From: Continuous user identification in distance learning: a recent technology perspective
System properties/identified threats | ProctorU | Respondus | Proctorio | AIProctor | Kryterion | Examity | SMOWL |
---|---|---|---|---|---|---|---|
Security Measures | Face verification, live human proctor monitoring, unauthorized applications | Browser lockdown, IP tracking, flags suspicious behaviour for post-exam review | Gaze tracking, face detection, device monitoring | Live proctor monitoring, device monitoring | Keystroke and stylometry behavioural analysis, live human proctor monitoring | Face verification, live human proctor monitoring | Face verification, device monitoring, post-exam human proctor review, flags suspicious events in the users’ environment |
Integration with LMSs | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ |
Type of Application | Browser plugin, Windows and MacOS only | Browser plugin | Browser plugin | Mobile and Native, Windows, MacOS and Linux | Native, Windows and MacOS only | Web app | Web app and Native, Windows and MacOS only |
Student violating identification proofs | ✗ | ✗ | ✗ | ✗ | ✗ | ✓ | ✓ |
Student switching seats after identification | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ |
Non-legitimate person provides answers through shared LMS credentials | ✗ | ✗ | ✗ | ✗ | ✗ | ✗ | ✓ |
Computer mediated communication through voice or text-written chat | ✗ | ✓ | ✓ | ✓ | ✓ | ✗ | ✓ |
Computer mediated collaboration through screen sharing and control applications | ✗ | ✓ | ✓ | ✓ | ✓ | ✗ | ✓ |
Student access to forbidden online resources | ✗ | ✓ | ✓ | ✓ | ✓ | ✗ | ✓ |
Non-legitimate person providing answers on the student’s computer through the student’s main input device or a secondary input device | ✗ | ✗ | ✗ | ✗ | ✗ | ✗ | ✓ |
Student communicating/collaborating with another person within the same physical context | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ |
Non-legitimate person providing answers on a white board/computing device/hardcopy messages | ✗ | ✗ | ✗ | ✗ | ✗ | ✗ | ✓ |