Utilization Of Geolocation-Based Authentication on Online Exams

Muhammad Nurwiseso Wibisono, Swastika Dhesti Anggriani

Abstract


In the industrial era 4.0, technology is utilised as much as possible to advance the welfare of life. One use of technology commonly used in education is online-based exams. In addition to saving paper, online-based exams can reduce operational costs in carrying out exams. Currently, many online-based exam models are used for various types of exams. Starting with the computer-based Test, CAT-based CPNS test, etc., researchers developed a method by utilising geolocation to run an online-based examination system. In this study, the author wants to utilise geolocation as one of the requirements for accessing needed resources; in this case, the online-based quiz system was adopted. Using geolocation in the online-based quiz system is expected to provide security for the examination system so that examiners can assess their students as best they can

Full Text:

PDF

References


K. Butler-Henderson and J. Crawford, “A systematic review of online examinations: A pedagogical innovation for scalable authentication and integrity,” Comput. Educ., vol. 159, Dec. 2020, doi: 10.1016/j.compedu.2020.104024.

H. Ilgaz and G. Afacan Adanır, “Providing online exams for online learners: Does it matter for them?,” Educ. Inf. Technol., vol. 25, no. 2, pp. 1255–1269, Mar. 2020, doi: 10.1007/s10639-019-10020-6.

M. Aristeidou, S. Cross, K. D. Rossade, C. Wood, T. Rees, and P. Paci, “Online exams in higher education: Exploring distance learning students’ acceptance and satisfaction,” J. Comput. Assist. Learn., vol. 40, no. 1, pp. 342–359, Feb. 2024, doi: 10.1111/jcal.12888.

A. Selvaraj, V. Radhin, N. KA, N. Benson, and A. J. Mathew, “Effect of pandemic-based online education on teaching and learning system,” Int. J. Educ. Dev., vol. 85, Sep. 2021, doi: 10.1016/j.ijedudev.2021.102444.

F. Di Nocera and G. Tempestini, “Getting Rid of the Usability/Security Trade-Off: A Behavioral Approach,” J. Cybersecurity Priv., vol. 2, no. 2, pp. 245–256, Mar. 2022, doi: 10.3390/jcp2020013.

R. Shi, Y. Zhou, Y. Li, and W. Han, “Understanding Offline Password-Cracking Methods: A Large-Scale Empirical Study,” Secur. Commun. Networks, vol. 2021, no. 1, p. 5563884, Jan. 2021, doi: 10.1155/2021/5563884.

A. Safi and S. Singh, “A systematic literature review on phishing website detection techniques,” J. King Saud Univ. - Comput. Inf. Sci., vol. 35, no. 2, pp. 590–611, Feb. 2023, doi: 10.1016/j.jksuci.2023.01.004.

K. Chanda, “Password Security: An Analysis of Password Strengths and Vulnerabilities,” Int. J. Comput. Netw. Inf. Secure., vol. 8, no. 7, pp. 23–30, Jul. 2016, doi: 10.5815/ijcnis.2016.07.04.

S. Jingyao, S. Chandel, Y. Yunnan, Z. Jingji, and Z. Zhipeng, “Securing a network: How effective using firewalls and VPNs are?,” in Lecture Notes in Networks and Systems, Springer, 2020, pp. 1050–1068. doi: 10.1007/978-3-030-12385-7_71.

M. Schmitt, “Securing the digital world: Protecting smart infrastructures and digital industries with artificial intelligence (AI)-enabled malware and intrusion detection,” J. Ind. Inf. Integr., vol. 36, p. 100520, Dec. 2023, doi: 10.1016/j.jii.2023.100520.

K. A. Yuwamahendra and C. I. Ratnasari, “Penerapan Teknologi Location - Based Services dalam Mobile Application : Suatu Tinjauan Literatur,” Automata, vol. 1, no. 2, pp. 1–5, Jun. 2020.

J. Jumriya, H. Haeruddin, and M. Taruk, “Teknologi Location Based Service (LBS) Profil Universitas Mulawarman Berbasis Mobile,” J. Rekayasa Teknol. Inf., vol. 2, no. 1, pp. 97–105, Jun. 2018, doi: 10.30872/jurti.v2i1.1432.

M. N. Wibisono, “Perancangan Sistem Informasi PONDASI: Peta Online Budaya Indonesia sebagai Model Media Pembelajaran Interaktif Lagu Daerah,” JoLLA J. Lang. Lit. Arts, vol. 1, no. 4, pp. 542–559, Jun. 2021, doi: 10.17977/um064v1i42021p542-559.

V. L. Yisa, B. Meshach, O. Osho, and A. Sule, “Application of Geo-Location-Based Access Control in an Enterprise Environment,” Int. J. Comput. Netw. Inf. Secure., vol. 10, no. 1, pp. 36–43, Jan. 2018, doi: 10.5815/ijcnis.2018.01.05.

A. Ashika, B. Spoorthi, and K. Sowmya, “A Geo-Location Authentication Application for Mobile Banking,” Int. J. Res. Appl. Sci. Eng. Technol., vol. 8, no. 5, pp. 1134–1138, 2020, doi: 10.22214/ijraset.2020.5179.

R. P. Pawar, “A Comparative Study of Agile Software Development Methodology and traditional waterfall model,” IOSR J. Comput. Eng., no. August, pp. 01–08, 2015.

L. Albó, D. Hernández-Leo, and V. Moreno Oliver, “Smartphones or laptops in the collaborative classroom? A study of video-based learning in higher education,” Behav. Inf. Technol., vol. 38, no. 6, pp. 637–649, Jun. 2019, doi: 10.1080/0144929X.2018.1549596.




DOI: http://dx.doi.org/10.17977/um010v7i12024p40-43

Refbacks

  • There are currently no refbacks.


 

 Letters in Information Technology Education (LITE)
 2654-5667
 Contact
 Published by Electrical Engineering, Universitas Negeri   Malang, Indonesia
 Jl. Semarang No. 5 Malang, East Java, Indonesia
 Homepage:  http://journal2.um.ac.id/index.php/lite/index
 E-mail: lite.teum@gmail.com

View My Stats