Atjaunināt sīkdatņu piekrišanu

E-grāmata: Defending Assessment Security in a Digital World: Preventing E-Cheating and Supporting Academic Integrity in Higher Education

  • Formāts: 178 pages
  • Izdošanas datums: 26-Oct-2020
  • Izdevniecība: Routledge
  • Valoda: eng
  • ISBN-13: 9781000201000
Citas grāmatas par šo tēmu:
  • Formāts - PDF+DRM
  • Cena: 45,07 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Ielikt grozā
  • Pievienot vēlmju sarakstam
  • Šī e-grāmata paredzēta tikai personīgai lietošanai. E-grāmatas nav iespējams atgriezt un nauda par iegādātajām e-grāmatām netiek atmaksāta.
  • Formāts: 178 pages
  • Izdošanas datums: 26-Oct-2020
  • Izdevniecība: Routledge
  • Valoda: eng
  • ISBN-13: 9781000201000
Citas grāmatas par šo tēmu:

DRM restrictions

  • Kopēšana (kopēt/ievietot):

    nav atļauts

  • Drukāšana:

    nav atļauts

  • Lietošana:

    Digitālo tiesību pārvaldība (Digital Rights Management (DRM))
    Izdevējs ir piegādājis šo grāmatu šifrētā veidā, kas nozīmē, ka jums ir jāinstalē bezmaksas programmatūra, lai to atbloķētu un lasītu. Lai lasītu šo e-grāmatu, jums ir jāizveido Adobe ID. Vairāk informācijas šeit. E-grāmatu var lasīt un lejupielādēt līdz 6 ierīcēm (vienam lietotājam ar vienu un to pašu Adobe ID).

    Nepieciešamā programmatūra
    Lai lasītu šo e-grāmatu mobilajā ierīcē (tālrunī vai planšetdatorā), jums būs jāinstalē šī bezmaksas lietotne: PocketBook Reader (iOS / Android)

    Lai lejupielādētu un lasītu šo e-grāmatu datorā vai Mac datorā, jums ir nepieciešamid Adobe Digital Editions (šī ir bezmaksas lietotne, kas īpaši izstrādāta e-grāmatām. Tā nav tas pats, kas Adobe Reader, kas, iespējams, jau ir jūsu datorā.)

    Jūs nevarat lasīt šo e-grāmatu, izmantojot Amazon Kindle.

"This book explores the phenomenon of e-cheating and identifies ways to bolster assessment to ensure that it is secured against threats posed by geographically distributed assessments, computer-based examinations, anonymous online communications and online cheating services. It advances the concept of 'assessment security', proposing metrics for measurement and strategies for improvement. The book takes a multi-disciplinary approach, drawing together perspectives from educational assessment, academic integrity, cybersecurity, learning analytics, game studies and criminology, to provide practitioners in higher education with a guide to managing and improving assessment security"--

Defending Assessment Security in a Digital World explores the phenomenon of e-cheating and identifies ways to bolster assessment to ensure that it is secured against threats posed by technology.

Taking a multi-disciplinary approach, the book develops the concept of assessment security through research from cybersecurity, game studies, artificial intelligence and surveillance studies. Throughout, there is a rigorous examination of the ways people cheat in different contexts, and the effectiveness of different approaches at stopping cheating. This evidence informs the development of standards and metrics for assessment security, and ways that assessment design can help address e-cheating. Its new concept of assessment security both complements and challenges traditional notions of academic integrity.

By focusing on proactive, principles-based approaches, the book equips educators, technologists and policymakers to address both current e-cheating as well as future threats.

List of Tables
x
Acknowledgements xi
1 E-Cheating
1(18)
Defining e-cheating
4(1)
What is different about e-cheating?
5(2)
Academic integrity, fraud, hacking and e-cheating
7(1)
An affordance-based taxonomy of e-cheating approaches
8(9)
Providing access to unauthorised information
9(2)
Cognitive offloading to a tool
11(2)
Outsourcing work to a person
13(2)
Disrupting the assessment process
15(2)
E-cheating: a significant problem, but what can we do about it?
17(1)
Things to do
18(1)
2 Assessment security
19(19)
What is assessment?
20(1)
Two key features of assessment security
21(3)
Authentication
21(1)
Control of circumstances
22(2)
(Im)perfect assessment security
24(1)
Approaches to improving assessment security
25(11)
Detection, evidence and penalties
25(1)
Technology
26(6)
Assessment design
32(3)
Legal approaches
35(1)
Problems with assessment security
36(1)
Things to do
36(2)
3 The E-Cheating lifecycle and how to disrupt it
38(21)
Awareness raising
39(4)
Students don't just find e-cheating; e-cheating finds students
39(2)
Review sites, discount codes and seduction
41(1)
`Free' e-cheating
42(1)
Approaches for disrupting e-cheating awareness raising
42(1)
Purchasing
43(5)
Contract cheating websites
44(1)
E-cheating hardware websites
45(1)
Gig economy websites
46(1)
Large-scale e-commerce sites
46(1)
Dark web
47(1)
Approaches for disrupting e-cheating purchases
47(1)
Content production
48(4)
Human cheating content production
48(3)
Computerised cheating content production
51(1)
Approaches for disrupting e-cheating content production
51(1)
Delivery, submission and after-sales care
52(5)
Delivery
52(1)
Submission
53(1)
After-sales care
54(1)
Approaches for disrupting e-cheating delivery, submission and after-sales care
55(2)
Things to do
57(2)
4 Cybersecurity, E-Cheating and assessment security
59(11)
Cybersecurity basics
59(2)
Implications of cybersecurity for assessment security
61(4)
Cybersecurity depends on an adversarial mindset
61(1)
Assessment security has a harder authentication problem to solve than regular cybersecurity's authentication problem
61(1)
The contexts of assessment security impose some challenging constraints for security
62(1)
Assessment security depends on hardware security and software security
62(1)
Assessment security will always be imperfect, but that doesn't mean we shouldn't try
63(1)
Security through obscurity is not enough
63(1)
Once an expert makes software that can cheat, everybody can cheat
64(1)
Attack is easier than defence
64(1)
Attackers don't need to account for laws, policy, ethics, student rights or public opinion
64(1)
Improving assessment security through cybersecurity
65(4)
Penetration testing
65(1)
Disclosure and transparency
66(2)
Working with students
68(1)
Working with cybersecurity
69(1)
Things to do
69(1)
5 Lessons from E-Cheating in games and gambling
70(13)
Cheating in online games
70(3)
Cheating in esports
73(2)
Cheating in online gambling
75(2)
Anti-cheating technologies in games and gambling
77(2)
What lessons can we learn?
79(3)
Even with much bigger budgets, e-cheating cannot be completely defeated
79(1)
Schneier is right: once an expert writes software that can do something, anybody can do that something
80(1)
Honest players are a big asset in reducing cheating
80(1)
Anti-cheating technologies reify particular understandings of e-cheating
80(1)
Independent bodies can regulate and keep records on individuals that span contexts
81(1)
Some degree of secrecy and undercover operations is necessary to keep ahead of e-cheating
81(1)
Anti-cheating can be offered as a service
82(1)
To understand c-cheating's future, look to games and gambling
82(1)
Things to do
82(1)
6 E-Cheating, assessment security and artificial intelligence
83(15)
What AI is and what it can and cannot do
83(2)
AI for e-cheating
85(5)
AI can already meet some learning outcomes for students; do we still need to assess them?
86(1)
What if AI becomes so good at meeting outcomes for students that we can't spot it?
87(2)
Where is the boundary between AI help and AI cheating?
89(1)
AI for assessment security
90(6)
Can AI detect e-cheating?
90(1)
Can AI be the decision-maker?
90(5)
AI is imperfect but it scales well
95(1)
What will humans and machines need to do?
96(1)
Things to do
97(1)
7 Surveillance and the weaponisation of academic integrity
98(10)
Academic integrity, e-cheating, assessment security and surveillance culture
99(1)
Who will surveil students and to what end?
100(2)
Routine surveillance will catch too many
102(1)
Trust, surveillance and Ramification
102(1)
The future of surveillance is weaponisation
103(1)
Alternatives to surveillance
104(1)
Living with surveillance
105(2)
Things to do
107(1)
8 Metrics and standards for assessment security
108(20)
The problems of metricless assessment security
108(1)
Difficulty to cheat metrics
109(7)
Cost to cheat
110(5)
Limitations of cheating difficulty metrics
115(1)
Detection accuracy metrics
116(3)
Limitations of detection accuracy metrics
119(1)
Proof Metrics
119(1)
Limitations of proof metrics
120(1)
Prevalence metrics
120(2)
Limitations of prevalence metrics
122(1)
Learning, teaching, assessment and student experience metrics
122(2)
Limitations of learning, teaching, assessment and student experience metrics
123(1)
Towards standards for assessment security
124(2)
Things to do
126(2)
9 Structuring and designing assessment for security
128(13)
Assessment design trumps assessment security
128(2)
Assessment design decisions
130(2)
What doesn't work in designing assessment for security
132(1)
Obvious mistakes that weaken assessment security
133(2)
Reusing the same assessment task
133(1)
Unsupervised online tests
133(1)
Take-home `one right answer' or lower-level tasks
134(1)
Poor examination practices
134(1)
Invigilation and assessment security
135(1)
Group work and assessment security
135(1)
Authentic restrictions and assessment security
136(1)
Programmatic assessment security
137(1)
Dialogic feedback and assessment security
138(1)
Random assessment security checks
139(1)
Assessment design and quality control processes
139(1)
Things to do
140(1)
10 Conclusion: Securing assessment against E-Cheating
141(5)
Focus on assessment security alongside academic integrity
141(1)
Take an affordance-based approach to understanding e-cheating, and a principles-based approach to stopping it
142(1)
Perfect is the enemy of good, so aim for incremental improvements
143(1)
Build a culture of Evidence and disclosure
143(1)
Resist assessment conservatism and assessment security theatre
144(2)
References 146(18)
Index 164
Phillip Dawson leads research into academic integrity at the Centre for Research in Assessment and Digital Learning (CRADLE), at Deakin University in Melbourne, Australia. He uses his background in assessment and cybersecurity to protect education from cheating. His work involves unorthodox methods like computer hacking and paying professional cheaters.