 2007 - Dr. Yair Levy & Michelle Ramim – Chais 2007, Israel – February 20, 2007. 1 A Theoretical Approach for Biometrics Authentication of e-Exams By:

Slides:



Advertisements
Similar presentations
 Dr. Yair Levy & Dr. Michelle M. Ramim – Chais 2011 Conference, February 17, From E-learning Courses to Businesses: What Technologies Do They.
Advertisements

Biometrics: Myths and Reality ბიომეტრია : მითები და რეალობა Author: doctoral student Maguli Bedineishvili Research director: doctor.
AN OVERVIEW OF BIOMETRIC ATMs. WHY ? CONVENTIONAL ATMs -> BIOMETRIC ATMs Environmental Concerns Environmental Concerns Security Concerns Security Concerns.
National Institute of Science & Technology Fingerprint Verification Maheswar Dalai Presented By MHESWAR DALAI Roll No. #CS “Fingerprint Verification.
BTC - 1 Biometrics Technology Centre (BTC) Biometrics Solution for Authentication Prof. David Zhang Director Biometrics Technology Centre (UGC/CRC) Department.
Section – Biometrics 1. Biometrics Biometric refers to any measure used to uniquely identify a person based on biological or physiological traits.
3D-password A more secured authentication G.Suresh babu Roll no:08H71A05C2 Computer science & engineering Mic college of technology Guide:Mrs A.Jaya Lakshmi.
Tel: Fax: Contact Information: Master of Public Health Degree Program(MPH)
Fairmount College of Liberal Arts and Sciences Department of Mathematics & Statistics Mission The mission of the undergraduate program in Mathematics and.
BIOMETRICS AND NETWORK AUTHENTICATION Security Innovators.
 Dr. Yair Levy – Chais 2008, Israel – February 6, Towards an Empirical Development of Critical Value Factors of Online Learning Activities.
1 November Applicability of Biometrics As a Means of Authentication Scholarship for Service William Kwan.
 Dr. Yair Levy & Dr. Michelle Ramim – Chais 2009, Israel – February 18, Towards a Development of a Learners’ Ratified Acceptance of Multi-biometrics.
Introduction to Biometrics Dr. Pushkin Kachroo. New Field Face recognition from computer vision Speaker recognition from signal processing Finger prints.
PALM VEIN TECHNOLOGY.
 Dr. Yair Levy & Dr. Michelle Ramim – Chais 2010, Israel – February 10, Students’ Perceived Ethical Severity of e-Learning Security Attacks.
Biometrics and Authentication Shivani Kirubanandan.
B IOMETRICS Akash Mudubagilu Arindam Gupta. O VERVIEW What is Biometrics? Why Biometrics? General Biometric System Different types of Biometrics Uses.
Procrastination in Online Exams: What Data Analytics Can Tell Us? Yair Levy, Ph.D. Graduate School of Computer and Information Sciences Michelle M. Ramim,
Marjie Rodrigues
Biometrics: Ear Recognition
Zachary Olson and Yukari Hagio CIS 4360 Computer Security November 19, 2008.
Deb Gearhart Trot University Student Authentication – What it Means for Us.
Current Psychiatry (Egypt) Official Journal of Institute of Psychiatry, Faculty of Medicine Ain Shams University, Cairo, Egypt.
Information Technology Department NNK Investment & Banking Team 3-F Bao Nguyen | Henrik Nilsen | Yoonjin Kim 1.
CS 736 A methodology for Analyzing the Performance of Authentication Protocol by Laseinde Olaoluwa Peter Department of Computer Science West Virginia.
Univeristy of Tennessee Knoxville Increasing Effective Student Use of the Scientific Journal Literature Award: DUE NSF:
Three Basic Identification Methods of password Possession (“something I have”) Possession (“something I have”) Keys Passport Smart Card Knowledge (“Something.
Access to electronic scientific information: policies, strategies and programmes The Brazilian experience Elenara Chaves Edler de Almeida Brazilian Federal.
The Redesigned Elements of Statistics Course University of West Florida March 2008.
Guide: DR. R. BALASUBRAMANI Assistant Professor Department of LIS Bharathidasan University Tiruchirappalli.
Academic Integrity in an Electronic World: Student Cheating and Plagiarism November 9, 2010 Brown Bag The University of Arizona
At a glance…  Introduction  How Biometric Systems Work ?  Popular Biometric Methodologies  Multibiometrics  Applications  Benefits  Demerits 
Centennial College Libraries. library.centennialcollege.ca.
Biometrics and Retina Scan Technology Lum OSMANI Alex CHERVENKOV Course: Information Security April 2008.
Power Point Project Michael Bennett CST 105Y01 ONLINE Course Editor-Paulette Gannett.
PRESENTATION ON BIOMETRICS
Biometric Technologies
NOVA Evaluation Report Presented by: Dr. Dennis Sunal.
L. F. Coppenrath & Associates PASSWORD BIOPASSWORD ® Biometric Keystroke Dynamics Technology Overview.
Biometric Devices Biometric devices use secure identification and authentication in order for someone to use the device. These devices use automated.
Amin Karim Joaquin Mayoral The Importance of Teaching Standards in Engineering & Technology Programs February 12, 2011.
Databases vs the Internet. QUESTION: What is the main difference between using library databases and search engines? ANSWER: Databases are NOT the Internet.
Introduction to Biometrics Dr. Bhavani Thuraisingham The University of Texas at Dallas Introduction to the Course August 22, 2005.
About Softex Mission Statement: “To provide innovative security software products and solutions for computing devices” Softex was founded in 1992 by IBM.
BIOMETRICS.
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY PRIVACY AUTHENTICATION VERIFICATION.
BOPS – Biometric Open Protocol Standard Emilio J. Sanchez-Sierra.
By Kyle Bickel. Road Map Biometric Authentication Biometric Factors User Authentication Factors Biometric Techniques Conclusion.
Global Biometrics Market Size, Share, Global Trends, Analysis, Research Report and Forecast, Market Research Store.
An Introduction to Biometrics
3D Password.
Prepared By: Glory Ibrahim & Deodatus Mogella STAFF EXPERIENCE ON E-LEARNING IN HIGHER LEARNING INSTITUTION.THE CASE OF KCMUCO.
Quality Online Preparation: Qualities of Faculty, Courses, and Preparation Programs By Dr. Erin O’Brien Valencia College League of Innovation Conference,
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
Students’ Perceived Ethical Severity of e-Learning Security Attacks
Multimodal Biometric Security
Biometrics.
Biometric Security Fujitsu Palm Vein Technology
Data structure algorithms homework help
Research amongst Physical Therapists in the State of Kuwait: Participation, Perception, Attitude and Barriers Presented by Sameera Aljadi, PT, PhD Assistant.
© Copyright 2008 FingerTec Worldwide. All Rights Reserved.
Biometrics Reg: AMP/HNDIT/F/F/E/2013/067.
Assessing the Value of e-Learning Systems*
Seminar Presentation on Biometrics
Biometrics.
Information Technology (IT)
A SEMINAR REPORT ON BIOMETRICS
A Framework of Remote Biometric Authentication on the Open Network
Writing an Effective Problem Statement for Your Dissertation Proposal
Presentation transcript:

 Dr. Yair Levy & Michelle Ramim – Chais 2007, Israel – February 20, A Theoretical Approach for Biometrics Authentication of e-Exams By: Yair Levy Yair Levy Nova Southeastern University and Michelle M. Ramim Nova Southeastern University

 Dr. Yair Levy & Michelle Ramim – Chais 2007, Israel – February 20, password בסיסמה Maya: Dad, when you were young, did you use a password to login to your computer? Dad: Yes, I can remember those days… מאיה: כשהיתה צעיר הישתמשתה בסיסמה להכנס למחשב שלך? אבא: כן, אני זוכר את הזמנים ההם...

 Dr. Yair Levy & Michelle Ramim – Chais 2007, Israel – February 20, Statement of the problem E-learning has become a powerful medium for academic institutions Major growth in e-learning in the past decade –56% of all US colleges offered e-learning courses in 2000–2001 academic year*. –Over three million students enrolled in e- learning courses in the US in *. Opponents of e-learning argue that the inability to authenticate e-exam takers is one of the major challenges of e-learning * Source: United States Department of Education, National Center of Educational Statistics (NCES) (2005)

 Dr. Yair Levy & Michelle Ramim – Chais 2007, Israel – February 20, Theoretical Background Unethical conduct in e-learning Unethical conduct during exams Security in e-Learning Biometric Solutions Fingerprint Biometric Solutions

 Dr. Yair Levy & Michelle Ramim – Chais 2007, Israel – February 20, Unethical Conduct in E-earning Unethical conduct - “a major concern” (Kennedy et al., 2000) Additional mechanisms are necessary to authenticate users’ access in various e- learning course activities not just in the initial login (Newton, 2003) Students’ unethical conduct has intensified as a result of the use of technology and the Internet (Pillsbury, 2004) Need to focus not only on plagiarism (Naude & Hörne, 2006)

 Dr. Yair Levy & Michelle Ramim – Chais 2007, Israel – February 20, Unethical Conduct During Exams Cheating on exams has been reported at an alarming range of 74% (Center for Academic Integrity, 2005) Students’ unethical conduct related to exam taking perceived by faculty to be one of the most serious unethical behaviors (Pincus & Schmelkin, 2003)

 Dr. Yair Levy & Michelle Ramim – Chais 2007, Israel – February 20, Security in E-Learning Yu and Tsao (2003) discussed security challenges of e-learning environments Huang et al. (2004) discussed aspects of security in e-learning systems and suggested ways to secure e-learning systems. Ramim and Levy (2006) – a case study (JCIT) of a small academic institution faced a cyber attach to their e-learning environment by an insider intruder.

 Dr. Yair Levy & Michelle Ramim – Chais 2007, Israel – February 20, Biometric Solutions Biometric is defined as “the application of computational methods to biological features, especially with regard to the study of unique biological characteristics of humans” (Tabitha, et al., 2006, p. 3) Unique characteristics: –Physiological biometric: retinal and iris, fingerprints, facial images, hand prints, DNA, etc. –Behavioral biometric: voice, key board typing, attitude Major popularity growth of biometric solutions, especially after 9/11

 Dr. Yair Levy & Michelle Ramim – Chais 2007, Israel – February 20, Biometric Solutions (Cont.) Usability aspect of biometrics authentication systems is “a tradeoff between usability, memorability and security” (Coventry et al., 2003, p. 153). Traditional password & PINs authentication methods are regularly increasing their length – difficult to remember! Fingerprints systems are currently used in the Disney® parks, financial industry, U.S. immigration services, etc.

 Dr. Yair Levy & Michelle Ramim – Chais 2007, Israel – February 20, Fingerprint Biometric Solutions Price of biometric devices is falling in the past decade (Pons, 2006) Increase reliability – false rejection rate that is only 0.01%, or 1 out of 100,000 cases JayPeetek Inc.’s Scan.U.MatchTM DigitalPersona

 Dr. Yair Levy & Michelle Ramim – Chais 2007, Israel – February 20, Fingerprint Biometric Solutions (Cont.)

 Dr. Yair Levy & Michelle Ramim – Chais 2007, Israel – February 20, Biometric Solutions – Servers JayPeetek Inc.’s AuthenteonTM Server

 Dr. Yair Levy & Michelle Ramim – Chais 2007, Israel – February 20, The Proposed Theoretical Framework

 Dr. Yair Levy & Michelle Ramim – Chais 2007, Israel – February 20, Propositions Proposition 1: Students taking e-exams using the fingerprints biometric solution will have lower grades on the e-exam than their counterparts. Proposition 2: Students taking e-exams using the fingerprints biometric solution will take longer time to complete their e-exam than their counterparts.

 Dr. Yair Levy & Michelle Ramim – Chais 2007, Israel – February 20, Some Observed Limitations In a remote setting, students may ask to have a subject matter expert seat next to them while they take the exam The costs associated with implementing such study in an experimental basis, let alone in a large scale e-learning program Individual perceptions on the use of biometric systems may prevent consent to take part of the study, hence, limit data collection

 Dr. Yair Levy & Michelle Ramim – Chais 2007, Israel – February 20, Thank you! Questions?

 Dr. Yair Levy & Michelle Ramim – Chais 2007, Israel – February 20, Yair Levy, Ph.D. Assistant Professor Nova Southeastern University Graduate School of Computer and Information Sciences The DeSantis Building - Room College Avenue Fort Lauderdale, FL Tel.: Fax: Site: Contact Information - Levy

 Dr. Yair Levy & Michelle Ramim – Chais 2007, Israel – February 20, Michelle M. Ramim, Ph.D. (ABD) Adjunct Professor Nova Southeastern University H. Wayne Huizenga School of Business and Entrepreneurship The DeSantis Building 3301 College Avenue Ft. Lauderdale, FL Site: Contact Information - Ramim

 Dr. Yair Levy & Michelle Ramim – Chais 2007, Israel – February 20, International Journal of Doctoral Studies (IJDS) Mission: The mission of the International Journal of Doctoral Studies (IJDS) is to provide readers worldwide with high quality peer-reviewed scholarly articles on a wide variety of issues in doctoral studies using the Informing Science (IS) framework. The editorial objective of IJDS is the facilitation of knowledge enhancement related to doctoral studies in areas such as (but not limited to): informing science, information systems, information technology, information science, information security, and IT education. Yair Levy, Editor-in-Chief