Securing and Proctoring Online Assessments

Author(s):  
Jamie R. Mulkey ◽  
John Fremer

This chapter examines five main aspects of delivering secure tests and examinations via online methods. First, the importance of understanding the problem of test cheating is discussed. Existing guidelines that help shape computerized test delivery are reviewed for how they manage test administration processes. A taxonomy of different types of cheating is presented and solutions to important security issues in online assessment are considered. Last, future trends in deterring and detecting cheating are proposed. Furthermore, the authors hope that understanding the threats to online test security and considering the options to solve these problems, will provide a forum for reducing test theft and increasing integrity for test takers and test sponsors alike.

2021 ◽  
Vol 8 (12) ◽  
pp. 308-316
Author(s):  
G. D. D. T. Karunarathne ◽  
L. Wijewardene

The main purpose of this review article is to deliberate on online assessments, the advantages and disadvantages of e-assessments, and their importance in the higher education sector, in the post-COVID era. Online assessments are the collection of tasks that are made by educational instructors in order to evaluate student performance, using Information and Communication Technologies. There are different types of techniques to conduct e-assessments, which result in different rewards and shortcomings. However, this article delivers the strategies that can be used to eliminate the downsides of online assessment.


Author(s):  
Robert R. Hunt

At a time when information, including purloined test and assessment content, moves at “Internet speed,” test and assessment owners are usually comforted to know that the law provides meaningful protection if threshold test security measures are observed. This chapter explores the question of whether that protection extends to the use of online assessment which promise greater access, convenience and savings. Applying threshold security requirements derived from copyright and trade secret laws, this analysis indicates that in its widely practiced and current form, online assessment would fail to qualify for protections by which disclosure of text content could be swiftly condemned. Online test and assessment owners are cautioned to explore threshold security alternatives and to carefully weigh the importance of their tests, as well as investments in the creation and distribution of a test instrument, against the potential loss of test content.


Author(s):  
Ritu Khandelwal ◽  
Hemlata Goyal ◽  
Rajveer Singh Shekhawat

Introduction: Machine learning is an intelligent technology that works as a bridge between businesses and data science. With the involvement of data science, the business goal focuses on findings to get valuable insights on available data. The large part of Indian Cinema is Bollywood which is a multi-million dollar industry. This paper attempts to predict whether the upcoming Bollywood Movie would be Blockbuster, Superhit, Hit, Average or Flop. For this Machine Learning techniques (classification and prediction) will be applied. To make classifier or prediction model first step is the learning stage in which we need to give the training data set to train the model by applying some technique or algorithm and after that different rules are generated which helps to make a model and predict future trends in different types of organizations. Methods: All the techniques related to classification and Prediction such as Support Vector Machine(SVM), Random Forest, Decision Tree, Naïve Bayes, Logistic Regression, Adaboost, and KNN will be applied and try to find out efficient and effective results. All these functionalities can be applied with GUI Based workflows available with various categories such as data, Visualize, Model, and Evaluate. Result: To make classifier or prediction model first step is learning stage in which we need to give the training data set to train the model by applying some technique or algorithm and after that different rules are generated which helps to make a model and predict future trends in different types of organizations Conclusion: This paper focuses on Comparative Analysis that would be performed based on different parameters such as Accuracy, Confusion Matrix to identify the best possible model for predicting the movie Success. By using Advertisement Propaganda, they can plan for the best time to release the movie according to the predicted success rate to gain higher benefits. Discussion: Data Mining is the process of discovering different patterns from large data sets and from that various relationships are also discovered to solve various problems that come in business and helps to predict the forthcoming trends. This Prediction can help Production Houses for Advertisement Propaganda and also they can plan their costs and by assuring these factors they can make the movie more profitable.


2021 ◽  
Vol 6 ◽  
Author(s):  
Anne H. Verhoef ◽  
Yolandi M. Coetser

Background: This article examines the phenomenon of academic integrity during the coronavirus disease 2019 (COVID-19) pandemic, with particular reference to emergency online assessments in 2020.Aim: It explores academic dishonesty, cheating and plagiarism of university students during emergency remote online assessment, from the perspective of South African students.Setting and Methodology: The authors explore the approaches of different universities worldwide, as well as the extant literature on the topic. An examination of the current literature related explicitly to the COVID-19 online assessments reveals a dearth of engagement by researchers in the South African context. In order to address this lacuna, the authors rely on data generated from an institutional forum on academic dishonesty at a University in South Africa. It focuses specifically on the voices of students presented during the forum, which explained both why students are dishonest and ways to curb dishonesty.Results and Conclusion: The data generated show whilst some students were dishonest due to pandemic-related issues (like lack of monitoring), there are also other reasons, such as lack of time management, feeling overwhelmed and stressed and struggling with technology that contributes to student dishonesty. Students suggest that assessments be approached differently online to curb academic dishonesty. The paper concludes by providing some fundamental changes needed to address academic dishonesty.


2020 ◽  
Vol 10 (3) ◽  
pp. 273-279
Author(s):  
V.V. Potnis ◽  
Ketan G. Albhar ◽  
Pritamsinh Arjun Nanaware ◽  
Vishal S. Pote

Today, people face various types of stress in everyday fast life and most people in the world suffer from various neurological disorder. Epilepsy is one of the most common neurological disorders of the brain, affecting about 50 million people around the world, and 90% of them are coming from developing countries. Genetic factors and brain infection, stroke, tumors and epilepsy cause high fever. It imposes a great economic burden on the health systems of countries associated with stigma and discrimination against the patient and also his family in the community, in the workplace, school and home. Many patients with epilepsy suffer from severe emotional stress, behavioral disorders and extreme social isolation. There are many different types of seizure and mechanisms by which the brain generates seizures. The two features of generating seizures are hyperexcitability of neurons and a hyper synchronousneural circuits. A variety of mechanisms alters the balance between excitation and inhibition in predisposing brain local or generalized hyperexcitability region and a hypersynchronia. Purpose of the review is to discuss the history, epidemiology, etiology, pathophysiology, classification of epilepsy, symtomps, diagnosis, management of epilepsy and future trends. Keywords: Anti-epileptic drugs, pathophysiology, seizures, epidemiology, hypersynchrony


Author(s):  
John T. Behrens ◽  
Tara A. Collison ◽  
Sarah DeMark

During the last 6 years, the Cisco Networking Academy™Program has delivered online curricula and over 36 million online assessments to support instructors and schools teaching computer networking skills to students. This chapter describes the context of this work and lessons learned from this endeavor. Through discussions with stakeholders concerning the central aspects of the Cisco Networking Academy Program assessment activities, seven themes have evolved, each starting with the letter C: claims, collaboration, complexity, contextualization, computation, communication, and coordination. These themes address many aspects of assessment, including design, development, delivery, and the management of assessment resources, which are all necessary to ensure a quality assessment program.


Author(s):  
Shuting Xu

Text mining is an instrumental technology that today’s organizations can employ to extract information and further evolve and create valuable knowledge for more effective knowledge management. It is also an important tool in the arena of information systems security (ISS). While a plethora of text mining research has been conducted in search of revamped technological developments, relatively limited attention has been paid to the applicable insights of text mining in ISS. In this chapter, we address a variety of technological applications of text mining in security issues. The techniques are categorized according to the types of knowledge to be discovered and the text formats to be analyzed. Privacy issues of text mining as well as future trends are also discussed.


2020 ◽  
Vol 32 ◽  
pp. 03006
Author(s):  
D. Suneetha ◽  
D. Rathna Kishore ◽  
P. Narendra Babu

Data Compression in Cryptography is one of the interesting research topic. The compression process reduces the amount of transferring data as well as storage space which in turn effects the usage of bandwidth. Further, when a plain text is converted to cipher text, the length of the cipher text becomes large. This adds up to tremendous information storing. It is extremely important to address the storage capacity issue along with the security issues of exponentially developing information. This problem can be resolved by compressing the ciphertext based on a some compression algorithm. In this proposed work used the compression technique called palindrome compression technique. The compression ratio of the proposed method is better than the standard method for both colored and gray scaled images. An experimental result for the proposed methods is better than existing methods for different types of image.


Sign in / Sign up

Export Citation Format

Share Document