Online Learning Integrity Approaches: Current Practices and Future Solutions
DOI:
https://doi.org/10.24059/olj.v21i1.843Keywords:
academic integrity, online education, authentication, higher education opportunity act, academic misconductAbstract
The primary objective of this paper is to help institutions respond to the stipulation of the Higher Education Opportunity Act of 2008 by adopting cost-effective academic integrity solutions without compromising the convenience and flexibility of online learning. Current user authentication solutions such as user ID and password, security questions, voice recognition, or fingerprint identification are not infallible and may violate students’ rights to privacy or cause undue interruptions to their efforts in performing assessment tasks. Existing authentication solutions will be evaluated for their cost effectiveness in preventing fraud and cheating while ensuring learner identity and honesty. Emerging technologies in the form of biometrics, surveillance systems and predictive analytics will be examined to provide insights into the future of e-authentication for ensuring the academic integrity of online learning.References
Allen, I.E., and Seaman, J. (2015). Grade Level: Tracking Online Education in the United States. Babson Survey Research Group and Quahong Research Group, LLC. Last access on November 23, 2015: http://www.onlinelearningsurvey.com/reports/gradelevel.pdf
Apampa, K.M., Wills, G., and Argles, D. (2010). User Security Issues in Summative E-Assessment Security. International Journal of Digital Society, 1(2), 135-147.
Chickering, A.W., and Reisser, I. (1993). Education and Identity, 2nd Edition. San Francisco: Jossey-Bass.
Fishman, T. (2012). The Fundamental Values of Academic Integrity. The International Center for Academic Integrity. Last access on November 23, 2015: http://www.academicintegrity.org/icai/assets/Revised_FV_2014.pdf
Kolberg, L. (1984). Essays in Moral Development: the Psychology of Moral Development, vol. 2, New York: New York.
Jones, I.M. (2009). Cyber-Plagiarism: Different Method Same Song. Journal of Legal, Ethical and Regulatory Issues, 12(1), 89-100.
Mcallister, C., and Watkins, P. (2012). Increasing Academic Integrity in Online Classes by Fostering the Development of Self-Regulated Learning Skills. The Clearing House, 85, 96-101.
Rabuzin, K., Baca, M., and Sajko, M. (2006). E-Learning: Biometrics as a Security Factor. International Multi-Conference on Computing in the Global Information Technology. 64-69.
Ratha, N.K., Connell, J.H., and Bolle, R.M. (2001). Enhancing Security and Privacy in Biometrics-based Authentication Systems. IBM Systems Journal, 40(3), 614-634.
Rodchua, S., Yiadom-Boakye, G., and Woolsey, R. (2011). Student Verification System for Online Assessments: Bolstering Quality and Integrity of Distance Learning. Journal of Industrial Technology, 27(3), 2-8.
Saad, L., Busteed, B., and Ogisi, M. (2013). In U.S., Online Education Rated Best for Vale and Options. A Gallup Poll Survey. Last access on November 23, 2015: http://www.gallup.com/poll/165425/online-education-rated-best-value-options.aspx
The Higher Education Opportunity Act (2008). Last access on November 23, 2015: http://www.gpo.gov/fdsys/pkg/PLAW-110publ315/pdf/PLAW-110publ315.pdf
Ullah, A., Xiao, H., Lilley, M., and Barker, T. (2012). Using Challenging Questions for Student Authentication in Online Examination. International Journal for Infonomics, 5(3/4), 631-639.
Yang, J., Xiong, N., Vasilakos, A.V., Fang, Z., Park, D., Xu, X., Yoon, S., Xie, S., and Yang, Y. (2011). A Fingerprint Recognition Scheme Based on Assembling Invariant Moments for Cloud Computing. Communicationsâ€, IEEE Systems Journal, 5(4), 574-583.
Downloads
Published
Issue
Section
License
As a condition of publication, the author agrees to apply the Creative Commons – Attribution International 4.0 (CC-BY) License to OLJ articles. See: https://creativecommons.org/licenses/by/4.0/.
This licence allows anyone to reproduce OLJ articles at no cost and without further permission as long as they attribute the author and the journal. This permission includes printing, sharing and other forms of distribution.
Author(s) hold copyright in their work, and retain publishing rights without restrictions