Academic Integrity and Identity In Online Learning
Upcoming SlideShare
Loading in...5
×
 

Academic Integrity and Identity In Online Learning

on

  • 4,974 views

slides from presentation by Acxiom titled, "Academic Integrity and Identity in Online Learning" at the March 2010 Midwest Blackboard User's Group (SLATE) Meeting at Lewis University, March 17, 2010

slides from presentation by Acxiom titled, "Academic Integrity and Identity in Online Learning" at the March 2010 Midwest Blackboard User's Group (SLATE) Meeting at Lewis University, March 17, 2010

Statistics

Views

Total Views
4,974
Views on SlideShare
4,652
Embed Views
322

Actions

Likes
0
Downloads
16
Comments
0

22 Embeds 322

http://btstwm.blogspot.com 213
http://slategroup.blogspot.com 37
http://www.slideshare.net 14
http://btstwm.blogspot.ca 14
http://btstwm.blogspot.com.au 7
http://btstwm.blogspot.fr 7
http://www.blogger.com 4
http://btstwm.blogspot.gr 4
http://btstwm.blogspot.in 3
http://btstwm.blogspot.co.uk 3
http://btstwm.blogspot.mx 2
http://btstwm.blogspot.jp 2
http://blog.markleealexander.com 2
http://thereadershop.blogspot.com 2
http://btstwm.blogspot.dk 1
http://btstwm.blogspot.co.il 1
http://slategroup.blogspot.kr 1
http://btstwm.blogspot.ru 1
http://webcache.googleusercontent.com 1
http://bb91.udc.edu 1
http://btstwm.blogspot.com.es 1
http://btstwm.blogspot.ae 1
More...

Accessibility

Categories

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

Academic Integrity and Identity In Online Learning Academic Integrity and Identity In Online Learning Presentation Transcript

  • Experiences Verifying the Identity of Online Students
    February, 2010
    Mike JortbergAcxiom Corporation
    (630) 944-0379
    Michael.Jortberg@Acxiom.com
  • Agenda
    Integrity in Online Education
    Higher Education Industry Regulations
    Experiences with Challenge Questions
    Case Studies
    Risks & Identity Requirements
    Acxiom In Higher Ed
    Free Blackboard Program
    Complete paper available at www.Acxiom.com/Education
    2
  • Integrity in Online Education
    Persistent question in distance education:
    How do you know who’s doing the work?
    Distance education has exploded and is reshaping how students learn and institutions teach
    The growth has magnified quality and fraud concerns by regulators
    3
  • Current State of Identity
    In 2008, user id was the only method for verifying student identity in distance education
    Ninety-six percent of the respondents indicate their college requires students to authenticate their identity -- using a unique username and password -- to access their online courses.
    2008 survey of 139 members of Instructional Technology Council
    http://www.itcnetwork.org/mod/resource/view.php?inpopup=true&id=77
    A user id grants access, but does not prove identity if it has been shared
    4
  • The Fraud Triangle
    Pressure/Incentive
    Assessments:
    Grades, peers and career
    Faculty
    Reduces Pressure
    Varied assessments
    Active student involvement
    Online Assessments
    OnlineAssessments
    Technology Reduces
    Opportunity
    Timed exams
    Proctors
    Scrambled questions
    Special browsers
    Identity verification
    ProcessesChanges Thinking
    Raise awareness
    Honesty policies
    Opportunity
    Circumstances:
    No one will know
    Rationalization
    Frame of mind:
    Everyone cheats
    5
  • Challenges in Distance Education
    6
    Academic Integrity Student Aid Fraud
  • What’s a Common Cause?
    User ids in distance education are not secure
    “She then went online posing as each student, enrolled in the courses and even did some of the homework. Once a financial-aid check arrived in the mail, minus tuition, a student would pay Halton a cut of the money, authorities said.” http://www.azcentral.com/news/articles/2009/06/24/20090624loanfraud0624-ON.html
    “Another student said a teaching assistant had given his personal username and passwordto a class of students to use during the semester to cheat. Employees also made a habit of sharing such passwords with those who were not explicitly given access by a supervisor.”http://www.brownsvilleherald.com/news/online-100590-utb-employees.html
    "The former assistant coach was clearly assigned academic oversight responsibilities for the men's basketball program. In that capacity, he obtained all of the men's basketball student-athletes' online academic account IDs and passwords at the beginning of each academic year.This enabled him to log on to the institution's Internet system posing as the student-athletes. His access included, but was not limited to, class schedules, unofficial transcript and financial information. Additionally, if a student enrolled in an online course, the ID and password were used to access the course and to participate in required online chats. " http://www.ncaa.org/wps/wcm/connect/f4ebf400411cfa44afe7ff122174eb00/20100120+Georgia+Southern+Infractions+Report.pdf?MOD=AJPERES&CACHEID=f4ebf400411cfa44afe7ff122174eb00
    7
  • Faculty Opinions about Identity
    8
    Kaplan University
    Student Identity Verification and the Higher Education Opportunity Act: A Faculty Perspective
  • New Guidelines
    As result of 2008 HEOA passage, new guidelines from accreditors
    When examinations are employed (paper, online, demonstrations of competency, etc.), they take place in circumstances that include firm student identification. The institution otherwise seeks to assure the integrity of student work.
    If proctoring is used, what are the procedures for selecting proctors, establishing student identity, assuring security of test instruments, administering the examinations, and assuring secure and prompt evaluation?
    If other methods are used to identify those who take the examination, how is identification firmly established? How are the conditions of the examination (security, time limits, etc.) controlled?
    “Interregional Guidelines for Electronically Offered Degree and Certificate Programs”
    Link to all regional accreditor guidelines for distance education http://mikejortberg.blogspot.com/2009/12/regional-accreditor-identity-guidelines.html
    9
  • 10
    New Technology - Hardware
    Hardware and Biometrics: Adds substantial integrity but…
  • 11
    Acxiom Identify-X Challenge Questions
    An on-line real-time identity verification service
    Software as a Service in a secure cloud
    Generates challenge questions and scores responses
    Imbedded in popular LMS
    Institution administration and faculty control
    Which courses, assessments and how many students
    Identify-X strategy governs
    Which challenge questions
    How many questions
    Pass / fail threshold
  • Experiences with Acxiom Challenge Questions
    Sullivan University fall 2009 survey of 85 students
  • Compared to Travelling to a Test Center?
    13
  • 14
    Privacy and FERPA
    Leverages only directory information
    No enrollment process for student data required
    Student releases data during identity verification process
    Recommend reading Privacy booklet before deployment
    Acxiom Opt Out and Privacy Policies
    Consumer Assistance
    Acxiom Privacy Policies
  • 15
    Identify-X Technical Details
    Software as a service identity verification
    No broadband required
    No new database
    No integration to SIS or LMS required
    Connect via pre-built LMS integration for Blackboard, Angel, Moodle, etc.
    Identity software development kit available for developers
    Technical specifications for integration from any application
    Documentation
    Sample C# and Java Code
    Web Service Definition Language (WSDL)
    Development / test environment access
    Identity logo and usage guidelines
    Additional SDKs available for
    FTC red flags (Bad SSNs, phones, fraud indicators)
    Lead quality / scoring, predictive and prescriptive analytics
    Address quality
  • 16
    ProctorU.com Web Proctor
    Web proctor
    Sees the environment
    Talks to students
    Observes the screen
    Not recorded
    Great for expanding test center hours and availability
    Includes
  • 17
    Case Studies
    Student X starts online assessment, fails identity check, scores 100% on exam
    Student loan fraud found via Red Flag analysis of student demographics
    97% pass of students identity verification. Failure notification to institution faculty, dean and president.
    95% of students pass identity verification. One student starts same exam 4 times in 22 minutes.
    “Dead” Student appears on Social Security Death Index
    Larry Duggan, Director of Online Learning at SUNY Finger Lakes
    “I now have an answer to faculty who have asked how can they know who’s taking the online assessment. This level of authentication really does help with overcoming many objections faculty have to online learning"
  • Risk Analysis
    18
  • 19
    Acxiom In Higher Education
    HR: Background Screening: guaranteed savings of 15% off your current provider
    Admissions: Lead scrubbing / modeling to reduce Cost Per Lead vendor costs and better target your audience.
    Institutional Research: Student demographics to understand the behavior and demographics of your leads, students and alumni with amazing insights.
    IT: Identity proofing can cut down help desk calls with secure online password reset. Ensure FERPA compliance for online transcript access. Mainframe, server, network outsourcing.
    Registrar: Implement FTC Red Flag programs to monitor for identity theft by verifying accurate SSN and student mailing addresses
    Business Office: Skip tracing solutions for finding students who owe the institution but have moved and do not provide a forwarding address.
    Alumni/Development: Re-engage with lost alumni or improve donor results with alumni propensity modeling. Measure social media use in your population.
  • 20
    To Learn More
    Calloremail for more information
    Michael.Jortberg@Acxiom.com
    (630)944-0379
    Activateatrialtoevaluatefitforyourprogram
    See www.Blackboard.com/Acxiom or www.Acxiom.com/StudentIdentity
    Researchandcomparesolutions
    Bloghttp://mikejortberg.blogspot.com/
    SeepostonJune19thforcomparisontable
    Join Group
    StudentIdentityVerificationandAcademicIntegrity
    http://www.linkedin.com/e/gis/100235
  • Blackboard Program
    You receive
    Fully operational system at no cost
    Building Block, PowerLink, Angel Nugget
    Annual set of 500 to 2500 transactions (based on student population)
    Best practices and thought leadership on identity in distance education
    Fixed authentication strategy
    Alerts when you get close to empty
    Acxiom
    Introduction to your institution
    Exposure to faculty and administration to our identity solution
    Opportunity to introduce other solutions
    21
  • How to Activate
    22
    Go to www.blackboard.com/acxiom
    • Register
    • Download connector
    Get email from Acxiom
    • Watch presentations
    • Get credentials
    Get ready
    • Install and configure on test server
    • Recruit faculty
    • Select course
    • Notify students
    Go
    • Run the program
    • Analyze reports
    • Survey staff and students