Asian Journal of Information Technology
166 - 175
Al-Saleem, S.M. and H. Ullah, 2014. Security considerations and recommendations in computer-based testing. Sci. World J.,
Alavi, M. and D.E. Leidner, 2001. Research commentary: Technology-mediated learning, A call for greater depth and breadth of research. Inf. Syst. Res., 12: 1-10.Direct Link |
Anusha, S.N. and S.T. Soujanya, 2012. Efficient monitoring in online tests using ESDV method. Int. J. Comput. Sci. Inf. Technol., Vol. 4
Apampa, K.M., G. Wills and D. Argles, 2010. User security issues in summative e-assessment security. Int. J. Digital Soc., 1: 1-13.Direct Link |
Basu, A. and S. Muylle, 2003. Authentication in e-commerce. Commun. ACM., 46: 159-166.Direct Link |
Bellingham, L., 2008. Quality assurance and the use of subject level reference points in the UK. Qual. Higher Educ., 14: 265-276.CrossRef | Direct Link |
Bhagat, V. and V. Katankar, 2014. Novel method for student authentication in online examination. Int. J. Res., 1: 974-979.Direct Link |
Fayyoumi, A. and A. Zarrad, 2014. Novel solution based on face recognition to address identity theft and cheating in online examination systems. Adv. Internet Things, Vol. 2
Flior, E. and K. Kowalski, 2010. Continuous biometric user authentication in online examinations. Proceedings of the 7th International Conference on Information Technology: New Generations, April 12-14, 2010, Las Vegas, NV., USA., pp: 488-492.
Gao, Q., 2012. Biometric authentication to prevent e-cheating. Instructional Technol., Vol. 3
Gathuri, J.W., A. Luvanda, S. Matende and S. Kamundi, 2014. Impersonation challenges associated with e-assessment of university students. J. Inf. Eng. Appl., 4: 60-68.Direct Link |
Ives, B., K.R. Walsh and H. Schneider, 2004. The domino effect of password reuse. Commun. ACM., 47: 75-78.Direct Link |
King, C.G., R.W. Guyette and C. Piotrowski, 2009. Online exams and cheating: An empirical analysis of business students' views. J. Educ. Online, Vol. 6.
Kitchenham, B. and S. Charters, 2007. Guidelines for performing systematic literature reviews in software engineering. Joint Technical Report Software Engineering Group, Dept. of Computer Science, Keele University, UK and Empirical Software Engineering, National ICT, Australia, pp: 45-56.
Ko, C.C. and C.D. Cheng, 2004. Secure Internet examination system based on video monitoring. Internet Res., 14: 48-61.Direct Link |
Ko, C.C. and C.D. Cheng, 2008. Flexible and secure computer-based assessment using a single zip disk. Comput. Educ., 50: 915-926.CrossRef | Direct Link |
Kumlander, D., 2008. Soft Biometrical Students Identification Method for E-Learning. In: Advances in Computer and Information Sciences and Engineering. Sobh, T. (Ed.). Springer, Netherlands, pp: 114-118.
Levy, Y. and M.M. Ramim, 2007. A theoretical approach for biometrics authentication of e-exams. Proceedings of the Chais Conference on Instructional Technologies Research, February 20, 2007, Raanana, Israel, pp: 93-101.
Marcialis, G.L., F. Roli and D. Muntoni, 2009. Group-specific face verification using soft biometrics. J. Visual Lang. Compu., 20: 101-109.CrossRef | Direct Link |
Moten, Jr.J., A. Fitterer, E. Brazier, J. Leonard and A. Brown, 2013. Examining online college cyber cheating methods and prevention measures. Electron. J. e-Learn., 11: 139-146.Direct Link |
Penteado, B.E. and A.N. Marana, 2006. A Video-Based Biometric Authentication for e-Learning Web Applications. In: Enterprise Information Systems. Filipe, J. and J. Cordeiro (Eds.). Springer, Berlin, Heidelberg, Germany, ISBN: 978-3-642-01346-1, pp: 770-779.
Ramu, T. and T. Arivoli, 2013. A framework of secure biometric based online exam authentication: An alternative to traditional exam. Int. J. Sci. Eng. Res., Vol. 4
Rao, N.S.S., P. Harshita, S. Dedeepya and P. Ushashree, 2011. Cryptography-analysis of enhanced approach for secure online exam process plan. Int. J. Comput. Sci. Telecommun., 2: 52-57.Direct Link |
Rowe, N.C., 2004. Cheating in online student assessment: Beyond plagiarism. Online J. Distance Learn. Administration, Vol.7
Rudrapal, D., S. Das, S. Debbarma, N. Kar and N. Debbarma, 2012. Voice recognition and authentication as a proficient biometric tool and its application in online exam for PH people. Int. J. Comput. Appl., 39: 6-12.
Sabbah, Y., I. Saroit and A. Kotb, 2011. An Interactive and Secure E-Examination Unit (ISEEU): A proposed model for proctoring online exams. Proceedings of the 10th Roedunet International Conference (RoEduNet), June 23-25, 2011, Romania, pp: 1-5.
Sabbah, Y., I.A. Saroit and A. Kotb, 2012. A Smart Approach for Bimodal Biometrics in Home-exams (SABBAH model). CIIT Int. J. Biometrics Bioinf., 4: 32-45.
Saevanee, H., N.L. Clarke and S.M. Furnell, 2012. Multi-Modal Behavioural Biometric Authentication for Mobile Devices. In: Information Security and Privacy Research. Gritzalis, D., S. Furnell and M. Theoharidou (Eds.). Springer, Berlin Heidelberg, Germany, pp: 465-474.
Sarrayrih, M.A. and M. Ilyas, 2013. Challenges of online exam, performances and problems for online university exam. Int. J. Comput. Sci. Issues, Vol. 10
Sheshadri, R., T.C. Reddy and N.A. Kumar, 2013. Web-based-secure Online Non-choice-based Examination System (WONES) using cryptography. J. Discrete Math. Sci. Cryptography, 15: 353-368.Direct Link |
Takahashi, Y., T. Abiko, E. Negishi, G. Itabashi, Y. Kato, K. Takahashi and N. Shiratori, 2005. An ontology-based e-learning system for network security. Int. Conf. Adv. Inform. Networking Appl., 1: 197-202.CrossRef |
Ullah, A., H. Xiao, M. Lilley and T. Barker, 2012. Using challenge questions for student authentication in online examination. Int. J. Inf., Vol. 5
Zviran, M. and Z. Erlich, 2006. Identification and authentication: technology and implementation issues. Commun. Assoc. Inf. Syst., Vol. 17