Research Article
BibTex RIS Cite

E-Öğrenme ve E-Sınavlar: Çevrimiçi Ölçme Değerlendirme Süreçlerinde Kimlik Doğrulama Yöntemlerine İlişkin Öğrenen Görüşlerinin İncelenmesi

Year 2018, Volume: 14 Issue: 2, 745 - 755, 31.08.2018
https://doi.org/10.17860/mersinefd.357339

Abstract

Uzaktan
eğitimde çevrimiçi öğrenme ortamlarıyla beraber bu ortamlarda yapılan sınavlar
da yaygınlaşmaktadır. Kimlik doğrulama yöntemleri çevrimiçi sınav güvenliğini
arttırmasına rağmen, öğrenenlerin biyometrik/kişisel bilgilerinin ve kişisel
nesnelerin kullanılmasından dolayı hassas süreçleri içermektedir. Bundan dolayı
çevrimiçi sınavlarda kullanılan kimlik doğrulama yöntemlerinin daha fazla
incelenmesine yönelik bir ihtiyaç vardır. Bu bağlamda bu çalışmada uzaktan
öğrenenlerin bakış açısıyla çevrimiçi sınavlarda kullanılabilecek kimlik
doğrulama yöntemlerine ilişkin öğrenen görüşleri incelenmiştir. Kesitsel tarama
modelinde 186 uzaktan öğrenenle gerçekleştirilen bu çalışmada çevrimiçi
sınavlarda hangi kimlik doğrulama yöntemlerinin daha güvenilir bulunduğuna
ilişkin soruya yanıt aranmıştır. Araştırma bulgularına göre katılımcıların
biyometrik ve bilgi tabanlı kimlik doğrulama yöntemlerini daha güvenilir
bulduğu yönünde görüş bildirdikleri belirlenmiş; ancak çevrimiçi sınavlarda
yapılan bu tür kimlik doğrulama yöntemlerine karşı güven konusunda
kararsızların yüzdesinin de çok olduğu görülmüştür.

References

  • Aggrawal, N. (2012). Authentication Methods: A Review. Productivity, 52(4), 243–248.
  • Allen, I. E., & Seaman, J. (2008). Staying the Course: Online Education in the United States, 2008. Sloan Consortium.
  • Alwi, N. H. M., & Fan, I. S. (2010). Threats analysis for e-learning. International Journal of Technology Enhanced Learning, 2(4), 358-371.
  • Asha, S., & Chellappan, C. (2008, April). Authentication of e-learners using multimodal biometric technology. In Biometrics and Security Technologies, 2008. ISBAST 2008. International Symposium (pp. 1-6). IEEE.
  • Bhagat, V. B. (2014). Student authentication framework for online examination using visual cryptography. International Journal for Research in Applied Science and Engineering Technology, 2(7), 316-319.
  • Chandra, A., & Calderon, T. G. (2003). Toward a biometric security layer in accounting systems. Journal of Information Systems, 17(2), 51-70.
  • Chapman K., Davis R., Toy D., & Wright, L. (2004). Academic Integrity in the Business School Environment: I’ll Get by with a Little Help from My Friends. Journal of Marketing Education, 26, 236-249.
  • Creswell, J. W. (2004). Educational Research: Planning, Conducting, and Evaluating Quantitative and Qualitative Research. Pearson.
  • Flior, E., & Kowalski, K. (2010, April). Continuous biometric user authentication in online examinations. In Information Technology: New Generations (ITNG), 2010 Seventh International Conference (pp. 488-492). IEEE.
  • Furnell, S. (2007). An assessment of website password practices. Computers & Security, 26(7-8), 445-51.
  • Gao, Q. (2012). Biometric authentication to prevent e-cheating. International Journal of Instructional Technology and Distance Learning, 9(2), 3-14.
  • Gunasekaran, A., McNeil, R. D., & Shaul, D. (2002). E-learning: Research and applications. Industrial and Commercial Training, 34(2), 44-54.
  • Hillier, M. (2014). The very idea of e-Exams: student (pre) conceptions. In Australasian Society for Computers in Learning in Tertiary Education Conference. Ascilite.
  • Jung, I. Y., & Yeom, H. Y. (2009). Enhanced security for online exams using group cryptography. IEEE transactions on Education, 52(3), 340-349.
  • Keskin, Ö. G. K., & Güneş, A. (2015). Online sınav sistemlerinde güvenlik sorunları ve güvenli online sınav giriş uygulaması. Eğitim ve Öğretim Araştırmaları Dergisi, 4(4), 48-54.
  • King, C., Guyette, R., & Piotrowski, C. (2009). Online exams and cheating: An empirical analysis of business students’ views. The Journal of Educators Online, 6(1).
  • Lanier, M. (2006). Academic Integrity and Distance Learning. Journal of Criminal Justice Education, 17(2), 244-261.
  • Levy, Y., & Ramim, M. (2007). A theoretical approach for biometrics authentication of e-exams. In Chais Conference on Instructional Technologies Research (pp. 93–101), The Open University of Israel, Raanana, Israel.
  • Levy, Y., Ramim, M. M., Furnell, S. M., & Clarke, N. L. (2011). Comparing intentions to use university-provided vs vendor-provided multibiometric authentication in online exams. Campus-Wide Information Systems, 28(2), 102-113.
  • Lin, C. H. S., & Wen, L. Y. M. (2007). Academic dishonesty in higher education—a nationwide study in Taiwan. Higher Education, 54(1), 85-97.
  • Özen, Z. (2016). Kimlik doğrulaması için tuş vuruş dinamiklerine dayalı bir güvenlik sisteminin yapay sinir ağları ile geliştirilmesi. Yayınlanmamış Doktora Tezi. İstanbul Üniversitesi, Fen Bilimleri Enstitüsü, Enformatik Anabilim Dalı.
  • Parker, D. (2010). Our excessively simplistic information security model and how to fix it. ISSA Journal, 12-21.
  • Ramim, M., & Levy, Y. (2006). Securing e-learning systems: A case of insider cyber attacks and novice IT management in a small university. Journal of Cases on Information Technology, 8(4), 24-34.
  • Ramu, T., & Arivoli, T. (2013). A framework of secure biometric based online exam authentication: an alternative to traditional exam. Int J Sci Eng Res, 4(11), 52-60.
  • Schneier, B. (2003). Beyond Fear: Thinking Sensibly About Security in an Uncertain World. New York: Springer.
  • Sindre, G., & Vegendla, A. (2015). E-exams versus paper exams: A comparative analysis of cheating-related security threats and countermeasures. Norsk informasjonssikkerhetskonferanse (NISK), 8(1), 34-45.
  • Sungkur, R. K., Beekoo, I., & Bhookhun, D. L. (2013, September). An enhanced mechanism for the authentication of students taking online exams. In AFRICON, 2013 (pp. 1-5). IEEE.
  • Varol, A., & Karabatak, M. (2002). Çevrimiçi Uzaktan Eğitimde Sınav Otomasyonu, II. Uluslararası Eğitim Teknolojileri Sempozyumu ve Fuarı (16-18 Ekim 2002).
  • Whitman, M. E., & Mattord, H. J. (2011). Principles of information security. Cengage Learning.
Year 2018, Volume: 14 Issue: 2, 745 - 755, 31.08.2018
https://doi.org/10.17860/mersinefd.357339

Abstract

References

  • Aggrawal, N. (2012). Authentication Methods: A Review. Productivity, 52(4), 243–248.
  • Allen, I. E., & Seaman, J. (2008). Staying the Course: Online Education in the United States, 2008. Sloan Consortium.
  • Alwi, N. H. M., & Fan, I. S. (2010). Threats analysis for e-learning. International Journal of Technology Enhanced Learning, 2(4), 358-371.
  • Asha, S., & Chellappan, C. (2008, April). Authentication of e-learners using multimodal biometric technology. In Biometrics and Security Technologies, 2008. ISBAST 2008. International Symposium (pp. 1-6). IEEE.
  • Bhagat, V. B. (2014). Student authentication framework for online examination using visual cryptography. International Journal for Research in Applied Science and Engineering Technology, 2(7), 316-319.
  • Chandra, A., & Calderon, T. G. (2003). Toward a biometric security layer in accounting systems. Journal of Information Systems, 17(2), 51-70.
  • Chapman K., Davis R., Toy D., & Wright, L. (2004). Academic Integrity in the Business School Environment: I’ll Get by with a Little Help from My Friends. Journal of Marketing Education, 26, 236-249.
  • Creswell, J. W. (2004). Educational Research: Planning, Conducting, and Evaluating Quantitative and Qualitative Research. Pearson.
  • Flior, E., & Kowalski, K. (2010, April). Continuous biometric user authentication in online examinations. In Information Technology: New Generations (ITNG), 2010 Seventh International Conference (pp. 488-492). IEEE.
  • Furnell, S. (2007). An assessment of website password practices. Computers & Security, 26(7-8), 445-51.
  • Gao, Q. (2012). Biometric authentication to prevent e-cheating. International Journal of Instructional Technology and Distance Learning, 9(2), 3-14.
  • Gunasekaran, A., McNeil, R. D., & Shaul, D. (2002). E-learning: Research and applications. Industrial and Commercial Training, 34(2), 44-54.
  • Hillier, M. (2014). The very idea of e-Exams: student (pre) conceptions. In Australasian Society for Computers in Learning in Tertiary Education Conference. Ascilite.
  • Jung, I. Y., & Yeom, H. Y. (2009). Enhanced security for online exams using group cryptography. IEEE transactions on Education, 52(3), 340-349.
  • Keskin, Ö. G. K., & Güneş, A. (2015). Online sınav sistemlerinde güvenlik sorunları ve güvenli online sınav giriş uygulaması. Eğitim ve Öğretim Araştırmaları Dergisi, 4(4), 48-54.
  • King, C., Guyette, R., & Piotrowski, C. (2009). Online exams and cheating: An empirical analysis of business students’ views. The Journal of Educators Online, 6(1).
  • Lanier, M. (2006). Academic Integrity and Distance Learning. Journal of Criminal Justice Education, 17(2), 244-261.
  • Levy, Y., & Ramim, M. (2007). A theoretical approach for biometrics authentication of e-exams. In Chais Conference on Instructional Technologies Research (pp. 93–101), The Open University of Israel, Raanana, Israel.
  • Levy, Y., Ramim, M. M., Furnell, S. M., & Clarke, N. L. (2011). Comparing intentions to use university-provided vs vendor-provided multibiometric authentication in online exams. Campus-Wide Information Systems, 28(2), 102-113.
  • Lin, C. H. S., & Wen, L. Y. M. (2007). Academic dishonesty in higher education—a nationwide study in Taiwan. Higher Education, 54(1), 85-97.
  • Özen, Z. (2016). Kimlik doğrulaması için tuş vuruş dinamiklerine dayalı bir güvenlik sisteminin yapay sinir ağları ile geliştirilmesi. Yayınlanmamış Doktora Tezi. İstanbul Üniversitesi, Fen Bilimleri Enstitüsü, Enformatik Anabilim Dalı.
  • Parker, D. (2010). Our excessively simplistic information security model and how to fix it. ISSA Journal, 12-21.
  • Ramim, M., & Levy, Y. (2006). Securing e-learning systems: A case of insider cyber attacks and novice IT management in a small university. Journal of Cases on Information Technology, 8(4), 24-34.
  • Ramu, T., & Arivoli, T. (2013). A framework of secure biometric based online exam authentication: an alternative to traditional exam. Int J Sci Eng Res, 4(11), 52-60.
  • Schneier, B. (2003). Beyond Fear: Thinking Sensibly About Security in an Uncertain World. New York: Springer.
  • Sindre, G., & Vegendla, A. (2015). E-exams versus paper exams: A comparative analysis of cheating-related security threats and countermeasures. Norsk informasjonssikkerhetskonferanse (NISK), 8(1), 34-45.
  • Sungkur, R. K., Beekoo, I., & Bhookhun, D. L. (2013, September). An enhanced mechanism for the authentication of students taking online exams. In AFRICON, 2013 (pp. 1-5). IEEE.
  • Varol, A., & Karabatak, M. (2002). Çevrimiçi Uzaktan Eğitimde Sınav Otomasyonu, II. Uluslararası Eğitim Teknolojileri Sempozyumu ve Fuarı (16-18 Ekim 2002).
  • Whitman, M. E., & Mattord, H. J. (2011). Principles of information security. Cengage Learning.
There are 29 citations in total.

Details

Primary Language Turkish
Subjects Studies on Education
Journal Section Makaleler
Authors

Aras Bozkurt 0000-0002-4520-642X

Hasan Uçar

Publication Date August 31, 2018
Published in Issue Year 2018 Volume: 14 Issue: 2

Cite

APA Bozkurt, A., & Uçar, H. (2018). E-Öğrenme ve E-Sınavlar: Çevrimiçi Ölçme Değerlendirme Süreçlerinde Kimlik Doğrulama Yöntemlerine İlişkin Öğrenen Görüşlerinin İncelenmesi. Mersin Üniversitesi Eğitim Fakültesi Dergisi, 14(2), 745-755. https://doi.org/10.17860/mersinefd.357339

Cited By









The content of the Mersin University Journal of the Faculty of Education is licensed under Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.