Ensuring Academic Integrity with Online Proctoring Lauren Botts-Posey Partnership Representative.

Slides:



Advertisements
Similar presentations
Providing Evidence of Academic Integrity and Student Authentication in Online Courses and Programs Matthew Prineas, UMUC Elizabeth Mulherrin, UMUC.
Advertisements

BIOMETRICS CONSORTIUM CONFERENCE BALTIMORE, MARYLAND September 19 – 21, 2006 Bill Wipprecht EVP/Chief Security Officer Corporate Security Wells Fargo &
Defining the Security Domain Marilu Goodyear John H. Louis University of Kansas.
Interoperability Roadmap Comments Sections E, F, and G Transport & Security Standards Workgroup Dixie Baker, chair Lisa Gallagher, co-chair March 11, 2015.
Enav.it Session 3 Steps towards the SESAR deployment and the ATM system modernisation.
Missouri State Online Academic Integrity Week October 6, 2009.
How Testing is Changing in the 21 st Century Presented by Don Kassner – President, ProctorU.
Never Events vs. Always Events Eli Grambling. “Never Events”  Defined by National Quality Forum (NQF) as “serious reportable events”  Centers for Medicaid.
AutoSignon - A Reference Implementation of a Secure Single Sign-On Blackboard Building Block TM Richesh Ruchir, Technical Manager
Creating a Secured and Trusted Information Sphere in Different Markets Giuseppe Contino.
User Authentication Recommendations Transport & Security Standards Workgroup December 10, 2014.
Introduction (Pendahuluan)  Information Security.
Digitization at the National Archives and Records Administration Doris Hamburg Director, Preservation Programs James Hastings Director, Access Programs.
“Distance Education Standards and Issues – How to Better Ensure Competency with Online Education ” Joe McClary International Distance Education Certification.
Library Services Research Data Management Services at Royal Holloway Dr Dace Rozenberga, Research Information Manager
Credential Provider Operational Practices Statement CAMP Shibboleth June 29, 2004 David Wasley.
Deb Gearhart Trot University Student Authentication – What it Means for Us.
E-business Security Dana Vasiloaica Institute of Technology Sligo 22 April 2006.
Establishing Quality-Oriented One-Stop Services Beth A. Brinly KY Department of Workforce Investment
SCC IDE TRUST & Functional Model for IDE Standards Identification G. Whitehead January/February 2013.
K-State Online Instructional Design for Mediated Education “How to Get the Most Out of Your Online Quizzes and Exams” Swasati Mukherjee Ben Ward.
Authenticating Online Students: Practically Speaking Patricia James October 15, 2013 For audio call Toll Free and use PIN/code
Emergency system for CBRN interventions. TeamNet – Agile security solutions provider TeamNet has 12 years’ experience working with European public authorities.
Tutorial Chapter 5. 2 Question 1: What are some information technology tools that can affect privacy? How are these tools used to commit computer crimes?
CLEAR 2003 Annual Conference Toronto, Ontario Technology, Service, and Delivery Stephen Greenfield Product Services Manager.
IAM REFERENCE ARCHITECTURE BRICKS EMBEDED ARCHITECTS COMMUNITY OF PRACTICE MARCH 5, 2015.
Current challenges for health systems Increasing elderly population –Relative decrease in resources (fewer taxpayers), chronic patients Financial sustainability.
The Grid System Design Liu Xiangrui Beijing Institute of Technology.
PKI Forum Business Panel March 6, 2000 Dr. Ray Wagner Sr. Director, Technology Research.
出處 :2010 2nd International Conference on Signal Processing Systems (ICSPS) 作者 :Zhidong Shen 、 Qiang Tong 演講者 : 碩研資管一甲 吳俊逸.
Structural Characteristics of Partnerships. Definition of Partnership Systems of formalized cooperation. Legally binding arrangement or informal understanding.
Security Protection on Trust Delegated Medical Data in Public Mobile Networks Dasun Weerasinghe, Muttukrishnan Rajarajan and Veselin Rakocevic Mobile Networks.
By: Chantelle S. Loyd. Concerns about Facebook and Myspace.
Introduction to Biometrics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #18 Biometrics Applications - III October 26, 2005.
Michael Milgramm, CEO/CTO Donald Kovalevich, President John Fricke, VP Business Development IdentaZone, Inc © Copyright 2012 IdentaZone provides a multi-layer.
Integrating a Federated Healthcare Data Query Platform With Electronic IRB Information Systems Shan He IPHIE 2010.
Academic Integrity: Processes & Expectations at the College Level Andrea Goodwin Associate Director, Office of Student Conduct University of Maryland Diane.
Biometrics: The Future of Security Peter Bruno Lucy Gong Jared Layne Supriya Sundaram.
Biometrics: A Tool for Information Security 1 Authors: Anil K. Jain, Arun Ross, Sharath Pankanti IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY,
SEC835 Security in Databases and Web applications Presentation.
Protecting the Integrity of Tests Delhi, 20 November, 2015.
Need for Security Control access to servicesControl access to services Ensure confidentialityEnsure confidentiality Guard against attacksGuard against.
Welcome Topic : Security.
The social, economical and political impact of the eID Jan DEPREST – L-SEC – 19-may-2005.
To Raise the Bar of Exam Integrity NCTA Conference 2010.
ONLINE STUDENT AUTHENTICATION EXAMITY PILOT SPRING 2016.
James Fox Shane Stuart Danny Deselle Matt Baldwin Acceptable Use Policies.
Securing Online Banking By Ben White CS 591. Who Federal Financial Institutions Examination Council What To authenticate the identity of retail and commercial.
CompTIA Security+ Certification Exam SY COMPTIA SECURITY+SY0-401 Q&A is a straight forward,efficient,and effective method of preparing for the new.
Learning Management System (LMS) /Course Management System (CMS) & Digital Portfolio.
Global Biometrics Market - Opportunity and Forecast,
Anytime. Anywhere. Any Method.
Blackboard Environment
ACADEMIC INTEGRITY TASK FORCE
Security Issues.
Journey to Academic Integrity & Online Participant Authentication
Topic 1: Data, information, knowledge and processing
Secure Testing with Respondus
Two Way Authentication
Proven Track Record Enhancing the User Experience just used your new facial recognition software on my iPhone.
 How does GDPR impact your business? Pro Tip: Pro Tip: Pro Tip:
Certificate Revocation
A simple and secure single sign-in authentication service, designed to help businesses prove who they are when transacting with public services online.
Partnership: Making Common Cause in a Common Effort
CyberSecure: Your Medical Practice
ELECTRONIC SIGNATURES
ELECTRONIC SIGNATURES
New Technologies, quality and distance education
An Adaptive Trust-based e-assessment System for Learning
Presentation transcript:

Ensuring Academic Integrity with Online Proctoring Lauren Botts-Posey Partnership Representative

How can you be sure?

Concerns in online learning Plagiarism Exam integrity Test-taker identity

Security approach Testing centers Live online proctoring Record and review Authentication only Secure browser only

Test design strategies Set clear standards Explicit test parameters Set exam windows/time limits Implement proctoring protocols Preventative measures

What is online proctoring?

How does it work? The definition of proctoring

Identity Authentication tools Photo identification – Government-issued Challenge-based questions – Used by the banking and healthcare industries Biometric analysis – Keystroke, facial and handwritten

Partnerships Trusted by over 500 partner institutions

Questions?