  
Joan Phaup

The use of computers to assess knowledge, skills, and attitudes is now universal. Today, distinguishing between the various delivery and security requirements for each style of assessment is becoming increasingly important. It is essential to differentiate between the different styles of computerized assessments in order to deploy assessments safely, securely, and cost effectively. This chapter provides a methodology for assessing the security requirements for delivering computer-based assessments and discusses appropriate security measures based on the purpose and nature of those assessments. It is designed to help readers understand the issues that need to be addressed in order to balance the need for security with the need for cost effectiveness. The authors hope to give readers a working knowledge of the technological innovations that are making it easier to ensure the safety and security of a wide range of computerized assessments including online tests, quizzes, and surveys.


2021 ◽  
Vol 13 (24) ◽  
pp. 13827
Author(s):  
Seungjin Baek ◽  
Young-Gab Kim

Although the defense field is also one of the key areas that use big data for security reasons, there is a lack of study that designs system frameworks and presents security requirements to implement big data in defense. However, we overcome the security matters by examining the battlefield environment and the system through the flow of data in the battlefield. As such, this research was conducted to apply big data in the defense domain, which is a unique field. In particular, a three-layered system framework was designed to apply big data in the C4I system, which collects, manages, and analyzes data generated from the battlefield, and the security measures required for each layer were developed. First, to enhance the general understanding of big data and the military environment, an overview of the C4I system, the characteristics of the 6V’s, and the five-phase big data lifecycle were described. While presenting a framework that divides the C4I system into three layers, the roles and components of each layer are described in detail, considering the big data lifecycle and system framework. A security architecture is finally proposed by specifying security requirements for each field in the three-layered C4I system. The proposed system framework and security architecture more accurately explain the unique nature of the military domain than those studied in healthcare, smart grids, and smart cities; development directions requiring further research are described.


Author(s):  
Konstantinos Siassiakos ◽  
Athina Lazakidou

Privacy includes the right of individuals and organizations to determine for themselves when, how and to what extent information about them is communicated to others. The growing need of managing large amounts of medical data raises important legal and ethical challenges. E-Health systems must be capable of adhering to clearly defined security policies based upon legal requirements, regulations and standards while catering for dynamic healthcare and professional needs. Such security policies, incorporating enterprise level principles of privacy, integrity and availability, coupled with appropriate audit and control processes, must be able to be clearly defined by enterprise management with the understanding that such policy will be reliably and continuously enforced. This chapter addresses the issue of identifying and fulfilling security requirements for critical applications in the e-health domain. In this chapter the authors describe the main privacy and security measures that may be taken by the implementation of e-health projects.


Author(s):  
Jay Parkes ◽  
Dawn Zimmaro
Keyword(s):  

Author(s):  
Neila Rjaibi ◽  
Latifa Ben Arfa Rabai ◽  
Ali Mili

This chapter presents a quantitative security risk management cybersecurity measure namely the Mean Failure Cost (MFC). We illustrate it to quantify the security of an e-Learning application while taking account of its respective stakeholders, security requirements, architectural components and the complete list of security threats. Moreover, in the mean time, security requirements are considered as appropriate mechanisms for preventing, detecting and recovering security attacks, for this reason an extension of the MFC measure is presented in order to detect the most critical security requirements to support the quantitative decision-making. Our focus is widespread to offer a diagnostic of the non secure system's problems and a depth insight interpretation about critical requirements, critical threats and critical components. This extension is beneficial and opens a wide range of possibilities for further economics based analysis. Also this chapter highlights the security measures for controlling e-Learning security problems regarding the most critical security requirements.


Sign in / Sign up

Export Citation Format

Share Document