Avoiding Online Cheating Dr. Richard Jerz © 2011 rjerz.com1.

Slides:



Advertisements
Similar presentations
NetWatcher NetGuarder NetWatcher Introduction - Boost Enterprise Efficiency Dramatically
Advertisements

Kerberos 1 Public domain image of Heracles and Cerberus. From an Attic bilingual amphora, 530–520 BC. From Italy (?).
Innovative Cheating Practices and How to Combat Them! Dr. Mark Smith.
Distance Learning Environments Definition Motivating Factors Grades vs. Learning Expectations of Institutions and Faculty.
Why do students cheat? How do they cheat? How has cheating changed since distance education came into being? Academic integrity is of particular interest.
B L A C K B O A R D Blackboard Basics Respondus Test Generation Respondus LockDown Browser Cindy Bowers, Blackboard Administrator
How Testing is Changing in the 21 st Century Presented by Don Kassner – President, ProctorU.
The New York State English Regents
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Turnitin.com is not really for plagiarism to me; it's to make students better writers. Greg Arnberg Instructor of Information Systems Hawaii Pacific University.
Case Studies for Projects. Network Audit A brief description of the systems (via fingerprinting, if black box is used) Network perimeter should be described.
Discrete Maths Objective to give some background on the course , Semester 2, Who I am: Andrew Davison WiG Lab
1 TEACHING THE ACCOUNTING INFORMATION SYSTEMS COURSE ONLINE: ONE INSTRUCTOR’S EXPERIENCE Presentation for the AIS Educator’s Conference June 27, 2004 M.
Internet Learning Web-based Tools As A Supplement To Classroom Teaching Stuart P. Raeburn, Michigan State Univ.
“Any Time, Any Where” Faculty and Curriculum Development: Using Asynchronous Learning Tools Beyond the Classroom Cathy Dwyer and Constance Knapp Information.
Carol Rentas and Marcia Firmani Lunch and Learn January 14, 2015.
1 Review for Final Exam Memory management Three central questions File system I/O system Network Protection Security.
New Student Orientation Module 4: Academic Honesty and Plagiarism
Deb Gearhart Trot University Student Authentication – What it Means for Us.
Service Professional Advisory Council Technology Tools Available to Service Professionals Chris Greenough, Team Lead, Enterprise Information Solutions.
Portal and AQAS-Philadelphia University 21-22/6/2011 AVCI Platform in PU Dr. Abdel-Rahman Al-Qawasmi Philadelphia University Director of Computer Center.
Five things I have learned from students about feedback Dr Georgina Fyfe School of Biomedical Sciences Curtin University Western Australia.
Web Applications for the School of NAS Group #3 09/18/2001.
Week 1 – Seneca Networking Environment. Agenda Overview of Seneca Server names How to access servers Terminal Emulation (Putty) Browser – IE, Netscape,
Introduction to Information Security J. H. Wang Sep. 15, 2014.
Engaging Students in the Assessment Process The Conference 2006 Thomson Course Technology's 11th Anniversary Event San Francisco, CA March 30, 3:45 PM.
Course ILT Internet/intranet support Unit objectives Use the Internet Information Services snap-in to manage IIS, Web sites, virtual directories, and WebDAV.
2009 NCTA Conference  San Antonio The Online Assessment Advantage at Tyler Junior College Ken Craver Director of Distance Education.
W.P. Carey Online Academic Services.  Time  Resources  Methods  Availability  Current mindset for WPC-all online testing will be conducted online,
Computer Science Topical Paper Presentation #15 Zach Sloger The Secure Blackboard Pattern S e c u r e B l a c k b o a r d P a t t e r n – P a.
CSSE 513 – COURSE INTRO With homework and project details Wk 1 – Part 2.
Windows XP Professional Features ©Richard L. Goldman February 5, 2003.
USNSCC Instructions for Test Admin View this manual using Microsoft’s Internet Explorer. May not be compatible with other browsers To download this document.
A review of peer assessment tools. The benefits of peer assessment Peer assessment is a powerful teaching technique that provides benefits to learners,
Introduction to Information Security J. H. Wang Sep. 10, 2013.
Cryptography and Network Security (CS435) Part One (Introduction)
How to backup and restore WAP4410N configuration file properly.
Accessing Evitech network via FTP by Susan Jansson.
Training Presentation For e-Learning Login to your Faculty’s LMS.
SEC835 Security in Databases and Web applications Presentation.
Testing Engine Saint Leo University Center for Online Learning Dr. Deborah Pendarvis Saint Leo University.
ELEARNING SURVEY RESULTS MAY, Question One: Available Support for Faculty Themes: Support is variable and not centralized. i.e. “I think there was.
Using Moodle to Put Research into Practice Becka Currant, University of Bradford.
CS 162 Introduction to Computer Science II Winter, 2014: 60 Spring, 2014: 60 Summer, 2014: 71.
Joe Budzyn Jeff Goeke-Smith Jeff Utter. Risk Analysis  Match the technologies used with the security need  Spend time and resources covering the most.
Angelina College’s new online proctoring tool. ProctorU: What is it? ProctorU allows students to take exams from any location provided they have a web.
CS 161 Introduction to Computer Science I Winter, 2014: 112 Spring, 2014: 131 Summer, 2014: 132.
Access Control Chapter 3 Part 4 Pages 227 to 241.
Assessing Students Online Patricia S. Rahmlow, Computer Science Instructor Montgomery County Community College Blue Bell, PA
BLACKBOARD WIKI TOOL From your Group…. There is a Group Tools menu and from there you select “Group Wiki”
Presentation by Shahla Peterman. Assumptions About Testing Multiple Choice Format Hand Graded Format.
Enhance Edu. Agenda Features What is new ? Pre-Requisites Version 2 system Road Ahead.
An Instructor’s Guide to Fostering Fairness in the D2L Assessment Process Dr. Ransom Gladwin Ms. Edris Brannen Dr. Beatriz Potter Valdosta State University.
Perceptions of Online Education
Introduction to Information Security
Footprinting (definition 1)
Secure Testing with Respondus
Columbus State University
CIS 534 Possible Is Everything/tutorialrank.com
CIS 534 Education for Service/tutorialrank.com
A project to develop a TEQSA Good Practice Note for the sector Led by
The Pedagogy and Technology of Testing: What Could Possibly Go Wrong?
Drayton Manor elearning provision
Engineering Secure Software
Creating Random Multiple Versions of Canvas Questions
Online Assessment – External Examiner Packages
Secrets to Success DEET Jan 2018.
69EG6517 – Impacts & Models of Climate Change
The Role of Independent Studies Rationale #7
Provide secure environment for online assessment with Moodle – POC.
Presentation transcript:

Avoiding Online Cheating Dr. Richard Jerz © 2011 rjerz.com1

Topics Detection Avoidance Faculty Education How can LMSs help? Course Compass (Publisher tools) Blackboard Moodle Others © 2011 rjerz.com2

Detection Example Exams are to be taken independently! © 2011 rjerz.com3

Detection © 2011 rjerz.com4

Detection - Continued © 2011 rjerz.com5

Detection Time stamps Location stamps (IP address) Results/Scores File sizes (where appropriate) Anti-plagiarism tools (where appropriate) © 2011 rjerz.com6

Avoidance Proctored Exams Randomization Methods Multiple versions Security tools Make exams worth less points Miscellaneous © 2011 rjerz.com7

Proctored Exams Central Location of exam Exams at the same time Administrative (i.e., student picks a proctor) Remote Proctor Authentication (e.g., SoftwareSecure) © 2011 rjerz.com8

Randomization Multiple exams (similar version) Questions picked randomly Algorithmically generated numerical responses Publisher products © 2011 rjerz.com9

Security Tools Browser security IP security Timed exams Cameras Password protection © 2011 rjerz.com10

Miscellaneous For papers, picking appropriate themes Making projects be individualized © 2011 rjerz.com11

Faculty Education Examples (anonymous, of course) Randomization techniques © 2011 rjerz.com12