Online Learning Integrity Approaches: Current Practices and Future Solutions

Anita Lee-Post, Holly Hapke

Abstract


The primary objective of this paper is to help institutions respond to the stipulation of the Higher Education Opportunity Act of 2008 by adopting cost-effective academic integrity solutions without compromising the convenience and flexibility of online learning. Current user authentication solutions such as user ID and password, security questions, voice recognition, or fingerprint identification are not infallible and may violate students’ rights to privacy or cause undue interruptions to their efforts in performing assessment tasks. Existing authentication solutions will be evaluated for their cost effectiveness in preventing fraud and cheating while ensuring learner identity and honesty. Emerging technologies in the form of biometrics, surveillance systems and predictive analytics will be examined to provide insights into the future of e-authentication for ensuring the academic integrity of online learning.

Keywords


academic integrity; online education; authentication; higher education opportunity act; academic misconduct

Full Text:

PDF

References


Allen, I.E., and Seaman, J. (2015). Grade Level: Tracking Online Education in the United States. Babson Survey Research Group and Quahong Research Group, LLC. Last access on November 23, 2015: http://www.onlinelearningsurvey.com/reports/gradelevel.pdf

Apampa, K.M., Wills, G., and Argles, D. (2010). User Security Issues in Summative E-Assessment Security. International Journal of Digital Society, 1(2), 135-147.

Chickering, A.W., and Reisser, I. (1993). Education and Identity, 2nd Edition. San Francisco: Jossey-Bass.

Fishman, T. (2012). The Fundamental Values of Academic Integrity. The International Center for Academic Integrity. Last access on November 23, 2015: http://www.academicintegrity.org/icai/assets/Revised_FV_2014.pdf

Kolberg, L. (1984). Essays in Moral Development: the Psychology of Moral Development, vol. 2, New York: New York.

Jones, I.M. (2009). Cyber-Plagiarism: Different Method Same Song. Journal of Legal, Ethical and Regulatory Issues, 12(1), 89-100.

Mcallister, C., and Watkins, P. (2012). Increasing Academic Integrity in Online Classes by Fostering the Development of Self-Regulated Learning Skills. The Clearing House, 85, 96-101.

Rabuzin, K., Baca, M., and Sajko, M. (2006). E-Learning: Biometrics as a Security Factor. International Multi-Conference on Computing in the Global Information Technology. 64-69.

Ratha, N.K., Connell, J.H., and Bolle, R.M. (2001). Enhancing Security and Privacy in Biometrics-based Authentication Systems. IBM Systems Journal, 40(3), 614-634.

Rodchua, S., Yiadom-Boakye, G., and Woolsey, R. (2011). Student Verification System for Online Assessments: Bolstering Quality and Integrity of Distance Learning. Journal of Industrial Technology, 27(3), 2-8.

Saad, L., Busteed, B., and Ogisi, M. (2013). In U.S., Online Education Rated Best for Vale and Options. A Gallup Poll Survey. Last access on November 23, 2015: http://www.gallup.com/poll/165425/online-education-rated-best-value-options.aspx

The Higher Education Opportunity Act (2008). Last access on November 23, 2015: http://www.gpo.gov/fdsys/pkg/PLAW-110publ315/pdf/PLAW-110publ315.pdf

Ullah, A., Xiao, H., Lilley, M., and Barker, T. (2012). Using Challenging Questions for Student Authentication in Online Examination. International Journal for Infonomics, 5(3/4), 631-639.

Yang, J., Xiong, N., Vasilakos, A.V., Fang, Z., Park, D., Xu, X., Yoon, S., Xie, S., and Yang, Y. (2011). A Fingerprint Recognition Scheme Based on Assembling Invariant Moments for Cloud Computing. Communications”, IEEE Systems Journal, 5(4), 574-583.




DOI: http://dx.doi.org/10.24059/olj.v21i1.843