Open Access
Subscription Access
Remotely View user Activities and Impose Rules and Penalties in a Local Area Network Environment
Monitoring whether a student is opening other files other than the allowed file/s during an examination period is really a challenging task. The art of cheating in a written examination is also pertinent to a computer-based examination. Since the proctor is not at all time looking at the student’s computer activities, students still have the chance to open restricted applications. In this hurdle, developing a system that will send to the proctor’s machine the list and screenshots of the classified computer programs accessed in every student machine in real-time is beneficial. This system will detect the deceitful act through a warning message. If the act is not discontinued, the student machine will be penalized by either be locked, restarted, shutdown, sleep, or hibernate depending on the penalty set by the proctor. Furthermore, this system also records the student attendance during digital exams or as the students log-on to their machine.
Keywords
Impose Penalties to Machine, Monitor Restricted Files or Documents, LAN, Remote Access, Computer Activities, Cheating Detection.
User
Font Size
Information
- T. Vendlinksi and R. Stevens, "Assessing Student Problem-Solving Skills With Complex ComputerBased Tasks," The Journal of Technology, Learning and Assessment, vol. 1, no. 3, 2002.
- F. Rogers, "FACULTY PERCEPTIONS ABOUT E-CHEATING DURING," Journal of Computing Sciences in Colleges, vol. 22, no. 2, pp. 206-212, 2006.
- R. Baker and R. Papp, "Academic integrity violation in the digital realm," in Southern Association for Information Systems 2003 Annual Conference, 2003.
- J. L. EPSTEIN and S. B. SHELDON, "Present and Accounted for: Improving Student Attendance Through Family and Community Involvement," The Journal of Educational Research, vol. 95, no. 5, pp. 308-318, 2002.
- Shailendra, M. Singh, A. Khan, V. Singh, A. Patil and S. Wadar, "Attendance Management System," in Electronics and Communication Systems (ICECS), 2015 2nd International Conference on. IEEE, 2015.
- S. Chuang Li.United States Patent US 2004/0260801 A1, 2004.
- L. A. H. Tsung-Yen Dean Chang, S. Chuang Li and F. Bo Xiong.U.S. Patent 10/366,028, 2004.
- C. Zezhen Huang, "TRUSTED COMPUTER ACTIVITY MONITORING AND RECORDING SYSTEM AND METHOD". United States Patent US 2006/0041760 A1, 23 Feb 2006.
- B. J. Gould and S. D. Rudnik, "Computer Activity Monitoring System". United States Patent US006065138A, 16 May 2000.
- K. Jalali1 and F. Noorbehbahani, "An Automatic Method for Cheating Detection in Online Exams by Processing the Student`s Webcam Images," in 3rd Conference on Electrical and Computer Engineering Technology (E-Tech 2017), Tehran, Iran, 2017.
- P. Rajan, P. Nimisha and G. Mona, "Online Students‘ Attendance Monitoring System in Classroom Using Radio Frequency Identification Technology: A Proposed System Framework," International Journal of Emerging Technology and Advanced Engineering, vol. 2, no. 2, pp. 61-66, 2012.
- K. Finkenzeller, RFID Handbook: Radio-Frequency Identification Fundamentals and Applications, New York: Wiley, 2000.
- C. Tetsuro Motoyama and C. V. Avery Fong.United States Patent US 2002/0152292 A1, 2002.
- M. Roughan, "A Case Study of the Accuracy of SNMP Measurements," Journal of Electrical and Computer Engineering, 2010.
- T. L. Harris, -J. Peyton, J. R. Howell and J. R. Douceur.United States Patent US 7,716,249 B2, 2010.
- R. Siddaway, PowerShell and WMI, Manning, 2012.
- The PHP Group, "PHP," The PHP Group. [Online].
Abstract Views: 335
PDF Views: 194