• Like
  • Save
Academic Integrity and Identity In Online Learning
Upcoming SlideShare
Loading in...5
×
 

Academic Integrity and Identity In Online Learning

on

  • 4,786 views

slides from presentation by Acxiom titled, "Academic Integrity and Identity in Online Learning" at the March 2010 Midwest Blackboard User's Group (SLATE) Meeting at Lewis University, March 17, 2010

slides from presentation by Acxiom titled, "Academic Integrity and Identity in Online Learning" at the March 2010 Midwest Blackboard User's Group (SLATE) Meeting at Lewis University, March 17, 2010

Statistics

Views

Total Views
4,786
Views on SlideShare
4,467
Embed Views
319

Actions

Likes
0
Downloads
16
Comments
0

22 Embeds 319

http://btstwm.blogspot.com 212
http://slategroup.blogspot.com 37
http://www.slideshare.net 14
http://btstwm.blogspot.ca 14
http://btstwm.blogspot.fr 7
http://btstwm.blogspot.com.au 6
http://www.blogger.com 4
http://btstwm.blogspot.gr 4
http://btstwm.blogspot.co.uk 3
http://btstwm.blogspot.in 2
http://btstwm.blogspot.mx 2
http://btstwm.blogspot.jp 2
http://blog.markleealexander.com 2
http://thereadershop.blogspot.com 2
http://btstwm.blogspot.dk 1
http://btstwm.blogspot.co.il 1
http://slategroup.blogspot.kr 1
http://btstwm.blogspot.ru 1
http://btstwm.blogspot.com.es 1
http://webcache.googleusercontent.com 1
http://bb91.udc.edu 1
http://btstwm.blogspot.ae 1
More...

Accessibility

Categories

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

    Academic Integrity and Identity In Online Learning Academic Integrity and Identity In Online Learning Presentation Transcript

    • Experiences Verifying the Identity of Online Students
      February, 2010
      Mike JortbergAcxiom Corporation
      (630) 944-0379
      Michael.Jortberg@Acxiom.com
    • Agenda
      Integrity in Online Education
      Higher Education Industry Regulations
      Experiences with Challenge Questions
      Case Studies
      Risks & Identity Requirements
      Acxiom In Higher Ed
      Free Blackboard Program
      Complete paper available at www.Acxiom.com/Education
      2
    • Integrity in Online Education
      Persistent question in distance education:
      How do you know who’s doing the work?
      Distance education has exploded and is reshaping how students learn and institutions teach
      The growth has magnified quality and fraud concerns by regulators
      3
    • Current State of Identity
      In 2008, user id was the only method for verifying student identity in distance education
      Ninety-six percent of the respondents indicate their college requires students to authenticate their identity -- using a unique username and password -- to access their online courses.
      2008 survey of 139 members of Instructional Technology Council
      http://www.itcnetwork.org/mod/resource/view.php?inpopup=true&id=77
      A user id grants access, but does not prove identity if it has been shared
      4
    • The Fraud Triangle
      Pressure/Incentive
      Assessments:
      Grades, peers and career
      Faculty
      Reduces Pressure
      Varied assessments
      Active student involvement
      Online Assessments
      OnlineAssessments
      Technology Reduces
      Opportunity
      Timed exams
      Proctors
      Scrambled questions
      Special browsers
      Identity verification
      ProcessesChanges Thinking
      Raise awareness
      Honesty policies
      Opportunity
      Circumstances:
      No one will know
      Rationalization
      Frame of mind:
      Everyone cheats
      5
    • Challenges in Distance Education
      6
      Academic Integrity Student Aid Fraud
    • What’s a Common Cause?
      User ids in distance education are not secure
      “She then went online posing as each student, enrolled in the courses and even did some of the homework. Once a financial-aid check arrived in the mail, minus tuition, a student would pay Halton a cut of the money, authorities said.” http://www.azcentral.com/news/articles/2009/06/24/20090624loanfraud0624-ON.html
      “Another student said a teaching assistant had given his personal username and passwordto a class of students to use during the semester to cheat. Employees also made a habit of sharing such passwords with those who were not explicitly given access by a supervisor.”http://www.brownsvilleherald.com/news/online-100590-utb-employees.html
      "The former assistant coach was clearly assigned academic oversight responsibilities for the men's basketball program. In that capacity, he obtained all of the men's basketball student-athletes' online academic account IDs and passwords at the beginning of each academic year.This enabled him to log on to the institution's Internet system posing as the student-athletes. His access included, but was not limited to, class schedules, unofficial transcript and financial information. Additionally, if a student enrolled in an online course, the ID and password were used to access the course and to participate in required online chats. " http://www.ncaa.org/wps/wcm/connect/f4ebf400411cfa44afe7ff122174eb00/20100120+Georgia+Southern+Infractions+Report.pdf?MOD=AJPERES&CACHEID=f4ebf400411cfa44afe7ff122174eb00
      7
    • Faculty Opinions about Identity
      8
      Kaplan University
      Student Identity Verification and the Higher Education Opportunity Act: A Faculty Perspective
    • New Guidelines
      As result of 2008 HEOA passage, new guidelines from accreditors
      When examinations are employed (paper, online, demonstrations of competency, etc.), they take place in circumstances that include firm student identification. The institution otherwise seeks to assure the integrity of student work.
      If proctoring is used, what are the procedures for selecting proctors, establishing student identity, assuring security of test instruments, administering the examinations, and assuring secure and prompt evaluation?
      If other methods are used to identify those who take the examination, how is identification firmly established? How are the conditions of the examination (security, time limits, etc.) controlled?
      “Interregional Guidelines for Electronically Offered Degree and Certificate Programs”
      Link to all regional accreditor guidelines for distance education http://mikejortberg.blogspot.com/2009/12/regional-accreditor-identity-guidelines.html
      9
    • 10
      New Technology - Hardware
      Hardware and Biometrics: Adds substantial integrity but…
    • 11
      Acxiom Identify-X Challenge Questions
      An on-line real-time identity verification service
      Software as a Service in a secure cloud
      Generates challenge questions and scores responses
      Imbedded in popular LMS
      Institution administration and faculty control
      Which courses, assessments and how many students
      Identify-X strategy governs
      Which challenge questions
      How many questions
      Pass / fail threshold
    • Experiences with Acxiom Challenge Questions
      Sullivan University fall 2009 survey of 85 students
    • Compared to Travelling to a Test Center?
      13
    • 14
      Privacy and FERPA
      Leverages only directory information
      No enrollment process for student data required
      Student releases data during identity verification process
      Recommend reading Privacy booklet before deployment
      Acxiom Opt Out and Privacy Policies
      Consumer Assistance
      Acxiom Privacy Policies
    • 15
      Identify-X Technical Details
      Software as a service identity verification
      No broadband required
      No new database
      No integration to SIS or LMS required
      Connect via pre-built LMS integration for Blackboard, Angel, Moodle, etc.
      Identity software development kit available for developers
      Technical specifications for integration from any application
      Documentation
      Sample C# and Java Code
      Web Service Definition Language (WSDL)
      Development / test environment access
      Identity logo and usage guidelines
      Additional SDKs available for
      FTC red flags (Bad SSNs, phones, fraud indicators)
      Lead quality / scoring, predictive and prescriptive analytics
      Address quality
    • 16
      ProctorU.com Web Proctor
      Web proctor
      Sees the environment
      Talks to students
      Observes the screen
      Not recorded
      Great for expanding test center hours and availability
      Includes
    • 17
      Case Studies
      Student X starts online assessment, fails identity check, scores 100% on exam
      Student loan fraud found via Red Flag analysis of student demographics
      97% pass of students identity verification. Failure notification to institution faculty, dean and president.
      95% of students pass identity verification. One student starts same exam 4 times in 22 minutes.
      “Dead” Student appears on Social Security Death Index
      Larry Duggan, Director of Online Learning at SUNY Finger Lakes
      “I now have an answer to faculty who have asked how can they know who’s taking the online assessment. This level of authentication really does help with overcoming many objections faculty have to online learning"
    • Risk Analysis
      18
    • 19
      Acxiom In Higher Education
      HR: Background Screening: guaranteed savings of 15% off your current provider
      Admissions: Lead scrubbing / modeling to reduce Cost Per Lead vendor costs and better target your audience.
      Institutional Research: Student demographics to understand the behavior and demographics of your leads, students and alumni with amazing insights.
      IT: Identity proofing can cut down help desk calls with secure online password reset. Ensure FERPA compliance for online transcript access. Mainframe, server, network outsourcing.
      Registrar: Implement FTC Red Flag programs to monitor for identity theft by verifying accurate SSN and student mailing addresses
      Business Office: Skip tracing solutions for finding students who owe the institution but have moved and do not provide a forwarding address.
      Alumni/Development: Re-engage with lost alumni or improve donor results with alumni propensity modeling. Measure social media use in your population.
    • 20
      To Learn More
      Calloremail for more information
      Michael.Jortberg@Acxiom.com
      (630)944-0379
      Activateatrialtoevaluatefitforyourprogram
      See www.Blackboard.com/Acxiom or www.Acxiom.com/StudentIdentity
      Researchandcomparesolutions
      Bloghttp://mikejortberg.blogspot.com/
      SeepostonJune19thforcomparisontable
      Join Group
      StudentIdentityVerificationandAcademicIntegrity
      http://www.linkedin.com/e/gis/100235
    • Blackboard Program
      You receive
      Fully operational system at no cost
      Building Block, PowerLink, Angel Nugget
      Annual set of 500 to 2500 transactions (based on student population)
      Best practices and thought leadership on identity in distance education
      Fixed authentication strategy
      Alerts when you get close to empty
      Acxiom
      Introduction to your institution
      Exposure to faculty and administration to our identity solution
      Opportunity to introduce other solutions
      21
    • How to Activate
      22
      Go to www.blackboard.com/acxiom
      • Register
      • Download connector
      Get email from Acxiom
      • Watch presentations
      • Get credentials
      Get ready
      • Install and configure on test server
      • Recruit faculty
      • Select course
      • Notify students
      Go
      • Run the program
      • Analyze reports
      • Survey staff and students