Securing Bring-Your-Own-Device (BYOD) Programming Exams

被引:5
|
作者
Kurniawan, Oka [1 ]
Lee, Norman Tiong Seng [1 ]
Poskitt, Christopher M. [1 ,2 ]
机构
[1] Singapore Univ Technol & Design, Singapore, Singapore
[2] Singapore Management Univ, Singapore, Singapore
关键词
Programming exams; BYOD exams; lockdown browsers; learning management systems; cloud-based IDEs; plagiarism prevention;
D O I
10.1145/3328778.3366907
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Traditional pen and paper exams are inadequate for modern university programming courses as they are misaligned with pedagogies and learning objectives that target practical coding ability. Unfortunately, many institutions lack the resources or space to be able to run assessments in dedicated computer labs. This has motivated the development of bring-your-own-device (BYOD) exam formats, allowing students to program in a similar environment to how they learnt, but presenting instructors with significant additional challenges in preventing plagiarism and cheating. In this paper, we describe a BYOD exam solution based on lockdown browsers, software which temporarily turns students' laptops into secure workstations with limited system or internet access. We combine the use of this technology with a learning management system and cloud-based programming tool to facilitate conceptual and practical programming questions that can be tackled in an interactive but controlled environment. We reflect on our experience of implementing this solution for a major undergraduate programming course, highlighting our principal lesson that policies and support mechanisms are as important to consider as the technology itself.
引用
收藏
页码:880 / 886
页数:7
相关论文
共 50 条
  • [11] Security Policy Opt-in Decisions in Bring-Your-Own-Device (BYOD) - A Persuasion and Cognitive Elaboration Perspective
    Yang, Xue
    Wang, Xinwei
    Yue, Wei Thoo
    Sia, Choon Ling
    Luo, Xin
    [J]. JOURNAL OF ORGANIZATIONAL COMPUTING AND ELECTRONIC COMMERCE, 2019, 29 (04) : 274 - 293
  • [12] Securing the "Bring Your Own Device" Paradigm
    Armando, Alessandro
    Costa, Gabriele
    Verderame, Luca
    Merlo, Alessio
    [J]. COMPUTER, 2014, 47 (06) : 48 - 56
  • [13] Charting Your Organization's Bring-Your-Own-Device Voyage
    Steelman, Zachary R.
    Lacity, Mary
    Sabherwal, Rajiv
    [J]. MIS QUARTERLY EXECUTIVE, 2016, 15 (02) : 85 - 104
  • [14] The bring-your-own-device dilemma [Resources-At Work]
    Ackerman, Elise
    [J]. IEEE Spectrum, 2013, 50 (08)
  • [15] The "Bring Your Own Device" (BYOD) Security Metrics Taxonomy
    Zulkefli, Zakiah
    Singh, Manmeet Mahinderjit
    [J]. ADVANCED SCIENCE LETTERS, 2018, 24 (11) : 8582 - 8590
  • [16] Understanding employees' adoption of the Bring-Your-Own-Device (BYOD): the roles of information security-related conflict and fatigue
    Chen, Hao
    Li, Ying
    Chen, Lirong
    Yin, Jin
    [J]. JOURNAL OF ENTERPRISE INFORMATION MANAGEMENT, 2021, 34 (03) : 770 - 792
  • [17] Bring-Your-Own-Device: Turning Cell Phones into Forces for Good
    Imazeki, Jennifer
    [J]. JOURNAL OF ECONOMIC EDUCATION, 2014, 45 (03): : 240 - 250
  • [18] The bring-your-own-device unintended administrator: A perspective from Zimbabwe
    Musarurwa, Alfred
    Flowerday, Stephen
    Cilliers, Liezel
    [J]. ELECTRONIC JOURNAL OF INFORMATION SYSTEMS IN DEVELOPING COUNTRIES, 2019, 85 (04):
  • [19] Enabling Bring-Your-Own-Device using mobile application instrumentation
    Castro, P. C.
    Ligman, J. W.
    Pistoia, M.
    Ponzo, J.
    Thomas, G. S.
    Wood, S. P.
    Baluda, M.
    [J]. IBM JOURNAL OF RESEARCH AND DEVELOPMENT, 2013, 57 (06)
  • [20] An information security behavioural model for the bring-your-own-device trend
    Musarurwa, Alfred
    Flowerday, Stephen
    Cilliers, Liezel
    [J]. SOUTH AFRICAN JOURNAL OF INFORMATION MANAGEMENT, 2018, 20 (01):