Pedagogical approaches for e-assessment with authentication and authorship verification in Higher Education
Okada, A., Noguera, I., Alexieva, L., Rozeva, A., Kocdar, S., Brouns, F., . . . Guerrero‐Roldán, A. (2019). Pedagogical approaches for e-assessment with authentication and authorship verification in Higher Education. British Journal of Educational Technology, 50 (6), 3264-3282. doi:10.1111/bjet.12733
Published in
British Journal of Educational TechnologyAuthors
Date
2019Copyright
© 2019 The Authors
Checking the identity of students and authorship of their online submissions is a major concern in Higher Education due to the increasing amount of plagiarism and cheating using the Internet. The literature on the effects of e‐authentication systems for teaching staff is very limited because it is a novel procedure for them. A considerable gap is to understand teaching staff' views regarding the use of e‐authentication instruments and how they impact trust in e‐assessment. This mixed‐method study examines the concerns and practices of 108 teaching staff who used the TeSLA—Adaptive Trust‐based e‐Assessment System in six countries: the UK, Spain, the Netherlands, Bulgaria, Finland and Turkey. The findings revealed some technological, organisational and pedagogical issues related to accessibility, security, privacy and e‐assessment design and feedback. Recommendations are to provide a FAQ and an audit report with results, to raise awareness about data security and privacy, to develop policies and guidelines about fraud detection and prevention, e‐assessment best practices and course team support.
...


Publisher
Wiley-Blackwell Publishing Ltd.ISSN Search the Publication Forum
1467-8535Keywords
Metadata
Show full item recordCollections
- Avoin yliopisto [91]
License
Related items
Showing items with similar title or keywords.
-
Anomaly detection approach to keystroke dynamics based user authentication
Ivannikova, Elena; David, Gil; Hämäläinen, Timo (IEEE, 2017)Keystroke dynamics is one of the authentication mechanisms which uses natural typing pattern of a user for identification. In this work, we introduced Dependence Clustering based approach to user authentication using ... -
Developing E-Authentication for E-Assessment : Diversity of Students Testing the System in Higher Education
Uotinen, Sanna; Ladonlahti, Tarja; Laamanen, Merja (Sciendo, 2020)Sähköinen tunnistautuminen on yksi keskeisistä teemoista verkko-opetuksessa, -opiskelussa ja - arvioinnissa. Tämän tutkimuksen tarkoituksena oli tutkia opiskeluunsa erityistä tukea tarvitsevien yliopisto-opiskelijoiden ... -
What affects the intention to change information security behavior when using biometric authentication in mobile payments?
Väli-Klemelä, Ainohelena (2021)Mobiilimaksut ja mobiilimaksusovellusten käyttö ovat lisääntyneet merkittävästi viime vuosina. Käyttäjät käyttävät erityyppisiä tunnistautumismenetelmiä mobiilimaksujen suorittamiseen, mukaan lukien biometrinen tunnistautuminen. ... -
Acceptability of the e-authentication in higher education studies : views of students with special educational needs and disabilities
Laamanen, Merja; Ladonlahti, Tarja; Uotinen, Sanna; Okada, Alexandra; Bañeres, David; Koçdar, Serpil (Springer, 2021)Trust-based e-assessment systems are increasingly important in the digital age for both academic institutions and students, including students with special educational needs and disabilities (SEND). Recent literature ... -
Reconsidering authorship in the Ciceronian corpus through computational authorship attribution
Vainio, Raija; Välimäki, Reima; Hella, Anni; Kaartinen, Marjo; Immonen, Teemu; Vesanto, Aleksi; Ginter, Filip (Centro di Studi Ciceroniani, 2019)In recent years, methods of computational authorship attribution have offered promising results for the reattribution of classical texts. We use and further develop these methods to verify the authorship of several texts ...