Online teaching: Do you know who is taking the final exam?

In recent years Distance Learning has been steadily gaining popul arity. More and more courses are being taught online. However, one question remains for those who tea ch online courses: who is doing the real course work? In this paper we will briefly s urvey the commonly used methods to prevent students from e-cheating, attempt to answer the quest ion whether present technology has made it possible to completely eliminate student dishonesty in Distance Learning. In particular we look at how biometrics as identificat ion tools can be applied to achieve this goal. The main purpose of the paper is to ask college educators and policy makers to rethink the credibility and quality of modern college education which could be endangered by issuing college degrees to the students who never really took the r equired courses.

[1]  Gary B. Wills,et al.  Towards security goals in summative e-assessment security , 2009, 2009 International Conference for Internet Technology and Secured Transactions, (ICITST).

[2]  Hao Feng,et al.  Private key generation from on-line handwritten signatures , 2002, Inf. Manag. Comput. Secur..

[3]  Ross J. Anderson,et al.  Combining cryptography with biometrics effectively , 2005 .

[4]  Yair Levy,et al.  A Theoretical Approach for Biometrics Authentication of e-Exams , 2007 .

[5]  Sharath Pankanti,et al.  Fuzzy Vault for Fingerprints , 2005, AVBPA.

[6]  Ajay Kumar,et al.  A palmprint-based cryptosystem using double encryption , 2008, SPIE Defense + Commercial Sensing.

[7]  Sara Alotaibi,et al.  USING BIOMETRICS AUTHENTICATION VIA FINGERPRINT RECOGNITION IN E-EXAMS IN E-LEARNING ENVIRONMENT , 2010 .

[8]  Qi Li,et al.  Cryptographic key generation from voice , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.

[9]  B. Chen,et al.  Biometric Based Cryptographic Key Generation from Faces , 2007, 9th Biennial Conference of the Australian Pattern Recognition Society on Digital Image Computing Techniques and Applications (DICTA 2007).

[10]  K. Rabuzin,et al.  E-learning: Biometrics as a Security Factor , 2006, 2006 International Multi-Conference on Computing in the Global Information Technology - (ICCGI'06).

[11]  C. Chellappan,et al.  Authentication of e-learners using multimodal biometric technology , 2008, 2008 International Symposium on Biometrics and Security Technologies.

[12]  Kazimierz Kowalski,et al.  Continuous Biometric User Authentication in Online Examinations , 2010, 2010 Seventh International Conference on Information Technology: New Generations.

[13]  Michael K. Reiter,et al.  Password hardening based on keystroke dynamics , 1999, CCS '99.

[14]  Barbara Christe Designing Online Courses To Discourage Dishonesty. , 2003 .

[15]  Aparecido Nilceu Marana,et al.  A Video-Based Biometric Authentication for e-Learning Web Applications , 2009, ICEIS.

[16]  Camille F. Rogers,et al.  Faculty perceptions about e-cheating during online testing , 2006 .