Google scholar arxiv informatics ads IJAIS publications are indexed with Google Scholar, NASA ADS, Informatics et. al.

Call for Paper

-

November Edition 2021

International Journal of Applied Information Systems solicits high quality original research papers for the November 2021 Edition of the journal. The last date of research paper submission is October 15, 2021.

Biometry, Encryption and Spyware (BES): A Multi-factor Security and Authentication Mechanism for JAMB E-Examination

Amadi Rapheal Sunday, Ismaila Idris, Hussaini Abubakar Zubairu, Stella Oluyemi Etuk, Idris Mohammed Kolo in Security

International Journal of Applied Information Systems
Year of Publication:2020
Publisher: Foundation of Computer Science (FCS), NY, USA
Authors:Amadi Rapheal Sunday, Ismaila Idris, Hussaini Abubakar Zubairu, Stella Oluyemi Etuk, Idris Mohammed Kolo
10.5120/ijais2020451878
Download full text
  1. Amadi Rapheal Sunday, Ismaila Idris, Hussaini Abubakar Zubairu, Stella Oluyemi Etuk and Idris Mohammed Kolo. Biometry, Encryption and Spyware (BES): A Multi-factor Security and Authentication Mechanism for JAMB E-Examination. International Journal of Applied Information Systems 12(32):17-26, August 2020. URL, DOI BibTeX

    @article{10.5120/ijais2020451878,
    	author = "Amadi Rapheal Sunday and Ismaila Idris and Hussaini Abubakar Zubairu and Stella Oluyemi Etuk and Idris Mohammed Kolo",
    	title = "Biometry, Encryption and Spyware (BES): A Multi-factor Security and Authentication Mechanism for JAMB E-Examination",
    	journal = "International Journal of Applied Information Systems",
    	issue_date = "August 2020",
    	volume = 12,
    	number = 32,
    	month = "August",
    	year = 2020,
    	issn = "2249-0868",
    	pages = "17-26",
    	url = "http://www.ijais.org/archives/volume12/number32/1096-2020451878",
    	doi = "10.5120/ijais2020451878",
    	publisher = "Foundation of Computer Science (FCS), NY, USA",
    	address = "New York, USA"
    }
    

Abstract

Electronic examination is the innovation of assessing students electronically. In recent times, it has gain popularity and acceptance. The gradual acceptance and popularity of electronic examination was underscored by its benefits. However, e-examination security has been considered a major challenge in e-learning, in which malpractices-free e-examination seems elusive. Collusion, online assistance, surfing the Internet and remote sharing of desktop are security threat to the current JAMB’s e-examination. This paper proposes an e-exam system using a multi-factor security and authentication mechanism. Biometry, Encryption and Spyware (BES) are adopted to enhance security and authentication of JAMB’s electronic examination. Biometrics are used for authentication, Encryption for the security of the data and the databases and Spyware for e-monitoring. The proposed system addresses the security and authentication lapses of the existing JAMB’s online examination. Evaluation of the system was performed in term of impersonation, accessing the Internet or remote sharing of desktop to assess the security and authentication effectiveness of the proposed system. The evaluation shows a promising results towards addressing authentication and security issues in the JAMB’s online e-exam.

Reference

  1. Al-Hakeem, M. S. & Abdulrahman, M.S (2017). Developing a New e-Exam Platform to Enhance the University Academic Examinations: the Case of Lebanese French University, International .Journal of Modern Education and Computer Science, 5(1), 9-16
  2. Ann, B., & Kannammal, A. (2014). Information Security Modelling in An E-learning Environment. International Journal of Computer Science, 11(1), 23 -29.
  3. Alwi, N.H.M., & Fan, I. (2010). E-Learning and Information Security Management, International Journal of Digital Society (IJDS), 1(2), 148-156
  4. Baller, M., Lukandu, A. & Radwan, A. (2015). Improving Learning Throughput in E-learning using Interactive-Cognitive Based Assessment. The International Journal of E-learning and Educational Technologies in the Digital Media (IJEETDM) 1(1); 32-49.
  5. Baller, M., Lukandu, A. & Radwan, A. (2015). Reversed Roulette Wheel Selection Algorithms (RWSA) and Reinforcement Learning (RL) for Personalizing and Improving E-learning System: The case study and its implementation. The International Journal of E-learning and Educational Technologies in the Digital Media (IJEETDM) 1(2); 92-108.
  6. Bobde, S., Chaudhari, S. Golguri, J. & Shahane, R. (2017). Web Based Online Examination System, Global Research and Development Journal for Engineering, 2(5), 58- 61
  7. Farid, S. Alam, M., XQaiser, M., Haq, A. A. U. & Itmazi, J. (2017). Security Threats and Measures in E-learning in Pakistan: A Review, Technical Journal, University of Engineering and Technology (UET) Taxila, Pakistan, 22(3), 98-107.
  8. Frank, A. J. (2010). Dependable Distributed Testing – Can the Online Proctor be reliably computerized. In: Proc. International Conference on e-Business (ICE-B), Athens.
  9. Furnell, S. M., & Karweni, T. (2001). Security issues in Online Distance Learning, VINE. The Journal of Information and Knowledge Management Systems, 31(2), 28- 35
  10. Ismail, H. M. & Soye, M. (2018). Biometric Enabled Computer-Based Testing System (CBT) With Advanced Encryption Standard (AES), Journal of Emerging Technologies and Innovative Research, 5(8),579- 585
  11. Jegatha D. L., Karthika, R., Vijayakumar, P., Rawal, B.S. & Wang, Y. (n.d).Secure Online Examination System for e-learning
  12. Kitahara, R., Westfall, F., & Mankelwicz, J. (2011). New, multi-faceted hybrid approaches to ensuring academic integrity. Journal of Academic and Business Ethics, 3(1), 1–12.
  13. Maity,P., Patil, S., Pednekar,P. , Sawant4, A. & Rupnar, M. (2018). Online Examination System, International Research Journal of Engineering and Technology (IRJET), 5(3), 1956 – 1957
  14. Meletiou, G.I., Voyiatzis, V. & Sgouropoulou, C. (2012). Design and Implementation of an e-exam system based on the Android platform, In: Proc. 16th Panhellenic Conference on Informatics.
  15. Naveen, J. M., Kumar, G. P. Mukhilan, V, Manoj Prasad, T Ramasamy, & Harini N. (2018). Multi-factor authentication scheme for online examination, International Journal of Pure and Applied Mathematics, 119(15), 1705-1712
  16. Osang, F. (2012). Electronic Examination in Nigeria, Academic Staff Perspective—Case Study: National Open University of Nigeria (NOUN). International Journal of Information and Education Technology, 2(4), 304 – 307.
  17. Ramim, M., & Levy, Y. (2006). Securing e-learning systems: A case of insider cyber-attacks and novice IT management in a small university. Journal of Cases on Information Technology, 8(4), 24-34.
  18. Sarjiyus, O. (2019). Securing Computer Based Testing (CBT) System for Tertiary Institutions in Nigeria Asian Journal of Research in Computer Science, 3(3): 1-16.
  19. Singh, U. G. (2015). Solving the ‘Riddel’ of e-Assessment: Student perceptions. The International Journal of E-learning and Educational Technologies in the Digital Media (IJEETDM), 1(3); 142-153.
  20. Swathi P. S., Narayanan, A. & Bijlani, K. (2016). ”An Intelligent System for Online Exam Monitoring” in Information Science (ICIS), International Conference, 2016
  21. Traoré, I., Nakkabi, Y. , Saad, S. Sayed, B., J.D. Ardigo & de Faria Quinan, P.M. (2017). Ensuring Online Exam Integrity Through Continuous Biometric Authentication, Information Security Practices, Springer International Publishing, DOI 10.1007/978-3-319-48947-6_6, 73 – 81.
  22. Treenantharath, T., & Sutheebanjard, P. (2013). Secure Online Exams on Thin Client. In: Proc. 11th International Conference on ICT and Knowledge Engineering (ICT&KE).
  23. Ullah, A., Xiao, H. & Barker, T. (2019). A study into the usability and security implications of text and image based challenge questions in the context of online examination, Educational Informational Technology, 24(1),:13–39.
  24. Wong, T.-K., Xie, H., Zou, D., Wang, F. L., Tai Tang, J. K., & Kong, A.(2019). How to facilitate self-regulated learning? A case study on open educational resources. Journal of Computers in Education. https://doi.org/10.1007/s40692-019-00138-4.
  25. Zhang, J., Zhao, L. & Nunamaker, J. F. (2004): Can e-learning replace classroom learning? Communications of the ACM, 47(5): 75-

Keywords

Electronic examination; biometric, security, encryption, spyware, JAMB