Exploring a Solution for Secured High Stake Tests on Students’ Personal Devices | SpringerLink
Skip to main content

Exploring a Solution for Secured High Stake Tests on Students’ Personal Devices

  • Conference paper
  • First Online:
Technology Enhanced Assessment (TEA 2016)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 653))

Included in the following conference series:

  • 531 Accesses

Abstract

Digital testing requires software and hardware. A hardware option is to establish dedicated test halls. As an alternative, this paper describes a setup and first experiences of a pilot run on a proof of concept, to answer the questions: which conditions are needed to create a secure solution for high stake assessments via students’ personal devices (e.g., notebook from students)?

To answer this question, a proof of concept was run based on an outline of a Secure Test Environment Protocol (STEP). This STEP was based on three shells of security: Prevention, Detection and Reaction. Prevention concerns the technical solutions to prevent the use of unauthorized sources during tests. Detection concerns the risks (i.e., chance and impact) and the possibilities to detect unauthorized behavior and security issues. Reaction gives insight in requirements needed for an organization when students’ personal notebook are being used in taking high stake tests.

The preliminary conclusion from the proof of concept is that it is possible to use students’ personal notebook in secured high stake tests if a STEP - comprising three shells of security - has been implemented. Suggestions for further development are given.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
¥17,985 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
JPY 3498
Price includes VAT (Japan)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
JPY 5719
Price includes VAT (Japan)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
JPY 7149
Price includes VAT (Japan)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. SURF: Richtsnoer veilige digitale toetsafname [Guidebook secure digital assessment]. SURF, Utrecht, The Netherlands (2014)

    Google Scholar 

  2. SURF: Werkboek veilig toetsen [Workbook secure assessment]. SURF, Utrecht, The Netherlands (2016)

    Google Scholar 

  3. Bloothoofd, G., Hoiting, W., Russel, K.: Plagiaatbeleid aan de Universiteit Utrecht, faculteiten en opleidingen [Plagiarism prevention at the Utrecht University, departments and programs]. Utrecht, the Netherlands (2004)

    Google Scholar 

  4. Duggan, F.: Plagiarism: prevention, practice and policy. Assess. Eval. High. Educ. 31, 151–154 (2006). doi:10.1080/02602930500262452

    Article  Google Scholar 

  5. Park, C.: In other (people’s) words: plagiarism by university students - literature and lessons. Assess. Eval. High. Educ. 28, 471–488 (2003). doi:10.1080/02602930301677

    Article  Google Scholar 

  6. Van Meeuwen, L.W., Kraak, I.T.C.: TU/e Educational Fraud Policy. Eindhoven University of Technology, The Netherlands (2015)

    Google Scholar 

  7. Rienties, B., Arts, M.: Omgaan met plagiaat: Van intuïtie naar bewijs [Dealing with plagiarism: From intuition towards evidence]. Tijdschrift voor Hoger Onderwijs 4, 251–264 (2004)

    Google Scholar 

  8. Verhagen, F.: Mogelijkheden gecontroleerd digitaal toetsen [Possibilities secured digital assessment]. Eindhoven University of Technology, The Netherlands (2015)

    Google Scholar 

  9. SURF. Digitaal toetsen, ga er maar aan staan [Digital assessment, the challenges]. Utrecht, The Netherlands, December 2015. doi:https://www.surf.nl/agenda/2015/12/tweedaags-seminar-digitaal-toetsen-ga-er-maar-aan-staan/index.html

  10. Goossens, K.G.W., Koedam, M.L.P.J.: Fraud-resistant computerised examinations. ES Reports, Eindhoven University of Technology, The Netherlands (2016). doi:http://www.es.ele.tue.nl/esreports/esr-2015-03.pdf

  11. LaPiedra, J.: The information security process prevention, detection and response. Global Inf. Assur. Cert. Paper, 1–6 (2000). DOI:https://www.giac.org/paper/gsec/501/information-security-process-prevention-detection-response/101197

  12. Schneider, B.: The future of incident response. IEEE Comput. Reliab. Soc., 95–96 (2014). doi:https://www.schneier.com/blog/archives/2014/11/the_future_of_i.html

  13. Verhagen, F.P., De Hesselle, H.M.P.: Risicoanalyse digitaal toetsen via BYOD [Risk analysis digital assessment in BYOD]. Eindhoven University of Technology, The Netherlands (2016)

    Google Scholar 

  14. Van den Heuvel, R., Van Meeuwen, L.W., Verhagen, F.P.: Pilot beveiligd toetsen TU/e [Pilot secured assessment TU/e]. Working group pilot ‘secured assessment’. Eindhoven University of Technology, The Netherlands (2016)

    Google Scholar 

Download references

Acknowledgement

We wish to thank all colleagues and students who made it possible to run the pilots. In particular thank to prof. dr. Kees G.W. Goossens, ir. Martijn L.P.J. Koedam, Rob C. F. van den Heuvel, and ir. PDEng Huub M.P. de Hesselle for sharing their knowledge.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ludo W. Van Meeuwen .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Cite this paper

Van Meeuwen, L.W., Verhagen, F.P., Den Brok, P.J. (2017). Exploring a Solution for Secured High Stake Tests on Students’ Personal Devices. In: Joosten-ten Brinke, D., Laanpere, M. (eds) Technology Enhanced Assessment. TEA 2016. Communications in Computer and Information Science, vol 653. Springer, Cham. https://doi.org/10.1007/978-3-319-57744-9_15

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-57744-9_15

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-57743-2

  • Online ISBN: 978-3-319-57744-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics