Abstract
The use of computer to assess learning is increasing at colleges and university as the use of technology on campuses increase. The challenge for the instructors at these institutions is to find a way to ensure the integrity of the assessments while still allow students to access network resources during the assessment. A variety of approaches exist that attempt to create an electronic environment that allows students to access only the resources that are permitted. Unfortunately it is nearly impossible to build a system that allow access to the set of resources that a instructor chooses while guaranteeing that no other resources is being accessed. This paper provides an alternate approach to the challenge of securing an assessment and presents a model of a system that can be used to ensure the integrity of the assessment even when unrestricted access to the network is provided.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
S. Elwood, C. Changchit and R. Cutshall, Investigating students’ perceptions on laptop initiative in higher education: an extension of the technology acceptance model, Campus-Wide Information Systems, vol. 23, pp. 336–349, 2006.
D. G. Brown, J. J. Burg and J. L. Dominick, A strategic plan: for ubiquitous laptop computing, Communications of the ACM, vol. 41, pp. 26–35, January 1998.
J. Percival and N. Percival, Engineering students’ perception of mobile learning, in World Congress on Engineering and Computer Science 2008, pp. 465–470.
R. Brown, Colleges with laptop or notebook computer requirements: 2008(Nov 22), p. 1. Available: http://www2.westminster-mo.edu/wc_users/homepages/staff/brownr/NoteBookList. html.
S. L. Howell, E-Learning and Paper Testing: Why the Gap? Educase Quarterly, November 4, 2003.
M. Russell and W. Haney (2000), Bridging the gap between testing and technology in schools, Education Policy Analysis Archives 8(19), Available: http://epaa.asu.edu/epaa/v8n19.html.
H. R. Jacobs. The utilization of a mobile computing environment in undergraduate education. Proceedings of Frontiers in Education Conference, 1996. 26th Annual Conference.
L. Baker-Eveleth, D. Eveleth, M. O’Neill and R. W. Stone, Helping student adapt to computer-based encrypted examinations, Educase Quarterly, pp. 41–46, November 3, 2006.
G. Sim, P. Holifield and M. Brown, Implementation of computer assisted assessment: lessons from the literature, ALT-J Research in Learning Technology, vol. 12, pp. 215–229, September 2004.
L. Baker-Eveleth, D. Eveleth, M. O’Neill and R. W. Stone, Enabling laptop exams using secure software: applying the technology acceptance model, Journal of Information Systems Education, vol. 17, pp. 413–420, 2007.
A. B. Campbell and R. P. Pargas, Laptops in the classroom, in Technical Symposium on Computer Science Education: Proceedings of the 34th SIGCSE Technical Symposium on Computer Science Education, 2003, pp. 98–102.
L. Guernsey, For Those Who Would Click and Cheat, The New York Times, April 26, 2001.
C. C. Ko and C. D. Cheng, Flexible and secure computer-based assessment using a single zip disk, Computers & Education, vol. 50, pp. 915–926, 2008.
M. C. Carlisle and L. C. Baird. Design and use of a secure testing environment on untrusted hardware. Presented at Information Assurance and Security Workshop, 2007. IAW ‘07. IEEE SMC.
Software Secure Inc. (2008), Securexam – securexam browser. 2008(6/28/2008), Available: http://www.softwaresecure.com/browser.htm.
Respondus Inc. (2008), Respondus lockdown browser. 2008(6/28/2008), Available: http://www.respondus.com/products/lockdown.shtml.
Respondus Inc. (2008), FAQs about respondus LockDown browser (LDB). 2008(June 4), Available: http://www.respondus.com/lockdown/faq.shtml.
Anonymous (2008, June 17). Comparison of virtual machines. 2008 (June 19), Available: http://en.wikipedia.org/wiki/Comparison_of_virtual_machines.
C. C. Kong and C. D. Cheng, Internet examination system based on video monitoring, Internet Research: Electronic Networking Applications and Policy, vol. 14, pp. 48–61, 2004.
P. Innella (2001, Nov 16). The evolution of intrusion detection systems. 2008(6/28/2008), Available: http://www.securityfocus.com/infocus/1514.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer Science+Business Media B.V.
About this chapter
Cite this chapter
Percival, N., Percival, J., Martin, C. (2010). A Conceptual Model for a Network-Based Assessment Security System. In: Amouzegar, M. (eds) Advances in Machine Learning and Data Analysis. Lecture Notes in Electrical Engineering, vol 48. Springer, Dordrecht. https://doi.org/10.1007/978-90-481-3177-8_15
Download citation
DOI: https://doi.org/10.1007/978-90-481-3177-8_15
Published:
Publisher Name: Springer, Dordrecht
Print ISBN: 978-90-481-3176-1
Online ISBN: 978-90-481-3177-8
eBook Packages: EngineeringEngineering (R0)