Skip to main content

Table 1 Research-oriented proctoring systems

From: Continuous user identification in distance learning: a recent technology perspective

System properties/identified threats

PS Zhang et al. (2016)

PS Khlifi and El-Sabagh (2017)

PS Musambo and Phiri (2018)

PS  Monaco et al. (2013)

PS Atoum et al. (2017)

PS Fenu et al. (2018)

Security Measures

Face Verification,

Real-time face

tracking for

behaviour analysis

Knowledge and

behaviour based

Verification

Face Verification,

QR code

authentication

Keystroke and

stylometry

behavioural

analysis

User verification,

text detection,

voice detection,

active window

detection, gaze

estimation and phone

detection

Face, voice, touch,

mouse and keystroke

verification

Integration with LMSs

✗

✗

✗

✗

✗

✓

Type of Application

Not specified

MATLAB Script

Web app

Not specified

Native, Windows only

Web app

and mobile

Student violating identification proofs

✓

✓

✓

✓

✓

✓

Student switching seats after identification

✓

✓

✗

✗

✓

✓

Non-legitimate person provides answers through shared LMS credentials

✗

✗

✗

✗

✗

✗

Computer mediated communication through voice or text-written chat

✗

✗

✗

✗

✓

✓

Computer mediated collaboration through screen sharing and control applications

✗

✗

✗

✗

✗

✗

Student access to forbidden online resources

✗

✗

✗

✗

✓

✗

Non-legitimate person providing answers on the student’s computer through the student’s main input device or a secondary input device

✗

✗

✗

✗

✗

✗

Student communicating/collaborating with another person within the same physical context

✗

✗

✗

✗

✓

✗

Non-legitimate person providing answers on a white board/computing device/hard-copy messages

✗

✗

✗

✗

✓

✗

  1. PS stands for Proctoring System