Digital Proctor is a company that provides a solution for authenticating online student identities. Their solution uses typing pattern analysis to uniquely identify students and verify their identity as they complete coursework. It can detect potential cases of outsourcing assignments or entire courses by checking for inconsistencies in a student's typing patterns across assignments. The solution also flags unusual cutting/pasting activity and potential collusion. It provides reporting to faculty and administrators on suspicious activity with data to help them investigate cases further. The solution aims to promote academic integrity while being non-invasive to students and protecting their privacy.
A Real-time Classroom Attendance System Utilizing Viola–Jones for Face Detect...Nischal Lal Shrestha
Abstract
The face of a human is crucial for conveying identity.
Computer scientists, Neuro
scientists, and psychologists, all exploits this human feature using image processing
techniques for commercial, and law enforcement applications. Likewise, this feature
can be invited into classrooms to maintain records of students’ attendance.
Con-
temporary traditional way of recording attendance involves human intervention and
requires cooperation of the students which is hectic and contribute towards waste of
class time.
An automated real-time classroom attendance system detects students
from still image or video frame coming from a digital camera, and marks his/her
attendance by recognizing them.
The system utilizes Viola–Jones object detection
framework which is capable of processing images extremely rapidly with high detec-
tion rates. In the next stage, the detected face in the image is recognized using Local
Binary Patterns Histogram.
Keywords– Computer
vision; face detection; face recognition; feature extraction;
image processing; Local Binary Patterns Histogram; object detection; Viola-Jones
object detection.
A Real-time Classroom Attendance System Utilizing Viola–Jones for Face Detect...Nischal Lal Shrestha
Abstract
The face of a human is crucial for conveying identity.
Computer scientists, Neuro
scientists, and psychologists, all exploits this human feature using image processing
techniques for commercial, and law enforcement applications. Likewise, this feature
can be invited into classrooms to maintain records of students’ attendance.
Con-
temporary traditional way of recording attendance involves human intervention and
requires cooperation of the students which is hectic and contribute towards waste of
class time.
An automated real-time classroom attendance system detects students
from still image or video frame coming from a digital camera, and marks his/her
attendance by recognizing them.
The system utilizes Viola–Jones object detection
framework which is capable of processing images extremely rapidly with high detec-
tion rates. In the next stage, the detected face in the image is recognized using Local
Binary Patterns Histogram.
Keywords– Computer
vision; face detection; face recognition; feature extraction;
image processing; Local Binary Patterns Histogram; object detection; Viola-Jones
object detection.
ANALYZING THE IMPACT OF INTERDEPENDENT DIMENSION ON TARGET ATTRIBUTEJournal For Research
Until today, most lecturers in universities are found still using the conventional methods of taking students attendance either by calling out the student names or by passing around an attendance sheet for students to sign confirming their presence.This project is absolutely on the android-based attendance management system. Android based attendance system provides efficient means of determining eligibility criteria for students to meet examination requirements. [1] The core idea of research project is to implement Android based application for attendance management system for advancement of institution and educational system [2]. This system enables student to learn anywhere, anytime and at their own convenience. This system makes students to be active, responsive while learning their academic. Another application that is provided by this system is smart attendance evaluation and report generation. [2]This makes the work even easier for the lecturers. Also there is a separate module for analyzing the results of the test exams of the students. There is a certain criterion to be met for each and every student to appearing for the test exam. The main objective of this paper is to provide an overview on the data mining techniques that have been used to predict students performance. [3]A certain action can be taken on students not fulfilling the criteria. This process basically aims at improving the overall student performance by taking into consideration student attendance and test marks.
A Proposed Model for a Web-Based Academic Advising SystemEswar Publications
Student advising is an important and time-consuming effort in academic life. Academic advising has been implemented in order to fill the gap between student and the academic routine, by moving advising, complaining, evaluating, suggesting system from the traditional ways to an automated way. The researcher surveyed the existing literature; as utilized that many institutions have implemented computerized solutions in order to enhance their overall advising experience. In this paper the researcher innovates an automated mechanism for
academic advising in the university system. The paper presents an overview of the development and implementation of a new model of e-Academic Advising System as a web-based application. The proposed model attempts to develop a model that the staff and advisor can access to follow-up the student complaints and suggestions. Also, the students who registered can through complain, evaluate & suggest in any subject. Finally, the head of the department can receive a KPIs reports to follow-up his department. Therefore, a need for a
system that could detect student’s problems and provide them with suitable feedback is raised. The aim of this paper is to implement a system which facilitates and assists academic advisors in their efforts to providing quality, accurate and consistent advising services to their students; also, to explore the design and implementation of a computerized tool to facilitate this process. This paper discussed the required methodologies used in the development of the Academic Advising System, it has been shown that Academic Advising is a Process more than a Final Product or system, a technical vision for Academic Advising System has been provided. The e-Academic Advising web-based developed and implemented by "Ruby on Rails" as a Web framework which runs via the
Ruby programming language and "PostgreSQL" as a Database Engine.
Smart application for ams using face recognitioncseij
Attendance Management System (AMS) can be made into smarter way by using face recognition technique, where we use a CCTV camera to be fixed at the entry point of a classroom, which automatically captures the image of the person and checks the observed image with the face database using android enhanced smart phone.
It is typically used for two purposes. Firstly, marking attendance for student by comparing the face images produced recently and secondly, recognition of human who are strange to the environment i.e. an unauthorized person
For verification of image, a newly emerging trend 3D Face Recognition is used which claims to provide more accuracy in matching the image databases and has an ability to recognize a subject at different view angles.
Transforming Education through Disruptive TechnologiesAspire Systems
IT budget cuts post-recession have forced education CIO’s to increase dependence on emerging cost-effective technologies like collaboration platforms, web based applications and the now buzzed Cloud Computing. However, the technology invasion in education is still nascent and various revolutionary concepts, like augmented reality and semantic web, are on the verge of becoming mainstream.
To penetrate beyond the inevitable hype and disruption, this webinar will be looking at the following:
- The best emerging technologies that education software providers should invest in
- Technologies recommended for classroom adoption among educational institutions
- Effects of adopting such disruptive technologies
- Obtaining the best out of established technologies
Face Recognition Based Attendance System using Machine LearningYogeshIJTSRD
In the era of modern technologies emerging at rapid pace there is no reason why a crucial event in education sector such as attendance should be done in the old boring traditional way. Attendance monitoring system will save a lot of time and energy for the both parties teaching staff as well as the students. Attendance will be monitored by the face recognition algorithm by recognizing only the face of the students from the rest of the objects and then marking the students as present. The system will be pre feed with the images of all the students enrolled in the class and with the help of this pre feed data the algorithm will detect the students who are present and match the features with the already saved images of the students in the database. Benazir Begum A | Sreeyuktha R | Haritha M P | Vishnuprasad "Face Recognition Based Attendance System using Machine Learning" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-3 , April 2021, URL: https://www.ijtsrd.com/papers/ijtsrd39856.pdf Paper URL: https://www.ijtsrd.com/engineering/computer-engineering/39856/face-recognition-based-attendance-system-using-machine-learning/benazir-begum-a
ANALYZING THE IMPACT OF INTERDEPENDENT DIMENSION ON TARGET ATTRIBUTEJournal For Research
Until today, most lecturers in universities are found still using the conventional methods of taking students attendance either by calling out the student names or by passing around an attendance sheet for students to sign confirming their presence.This project is absolutely on the android-based attendance management system. Android based attendance system provides efficient means of determining eligibility criteria for students to meet examination requirements. [1] The core idea of research project is to implement Android based application for attendance management system for advancement of institution and educational system [2]. This system enables student to learn anywhere, anytime and at their own convenience. This system makes students to be active, responsive while learning their academic. Another application that is provided by this system is smart attendance evaluation and report generation. [2]This makes the work even easier for the lecturers. Also there is a separate module for analyzing the results of the test exams of the students. There is a certain criterion to be met for each and every student to appearing for the test exam. The main objective of this paper is to provide an overview on the data mining techniques that have been used to predict students performance. [3]A certain action can be taken on students not fulfilling the criteria. This process basically aims at improving the overall student performance by taking into consideration student attendance and test marks.
A Proposed Model for a Web-Based Academic Advising SystemEswar Publications
Student advising is an important and time-consuming effort in academic life. Academic advising has been implemented in order to fill the gap between student and the academic routine, by moving advising, complaining, evaluating, suggesting system from the traditional ways to an automated way. The researcher surveyed the existing literature; as utilized that many institutions have implemented computerized solutions in order to enhance their overall advising experience. In this paper the researcher innovates an automated mechanism for
academic advising in the university system. The paper presents an overview of the development and implementation of a new model of e-Academic Advising System as a web-based application. The proposed model attempts to develop a model that the staff and advisor can access to follow-up the student complaints and suggestions. Also, the students who registered can through complain, evaluate & suggest in any subject. Finally, the head of the department can receive a KPIs reports to follow-up his department. Therefore, a need for a
system that could detect student’s problems and provide them with suitable feedback is raised. The aim of this paper is to implement a system which facilitates and assists academic advisors in their efforts to providing quality, accurate and consistent advising services to their students; also, to explore the design and implementation of a computerized tool to facilitate this process. This paper discussed the required methodologies used in the development of the Academic Advising System, it has been shown that Academic Advising is a Process more than a Final Product or system, a technical vision for Academic Advising System has been provided. The e-Academic Advising web-based developed and implemented by "Ruby on Rails" as a Web framework which runs via the
Ruby programming language and "PostgreSQL" as a Database Engine.
Smart application for ams using face recognitioncseij
Attendance Management System (AMS) can be made into smarter way by using face recognition technique, where we use a CCTV camera to be fixed at the entry point of a classroom, which automatically captures the image of the person and checks the observed image with the face database using android enhanced smart phone.
It is typically used for two purposes. Firstly, marking attendance for student by comparing the face images produced recently and secondly, recognition of human who are strange to the environment i.e. an unauthorized person
For verification of image, a newly emerging trend 3D Face Recognition is used which claims to provide more accuracy in matching the image databases and has an ability to recognize a subject at different view angles.
Transforming Education through Disruptive TechnologiesAspire Systems
IT budget cuts post-recession have forced education CIO’s to increase dependence on emerging cost-effective technologies like collaboration platforms, web based applications and the now buzzed Cloud Computing. However, the technology invasion in education is still nascent and various revolutionary concepts, like augmented reality and semantic web, are on the verge of becoming mainstream.
To penetrate beyond the inevitable hype and disruption, this webinar will be looking at the following:
- The best emerging technologies that education software providers should invest in
- Technologies recommended for classroom adoption among educational institutions
- Effects of adopting such disruptive technologies
- Obtaining the best out of established technologies
Face Recognition Based Attendance System using Machine LearningYogeshIJTSRD
In the era of modern technologies emerging at rapid pace there is no reason why a crucial event in education sector such as attendance should be done in the old boring traditional way. Attendance monitoring system will save a lot of time and energy for the both parties teaching staff as well as the students. Attendance will be monitored by the face recognition algorithm by recognizing only the face of the students from the rest of the objects and then marking the students as present. The system will be pre feed with the images of all the students enrolled in the class and with the help of this pre feed data the algorithm will detect the students who are present and match the features with the already saved images of the students in the database. Benazir Begum A | Sreeyuktha R | Haritha M P | Vishnuprasad "Face Recognition Based Attendance System using Machine Learning" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-3 , April 2021, URL: https://www.ijtsrd.com/papers/ijtsrd39856.pdf Paper URL: https://www.ijtsrd.com/engineering/computer-engineering/39856/face-recognition-based-attendance-system-using-machine-learning/benazir-begum-a
Among the top three reasons why students drop out of higher education is the lack of communication between faculty members and their students. Failure to communicate with students results in lower student retention and student engagement, and higher rates of student dropouts. This presentation gives five humorous examples of various failures to communicate in film.
How Proctoring Technology Will Shape The Future Of Education: Predicting Its ...Tania Arora
Proctoring, a time-honored practice for overseeing examinations, has long been key in ensuring a fair testing environment. EnFuse is leading the proctoring evolution, offering reliable and secure proctoring services for educational institutions. With customizable options and a focus on candidate experience, they are committed to empowering education through innovative proctoring solutions.
Visit here: https://www.enfuse-solutions.com/
What should you expect from your Exam Software?shital deshmukh
Exam software is a collection of tools designed to manage and uncomplicate varied tasks concerning making and conducting exams. Computer-based test management software allows seamless exam authoring (personalized),
Educators Pave the Way for Next Generation of LearnersCognizant
As educational assessments shift to outcome-based learning, providers must adopt new forms of test delivery to increase their global reach and provide ubiquitous services to a new student population.
6 Things to Consider Before Choosing EdTech Solutions for Your InstitutionKavika Roy
Through customized functionality, new educational technology has transformed learning and saved educators' and students' time. It also improves efficiency and, like other technologies, offers convenience.
We've compiled a list of 6 things to think about before choosing EdTech Solutions for your institution.
It’s easy to work on Samagyan School Management Software on your first login without any instructions all you need is the basic knowledge of working on a computer.
Openeducat Features product brochure | Education Software DevelopmentTech Receptives
Based on best of class enterprise level architecture make OpenEduCat ready to use in environments like local infrastructure or a highly scalable cloud environment.
Project Access Control ProposalPurposeThis course project i.docxstilliegeorgiana
Project: Access Control Proposal
Purpose
This course project is intended to assess your ability to comprehend and apply the basic concepts related to information security management, such as the following:
The ability to discern when a risk assessment should be performed and carrying out the task
Understanding user or customer access requirements, whether remote or local
Using a layered security approach to establish and maintain access controls
Working with other departments, such as the human resources department, to identify and implement methods to prevent unwarranted exposure to information by inappropriate personnel
Your ability to execute the tasks within these information security domains and others will be evaluated against the learning objectives as identified and described in previous lessons of instruction for this course. Required Source Information and Tools
Web References: Links to Web references in this Instructor Guide and related materials are subject to change without prior notice. These links were last verified on August 2, 2014.
The following tools and resources will be needed to complete this project:
· Course textbook
· Access to the Internet
· Access to the library
· Text sheet: Integrated Distributors Incorporated (access_project_ts_integrateddistributors)Learning Objectives and Outcomes
Successful completion of this project will ensure that you are capable of supporting the implementation and management of an information systems security framework. To be able to do so, you need to be able to do the following:
Relate how an access control policy framework is used to define authorization and access to an information technology (IT) infrastructure for compliance.
Mitigate risks to an IT infrastructure’s confidentiality, integrity, and availability with sound access controls.
Relate how a data classification standard influences an IT infrastructure’s access control requirements and implementation.
Develop an access control policy framework consisting of best practices for policies, standards, procedures, and guidelines to mitigate unauthorized access.
Define proper security controls within the User Domain to mitigate risks and threats caused by human nature and behavior.
Implement appropriate access controls for information systems within IT infrastructures.
Mitigate risks from unauthorized access to IT systems through proper testing and reporting.Project Checkpoints
The course project has a checkpoint strategy. Checkpoint deliverables allow you to receive valuable feedback on your interim work. In this project, you have four ungraded checkpoint deliverables. (See the syllabus for the schedule.) You may discuss project questions with the instructor, and you should receive feedback from the instructor on previously submitted work. The checkpoint deliverable ensures refinement of the final deliverables, if incorporated effectively. The final deliverable for this project is a professional report and a PowerPoint presenta ...
The new proposed system helps manage the data easily. Members will be able to register and
manage their particulars from anywhere. The proposed system will reduce the response time and
redundancy significantly. The new system reduces the chances of fraud. The system generates bills
every month and sends it to the members. It makes checking schedules for class easy both for the
members and the management. Members will be able to schedule personal classes easily. The new
system makes it easy to inform all the members about important announcements.
Introduction to AI for Nonprofits with Tapp NetworkTechSoup
Dive into the world of AI! Experts Jon Hill and Tareq Monaur will guide you through AI's role in enhancing nonprofit websites and basic marketing strategies, making it easy to understand and apply.
Acetabularia Information For Class 9 .docxvaibhavrinwa19
Acetabularia acetabulum is a single-celled green alga that in its vegetative state is morphologically differentiated into a basal rhizoid and an axially elongated stalk, which bears whorls of branching hairs. The single diploid nucleus resides in the rhizoid.
Operation “Blue Star” is the only event in the history of Independent India where the state went into war with its own people. Even after about 40 years it is not clear if it was culmination of states anger over people of the region, a political game of power or start of dictatorial chapter in the democratic setup.
The people of Punjab felt alienated from main stream due to denial of their just demands during a long democratic struggle since independence. As it happen all over the word, it led to militant struggle with great loss of lives of military, police and civilian personnel. Killing of Indira Gandhi and massacre of innocent Sikhs in Delhi and other India cities was also associated with this movement.
The French Revolution, which began in 1789, was a period of radical social and political upheaval in France. It marked the decline of absolute monarchies, the rise of secular and democratic republics, and the eventual rise of Napoleon Bonaparte. This revolutionary period is crucial in understanding the transition from feudalism to modernity in Europe.
For more information, visit-www.vavaclasses.com
A Strategic Approach: GenAI in EducationPeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
Unit 8 - Information and Communication Technology (Paper I).pdfThiyagu K
This slides describes the basic concepts of ICT, basics of Email, Emerging Technology and Digital Initiatives in Education. This presentations aligns with the UGC Paper I syllabus.
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdfTechSoup
In this webinar you will learn how your organization can access TechSoup's wide variety of product discount and donation programs. From hardware to software, we'll give you a tour of the tools available to help your nonprofit with productivity, collaboration, financial management, donor tracking, security, and more.
2024.06.01 Introducing a competency framework for languag learning materials ...Sandy Millin
http://sandymillin.wordpress.com/iateflwebinar2024
Published classroom materials form the basis of syllabuses, drive teacher professional development, and have a potentially huge influence on learners, teachers and education systems. All teachers also create their own materials, whether a few sentences on a blackboard, a highly-structured fully-realised online course, or anything in between. Despite this, the knowledge and skills needed to create effective language learning materials are rarely part of teacher training, and are mostly learnt by trial and error.
Knowledge and skills frameworks, generally called competency frameworks, for ELT teachers, trainers and managers have existed for a few years now. However, until I created one for my MA dissertation, there wasn’t one drawing together what we need to know and do to be able to effectively produce language learning materials.
This webinar will introduce you to my framework, highlighting the key competencies I identified from my research. It will also show how anybody involved in language teaching (any language, not just English!), teacher training, managing schools or developing language learning materials can benefit from using the framework.
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...Levi Shapiro
Letter from the Congress of the United States regarding Anti-Semitism sent June 3rd to MIT President Sally Kornbluth, MIT Corp Chair, Mark Gorenberg
Dear Dr. Kornbluth and Mr. Gorenberg,
The US House of Representatives is deeply concerned by ongoing and pervasive acts of antisemitic
harassment and intimidation at the Massachusetts Institute of Technology (MIT). Failing to act decisively to ensure a safe learning environment for all students would be a grave dereliction of your responsibilities as President of MIT and Chair of the MIT Corporation.
This Congress will not stand idly by and allow an environment hostile to Jewish students to persist. The House believes that your institution is in violation of Title VI of the Civil Rights Act, and the inability or
unwillingness to rectify this violation through action requires accountability.
Postsecondary education is a unique opportunity for students to learn and have their ideas and beliefs challenged. However, universities receiving hundreds of millions of federal funds annually have denied
students that opportunity and have been hijacked to become venues for the promotion of terrorism, antisemitic harassment and intimidation, unlawful encampments, and in some cases, assaults and riots.
The House of Representatives will not countenance the use of federal funds to indoctrinate students into hateful, antisemitic, anti-American supporters of terrorism. Investigations into campus antisemitism by the Committee on Education and the Workforce and the Committee on Ways and Means have been expanded into a Congress-wide probe across all relevant jurisdictions to address this national crisis. The undersigned Committees will conduct oversight into the use of federal funds at MIT and its learning environment under authorities granted to each Committee.
• The Committee on Education and the Workforce has been investigating your institution since December 7, 2023. The Committee has broad jurisdiction over postsecondary education, including its compliance with Title VI of the Civil Rights Act, campus safety concerns over disruptions to the learning environment, and the awarding of federal student aid under the Higher Education Act.
• The Committee on Oversight and Accountability is investigating the sources of funding and other support flowing to groups espousing pro-Hamas propaganda and engaged in antisemitic harassment and intimidation of students. The Committee on Oversight and Accountability is the principal oversight committee of the US House of Representatives and has broad authority to investigate “any matter” at “any time” under House Rule X.
• The Committee on Ways and Means has been investigating several universities since November 15, 2023, when the Committee held a hearing entitled From Ivory Towers to Dark Corners: Investigating the Nexus Between Antisemitism, Tax-Exempt Universities, and Terror Financing. The Committee followed the hearing with letters to those institutions on January 10, 202
3. Client Objectives
Detailed market and client analysis has yielded the following objectives as indicated by institutions,
without limitation, when implementing a solution for student identity verification purposes:
• Institutions would want a solution for authenticating the identity of students who register for
and participate in online courses and programs
• Institutions would want a solution to enhance their current single sign on architecture through
true multi-factor authentication
• Institutions would want a solution that is committed to protecting the privacy of students and
the security of their personal data.
• Institutions would want a solution that students would not perceive as intrusive or privacy
insensitive
• Institutions would want a solution that is able to serve a global student base
• Institutions would want a solution that is cost-effective and would allow for unlimited use with
respect to each student
• Institutions would want a solution that requires minimal if any time for students to set up or
upgrade
• Institutions would want a solution that does not exceed the system requirements of their LMS
• Institutions would want a solution that allows for potential authentications at any time of the
day or night
• Institutions would want a solution that is robust to accommodates students with slow speed
internet connections
• Institutions would want a solution that accommodates students using multiple computers from
different locations
• Institutions would want a solution that features a robust and intuitive reporting infrastructure
with varying levels of privileged access
• Institutions would want a solution that integrates with the learning management system and
potentially other University systems
• Institutions would want a solution that minimizes the need for technical support.
• Institutions would want a solution that would accommodate a minimum need for training or
orientation.
• Institutions would want a solution that maintains the highest security standards for
administrative, technical, and physical safeguards to protect the security, confidentiality, and
integrity of the University’s confidential information
3|Page
4. Key Challenges
Institutions are currently looking out for a solution, which should meet the following challenges faced by
them:
Stronger mechanisms for student identity verification
Systematic and centralized approach to academic integrity
Reduction of exposure to risk
Digital Proctor has appraised itself of the above challenges and is offering a solution delineated in the
following pages. The solution addresses the above challenges and brings about enhanced institutional
experience with regards to student identity verification.
4|Page
5. Digital Proctor Solution
Overview
Digital Proctor has developed a powerful set of technologies designed to prevent and detect cheating in
online education.
Digital Proctor provides an unprecedented view into the online learning environment. We implement a
transparent authentication solution that analyzes student behavior invisibly in the background. As a
byproduct of students’ normal interactions with their assignments, we are able to create an individual
identity profile for each student using multiple data points, including our groundbreaking typing
recognition system. Our software verifies student identities, reports atypical cut/copy/paste usage,
detects collusion, and gives faculty members a set of intelligent questions that they can ask students to
confirm or discount any suspicious activity.
We are able to identify students by the unique way that they type on their keyboard while interacting
within the learning management system. Throughout all course activity for a particular student, we
check his/her typing patterns for consistency and can identify if a particular assignment has been
outsourced. That is, if a student has enlisted a friend or paid someone to complete an assignment for
them. Our reporting interface is further capable of detecting if an entire course has been outsourced.
With our software, the identification (authentication) of students is intrinsically bound with the
completion of assignments. The students interact normally within the learning management system,
and as a byproduct of this interaction, we can uniquely identify them.
If the typing pattern is inconsistent and it appears that the student has in fact outsourced an
assignment, the adminstrators, faculty, and staff members have access to a comprehensive reporting
interface which incorporates a robust set of data points around the suspicious assignment or course.
From this data, the faculty member can ask intelligent questions and investigate the suspicious activity.
This affords the faculty member a light touch, non accusatory way to open a dialogue with the student
and confirm or deny the suspicious activity.
In addition to preventing outsourcing through student identity verification, our product also provides
faculty with insight into unusual cut/copy/pasting activity that a student is executing within the learning
management system. Our reporting interface also highlights cases of blatant collusion, that is, when
students are working on particular assignments together (when they should not be).
Our most recent feature is a commenting system that allows administrators, faculty, and staff to make
notes on particular students within the reporting interface.
Digital Proctor takes the privacy of our clients and their students extremely seriously. It is important to
understand that we do not collect what a student types, and are not classified as keylogging software.
In fact, the order of the keys that a student types are scrambled and unable to be reconstructed before
they are sent to our server for analysis. Further, all data sent to and from our servers is protected by
256-bit encryption and our reporting interface resides on an HTTPS server.
5|Page
6. The primary objective of our product is to stop the most blatant forms of cheating (ie outsourcing
assignments, pasting answers from the web, working together on assignments) with the least amount of
invasion. Students already give off unique identifiers as they complete coursework. Digital Proctor
analyzes these identifiers, checks them for consistency, and packages them in an intelligible and, if
needed, an actionable format for the faculty members and administration.
6|Page
7. Product Description
Digital Proctor provides a complete solution for student identity verification, that is, credible verification
that a student who registers for a course is the same student who completes the course and receives
credit. The design of the student authentication solution affords an additional layer of functionality.
That is, an electronic proctoring tool, specifically capable of capturing instances of collusion and atypical
cut/copy/paste activity.
Because the solution is fully hosted, students and faculty are not required to download or install
anything and the solution transfers from computer to computer, accounting for the mobility of the
modern student.
The solution begins when a student logs in, running transparently and non-confrontationally in the
background. Throughout a student’s activity, the solution collects several data points including: typing
pattern samples, location information, browser characteristics, software environment, date and time,
and then maps all of this information to a particular assignment or activity for the duration of the
student’s course(s).
This data is then packaged and sent to our server for analysis. If the typing pattern analysis for a student
yields consistent results, the student is successfully authenticated and receives a passing check mark. If
the typing pattern for a student is inconsistent, a probability calculation considers the likelihood that the
student outsourced an assignment or course, and then a student receives either a passing check mark or
is flagged with an “x” indicating that suspicious activity has been detected.
This data culminates in an intuitive reporting user interface that is continuously accessible to
administrators and faculty. If a student is flagged for suspicious activity, the administrator or faculty
member can access the assignment or course history of the student, find out what specifically we
flagged as suspicious, and then investigate the situation appropriately. Equipped with multiple data
points and information around the suspicious activity, the faculty member or administrator can make an
intelligent inquiry to the student and properly investigate the assignment(s) or course(s). A best
practices guideline outlines the recommended course of action, but of course, the institution will
ultimately decide this.
7|Page
8. Electronic Proctoring Functionality
In addition to the student identity verification, some institutions have expressed an interest in additional
electronic proctoring tools to further strengthen academic integrity. The two primary tools packaged into our
product in addition to student identity verification are the cut/copy/paste detection tool and the collusion
discovery tool.
The electronic proctoring solutions are capable of detecting instances of suspected collusion and
atypical cut/copy/paste activity (CCPA).
Detecting suspected collusion is accomplished through a creative combination and filtering process of
the existing data points that we collect for our student authentication solution.
CCPA is an added functionality that allows us to capture the amount of this activity for any given
assignment, and then determines what exactly was pasted so that the faculty member or administrator
can determine whether or not the paste was a legitimate action.
8|Page
9. Software Updates
Updates occur seamlessly for the end-user, because all updates occur on the server side. End-users are
not required to implement an update.
A later version of our software would deploy seamlessly for the end-user with no implications.
9|Page
10. Administrator, Faculty, and Staff Training
Students do not need to be trained how to use our solution, as we are only interested in what students
are already doing naturally. Administrators, faculty, and staff members receive training sessions, made
available at a frequency determined by the institution, on how to navigate and interpret the data in the
reporting user interface. Depending on the institutions preference, these training sessions can be given
on-site or remotely via webinars. Typically, each instituion receieves two access periods to review a
recorded webinar, which is followed up by a live webinar in which a representative from Digital Proctor
answers any remaining questions.
10 | P a g e
11. True Multi-factor Authentication
Digital Proctor provides true multi factor authentication in strict accordance with the Federal Financial
Institutions Examination Council’s (FFIEC) conclusion that, “By definition true multifactor authentication
requires the use of solutions from two or more of the three categories of factors. Using multiple
solutions from the same category at different points in the process may be part of a layered security or
other compensating control approach, but it would not constitute multifactor authentication." The
categories of factors including:
• Something the user knows (e.g., password, PIN);
• Something the user has (e.g., ATM card, smart card); and
• Something the user is (e.g., biometric characteristic, such as a unique typing pattern).
Digital Proctor leverages each category to provide true multi factor authentication. Specifically:
Something the user knows
Utilizes the secure login/password combinations currently issued by the client through its SSO
architecture.
Something the user has – Including:
A particular browser environment identifiable by cookie files, height and width characteristics, and other
metadata such as the particular version of the browser.
A particular location where assignments are completed.
A particular software environment.
A particular schedule when assignments are completed identifiable by date and time of activity
The client can opt in to all or none of these particular data collection points.
Something the user is
Analyzes students’ unique typing patterns, an established behavioral biometric, as they interact within
the learning environment. Checks each student’s typing pattern for consistency, ensuring all
assignments are completed by the same student.
11 | P a g e
12. Data Collection and Student Privacy
All data to and from our server is protected by 256 bit encryption.
All analyses of students is conducted blindly, without using their names. For our typing pattern analysis,
we do not collect the order of keystrokes that students enter into the learning management system. In
order to obtain a biometric watermark of students' typing patterns, we only need timing measurements.
This allows us to scramble the order of keys into an unreconstructable order before they are even sent
to our server for analysis. In this manner, the solution is legally not classified as a keylogger according to
DLA Piper’s professional opinion.
Additional data points that are optionally collected include: IP address, browser characteristics, software
environment, time of activity, and data that is cut, copied, and/or pasted into the learning management
system.
The institution owns the data collected on students, but there are restrictions due to FERPA. For more
information about FERPA, please see section 6.3 in the Digital Proctor Software License and Hosting
Agreement.
12 | P a g e
13. Multiple Computers
Because the solution is fully hosted, it is transferable from computer to computer without any need for
a download or installation.
A student using a different keyboard will exhibit a slightly different typing pattern from time to time;
however, we automatically detect if a student is using a different keyboard and take this into account to
limit false positives resulting from different keyboard use. But even more importantly, while a student
may exhibit a slightly different typing pattern from one keyboard to the next, the difference between
these samples is still far less than the typing pattern of another student. Therefore, we can verify
student identity across multiple computers.
13 | P a g e
14. Reporting
Administrators, faculty, and staff can access reports at any time through our reporting user interface.
Access privileges are currently designed to give faculty members access to their specific courses only
and administrators access to all courses. Currently, students do not have access to the reporting user
interface.
Primary indicators of suspicious behavior:
The detection of more than one distinct typing pattern under a single student account
The same typing distinct typing pattern across more than one account
Secondary indicators of suspicious behavior:
Different location detected for “higher stakes” assignments
Different time of activity for “higher stakes” assignments
Different browser characteristics for “higher stakes” assignments
Different software environment for “higher stakes” assignments
Reporting capabilities include:
• Failure to match one student authenticating at time of registration with attempt during the
semester
• Failure to match one student authenticating at multiple points during semester across
multiple courses
• Failure to match one student authenticating in two different semesters
• Matches between two or more “different” students in a given semester or across semesters
• Failure to match one student authenticating at multiple points in a given semester in a
single course as well as across multiple courses
• Detecting one student posing as one or more other students (exhibiting the same profile for
authentication)
• High level statistical reporting for administrators
• Identify only the top x% of suspicious students
14 | P a g e
15. Approach to Providing the Scope of Services
Implementation Methodology
The solution has three main components:
The first component is installed on or alongside the learning management system. This collects typing
data and other unique characteristics of students' activities while they are registering and completing
assignments at an institution. It is important to emphasize that the privacy of students is assured: 1)
Typing data is randomized before being sent to us so we cannot see what a student types, only how they
type it; 2) all data is sent over secure SSL (which is the same security used by banking websites); and 3)
typing data is signed using a 256-bit encryption scheme (this is the highest level of security of the
options the US government recommends using) to assure it genuinely comes from the right student.
Another key aspect of this component is that it is very light weight. It runs seamlessly in the background
on a user's computer. Not one student at the schools we have serviced has complained about this
software. Also, the total amount of data sent from a user's computer is only a few kilobytes per
minute. Historically, the installation process for this component has taken about fifteen minutes of
system administrator’s time, plus another thirty minutes of us providing background information and
testing.
The second component is the server on our end that receives the data sent from students. This server is
amazingly stable. Last semester (Spring 2011), there were no crashes or unscheduled downtime. There
was only one fifteen minute period of scheduled maintenance, and that occurred at 1am on a weekend,
when activity was at its lowest. It is important to note that, in the extremely unlikely event that our
collection servers go down, students would still be able to complete assignments as normal. There is no
negative impact except the assignments students complete during that time would not be verified.
The third component is our web user interface. This analyzes, organizes, and displays a wealth of
information about student activity. Faculty members are able to see activity from their courses, and
administrators can see all the activity at their institution. There are pages to narrow in by a course, by
an assignment, by a student, and more. Each page is intuitive but also contains embedded help
dialogues.
15 | P a g e
16. False Positives
Solutions that involve biometrics are susceptible to type I (false positives) and type II errors (false
negatives).
First, we want to clarify terminology to ensure an accurate response. Digital proctor adopts the
following standard definitions of type I and type II errors and their implications:
In biometrics, the null hypothesis is that the input does identify someone in the searched list of people.
For this solution specifically, the null hypothesis is that the input (authentication) of a student matches
the previous input of the same student. Again, the null hypothesis is that the student authenticating is
the same student who registered for the course.
Type I error (false positive) – The error of rejecting the null hypothesis when it should not have been. In
the context of student authentication, a type I error occurs when the biometric system fails to
authenticate the student when it should have authenticated the student. That is, a false positive would
indicate the honest student is not completing their own work, when in fact they were completing their
own work.
Type II error (false negative) – The error of failing to reject the null hypothesis when it is in fact not true.
In the context of student authentication, a type II error occurs when the biometric system authenticates
the student when it should have failed to authenticate a student. That is, a false negative would
indicate that a dishonest student, who is outsourcing their assignment(s), was completing their own
work, when in fact they were not completing their own work.
Inherent to biometric systems is the correlation between type I and type II errors. Our statistical system
is designed to keep the number of false positives to an absolute minimum, even at the cost of allowing a
small number of false negatives dishonest students to go unnoticed. Digital Proctor’s philosophy is that
it is far worse to falsely accuse an honest student than to let a dishonest student go through undetected.
In combination with the biometric component of our solution, we have implemented a human
intelligence based component that serves to further reduce the number of false positives that our
system might reveal. This component looks at the “stakes” of an assignment after we have detected a
different typing pattern and calculates the likelihood, using a number of different methods, that the
student would have outsourced that particular assignment.
Further, the best practices guidelines that we encourage institutions to follow encourages investigating
instances of suspicious activity using a non accusatory, data oriented line of questioning as opposed to a
quick pass or fail judgment. A dishonest student who is confronted over suspicious activity using our
recommended method will most likely cease all future suspicious activity and/or admit to some form of
deviance. Knowing that someone is looking over their shoulder, will be a compelling force to keep
students honest. If an honest student is confronted, they should easily be able to account for any
suspicious activity and deny any claims to the contrary without hesitation.
16 | P a g e
17. Special/Unique Qualifications
Digital Proctor embodies the ideal synergy of technical talent and client relations.
The technical team is led by Andrew Mills, who in addition to his striking technical background and
accomplishments, is a clear communicator and works excellent in team environments.
Client relationships are managed by Shaun Sims, who works ceaselessly to make sure client expectations
are promptly met and exceeded. Shaun leverages his carefully cultivated network of leaders in the
space to stay ahead of the current issues facing higher education and sets internal policies that keep
Digital Proctor in line with industry best practices.
The size and organizational structure of Digital Proctor allows us to respond quickly to customer
requests without delay. Digital Proctor has access to one of the country’s most accomplished talent
pools in Austin, Texas, including relationships with premium employers and sources of capital to help us
grow securely and source customer requests as needed.
Digital Proctor has been recognized for the following awards:
DFJ-Cisco Global Business Plan Competition Finalist
1st Place Milken-Penn GSE Competition '10
1st Place UT Idea to Product '10
2nd Place Texas Moot Corp '10
McGinnis Venture Competition Semi-Finalist '10
Selection DLA Venture Pipeline
Digital Proctor is also represented by one of the world’s largest international and most respected law
firms, DLA Piper.
17 | P a g e