A classification of threats to remote online examinations

Summative online examinations is a high stake process which faces many security threats. The lack of face-to-face interaction, monitoring or invigilation motivates many threats, which includes intrusion by hackers and collusion by students. This paper is based on a survey of literature to present a threat classification using security abuse case scenarios. Collusion is one of the challenging threats, when a student invites a third party collaborator to impersonate or aid him/her in an online test. While mitigation of all types of threats is important, the risk of collusion is increasingly challenging because it is difficult to detect such attacks.

[1]  Fatos Xhafa,et al.  A massive data processing approach for effective trustworthiness in online learning groups , 2014, Concurr. Comput. Pract. Exp..

[2]  Jean Underwood,et al.  Academic offences and e-learning: individual propensities in cheating , 2003, Br. J. Educ. Technol..

[3]  Peter Williams,et al.  Quality and Standards in Higher Education. , 2010 .

[4]  Yair Levy,et al.  Securing E-Learning Systems: A Case of Insider Cyber Attacks and Novice IT Management in a Small University , 2006, J. Cases Inf. Technol..

[5]  Assosiate,et al.  Enhanced Security for Online Exams Using Group Cryptography , 2017 .

[6]  Sandra Kerka,et al.  Assessing Learners Online. Practitioner File. , 2000 .

[7]  Jan H. P. Eloff,et al.  The role of key loggers in computer-based assessment forensics , 2005 .

[8]  Brian A. Jacob,et al.  Rational Ignorance in Education A Field Experiment in Student Plagiarism , 2012 .

[9]  D. Spence The art of deception , 2013, BMJ.

[10]  Somesh Jha,et al.  Semantics-aware malware detection , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).

[11]  Elmarie Kritzinger Information Security in an E-learning Environment , 2006, Education for the 21st Century.

[12]  David M. Douglas,et al.  VERIFYING USER IDENTITIES IN DISTANCE LEARNING COURSES: DO WE KNOW WHO IS SITTING AND SUBMITTING BEHIND THE SCREEN? , 2014 .

[13]  J. L. Colwell,et al.  Student Ethics in Online Courses , 2005, Proceedings Frontiers in Education 35th Annual Conference.

[14]  Donna Stuber-McEwen,et al.  Point, Click, and Cheat: Frequency and Type of Academic Dishonesty in the Virtual Classroom , 2009 .

[15]  Michael Spaulding Perceptions of Academic Honesty in Online vs. Face-to-Face Classrooms , 2009 .

[16]  Stuart E. Schechter Toward econometric models of the security risk from remote attacks , 2005, IEEE Security & Privacy.

[17]  Gary Wills,et al.  User Security Issues in Summative E-Assessment Security , 2010 .

[18]  Stephen P. Heyneman,et al.  The Corruption of Ethics in Higher Education , 2015 .

[19]  Ian Bates,et al.  A study of academic dishonesty among students at two pharmacy schools , 2002 .

[20]  Brian A. Jacob,et al.  Rational Ignorance in Education: A Field Experiment in Student Plagiarism , 2010 .

[21]  Heon Young Yeom,et al.  Enhanced Security for Online Exams Using Group Cryptography , 2009, IEEE Transactions on Education.

[22]  Ariel Rabkin,et al.  Personal knowledge questions for fallback authentication: security questions in the era of Facebook , 2008, SOUPS '08.

[23]  Joseph Bonneau,et al.  What's in a Name? , 2020, Financial Cryptography.

[24]  Jeffrey L. Bailie,et al.  Online Learner Authentication: Verifying the Identity of Online Users , 2009 .

[25]  Tom R. Wielicki Integrity of online testing in e-learning: empirical study , 2006, Fourth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOMW'06).

[26]  Ariel J. Frank Dependable distributed testing: Can the online proctor be reliably computerized? , 2010, 2010 International Conference on e-Business (ICE-B).

[27]  Wendy Sutherland-Smith,et al.  Retribution, deterrence and reform: the dilemmas of plagiarism management in universities , 2010 .

[28]  William R. Nash,et al.  School Cheating Behavior , 1977 .

[29]  Patricia McGee,et al.  Supporting Academic Honesty in Online Courses. , 2013 .

[30]  Chula G. King,et al.  Online Exams and Cheating: An Empirical Analysis of Business Students' Views , 2009 .

[31]  Azad M. Madni,et al.  Leveraging Biometrics for User Authentication in Online Learning: A Systems Perspective , 2009, IEEE Systems Journal.

[32]  Steven B. Caudill,et al.  Crime in the Classroom: An Economic Analysis of Undergraduate Student Cheating Behavior , 1992 .

[33]  E. Evans,et al.  Teacher and Student Perceptions of Academic Cheating in Middle and Senior High Schools , 1990 .

[34]  Anita M. Krsak Curbing Academic Dishonesty in Online Courses , 2007 .

[35]  Rodrigo de Oliveira,et al.  What's up with whatsapp?: comparing mobile instant messaging behaviors with traditional SMS , 2013, MobileHCI '13.

[36]  O. Harmon,et al.  Assessment Design and Cheating Risk in Online Instruction , 2010 .

[37]  Daniel Owunwanne,et al.  Students Perceptions Of Cheating And Plagiarism In Higher Institutions , 2010 .

[38]  Joe Kerkvliet,et al.  Academic Honesty and Online Courses , 2006 .

[39]  J. Darley,et al.  Behavior and Background of Students in College and Secondary School and Counselling Techniques in College and Secondary School. , 1939 .

[40]  Newell Chiesl Pragmatic Methods to Reduce Dishonesty in Web-Based Courses. , 2007 .

[41]  Lori McNabb,et al.  Communities of Integrity in Online Courses: Faculty Member Beliefs and Strategies , 2009 .

[42]  Bridget D. Arend Encouraging Critical Thinking in Online Threaded Discussions. , 2009 .

[43]  Patrick M. Scanlon Student Online Plagiarism: How Do We Respond? , 2003 .

[44]  N. Rowe Cheating in Online Student Assessment: Beyond Plagiarism , 2004 .

[45]  C. Barnes,et al.  ACADEMIC DISHONESTY IN ONLINE CLASSES: HOW DO WE MAINTAIN THE INTEGRITY OF ONLINE COURSES? , 2010 .

[46]  Adnan,et al.  Vulnerabilities and Attacks on Information Systems in E-learning Environments in Higher Education , 2013 .

[47]  David F. Feldon,et al.  Weeds in the flower garden: An exploration of plagiarism in graduate students' research proposals and its connection to enculturation, ESL, and contextual factors , 2010 .

[48]  Lawrence S. Wrightsman,et al.  Cheating—A research area in need of resuscitation , 1959 .

[49]  Jamie Pinchot,et al.  Assessing Faculty Perceptions and Techniques to Combat Academic Dishonesty in Online Courses , 2016 .

[50]  Bashar Nuseibeh,et al.  Deriving security requirements from crosscutting threat descriptions , 2004, AOSD '04.

[51]  Kamlesh Dutta,et al.  A comparative study of moodle with other e-learning systems , 2011, 2011 3rd International Conference on Electronics Computer Technology.