The security of online assessments is a major concern due to widespread cheating. One common form of cheating is impersonation, where students invite unauthorized persons to take assessments on their behalf. Several techniques exist to handle impersonation. Some researchers recommend use of integrity policy, but communicating the policy effectively to the students is a challenge. Others propose authentication methods like, password and fingerprint; they offer initial authentication but are vulnerable thereafter. Face recognition offers post-login authentication but necessitates additional hardware. Keystroke Dynamics (KD) has been used to provide post-login authentication without any additional hardware, but its use is limited to subjective assessment. In this work, we address impersonation in assessments with Multiple Choice Questions (MCQ). Our approach combines two key strategies: reinforcement of integrity policy for prevention, and keystroke-based random authentication for detection of impersonation. To the best of our knowledge, it is the first attempt to use keystroke dynamics for post-login authentication in the context of MCQ. We improve an online quiz tool for the data collection suited to our needs and use feature engineering to address the challenge of high-dimensional keystroke datasets. Using machine learning classifiers, we identify the best-performing model for authenticating the students. The results indicate that the highest accuracy (83%) is achieved by the Isolation Forest classifier. Furthermore, to validate the results, the approach is applied to Carnegie Mellon University (CMU) benchmark dataset, thereby achieving an improved accuracy of 94%. Though we also used mouse dynamics for authentication, but its subpar performance leads us to not consider it for our approach.
DOCUMENT
(This is part I of a series of essays on meme theory. Part II is entitled Rude Awakening: Memes as Dialectical Images). Part III is called Memes and the Reactionary Totemism of the Theft of Joy)
MULTIFILE
Over many years we’ve been looking at the emergence of “organized networks” as an alternative concept that could counter the social media platform a priori of gathering (and then exploiting) “weak links.”[1] Organized networks invent new institutional forms whose dynamics, properties, and practices are internal to the operational logic of communication media and digital technologies. Their emergence is prompted, in part, by a wider social fatigue with and increasing distrust of traditional and modern institutions such as the church, political party, firm, and labour union, which maintain hierarchical modes of organization. While not without hierarchical tendencies (founders, technical architectures, centralized infrastructures, personality cults), organized networks tend to gravitate more strongly toward horizontal modes of communication, practice, and planning.
MULTIFILE