Academic Integrity and Identity In Online Learning


Published on

slides from presentation by Acxiom titled, "Academic Integrity and Identity in Online Learning" at the March 2010 Midwest Blackboard User's Group (SLATE) Meeting at Lewis University, March 17, 2010

Published in: Technology, Education
  • Be the first to comment

  • Be the first to like this

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

Academic Integrity and Identity In Online Learning

  1. 1. Experiences Verifying the Identity of Online Students<br />February, 2010<br />Mike JortbergAcxiom Corporation<br />(630) 944-0379<br /><br />
  2. 2. Agenda<br />Integrity in Online Education<br />Higher Education Industry Regulations<br />Experiences with Challenge Questions<br />Case Studies<br />Risks & Identity Requirements<br />Acxiom In Higher Ed<br />Free Blackboard Program<br />Complete paper available at<br />2<br />
  3. 3. Integrity in Online Education<br />Persistent question in distance education: <br />How do you know who’s doing the work?<br />Distance education has exploded and is reshaping how students learn and institutions teach<br />The growth has magnified quality and fraud concerns by regulators<br />3<br />
  4. 4. Current State of Identity<br />In 2008, user id was the only method for verifying student identity in distance education<br />Ninety-six percent of the respondents indicate their college requires students to authenticate their identity -- using a unique username and password -- to access their online courses.<br />2008 survey of 139 members of Instructional Technology Council<br /><br />A user id grants access, but does not prove identity if it has been shared<br />4<br />
  5. 5. The Fraud Triangle<br />Pressure/Incentive<br />Assessments:<br />Grades, peers and career<br />Faculty <br />Reduces Pressure<br />Varied assessments<br />Active student involvement<br />Online Assessments<br />OnlineAssessments<br />Technology Reduces<br />Opportunity<br />Timed exams<br />Proctors<br />Scrambled questions<br />Special browsers<br />Identity verification<br />ProcessesChanges Thinking<br />Raise awareness<br />Honesty policies<br />Opportunity<br />Circumstances:<br />No one will know<br />Rationalization<br />Frame of mind:<br />Everyone cheats<br />5<br />
  6. 6. Challenges in Distance Education<br />6<br />Academic Integrity Student Aid Fraud<br />
  7. 7. What’s a Common Cause?<br />User ids in distance education are not secure<br />“She then went online posing as each student, enrolled in the courses and even did some of the homework. Once a financial-aid check arrived in the mail, minus tuition, a student would pay Halton a cut of the money, authorities said.”<br />“Another student said a teaching assistant had given his personal username and passwordto a class of students to use during the semester to cheat. Employees also made a habit of sharing such passwords with those who were not explicitly given access by a supervisor.”<br />"The former assistant coach was clearly assigned academic oversight responsibilities for the men's basketball program. In that capacity, he obtained all of the men's basketball student-athletes' online academic account IDs and passwords at the beginning of each academic year.This enabled him to log on to the institution's Internet system posing as the student-athletes. His access included, but was not limited to, class schedules, unofficial transcript and financial information. Additionally, if a student enrolled in an online course, the ID and password were used to access the course and to participate in required online chats. "<br />7<br />
  8. 8. Faculty Opinions about Identity<br />8<br />Kaplan University<br />Student Identity Verification and the Higher Education Opportunity Act: A Faculty Perspective<br />
  9. 9. New Guidelines<br />As result of 2008 HEOA passage, new guidelines from accreditors<br />When examinations are employed (paper, online, demonstrations of competency, etc.), they take place in circumstances that include firm student identification. The institution otherwise seeks to assure the integrity of student work.<br />If proctoring is used, what are the procedures for selecting proctors, establishing student identity, assuring security of test instruments, administering the examinations, and assuring secure and prompt evaluation?<br />If other methods are used to identify those who take the examination, how is identification firmly established? How are the conditions of the examination (security, time limits, etc.) controlled?<br />“Interregional Guidelines for Electronically Offered Degree and Certificate Programs”<br /> Link to all regional accreditor guidelines for distance education<br />9<br />
  10. 10. 10<br />New Technology - Hardware<br />Hardware and Biometrics: Adds substantial integrity but…<br />
  11. 11. 11<br />Acxiom Identify-X Challenge Questions<br />An on-line real-time identity verification service<br />Software as a Service in a secure cloud<br />Generates challenge questions and scores responses<br />Imbedded in popular LMS<br />Institution administration and faculty control<br />Which courses, assessments and how many students<br />Identify-X strategy governs<br />Which challenge questions<br />How many questions<br />Pass / fail threshold<br />
  12. 12. Experiences with Acxiom Challenge Questions<br />Sullivan University fall 2009 survey of 85 students<br />
  13. 13. Compared to Travelling to a Test Center?<br />13<br />
  14. 14. 14<br />Privacy and FERPA<br />Leverages only directory information<br />No enrollment process for student data required<br />Student releases data during identity verification process<br />Recommend reading Privacy booklet before deployment<br />Acxiom Opt Out and Privacy Policies<br />Consumer Assistance<br />Acxiom Privacy Policies<br />
  15. 15. 15<br />Identify-X Technical Details<br />Software as a service identity verification<br />No broadband required<br />No new database<br />No integration to SIS or LMS required<br />Connect via pre-built LMS integration for Blackboard, Angel, Moodle, etc.<br />Identity software development kit available for developers<br />Technical specifications for integration from any application<br />Documentation<br />Sample C# and Java Code<br />Web Service Definition Language (WSDL)<br />Development / test environment access<br />Identity logo and usage guidelines<br />Additional SDKs available for<br />FTC red flags (Bad SSNs, phones, fraud indicators)<br />Lead quality / scoring, predictive and prescriptive analytics<br />Address quality<br />
  16. 16. 16<br /> Web Proctor<br />Web proctor<br />Sees the environment<br />Talks to students<br />Observes the screen<br />Not recorded<br />Great for expanding test center hours and availability<br />Includes <br />
  17. 17. 17<br />Case Studies<br />Student X starts online assessment, fails identity check, scores 100% on exam<br />Student loan fraud found via Red Flag analysis of student demographics<br />97% pass of students identity verification. Failure notification to institution faculty, dean and president.<br />95% of students pass identity verification. One student starts same exam 4 times in 22 minutes. <br />“Dead” Student appears on Social Security Death Index<br />Larry Duggan, Director of Online Learning at SUNY Finger Lakes <br />“I now have an answer to faculty who have asked how can they know who’s taking the online assessment. This level of authentication really does help with overcoming many objections faculty have to online learning"<br />
  18. 18. Risk Analysis<br />18<br />
  19. 19. 19<br />Acxiom In Higher Education<br />HR: Background Screening: guaranteed savings of 15% off your current provider<br />Admissions: Lead scrubbing / modeling to reduce Cost Per Lead vendor costs and better target your audience. <br />Institutional Research: Student demographics to understand the behavior and demographics of your leads, students and alumni with amazing insights.<br />IT: Identity proofing can cut down help desk calls with secure online password reset. Ensure FERPA compliance for online transcript access. Mainframe, server, network outsourcing.<br />Registrar: Implement FTC Red Flag programs to monitor for identity theft by verifying accurate SSN and student mailing addresses<br />Business Office: Skip tracing solutions for finding students who owe the institution but have moved and do not provide a forwarding address.<br />Alumni/Development: Re-engage with lost alumni or improve donor results with alumni propensity modeling. Measure social media use in your population.<br />
  20. 20. 20<br />To Learn More<br />Calloremail for more information<br /><br />(630)944-0379<br />Activateatrialtoevaluatefitforyourprogram<br />See or<br />Researchandcomparesolutions<br />Blog<br />SeepostonJune19thforcomparisontable<br />Join Group<br />StudentIdentityVerificationandAcademicIntegrity<br /><br />
  21. 21. Blackboard Program<br />You receive<br />Fully operational system at no cost<br />Building Block, PowerLink, Angel Nugget<br />Annual set of 500 to 2500 transactions (based on student population)<br />Best practices and thought leadership on identity in distance education<br />Fixed authentication strategy<br />Alerts when you get close to empty<br />Acxiom<br />Introduction to your institution<br />Exposure to faculty and administration to our identity solution<br />Opportunity to introduce other solutions<br />21<br />
  22. 22. How to Activate<br />22<br />Go to<br /><ul><li>Register
  23. 23. Download connector</li></ul>Get email from Acxiom<br /><ul><li>Watch presentations
  24. 24. Get credentials</li></ul>Get ready<br /><ul><li>Install and configure on test server
  25. 25. Recruit faculty
  26. 26. Select course
  27. 27. Notify students</li></ul>Go<br /><ul><li>Run the program
  28. 28. Analyze reports
  29. 29. Survey staff and students</li>