Utilization Of Geolocation-Based Authentication on Online Exams
Abstract
Full Text:
PDFReferences
K. Butler-Henderson and J. Crawford, “A systematic review of online examinations: A pedagogical innovation for scalable authentication and integrity,” Comput. Educ., vol. 159, Dec. 2020, doi: 10.1016/j.compedu.2020.104024.
H. Ilgaz and G. Afacan Adanır, “Providing online exams for online learners: Does it matter for them?,” Educ. Inf. Technol., vol. 25, no. 2, pp. 1255–1269, Mar. 2020, doi: 10.1007/s10639-019-10020-6.
M. Aristeidou, S. Cross, K. D. Rossade, C. Wood, T. Rees, and P. Paci, “Online exams in higher education: Exploring distance learning students’ acceptance and satisfaction,” J. Comput. Assist. Learn., vol. 40, no. 1, pp. 342–359, Feb. 2024, doi: 10.1111/jcal.12888.
A. Selvaraj, V. Radhin, N. KA, N. Benson, and A. J. Mathew, “Effect of pandemic-based online education on teaching and learning system,” Int. J. Educ. Dev., vol. 85, Sep. 2021, doi: 10.1016/j.ijedudev.2021.102444.
F. Di Nocera and G. Tempestini, “Getting Rid of the Usability/Security Trade-Off: A Behavioral Approach,” J. Cybersecurity Priv., vol. 2, no. 2, pp. 245–256, Mar. 2022, doi: 10.3390/jcp2020013.
R. Shi, Y. Zhou, Y. Li, and W. Han, “Understanding Offline Password-Cracking Methods: A Large-Scale Empirical Study,” Secur. Commun. Networks, vol. 2021, no. 1, p. 5563884, Jan. 2021, doi: 10.1155/2021/5563884.
A. Safi and S. Singh, “A systematic literature review on phishing website detection techniques,” J. King Saud Univ. - Comput. Inf. Sci., vol. 35, no. 2, pp. 590–611, Feb. 2023, doi: 10.1016/j.jksuci.2023.01.004.
K. Chanda, “Password Security: An Analysis of Password Strengths and Vulnerabilities,” Int. J. Comput. Netw. Inf. Secure., vol. 8, no. 7, pp. 23–30, Jul. 2016, doi: 10.5815/ijcnis.2016.07.04.
S. Jingyao, S. Chandel, Y. Yunnan, Z. Jingji, and Z. Zhipeng, “Securing a network: How effective using firewalls and VPNs are?,” in Lecture Notes in Networks and Systems, Springer, 2020, pp. 1050–1068. doi: 10.1007/978-3-030-12385-7_71.
M. Schmitt, “Securing the digital world: Protecting smart infrastructures and digital industries with artificial intelligence (AI)-enabled malware and intrusion detection,” J. Ind. Inf. Integr., vol. 36, p. 100520, Dec. 2023, doi: 10.1016/j.jii.2023.100520.
K. A. Yuwamahendra and C. I. Ratnasari, “Penerapan Teknologi Location - Based Services dalam Mobile Application : Suatu Tinjauan Literatur,” Automata, vol. 1, no. 2, pp. 1–5, Jun. 2020.
J. Jumriya, H. Haeruddin, and M. Taruk, “Teknologi Location Based Service (LBS) Profil Universitas Mulawarman Berbasis Mobile,” J. Rekayasa Teknol. Inf., vol. 2, no. 1, pp. 97–105, Jun. 2018, doi: 10.30872/jurti.v2i1.1432.
M. N. Wibisono, “Perancangan Sistem Informasi PONDASI: Peta Online Budaya Indonesia sebagai Model Media Pembelajaran Interaktif Lagu Daerah,” JoLLA J. Lang. Lit. Arts, vol. 1, no. 4, pp. 542–559, Jun. 2021, doi: 10.17977/um064v1i42021p542-559.
V. L. Yisa, B. Meshach, O. Osho, and A. Sule, “Application of Geo-Location-Based Access Control in an Enterprise Environment,” Int. J. Comput. Netw. Inf. Secure., vol. 10, no. 1, pp. 36–43, Jan. 2018, doi: 10.5815/ijcnis.2018.01.05.
A. Ashika, B. Spoorthi, and K. Sowmya, “A Geo-Location Authentication Application for Mobile Banking,” Int. J. Res. Appl. Sci. Eng. Technol., vol. 8, no. 5, pp. 1134–1138, 2020, doi: 10.22214/ijraset.2020.5179.
R. P. Pawar, “A Comparative Study of Agile Software Development Methodology and traditional waterfall model,” IOSR J. Comput. Eng., no. August, pp. 01–08, 2015.
L. Albó, D. Hernández-Leo, and V. Moreno Oliver, “Smartphones or laptops in the collaborative classroom? A study of video-based learning in higher education,” Behav. Inf. Technol., vol. 38, no. 6, pp. 637–649, Jun. 2019, doi: 10.1080/0144929X.2018.1549596.
DOI: http://dx.doi.org/10.17977/um010v7i12024p40-43
Refbacks
- There are currently no refbacks.
Letters in Information Technology Education (LITE) |