A Theoretical Approach for Biometrics Authentication of e-Exams

In the past fifteen years the use of Internet technologies has been substantially growing for delivery of educational content. E-learning environments have been incorporated in many universities for the delivery of e-learning courses. However, opponents of e-learning claim that a central disadvantage of such teaching medium is the growing unethical conduct in such environments. In particular, opponents of e-learning argue that the inability to authenticate exam takers is a major challenge of e-learning environments. As a result, some institutions proposed to take extreme measures including asking students to take exams in proctor centers or even abandon completely the offering of e-learning courses in their institutions. This paper attempts to address this important problem by proposing a theoretical approach that incorporates available fingerprint biometrics authentication technologies in conjunction with e-learning environments to curb unethical conduct during e-learning exam taking. The proposed approach suggests practical solution that can incorporate a random fingerprint biometrics user authentication during exam taking in e-learning courses. Doing so is hypothesized to curb exam cheating in e-learning environments.

[1]  John Solis Crisis on Campus: Confronting Academic Misconduct , 2005 .

[2]  Denise Hamilton,et al.  Plagiarism: Librarians Help Provide New Solutions to an Old Problem. , 2003 .

[3]  Linda Klebe Trevino,et al.  What We Know About Cheating In College Longitudinal Trends and Recent Developments , 1996 .

[4]  Greg Mills,et al.  New Security Paradigms , 2001 .

[5]  Charles L. McLafferty,et al.  Electronic Plagiarism as a College Instructor's Nightmare—Prevention and Detection , 2004 .

[6]  Liora Pedhazur Schmelkin,et al.  Faculty Perceptions of Academic Dishonesty: A Multidimensional Scaling Analysis , 2003 .

[7]  Elsa Naude,et al.  Cheating or 'Collaborative Work': Does it Pay? , 2006 .

[8]  Kristen M. Kennedy,et al.  Academic dishonesty and distance learning: Student and faculty views. , 2000 .

[9]  Starr Roxanne Hiltz,et al.  Education goes digital , 2005, Commun. ACM.

[10]  David C. Yen,et al.  How to Compete in a Global Education Market Effectively? A Conceptual Framework for Designing a Next Generation eEducation System , 2004, J. Glob. Inf. Manag..

[11]  Dorothy E. Leidner,et al.  Research Commentary: Technology-Mediated Learning - A Call for Greater Depth and Breadth of Research , 2001, Inf. Syst. Res..

[12]  Shenglin Yang,et al.  A secure fingerprint matching technique , 2003, WBMA '03.

[13]  L. Treviño,et al.  Academic Dishonesty: Honor Codes and Other Contextual Influences , 1993 .

[14]  Antonella De Angeli,et al.  Usability and biometric verification at the ATM interface , 2003, CHI '03.

[15]  G Robinett LET YOUR FINGERS DO THE TALKING , 1995 .

[16]  R. Newton Staff attitudes to the development and delivery of e‐learning , 2003 .

[17]  Johanna D. Moore,et al.  Proceedings of the Conference on Human Factors in Computing Systems , 1989 .

[18]  Yair Levy,et al.  Securing E-Learning Systems: A Case of Insider Cyber Attacks and Novice IT Management in a Small University , 2006, J. Cases Inf. Technol..

[19]  Angappa Gunasekaran,et al.  E‐learning: research and applications , 2002 .