Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 3 |
Since 2016 (last 10 years) | 5 |
Since 2006 (last 20 years) | 5 |
Descriptor
Source
ACM Transactions on Computing… | 1 |
Assessment & Evaluation in… | 1 |
Interactive Technology and… | 1 |
International Journal of… | 1 |
Journal of Curriculum and… | 1 |
Author
Andreou, Margarita | 1 |
Becker, Benjamin | 1 |
Boyatt, Russell | 1 |
Cook, Beverley | 1 |
Cosma, Georgina | 1 |
Debeer, Dries | 1 |
Grambow, Steven C. | 1 |
Haas, Timothy C. | 1 |
He, Yunfan | 1 |
Jia, Jiyou | 1 |
Joy, Mike | 1 |
More ▼ |
Publication Type
Journal Articles | 5 |
Reports - Descriptive | 2 |
Reports - Research | 2 |
Reports - Evaluative | 1 |
Tests/Questionnaires | 1 |
Education Level
Higher Education | 5 |
Postsecondary Education | 5 |
Audience
Location
China | 1 |
China (Beijing) | 1 |
Cyprus | 1 |
United Kingdom | 1 |
Wisconsin | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Jia, Jiyou; He, Yunfan – Interactive Technology and Smart Education, 2022
Purpose: The purpose of this study is to design and implement an intelligent online proctoring system (IOPS) by using the advantage of artificial intelligence technology in order to monitor the online exam, which is urgently needed in online learning settings worldwide. As a pilot application, the authors used this system in an authentic…
Descriptors: Artificial Intelligence, Supervision, Computer Assisted Testing, Electronic Learning
Item Order and Speededness: Implications for Test Fairness in Higher Educational High-Stakes Testing
Becker, Benjamin; van Rijn, Peter; Molenaar, Dylan; Debeer, Dries – Assessment & Evaluation in Higher Education, 2022
A common approach to increase test security in higher educational high-stakes testing is the use of different test forms with identical items but different item orders. The effects of such varied item orders are relatively well studied, but findings have generally been mixed. When multiple test forms with different item orders are used, we argue…
Descriptors: Information Security, High Stakes Tests, Computer Security, Test Items
Troy, Jesse D.; Neely, Megan L.; Pomann, Gina-Maria; Grambow, Steven C.; Samsa, Gregory P. – Journal of Curriculum and Teaching, 2022
Student evaluation is a key consideration for educational program administrators because program success depends on students' ability to demonstrate successful development of core competencies. Student evaluations must therefore be aligned with learning objectives and overall program goals. Graduate level educational programs typically incorporate…
Descriptors: Student Evaluation, Evaluation Methods, Statistics Education, Alignment (Education)
Cosma, Georgina; Joy, Mike; Sinclair, Jane; Andreou, Margarita; Zhang, Dongyong; Cook, Beverley; Boyatt, Russell – ACM Transactions on Computing Education, 2017
Perspectives of students on what constitutes source-code plagiarism may differ based on their educational background. Surveys have been conducted with home students undertaking computing and joint computing subject degrees at higher education institutions throughout the UK, China, and South Cyprus, and a total of 984 responses have been…
Descriptors: Foreign Countries, College Students, Plagiarism, Student Attitudes
Haas, Timothy C. – International Journal of Distance Education Technologies, 2016
Before massive numbers of students can take online courses for college credit, the challenges of providing tutoring support, answers to student-posed questions, and the control of cheating will need to be addressed. These challenges are taken up here by developing an online course delivery system that runs in a cluster computing environment and is…
Descriptors: Online Courses, Educational Technology, Technology Uses in Education, Electronic Learning