Security Considerations and Recommendations in Computer-Based Testing

被引:9
作者
Al-Saleem, Saleh M. [1 ,2 ]
Ullah, Hanif [2 ]
机构
[1] King Saud Univ, Coll Comp & Informat Sci, Dept Informat Syst, Riyadh 11543, Saudi Arabia
[2] Natl Ctr Assessment Higher Educ, Dept Computerized Based Testing, Riyadh 11537, Saudi Arabia
关键词
D O I
10.1155/2014/562787
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
Many organizations and institutions around the globe are moving or planning to move their paper-and-pencil based testing to computer-based testing (CBT). However, this conversion will not be the best option for all kinds of exams and it will require significant resources. These resources may include the preparation of item banks, methods for test delivery, procedures for test administration, and last but not least test security. Security aspects may include but are not limited to the identification and authentication of examinee, the risks that are associated with cheating on the exam, and the procedures related to test delivery to the examinee. This paper will mainly investigate the security considerations associated with CBT and will provide some recommendations for the security of these kinds of tests. We will also propose a palm-based biometric authentication system incorporated with basic authentication system(username/password) in order to check the identity and authenticity of the examinee.
引用
收藏
页数:7
相关论文
共 26 条
[1]  
Amayeh G., NEW APPROACH HAND BA
[2]  
[Anonymous], RR9525 ETS
[3]  
[Anonymous], 2011, SIGNAL IMAGE PROCESS, DOI DOI 10.5121/SIPIJ.2011.2114
[4]  
Asha S., 2008, P IEEE INT S BIOM SE
[5]  
Bartram D, 2006, COMPUTER-BASED TESTING AND THE INTERNET: ISSUES AND ADVANCES, P1
[6]  
Castella-Roca J., 2006, P 1 INT C AV REL SEC
[7]   Genetic Algorithm based Palm Recognition Method for Biometric Authentication Systems [J].
Cenys, A. ;
Gibavicius, D. ;
Goranin, N. ;
Marozas, L. .
ELEKTRONIKA IR ELEKTROTECHNIKA, 2013, 19 (02) :69-74
[8]   A comparative study of item exposure control methods in computerized adaptive testing [J].
Chang, SW ;
Ansley, TN .
JOURNAL OF EDUCATIONAL MEASUREMENT, 2003, 40 (01) :71-103
[9]   Palmprint authentication using a symbolic representation of images [J].
Chen, Jiansheng ;
Moon, Yiu-Sang ;
Wong, Ming-Fai ;
Su, Guangda .
IMAGE AND VISION COMPUTING, 2010, 28 (03) :343-351
[10]  
Chiranji N., 2011, INT J COMPUTER SCI T, V2, P85