170 likes | 302 Views
Who is really taking the e-exam? What can we do about it?. By: Michelle M. Ramim Nova Southeastern University And Yair Levy Nova Southeastern University . Statement of the problem. E-learning has become a powerful medium for academic institutions
E N D
Who is really taking the e-exam? What can we do about it? By: Michelle M. Ramim Nova Southeastern University And Yair LevyNova Southeastern University
Statement of the problem • E-learning has become a powerful medium for academic institutions • Major growth in e-learning in the past decade • 56% of all US colleges offered e-learning courses in 2000–2001 academic year*. • Over three million students enrolled in e-learning courses in the US in 2000-1*. • Opponents of e-learning argue that the inability to authenticate e-exam takers is one of the major challenges of e-learning * Source: United States Department of Education, National Center of Educational Statistics (NCES) (2005)
Theoretical Background • Unethical conduct in e-learning • Unethical conduct during exams • Security in e-Learning • Biometric Solutions • Fingerprint Biometric Solutions
Unethical Conduct in E-learning • Unethical conduct - “a major concern” (Kennedy et al., 2000) • Additional mechanisms are necessary to authenticate users’ access in various e-learning course activities not just in the initial login (Newton, 2003) • Students’ unethical conduct has intensified as a result of the use of technology and the Internet (Pillsbury, 2004) • Need to focus not only on plagiarism (Naude & Hörne, 2006)
Unethical Conduct During Exams • Cheating on exams has been reported at an alarming range of 74% (Center for Academic Integrity, 2005) • Students’ unethical conduct related to exam taking perceived by faculty to be one of the most serious unethical behaviors (Pincus & Schmelkin, 2003)
Security in E-Learning • Yu and Tsao (2003) discussed security challenges of e-learning environments • Huang et al. (2004) discussed aspects of security in e-learning systems and suggested ways to secure e-learning systems. • Ramim and Levy (2006) – a case study (JCIT) of a small academic institution faced a cyber attach to their e-learning environment by an insider intruder.
Biometric Solutions • Biometric is defined as “the application of computational methods to biological features, especially with regard to the study of unique biological characteristics of humans”(Tabitha, et al., 2006, p. 3) • Unique characteristics: • Physiological biometric: retinal and iris, fingerprints, facial images, hand prints, DNA, etc. • Behavioral biometric: voice, key board typing, attitude • Major popularity growth of biometric solutions, especially after 9/11
Biometric Solutions (Cont.) • Usability aspect of biometrics authentication systems is “a tradeoff between usability, memorability and security” (Coventry et al., 2003, p. 153). • Traditional password & PINs authentication methods are regularly increasing their length – difficult to remember! • Fingerprints systems are currently used in the Disney® parks, financial industry, U.S. immigration services, etc.
Fingerprint Biometric Solutions • Price of biometric devices is falling in the past decade (Pons, 2006) • Increase reliability – false rejection rate that is only 0.01%, or 1 out of 100,000 cases JayPeetek Inc.’s Scan.U.MatchTM DigitalPersona
Biometric Solutions – Servers JayPeetek Inc.’s AuthenteonTM Server
Propositions Proposition 1: Students taking e-exams using the fingerprints biometric solution will have lower grades on the e-exam than their counterparts. Proposition 2: Students taking e-exams using the fingerprints biometric solution will take longer time to complete their e-exam than their counterparts.
Some Observed Limitations • In a remote setting, students may ask to have a subject matter expert seat next to them while they take the exam • The costs associated with implementing such study in an experimental basis, let alone in a large scale e-learning program • Individual perceptions on the use of biometric systems may prevent consent to take part of the study, hence, limit data collection
Thank you! • Questions?
Contact Information - Ramim Michelle M. Ramim, Ph.D. (ABD)Adjunct ProfessorNova Southeastern University H. Wayne Huizenga School of Business and Entrepreneurship The DeSantis Building 3301 College Avenue Ft. Lauderdale, FL 33314 E-mail: ramim@nova.edu Site: http://www.nova.edu/~ramim/
Contact Information - Levy Yair Levy, Ph.D.Assistant ProfessorNova Southeastern UniversityGraduate School of Computer and Information SciencesThe DeSantis Building - Room 40583301 College AvenueFort Lauderdale, FL 33314Tel.: 954-262-2006 Fax: 954-262-3915E-mail: levyy@nova.edu Site: http://scis.nova.edu/~levyy/