Skip to main content

Table 2 Commercial proctoring systems

From: Continuous user identification in distance learning: a recent technology perspective

System properties/identified threats

ProctorU

Respondus

Proctorio

AIProctor

Kryterion

Examity

SMOWL

Security Measures

Face

verification,

live human

proctor

monitoring,

unauthorized

applications

Browser

lockdown,

IP tracking,

flags suspicious

behaviour for

post-exam

review

Gaze tracking,

face detection,

device

monitoring

Live proctor

monitoring, device

monitoring

Keystroke and

stylometry

behavioural

analysis,

live human

proctor

monitoring

Face

verification,

live human

proctor

monitoring

Face verification,

device monitoring,

post-exam human

proctor review,

flags suspicious

events in the

users’ environment

Integration with LMSs

✓

✓

✓

✓

✓

✓

✓

Type of Application

Browser plugin,

Windows and

MacOS only

Browser plugin

Browser plugin

Mobile and Native,

Windows, MacOS

and Linux

Native, Windows

and MacOS only

Web app

Web app and

Native, Windows

and MacOS

only

Student violating identification proofs

✗

✗

✗

✗

✗

✓

✓

Student switching seats after identification

✓

✓

✓

✓

✓

✓

✓

Non-legitimate person provides answers through shared LMS credentials

✗

✗

✗

✗

✗

✗

✓

Computer mediated communication through voice or text-written chat

✗

✓

✓

✓

✓

✗

✓

Computer mediated collaboration through screen sharing and control applications

✗

✓

✓

✓

✓

✗

✓

Student access to forbidden online resources

✗

✓

✓

✓

✓

✗

✓

Non-legitimate person providing answers on the student’s computer through the student’s main input device or a secondary input device

✗

✗

✗

✗

✗

✗

✓

Student communicating/collaborating with another person within the same physical context

✓

✓

✓

✓

✓

✓

✓

Non-legitimate person providing answers on a white board/computing device/hardcopy messages

✗

✗

✗

✗

✗

✗

✓