The document proposes digital forensic readiness techniques to counter online exam fraud. It discusses how students commonly cheat in online exams, such as accessing online content, screen sharing, opening new tabs, and inspecting HTML code. It then proposes 11 digital forensic readiness techniques that could be used to gather evidence in these situations, such as recording PC activity, using keylogging, monitoring typing patterns, deploying security cameras, logging browser activity, recording mouse activity, recording programmable device data, using webcams to verify student identity, employing biometric identification, and performing continuous authentication. The techniques were evaluated based on implementation difficulty, cost, and efficiency.
Securing Online Testing with Biometric Signature ID - Colorado Ignite 2014D2L Barry
The document discusses using biometric signature-ID (BSI) technology to secure online testing and verify student identity. It summarizes the background of current testing security issues like cheating services and plagiarism. Options to establish trust in online testing include proctored exams, best practices like randomized questions, and technological solutions. The BSI process captures biometrics like keystrokes to authenticate students. Pilots showed it worked well with no extra cost or technology for students. The technology can analyze authentication events over time and generate reports on suspicious activity.
THE PROPOSED IMPLEMENTATION OF RFID BASED ATTENDANCE SYSTEM ijseajournal
Recent trends in Information and Communication Technology (ICT) embrace several smartphone applications in a variety of educational and industrial domains in the last several years. This research focuses to solve one of the promising problems of an educational domain to take attendance smartly using the Radio Frequency Identification (RFID) system. Current attendance system in King Abdul-Aziz University (KAU) Saudi Arabia is partly solving the attendance problem. There are several problems in the existing attendance systems such as time-consuming, the chance of mistakes, truancy issues, no contact with parent/guardian and not efficient because of roll call as taking manual attendance. The proposed RFID based attendance system will provide robust, secure and automatic attendance. The proposed system will use modern technology and support to institutions and parents to deal with most of the problems of existing attendance systems. There are several other benefits of RFID based system such as web-based and mobile interfaces, daily absent report, an automatic SMS alert to parent/guardian, reduce administrative work, improve the ratio of attendance, economical and highly efficient. The case study method will be used as a research design. The proposed system is developed and tested in KAU Saudi Arabia. The proposed system will have both web and mobile interfaces. The web interface will need the Internet to access the proposed system and the mobile interface will use the Android platform for the testing scenarios. The user will access the system to generate customized reports to review the status of students for a particular course. It is anticipated that the proposed system will significantly improve students’ monitoring mechanisms hence enabling both parents and teachers in making appropriate decisions.
This is a North Central University PowerPoint presentation (EDR 8204-3). It is written in APA format, has been graded by an instructor(A), and includes references. Most education communities submit assignments to turnitin, so remember to paraphrase.
Pact Analysis Report for a Student Attendance SystemUpekha Vandebona
This document contains a PACT (People, Activities, Context, Technology) analysis for a proposed student attendance system at a university. It identifies the key stakeholders as students, lecturers, administration staff, and oversight boards. The main activities are capturing student attendance at lectures, confirming attendance by lecturers, backing up the data, and later monitoring attendance patterns. The system must consider the physical, social, and organizational contexts of capturing attendance efficiently and accurately indoors without disturbing others. Fingerprint authentication is identified as an ideal technological solution due to its accuracy, ease of use, and ability to prevent impersonation, though it has a higher cost compared to other options like signature verification.
Designing a Survey Study to Measure the Diversity of Digital Learners IJITE
This article describes the design of a quantitative study that aims to gather empirical data on the different
types of digital learners in a student population, inclusive of the elusive digital natives who purportedly
exist in settings laden with digital technology. The design of this study revolves on the impetus in mapping
the diversity of digital learners, followed by elucidations on the research design and methods that are to be
employed, its accompanying data analysis, ethical considerations and an elaboration of the measures that
are taken in ensuring validity and reliability.
INVESTIGATION A NEW APPROACH TO DETECT AND TRACK FRAUD IN VIRTUAL LEARNING EN...ijmnct
Virtual University is the environment that with utilizes the appropriate multimedia tools and having good communication infrastructure is a provider of e-learning services, so that usually does not have require to physical location as a traditional university and students are able in any place and at any time be willing to use a lot of services provided, such as e-courses or electronic tests. There are many solutions in order to identify and detect fraud in the online environment that use of these methods can be identified took place fraud, but still is great importance of avoid discussion and fraud detection in virtual university. In this research, we aimed are to investigate a new approach to detect and track fraud in virtual learning
environments by using decision tree. (Chayd model). The results showed that the accuracy of the model is 84.54% which is indicative of high performance and high precision in predicting fraud from the teachers, students and hackers.
Investigation of new approach to detect and track fraud in virtual learningijmnct
Virtual University is the environment that with utilizes the appropriate multimedia tools and having good communication infrastructure is a provider of e-learning services, so that usually does not have require to physical location as a traditional university and students are able in any place and at any time be willing to use a lot of services provided, such as e-courses or electronic tests. There are many solutions in order to identify and detect fraud in the online environment that use of these methods can be identified took place fraud, but still is great importance of avoid discussion and fraud detection in virtual university. In this research, we aimed are to investigate a new approach to detect and track fraud in virtual learning environments by using decision tree. (Chayd model). The results showed that the accuracy of the model is 84.54% which is indicative of high performance and high precision in predicting fraud from the teachers, students and hackers.
Securing Online Testing with Biometric Signature ID - Colorado Ignite 2014D2L Barry
The document discusses using biometric signature-ID (BSI) technology to secure online testing and verify student identity. It summarizes the background of current testing security issues like cheating services and plagiarism. Options to establish trust in online testing include proctored exams, best practices like randomized questions, and technological solutions. The BSI process captures biometrics like keystrokes to authenticate students. Pilots showed it worked well with no extra cost or technology for students. The technology can analyze authentication events over time and generate reports on suspicious activity.
THE PROPOSED IMPLEMENTATION OF RFID BASED ATTENDANCE SYSTEM ijseajournal
Recent trends in Information and Communication Technology (ICT) embrace several smartphone applications in a variety of educational and industrial domains in the last several years. This research focuses to solve one of the promising problems of an educational domain to take attendance smartly using the Radio Frequency Identification (RFID) system. Current attendance system in King Abdul-Aziz University (KAU) Saudi Arabia is partly solving the attendance problem. There are several problems in the existing attendance systems such as time-consuming, the chance of mistakes, truancy issues, no contact with parent/guardian and not efficient because of roll call as taking manual attendance. The proposed RFID based attendance system will provide robust, secure and automatic attendance. The proposed system will use modern technology and support to institutions and parents to deal with most of the problems of existing attendance systems. There are several other benefits of RFID based system such as web-based and mobile interfaces, daily absent report, an automatic SMS alert to parent/guardian, reduce administrative work, improve the ratio of attendance, economical and highly efficient. The case study method will be used as a research design. The proposed system is developed and tested in KAU Saudi Arabia. The proposed system will have both web and mobile interfaces. The web interface will need the Internet to access the proposed system and the mobile interface will use the Android platform for the testing scenarios. The user will access the system to generate customized reports to review the status of students for a particular course. It is anticipated that the proposed system will significantly improve students’ monitoring mechanisms hence enabling both parents and teachers in making appropriate decisions.
This is a North Central University PowerPoint presentation (EDR 8204-3). It is written in APA format, has been graded by an instructor(A), and includes references. Most education communities submit assignments to turnitin, so remember to paraphrase.
Pact Analysis Report for a Student Attendance SystemUpekha Vandebona
This document contains a PACT (People, Activities, Context, Technology) analysis for a proposed student attendance system at a university. It identifies the key stakeholders as students, lecturers, administration staff, and oversight boards. The main activities are capturing student attendance at lectures, confirming attendance by lecturers, backing up the data, and later monitoring attendance patterns. The system must consider the physical, social, and organizational contexts of capturing attendance efficiently and accurately indoors without disturbing others. Fingerprint authentication is identified as an ideal technological solution due to its accuracy, ease of use, and ability to prevent impersonation, though it has a higher cost compared to other options like signature verification.
Designing a Survey Study to Measure the Diversity of Digital Learners IJITE
This article describes the design of a quantitative study that aims to gather empirical data on the different
types of digital learners in a student population, inclusive of the elusive digital natives who purportedly
exist in settings laden with digital technology. The design of this study revolves on the impetus in mapping
the diversity of digital learners, followed by elucidations on the research design and methods that are to be
employed, its accompanying data analysis, ethical considerations and an elaboration of the measures that
are taken in ensuring validity and reliability.
INVESTIGATION A NEW APPROACH TO DETECT AND TRACK FRAUD IN VIRTUAL LEARNING EN...ijmnct
Virtual University is the environment that with utilizes the appropriate multimedia tools and having good communication infrastructure is a provider of e-learning services, so that usually does not have require to physical location as a traditional university and students are able in any place and at any time be willing to use a lot of services provided, such as e-courses or electronic tests. There are many solutions in order to identify and detect fraud in the online environment that use of these methods can be identified took place fraud, but still is great importance of avoid discussion and fraud detection in virtual university. In this research, we aimed are to investigate a new approach to detect and track fraud in virtual learning
environments by using decision tree. (Chayd model). The results showed that the accuracy of the model is 84.54% which is indicative of high performance and high precision in predicting fraud from the teachers, students and hackers.
Investigation of new approach to detect and track fraud in virtual learningijmnct
Virtual University is the environment that with utilizes the appropriate multimedia tools and having good communication infrastructure is a provider of e-learning services, so that usually does not have require to physical location as a traditional university and students are able in any place and at any time be willing to use a lot of services provided, such as e-courses or electronic tests. There are many solutions in order to identify and detect fraud in the online environment that use of these methods can be identified took place fraud, but still is great importance of avoid discussion and fraud detection in virtual university. In this research, we aimed are to investigate a new approach to detect and track fraud in virtual learning environments by using decision tree. (Chayd model). The results showed that the accuracy of the model is 84.54% which is indicative of high performance and high precision in predicting fraud from the teachers, students and hackers.
Under the Higher Education Opportunity Act (HEOA), universities are required by July 1, 2010 to compile a written plan on how they will educate students on the dangers of file sharing and which procedures are in place to effectively combat illegal file sharing.
In preparation for the HEOA implementation and to more effectively educate the UNC community about the issues of copyright law and file sharing, the Information Security Office designed an online course combined with a follow-up survey. Come learn about UNC’s new online copyright education course.
TAMEx framework as an alternative for e-exam implementation in wireless networkTELKOMNIKA JOURNAL
One of significant change in learning process is exam implementation applying a computer-based test (e-exam) rather than paper-based test. Many institutions currently use wireless network with bring your own device (BYOD) policy for their e-exam implementation, due to limitation of space and user terminals. Moreover it is hard to maintain the availability of reliable signal quality in wireless network for all users during e-exam process. Therefore, this research proposes a development of time adaptive for mobile exam (TAMEx) framework to provide all users with good quality of service of e-exam in wireless network environment when dealing with signal quality variations. The received signal strength indication (RSSI) is the main indicator of the signal quality. The framework supports e-exam implementation in wirelesslocal area network and the use of BYOD mechanism. The research shows that the framework successfully has provided time compensation for the users who experienced temporary connection loss due to bad signal quality. The result exhibits that tiny processing time has been needed for signal loss detection, user’s request of compensation time, and server’s execution. In conclusion, the TAMEx could guarantee good services for all users who doing e-exam in wireless network environment.
Towards well being in digital media educationdebbieholley1
The document summarizes the work of the Safety and Well-being Working Group in revising the DigComp 2.2 framework to better address digital well-being. Some of their key successes in the revision included adding knowledge, skills, and attitudes around healthy digital balance, addictive behaviors, screen time guidelines, and risks to vulnerable groups. However, some of their suggested additions around the differing impacts of media on children versus adults, a broader concept of well-being, and specific digital risks did not make it into the current revision. The group concluded that digital well-being may need its own component rather than remaining a sub-component for a future revision in order to adequately address the topic.
This document discusses how information technology impacts academics and students. It outlines how IT enables more convenient data storage and transmission, enhancing learning through greater access to information. While IT provides benefits like easier research, it can also enable distractions and plagiarism if misused. The document also examines how IT is changing higher education through innovations like MOOCs, e-books, and online communication between schools and homes, noting both opportunities and challenges. Research is also impacted, with IT allowing more data-driven analysis and global collaboration, influencing over 40% of research according to one graph. Overall, the document suggests that while IT is a valuable tool, its use must be properly understood to reap benefits and avoid negative impacts.
Brief report problems associated with the use of e-learning system and poten...Bhzad Sidawi
The document summarizes a study on the problems with using an e-learning system at a university in Saudi Arabia and potential solutions. The study found that architecture students at the university were reluctant to use the e-learning system and relied more on other online resources. Issues identified included a lack of student experience with the system, insufficient IT support and infrastructure, and that the system did not adequately support students' design projects and innovation. Recommendations focused on improving student and faculty training, the IT infrastructure, and customizing the e-learning tools and resources to better meet the needs of architectural education and design.
This document summarizes a study that investigated acceptance of mobile internet use among financial professionals in Honolulu. The study used a survey to examine how intention to use, perceived usefulness, ease of use, attitude, accessibility, support, security, interface and control impacted acceptance. It found the Technology Acceptance Model and these factors provided a viable way to predict mobile internet adoption. Attitude towards use had the strongest correlation with perceived usefulness and perceived user control.
We present a novel application of advanced logic-based business rules (Rulelog) and natural language processing (Textual Logic): to automatically generate detailed explanations for business decision making and education. Business users need to deeply understand the critical knowledge that underlies organizational decisions. Students at all levels want to understand the "why" not just the "what", and benefit from automated support for developing higher cognitive and critical thinking skills. Our approach is domain-neutral, and its generated explanations are interactively navigable. We give two case studies:
· Regulations & policies in financial compliance. A key challenge in compliance is the ever-growing amount and complexity of regulations & policies. Our approach aids compliance professionals to interpret the results of automated decision support systems and to contribute more rapidly and effectively to evolving the implemented business rules that underlie those systems.
· Review and test prep in college-level science. A key challenge in education is the high cost of personalizing the learning experience. Our approach reduces that cost, deepens the learning experience, and empowers the student.
San José State University implemented a five-year technological upgrade plan to promote an "anytime, anywhere" learning experience for students. The chief information officer assessed the university's needs and developed a vision for seamlessly blending technology and education. The strategy included upgrading the wireless network from 700 to 2,500 access points, installing video conferencing in classrooms, and providing unified communications for employees. The project aims to transform the university's technology infrastructure and learning environment by 2017 through innovations like wireless access across campus, virtual computer labs, and lecture capture archives.
The document discusses improving the real-time supply of information to students at a university. It proposes sending text message notifications to students when new grades are available or when class schedules change. This could increase student awareness and participation. The implementation plan considers developing this internally or using an external third-party solution. A case study describes how one university implemented a similar notification system using their own application integrated with Blackboard and a third-party SMS provider. They found it worked well and benefited both students and staff.
This document describes cybersecurity projects undertaken by undergraduate students at Wentworth Institute of Technology as part of senior design courses in electrical and computer engineering. It discusses the types of projects students have completed, including challenges faced and lessons learned. Example projects involved attacking and defending on-chip networks, securing voice authentication systems, and non-invasively hacking VGA cables. The document provides recommendations for structuring ethical and effective student cybersecurity projects, such as providing technical advisors, discussing project scope, and allocating sufficient resources.
This document summarizes several models and frameworks for digital forensic examination developed between 2000-2015. It provides brief descriptions of key frameworks such as the ACPO principles of 2007, NIJ guidelines of 2008, ENFSI guidelines of 2009 and several process models including the 3A model, IDIP model, InteDFPM model and Palantir framework for collaborative incident response. The document is intended to provide an overview of the evolution of digital forensic examination processes and standards over this 15 year period.
Dans sa dernière étude « PwC Golden Age Index : how well are OECD economies adapting to an older workforce ? », le cabinet d’audit et de conseil PwC compare l’emploi des seniors (travailleurs âgés de plus de 55 ans) dans 34 pays de l’OCDE.
'UK Commercial Radio Sector Current Indicators & Forecasts: September 2007' b...Grant Goddard
Presentation outlining significant business and economic market trends within the UK commercial radio broadcasting sector, with detailed five-year forecasts for revenues and audiences, written by Grant Goddard in September 2007 for Guardian Media Group plc.
The letter expresses gratitude to Mrs. Williams for allowing the author to intern under her as an educator. The author learned valuable lessons about teaching, maintaining composure, having a positive outlook, and the importance of organization. Most importantly, the author learned that everyone can teach you something valuable. The memories made during the internship, such as laughing together and entertaining the students, will be fondly remembered. The author is sad to see the internship end but knows Mrs. Williams will excel in her new role as Instructional Lead Teacher. Thanks are expressed for Mrs. Williams' mentorship and friendship.
Skills2Talent is an integrated talent management and learning and development software that allows users to manage their entire talent pipeline from hiring to return on investment. It offers competency mapping, skill assessments, an online learning management system with 50+ customizable course templates, and links to 25 other modules. The software aims to help customers improve talent management and features open-source technologies, pre-configured industry libraries, and a focus on continuous learning.
What is currently being done in the academy?Simon Walton
This was a talk given at the NESTA innovation foundation in London in 2014 as a means of introducing the power of visualisation to a wider audience and its huge applicability in industry.
O documento lista os artilheiros e seus gols marcados nos times da Série A do Campeonato Brasileiro, com Gabriel Jesus do Palmeiras na liderança com 10 gols, seguido de Diego Souza do Sport com 9 gols e Bruno Rangel da Chapecoense e Rafael Moura do Figueirense com 9 gols cada.
El documento describe los orígenes, enfoques y fases del proceso de planificación según varios autores. Explica que la planificación surgió originalmente en el contexto militar y que luego se adoptó en empresas para hacer frente a factores externos e internos impredecibles. Describe tres enfoques de planificación - administrativa, normativa y estratégica - y compara sus fases, señalando que comparten pasos similares pero con diferentes énfasis conceptuales. También explica la importancia del análisis de situación para diagnosticar factores internos
O artilheiro da Supercopa Gaúcha de 2016 foi Paulinho do São José com 8 gols. Outros artilheiros notáveis foram Léo Mineiro do Caxias com 5 gols e Welder do Guarany com 6 gols. Vários outros jogadores marcaram entre 1 e 3 gols pelos seus respectivos times.
Under the Higher Education Opportunity Act (HEOA), universities are required by July 1, 2010 to compile a written plan on how they will educate students on the dangers of file sharing and which procedures are in place to effectively combat illegal file sharing.
In preparation for the HEOA implementation and to more effectively educate the UNC community about the issues of copyright law and file sharing, the Information Security Office designed an online course combined with a follow-up survey. Come learn about UNC’s new online copyright education course.
TAMEx framework as an alternative for e-exam implementation in wireless networkTELKOMNIKA JOURNAL
One of significant change in learning process is exam implementation applying a computer-based test (e-exam) rather than paper-based test. Many institutions currently use wireless network with bring your own device (BYOD) policy for their e-exam implementation, due to limitation of space and user terminals. Moreover it is hard to maintain the availability of reliable signal quality in wireless network for all users during e-exam process. Therefore, this research proposes a development of time adaptive for mobile exam (TAMEx) framework to provide all users with good quality of service of e-exam in wireless network environment when dealing with signal quality variations. The received signal strength indication (RSSI) is the main indicator of the signal quality. The framework supports e-exam implementation in wirelesslocal area network and the use of BYOD mechanism. The research shows that the framework successfully has provided time compensation for the users who experienced temporary connection loss due to bad signal quality. The result exhibits that tiny processing time has been needed for signal loss detection, user’s request of compensation time, and server’s execution. In conclusion, the TAMEx could guarantee good services for all users who doing e-exam in wireless network environment.
Towards well being in digital media educationdebbieholley1
The document summarizes the work of the Safety and Well-being Working Group in revising the DigComp 2.2 framework to better address digital well-being. Some of their key successes in the revision included adding knowledge, skills, and attitudes around healthy digital balance, addictive behaviors, screen time guidelines, and risks to vulnerable groups. However, some of their suggested additions around the differing impacts of media on children versus adults, a broader concept of well-being, and specific digital risks did not make it into the current revision. The group concluded that digital well-being may need its own component rather than remaining a sub-component for a future revision in order to adequately address the topic.
This document discusses how information technology impacts academics and students. It outlines how IT enables more convenient data storage and transmission, enhancing learning through greater access to information. While IT provides benefits like easier research, it can also enable distractions and plagiarism if misused. The document also examines how IT is changing higher education through innovations like MOOCs, e-books, and online communication between schools and homes, noting both opportunities and challenges. Research is also impacted, with IT allowing more data-driven analysis and global collaboration, influencing over 40% of research according to one graph. Overall, the document suggests that while IT is a valuable tool, its use must be properly understood to reap benefits and avoid negative impacts.
Brief report problems associated with the use of e-learning system and poten...Bhzad Sidawi
The document summarizes a study on the problems with using an e-learning system at a university in Saudi Arabia and potential solutions. The study found that architecture students at the university were reluctant to use the e-learning system and relied more on other online resources. Issues identified included a lack of student experience with the system, insufficient IT support and infrastructure, and that the system did not adequately support students' design projects and innovation. Recommendations focused on improving student and faculty training, the IT infrastructure, and customizing the e-learning tools and resources to better meet the needs of architectural education and design.
This document summarizes a study that investigated acceptance of mobile internet use among financial professionals in Honolulu. The study used a survey to examine how intention to use, perceived usefulness, ease of use, attitude, accessibility, support, security, interface and control impacted acceptance. It found the Technology Acceptance Model and these factors provided a viable way to predict mobile internet adoption. Attitude towards use had the strongest correlation with perceived usefulness and perceived user control.
We present a novel application of advanced logic-based business rules (Rulelog) and natural language processing (Textual Logic): to automatically generate detailed explanations for business decision making and education. Business users need to deeply understand the critical knowledge that underlies organizational decisions. Students at all levels want to understand the "why" not just the "what", and benefit from automated support for developing higher cognitive and critical thinking skills. Our approach is domain-neutral, and its generated explanations are interactively navigable. We give two case studies:
· Regulations & policies in financial compliance. A key challenge in compliance is the ever-growing amount and complexity of regulations & policies. Our approach aids compliance professionals to interpret the results of automated decision support systems and to contribute more rapidly and effectively to evolving the implemented business rules that underlie those systems.
· Review and test prep in college-level science. A key challenge in education is the high cost of personalizing the learning experience. Our approach reduces that cost, deepens the learning experience, and empowers the student.
San José State University implemented a five-year technological upgrade plan to promote an "anytime, anywhere" learning experience for students. The chief information officer assessed the university's needs and developed a vision for seamlessly blending technology and education. The strategy included upgrading the wireless network from 700 to 2,500 access points, installing video conferencing in classrooms, and providing unified communications for employees. The project aims to transform the university's technology infrastructure and learning environment by 2017 through innovations like wireless access across campus, virtual computer labs, and lecture capture archives.
The document discusses improving the real-time supply of information to students at a university. It proposes sending text message notifications to students when new grades are available or when class schedules change. This could increase student awareness and participation. The implementation plan considers developing this internally or using an external third-party solution. A case study describes how one university implemented a similar notification system using their own application integrated with Blackboard and a third-party SMS provider. They found it worked well and benefited both students and staff.
This document describes cybersecurity projects undertaken by undergraduate students at Wentworth Institute of Technology as part of senior design courses in electrical and computer engineering. It discusses the types of projects students have completed, including challenges faced and lessons learned. Example projects involved attacking and defending on-chip networks, securing voice authentication systems, and non-invasively hacking VGA cables. The document provides recommendations for structuring ethical and effective student cybersecurity projects, such as providing technical advisors, discussing project scope, and allocating sufficient resources.
This document summarizes several models and frameworks for digital forensic examination developed between 2000-2015. It provides brief descriptions of key frameworks such as the ACPO principles of 2007, NIJ guidelines of 2008, ENFSI guidelines of 2009 and several process models including the 3A model, IDIP model, InteDFPM model and Palantir framework for collaborative incident response. The document is intended to provide an overview of the evolution of digital forensic examination processes and standards over this 15 year period.
Dans sa dernière étude « PwC Golden Age Index : how well are OECD economies adapting to an older workforce ? », le cabinet d’audit et de conseil PwC compare l’emploi des seniors (travailleurs âgés de plus de 55 ans) dans 34 pays de l’OCDE.
'UK Commercial Radio Sector Current Indicators & Forecasts: September 2007' b...Grant Goddard
Presentation outlining significant business and economic market trends within the UK commercial radio broadcasting sector, with detailed five-year forecasts for revenues and audiences, written by Grant Goddard in September 2007 for Guardian Media Group plc.
The letter expresses gratitude to Mrs. Williams for allowing the author to intern under her as an educator. The author learned valuable lessons about teaching, maintaining composure, having a positive outlook, and the importance of organization. Most importantly, the author learned that everyone can teach you something valuable. The memories made during the internship, such as laughing together and entertaining the students, will be fondly remembered. The author is sad to see the internship end but knows Mrs. Williams will excel in her new role as Instructional Lead Teacher. Thanks are expressed for Mrs. Williams' mentorship and friendship.
Skills2Talent is an integrated talent management and learning and development software that allows users to manage their entire talent pipeline from hiring to return on investment. It offers competency mapping, skill assessments, an online learning management system with 50+ customizable course templates, and links to 25 other modules. The software aims to help customers improve talent management and features open-source technologies, pre-configured industry libraries, and a focus on continuous learning.
What is currently being done in the academy?Simon Walton
This was a talk given at the NESTA innovation foundation in London in 2014 as a means of introducing the power of visualisation to a wider audience and its huge applicability in industry.
O documento lista os artilheiros e seus gols marcados nos times da Série A do Campeonato Brasileiro, com Gabriel Jesus do Palmeiras na liderança com 10 gols, seguido de Diego Souza do Sport com 9 gols e Bruno Rangel da Chapecoense e Rafael Moura do Figueirense com 9 gols cada.
El documento describe los orígenes, enfoques y fases del proceso de planificación según varios autores. Explica que la planificación surgió originalmente en el contexto militar y que luego se adoptó en empresas para hacer frente a factores externos e internos impredecibles. Describe tres enfoques de planificación - administrativa, normativa y estratégica - y compara sus fases, señalando que comparten pasos similares pero con diferentes énfasis conceptuales. También explica la importancia del análisis de situación para diagnosticar factores internos
O artilheiro da Supercopa Gaúcha de 2016 foi Paulinho do São José com 8 gols. Outros artilheiros notáveis foram Léo Mineiro do Caxias com 5 gols e Welder do Guarany com 6 gols. Vários outros jogadores marcaram entre 1 e 3 gols pelos seus respectivos times.
Christie Musso Bruce successfully completed the QuickBooks 2006 Certification Course and Exam on 5/24/2007, earning 16 CPE credits in the field of Specialized Knowledge and Application. The certification was granted through the QAS Self Study program in accordance with NASBA standards.
Michelle Bailey is seeking an administrative or customer service position that allows her to utilize her 10+ years of experience and skills. She has received accolades for outstanding performance and has strong communication, organizational, and problem-solving skills. Her professional experience includes roles as an academic interventionist teacher, administrative assistant at a steel mill, and administrative secretary for BellSouth/AT&T where she assisted executive managers and provided excellent customer service.
Este documento detalla los precios de tarifas para el uso de un hotspot. El costo por 1 hora es de Rp. 2,000, por 2 horas es de Rp. 4,000, y por 3 horas o más es de Rp. 5,000.
O documento lista os gols marcados por jogadores em diversos times em uma competição, com destaque para Edgar Alemão e Dener que marcaram 2 gols cada, e Bottin que marcou 3 gols pelo time Nova Prata.
The insurance industry is undergoing fundamental transformation as it comes up against the impact of new regulation, new technology, accelerating shifts in consumer demand and mounting competition from digitally-enabled new entrants. In the face of so many disruptive challenges, it’s important not to lose sight of the huge opportunities they’re creating for insurers. Companies from other industries will be looking to your risk insight and expertise to help them navigate an increasingly complex and uncertain business and geopolitical landscape. You’re also in the pole position to capitalise on the new generation of analytics, sensor connectivity, and machine learning technologies that are set to revolutionise our lives. To make the most of these opportunities, it’s important to look beyond the traditional boundaries of the insurance business to embrace new ways of working, new ways of interacting with customers, and whole new possibilities in what your business can deliver.
Digital forensics involves analyzing digital artifacts like computers, storage devices, and network traffic as potential legal evidence. The process includes preparing investigators, collecting evidence while maintaining a chain of custody, examining and analyzing the data, and reporting the results. Key steps are imaging systems to obtain an exact duplicate without altering the original, recovering volatile data from memory, and using tools like EnCase and The Sleuth Kit to manually review and search the evidence for relevant information.
Digital Crime & Forensics - Presentationprashant3535
The document discusses digital crime and forensics. It defines digital crime as any crime where a computer is used as a tool or target. Examples include malware, denial of service attacks, and phishing. Forensics involves the identification, preservation, extraction, documentation, interpretation and presentation of digital evidence. However, forensics faces challenges due to issues like anonymity, large data storage, encryption, and differences between legal systems of countries. The document concludes that collaboration between law enforcement, governments and industry is needed to address new trends in digital crime.
This document provides an overview of computer forensics. It defines computer forensics as identifying, preserving, analyzing and presenting digital evidence in a legally acceptable manner. The objective is to find evidence related to cyber crimes. Computer forensics has a history in investigating financial fraud, such as the Enron case. It describes the types of digital evidence, tools used, and steps involved in computer forensic investigations. Key points are avoiding altering metadata and overwriting unallocated space when collecting evidence.
Digital forensics research: The next 10 yearsMehedi Hasan
Today’s Golden Age of computer forensics is quickly coming to an end. Without a clear strategy for enabling research efforts that build upon one another, forensic research will fall behind the market, tools will become increasingly obsolete, and law enforcement, military and other users of computer forensics products will be unable to rely on the results of forensic analysis. This article summarizes current forensic research directions and argues that to move forward the community needs to adopt standardized, modular approaches for data representation and forensic processing.
@2010 Digital Forensic Research Workshop. Published by Elsevier Ltd. All rights reserved
The Internet of Things and some introduction to the Technological Empowerment...Opher Etzion
This document outlines the vision for the Technological Empowerment Institute, which aims to empower people and businesses in developing areas through smart sensor-based systems for situation awareness. The institute will have three legs: a multi-disciplinary research leg, an implementation leg through partnerships, and an education leg. Some example target applications mentioned are assistance for elderly independent living through situational awareness alerts, supply chain monitoring, agriculture environmental control, and water quality monitoring. The overall goal is to help realize the power of event-driven systems to create a better world.
A Multimedia Data Mining Framework for Monitoring E-Examination Environmentijma
Academic dishonesty has been a growing concern in e-learning environment due to the fact that eexamination takes place under supervised and unsupervised learning environment despite its huge advantages. The e-examination environment has faced various security breaches such as academic dishonesty (impersonation), identity theft, unauthorised access and illegal assistance as a result of inefficient measures employed. Hence, an efficient framework which will aid the monitoring of the eexamination is needed. This paper reviews the process of mining multimedia data and propose a framework for monitoring the e-examination environment in order to extract images and audio features. The framework has four major phases: data pre-processing, mining, association and post processing. The
pre-processing phases carries out the extraction and transformation of multimedia data features, the mining phase does the classification and clustering of these features, the association does pattern matching while the post processing carries out the knowledge interpretation and reporting. The approach presented in this study will allow for efficient and accurate monitoring of e-examination environment which will help provide adequate security and reduce unethical behaviour in e-examination environment.
Intelligent solution for automatic online exam monitoring IJECEIAES
E-learning has shown significant growth in recent years due to its unavoidable benefits in unexpected situations such as the coronavirus disease 2019 (COVID-19) pandemic. Indeed, online exam is a very important component of an online learning program. It allows higher education institutions to assess student learning outcomes. However, cheating in exams is a widespread phenomenon worldwide, which creates several challenges in terms of integrity, reliability and security of online examinations. In this study, we propose a continuous authentication system for online exam. Our intelligent inference system based on machine learning algorithms and rules, detects continuously any inappropriate behavior in order to limit and prevent fraud. The proposed model includes several modules to enhance security, namely the registration module, the continuous students’ identity verification and control module, the live video stream and the end-to-end sessions recording.
Concepts and Methodology in Mobile Devices Digital Forensics Education and Tr...Damir Delija
One of draft versios of "Concepts and Methodology in Mobile Devices Digital Forensics Education and Training",
Abstract - This paper presents various issues in digital forensics of mobile devices and how to address these issues in the related education and training process. Mobile devices forensics is a new, very fast developing field which lacks standardization, compatibility, tools, methods and skills. All this drawbacks have impact on the results of forensic process and also have deep influence in training and education process. In this paper real life experience in training is presented, with tools, devices, procedures and organization with purpose to improve process of mobile devices forensics and mobile forensic training and education
How Proctoring Technology Will Shape The Future Of Education: Predicting Its ...Tania Arora
Proctoring, a time-honored practice for overseeing examinations, has long been key in ensuring a fair testing environment. EnFuse is leading the proctoring evolution, offering reliable and secure proctoring services for educational institutions. With customizable options and a focus on candidate experience, they are committed to empowering education through innovative proctoring solutions.
Visit here: https://www.enfuse-solutions.com/
José Aznarte outlines UNED's efforts to develop a virtual examination hall called AVEX during the COVID-19 pandemic. He describes UNED's participatory process to establish ethical guidelines for using student data. While facial recognition raised legal and ethical concerns, AVEX used layered security including random questions, photos and interviews. Initial results found higher pass rates but potential fraud risks, requiring further analysis. Most students were satisfied with AVEX and felt it protected their privacy.
This documentation provides a brief insight of face recognition based attendance system using neural networks in terms of product architecture which can be used for educational purpose.
Multiple educational data mining approaches to discover patterns in universit...IJICTJOURNAL
This paper presented the utilization of pattern discovery techniques by using multiple relationships and clustering educational data mining approaches to establish a knowledge base that will aid in the prediction of ideal college program selection and enrollment forecasting for incoming freshmen. Results show a significant level of accuracy in predicting college programs for students by mining two years of student college admission and graduation final grade scholastic records. The results of educational predictive data mining methods can be applied in improving the services of the admission department of an educational institution, particularly in its course alignment, student mentoring, admission forecast, marketing, and enrollment preparedness.
A Proactive Approach in Network Forensic Investigation ProcessEditor IJCATR
nformation Assurance and Security (IAS) is a crucial component in the corporate environment to ensure that the secrecy of
sensitive data is protected, the integrity of important data is not violated, and the availability of critical systems is guaranteed. The
advancement of Information communication and technology into a new era and domain such as mobility and Internet of Things,
its ever growing user’s base and sophisticated cyber-attacks forces the organizations to deploy automated and robust defense
mechanism to manage resultant digital security incidences in real time. Digital forensic is a scientific process that facilitates
detection of illegal activities and in-appropriate behaviors using scientific tools, techniques and investigation frameworks. This
research aims at identifying processes that facilitate and improves digital forensic investigation process. Existing digital forensic
framework will be reviewed and the analysis will be compiled toderive a network forensic investigation framework that include
evidence collection, preservation and analysis at a sensor level and in real time. It is aimed to discover complete relationship with
optimal performance among known and unseen/new alerts generated by multiple network sensors in order to improve the quality
of alert and recognize attack strategy
A proposal for the automation of attendance systemAj Aligonero
This research paper analyzes introducing an automated attendance system using biometrics at Laguna Northwestern College. Currently, attendance is taken manually, taking up class time. The researchers hypothesize that an automated system using fingerprint or facial recognition would reduce time spent on attendance and improve monitoring of student attendance. If implemented, key benefits would be increased security, less proxy attendance, and reduced human error. The study scope is limited to analyzing student attendance management. It provides little information on biometric hardware costs and school facility usage.
This document discusses intrusion detection using incremental learning from streaming imbalanced data. It begins with an abstract that introduces the challenges of concept drift and class imbalance in dynamic environments. Section 1 provides more context on intrusion detection systems and the approaches of misuse detection and anomaly detection. Section 2 reviews literature on incremental learning and discusses challenges like concept drift and class imbalance. It also introduces various combining rules that can be used for ensemble-based incremental learning, such as voting rules. The document aims to address the problem of incremental learning from imbalanced data streams in the domain of intrusion detection.
Every accountant knows that accounting is a business language and that language has undergone many changes over the years. Dissemination in the use of information technology and the production of applications has
contributed to intense shifts in accounting firms’ Procedures as of the 1990s. From the view of accounting experts, the influence of these advances has not been adequately analysed. The general purpose of this study was therefore to determine the effect of technological progress on the accounting sphere in Namibia. A descriptive survey design was used to in this study, to establish whether there exists any relationship between advanced technology and Accounting today. The results indicate that the accelerated speed of technological progress tends to challenge conventional processes in all fields, including the accounting profession. The study also revealed that businesses
have not only embraced the revolution of advanced technology, but have also started to adopt emerging innovations in the form of accounting software, mobility and the creation of social media platforms. With a figure of
less than 50% IT-enabled use, it is obvious that accounting students and accountants do not know how to run accounting information systems, while companies continually rely on technological advancements to conduct their
tasks.
To Assess the Main Drawbacks of Advanced Technology for the Accounting SphereBIJFMCF Journal
Every accountant knows that accounting is a business language and that language has undergone many changes over the years. Dissemination in the use of information technology and the production of applications has contributed to intense shifts in accounting firms’ Procedures as of the 1990s. From the view of accounting experts, the influence of these advances has not been adequately analysed. The general purpose of this study was therefore to determine the effect of technological progress on the accounting sphere in Namibia. A descriptive survey design was used to in this study, to establish whether there exists any relationship between advanced technology and Accounting today. The results indicate that the accelerated speed of technological progress tends to challenge conventional processes in all fields, including the accounting profession. The study also revealed that businesses have not only embraced the revolution of advanced technology, but have also started to adopt emerging innovations in the form of accounting software, mobility and the creation of social media platforms. With a figure of less than 50% IT-enabled use, it is obvious that accounting students and accountants do not know how to run accounting information systems, while companies continually rely on technological advancements to conduct their tasks.
The paper emphasizes the human aspects of cyber incidents concerning protecting information and
technology assets by addressing behavioral analytics in cybersecurity for digital forensics applications.
The paper demonstrates the human vulnerabilities associated with information systems technologies and
components. This assessment is based on past literature assessments done in this area. This study also
includes analyses of various frameworks that have led to the adoption of behavioral analysis in digital
forensics. The study's findings indicate that behavioral evidence analysis should be included as part of the
digital forensics examination. The provision of standardized investigation methods and the inclusion of
human factors such as motives and behavioral tendencies are some of the factors attached to the use of
behavioral digital forensic frameworks. However, the study also appreciates the need for a more
generalizable digital forensic method.
The paper emphasizes the human aspects of cyber incidents concerning protecting information and
technology assets by addressing behavioral analytics in cybersecurity for digital forensics applications.
The paper demonstrates the human vulnerabilities associated with information systems technologies and
components. This assessment is based on past literature assessments done in this area. This study also
includes analyses of various frameworks that have led to the adoption of behavioral analysis in digital
forensics. The study's findings indicate that behavioral evidence analysis should be included as part of the
digital forensics examination. The provision of standardized investigation methods and the inclusion of
human factors such as motives and behavioral tendencies are some of the factors attached to the use of
behavioral digital forensic frameworks. However, the study also appreciates the need for a more
generalizable digital forensic method.
The paper emphasizes the human aspects of cyber incidents concerning protecting information and
technology assets by addressing behavioral analytics in cybersecurity for digital forensics applications.
The paper demonstrates the human vulnerabilities associated with information systems technologies and
components. This assessment is based on past literature assessments done in this area. This study also
includes analyses of various frameworks that have led to the adoption of behavioral analysis in digital
forensics. The study's findings indicate that behavioral evidence analysis should be included as part of the
digital forensics examination. The provision of standardized investigation methods and the inclusion of
human factors such as motives and behavioral tendencies are some of the factors attached to the use of
behavioral digital forensic frameworks. However, the study also appreciates the need for a more
generalizable digital forensic method.
A Formal Two Stage Triage Process Model (FTSTPM) for Digital Forensic PracticeCSCJournals
Due to the rapid increase of digital based evidence, the requirement for the timely identification, examination and interpretation of digital evidence is becoming more essential. In certain investigations such as child abductions, pedophiles, missing or exploited persons, time becomes extremely important as in some cases, it is the difference between life and death for the victim. Moreover, the growing number of computer systems being submitted to digital forensic laboratories is creating a backlog of cases that can delay investigations and negatively affect public safety and the criminal justice system. To deal with these problems, there is a need for more effective ‘onsite’ triage methods to enable the investigators to acquire information in a timely manner, and to reduce the number of computer systems that are submitted to DFLs for analysis. This paper presents a Formal Two-Stage Triage Process Model fulfilling the needs of an onsite triage examination process.
Similar to Proposed high level solutions to counter online examination fraud using digital forensic readiness techniques (20)
GlobalLogic Java Community Webinar #18 “How to Improve Web Application Perfor...GlobalLogic Ukraine
Під час доповіді відповімо на питання, навіщо потрібно підвищувати продуктивність аплікації і які є найефективніші способи для цього. А також поговоримо про те, що таке кеш, які його види бувають та, основне — як знайти performance bottleneck?
Відео та деталі заходу: https://bit.ly/45tILxj
Dandelion Hashtable: beyond billion requests per second on a commodity serverAntonios Katsarakis
This slide deck presents DLHT, a concurrent in-memory hashtable. Despite efforts to optimize hashtables, that go as far as sacrificing core functionality, state-of-the-art designs still incur multiple memory accesses per request and block request processing in three cases. First, most hashtables block while waiting for data to be retrieved from memory. Second, open-addressing designs, which represent the current state-of-the-art, either cannot free index slots on deletes or must block all requests to do so. Third, index resizes block every request until all objects are copied to the new index. Defying folklore wisdom, DLHT forgoes open-addressing and adopts a fully-featured and memory-aware closed-addressing design based on bounded cache-line-chaining. This design offers lock-free index operations and deletes that free slots instantly, (2) completes most requests with a single memory access, (3) utilizes software prefetching to hide memory latencies, and (4) employs a novel non-blocking and parallel resizing. In a commodity server and a memory-resident workload, DLHT surpasses 1.6B requests per second and provides 3.5x (12x) the throughput of the state-of-the-art closed-addressing (open-addressing) resizable hashtable on Gets (Deletes).
Lee Barnes - Path to Becoming an Effective Test Automation Engineer.pdfleebarnesutopia
So… you want to become a Test Automation Engineer (or hire and develop one)? While there’s quite a bit of information available about important technical and tool skills to master, there’s not enough discussion around the path to becoming an effective Test Automation Engineer that knows how to add VALUE. In my experience this had led to a proliferation of engineers who are proficient with tools and building frameworks but have skill and knowledge gaps, especially in software testing, that reduce the value they deliver with test automation.
In this talk, Lee will share his lessons learned from over 30 years of working with, and mentoring, hundreds of Test Automation Engineers. Whether you’re looking to get started in test automation or just want to improve your trade, this talk will give you a solid foundation and roadmap for ensuring your test automation efforts continuously add value. This talk is equally valuable for both aspiring Test Automation Engineers and those managing them! All attendees will take away a set of key foundational knowledge and a high-level learning path for leveling up test automation skills and ensuring they add value to their organizations.
"NATO Hackathon Winner: AI-Powered Drug Search", Taras KlobaFwdays
This is a session that details how PostgreSQL's features and Azure AI Services can be effectively used to significantly enhance the search functionality in any application.
In this session, we'll share insights on how we used PostgreSQL to facilitate precise searches across multiple fields in our mobile application. The techniques include using LIKE and ILIKE operators and integrating a trigram-based search to handle potential misspellings, thereby increasing the search accuracy.
We'll also discuss how the azure_ai extension on PostgreSQL databases in Azure and Azure AI Services were utilized to create vectors from user input, a feature beneficial when users wish to find specific items based on text prompts. While our application's case study involves a drug search, the techniques and principles shared in this session can be adapted to improve search functionality in a wide range of applications. Join us to learn how PostgreSQL and Azure AI can be harnessed to enhance your application's search capability.
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving
Manufacturing custom quality metal nameplates and badges involves several standard operations. Processes include sheet prep, lithography, screening, coating, punch press and inspection. All decoration is completed in the flat sheet with adhesive and tooling operations following. The possibilities for creating unique durable nameplates are endless. How will you create your brand identity? We can help!
Northern Engraving | Modern Metal Trim, Nameplates and Appliance PanelsNorthern Engraving
What began over 115 years ago as a supplier of precision gauges to the automotive industry has evolved into being an industry leader in the manufacture of product branding, automotive cockpit trim and decorative appliance trim. Value-added services include in-house Design, Engineering, Program Management, Test Lab and Tool Shops.
What is an RPA CoE? Session 1 – CoE VisionDianaGray10
In the first session, we will review the organization's vision and how this has an impact on the COE Structure.
Topics covered:
• The role of a steering committee
• How do the organization’s priorities determine CoE Structure?
Speaker:
Chris Bolin, Senior Intelligent Automation Architect Anika Systems
QA or the Highway - Component Testing: Bridging the gap between frontend appl...zjhamm304
These are the slides for the presentation, "Component Testing: Bridging the gap between frontend applications" that was presented at QA or the Highway 2024 in Columbus, OH by Zachary Hamm.
Must Know Postgres Extension for DBA and Developer during MigrationMydbops
Mydbops Opensource Database Meetup 16
Topic: Must-Know PostgreSQL Extensions for Developers and DBAs During Migration
Speaker: Deepak Mahto, Founder of DataCloudGaze Consulting
Date & Time: 8th June | 10 AM - 1 PM IST
Venue: Bangalore International Centre, Bangalore
Abstract: Discover how PostgreSQL extensions can be your secret weapon! This talk explores how key extensions enhance database capabilities and streamline the migration process for users moving from other relational databases like Oracle.
Key Takeaways:
* Learn about crucial extensions like oracle_fdw, pgtt, and pg_audit that ease migration complexities.
* Gain valuable strategies for implementing these extensions in PostgreSQL to achieve license freedom.
* Discover how these key extensions can empower both developers and DBAs during the migration process.
* Don't miss this chance to gain practical knowledge from an industry expert and stay updated on the latest open-source database trends.
Mydbops Managed Services specializes in taking the pain out of database management while optimizing performance. Since 2015, we have been providing top-notch support and assistance for the top three open-source databases: MySQL, MongoDB, and PostgreSQL.
Our team offers a wide range of services, including assistance, support, consulting, 24/7 operations, and expertise in all relevant technologies. We help organizations improve their database's performance, scalability, efficiency, and availability.
Contact us: info@mydbops.com
Visit: https://www.mydbops.com/
Follow us on LinkedIn: https://in.linkedin.com/company/mydbops
For more details and updates, please follow up the below links.
Meetup Page : https://www.meetup.com/mydbops-databa...
Twitter: https://twitter.com/mydbopsofficial
Blogs: https://www.mydbops.com/blog/
Facebook(Meta): https://www.facebook.com/mydbops/
"Scaling RAG Applications to serve millions of users", Kevin GoedeckeFwdays
How we managed to grow and scale a RAG application from zero to thousands of users in 7 months. Lessons from technical challenges around managing high load for LLMs, RAGs and Vector databases.
From Natural Language to Structured Solr Queries using LLMsSease
This talk draws on experimentation to enable AI applications with Solr. One important use case is to use AI for better accessibility and discoverability of the data: while User eXperience techniques, lexical search improvements, and data harmonization can take organizations to a good level of accessibility, a structural (or “cognitive” gap) remains between the data user needs and the data producer constraints.
That is where AI – and most importantly, Natural Language Processing and Large Language Model techniques – could make a difference. This natural language, conversational engine could facilitate access and usage of the data leveraging the semantics of any data source.
The objective of the presentation is to propose a technical approach and a way forward to achieve this goal.
The key concept is to enable users to express their search queries in natural language, which the LLM then enriches, interprets, and translates into structured queries based on the Solr index’s metadata.
This approach leverages the LLM’s ability to understand the nuances of natural language and the structure of documents within Apache Solr.
The LLM acts as an intermediary agent, offering a transparent experience to users automatically and potentially uncovering relevant documents that conventional search methods might overlook. The presentation will include the results of this experimental work, lessons learned, best practices, and the scope of future work that should improve the approach and make it production-ready.
The Department of Veteran Affairs (VA) invited Taylor Paschal, Knowledge & Information Management Consultant at Enterprise Knowledge, to speak at a Knowledge Management Lunch and Learn hosted on June 12, 2024. All Office of Administration staff were invited to attend and received professional development credit for participating in the voluntary event.
The objectives of the Lunch and Learn presentation were to:
- Review what KM ‘is’ and ‘isn’t’
- Understand the value of KM and the benefits of engaging
- Define and reflect on your “what’s in it for me?”
- Share actionable ways you can participate in Knowledge - - Capture & Transfer
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...DanBrown980551
This LF Energy webinar took place June 20, 2024. It featured:
-Alex Thornton, LF Energy
-Hallie Cramer, Google
-Daniel Roesler, UtilityAPI
-Henry Richardson, WattTime
In response to the urgency and scale required to effectively address climate change, open source solutions offer significant potential for driving innovation and progress. Currently, there is a growing demand for standardization and interoperability in energy data and modeling. Open source standards and specifications within the energy sector can also alleviate challenges associated with data fragmentation, transparency, and accessibility. At the same time, it is crucial to consider privacy and security concerns throughout the development of open source platforms.
This webinar will delve into the motivations behind establishing LF Energy’s Carbon Data Specification Consortium. It will provide an overview of the draft specifications and the ongoing progress made by the respective working groups.
Three primary specifications will be discussed:
-Discovery and client registration, emphasizing transparent processes and secure and private access
-Customer data, centering around customer tariffs, bills, energy usage, and full consumption disclosure
-Power systems data, focusing on grid data, inclusive of transmission and distribution networks, generation, intergrid power flows, and market settlement data
Introducing BoxLang : A new JVM language for productivity and modularity!Ortus Solutions, Corp
Just like life, our code must adapt to the ever changing world we live in. From one day coding for the web, to the next for our tablets or APIs or for running serverless applications. Multi-runtime development is the future of coding, the future is to be dynamic. Let us introduce you to BoxLang.
Dynamic. Modular. Productive.
BoxLang redefines development with its dynamic nature, empowering developers to craft expressive and functional code effortlessly. Its modular architecture prioritizes flexibility, allowing for seamless integration into existing ecosystems.
Interoperability at its Core
With 100% interoperability with Java, BoxLang seamlessly bridges the gap between traditional and modern development paradigms, unlocking new possibilities for innovation and collaboration.
Multi-Runtime
From the tiny 2m operating system binary to running on our pure Java web server, CommandBox, Jakarta EE, AWS Lambda, Microsoft Functions, Web Assembly, Android and more. BoxLang has been designed to enhance and adapt according to it's runnable runtime.
The Fusion of Modernity and Tradition
Experience the fusion of modern features inspired by CFML, Node, Ruby, Kotlin, Java, and Clojure, combined with the familiarity of Java bytecode compilation, making BoxLang a language of choice for forward-thinking developers.
Empowering Transition with Transpiler Support
Transitioning from CFML to BoxLang is seamless with our JIT transpiler, facilitating smooth migration and preserving existing code investments.
Unlocking Creativity with IDE Tools
Unleash your creativity with powerful IDE tools tailored for BoxLang, providing an intuitive development experience and streamlining your workflow. Join us as we embark on a journey to redefine JVM development. Welcome to the era of BoxLang.
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsDianaGray10
Join us to learn how UiPath Apps can directly and easily interact with prebuilt connectors via Integration Service--including Salesforce, ServiceNow, Open GenAI, and more.
The best part is you can achieve this without building a custom workflow! Say goodbye to the hassle of using separate automations to call APIs. By seamlessly integrating within App Studio, you can now easily streamline your workflow, while gaining direct access to our Connector Catalog of popular applications.
We’ll discuss and demo the benefits of UiPath Apps and connectors including:
Creating a compelling user experience for any software, without the limitations of APIs.
Accelerating the app creation process, saving time and effort
Enjoying high-performance CRUD (create, read, update, delete) operations, for
seamless data management.
Speakers:
Russell Alfeche, Technology Leader, RPA at qBotic and UiPath MVP
Charlie Greenberg, host
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...Jason Yip
The typical problem in product engineering is not bad strategy, so much as “no strategy”. This leads to confusion, lack of motivation, and incoherent action. The next time you look for a strategy and find an empty space, instead of waiting for it to be filled, I will show you how to fill it in yourself. If you’re wrong, it forces a correction. If you’re right, it helps create focus. I’ll share how I’ve approached this in the past, both what works and lessons for what didn’t work so well.
How information systems are built or acquired puts information, which is what they should be about, in a secondary place. Our language adapted accordingly, and we no longer talk about information systems but applications. Applications evolved in a way to break data into diverse fragments, tightly coupled with applications and expensive to integrate. The result is technical debt, which is re-paid by taking even bigger "loans", resulting in an ever-increasing technical debt. Software engineering and procurement practices work in sync with market forces to maintain this trend. This talk demonstrates how natural this situation is. The question is: can something be done to reverse the trend?
Proposed high level solutions to counter online examination fraud using digital forensic readiness techniques
1. Proposed High-Level Solutions to Counter Online Examination Fraud Using Digital Forensic Readiness
Techniques
Ivans Kigwana
1
, Hein Venter
2
University of Pretoria, Hatfield, South Africa
ivans.kigwana@gmail.com
1
hventer@cs.up.ac.za
2
Abstract
In this current digital age, most of the tasks are conducted electronically. Some academic institutions have not
been left behind as they have adopted the norm of presenting exams via online means to students. The
present-day paradigm creates opportunities for students to use this as an opening to cheat or commit online
examination fraud because of the absence of exam proctors. Having electronic evidence would be vital if there
was a disciplinary hearing into examination fraud. In the case when an institution is not prepared before-hand
for such an incident, it is likely that there won’t be important electronic evidence that is admissible before the
disciplinary committee. In this case, it could be damaging to the institution’s reputation and how it handles its
academic affairs. In order to prepare institutions for such an incident, there should be proactive measures
(digital forensic readiness measures) that need to be in place. These digital forensic readiness techniques can
be used interchangeably because most, if not all of them, capture different kinds of data. So the institution
needs a proper plan on what data might be useful before any technique can be implemented. Various factors
such as cost of implementation and difficulty of implementation of these digital forensic readiness methods
make its implementation even more difficult. This paper aims to explore the various ways how students
commit online examination fraud and later propose high level digital forensic readiness techniques that can be
used to capture as much information as possible before-hand which can later be used when there is need for a
digital forensic investigation or perhaps suspicion of examination malpractice. We later evaluate the proposed
techniques based on difficulty of implementation, cost of implementation and efficiency of operation of each
particular technique. As motivation, we choose six (6) techniques which are explained in detail to help the
reader understand why and how they can be used to suit a given digital forensic readiness purpose.
Keywords: Digital Forensics, Digital Forensic Readiness, Online Examination Fraud
1 Introduction
Over the years, technology has developed to an enormous extent. In most sectors of the economy, there is
some aspect of technological deployment that helps employees deliver their work more efficiently. One such
sector is the education sector. Currently, most education institutions – starting from junior level to higher
academic institutions – have adopted technology-related studies as modules in their curriculum. Other
institutions have gone the extra mile in offering online assignments, tests and exams to students as a way of
saving time and money spent on stationery. A crucial notion behind this innovation is to limit cases involving
cheating in traditional exams by introducing online exams. However, some students still use technology to
come up with innovative ways of cheating online exams and some are lucky enough to never get caught. Some
students assume that anything on the web is free and available for public usage; therefore they do not commit
an offence by using it in their favour (Scanlon, 2003).
The rapid growth in internet usage at institutions of higher education has presented a big challenge to
academic heads with regard to online academic programmes offered to students (Renard, 1999). Access to the
internet may also tempt students to cheat in exams because there is no one supervising them.
2. Some scholars believe that since some students are used to face-to-face interaction with their lecturers and
easy access to faculty administration, their stress levels increase (Gibbons et al., 2002) when they are exposed
to having everything delivered online. Some students fail to cope up with this stress may end up choosing to
cheat the exam.
What about the case of supervised online exams where some students are caught red-handed cheating and
others are not noticed? (King et al., 2009).
Academic authorities constantly try to come up with ways of stopping and punishing students caught cheating
or who are suspected of having cheated in exams. Most of the traditional detection methods have their own
shortcomings, which makes it hard for anyone to prove examination malpractice once the exam has been
written and submitted by the student. With regard to gathering evidence, it is almost impossible and very
costly to get digital information that can be used as potential evidence to convict someone for cheating, even
when s/he is a suspect.
In this research, we explore and explain in detail some of the possible ways how students cheat in online
exams, followed by possible high-level solutions to each. We discuss how digital forensic readiness can be
applied in the assessment situation as a way of detecting cheating, convicting suspects in disciplinary hearings
and possibly reducing the opportunities for online exam cheating.
The remainder of this paper is organised as follows: in Section 2 we provide some background on digital
forensics, and discuss digital forensic readiness and online exam fraud, incorporating it with related work.
Section 3 presents the different scenarios in which exam fraud occurs and the proposed digital forensic
readiness techniques to be applied in each scenario. In Section 4 we evaluate each proposed DFR techniques,
and our discussions follow in Section 5. Section 6 provides a conclusion to the paper and suggests future work
in this field.
2 Background
In this section we provide some background on digital forensics in general, digital forensic readiness and the
issue of online examination fraud. We also discuss related work in these three subsections.
2.1 Digital Forensics (DF)
Digital Forensics, sometimes referred to as computer forensics, became known in the 1970s (Kohn et al.,
2013). At that time, most computer forensics cases involved financial fraud. Currently, DF has proved vital in
solving computer-related crimes including but not limited to bank fraud, as well as other crime that involves
information in digital format (Garfinkel, 2010). Because we belong to a generation where a large part of our
day involves contact with digital devices and/or using them in our daily lives, we leave behind much
information on such devices even though we don’t realise it. When an investigation is to be carried out,
different forensic tools can be used to reconstruct events and attain evidence from among the information left
on digital devices by both victim and suspect.
Most current DF techniques were initially meant for data recovery. For instance, scholars in (Wood et al.,
1987) note a story of experts who were tasked to recover a copy of a fragmented database file that had
accidentally been deleted by a fellow researcher. In the early years, experts relied heavily on time sharing
machines and computing services that were located centrally (Garfinkel, 2010), while formal processes, tools
and proper training of personnel were seriously lacking.
2.2 Digital Forensic Readiness (DFR)
DF is usually carried out after the crime has been committed. DFR, on the other hand, is introduced as a
precautionary measure before the crime is committed. This means one has to follow the established guidelines
of a DFR process model as explained in ISO/IEC 27043:2015. This standard provides insight into guidelines that
3. are based on idealised models for a common incident investigation process across different scenarios that
involve DF.
The advantages associated with DFR include:
▪ Saves on the costs of acquiring potential evidence since information is collected prior to the incident
and stored safely.
▪ Saves time since there is already information to start with when an investigation is demanded.
The DFR process model as explained in ISO/IEC 27043:2015 comprises the following three main groups:
▪ Planning process group; – where all planning for the readiness process is done includes the following
DFR processes: scenario definition; identification of potential digital evidence sources; pre-incident
gathering; storage and handling of data representing potential digital evidence; pre-incident analysis
of data representing potential digital evidence; incident detection and definition of system
architecture process.
▪ Implementation process group – where all activities planned in the planning process group are
implemented – consists of activities such as: implementation of system architectures; implementation
of pre-incident gathering; storage and handling of data that represents the potential digital evidence;
implementation of pre-incident analysis of data that represents the potential digital evidence; and
implementation of the incident detection process.
▪ Assessment process group – where the success of the implementation process group is assessed –
involves the assessment of the implementation process; and the process for the implementation of
assessment results.
2.3 Fraud in Online Exams
When we talk about fraud in online exams, we are looking at cheating and the related malpractices performed
by students who write online exams. Students use different ways to cheat in online exams. Some methods
have been used for many years, but have never been addressed or solved completely, for instance paying off
someone else to write exams on behalf of the legitimate student. Others are new innovations by students,
arising from advancements in technology, for instance inspecting the Hypertext Mark-up Language (HTML)
code to check for possible answers embedded in code. Students can use many other possible ways to cheat in
online exams. Some of these methods are explained in the next section of this paper, and in each case we
propose DFR techniques to be used in the specific situation.
Different studies have been conducted to find solutions to fraud. Some professional courses focus primarily on
helping one understand the basics of a fraud examination process as published in web article (Examiners,
2013). However, most of these professional courses focus on fraud in general, not fraud in online exams.
Freifeld (Freifeld, 2013) gives tips on how to secure and prevent cheating in computer-based testing programs.
In his article, he explains different scenarios of how students have been caught cheating in online exams. For
instance a student was arrested for sitting for a “pencil-and-paper exam” on behalf of several other students
over a period of three years by forging IDs and writing exams at different locations to avoid detection.
Although this was not an online exam, it provides an insight into how far this practice has gone and how it
affects the education industry.
Another example involving tech devices recounted by the same author in (Freifeld, 2013) happened in 2012
when 1,500 people were suspected of selling transmitters and earpieces to students with the aim of cheating.
These people who sold such devices to students were later arrested. All this happened in China, because of the
tough competition to enter the top education institutions.
A web article published by Microsoft (Microsoft, 2015) lays down the testing session protocols used in an
online proctored exam. They all look effective to prevent the student from cheating. However, they miss
4. certain features that can help detect the state of the workstation on which the student is taking the exam.
Most of the protocols followed require the student to be checked by someone remotely using a webcam to
inspect different parts of the body and the room where the exam is being taken. However, nothing is said
about the computer itself, whether it was checked before and during the course of the exam.
In the next section, we discuss some of the ways in which students try to commit online exam fraud.
3 DFR for Online Examination Fraud
In this section, we discuss the notion of applying DFR in online examinations and make suggestions on how to
use it to detect and/or capture information from students that can be used in the case of a DF investigation.
We explain some of the ways how students cheat in online exams and subsequently propose DFR techniques
that can be used in each case. Some of the methods that students use to cheat in online exams and that are
discussed here include accessing online content, screen share, opening new tabs/pages, inspecting HTML
code, using programmable devices, using impersonators, exchanging workstations in the course of the exam,
and bribing supervisors.
This is evidently not an exhaustive list, as there may be other ways of committing online exam fraud that we
have not even come across at the time this research was conducted. Each technique will be given a unique
identifier, namely technique 1 (T1) to technique 13 (T13). We explain our findings in detail in the sub-sections
below.
3.1 Accessing online content
Accessing online content involves the use of shared Google docs, browsing the web while writing the exam,
and use of on-line slides in a closed-book exam. Students may well use any of the examples given to get access
to answers or to share information with other students during the exam. The following DFR techniques can be
employed in this is situation:
▪ T1 - Recording and/or logging pc activity, for instance process lists and applications accessed in the
course of the exam. With this technique, one can know if the student accessed any application whilst
writing the exam and exactly what information they got from those applications.
▪ T2 - Using a key logging application that can monitor and log keys used and words/phrases searched
by the student. This technique helps one to know how the student made use of the computer to
cheat in the exam.
▪ T3 - Designing an application to monitor and capture the typing speed and typing patterns of each
student. This can also be used to verify if the student wrote the exam themselves or got help from
someone in case there are unexplainable variances in typing speeds and patterns.
▪ T4 - Deploying spy cameras to monitor pc activity. These do not interfere with the running of the
exam, because they are placed in strategic positions to help those in the control room to remotely
monitor pc activity and any student movements during the exam session.
▪ T5 - Background auto screen recording. This technique helps gather all activity taking place on the pc,
for instance applications opened, pages or folders accessed, but it does not interfere with the running
of the exam. If spy cameras are not efficient to monitor pc activity, then this technique comes in
handy.
3.2 Screen share
It is possible to use an application to split the pc’s display screen. This allows the student to have access to the
exam and at the same time access other forbidden information to aid their objective of cheating. T1 and T5
can be used as DFR techniques to counter online exam fraud in this situation.
5. 3.3 Opening new pages in separate tabs/pages
Students can furthermore cheat by opening new tabs on the same page that the exam is being written, while it
might look as if they are not leaving the main window nevertheless open a new page. DFR techniques that we
can use in this situation include T1, T2 and T4. Others are:
▪ T6 - Logging browser activity. This technique enables investigators to know what web-pages were
accessed while the exam was in progress and the information contained in those webpages. If such
information is crucial to the investigation, then it is used as evidence for exam fraud against the
victim.
3.4 Inspecting element/HTML code
In some browsers like Chrome and Firefox, one can get access to html code by right-clicking on the webpage.
There is an option at the end of the drop-down menu that reads “Inspect element”. Students can use this
option to check for answers by going through the code. Although this technique does not apply to all online
exam systems, we found situations where one could get correct answers to the questions, especially if the
questions are of a multiple-choice nature. DFR techniques that can be deployed in this situation include T5 and
T6. Another technique we can use to curb cheating in this situation is:
▪ T7 - Recording mouse activity. Applying this technique would disclose what kind of information a
student got access to by using the mouse. For instance, if a student used the mouse to check the html
code for browsers like Chrome and Firefox, the investigator should be able to know this and how it
happened.
3.5 Using programmable devices
Some students use devices like graphing/programmable calculators (Garavalia et al., 2007) to store complex
mathematical formulas/equations that they might later need when writing the exam. Some of these devices
also store text graphs and other digital images. Cheating can be detected by:
▪ T8 - Recording all information on these devices before, during and after the exam as a prerequisite to
use them for exam purposes. Specialised DF devices can be used to get information from these
devices, including checking through the archives. The latter should be done while following the
standard DF investigation procedures, so that no information is compromised in the process.
3.6 Using an impersonator
Some students go as far as hiring someone, usually a fellow student, to sit for the exam on their behalf. It may
be easy to detect an impersonator if the class has a few students, but in a situation where hundreds or
thousands of students write the exam, it will be next to impossible – even more so if the impersonator is an
identical twin. The traditional way to verify one’s identity is by asking the student for his/her student card. In
the case that a student’s identity has been manipulated, one can use T3 in this situation. Other techniques to
curb online fraud are the following:
▪ T9 - Use a webcam to record the student’s identity so as to later cross-reference it with the registered
student’s details. This will be effective if an impersonator sat on behalf of another student. However,
this technique will come short if the student was an identical twin.
▪ T10 - Methods like finger printing, voice recognition, and eye scanning can also be used if one needs
immediate results and not necessarily gathering information for readiness purposes. Either of these
methods can be used to verify a student’s identity before entering the examination room.
▪ T11 - Continuous authentication can be used too, such as asking random questions that only a
legitimate student would know, like asking for lecturer’s name, lecture times and venue(s), etc. This is
not necessarily a DFR technique, but it can help eliminate impersonators from getting access to exams
and sitting on another student's’ behalf.
6. 3.7 Switching computers during an exam
Students can also commit exam fraud by switching computers during the exam. Since online assessment does
not involve the use of paper-based material where handwritings may differ from person to person, it is easier
for students to cheat in such exams. One brighter student can go and sit at another student’s workstation and
write the exam on his/her behalf, and no one will notice that any malpractice took place unless the exam
supervisor were to catch the students in the course of switching workstations. This type of cheating can be
handled by using T3 and T4 which can provide graphical proof of student movements during the course of the
exam.
3.8 Bribing the supervisor
Students can bribe the exam supervisor prior to the exam, so that when they do cheat, the supervisor will not
report them. This rarely happens, but the possibility cannot be ruled out. Another scenario involves a
supervisor catching the student cheating and the student tries to pay off the supervisor to stop him/her from
taking the matter further. Solutions proposed here are not DFR methods, but they can help too. Examples are:
▪ T12 - Rotating supervisors during the exam. Move away from the traditional method of using the
same supervisor for the whole exam and make sure three or more supervisors invigilate the same
exam, working in rotation.
▪ T13 - Assigning the supervisor for a specific exam a few minutes before the exam commences. This
will help reduce the opportunity for bribery, since the students will not know who will supervise what
exam until the last minute when it’s too late to bribe anyone.
Next we evaluate the proposed DFR techniques that can apply in different situations of online examination
fraud.
4 Evaluation
In this section, we consider the DFR techniques proposed earlier and evaluate them based on their difficulty
and cost of implementation, as well as how efficient a technique can be operated. We subsequently give each
technique a score. Table 1 shows the evaluation in detail. The values in the second to the fourth column
headings are meant to give a score of which technique is more efficient when particular factors are
considered. Under “Difficulty of implementation”, the highest value (3) means that the technique is hard to
implement, medium (2) means implementation is not so difficult, and low (1) means it can be implemented
easily. “Cost of implementation” is scored as “Yes (2)”, which means the technique is very expensive and “No
(1)” meaning the cost is reasonable. “Efficiency of operation” has three values: “Yes (1)” meaning the
technique is indeed efficient, “somewhat (2)” meaning it is not always reliable, and “No (3)” meaning the
technique is not efficient. The values in the “Score (total)” column are a result of the summation of each row.
A lower value in the last column is indicative of a better and more reliable technique. The table shows the
techniques sorted in ascending order, starting with the lowest value (highest-priority technique) to the highest
value (lowest-priority technique), and is explained in more detail later.
7. Table 1: Evaluation of our Proposed DFR Techniques
DFR Techniques
Difficulty of
Implementation
Cost of
implementation
Efficiency of
operation (Yes=1,
Somewhat=2,
No=3)
Score
(total)High
=3
Medium
=2
Low
=1
Yes =2 No =1
T2 - Key logging 1 1 1 3
T6 - Log browser activity 2 1 1 4
T3 - Use keystroke pattern
recognition to verify identity
2 1 1 4
T11 - Continuous
authentication
2 1 1 4
T1 - Record/ log pc activity,
e.g. process lists and
applications during the
course of the exam
1 2 1 4
T12 - Rotate supervisors
during the exam
1 1 2 4
T7 - Record mouse activity 1 1 2 4
T4 - Use spy cameras to
monitor/record pc activity
and student movements
2 2 1 5
T5 – Record background auto
screen
2 2 1 5
T9 - Use webcam to record
students’ identity to later
cross-reference with details
of registered student
2 2 1 5
T8 - Record/log all
information on
programmable devices before
the start of the exam
2 2 1 5
T13 - Assign supervisors for a
particular exam just before
the exam commences
3 1 1 5
T10 - Use identification
methods like fingerprints,
voice recognition, eye
scanning
3 2 1 6
The two techniques represented in italics in table 1 indicate the techniques that are not DFR techniques.
However, they can be digitally implemented, for instance T13 and T12 can be implemented by designing a
system that randomly assigns supervisors on a rotation basis. The two techniques were added as solutions
because we do not merely propose DFR solutions but we also intend to limit opportunities for students to
cheat in online exams.
A brief explanation is given of some of the techniques presented in table 1. This explanation can serve as a
guide to those intending to use any of the listed techniques in their online exam systems. However, due to
space constraints, only techniques T10, T8, T5, T4, T6 and T2 will be discussed in this paper. Two low-priority
techniques ‘T10 and T8’ were selected (T13 was skipped because it is not considered a DFR technique),
followed by two techniques with average priority ‘T5 and T4’, and two high-priority techniques ‘T6 and T2’.
The techniques are explained in the order mentioned, that is, from bottom up.
8. T10 (using identification methods like fingerprints, voice recognition, eye scanning) requires state-of-the-art
machines that are costly to buy and maintain, as qualified personnel are needed for monitoring purposes.
Implementing T10 is also difficult because of the labour involved, the cost of software to run the system and
the security aspects of the whole platform. Since the information gathered by means of this technique would
be needed for verification purposes at a later stage, the researchers cannot afford any compromise in the data
collected. The factors mentioned would impact negatively on the efficiency of this technique.
T8 (recording/logging all information on programmable devices before the start of the exam) requires
administrative labour and employees would have to be trained thoroughly on how to extract and preserve
digital data from hardware. Procuring such tools and the other expenses involved would make it costly to
implement this technique. In the long run, efficiency is affected if the wrong people or tools are used in the
process.
T4 (using spy cameras to monitor/record pc activity and student movements) would require high-resolution
cameras to record what is going on from a distance. Such cameras are expensive and use a lot of processing
power, large storage spaces and memory to function. Competent personnel would be required to install and
monitor them. However, if implemented, they would help a lot to provide graphical proof of what happened.
Difficulty to implement T5 (recording background auto screen) was rated “medium” because we believe
designing such an application does not require much in terms of labour. However, it requires a large amount of
processing power to keep the application running and satisfy its storage needs. This affects the overall cost of
this technique since one would have to purchase workstations with enough processing power and memory to
accommodate the recording application and not slow down or disrupt the progress of the exam.
T6 (logging browser activity) comes in second best among the presented techniques because of the kind of
data that is collected when this technique is implemented. Data collected from the web application is a good
source of potential information for DFR purposes. Implementing a browser logging application is relatively
easy when one has the right personnel and resources to collect and store such information. The technique is
not considered costly, since it does not require much labour to design and implement such an application.
T2 (key logging) is shown to be the most efficient technique among those presented in this paper, as it is easy
to implement when one has the right personnel to design an application suitable for your system. The key
logging application is also not considered very costly compared to other techniques presented here, yet it
captures most of the necessary information needed for readiness purposes.
5 Discussion
We looked at some of the ways how students commit exam fraud and discussed the circumstances in which
each one of them can occur. High-level DFR solutions were proposed as a way of being forensically ready in
case an investigation has to be conducted into exam fraud. Some of the solutions cover a wider scope, i.e. they
can be applied as DFR techniques in more than one situation.
The DFR techniques are well defined in each scenario, as well as how they can be used to capture DF
information that can be used as evidence in a disciplinary hearing.
The proposed solutions are evaluated based on the difficulty and cost of implementing the technique and in its
operating efficiency, and each technique is subsequently given a score obtained from the summation of values
in each row.
We intend in future to involve other stakeholders at academic institutions (such as higher-ranked
administrative staff members) to obtain their feedback concerning this area of study so as to make an even
more thorough scientific evaluation of the research problem that we identified in this study.
9. 6 Conclusions and Future Work
Every academic institution wants to find ways of stopping exam fraud and punishing students who are caught
breaking the institution’s rules and regulations pertaining to assessment. However, in many cases students
commit exam fraud and go unnoticed. Deploying the right DFR techniques would help an institution to be
prepared with enough credible information that is admissible in the case of a disciplinary hearing.
In this paper, we presented different methods students use to cheat in online exams and proposed high-level
DFR techniques that can be applied in each case. We later presented an evaluation of all these techniques,
based on their difficulty and cost of implementation and operating efficiency, and we calculated a score for
each. As part of our future work, we intend to come up with a model that can be used to incorporate some of
these techniques so that they can be applied to an online examination system and capture credible
information that will be relevant when a DF investigation into online exam fraud needs to be conducted.
References
The 10 most inventive cheating attempts on online exams [Online]. eSchoolMedia & eCampus News.
Available: http://www.ecampusnews.com/top-news/exams-online-cheating-400/.
How Students Cheat Online [Online]. Available: http://www.onlineschoolscenter.com/cheating-
online/.
ISO/IEC 27043:2015 [Online]. ISO. Available:
http://www.iso.org/iso/catalogue_detail.htm?csnumber=44407.
Online Diplomas and Degrees in Fraud Examination [Online]. Available:
http://study.com/online_diplomas_in_fraud_examination.html.
EXAMINERS, A. O. C. F. 2013. Understanding the Basics of Fraud Examination (Online Self-Study)
[Online]. ACFE. Available: http://www.acfe.com/products.aspx?id=2852.
FREIFELD, L. 2013. SECURING EXAMS AGAINST FRAUD [Online]. Available:
http://www.trainingmag.com/content/securing-exams-against-fraud.
GARAVALIA, L., OLSON, E., RUSSELL, E. & CHRISTENSEN, L. 2007. How do students cheat. Psychology
of academic cheating, 33-58.
GARFINKEL, S. L. 2010. Digital forensics research: The next 10 years. digital investigation, 7, S64-S73.
GIBBONS, A., MIZE, C. D. & ROGERS, K. L. 2002. That's My Story and I'm Sticking to It: Promoting
Academic Integrity in the Online Environment.
KING, C. G., GUYETTE JR, R. W. & PIOTROWSKI, C. 2009. Online Exams and Cheating: An Empirical
Analysis of Business Students' Views. Journal of Educators Online, 6, n1.
KOHN, M. D., ELOFF, M. M. & ELOFF, J. H. 2013. Integrated digital forensic process model. Computers
& Security, 38, 103-115.
MICROSOFT. 2015. Online proctored exams [Online]. Available:
https://www.microsoft.com/learning/en-za/online-proctored-exams.aspx.
RENARD, L. 1999. Cut and paste 101: Plagiarism and the net. Educational Leadership, 57, 38-42.
SCANLON, P. M. 2003. Student online plagiarism: how do we respond? College Teaching, 51, 161-
165.
WOOD, C. C., BANKS, W. W., GUARRO, S. B., GARCIA, A. A., HAMPEL, V. E. & SARTORIO, H. P. 1987.
Computer security: a comprehensive controls checklist, Wiley-Interscience.