• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 1
  • 1
  • Tagged with
  • 3
  • 3
  • 3
  • 2
  • 2
  • 2
  • 2
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

Regard sur la sécurité du processus dans les organisations utilisant ou non les TIC lors de l’évaluation

Côté, Caroline 05 1900 (has links)
La malhonnêteté académique au cours d’épreuves présente des enjeux importants quant à l’intégrité des évaluations. La présence des TIC étant de plus en plus importante en cours de passation dans les épreuves, il est important avec ce mode de récolte de données d’assurer un niveau de sécurité égal ou même supérieur à celui présent lorsqu’un mode de récolte de données traditionnel, le papier-crayon, est utilisé. Il existe plusieurs recherches sur l’utilisation des TIC dans l’évaluation, mais peu d’entre elles traitent des modalités de sécurité lors de l’utilisation des TIC. Dans ce mémoire, treize organisations québécoises ont été rencontrées: six qui utilisaient les TIC dans la passation, cinq qui utilisaient le papier-crayon dans la passation mais qui désiraient utiliser les TIC et deux qui utilisaient le papier-crayon et qui ne désiraient pas utiliser les TIC. Les organisations sont des établissements d’enseignement (primaire, secondaire, collégial, universitaire), des entreprises privées, des organismes gouvernementaux ou municipaux et des ordres professionnels. Des entrevues semi-structurées et une analyse qualitative par présence ou absence de différentes caractéristiques ont permis de documenter les modalités de sécurité liées à la récolte de données en vue de l’évaluation en utilisant les TIC. Ces modalités ont été comparées à celles utilisées lors de l’utilisation du papier-crayon dans la récolte de données en vue de l’évaluation afin de voir comment elles varient lors de l’utilisation des TIC. Les résultats révèlent que l’utilisation des TIC dans la passation complexifie et ajoute des étapes à la préparation des épreuves pour assurer un niveau de sécurité adéquat. Cependant elle permet également de nouvelles fonctions en ce qui concerne le type de questions, l’intégration de multimédia, l’utilisation de questions adaptatives et la génération aléatoire de l’épreuve qui permettent de contrer certaines formes de malhonnêteté académiques déjà présentes avec l’utilisation du papier-crayon dans la passation et pour lesquelles il était difficile d’agir. Toutefois, l’utilisation des TIC dans la passation peut aussi amener de nouvelles possibilités de malhonnêteté académique. Mais si ces dernières sont bien prises en considération, l’utilisation des TIC permet un niveau de sécurité des épreuves supérieur à celui où les données sont récoltées au traditionnel papier-crayon en vue de l’évaluation. / Academic dishonesty in assessments presents important issues regarding its integrity. The presence of ICT being increasingly important in the examinations, it is important with this method of data collection to ensure a level of safety equal to or even higher than the one present when the traditional method of collecting data, the paper and pencil, is used. There are several studies on the use of ICT in assessment, but few of them talks about the security arrangements in the use of ICT. In this study, thirteen Quebec’s organizations were encountered, six of them who used ICT in the assessment, five who used paper and pencil in the assessment but who wished to use ICT and two who used paper and pencil and did not wish to use ICT. The organizations are educational institutions (elementary, high school, college, university), private companies, government or municipal agencies and professional associations. Semi-structured interviews and a qualitative analysis by the presence or absence of different characteristics documented the security arrangements related to data collection for the assessment using ICT. These modalities were compared with those used when there is utilization of paper and pencil in the collection of data to see how they vary when using ICT. The results show that the use of ICT in the assessment makes it more complex and adds steps to the preparation of the examination to ensure an adequate level of security. However, it also allows new features regarding the type of questions, the integration of multimedia, the use of adaptive questions and random generation of test that can counter some forms of academic dishonesty already present with the use of paper and pencil in the assessment and for which it was difficult to act. However, the use of ICT in assessment can also bring new opportunities for academic dishonesty. If these are taken into consideration, the use of ICT allows a higher security level than the assessment where the data were collected with traditional paper-and-pencil.
2

Analýza vzdělávacích portálů na trhu České republiky. / Analysis of educational portals on the Czech market

Šejtka, Ondřej January 2010 (has links)
The thesis inquires into the area of electronic education in the form of educational portals. It aims to carry out a research of educational portals on the Czech market and subsequent analysis of the portals, which offer users the services for the support of education and schooling. The theoretical part of the thesis focuses on defining the terms of formal and non-formal education, describes examples of their usage. Furthermore, it deals with electronic education in the form of e-learning, defines e-learning from different points of view, and describes its historical development, forms and instruments. The work then analyses 17 portals, two of them in detail -- they represent both formal and non-formal education. The analysis offers information about portals' administrators, range of offered services as well as business models, used by the portals.
3

Security and usability of authentication by challenge questions in online examination

Ullah, Abrar January 2017 (has links)
Online examinations are an integral component of many online learning environments and a high-stake process for students, teachers and educational institutions. They are the target of many security threats, including intrusion by hackers and collusion. Collu-sion happens when a student invites a third party to impersonate him/her in an online test, or to abet with the exam questions. This research proposed a profile-based chal-lenge question approach to create and consolidate a student's profile during the learning process, to be used for authentication in the examination process. The pro-posed method was investigated in six research studies using a usability test method and a risk-based security assessment method, in order to investigate usability attributes and security threats. The findings of the studies revealed that text-based questions are prone to usability issues such as ambiguity, syntactic variation, and spelling mistakes. The results of a usability analysis suggested that image-based questions are more usable than text-based questions (p < 0.01). The findings identified that dynamic profile questions are more efficient and effective than text-based and image-based questions (p < 0.01). Since text-based questions are associated with an individual's personal information, they are prone to being shared with impersonators. An increase in the numbers of chal-lenge questions being shared showed a significant linear trend (p < 0.01) and increased the success of an impersonation attack. An increase in the database size decreased the success of an impersonation attack with a significant linear trend (p < 0.01). The security analysis of dynamic profile questions revealed that an impersonation attack was not successful when a student shared credentials using email asynchronously. However, a similar attack was successful when a student and impersonator shared information in real time using mobile phones. The response time in this attack was significantly different when a genuine student responded to his challenge questions (p < 0.01). The security analysis revealed that the use of dynamic profile questions in a proctored exam can influence impersonation and abetting. This view was supported by online programme tutors in a focus group study.

Page generated in 0.1994 seconds