{"title":"总结性电子评估安全中的存在验证方法","authors":"Kikelomo Maria Apampa, G. Wills, David Argles","doi":"10.1109/I-SOCIETY16502.2010.6018836","DOIUrl":null,"url":null,"abstract":"The security of online summative assessments goes beyond ensuring that the ‘right’ student is authenticated at the initial login. More is required to ensure that the same authenticated student is present for the duration of the online test. In this paper, we explore the benefits and limitations of existing authentication methods as a technique to achieve presence verification. Additionally, we propose, a low-intrusive and low-resource intensive approach towards verifying a student's presence during summative e-assessments.","PeriodicalId":407855,"journal":{"name":"2010 International Conference on Information Society","volume":"19 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"36","resultStr":"{\"title\":\"An approach to presence verification in summative e-assessment security\",\"authors\":\"Kikelomo Maria Apampa, G. Wills, David Argles\",\"doi\":\"10.1109/I-SOCIETY16502.2010.6018836\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The security of online summative assessments goes beyond ensuring that the ‘right’ student is authenticated at the initial login. More is required to ensure that the same authenticated student is present for the duration of the online test. In this paper, we explore the benefits and limitations of existing authentication methods as a technique to achieve presence verification. Additionally, we propose, a low-intrusive and low-resource intensive approach towards verifying a student's presence during summative e-assessments.\",\"PeriodicalId\":407855,\"journal\":{\"name\":\"2010 International Conference on Information Society\",\"volume\":\"19 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2010-06-28\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"36\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2010 International Conference on Information Society\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/I-SOCIETY16502.2010.6018836\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2010 International Conference on Information Society","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/I-SOCIETY16502.2010.6018836","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
An approach to presence verification in summative e-assessment security
The security of online summative assessments goes beyond ensuring that the ‘right’ student is authenticated at the initial login. More is required to ensure that the same authenticated student is present for the duration of the online test. In this paper, we explore the benefits and limitations of existing authentication methods as a technique to achieve presence verification. Additionally, we propose, a low-intrusive and low-resource intensive approach towards verifying a student's presence during summative e-assessments.