CINXE.COM
{"title":"Confirming the Identity of the Individual Using Remote Assessment in E-learning","authors":"Olaf Hallan Graven, Lachlan MacKinnon","volume":72,"journal":"International Journal of Educational and Pedagogical Sciences","pagesStart":3696,"pagesEnd":3700,"ISSN":"1307-6892","URL":"https:\/\/publications.waset.org\/pdf\/7024","abstract":"One major issue that is regularly cited as a block to\nthe widespread use of online assessments in eLearning, is that of the\nauthentication of the student and the level of confidence that an\nassessor can have that the assessment was actually completed by that\nstudent. Currently, this issue is either ignored, in which case\nconfidence in the assessment and any ensuing qualification is\ndamaged, or else assessments are conducted at central, controlled\nlocations at specified times, losing the benefits of the distributed\nnature of the learning programme. Particularly as we move towards\nconstructivist models of learning, with intentions towards achieving\nheutagogic learning environments, the benefits of a properly\nmanaged online assessment system are clear. Here we discuss some\nof the approaches that could be adopted to address these issues,\nlooking at the use of existing security and biometric techniques,\ncombined with some novel behavioural elements. These approaches\noffer the opportunity to validate the student on accessing an\nassessment, on submission, and also during the actual production of\nthe assessment. These techniques are currently under development in\nthe DECADE project, and future work will evaluate and report their\nuse..","references":"[1] J. B. Biggs, Teaching for quality learning at university: what the student\ndoes, 2nd ed. Philadelphia, Pa.: Society for Research into Higher\nEducation: Open University Press, 2003.\n[2] D. Boud, Assessment and Learning: contradictory or complementary?\"\nassessment for Learning in Higher education, pp. 35-48, 1995.\n[3] F. Marton and R. Saljo, \"On qualitative differences in learning I.\nOutcome and process,\" British Journal of Educational Psychology vol.\n46, 1976.\n[4] P. McKenna and B. Laycook, \"Constructivist or Instructivist:\nPedagogical concepts practically applied to a computer learning\nenvironment,\" presented at the ITICSE-04, Leeds, UK, 2004.\n[5] D. Boud, \"Assessment and the Promotion of Academic Values,\" Studies\nin Higher Education, vol. 15, pp. 101-111, 1990.\n[6] Y. Cho, \"Assessing writing: Are we bound by only one method,\"\nAssessing writing, vol. 8, pp. 165-191, 2003.\n[7] C. Bereiter and M. Scardamalia, The psychology of written composition.\nHillsdale, N.J.: L. Erlbaum Associates, 1987.\n[8] V. Berninger, D. Whitaker, Y. Feng, H. L. Swanson, and R. D. Abbott,\n\"Assessment of Planning, Translating, and Revising in Junior High\nWriters,\" Journal of School Psychology, vol. 34, pp. 23-52, 1996.\n[9] D. E. Powers and M. E. Fowles, \"Effects of applying different time\nlimits to a proposed GRE writing test,\" Journal of Educational\nMeasurement, vol. 33, pp. 433-452, Win 1996.\n[10] O. H. Graven, D. Samuelsen, and L. M. MacKinnon, \"Computer-based\nRole Playing Game Environment for analogue electronics,\" International\nJournal of Online Engineering, vol. 5, pp. 27-33, 2009.\n[11] O. H. Graven and L. M. MacKinnon, \"Prototyping a Games-Based\nEnvironment for Learning,\" presented at the eLearn, Las Vegas, US,\n2008.\n[12] M. Thelwall, \"Computer Based Assessment: a versatile educational\ntool,\" Computers and Education, V.34, No.1, pp. 37-49, Elsevier 2000\n[13] N. Canning, \"Playing with heutagogy: exploring strategies to empower\nmature learners in higher education,\" Journal of Further and Higher\nEducation, V.34, No.1, pp. 59-71, Taylor & Francis 2010\n[14] P.S. Dowland and S.M. Furnell, \"A long term trial of of keystroke\nprofiling using digraph, trigraph and keyword latencies,\" Security and\nProtection in Information Processing Systems, IFIP 2004, V.147, pp.\n275-289, Springer.\n[15] L. MacKinnon and L. Bacon, \"'Reusing an Existing Wheel' Developing\nData Architecture for Cooperating Autonomous and Semi-Autonomous,\nAgent-based Web Services,\" IETE Technical Review, V.26, No. 5, pp.\n330-334, IETE 2009\n[16] E. Bacon and L. MacKinnon, \"Automated Student Portfolio\nDevelopment and Verification for Expertise Capture in Learning and\nDevelopment Activities - the DECADE Approach,\" Proceedings of\nGlobal Learn Asia Pacific 2010 Conference on Learning and\nTechnology, Penang, Malaysia, May 2010, AACE.","publisher":"World Academy of Science, Engineering and Technology","index":"Open Science Index 72, 2012"}