From: Continuous user identification in distance learning: a recent technology perspective
System properties/identified threats | PS Zhang et al. (2016) | PS Khlifi and El-Sabagh (2017) | PS Musambo and Phiri (2018) | PS Monaco et al. (2013) | PS Atoum et al. (2017) | PS Fenu et al. (2018) |
---|---|---|---|---|---|---|
Security Measures | Face Verification, Real-time face tracking for behaviour analysis | Knowledge and behaviour based Verification | Face Verification, QR code authentication | Keystroke and stylometry behavioural analysis | User verification, text detection, voice detection, active window detection, gaze estimation and phone detection | Face, voice, touch, mouse and keystroke verification |
Integration with LMSs | ✗ | ✗ | ✗ | ✗ | ✗ | ✓ |
Type of Application | Not specified | MATLAB Script | Web app | Not specified | Native, Windows only | Web app and mobile |
Student violating identification proofs | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ |
Student switching seats after identification | ✓ | ✓ | ✗ | ✗ | ✓ | ✓ |
Non-legitimate person provides answers through shared LMS credentials | ✗ | ✗ | ✗ | ✗ | ✗ | ✗ |
Computer mediated communication through voice or text-written chat | ✗ | ✗ | ✗ | ✗ | ✓ | ✓ |
Computer mediated collaboration through screen sharing and control applications | ✗ | ✗ | ✗ | ✗ | ✗ | ✗ |
Student access to forbidden online resources | ✗ | ✗ | ✗ | ✗ | ✓ | ✗ |
Non-legitimate person providing answers on the student’s computer through the student’s main input device or a secondary input device | ✗ | ✗ | ✗ | ✗ | ✗ | ✗ |
Student communicating/collaborating with another person within the same physical context | ✗ | ✗ | ✗ | ✗ | ✓ | ✗ |
Non-legitimate person providing answers on a white board/computing device/hard-copy messages | ✗ | ✗ | ✗ | ✗ | ✓ | ✗ |