Academic Dishonesty in Online Coursework

Similar documents
POLS : American and Wyoming Government Spring :00-10:50 MW, AG Auditorium

CPSC 467b: Cryptography and Computer Security

PLSI 200: Intro American Politics and Government Spring Class Meeting: W 4:10pm 6:55 pm HUM 133

A REPORT BY THE NEW YORK STATE OFFICE OF THE STATE COMPTROLLER

UPS ACADEMIC APPEALS

U.S. CONSTITUTION SYLLABUS POS 222/ Spring /5//09-Dec 15 or 17, POS 222 Section Room CL14 Time:TTR: 1:00-2:15 p.m.

MAC 2311 CALCULUS 1 FALL SEMESTER 2015

N.J.A.C. 13:61. NEW JERSEY ADMINISTRATIVE CODE Copyright (c) 2007 by the New Jersey Office of Administrative Law

Syllabus for AP U.S Government and Politics/ Lawrence Holland (206) Room 328

University of Connecticut, Storrs Spring POLS2998: Contemporary Political Theory Course Syllabus. I. Overview

Why Biometrics? Why Biometrics? Biometric Technologies: Security and Privacy 2/25/2014. Dr. Rigoberto Chinchilla School of Technology

PA 311: Policy Analysis & Program Evaluation

Privacy Policy & Terms of Use

Guidelines for Standing Committee Tri-chairs

THE FOLLOWING PROCEDURE MUST BE FOLLOWED WHEN AN INDIVIDUAL APPLIES FOR A FIREARMS IDENTIFICATION CARD:

European Economic History

Identity Verification in Passport Issuance

October 2015 Issue No: 2.4. Good Practice Guide No. 45 Identity Proofing and Verification of an Individual

Fragomen Privacy Notice

Law or Politics? The U.S. Supreme Court and the Meaning of the Constitution

ARTICLE X: STUDENT POLICIES AND PROCEDURES Section 2. Policy on Student Conduct. Policy 2.1: Grievance Procedures Issued: May 1, 2001

INTRODUCTION BACKGROUND. Chapter One

Analysis of AMS Elections 2010 Voting System

WEST LOS ANGELES COLLEGE POLITICAL SCIENCE 001 THE GOVERNMENT OF THE UNITED STATES

International Biometrics & Identification Association

IDEMIA Identity & Security. Providing identity assurance to. secure & simplify lives N.A.

AMERICAN NATIONAL GOVERNMENT Bluefield State College POSC 200 FALL 2014 CRN: Section: 003 WEBBD

Social Security. Don t be a Scam Victim- You re in Control. This presentation produced at U.S. taxpayer expense.

Dated 26 January 2012 HIGHER EDUCATION FUNDING COUNCIL FOR ENGLAND. - and THE COPYRIGHT LICENSING AGENCY LIMITED AGREEMENT. Relating to REF 2014

Revised and enhanced identification checking guidelines (effective from 28 May 2012)

East Georgia State College Social Sciences Division POLITICAL SCIENCE 1101 (CRN 20369; ; M/W/F) AMERICAN GOVERNMENT

Frequently Asked Questions for Participating Members and Organizations

Supreme Court Electronic Filing System

Smart Voting System using UIDAI

ID checking guidelines for DBS check applications

This tutorial also provides a glimpse of various security issues related to biometric systems, and the comparison of various biometric systems.

SGA STATUTES TITLE VI PAGE 1 OF 12

Privacy. Purpose. Scope. Policy. Appendix A

PLSC 104 AMERICAN GOVERNMENT CREDITS: 3.0

American Government I GOVT 2301 Collin College, Spring Creek

History : Western Civilization II Spring 2014, 9:00-9:50 am, EDUC 220 Dr. Nancy Vavra

LATEST IN BIOMETRIC TECHNOLOGY IN THE SERVICE OF TRAVEL SECURITY. Presented By: Cristian Morosan - University of Houston

Montana Tech Faculty Senate Meeting Wednesday, September 28, :30-5pm

GRADUATE STUDENT ASSOCIATION STATE UNIVERSITY OF NEW YORK AT BUFFALO

M-Vote (Online Voting System)

Highway246.net INTERNET ACCESS AGREEMENT

Media and State Stability Lessons Learned

Functions and Duties of a California Notary Public

WEST LOS ANGELES COLLEGE - POPP POLITICAL SCIENCE 001 THE GOVERNMENT OF THE UNITED STATES

GUEST WIFI NETWORK. Terms and Conditions and Acceptable Use Protocol

BYLAWS OF THE WISCONSIN LAW REVIEW

Office of Civil Rights. Data Collection 3/3/2015. Acronyms. Today s Session

Mojdeh Nikdel Patty George

Office Of Civil Rights Data Collection Home Base Symposium

DHS Biometrics Strategic Framework

LMIS Meeting Minutes. September 15, 2015

Applied Multidimensional Scaling

Issue Overview: Are social networking sites good for our society?

Tuesday November 29, 2016

Union Elections. Online Voting. for Credit. Helping increase voter turnout & provide accessible, efficient and secure election processes.

General Statutes of North Carolina Copyright 2016 by Matthew Bender & Company, Inc. a member of the LexisNexis Group. All rights reserved

Biometrics & Accessibility

Indonesia s Unified Database (UDB)

Non-Binding Trusted Party Consortium Agreement. Accession Agreement. ASERL-GWLA Consortium Membership v

How to enter There is no fee to enter the Contest and no purchase is required. To enter the Contest, entrants must:

LICENSE TO USE THIS SITE

Addressing the Challenges of e-voting Through Crypto Design

Instructions for Consideration of Deferred Action for Childhood Arrivals

ONE ID Identity Assurance Standard

Elon University School of Law Honor Code Preamble

Business and Politics (POL 229) Davidson College. Spring 2017 Class Times: Tuesday and Thursday, 3:05 pm 4:20 pm Class Location: Chambers 1062

International Va a Federation

Assessment Planning for Academic Degree Programs

WESTERN ILLINOIS UNIVERSITY DEPARTMENT OF POLITICAL SCIENCE. Professor Gregory Baldi Morgan Hall g Telephone: (309)

January 2017 Eteach, Norwich House, Camberley, Surrey, GU15 3SY T:

University of Montana Department of Political Science

PSC : American Politics 212 Graham Building MWF, 10:00-10:50 Spring Course Description

a) You must present acceptable photo identification for admission to the test center.

OFFICE OF THE INFORMATION & PRIVACY COMMISSIONER for Prince Edward Island. Order No. PP Re: Elections PEI. March 15, 2019

SECURE REMOTE VOTER REGISTRATION

HIEU 150: Modern Britain (Spring 2019)

Complaints Handling Procedure

Challenges and Advances in E-voting Systems Technical and Socio-technical Aspects. Peter Y A Ryan Lorenzo Strigini. Outline

GEORGIA INSTITUTE OF TECHNOLOGY Sam Nunn School of International Affairs. Ethics in International Affairs INTA 2030 Spring Dr.

Acceptance of Biometrics: Things That Matter That We Are Ignoring

LEGAL TERMS OF USE. Ownership of Terms of Use

Sensor Concepts Incorporated TERMS OF SERVICE

A closed circuit television system is used at the Memorial Hall by the Parish Council.

PUBLICATIONS SUBSCRIPTION AND ACCESS AGREEMENT TERMS & CONDITIONS FOR SUBSCRIBERS TO THE ELECTRONIC PUBLICATIONS

Constellation NewEnergy, Inc. ( Constellation ) Constellation Bay Quiz Sweepstakes (the Sweepstakes )

TERMS OF USE. 1. Background

WEST LOS ANGELES COLLEGE POLITICAL SCIENCE 001 THE GOVERNMENT OF THE UNITED STATES:

Hoboken Public Schools. Project Lead The Way Curriculum Grade 8

NC General Statutes - Chapter 36F 1

PSC : American Politics 106 Graham Building MWF, 11:00-11:50 Fall 2012

UCLA Policy 120: Legal Processes Summonses, Complaints, and Subpoenas

Biometrics: primed for business use

PSC 306, Fall 2013 Prof. James E. Campbell. 14 Knox Hall :00 8:50pm Wednesdays

The Modern TENPRINT Examiner

What is US-VISIT? United States Visitor and Immigrant Status Indicator Technology (US-VISIT) Biometric Services

Transcription:

Academic Dishonesty in Online Coursework Securing the ecampus 2012 Breakout Session Wed 18 July 2012 M. E. Kabay, PhD, CISSP-ISSMP Prof. Information Assurance & Statistics School of Business & Management, Norwich University mailto:mekabay@gmail.com V: 802.479.7937 1 Copyright 2012 M. E. Kabay. All rights reserved.

Topics Ø What s the problem? Ø Possible solutions Ø Risk analysis 2 Copyright 2012 M. E. Kabay. All rights reserved.

Famous Cartoon Copyright Peter Steiner 1993. The New Yorker 69(20):61 (1993-07-15) 3 Copyright 2012 M. E. Kabay. All rights reserved.

What s the Problem? Ø Functional problems q How do we establish the identity of students registering in online courses? q How do we verify that the work submitted under the name of registered students was created by those students? q How do we know that the recipients of degrees legitimately deserve those degrees? Ø Administrative problem q How do we comply with law? q How do we comply with regulations of accrediting bodies? 4 Copyright 2012 M. E. Kabay. All rights reserved.

http://cihe.neasc.org/ Elaborating on the Problem Ø Commission on Institutions of Higher Education (CIHE) of the New England Association of Schools & Colleges (NEASC): Pp90 Guidelines for the Evaluation of Distance Education (On-Line Learning) http://tinyurl.com/6wlhr7g 5 Copyright 2012 M. E. Kabay. All rights reserved.

Older Guidance from NEASC Ø From superseded document Best Practices for Electronically Offered Degree and Certification Programs (no longer available) Ø 5b. When examinations are employed (paper, online, demonstrations of competency, etc.), they take place in circumstances that include firm student identification. The institution otherwise seeks to assure the integrity of student work. Ø If proctoring is used, what are the procedures for selecting proctors, establishing student identity, assuring security of test instruments, administering the examinations, and assuring secure and prompt evaluation? 6 Copyright 2012 M. E. Kabay. All rights reserved. See also SACS: http://www.sacscoc.org/pdf/commadap.pdf

CIHE: Best Practices [2] Ø If other methods are used to identify those who take the examination, how is identification firmly established? How are the conditions of the examination (security, time limits, etc.) controlled? Ø Does the institution have in place effective policies and procedures to assure the integrity of student work? 7 Copyright 2012 M. E. Kabay. All rights reserved.

Some Proposed Solutions Ø What you know (that no one else does) Ø What you have (that no one else does) Ø What you are (static biometrics) Ø What you do (dynamic biometrics) Ø Where you are (IP addresses) 8 Copyright 2012 M. E. Kabay. All rights reserved.

Securexam Remote Proctor Ø Biometric authenticator (fingerprint) Ø Movement sensor Ø Sound sensor Ø USB connection to computer Ø Detects unusual movement or noise registers event Ø Would signal disruption of communication with remote server http://softwaresecure.com/main.aspx 9 Copyright 2012 M. E. Kabay. All rights reserved.

Acxiom s FactCheck-X Authenticate (discont d) Ø Online tool Ø Randomly asked questions to user to authenticate identity q Where people lived q What car they owned q What school they attended when Ø Based on databases of historical, public data Ø But such invasions of privacy not approved q See Online Educators Won't Have to Spy on Students, New Rules Say by Marc Parry in Chronicle of Higher Education (2009-06-03) http://chronicle.com/article/online-educators-wont-have/47291/ 10 Copyright 2012 M. E. Kabay. All rights reserved.

Electronic HW & Exam Submissions (1) Ø At Norwich University, QM213 Intro to Statistics course uses NUoodle (NU Moodle) Ø Students download homework (XLSX files) Ø Homework checking uses random selection of questions in electronic quiz Ø Instructor (MK) allowed 3 tries & accepted highest score over 2 week period Ø Quiz showed students correct answer for every question Ø Students reported that gangs of students collaborated in recording and sharing correct answers meaningless HW & exams! 11 Copyright 2012 M. E. Kabay. All rights reserved.

Electronic HW & Exam Submissions (2) Ø One solution: give every student a unique dataset q Might work for a few students at a time q But there are 70 students in class q Not scalable Ø Another possibility: define different problem set for each repetition of quiz q Does not prevent student collaboration to cheat Ø Another idea (most likely for 2012-2013): give electronic exam only once & only in class with instructor supervising q Increased pressure on students q Harder to cheat Ø One more idea: every student must submit their HW file on same day as exam check metadata 12 Copyright 2012 M. E. Kabay. All rights reserved.

NUoodle Ate My Homework Ø One student in QM213 Spring 2012 complained that his homework was lost by system q Said he completed all but one of assignments q Bitterly protested F grade Ø But instructor had enabled detailed logging in NUoodle q Demonstrated that student had not logged into system a single time between late Feb and last day of course! q All other student records showed proper logging Ø MORAL: always enable detailed logging! 13 Copyright 2012 M. E. Kabay. All rights reserved.

Risk Analysis Ø Student pays NU $33K to sign up for degree q Then pays someone else to do all or part of work Ø Then what? q Continues to pay imposter to do student s work in job? q How does ignoramus get a job and keep it with a bogus claims of knowledge? Ø How is this problem different from authenticating identity of on-campus students? Ø How often does this problem happen? q Compare frequency to use of completely bogus credentials 14 Copyright 2012 M. E. Kabay. All rights reserved.

About the Proposed Solutions: Ø What you know (that no one else does) Ø What you have (that no one else does) Ø What you are (static biometrics) Ø What you do (dynamic biometrics) Ø Where you are (IP addresses) Humbug 15 Copyright 2012 M. E. Kabay. All rights reserved.

Humbug?? Ø Every method of authentication is a linkage between one method of identification and another Ø It is a trust linkage Ø But how do we establish trustworthiness of electronic input of a remote student? q Cheater logs on and uploads imposter s work q Cheater logs on and allows imposter to interact with system q Imposter arrives at graduation impersonating cheater for exams Ø And how would we stop same for on-campus students? 16 Copyright 2012 M. E. Kabay. All rights reserved.

DISCUSSION 17 Copyright 2012 M. E. Kabay. All rights reserved.