Publication Date
| In 2026 | 0 |
| Since 2025 | 0 |
| Since 2022 (last 5 years) | 0 |
| Since 2017 (last 10 years) | 0 |
| Since 2007 (last 20 years) | 2 |
Descriptor
| Computer Security | 3 |
| Testing Problems | 3 |
| Computer Assisted Testing | 2 |
| Integrity | 2 |
| Testing | 2 |
| Achievement Tests | 1 |
| Best Practices | 1 |
| Cheating | 1 |
| Computer System Design | 1 |
| Confidentiality | 1 |
| Database Design | 1 |
| More ▼ | |
Author
| Alier, Marc | 1 |
| Altun, Halis | 1 |
| Averitt, Jason | 1 |
| Haddad, Hatem | 1 |
| Kaiiali, Mustafa | 1 |
| Ozkaya, Armagan | 1 |
| Shermis, Mark D. | 1 |
Publication Type
| Reports - Descriptive | 2 |
| Guides - Non-Classroom | 1 |
| Journal Articles | 1 |
| Speeches/Meeting Papers | 1 |
Education Level
| Elementary Secondary Education | 1 |
Audience
Location
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Kaiiali, Mustafa; Ozkaya, Armagan; Altun, Halis; Haddad, Hatem; Alier, Marc – IEEE Transactions on Learning Technologies, 2016
M-learning has enhanced the e-learning by making the learning process learner-centered. However, enforcing exam security in open environments where each student has his/her own mobile/tablet device connected to a Wi-Fi network through which it is further connected to the Internet can be one of the most challenging tasks. In such environments,…
Descriptors: Electronic Learning, Computer System Design, Computer Security, Confidentiality
National Council on Measurement in Education, 2012
Testing and data integrity on statewide assessments is defined as the establishment of a comprehensive set of policies and procedures for: (1) the proper preparation of students; (2) the management and administration of the test(s) that will lead to accurate and appropriate reporting of assessment results; and (3) maintaining the security of…
Descriptors: State Programs, Integrity, Testing, Test Preparation
Shermis, Mark D.; Averitt, Jason – 2001
The purpose of this paper is to enumerate a series of security steps that might be taken by those researchers or organizations that are contemplating Web-based tests and performance assessments. From a security viewpoint, much of what goes on with Web-based transactions is similar to other general computer activity, but the recommendations here…
Descriptors: Computer Assisted Testing, Computer Security, Performance Based Assessment, Testing Problems

Peer reviewed
Direct link
