E-exams versus paper exams: A comparative analysis of cheating-related security threats and countermeasures

E-exams can have a lot of advantages over traditional paper-based exams, and if using a BYOD approach (Bring Your Own Device) they can also scale to large classes and peak exam days. At the same time, BYOD adds extra security challenges by using student-controlled equipment. To be viable, BYOD e-exams need not have perfect security, only about the same level of security as paper-based exams have. This article uses attack-defense trees to provide an analysis comparing the threats and countermeasures against cheating at controlled exams with paper-based exams versus BYOD e-exams. The conclusion is that neither has a clear advantage from a security perspective.

[1]  Barbara Kordy,et al.  ADTool: Security Analysis with Attack-Defense Trees , 2013, QEST.

[2]  Mubashrah Jamil,et al.  Computer-Based vs Paper-Based Examinations: Perceptions of University Teachers. , 2012 .

[3]  D. Pinto Secrets and Lies: Digital Security in a Networked World , 2003 .

[4]  Inge Unneberg Eksamensfusk ved universiteter og høyskoler , 2012 .

[5]  Guttorm Sindre,et al.  E-exams and exam process improvement , 2015, NIK.

[6]  Caroline V. Gipps,et al.  What is the role for ICT-based assessment in universities? , 2005 .

[7]  Mikaela Björklund,et al.  Academic cheating : frequency, methods and causes. Paper presented at the European Conference on Educational Research (ECER), September 22-25, Lahti, Finland , 1999 .

[8]  J. Carter,et al.  Addressing student cheating: definitions and solutions , 2002, ITiCSE-WGR '02.

[9]  Hsin-Kai Wu,et al.  Toward an integrated model for designing assessment systems: An analysis of the current status of computer-based assessments in science , 2013, Comput. Educ..

[10]  Randy Elliot Bennett,et al.  Technological Issues for Computer-Based Assessment , 2012 .

[11]  Roy B. Clariana,et al.  Paper-based versus computer-based assessment: key factors associated with the test mode effect , 2002, Br. J. Educ. Technol..

[12]  Chula G. King,et al.  Online Exams and Cheating: An Empirical Analysis of Business Students' Views , 2009 .

[13]  Barbara Kordy,et al.  Attack-defense trees , 2014, J. Log. Comput..

[14]  Phillip Dawson,et al.  Five ways to hack and cheat with bring-your-own-device electronic examinations , 2016, Br. J. Educ. Technol..

[15]  Solomon E. Feldman,et al.  College cheating as a function of subject and situational variables. , 1964 .

[16]  Anastasios A. Economides,et al.  The acceptance and use of computer based assessment , 2011, Comput. Educ..

[17]  Judithe Sheard,et al.  Addressing student cheating: definitions and solutions , 2003, ACM SIGCSE Bull..

[18]  Bridget D. Arend Encouraging Critical Thinking in Online Threaded Discussions. , 2009 .

[19]  G. Conole,et al.  A review of computer-assisted assessment , 2005 .

[20]  Linda Klebe Trevino,et al.  Cheating in Academic Institutions: A Decade of Research , 2001 .

[21]  Stephen E. Newstead,et al.  Undergraduate Cheating: Who Does What and Why?. , 1995 .

[22]  Gabriele Lenzini,et al.  Remark!: A Secure Protocol for Remote Exams , 2014, Security Protocols Workshop.

[23]  Gavin Sim,et al.  Implementation of computer assisted assessment: lessons from the literature , 2004 .

[24]  Jordi Herrera-Joancomartí,et al.  A secure e-exam management system , 2006, First International Conference on Availability, Reliability and Security (ARES'06).

[25]  Mathew Hillier,et al.  The very idea of e-Exams: Student (pre)conceptions , 2014 .

[26]  Niall Sclater,et al.  User requirements of the "ultimate" online assessment engine , 2003, Comput. Educ..

[27]  Judithe Sheard,et al.  Cheating and plagiarism: perceptions and practices of first year IT students , 2002, ITiCSE '02.

[28]  Yair Levy,et al.  A Theoretical Approach for Biometrics Authentication of e-Exams , 2007 .