Marie
Upcoming SlideShare
Loading in...5
×

Like this? Share it with your network

Share

Marie

  • 633 views
Uploaded on

Speaker #1 in Electronic Proctoring and Identity Validation in Online Programs

Speaker #1 in Electronic Proctoring and Identity Validation in Online Programs

  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Be the first to comment
    Be the first to like this
No Downloads

Views

Total Views
633
On Slideshare
633
From Embeds
0
Number of Embeds
0

Actions

Shares
Downloads
2
Comments
0
Likes
0

Embeds 0

No embeds

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
    No notes for slide

Transcript

  • 1. Electronic Proctoring And Identity Validation In Online Programs Meg Benke, ESC Marie Cini, UMUC Matt Prineas, UMUC
  • 2. Goals of our session
    • To provide background for the topic
    • To explain our institutional approaches
    • To provide guidance for your institution’s approach
  • 3. HEA/HEOA
    • HEA--1965 to regulate Title IV funding
    • 1992--HEA"50% rule" to regulate fraud in "diploma mills"
    • Online identity management concerns embedded in distrust of "diploma mills"
    • Little research on identity fraud in online education
  • 4. Online Learning
    • Reputable schools offer online programs
    • Model focuses on faculty-student interaction unlike correspondence
    • Took time for legislation to catch up--in 2006 financial aid offered to students in 100% online programs
  • 5. 2008 HEOA
    • Change garnering most interest is ensuring that person registered for course is the one who participates and earns the academic credit
    • Institutions struggling to determine what this means—is a secure login and password enough?
  • 6. Your Institution’s Model
    • To approach this in your institution
      • understand your philosophy regarding adult students
      • Conduct a cost/benefit analysis for your model
        • how much authentication do you need relative to your model?