e-Authentication system in cyber security
ABSTARCT :
Authenticating the students’ identity and authenticity of their work is increasingly important to reduce academic malpractices and for quality assurance purposes in Education.
There is a growing body of research about technological innovations to combat cheating and plagiarism. However, the literature is very limited on the impact of e-authentication systems across distinctive end-users because it is not a widespread
practice at the moment. A considerable gap is to understand whether the use of eauthentication systems would increase trust on e-assessment, and to extend, whether students’ acceptance would vary across gender, age and previous experiences.
This study aims to shed light on this area by examining the attitudes and experiences of 328 students who used an authentication system known as adaptive trust-based e-assessment system for learning (TeSLA).
EXISTING SYSTEM :
European research on the impact of policies for plagiarism in higher education highlighted an increasing level of student plagiarism and cheating (Bermingham, Watson, & Jones, 2010; IPPHEAE, 2013; Park, 2004; QAA, 2016).
The amount of plagiarism and cheating in highstakes assessments has increased with the introduction of e-assessments (Harmon & Lambrinos, 2008; Underwood & Szabo, 2003).
This means that the authentication of student digital identities has become especially important for reducing cheating in online distance education (Chew, Ding, & Rowell, 2015).
Cheating in online assessments has been examined at various levels. For example, Harmon and Lambrinos’ study (2008) investigated whether online examinations are an invitation to cheat and found that more mature students who have their direct experience or working with academics are less likely to cheat. This group were also found to be more open to eauthentication systems, believing that they will assure the quality of the online assessment and will contribute to a satisfactory assessment experience
DISADVANTAGE :
Complexity: Setting up and maintaining an e-Authentication system can be complex and resource-intensive. It requires integration with existing systems, careful management of digital certificates, and continuous updates to address vulnerabilities.
Cost: There are substantial costs associated with implementing and maintaining e-Authentication systems. This includes initial setup costs, ongoing maintenance, training staff, and upgrading technologies as security threats evolve.
User Experience: Depending on the implementation, e-Authentication systems can sometimes lead to a poor user experience. Processes such as multi-factor authentication (MFA) or biometric verification may be perceived as cumbersome or time-consuming by users.
Privacy Concerns: Collecting and storing personal information for authentication purposes raises privacy concerns. There is a risk of data breaches or misuse of personal information if the authentication system is compromised.
PROPOSED SYSTEM :
Meanwhile, Underwood and Szabo (2003) highlight an interrelationship between gender, frequency of internet usage and maturity of students, and an individuals’ willingness to commit academic offences.
Their study, which focused on UK students, found that new undergraduates are more likely to cheat and plagiarise than students in later years of their degree. Finally, here, Okada, Mendonca, and Scott (2015) stressed that reliable examinations, credible technologies and authentic assessments are key issues for quality assurance (reducing cheating) in formative and summative assessments.
Students can easily cheat on the internet by texting answers, cutting-pasting ideas without attribution or purchasing professionally written essays and claim as their own original work.
One way of addressing this problem is the use of new technologies and promote more authentic assessments as advocated (Whitelock, 2011).
ADVANTAGE :
Enhanced Security: E-Authentication systems bolster security by requiring users to verify their identities through multiple factors such as passwords, biometrics, or hardware tokens. This reduces the risk of unauthorized access, data breaches, and identity theft.
Protection Against Credential Theft: Traditional password-based systems are vulnerable to credential theft through techniques like phishing. E-Authentication systems, especially those using multi-factor authentication (MFA), provide an additional layer of security that makes it significantly harder for attackers to compromise accounts.
Compliance Requirements: Many industries and jurisdictions have regulatory requirements for securing user data and implementing strong authentication measures. E-Authentication systems help organizations meet these compliance standards, avoiding legal and financial penalties.
User Convenience: While there may be initial resistance, modern e-Authentication systems are designed to balance security with user convenience. Technologies such as biometrics or one-time passwords (OTPs) simplify the authentication process, making it quicker and easier for users to access their accounts securely.
|