Volume 27, Number 3 - July 2011 through September 2011
|
|
|
- Jane Walters
- 10 years ago
- Views:
Transcription
1 Volume 27, Number 3 - July 2011 through September 2011 Student Verification System for Online Assessments: Bolstering Quality and Integrity of Distance Learning By Dr. Suhansa Rodchua, Mr. George Yiadom-Boakye, & Dr. Ronald Woolsey Peer-Refereed Article Research Paper KEYWORD SEARCH Assessment Distance Learning Higher Education Quality Teaching Methods The Official Electronic Publication of The Association of Technology, Management, and Applied Engineering
2 Dr. Suhansa Rodchua is an assistant professor in the School of Technology at University of Central Missouri. She worked as an assistant project manager and a business consultant in Thailand. She received her Ph.D. from Indiana State University in the Technology Management, Quality Systems Specialization in Currently, Dr. Rodchua teaches M.S. in Industrial Management and Technology programs and holds a CQM/OE certification from ASQ. She is an active member of the ATMAE Women in Technology Division. Contact Suhansa Rodchua at [email protected] George Yiadom- Boakye graduated M.S. in Technology at University of Central Missouri in Spring He worked as a graduate assistant in the School of Technology between and completed a Master s thesis. Currently, He works as an intern at Clay & Baileys, Kansas City, Missouri. Mr. Boakye received his Bachelor s degree in Biochemistry from Kwame Nkrumah University of Science and Technology, Ghana. Contact George at [email protected] Dr. Ronald Woolsey has been a university professor for twentyfive years and worked in industry for ten years in engineering and management. He received his Master s degree from Northwest Missouri State University and a Ph.D. from Iowa State University. In 1998 he accepted a position with the University of Central Missouri as Graduate Coordinator for the School of Technology. He received an award for Innovative Excellence in Teaching, Learning and Technology at the Fourteenth International Conference on College Teaching and Learning and was selected as a NAIT Outstanding University Professor in 1991 and Contact Ronald Wolsey at Woolsey@ ucmo.edu Student Verification System for Online Assessments: Bolstering Quality and Integrity of Distance Learning By Dr. Suhansa Rodchua, Mr. George Yiadom-Boakye, & Dr. Ronald Woolsey ABSTRACT The rapid growth of online examinations using Internet-based assessment tools has continued. The inability to control a student s environment while taking exams has been a major challenge for higher education. A clear correlation exists between an increase in the number of acts of dishonesty and the failure of institutions offering courses to monitor and enforce policies on cheating. The recent article of academic dishonesty and proctor at home published by Chronicle Higher Education, the U.S. Congress is concerned about quality and integrity of distance learning and had added language into a part of legislation renewing the Higher Education Act that encourages schools to fight cheating more effectively. The purpose of this study is to investigate the current technology and biometric systems used in remote proctoring systems to verify and monitor students taking online exams. The study also proposes the model to support the integrity and quality of online assessment; the model integrates facial recognition software, video surveillance systems, and computer restriction software into a system. In summary, online assessment and proctored testing deal with the issue of student identification and the environment in which materials are accessed effectively but it also negates much of the advantage of providing Internet based-course work. Utilization of biometric system with updated technology in video surveillance in the online examination will lead to certainty and quality assurance of student achievement and school s reputation. INTRODUCTION AND RATIONAL A key challenge for online-based learning in this information technology era is academic integrity. The explosive growth of online courses using the World Wide Web as the primary means of communication between instructors and students has rapidly outstripped the academic institution s ability to retain quality control measures. Continued growth in distance learning and the inability to control the student s environment is a challenge to institutions of higher education. There is strong evidence that cheating has increased in today classroom. The figures show that 84% of student say they need to cheat in order to move ahead in careers and 90% of the students say they never pay a price for cheating (Trenholm, 2007). Some examples of online exam cheating may include: Having someone other than the enrolled student taking an exam Copying and collaborating with others during an exam Accessing to materials that are not allowed, such as textbooks and web resources. To deal with these issues, popular stop gap measures like proctored testing centers, access passwords, time restricted tests, database pools of test questions randomly selected for an exam are tools that have been developed to reduce the temptation to be dishonest. Each of these tools deals with symptoms of the real issue, loss of control of a traditional classroom environment. They come with drawbacks of their own. According to the Chronicle Higher Education, the U.S. Congress is 2
3 concerned about quality and integrity of distance learning and had added language into a part of legislation renewing the Higher Education Act that encourages schools to fight cheating more effectively (Lardinois, 2008). In addition, education industry analysts expect the demand for online examination methods proctoring using student identification products will skyrocket in The U.S. Department of Education starting to require schools to make sure that persons taking an exam are actually the students enrolled in the course (Webwire, 2009). SIGNIFICANCE, PURPOSE, AND LIMITATIONS OF THE STUDY Technology has progressed to the point that biometric systems, such as facial recognition, fingerprint, and eye scanning, have been implemented successfully in many organizations and processes. Authentication system using server technology with biometric systems and video surveillance system, has gained popularity in monitoring activities in small businesses, big corporations, government, households, municipalities and educational institutions. The purpose of this study is to investigate the current technology used as remote proctoring systems to verify and monitor student s identification while taking online examinations. The authors conducted a historical-based research on different systems on remote proctoring and types of biometric devices. In addition a proposed model to support the integrity and quality of online assessment will be presented. This model discusses the integration of facial recognition software, video surveillance systems, and computer restriction software. The major contents in this paper are a discussion of different systems being developed for remote proctoring of examinations, various types of biometric identification, and finally a proposed model for verifying and student monitoring. This study is limited to information gathered from the review of literature and personal interviews; and the proposed model was designed based only on functions in the Blackboard delivery software from Blackboard Inc. DIFFERENT SYSTEMS ON REMOTE PROCTORING EXAMINATION Proctored examination is one of the major concerns for online course delivery. A growing number of students choose online courses either as an alternative to a traditional college experience or as a supplement. Colleges and universities have started to worry about how to prevent these students from cheating on remotely administered examinations. What is a proctored examination? There are diverse definitions of proctored examination. The University of West Florida s Online Campus defined: a proctored exam as one that is overseen by an impartial individual (called a proctor) who monitors or supervises a Table 1. Today s Remote Proctor Systems with Characteristics Systems Secureexam Remote Proctor (SRP) ProctorU (virtual online proctoring) Description (identification and proctoring) fingerprint for student identification video surveillance system /audio recording with SRP device username - password, and ID photo for student identification human proctor in real-time and video surveillance system /audio recording Technical specification - SRP equipment - Computer - High speed Internet - Webcam 640x480 - Computer - High speed Internet - headphones or working speakers - microphone - live proctor from ProctorU Costs $125 for SRP equipment and $30 annual fee $17.50 per 2 hours exam ProctorCam (virtual online proctoring) username - password, and ID photo for student identification human proctor in real-time and video surveillance system /audio recording - Webcam 640x480 - Computer - High speed Internet Average $20 per 1 hour exam, discount on the group of students Webassesor TM Facial recognition software and patterns of keystroke rhythms Secure Browser Control - Webcam with audio - Computer with Webassesor application - High speed Internet Webcam $50-$80 plus costs of application video surveillance system 3
4 student while he or she is taking an examination (University of West Florida, 2009). Another definition published by the University of Colorado Denver is Test proctoring is testing overseen by an authorized, neutral, proctor, who ensures the identity of the test taker and the integrity of the test taking environment (University of Colorado Denver Online Help Desk, n.d., para 2). In summary, the proctoring process helps to prevent dishonest students from cheating on examinations and ensures the security and integrity of the process. According to a USA Today s article, college students taking courses online has surged and created a tough dilemma for educators. Should instructors trust students to take an exam on their own computers, even though it may be easy to sneak a peek at the textbook? Or should institutions force students to trek to a proctored testing center, which detracts from the convenience that drew students to online classes in the first place? (Pope, 2007). Utilizing the existing technologies in online exam proctoring is becoming the focal point of many institutions efforts. A variety of free and for a fee organizations are used as proctoring services. For example, research centers, public libraries, campus testing and assessment centers or Sylan Learning Centers that charge $50 for each exam (University of Colorado Denver Online Help Desk, n.d.). Today technology allows an online proctoring system to utilize the software, hardware, fingerprint scanners, video monitoring personnel and so on to identify the online students and monitor them while taking examinations without commuting to a proctored location. Some commercially available examples of providers of remote proctoring methods discussed in this section are: Secureexam Remote Proctor, ProctorU, ProctorCam, and Webassesor TM. Table 1 presents descriptions, technical specifications, and services costs for these 4 companies. Data on costs on ProctorU and ProctorCam were gathered from contacts and personal interviews with the companies representatives. Securexam Remote Proctor (SRP) Troy University, Alabama, and some other colleges and universities currently adopted the Securexam Remote Proctor (SRP) System from Software Secure, Inc. of Cambridge, MA. The Securexam Remote Proctor addresses areas of exam security by: Authenticating the student with a fingerprint scanner prior to providing access to the exam Restricting the computer's functions with Securexam solution Monitor video and audio during exam, capturing all suspicious changes in sound and motion, just as a proctor would in a traditional exam environment. Figure 1 shows the image of SRP, which is a small stand-alone device that connects to the test taker s computer via USB. Description.aspx According to the Office of University Relations Media, SRP equipment will cost students about $125. The authentication is done through a server with a fingerprint scanner; the system verifies each test taker against the fingerprints provided at registration. This system also records the test-taker s voice and image through a camera that records 360-degree real-time video and audio of the environment during the entire exam. All suspicious sound, activity and motion are catalogued during the recording, limiting the need for constant monitoring. Professors do not need to watch students taking the exam live; they can view the streaming audio or video at any time (Troy University, n.d.). ProctorU Next commercial software is called ProctorU. It is developed by Andrew Jackson University and spun off into a separate company. Jarrod Morgan, codeveloper of Proctor stated We have improved the system by adding live certified proctors, real time audio/video using TokBox, technical assistance, practice exams, identify authentication and the ability to assist exam-takers by remotely controlling their computers during an exam (Webwire, 2009, para 2). The system has proctored 1,500 exams so far and attracted more and more interested colleges and universities each week (2009). ProctorCam ProctorCam is a name of business and system that provides a virtual online proctoring service. The test takers and organization that require proctor tests can use this service with their own equipment at their convenience and at their chosen location. The company has developed a software-enabled online exam proctoring service for online course publishers. Remote proctors, average US$20 per hour, hired under contract by the fledgling company, monitor students and answer their questions via webcams (Moore, 2010). To use ProctorCam, the system integrates desktop sharing software, a web cam, a microphone and a reliable internet connection. WebassesorTM Kryterion Inc. is an organization that specializes in secure test development and delivery (Case & Cabalka, 2009; Kryterion, 2009). They provide live proctoring for many distance learning and businesses (2009). The technology is called Webassesor TM and has the capability of secure online testing for proctoring students wherever they live, learn and work (Case & Cabalka, 2009). According to Kryterion this technology works with the various 4
5 test engines and learning management systems. The Webassesor TM is capable of online proctoring employing webcams with audio features to monitor test takers. Test takers purchase the camera for between $50 to $80, which allows proctors to view student s face, keyboard and workspace (Foster, Matton & Walker, 2009). The technological features built into the Webassesor include: Photo Matching Authentication (Sentinel security technology), Secure Browser Control (System Lockdown), video surveillance system, and Data Forensics. Some of the institutions that have used this technology include the Pennsylvania State University and Western Governor s University (Kryterion, 2009; Foster et al, 2009). TYPES OF BIOMETRIC IDENTIFICATION Biometrics has become a vital method of ensuring security against threats such as theft and malicious intents in this era of globalization. It involves the identification of an individual based on one or more unique physical attributes. Biometric identification can be physiological such as fingerprint, retina, DNA or behavioral such as handwriting, gait, speech pattern etc. A biometric method is evaluated based on specific qualities including its universality, uniqueness, permanence, collectability, performance, acceptability and circumvention (Wikipedia, 2010). The biometric devices are considered better than password protection or card scanners because the actual person must be present for the computer, doorway, or other device to become enabled for usage. Different parameters have been used to judge performance or accuracy of a biometric system. The extensively used parameters are: Force Acceptance Rate (FAR); the probability that the system incorrectly declares a successful match between the input pattern and a non-matching pattern in the database Force Reject rate (FRR); the probability that the system incorrectly declares failure of match Type of Biometrics Fingerprint Retina Facial recognition Table 2 Advantages and Disadvantages of Different Biometric Systems Advantages Has a higher reliability and stability compared to iris, voice and face recognition methods. Equipments are less expensive compared to other biometric systems. It is a highly accurate method with an error rate of 1 in 10,000,000. There is no known way to replicate retina; varies from person to person (Wikia Technology, n.d). Images can be acquired without posing; it is therefore non-intrusive and contact free process. Capable of integrating with existing surveillance systems. Capable of simultaneous multiple face processing. Capable of live face detection. Multiple samples of the same face can be acquired easily. Tolerant to face posture and capable of fast face matching. between the input pattern and the matching template in the database (Laha, 2008). Other performance parameters include Receiver (or relative) operating characteristic (ROC), Equal error rate (EER), Failure to enroll rate (FTE or FER), Failure to capture rate (FTC), and Template capacity (2008). Table 2 presents widely used biometric technologies including their advantages and disadvantages. Disadvantages Dirt and twist can lead to noise and distortion problems. Some people feel offended when asked to put their fingers at where many other people have continuously touched. It is an expensive and intrusive process. Comparison of template records can take a long time depending on the size of the database. Retinal pattern can be affected by disease like glaucoma, diabetes, high blood pressure, and autoimmune deficiency syndrome. Needs a well-controlled light source in automated face recognition system. Technical challenges are associated with face authentication. Disguise can be used to circumvent an authentication process. To establish an effective remote proctoring system, biometric is one of vital tools that has increased in use for online exams and it need to be investigated before implementation, for example, some concerns with biometric systems and forgery of the authorized user. In general, the literature shows that fingerprint scanners are the most widespread usage of biometrics. They are easily obtained and less expensive. The retina scanner is newer technology and still high cost, but it is generating 5
6 popularity due to high accuracy rate. The facial recognition has many variables involved in the system, but it has the most potential to develop into many different users in the future. According to Biometric Institute (2011), no system is invulnerable to attack. Each device has to be evaluated based upon the typical method of attack for that system. Incorporated into the system design is a given level of assurance of how many attacks will probably succeed. The above analysis on advantages and disadvantages of these biometric tools assists in the design of a proposed model of this study. PROPOSED MODEL ON ONLINE VERIFICATION AND MONITOR SYSTEM Even though some academic programs have systems in place to discourage dishonesty, some students have developed methods to cheat on examinations and to outsmart current systems included in such course delivery software as Blackboard from Blackboard Inc. The Master s degree program in Industrial Management in the School of Technology has offered 100% online delivery of coursework since The program is very successful with continued increases in number of enrollment and consistently high ratings of student satisfaction for the past nine years. Continuous improvement is part of the program s philosophy and establishing the Academic Integrity Program (AIP) to identify students through facial recognition systems and proctoring students with video surveillance while restricting computer software, is a proposed solution. Facial recognition is a biometric system that utilizes the characteristics of the face to identify an individual. Facial recognition has several important advantages over other types of biometric data. Facial recognition data can be captured at a distance, can be done without physical contact, and it can often be leveraged against existing surveillance systems including surveillance cameras and closed circuit television (Woodward, Horn, Gutane & Aryn, 2003). This proposed model on student verification and examination proctoring shows a line cutting the graphic below in half, as presented in Figure 2. This represents actions taken to ensure the integrity of the programs since 2002 (on the right) and the ways the AIP will modify that program in the future (on the left). Currently, the Blackboard, course delivery courseware, offers useful functions in the test/exam section. Instructors are able to set up the exam with a large pool of questions, random questions, and limit the time for taking exam. However, there are still some questions on student cheating remained, for example, having someone other than student taking the exam, copying and collaborating with others during the exam, and using materials that are not allowed in the examination. AIP proposed to solve these problems with three additional functions; using facial recognition to identify students, video surveillance in the exam proctoring, and software in restriction of computer s function. Figure 3 describes the process flowchart of the system beginning when student log-in and ending of exam and surveillance. This proposed model includes the following steps: The program proposed to establish remotely identify and proctor students while taking exam. Figure 2. Major task components of AIP Step 1: access to the online exam using username and password Step 2: read an instructions set for the exam and verification process Step 3: capture a student s image via the webcam, then submit for verification Step 4: verify image capture with the database. If match, student will go on to take exam (to Step 5). If not match, student will be able to retry. After retry 3 times and still unsuccessful, student will be asked to contact a course instructor. Step 5: while taking an exam, student is monitored and recorded by the video surveillance. The Internet restriction software will activate; and students will have no access to any other websites and applications, except only the exam. Step 6: If the system was interrupted (e.g. lost of Internet connection) while taking exam, the system will ask student to verify his/her image again. After passing verification process, then the student will continue on the exam and be monitored by the video surveillance and the Internet restriction software. Step 7: after completing the exam, student will click Submit, end of the exam and surveillance. The program is currently set up large randomized pool of questions with a limited time for completion. 6
7 This proposed model has preliminary been tested with a group of on-line students. After the study, some limitations that were identified included: The webcam proctors raised questions of privacy; Facial recognition software was still not 100% accurate due to some variations on pose and illumination; and No discussion on students who may need special assistance under the guidance of the Americans with Disabilities Act (ADA). Figure 3. Flowchart of online verification and monitor system CONCLUSIONS AND RECOMMENDATIONS Harnessed technology, biometrics, software programming, and optics in a symphonic correlation expanding the reach of academic institutions to students without regard to geographic separation or intellectual compromise is this study s promise. Academic merit is the yardstick by which every university measures the progress of every student but without physical contact. How does the instructor know whose work is being measured? This paper is not about developing new technology, but applying technology in a new way to solve what is perhaps to greatest obstacle to any university s ability to offer academic programs online, dishonesty. The value of every degree is the reputation of the institution and the students produced. Without academic rigor, without confidence in the processes by which it is measured, are their values in the program? Utilization of biometric system, either fingerprint or facial recognition, with updated technology in video surveillance in the online examination will lead to certainty and quality assurance of student achievement and learning effectiveness. This paper gathered the available technology currently used in proctored testing and proposed the model of online verification and monitor system that mainly promote the quality and integrity of distance learning. It is likely that the information derived from this study will lead to a better understanding of the utilization of remote proctoring assessment in an Internetbased distance environment. The following items are recommendations for further study. The facial recognition software may not work as advertised; different software vendors should be considered. The proposed Academic Integrity Program (AIP) model may not work on all broadband platforms. Extra effort should be made to insure that the software architecture works with most applications and broadband platforms. Using one biometric device does not seem to be the best way to ensure the best possible outcome for accurate identification. Creating multifaceted layers of devices can be an appropriate approach for the implementation. Students may perform poorly in this online integrity assessment due to a lack of understanding of the system. A training program and providing proper webcam for students will help to resolve this mistake. ACKNOWLEDGMENTS Thank you to William Ford and Ravi Kanuri for their contribution to this study. 7
8 REFERENCES Biometrics Institute. (2011). Biometrics Institute Biometric Vulnerability Assessments. Retrieved February 20, 2011, from Biometrics Institute: cfm?an=1&subarticlenbr=48 Case, R, & Cabalka, P. (2009). Remote Proctoring: Results of a Pilot Program at Western Governors University. Retrieved on June 10, 2010 from Foster, D., Matton, N. & Walker, P. (2009). Using Multiple Online Security Measures to Deliver Secure Course Exams to Distance Education Students. Retrieved on June 10, 2010 from Campagnes/ICDE2009/Papers/Final_Paper_101Walker.pdf Kryterion. (2009). Online Secure Testing. Retrieved on May 16, 2010 from Lardinois, F. (2008). The Proctor at home: using technology to keep online students from cheating. Retrieved from cheating Laha, J. (2008). Biometric Techniques - Enhancing Security Standards In High Performance Enterprise. Retrieved on May 16, 2010, from, com/?biometric- Moore, G. (May, 2010) ProctorCam betting on e-learning upswing. Retrieved on June 10, 2010 from Pope, J. (2007). Web cam watches students taking tests online. Retrieved May 17, 2010 from msnbc.msn.com/id/ /ns/ technology_and_sc Trenholm, S. (2007). A Review of Cheating in Fully Asynchronous Online Courses: A math or Fact-Based Course Perspective. J. Educational Technology Systems, 35(3), Troy University (n.d.). Securexam Remote Proctor System. Office of University Relations. Retrieved May 17, 2010 from news/mediakits/remote_proctor.pdf University of West Florida. (2009). Online campus. Retrieved on April 15, 2010 from class/proc_exams.cfm University of Colorado Denver Online Help Desk. (n.d). Exam proctoring for online course q&a. Retrieved on May 18, 2010 from www. cuonline.edu Webwire (July, 2009). Fifteen hundred college exams proctored live online. Retrieved on May 18, 2010 from Rel.asp?aId=99265 Wikipedia (2010). Biometrics. Retrieved on May 15, 2010 from en.wikipedia.org/wiki/biometrics Wikia Technology (n.d.). Retina Recognition. Retrieved on May 17, 2010 from Retina_recognition Woodward, J. D., Horn, C., Gatune, J., & Thomas, A. (2003). Biometrics: A Look at Facial Recognition. Prepared for the Virginia State Crime Commission. Arlington: RAND Public Safety and Justice. 8
Secure Testing Options for the University
Secure Testing Options for the University Jason Smith Innovation in Learning Center April 12, 2011 Introduction The University of South Alabama currently offers 350 fully online courses annually. In fall
SECUREXAM REMOTE PROCTOR SYSTEM MEDIA KIT
A future of opportunities. SECUREXAM REMOTE PROCTOR SYSTEM MEDIA KIT OFFICE OF UNIVERSITY RELATIONS MEDIA INQUIRIES 334-670-3196 troy.edu [email protected] SECUREXAM REMOTE PROCTOR SYSTEM OVERVIEW With
USING MULTIPLE ONLINE SECURITY MEASURES TO DELIVER SECURE COURSE EXAMS TO DISTANCE EDUCATION STUDENTS
USING MULTIPLE ONLINE SECURITY MEASURES TO DELIVER SECURE COURSE EXAMS TO DISTANCE EDUCATION STUDENTS David Foster, Nancy Mattoon and Paul Walker (presenter) KRYTERION, Inc., United Kingdom Rick Shearer
Online Proctoring Services
Online Proctoring Services Observing test takers online using webcams and microphones. It sounds simple, yet for educational institutions, it is no simple task. Kryterion is leading the industry in providing
A TEST OF INTEGRITY: REMOTE PROCTORING IN AN ONLINE CLASS
A TEST OF INTEGRITY: REMOTE PROCTORING IN AN ONLINE CLASS L. F. Cochran, Assoc. Professor of Management, [email protected] L. K. Troboy, Professor of Management Information Systems, [email protected] T. L.
Assignment 1 Biometric authentication
Assignment 1 Biometric authentication Internet Security and Privacy Alexandre Fustier Vincent Burger INTRODUCTION:...3 I. TYPES AND DESCRIPTION OF BIOMETRICS...4 1. PHYSIOLOGICAL BIOMETRIC...4 a. Fingerprints...4
THE VERIFICATION OF IDENTITY IN ONLINE ASSESSMENT: A COMPARISON OF METHODS
THE VERIFICATION OF IDENTITY IN ONLINE ASSESSMENT: A COMPARISON OF METHODS Dr Trevor Barker Stella Lee The Verification of Identity in Online Tests: A Comparison of Methods Dr Trevor Barker, Department
Online teaching: Do you know who is taking the final exam?
Online teaching: Do you know who is taking the final exam? Qinghai Gao Department of Criminal Justice & Security Systems, Farmingdale State College Abstract: In recent years Distance Learning has been
Proposal: A Design of E-learning User Authentication System
, pp.45-50 http://dx.doi.org/10.14257/ijsia.2015.9.1.05 Proposal: A Design of E-learning User Authentication System Byeong Ho Kang 1 and Hyejin Kim 2 1 School of Engineering and ICT, University of Tasmania,
Physical Security: A Biometric Approach Preeti, Rajni M.Tech (Network Security),BPSMV [email protected], [email protected]
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 3 Issue 2 February, 2014 Page No. 3864-3868 Abstract: Physical Security: A Approach Preeti, Rajni M.Tech (Network
Online Proctoring Systems Compared
Online Proctoring Systems Compared David Foster Caveon Test Security Harry Layman The College Board March 13, 2013 Online Proctoring Systems Compared Page 1 Introduction Online proctoring, sometimes called
Digital Identity & Authentication Directions Biometric Applications Who is doing what? Academia, Industry, Government
Digital Identity & Authentication Directions Biometric Applications Who is doing what? Academia, Industry, Government Briefing W. Frisch 1 Outline Digital Identity Management Identity Theft Management
Talent Solutions. LinkedIn Certified Professional. Program Handbook. LinkedIn Certified Professional Recruiter
Talent Solutions LinkedIn Certified Professional Program Handbook LinkedIn Certified Professional Recruiter Talent Solutions LinkedIn Certified Professional Table of contents Why get certified 03 How to
An Analysis of how Proctoring Exams in Online Mathematics Offerings Affects Student Learning and Course Integrity
An Analysis of how Proctoring Exams in Online Mathematics Offerings Affects Student Learning and Course Integrity Introduction Reliable assessment is central to education and educational institutions for
KEYSTROKE DYNAMIC BIOMETRIC AUTHENTICATION FOR WEB PORTALS
KEYSTROKE DYNAMIC BIOMETRIC AUTHENTICATION FOR WEB PORTALS Plurilock Security Solutions Inc. www.plurilock.com [email protected] 2 H IGHLIGHTS: PluriPass is Plurilock static keystroke dynamic biometric
Thwarting online exam cheating without proctor supervision
Abstract Thwarting online exam cheating without proctor supervision G. R. Cluskey Jr. Troy University, Global Campus Craig R. Ehlen University of Southern Indiana Mitchell H. Raiborn Bradley University
May 2010. For other information please contact:
access control biometrics user guide May 2010 For other information please contact: British Security Industry Association t: 0845 389 3889 f: 0845 389 0761 e: [email protected] www.bsia.co.uk Form No. 181.
NFC & Biometrics. Christophe Rosenberger
NFC & Biometrics Christophe Rosenberger OUTLINE GREYC - E-payment & Biometrics Contactless transactions Biometric authentication Solutions Perspectives 2 GREYC Research Lab Research Group in Computer science,
Framework for Biometric Enabled Unified Core Banking
Proc. of Int. Conf. on Advances in Computer Science and Application Framework for Biometric Enabled Unified Core Banking Manohar M, R Dinesh and Prabhanjan S Research Candidate, Research Supervisor, Faculty
Voice Authentication for ATM Security
Voice Authentication for ATM Security Rahul R. Sharma Department of Computer Engineering Fr. CRIT, Vashi Navi Mumbai, India [email protected] Abstract: Voice authentication system captures the
De-duplication The Complexity in the Unique ID context
De-duplication The Complexity in the Unique ID context 1. Introduction Citizens in India depend on the Government for various services at various stages of the human lifecycle. These services include issuance
ONLINE FACULTY HANDBOOK
ONLINE FACULTY HANDBOOK Online Faculty Support Guide The Online Faculty Handbook was created to inform faculty on college procedures for developing, managing, and requesting online courses whether they
IDRBT Working Paper No. 11 Authentication factors for Internet banking
IDRBT Working Paper No. 11 Authentication factors for Internet banking M V N K Prasad and S Ganesh Kumar ABSTRACT The all pervasive and continued growth being provided by technology coupled with the increased
Opinion and recommendations on challenges raised by biometric developments
Opinion and recommendations on challenges raised by biometric developments Position paper for the Science and Technology Committee (House of Commons) Participation to the inquiry on Current and future
3.4.9 The institution provides appropriate academic support services. (Academic support services)
3.4.9 The institution provides appropriate academic support services. (Academic support services) Off-Site Committee Comments While it appears that the institution offers appropriate academic support services
LiveTalk Call Center solution
LiveTalk Call Center solution I. Introduction LiveTalk enables real-time interaction between callers and a pool of technical and customer support or sales agents via a completely web based interface. With
Automatic Biometric Student Attendance System: A Case Study Christian Service University College
Automatic Biometric Student Attendance System: A Case Study Christian Service University College Dr Thomas Yeboah Dr Ing Edward Opoku-Mensah Mr Christopher Ayaaba Abilimi ABSTRACT In many tertiary institutions
PTE ACADEMIC www.pearsonpte.com SECURE
PTE ACADEMIC www.pearsonpte.com We believe fair tests should be as secure as possible Cheating is unfair and undermines the efforts of the honest majority. We believe PTE Academic is the most secure test
CJ 4480 Digital Forensics II Syllabus - Term 2 2015
CJ 4480 Digital Forensics II Syllabus - Term 2 2015 For course syllabus posted prior to the beginning of the term, the instructor reserves the right to make minor changes prior to or during the term. The
SOFTWARE TOOLS FOR ONLINE TEACHING: A FACULTY PERSPECTIVE. Abstract. Background
1 SOFTWARE TOOLS FOR ONLINE TEACHING: A FACULTY PERSPECTIVE Sara McCaslin Department of Mechanical Engineering University of Texas at Tyler [email protected] Fredericka Brown Department of Mechanical
COMPARISON OF VARIOUS BIOMETRIC METHODS
COMPARISON OF VARIOUS BIOMETRIC METHODS Rupinder Saini, Narinder Rana Rayat Institute of Engineering and IT [email protected], [email protected] Abstract This paper presents comparison
Biometrics is the use of physiological and/or behavioral characteristics to recognize or verify the identity of individuals through automated means.
Definition Biometrics is the use of physiological and/or behavioral characteristics to recognize or verify the identity of individuals through automated means. Description Physiological biometrics is based
BehavioSec participation in the DARPA AA Phase 2
BehavioSec participation in the DARPA AA Phase 2 A case study of Behaviometrics authentication for mobile devices Distribution Statement A (Approved for Public Release, Distribution Unlimited) 1 This paper
Accessing the bank account without card and password in ATM using biometric technology
Accessing the bank account without card and password in ATM using biometric technology Mini Agarwal [1] and Lavesh Agarwal [2] Teerthankar Mahaveer University Email: [email protected] [1], [email protected]
Securing e-government Web Portal Access Using Enhanced Two Factor Authentication
Securing e-government Web Portal Access Using Enhanced Two Factor Authentication Ahmed Arara 1, El-Bahlul Emhemed Fgee 2, and Hamdi Ahmed Jaber 3 Abstract This paper suggests an advanced two-factor authentication
Secure access provided to sensitive documents - anytime, anywhere. Quick setup and easy administration of data room, documents and users
Eliminate the Paper Chase V-Rooms Virtual Data Rooms is an Internet-based, on demand hosted service designed to speed the completion of financial transactions which may involve hundreds of participants
How To Learn Distance Learning
Global Outreach & Extended Education [email protected] ph: 480.965.1740 Ira A. Fulton Schools of Engineering Distance Learning Student Manual Welcome to the office of Global Outreach and Extended Education
Decision on adequate information system management. (Official Gazette 37/2010)
Decision on adequate information system management (Official Gazette 37/2010) Pursuant to Article 161, paragraph (1), item (3) of the Credit Institutions Act (Official Gazette 117/2008, 74/2009 and 153/2009)
This method looks at the patterns found on a fingertip. Patterns are made by the lines on the tip of the finger.
According to the SysAdmin, Audit, Network, Security Institute (SANS), authentication problems are among the top twenty critical Internet security vulnerabilities. These problems arise from the use of basic
OMCP R Certification Handbook
How to Use the OMCP Certification Handbook This handbook is a guide to applying for and maintaining your OMCP certifications. All OMCP R and OMCA certification applicants must read this entire handbook
Security Management. Keeping the IT Security Administrator Busy
Security Management Keeping the IT Security Administrator Busy Dr. Jane LeClair Chief Operating Officer National Cybersecurity Institute, Excelsior College James L. Antonakos SUNY Distinguished Teaching
User Authentication using Combination of Behavioral Biometrics over the Touchpad acting like Touch screen of Mobile Device
2008 International Conference on Computer and Electrical Engineering User Authentication using Combination of Behavioral Biometrics over the Touchpad acting like Touch screen of Mobile Device Hataichanok
Integrated Threat & Security Management.
Integrated Threat & Security Management. SOLUTION OVERVIEW Vulnerability Assessment for Web Applications Fully Automated Web Crawling and Reporting Minimal Website Training or Learning Required Most Accurate
Guidelines for Addressing Distance and Correspondence Education
Southern Association of Colleges and Schools Commission on Colleges 1866 Southern Lane Decatur, Georgia 30033-4097 Guidelines for Addressing Distance and Correspondence Education A Guide for Evaluators
Running head: CONCEPTUALIZING INTELLIGENT AGENTS FOR TEACHING AND LEARNING. Conceptualizing Intelligent Agents For Teaching and Learning
Running head: CONCEPTUALIZING INTELLIGENT AGENTS FOR TEACHING AND LEARNING Conceptualizing Intelligent Agents For Teaching and Learning Ali Jafari, Ph.D. Professor of Computer Technology Director of CyberLab
A Various Biometric application for authentication and identification
A Various Biometric application for authentication and identification 1 Karuna Soni, 2 Umesh Kumar, 3 Priya Dosodia, Government Mahila Engineering College, Ajmer, India Abstract: In today s environment,
POLITICAL SCIENCE 100 Nevada Constitution Section XX Course date & time, Course Location Fall 20XX Syllabus
POLITICAL SCIENCE 100 Nevada Constitution Section XX Course date & time, Course Location Fall 20XX Syllabus Dr. Eric Herzik Office: Mack Social Science (MSS) #224 Office Hours: Thursday 2:30-3:30 and by
Automatic Speaker Verification (ASV) System Can Slash Helpdesk Costs
Solutions White Paper Automatic Speaker Verification (ASV) System Can Slash Helpdesk Costs Table of Contents Executive Summary............................. 1 Business Challenge.............................
Computer Science 1301 Computer Literacy. Student Learning Outcomes
Computer Science 1301 Computer Literacy Student Learning Outcomes 1. Introduction to Computers Students will be introduced to basic computer concepts, such as what a computer is, how it works and what
CJ 4475 Seminar in Cyber Security Syllabus Term 4 2016
CJ 4475 Seminar in Cyber Security Syllabus Term 4 2016 For course syllabus posted prior to the beginning of the term, the instructor reserves the right to make minor changes prior to or during the term.
Development of Distributive Architecture for Post-Unified Tertiary Matriculation Examination (UTME) Assessment
Development of Distributive Architecture for Post-Unified Tertiary Matriculation Examination (UTME) Assessment Virginia E. Ejiofor 1, MacDonald N. Onyeizu 2, Daniel Ugoh 3, Anthonia N. Nwosu 4 1,3 Department
Extended Learning Department
Extended Learning Department Office for Instruction 1410 University Ave Williston, ND 58801 701-774- 4200 Student elearning Handbook August 2015 July 2016 Table of Contents Williston State College Mission,
Application of Biometric Technology Solutions to Enhance Security
Application of Biometric Technology Solutions to Enhance Security Purpose: The purpose of this white paper is to summarize the various applications of fingerprint biometric technology to provide a higher
Continuous Biometric User Authentication in Online Examinations
2010 Seventh International Conference on Information Technology Continuous Biometric User Authentication in Online Examinations Eric Flior, Kazimierz Kowalski Department of Computer Science, California
22 nd NISS Conference
22 nd NISS Conference Submission: Topic: Keywords: Author: Organization: Tutorial BIOMETRICS - DEVELOPING THE ARCHITECTURE, API, ENCRYPTION AND SECURITY. INSTALLING & INTEGRATING BIOMETRIC SYSTEMS INTO
Remote Proctor System Exam Policy
Remote Proctor System Exam Policy Securexam Remote Proctor contains a web-camera and microphone encased within the unit. The video clips will be used for the purpose of establishing if any student misconduct
New River Community College. Information Technology Policy and Procedure Manual
New River Community College Information Technology Policy and Procedure Manual 1 Table of Contents Asset Management Policy... 3 Authentication Policy... 4 Breach Notification Policy... 6 Change Management
The University of Texas of the Permian Basin Distance Education Policy
The University of Texas of the Permian Basin Distance Education Policy 1. UTPB Mission Statement The programs and courses offered via distance education are consistent with the role and mission of the
PUAD 502 Administration in Public and Non-Profit Organizations Term Offered Fall, 2015 Syllabus
PUAD 502 Administration in Public and Non-Profit Organizations Term Offered Fall, 2015 Syllabus Instructor Sheldon Edner, PhD Communication with instructor can be by email, telephone or prearranged meeting.
EXPERIENCES VERIFYING THE IDENTITY OF DISTANCE LEARNING STUDENTS
IDENTITY SOLUTIONS EXPERIENCES VERIFYING THE IDENTITY OF DISTANCE LEARNING STUDENTS THIRD ANNUAL REPORT ON IDENTITY IN DISTANCE LEARNING Acxiom Corporation 601 E. Third, Little Rock, AR 72201 www.acxiom.com
DISTANCE EDUCATION. Dual Credit Responsibilities. Table of Contents. Handbook. Introduction... 2. Welcome to EPCC Dual Credit Program!...
I thin k Handbook DISTANCE EDUCATION Dual Credit Responsibilities Table of Contents Introduction... 2 Welcome to EPCC Dual Credit Program!... 3 Section 1: High School Instructional Facilitator Responsibilities...
WHITE PAPER. Let s do BI (Biometric Identification)
WHITE PAPER Let s do BI (Biometric Identification) Fingerprint authentication makes life easier by doing away with PINs, passwords and hint questions and answers. Since each fingerprint is unique to an
How To Develop A Hybrid Education Program
A Hybrid Distance Education Model For the Master s Degree Program Presented by: Gail Richard & Rebecca Throneburg High Demand, Selective Traditional Program Master s degree is entrylevel degree to practice
Dynamic Query Updation for User Authentication in cloud Environment
Dynamic Query Updation for User Authentication in cloud Environment Gaurav Shrivastava 1, Dr. S. Prabakaran 2 1 Research Scholar, Department of Computer Science, SRM University, Kattankulathur, Tamilnadu,
IDENTITY MANAGEMENT. February 2008. The Government of the Hong Kong Special Administrative Region
IDENTITY MANAGEMENT February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without
MATH 205 STATISTICAL METHODS
Syllabus Objective MATH 205 STATISTICAL METHODS Course Syllabus The purpose of this syllabus is to guide the participant in the requirements, demands, logistics and expectations of this course. Getting
Taking Your Online. APMG-International
APMG-International Taking Your Online APMG-International Exam ProctorU Candidate Guidelines ProctorU Background Information How it works ProctorU is a unique service that allows candidates to complete
Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 10 Authentication and Account Management
Security+ Guide to Network Security Fundamentals, Fourth Edition Chapter 10 Authentication and Account Management Objectives Describe the three types of authentication credentials Explain what single sign-on
Development of Academic Attendence Monitoring System Using Fingerprint Identification
164 Development of Academic Attendence Monitoring System Using Fingerprint Identification TABASSAM NAWAZ, SAIM PERVAIZ, ARASH KORRANI, AZHAR-UD-DIN Software Engineering Department Faculty of Telecommunication
Global Deployment of Finger Vein Authentication
Global Deployment of Finger Vein Authentication Hitachi Review Vol. 61 (2012), No. 1 35 Yutaka Matsui Akihito Sawada Shigenori Kaneko Yuji Nakamaru Ravi Ahluwalia Dipak Kumar OVERVIEW: Finger vein authentication
NASCIO 2015 State IT Recognition Awards
NASCIO 2015 State IT Recognition Awards Title: State of Georgia Private Security Cloud Implementation Category: Cybersecurity Contact: Mr. Calvin Rhodes CIO, State of Georgia Executive Director, GTA [email protected]
Quality Measurement and Good Practices in Web-Based Distance Learning:
Volume 20, Number 4 - September 2004 through December 2004 Quality Measurement and Good Practices in Web-Based Distance Learning: A Case Study of the Industrial Management Program at Central Missouri State
DISTANCE AND CORRESPONDENCE EDUCATION
DISTANCE AND CORRESPONDENCE EDUCATION Policy Title: Distance and Correspondence Education Policy Type: Administrative Policy Number: 34-01(2014) Approved: 01/12/2015 Responsible Office: Dean, School of
OCR LEVEL 3 CAMBRIDGE TECHNICAL
Cambridge TECHNICALS OCR LEVEL 3 CAMBRIDGE TECHNICAL CERTIFICATE/DIPLOMA IN IT NETWORKED SYSTEMS SECURITY J/601/7332 LEVEL 3 UNIT 28 GUIDED LEARNING HOURS: 60 UNIT CREDIT VALUE: 10 NETWORKED SYSTEMS SECURITY
A SECURE METHOD FOR SIGNING IN USING QUICK RESPONSE CODES WITH MOBILE AUTHENTICATION
A SECURE METHOD FOR SIGNING IN USING QUICK RESPONSE CODES WITH MOBILE AUTHENTICATION Kalpesh Adhatrao 1, Aditya Gaykar 2, Rohit Jha 3, Vipul Honrao 4 Department of Computer Engineering, Fr. C.R.I.T., Vashi,
W.A.R.N. Passive Biometric ID Card Solution
W.A.R.N. Passive Biometric ID Card Solution Updated November, 2007 Biometric technology has advanced so quickly in the last decade that questions and facts about its cost, use, and accuracy are often confused
Cisco Advanced Services for Network Security
Data Sheet Cisco Advanced Services for Network Security IP Communications networking the convergence of data, voice, and video onto a single network offers opportunities for reducing communication costs
French Justice Portal. Authentication methods and technologies. Page n 1
French Justice Portal Authentication methods and technologies n 1 Agenda Definitions Authentication methods Risks and threats Comparison Summary Conclusion Appendixes n 2 Identification and authentication
etroy Abnormal Psychology 3304 TERM 1, 2015
etroy Abnormal Psychology 3304 TERM 1, 2015 For course syllabus posted prior to the beginning of the term, the instructor reserves the right to make minor changes prior to or during the term. The instructor
Ivy Tech Community College of Indiana
Ivy Tech Community College of Indiana POLICY TITLE Distance Education Course Design and Development POLICY NUMBER ASOM 6.0 (Formerly APPM 5. & 5.) PRIMARY RESPONSIBILITY Instructional Design CREATION /
HTML-eZ: The Easy Way to Create a Class Website
For more resources click here -> HTML-eZ: The Easy Way to Create a Class Website Henry Borysewicz Director, AeroSpace Network / Scientific Computing Center John D. Odegard School for Aerospace Sciences,
Two-Factor Authentication Making Sense of all the Options
Two-Factor Authentication Making Sense of all the Options The electronic age we live in is under attack by information outlaws who love profiting from the good record of others. Now more than ever, organizations
Whitepaper MODERN THREATS DRIVE DEMAND FOR NEW GENERATION TWO-FACTOR AUTHENTICATION
Whitepaper MODERN THREATS DRIVE DEMAND FOR NEW GENERATION TWO-FACTOR AUTHENTICATION A RECENT SURVEY SHOWS THAT 90% OF ALL COMPANIES HAD BEEN BREACHED IN THE LAST 12 MONTHS. THIS PARED WITH THE FACT THAT
GMS GRAPHICAL MANAGEMENT SYSTEM
GMS GRAPHICAL MANAGEMENT SYSTEM 1 GMS The integrated security management system for multi-site organizations. Pacom s Graphical Management System (GMS) is the modular client-server application that integrates
Master of Public Administration
Master of Public Administration About Southern Utah University Online Master of Public Administration Admission Requirements How to Apply Tuition and Financial Aid FAQs Southern Utah University Admissions
