E-PROCTORING SYSTEMS: A REVIEW ON DESIGNING TECHNIQUES, FEATURES AND ABILITIES AGAINST THREATS AND ATTACKS

Authors

  • HUSSEIN MAHMOOD MOHAMMED College of Engineering, University of Mosul, Mosul, Iraq.
  • QUTAIBA IBRAHEM ALI College of Engineering, University of Mosul, Mosul, Iraq.

Keywords:

e-proctoring, cheating, threats, cyber security attacks, authentication, LMS

Abstract

E-proctoring systems have been proposed and discussed by many researchers and developers previously, but each of these systems has strengths and weaknesses in terms of facing fraud, threats and attacks. Where the e-proctoring systems face many problems that stand in the way of their complete adoption by universities and educational institutions that rely on remote learning, and these problems include cheating, plagiarism, impersonation, theft or leakage of questions, attacks and other security issues which compromise the academic integrity of e-exams. This review was conducted to present the components, types, methods, and security issues related to e-proctoring systems and discuss their technologies, features, and strengths and weaknesses to determine the possibility of designing a safe and effective e-proctoring system against threats and attacks. The study concluded that the use of some restriction programs and monitoring devices led to an increase in the efficiency of these systems, but there are still security vulnerabilities facing e-proctoring systems which must be overcome by modern and effective security solutions.

References

Adams, A., Blanford, A. (2003): Security and online learning: To protect and prohibit. – In Usability evaluation of online learning programs, IGI Global 28p.

Aisyah, S., Bandung, Y., Subekti, L.B. (2018): Development of continuous authentication system on android-based online exam application. – In 2018 international conference on information technology systems and innovation (ICITSI) 6p.

Alghamdi, A.A., Alanezi, M.A., Khan, F. (2020): Design and Implementation of a Computer Aided Intelligent Examination System. – International Journal of Emerging Technologies in Learning (IJET) 15(1): 30-44.

Andersen, K., Thorsteinsson, S.E., Thorbergsson, H., Gudmundsson, K.S. (2020): Adapting Engineering Examinations from Paper to Online. – In 2020 IEEE Global Engineering Education Conference (EDUCON), 5p.

Asep, H.S., Bandung, Y. (2019): A design of continuous user verification for online exam proctoring on M-learning. – In 2019 International Conference on Electrical Engineering and Informatics (ICEEI) 6p.

Atoum, Y., Chen, L., Liu, A.X., Hsu, S.D.H., Liu, X. (2017): Automated Online Exam Proctoring. – IEEE Transactions on Multimedia 19(7): 1609-1624.

Bandara, I., Ioras, F., & Maher, K. (2014). Cyber security concerns in e-learning education. – In Proceeding of ICERI2014 Conference 7p.

Bawarith, R., Basuhail, A., Fattouh, A., Gamalel-Din, S. (2017): E-exam cheating detection system. – International Journal of Advanced Computer Science and Applications 8(4): 176-181.

Bawarith, R.H. (2017): Student Cheating Detection System in E-exams. – King abdulaziz University-Jeddah 98p.

Butler-Henderson, K., Crawford, J. (2020): A systematic review of online examinations: A pedagogical innovation for scalable authentication and integrity. – Computers & Education 159: 12p.

Carrascosa, I.P., Kalutarage, H.K., Huang, Y. (2017): Data analytics and decision support for cybersecurity: trends, methodologies and applications. – Springer 270p.

Cavalcanti, E.R., Pires, C.E., Cavalcanti, E.P., Pires, V.F. (2012): Detection and Evaluation of Cheating on College Exams using Supervised Classification. – Informatics in Education 11(2): 169-190.

Chen, Y., He, W. (2013): Security risks and protection in online learning: A survey. – The International Review of Research in Open and Distributed Learning 14(5): 109-127.

Chua, S.S., Bondad, J.B., Lumapas, Z.R., Garcia, J.D.L. (2019): Online examination system with cheating prevention using question bank randomization and tab locking. – In 2019 4th International Conference on Information Technology (InCIT) 6p.

Clarke, N.L., Furnell, S.M. (2006): Authenticating mobile phone users using keystroke analysis. – International Journal of Information Security 6(1): 1-14.

Exam Online Official Portal (2020): How do online proctored exams work? – Exam Online Official Portal. Retrieved from:

https://examonline.in/how-do-online-proctored-exams-work

Fask, A., Englander, F., Wang, Z. (2014): Do online exams facilitate cheating? An experiment designed to separate possible cheating from the effect of the online test taking environment. – Journal of Academic Ethics 12(2): 101-112.

Foster, D. (2013): Security issues in technology-based testing. – In Handbook of test security. – Routledge 45p.

Foster, D., Layman, H. (2013): Online proctoring systems compared. – Caveon Test Security Official Portal 11p.

Furnell, S.M., Karweni, T. (2001): Security issues in online distance learning. – Vine 31(2): 28-35.

Ghizlane, M., Hicham, B., Reda, F.H. (2019): A new model of automatic and continuous online exam monitoring. – In 2019 International Conference on Systems of Collaboration Big Data, Internet of Things & Security (SysCoBIoTS) 5p.

González-González, C.S., Infante-Moro, A., Infante-Moro, J.C. (2020): Implementation of e-proctoring in online teaching: A study about motivational factors. – Sustainability 12(8): 13p.

He, W. (2012): A review of social media security risks and mitigation techniques. – Journal of Systems and Information Technology 14(2): 171-180.

Huang, R.H., Liu, D.J., Zhu, L.X., Chen, H.Y., Yang, J.F., Tlili, A., Fang, H.G., Wang, S.F. (2020): Personal data and privacy protection in online learning: Guidance for students, teachers and parents. – Beijing: Smart Learning Institute of Beijing Normal University 109p.

Hussein, M.J., Yusuf, J., Deb, A.S., Fong, L., Naidu, S. (2020): An evaluation of online proctoring tools. – Open Praxis 12(4): 509-525.

Cluskey Jr, G.R., Ehlen, C.R., Raiborn, M.H. (2011): Thwarting online exam cheating without proctor supervision. – Journal of Academic and Business Ethics 4(1): 1-7.

Jung, I.Y., Yeom, H.Y. (2009): Enhanced Security for Online Exams Using Group Cryptography. – IEEE Transactions on Education 52(3): 340-349.

Karim, N.A., Shukur, Z. (2015): Review of user authentication methods in online examination. – Asian Journal of Information Technology 14(5): 166-175.

King, C.G., Guyette Jr, R.W., Piotrowski, C. (2009): Online exams and cheating: An empirical analysis of business students' views. – Journal of Educators Online 6(1): 11p.

Korman, M. (2010): Behavioral detection of cheating in online examination. – Lulea University of Technology 110p.

Langenfeld, T. (2020): Internet‐Based Proctored Assessment: Security and Fairness Issues. – Educational Measurement: Issues and Practice 39(3): 24-27.

Li, H., Xu, M., Wang, Y., Wei, H., Qu, H. (2021): A visual analytics approach to facilitate the proctoring of online exams. – In Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems 17p.

Lorenz, B., Sousa, S., Tomberg, V. (2012): Privacy awareness of students and its impact on online learning participation–a case study. – In IFIP WG 3.4 International Conference on Open and Social Technologies for Networked Learning, Springer, Berlin, Heidelberg 4p.

Lozhkin, S. (2014): Analysis of malware from the MtGox Leak Archive. – Kapersky Official Portal. Retrieved from:

https://securelist.com/analysis-of-malware-from-the-mtgox-leak-archive/58553/

Mahoney, K., Cameron, L. (2008): An introduction to learning management systems. – University of Fraser Valley 10p.

Marcialis, G.L., Roli, F., Muntoni, D. (2009): Group-specific face verification using soft biometrics. – Journal of Visual Languages & Computing 20(2): 101-109.

May, M., George, S. (2011): Privacy Concerns in E-learning: Is UsingTracking System a Threat? – International Journal of Information and Education Technology 1(1): 1-8.

Mitra, S., Gofman, M. (2016): Towards greater integrity in online exams. – AMCIS 2016 Proceedings p28.

Mohd Alwi, N.H., Fan, I.S. (2010): E-Learning and Information Security Management. – International Journal for Digital Society 1(2): 148-156.

Muzaffar, A.W., Tahir, M., Anwar, M.W., Chaudry, Q., Mir, S.R., Rasheed, Y. (2021): A systematic review of online exams solutions in e-learning: Techniques, tools, and global adoption. – IEEE Access, 9: 32689-32712.

Ndume, V., Tilya, F.N., Twaakyondo, H. (2008): Challenges of adaptive elearning at higher learning institutions: A case study in Tanzania. – International Journal of Computing and ICT Research 2(1): 47-59.

Nickolova, M., Nickolov, E. (2007): Threat model for user security in e-learning systems. – International Journal Information Technologies and Knowledge 1(1): 341-347.

Oliveira, P.C.D., Cunha, C.J.C.D.A., Nakayama, M.K. (2016): Learning Management Systems (LMS) and e-learning management: an integrative review and research agenda. – JISTEM-Journal of Information Systems and Technology Management 13: 157-180.

Opgen-Rhein, J., Küppers, B., Schroeder, U. (2018): An Application to Discover Cheating in Digital Exams. – In Proceedings of the 18th Koli Calling International Conference on Computing Education Research 5p.

OReilly, G., Creagh, J. (2016): A categorization of online proctoring. In Global Learn. – Association for the Advancement of Computing in Education (AACE) 11p.

Patel, A., Taghavi, M., Júnior, J.C., Latih, R., Zin, A.M. (2012): Safety Measures for Social Computing in Wiki Learning Environment. – International Journal of Information Security and Privacy 6(2): 1-15.

Guo, P. (2008): The research and application of online examination and monitoring system. – In 2008 IEEE International Symposium on IT in Medicine and Education 6p.

Prathish, S., Bijlani, K. (2016): An intelligent system for online exam monitoring. – In 2016 International Conference on Information Science (ICIS) 6p.

Reeves, T.C. (2000): Alternative assessment approaches for online learning environments in higher education. – Journal of Educational Computing Research 23(1): 101-111.

Rjaibi, N., Rabai, L.B.A., Aissa, A.B., Louadi, M. (2012): Cyber security measurement in depth for e-learning systems. – International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE) 2(11): 107-120.

Rjaibi, N., Rabai, L.B.A., Ben Aissa, A., Mili, A. (2013): Mean Failure Cost as a Measurable Value and Evidence of Cybersecurity: E-Learning Case Study. – International Journal of Secure Software Engineering 4(3): 64-81.

Rogers, C.F. (2006): Faculty perceptions about e-cheating during online testing. – Journal of Computing Sciences in Colleges 22(2): 206-212.

Rosen, W.A., Carr, M.E. (2013): An autonomous articulating desktop robot for proctoring remote online examinations. – In 2013 IEEE Frontiers in Education Conference (FIE) 5p.

Rowe, N.C. (2004): Cheating in online student assessment: Beyond plagiarism. – Online Journal of Distance Learning Administration 7(2): 1-10.

Sarrayrih, M.A., Ilyas, M. (2013): Challenges of online exam, performances and problems for online university exam. – International Journal of Computer Science Issues (IJCSI) 10(1): 439-443.

Sinha, P., Yadav, A. (2020): Remote proctored theory and objective online examination. – International Journal of Advanced Networking and Applications 11(6): 4494-4500.

Slusky, L. (2020): Cybersecurity of online proctoring systems. – Journal of International Technology and Information Management 29(1): 56-83.

Smiley, G. (2013): Investigating the role of multibiometric authentication on professional certification E-Examination. – Nova Southeastern University 325p.

Tashu, T.M., Esclamado, J.P., Horvath, T. (2019): Intelligent on-line exam management and evaluation system. – In International Conference on Intelligent Tutoring Systems, Springer, Cham 7p.

Traoré, I., Nakkabi, Y., Saad, S., Sayed, B., Ardigo, J.D., de Faria Quinan, P.M. (2017): Ensuring Online Exam Integrity Through Continuous Biometric Authentication. – In I. Traoré, A. Awad, & I. Woungang (Eds.), Information Security Practices, Springer International Publishing 9p.

Turnbull, D., Chugh, R., Luck, J. (2019): Learning management systems: An overview. – Encyclopedia of Education and Information Technologies, Springer 10: 978-983.

Ullah, A., Xiao, H., Barker, T. (2016): A classification of threats to remote online examinations. – In 2016 IEEE 7th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON) 7p.

Underwood, J., Szabo, A. (2003): Academic offences and e-learning: Individual propensities in cheating: Academic offences and e-learning. – British Journal of Educational Technology 34(4): 467-477.

Wahid, A., Sengoku, Y., Mambo, M. (2015): Toward constructing a secure online examination system. – In Proceedings of the 9th International Conference on Ubiquitous Information Management and Communication 8p.

Downloads

Published

2022-07-24

How to Cite

MOHAMMED, H. M., & ALI, Q. I. (2022). E-PROCTORING SYSTEMS: A REVIEW ON DESIGNING TECHNIQUES, FEATURES AND ABILITIES AGAINST THREATS AND ATTACKS. Quantum Journal of Engineering, Science and Technology, 3(2), 14–30. Retrieved from https://qjoest.com/index.php/qjoest/article/view/66

Issue

Section

Articles