View the Horizon
We've explored several options in this section of tools that are in widespread use. Other technologies, however, already exist and many others just over the horizon though not yet in widespread use in student authentication. Some of these include:
- Acxiom Identify-X uses data from public databases to create challenge questions that only the learner would know, such as previous addresses or how many bathrooms their home has, rather than asking for verification information such as favorite color or name of the high school the individual attended.
- Keystroke analysis, such as TypeWATCH, senses, then learns from how a user types, what pressure is used on keys, and the rhythm used when typing certain key patterns.
- Facial recognition, such as that provided by StereoVision Imaging, maps users' facial characteristics.
- DigitalPersona uses fingerprint biometrics to authenticate through a fingerprint reader on the user's desk.
- Smart cards are physical objects that a user possesses. At the time of authentication, the user must use the smart card in conjunction with a pre-assigned personal identification number (PIN) to obtain access to a network or computer.
- Other technologies such as retina and iris scans and voice, signature, and voice analyzers are also here today.
The benefits of these technologies, of course, are their accuracy and the difficulties in impersonation. The disadvantages in addition to cost are privacy concerns that have not yet been thoroughly explored. In addition, other disadvantages to faculty may be the necessity of the institution subscribing to and supporting these additional technologies.
Summary
This section presented several techniques and tools that you can use to increase your confidence that the learner who is submitting assignments and tests is, in fact, the individual who enrolled in your course. The section concluded with a brief introduction of more sophisticated tools, such as biometric software, that are just over the horizon. While no method or tool is foolproof, using a well-rounded educational tool kit will decrease the likelihood that learners will resort to fraudulent learning practices.
The section will conclude with a short-self-learning quiz followed by resources that you can explore as you have time.
The next section will discuss issues surrounding time.