Design, Privacy and Authentication of Challenge Questions in Online Examinations

被引:0
|
作者
Ullah, Abrar [1 ]
Xiao, Hannan [1 ]
Lilley, Mariana [1 ]
Barker, Trevor [1 ]
机构
[1] Univ Hertfordshire, Sch Comp Sci, Hatfield AL10 9AB, Herts, England
关键词
challenge questions; online learning; online examination; usability; data privacy;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Online examination is an essential part of the online learning and secure authentication is considered vital for the success of online learning. This study is part of an ongoing research on student authentication approaches and the use of challenge questions in online examination authentication. This paper presents the results of an empirical study based on "Profile Based Authentication Framework" (PBAF), which uses challenge questions for student authentication in online examination. The PBAF uses challenge questions related to personal, academic and professional information. These questions inform the usability, security and privacy of PBAF authentication approach. The results presented here summarizes the impact of questions design on the usability based on data collected from challenge questions authentication and a post-experiment survey on the data privacy.
引用
收藏
页码:46 / 50
页数:5
相关论文
共 50 条
  • [41] Efficient privacy-preserving anonymous authentication scheme for human predictive online education system
    Jegadeesan, Subramani
    Obaidat, Mohammad S.
    Vijayakumar, Pandi
    Azees, Maria
    Karuppiah, Marimuthu
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2022, 25 (04): : 2557 - 2571
  • [42] Efficient privacy-preserving anonymous authentication scheme for human predictive online education system
    Subramani Jegadeesan
    Mohammad S. Obaidat
    Pandi Vijayakumar
    Maria Azees
    Marimuthu Karuppiah
    Cluster Computing, 2022, 25 : 2557 - 2571
  • [43] RASS: Enabling privacy-preserving and authentication in online AI-driven healthcare applications
    Liu, Jianghua
    Chen, Chao
    Qu, Youyang
    Yang, Shuiqiao
    Xu, Lei
    ISA TRANSACTIONS, 2023, 141 : 20 - 29
  • [44] PRIVACY AND AUTHENTICATION - INTRODUCTION TO CRYPTOGRAPHY
    DIFFIE, W
    HELLMAN, ME
    PROCEEDINGS OF THE IEEE, 1979, 67 (03) : 397 - 427
  • [45] Privacy Enhanced Mobile Authentication
    G. M. Køien
    Wireless Personal Communications, 2007, 40 : 443 - 455
  • [46] Achieve Efficient and Privacy-preserving Online Fingerprint Authentication over Encrypted Outsourced Data
    Wei, Qing
    Zhu, Hui
    Lu, Rongxing
    Li, Hui
    2017 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2017,
  • [47] PRIVACY PROTECTION FOR USER AUTHENTICATION
    Hajny, Jan
    Pelka, Tomas
    Zeman, Vaclav
    SECRYPT 2010: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2010, : 90 - 93
  • [48] Privacy and authentication protocols for PCS
    Mohan, S
    IEEE PERSONAL COMMUNICATIONS, 1996, 3 (05): : 34 - 38
  • [49] Anonymous authentication: For privacy and security
    Sako, Kazue
    Yonezawa, Shoko
    Teranishi, Isamu
    NEC Journal of Advanced Technology, 2005, 2 (01): : 79 - 83
  • [50] Privacy enhanced mobile authentication
    Koien, G. M.
    WIRELESS PERSONAL COMMUNICATIONS, 2007, 40 (03) : 443 - 455