Deb Gearhart Trot University Student Authentication – What it Means for Us.

Slides:



Advertisements
Similar presentations
Providing Evidence of Academic Integrity and Student Authentication in Online Courses and Programs Matthew Prineas, UMUC Elizabeth Mulherrin, UMUC.
Advertisements

Online Course Development Techniques and Best Practices Online Academic Services W.P. Carey School of Business.
Class Capture at the Dr. Sue Clabaugh Asst. Director, Learning Technologies & Environments Division of Information Technology University of Maryland College.
Chapter 5 Input and Output. What Is Input? What is input? p. 166 Fig. 5-1 Next  Input device is any hardware component used to enter data or instructions.
Automatic Finger Print Identification System with Multi biometric Options A smart presentation On AFIS System.
1 23 rd Annual Conference September 11-13, 2003 Westin Harbour Castle Toronto, Canada.
AN OVERVIEW OF BIOMETRIC ATMs. WHY ? CONVENTIONAL ATMs -> BIOMETRIC ATMs Environmental Concerns Environmental Concerns Security Concerns Security Concerns.
Landmines in Online Education Academic Senate for California Community Colleges Online Education Regional Meeting March 20/21, 2015 Gregory Beyrer, Cosumnes.
Internet Learning Web-based Tools As A Supplement To Classroom Teaching Stuart P. Raeburn, Michigan State Univ.
FIT3105 Biometric based authentication and identity management
1 November Applicability of Biometrics As a Means of Authentication Scholarship for Service William Kwan.
Introduction to Biometrics Dr. Pushkin Kachroo. New Field Face recognition from computer vision Speaker recognition from signal processing Finger prints.
Click to edit Master title style Click to edit Master text styles Second level Third level Fourth level Fifth level 1 1 Power of positive thinking Brief.
College of Engineering Prevention and Detection of Academic Dishonesty May 1, 2009.
Biometrics: Identity Verification in a Networked World
Brendan Cooney CSC 152. What is Input? Any data or instructions entered into the memory of a computer Data- unprocessed information Instructions- steps.
“KEEPING YOU TOGETHER, BUT APART” BY: KANISHA NEWMAN United Identity Bank.
Rick Beaudry Co-Founder B Virtual Inc Michelle Sherbino International Exam Strategy Loyalist College Best Practices Partnership in Online Exam Process.
Technology and Hotel Security Hotel Mgmt. Hospitality Services R. McCann.
Karthiknathan Srinivasan Sanchit Aggarwal
Security Measures Using IS to secure data. Security Equipment, Hardware Biometrics –Authentication based on what you are (Biometrics) –Biometrics, human.
Security Equipment Equipment for preventing unauthorised access to data & information.
Zachary Olson and Yukari Hagio CIS 4360 Computer Security November 19, 2008.
IT Introduction to Information Technology CHAPTER 05 - INPUT.
Authenticating Online Students: Practically Speaking Patricia James October 15, 2013 For audio call Toll Free and use PIN/code
N ew Security Approaches Biometric Technologies are Coming of Age ANIL KUMAR GUPTA & SUMIT KUMAR CHOUDHARY.
» Jun 9, 2003 Speaker Verification Secure AND Efficient, Deployments in Finance and Banking Jonathan Moav Director of Marketing
DigitalPersona, Inc. Biometric Authentication for Digital Authentication Presented by: Brian Farley, Western Sales Regional Manager DigitalPersona.
Trouble in the Classroom Disruptive Behavior, Dangerous Behavior, Students in Distress, Plagiarism & Prevention.
Security Issues and Strategies Chapter 8 – Computers: Understanding Technology (Third edition)
Avoiding Online Cheating Dr. Richard Jerz © 2011 rjerz.com1.
Ensuring Academic Integrity with Online Proctoring Lauren Botts-Posey Partnership Representative.
BIOMETRICS FOR RECOGNITION. Presentation Outlines  Traditional methods of security  Need for biometrics  Biometrics recognition techniques  How biometrics.
Biometrics Authentication Technology
Academic Integrity: Processes & Expectations at the College Level Andrea Goodwin Associate Director, Office of Student Conduct University of Maryland Diane.
Power Point Project Michael Bennett CST 105Y01 ONLINE Course Editor-Paulette Gannett.
PRESENTATION ON BIOMETRICS
Iris Technology Presented By: D.SRIKANTH Biometrics Identifying individuals using their distinct physical or behavior characteristics. Features measured.
Proctortrack Results for Faculty Viewing Student Proctoring Results.
INTRODUCTION TO BIOMATRICS ACCESS CONTROL SYSTEM Prepared by: Jagruti Shrimali Guided by : Prof. Chirag Patel.
By Diana Liwanag. Overview The problem What are biometrics? –What are the different types? Short video of a system with a fingerprinting device. Identifying.
ONLINE STUDENT AUTHENTICATION EXAMITY PILOT SPRING 2016.
Biometric Devices Biometric devices use secure identification and authentication in order for someone to use the device. These devices use automated.
Higher Education Reauthorization Act.  The language of the law is Part H- Program Integrity in section 496 related to Regional Accrediting Agencies directing.
Biometrics By Rachel Borazio. What is biometrics? Biometrics is a security measure used to identify physical features of people to allow access to a system.
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY PRIVACY AUTHENTICATION VERIFICATION.
Technical Devices for Security Management Kathryn Hockman COSC 481.
What does it mean to us?.  History  Biometrics Defined  Modern Day Applications  Spoofing  Future of Biometrics.
By Kyle Bickel. Road Map Biometric Authentication Biometric Factors User Authentication Factors Biometric Techniques Conclusion.
Biometric ATM Created by:. Introduction Biometrics refers to the automatic identification of a person based on his physiological/behavioral characteristics.
An Introduction to Biometrics
Various Features and Services Provided By the SpotCam.
E-PROCTOR Under the guidance of Mr.Avinash Awate
Access control techniques
Anytime. Anywhere. Any Method.
Blackboard Environment
Security Issues.
INFORMATION SECURITY The protection of information from accidental or intentional misuse of a persons inside or outside an organization Comp 212 – Computer.
Biometrics.
Biometrics Reg: AMP/HNDIT/F/F/E/2013/067.
Beyond Canvas Technologies to Enhance the Learning Experience
Seminar Presentation on Biometrics
Biometrics.
Margaret Brown 3rd period October 14, 2007
Biometric technology.
Presentation Outlines
A SEMINAR REPORT ON BIOMETRICS
Biometrics and Standards ITU-T Technology Watch Report December 2009.
Food Inventory Tracker
BY: Michael Etse and Maverick Fermill
Presentation transcript:

Deb Gearhart Trot University Student Authentication – What it Means for Us

Why the need for Student Authentication? The Unanswered Questions – How do you ensure online testing integrity for your online students? Is the student who is taking the test the one who is registered for the course? Is there someone else in the room helping? Is the student copying or sharing the exam? Is the student using notes or an open book? Is the student using the Internet to find answers?

Issues related to Authentication The number of students taking distance education courses The students who cheat Teaching students who are more “computer savvy” than the instructor

Passage of the HEOA of 2008 ‘‘(ii) the agency or association requires that an institution that offers distance education programs to have processes by which it establishes that the student who registers in a distance education course or program is the same student who participates, completes academic work, and receives academic credit;’’

Authentication At what point do educators need to do authentication? The “big brother” effect – does authentication violate constitutional rights? So, what are the options for higher education and distance education?

Troy University’s Goals To: Ensure student authentication Prevent online cheating Eliminate the need for students to go to a facility to take an exam Eliminate the need for students to have a proctor for an exam Exceed the Regional Accreditation and Federal Regulation requirements

Current Methodologies for Authentication Smart cards Personal Data Verification Biometric Scanners –Physiological Iris scanners Face Recognition Hand (Bone) Recognition DNA Fingerprint Scanner –Behavioral Keystroke Signature Voice

Securexam Remote Proctor Unit Access to test requires finger-scan authentication Captures real-time video and audio during the test Video component designed to display view of entire room Designed to have system detect suspicious behavior, limiting need for constant monitoring: Video has motion detection filter: limiting the amount of video uploaded for review Audio component has a high gain microphone to record audio in room where exam is being taken

Goals for Remote Proctor Use To: –Ensure student authentication »Prevent online cheating –Eliminate the need for students to go to a facility to take an exam –Eliminate the need for students to have a proctor for an exam –Exceed the Regional Accreditation and Federal Regulation requirements

Interface between Blackboard and Securexam Remote Proctor/Browser All test information is handled by the Blackboard software:All test information is handled by the Blackboard software: –Test –Scoring –Answers Demographic information - Students name, picture, address, fingerprint and captured video stored on secure server at Securexam. Note: Remote Proctor stores the students fingerprint in a mathematical algorithm on a secured server. No fingerprint images taken.Demographic information - Students name, picture, address, fingerprint and captured video stored on secure server at Securexam. Note: Remote Proctor stores the students fingerprint in a mathematical algorithm on a secured server. No fingerprint images taken.

Faculty Roles utilizing the Remote Proctor Create Exams using Blackboard Flag Remote Proctored exams using Exambuilder software and Blackboard’s password field Review suspicious student videos

What the Remote Proctor device presents for Troy University Provides a solution to one of the most problematic issues in online education….test integrity - Concerns of educators - Concerns of accrediting agencies - Concerns of providers of FA and TA - Concerns about international students Meets requirements of the HEOA

What does it mean for us? Higher education, and in particular distance education, will now be held more accountable. We need to carefully watch the evolvement of the HEOA. We need to make technology work for us.

Thank You! Deb Gearhart Director of eCampus Troy University