Abstract
This paper presents FLEX, a framework for electronic assessment on students’ devices. Basic requirements to such a framework and potential issues related with these requirements are discussed, as well as their state of the art. Afterwards, the client-server architecture of FLEX is presented, which is designed to meet all requirements previously identified. The FLEX client and the FLEX server are discussed in detail with focus on utilized technologies and programming languages. The results of first trials with the existing prototype are discussed in relation to the identified basic requirements. Thereafter, assessment of programming courses is discussed as use case of FLEX, which makes use of the extensibility of client and server. The paper closes with a summary and an outlook.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsNotes
- 1.
UNIwise was contacted via email.
References
Themengruppe Change Management & Organisationsentwicklung: E-Assessment als Herausforderung - Handlungsempfehlungen für Hochschulen. Arbeitspapier Nr. 2. Berlin: Hochschulforum Digitalisierung. (2015). https://hochschulforumdigitalisierung.de/sites/default/files/dateien/HFD%20AP%20Nr%202_E-Asessment%20als%20Herausforderung%20Handlungsempfehlungen%20fuer%20Hochschulen.pdf
James, R.: Tertiary student attitudes to invigilated, online summative examinations. Int. J. Educ. Technol. High. Educ. 13, 19 (2016). https://doi.org/10.1186/s41239-016-0015-0
Berggren, B., Fili, A., Nordberg, O.: Digital examination in higher education–experiences from three different perspectives. Int. J. Educ. Dev. Inf. Commun. Technol. 11(3), 100–108 (2015)
JISC: Effective Practice with e-Assessment (2007). https://www.webarchive.org.uk/wayback/archive/20140615085433/http://www.jisc.ac.uk/media/documents/themes/elearning/effpraceassess.pdf
Biella, D., Engert, S., Huth, D.: Design and delivery of an e-assessment solution at the University of Duisburg-Essen. In: Proceedings of EUNIS 2009 (2009)
Bücking, J.: eKlausuren im Testcenter der Universität Bremen: Ein Praxisbericht (2010). https://www.campussource.de/events/e1010tudortmund/docs/Buecking.pdf
Brooks, D.C., Pomerantz, J.: ECAR Study of Undergraduate Students and Information Technology (2017). https://library.educause.edu/~/media/files/library/2017/10/studentitstudy2017.pdf
Poll, H.: Student Mobile Device Survey 2015: National Report: College Students (2015). https://www.pearsoned.com/wp-content/uploads/2015-Pearson-Student-Mobile-Device-Survey-College.pdf
Willige, J.: Auslandsmobilität und digitale Medien. Arbeitspapier Nr. 23. Berlin: Hochschulforum Digitalisierung. (2016). https://hochschulforumdigitalisierung.de/sites/default/files/dateien/HFD_AP_Nr23_Digitale_Medien_und_Mobilitaet.pdf
Forgó, N., Graupe, S., Pfeiffenbring, J.: Rechtliche Aspekte von E-Assessments an Hochschulen (2016). https://dx.doi.org/10.17185/duepublico/42871
RWTH Aachen University: Richtlinien zur Aufbewahrung, Aussonderung, Archivierung und Vernichtung von Akten und Unterlagen der RWTH Aachen (2016). http://www.rwth-aachen.de/global/show_document.asp?id=aaaaaaaaaatmzml
German Bundestag: Basic Law for the Federal Republic of Germany (2012). https://www.btg-bestellservice.de/pdf/80201000.pdf
Frank, A.J.: Dependable distributed testing: can the online proctor be reliably computerized? In: Marca, D.A. (ed.) Proceedings of the International Conference on E-Business. SciTePress, S.l (2010)
Safe Exam Browser. https://www.safeexambrowser.org/
Inspera Assessment. https://www.inspera.no/
WISEflow. https://europe.wiseflow.net/
LockDown Browser. http://www.respondus.com/products/lockdown-browser/
Dahinden, M.: Designprinzipien und Evaluation eines reliablen CBA-Systems zur Erhebung valider Leistungsdaten. Ph.D. thesis (2014). https://dx.doi.org/10.3929/ethz-a-010264032
Küppers, B., Politze, M., Schroeder, U.: Reliable e-assessment with git practical considerations and implementation (2017). https://dx.doi.org/10.17879/21299722960
Akherfi, K., Gerndt, M., Harroud, H.: Mobile cloud computing for computation offloading: issues and challenges. Appl. Comput. Inform. 14, 1–16 (2016). https://doi.org/10.1016/j.aci.2016.11.002. ISSN 2210-8327
Kovachev, D., Klamma, R.: Framework for computation offloading in mobile cloud computing. Int. J. Interact. Multimed. Artif. Intell. 1(7), 6–15 (2012). https://doi.org/10.9781/ijimai.2012.171
Buxmann, P., Hess, T., Lehmann, S.: Software as a service. Wirtschaftsinformatik 50(6), 500–503 (2008). https://doi.org/10.1007/s11576-008-0095-0
Google Chrome. https://www.google.com/intl/en/chrome/browser/desktop/
Mozilla Firefox. https://www.mozilla.org/en-US/firefox/
Küppers, B., Schroeder, U.: Bring Your Own Device for e-Assessment – a review. In: EDULEARN 2016 Proceedings, pp. 8770–8776 (2016). https://dx.doi.org/10.21125/edulearn.2016.0919. ISSN 2340-1117
About Digital Assessment @Brunel (2017). http://www.brunel.ac.uk/about/education-innovation/Digital-Assessment-Brunel/About
eAssessment an der Universität Basel, Basel (2017). https://bbit-hsd.unibas.ch/medien/2017/10/EvaExam-Betriebskonzept.pdf
Sadiki, J.: E-Assessment with BYOD, SEB and Moodle at the FFHS (2017). https://www.eduhub.ch/export/sites/default/files/E-Assessment_eduhubdays_showtell.pdf
Kavanagh, M.; Lozza, D.; Messenzehl, L.: Moodle-exams with Safe Exam Browser (SEB) on BYOD (2017). https://www.eduhub.ch/export/sites/default/files/ShowTell_ZHAW.pdf
Die ersten «BYOD» E-Assessments an der PHTG (2016). http://www.phtg.ch/news-detail/456-260216-laessig-die-ersten-byod-e-assessments-an-der-phtg/
Written examinations. https://www.uia.no/en/student/examinations/written-examinations
WISEflow implemented on the University of Agder, Norway. http://uniwise.dk/2014/07/31/wiseflow-uia/
Søgaard, T.M.: Mitigation of Cheating Threats in Digital BYOD exams. Master’s thesis (2016). https://dx.doi.org/11250/2410735
March, S.T., Smith, G.F.: Design and natural science research on information technology. Decis. Support Syst. 15(4), 251–266 (1995). https://doi.org/10.1016/0167-9236(94)00041-2. ISSN 0167-9236
Kaur, R., Kaur, A.: Digital signature. In: 2012 International Conference on Computing Sciences, pp. 295–301 (2012). https://doi.org/10.1109/ICCS.2012.25
Morgan, R.L., Cantor, S., Carmody, S., Hoehn, W., Klingenstein, K.: Federated security: the Shibboleth approach. EDUCAUSE Q. 27(4), 12–17 (2004)
Küppers, B., Kerber, F., Meyer, U., Schroeder, U.: Beyond lockdown: towards reliable e-assessment. In: GI-Edition - Lecture Notes in Informatics (LNI), P-273, pp. 191–196 (2017). ISSN 1617-5468
Seshadri, A., Luk, M., Shi, E., Perrig, A., van Doorn, L., Khosla, P.: Pioneer: verifying code integrity and enforcing untampered code execution on legacy systems. ACM SIGOPS Oper. Syst. Rev. 39(5), 1–16 (2005). https://doi.org/10.1145/1095810.1095812
Garay, J.A., Huelsbergen, L.: Software integrity protection using timed executable agents. In: Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, pp. 189–200 (2006). https://dx.doi.org/10.1145/1128817.1128847
Electron Framework. https://electron.atom.io/
Node.js. https://nodejs.org/en/
JAVA. https://www.java.com/de/
Namiot, D.; Sneps-Sneppe, M.: On micro-services architecture. Int. J. Open Inf. Technol. 2(9) (2014)
Küppers, B., Politze, M., Zameitat, R., Kerber, F., Schroeder, U.: Practical security for electronic examinations on students’ devices. In: Proceedings of SAI Computing Conference 2018 (2018, in Press)
CodeMirror. https://codemirror.net/
Zameitat, R., Küppers, B.: JDB – Eine Bibliothek für Java-Debugging im Browser (in Press)
Fielding, R.T., Taylor, R.N.: Principled design of the modern Web architecture (2002). https://dx.doi.org/10.1145/514183.514185
Docker. https://www.docker.com/
Langr, J., Hunt, A., Thomas, D.: Pragmatic unit testing in Java 8 with Junit, 1st edn. Pragmatic Bookshelf, Raleigh (2015). ISBN 978-1-94122-259-1
Queirós, R., Leal, J.P.: Programming exercises evaluation systems - an interoperability survey. In: Helfert, M., Martins, M.J., Cordeiro, J. (eds.) CSEDU (1), pp. 83–90. SciTePress (2012)
Caliskan-Islam, A., Liu, A., Voss, C., Greenstadt, R.: De-anonymizing programmers via code stylometry. In: Proceedings of the 24th USENIX Security Symposium (2015). ISBN 978-1-931971-232
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Switzerland AG
About this paper
Cite this paper
Küppers, B., Schroeder, U. (2018). A Framework for e-Assessment on Students’ Devices: Technical Considerations. In: Ras, E., Guerrero Roldán, A. (eds) Technology Enhanced Assessment. TEA 2017. Communications in Computer and Information Science, vol 829. Springer, Cham. https://doi.org/10.1007/978-3-319-97807-9_7
Download citation
DOI: https://doi.org/10.1007/978-3-319-97807-9_7
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-97806-2
Online ISBN: 978-3-319-97807-9
eBook Packages: Computer ScienceComputer Science (R0)