Five ways to hack and cheat with bring-your-own-device electronic examinations
暂无分享,去创建一个
[1] J. Biggs. What the student does: teaching for enhanced learning , 1999 .
[2] Lisa J. Carnahan,et al. Security in Open Systems , 1994 .
[3] Tilo Müller,et al. On the Practicability of Cold Boot Attacks , 2013, 2013 International Conference on Availability, Reliability and Security.
[4] Shane Balfe,et al. Final Fantasy - Securing On-Line Gaming with Trusted Computing , 2007, ATC.
[5] Kyle Rankin. Cold boot attack tools for Linux , 2009 .
[6] David Carless,et al. The examined life: perspectives of lower primary school students in Hong Kong , 2014 .
[7] IamnitchiAdriana,et al. Cheating in Online Games , 2014 .
[8] A. C. Butler,et al. Feedback enhances the positive effects and reduces the negative effects of multiple-choice testing , 2008, Memory & cognition.
[9] D. Carless. Trust, distrust and their impact on assessment reform , 2009 .
[10] Ariel J. Feldman,et al. Lest we remember: cold-boot attacks on encryption keys , 2008, CACM.
[11] Sue Bennett,et al. Assessment Might Dictate the Curriculum, but What Dictates Assessment? , 2013 .
[12] Nora Mogey,et al. Students’ choices between typing and handwriting in examinations , 2012 .
[13] D. Boud. Sustainable Assessment: Rethinking assessment for the learning society , 2000 .
[14] Melody Charman. Linguistic analysis of extended examination answers: Differences between on-screen and paper-based, high- and low-scoring answers , 2014, Br. J. Educ. Technol..
[15] J. Hartley,et al. To write or to type? The effects of handwriting and word-processing on the written style of examination essays , 2013 .
[16] P. Dawson,et al. A contribution to the history of assessment: how a conversation simulator redeems Socratic method , 2014 .