|
|
x | |
Acknowledgements |
|
xi | |
|
|
1 | (18) |
|
|
4 | (1) |
|
What is different about e-cheating? |
|
|
5 | (2) |
|
Academic integrity, fraud, hacking and e-cheating |
|
|
7 | (1) |
|
An affordance-based taxonomy of e-cheating approaches |
|
|
8 | (9) |
|
Providing access to unauthorised information |
|
|
9 | (2) |
|
Cognitive offloading to a tool |
|
|
11 | (2) |
|
Outsourcing work to a person |
|
|
13 | (2) |
|
Disrupting the assessment process |
|
|
15 | (2) |
|
E-cheating: a significant problem, but what can we do about it? |
|
|
17 | (1) |
|
|
18 | (1) |
|
|
19 | (19) |
|
|
20 | (1) |
|
Two key features of assessment security |
|
|
21 | (3) |
|
|
21 | (1) |
|
|
22 | (2) |
|
(Im)perfect assessment security |
|
|
24 | (1) |
|
Approaches to improving assessment security |
|
|
25 | (11) |
|
Detection, evidence and penalties |
|
|
25 | (1) |
|
|
26 | (6) |
|
|
32 | (3) |
|
|
35 | (1) |
|
Problems with assessment security |
|
|
36 | (1) |
|
|
36 | (2) |
|
3 The E-Cheating lifecycle and how to disrupt it |
|
|
38 | (21) |
|
|
39 | (4) |
|
Students don't just find e-cheating; e-cheating finds students |
|
|
39 | (2) |
|
Review sites, discount codes and seduction |
|
|
41 | (1) |
|
|
42 | (1) |
|
Approaches for disrupting e-cheating awareness raising |
|
|
42 | (1) |
|
|
43 | (5) |
|
Contract cheating websites |
|
|
44 | (1) |
|
E-cheating hardware websites |
|
|
45 | (1) |
|
|
46 | (1) |
|
Large-scale e-commerce sites |
|
|
46 | (1) |
|
|
47 | (1) |
|
Approaches for disrupting e-cheating purchases |
|
|
47 | (1) |
|
|
48 | (4) |
|
Human cheating content production |
|
|
48 | (3) |
|
Computerised cheating content production |
|
|
51 | (1) |
|
Approaches for disrupting e-cheating content production |
|
|
51 | (1) |
|
Delivery, submission and after-sales care |
|
|
52 | (5) |
|
|
52 | (1) |
|
|
53 | (1) |
|
|
54 | (1) |
|
Approaches for disrupting e-cheating delivery, submission and after-sales care |
|
|
55 | (2) |
|
|
57 | (2) |
|
4 Cybersecurity, E-Cheating and assessment security |
|
|
59 | (11) |
|
|
59 | (2) |
|
Implications of cybersecurity for assessment security |
|
|
61 | (4) |
|
Cybersecurity depends on an adversarial mindset |
|
|
61 | (1) |
|
Assessment security has a harder authentication problem to solve than regular cybersecurity's authentication problem |
|
|
61 | (1) |
|
The contexts of assessment security impose some challenging constraints for security |
|
|
62 | (1) |
|
Assessment security depends on hardware security and software security |
|
|
62 | (1) |
|
Assessment security will always be imperfect, but that doesn't mean we shouldn't try |
|
|
63 | (1) |
|
Security through obscurity is not enough |
|
|
63 | (1) |
|
Once an expert makes software that can cheat, everybody can cheat |
|
|
64 | (1) |
|
Attack is easier than defence |
|
|
64 | (1) |
|
Attackers don't need to account for laws, policy, ethics, student rights or public opinion |
|
|
64 | (1) |
|
Improving assessment security through cybersecurity |
|
|
65 | (4) |
|
|
65 | (1) |
|
Disclosure and transparency |
|
|
66 | (2) |
|
|
68 | (1) |
|
Working with cybersecurity |
|
|
69 | (1) |
|
|
69 | (1) |
|
5 Lessons from E-Cheating in games and gambling |
|
|
70 | (13) |
|
|
70 | (3) |
|
|
73 | (2) |
|
Cheating in online gambling |
|
|
75 | (2) |
|
Anti-cheating technologies in games and gambling |
|
|
77 | (2) |
|
What lessons can we learn? |
|
|
79 | (3) |
|
Even with much bigger budgets, e-cheating cannot be completely defeated |
|
|
79 | (1) |
|
Schneier is right: once an expert writes software that can do something, anybody can do that something |
|
|
80 | (1) |
|
Honest players are a big asset in reducing cheating |
|
|
80 | (1) |
|
Anti-cheating technologies reify particular understandings of e-cheating |
|
|
80 | (1) |
|
Independent bodies can regulate and keep records on individuals that span contexts |
|
|
81 | (1) |
|
Some degree of secrecy and undercover operations is necessary to keep ahead of e-cheating |
|
|
81 | (1) |
|
Anti-cheating can be offered as a service |
|
|
82 | (1) |
|
To understand c-cheating's future, look to games and gambling |
|
|
82 | (1) |
|
|
82 | (1) |
|
6 E-Cheating, assessment security and artificial intelligence |
|
|
83 | (15) |
|
What AI is and what it can and cannot do |
|
|
83 | (2) |
|
|
85 | (5) |
|
AI can already meet some learning outcomes for students; do we still need to assess them? |
|
|
86 | (1) |
|
What if AI becomes so good at meeting outcomes for students that we can't spot it? |
|
|
87 | (2) |
|
Where is the boundary between AI help and AI cheating? |
|
|
89 | (1) |
|
AI for assessment security |
|
|
90 | (6) |
|
Can AI detect e-cheating? |
|
|
90 | (1) |
|
Can AI be the decision-maker? |
|
|
90 | (5) |
|
AI is imperfect but it scales well |
|
|
95 | (1) |
|
What will humans and machines need to do? |
|
|
96 | (1) |
|
|
97 | (1) |
|
7 Surveillance and the weaponisation of academic integrity |
|
|
98 | (10) |
|
Academic integrity, e-cheating, assessment security and surveillance culture |
|
|
99 | (1) |
|
Who will surveil students and to what end? |
|
|
100 | (2) |
|
Routine surveillance will catch too many |
|
|
102 | (1) |
|
Trust, surveillance and Ramification |
|
|
102 | (1) |
|
The future of surveillance is weaponisation |
|
|
103 | (1) |
|
Alternatives to surveillance |
|
|
104 | (1) |
|
|
105 | (2) |
|
|
107 | (1) |
|
8 Metrics and standards for assessment security |
|
|
108 | (20) |
|
The problems of metricless assessment security |
|
|
108 | (1) |
|
Difficulty to cheat metrics |
|
|
109 | (7) |
|
|
110 | (5) |
|
Limitations of cheating difficulty metrics |
|
|
115 | (1) |
|
Detection accuracy metrics |
|
|
116 | (3) |
|
Limitations of detection accuracy metrics |
|
|
119 | (1) |
|
|
119 | (1) |
|
Limitations of proof metrics |
|
|
120 | (1) |
|
|
120 | (2) |
|
Limitations of prevalence metrics |
|
|
122 | (1) |
|
Learning, teaching, assessment and student experience metrics |
|
|
122 | (2) |
|
Limitations of learning, teaching, assessment and student experience metrics |
|
|
123 | (1) |
|
Towards standards for assessment security |
|
|
124 | (2) |
|
|
126 | (2) |
|
9 Structuring and designing assessment for security |
|
|
128 | (13) |
|
Assessment design trumps assessment security |
|
|
128 | (2) |
|
Assessment design decisions |
|
|
130 | (2) |
|
What doesn't work in designing assessment for security |
|
|
132 | (1) |
|
Obvious mistakes that weaken assessment security |
|
|
133 | (2) |
|
Reusing the same assessment task |
|
|
133 | (1) |
|
Unsupervised online tests |
|
|
133 | (1) |
|
Take-home `one right answer' or lower-level tasks |
|
|
134 | (1) |
|
Poor examination practices |
|
|
134 | (1) |
|
Invigilation and assessment security |
|
|
135 | (1) |
|
Group work and assessment security |
|
|
135 | (1) |
|
Authentic restrictions and assessment security |
|
|
136 | (1) |
|
Programmatic assessment security |
|
|
137 | (1) |
|
Dialogic feedback and assessment security |
|
|
138 | (1) |
|
Random assessment security checks |
|
|
139 | (1) |
|
Assessment design and quality control processes |
|
|
139 | (1) |
|
|
140 | (1) |
|
10 Conclusion: Securing assessment against E-Cheating |
|
|
141 | (5) |
|
Focus on assessment security alongside academic integrity |
|
|
141 | (1) |
|
Take an affordance-based approach to understanding e-cheating, and a principles-based approach to stopping it |
|
|
142 | (1) |
|
Perfect is the enemy of good, so aim for incremental improvements |
|
|
143 | (1) |
|
Build a culture of Evidence and disclosure |
|
|
143 | (1) |
|
Resist assessment conservatism and assessment security theatre |
|
|
144 | (2) |
References |
|
146 | (18) |
Index |
|
164 | |