Ensuring Security and Integrity of Data for Online Assessment

Ensuring Security and Integrity of Data for Online Assessment

Christine Armatas, Bernard Colbert
Copyright: © 2009 |Pages: 20
DOI: 10.4018/978-1-60566-410-1.ch006
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

Two challenges with online assessment are making sure data collected is secure and authenticating the data source. The first challenge relates to issues such as network security, robustness against attack and data management. The second is currently a significant impediment to widespread implementation of formal online assessment due to difficulties ensuring the identity of the person completing the assessment. In this chapter the authors discuss technical aspects associated with keeping data secure and the implications this has for delivering online assessment. The chapter also examines technologies that can assist with the issue of authenticating the identity of individuals completing online assessments and we provide some practical advice for those considering using online assessment tools. To conclude the chapter, the authors look at technologies likely to be available in the future and examine how these could be used to conduct online assessment that ensures data security and integrity without imposing an unreasonable burden on users.
Chapter Preview
Top

Background

Conversations about online assessment generally reveal two schools of thought. Supporters will often talk about the flexibility online assessment provides such that students are able to take a test anywhere and at any time (Cann, 2005; Engelbrecht & Harding, 2004). Or they mention the decreased administrative and marking overheads associated with online assessment as a significant benefit (James, McInnis, & Devlin, 2002; Nicol, 2007a). Online assessment tasks can also assist educators to assess a broader range of skills, provide students with different types of assessments, including ones not easily achieved using traditional assessments methods. They can also provide students with benefits such as timely and informative feedback on their progress, as well as teaching students new skills and ways of studying and learning (James, et al., 2002). The second group most frequently point to the difficulties associated with verifying the identity of the person taking an online test, or they express concerns about how to stop cheating and the problem with networks crashing during tests. They might also be understandably concerned with protecting the confidentiality of assessment material, wanting to be sure that assessment material is not accessed by unauthorized persons, that assessment data, including student responses and grades, are not altered. What is often missing in these vigorous and important discussions is an understanding of how technology can be used to address some of the very valid concerns associated with online assessment and what additional benefits it can provide if implemented appropriately.

Dependability is the key requirement for e-assessment according to Weippl (2007), which encompasses a number of factors including availability, reliability, safety, integrity, and maintainability. He stresses that when e-assessment is used for examinations, all these aspects of dependability become critical. The assessment needs to be available when it is required, so measures should be in place to prevent attacks on availability, which are referred to as Denial of Service (DoS) attacks. Not only must the service be available when required, but there needs to be continuity of the service. Before, during and after the exam the integrity of exam questions and materials, student responses and grades need to be ensured. Any system used to deliver an online exam needs to be safe and maintainable. The essentials of secured networks include having a proper network security policy, enforcing identification, confidentiality and integrity and implementing proper compliance monitoring mechanisms (von Solms & Marais, 2004).

Complete Chapter List

Search this Book:
Reset