REFERENCES
Acxiom (n.d.). Identity Verification to Support Academic
Integrity, Acxiom White Papers.
http://www.acxiom.com/StudentIdentity
Allen, I. E. & Seaman, J. (2010). Learning on Demand:
Online Education in the United States, 2009.
Newburyport, MA: The Sloan Consortium. http://
www.sloanconsortium.org/publications/survey/pdf/lea
rningondemand.pdf
Bailie, J. L. & Jortberg, M. A. (2009). Online Learner
Authentication: Verifying the Identity of Online Users.
MERLOT JOLT, 5(2), 197-207. http://
jolt.merlot.org/vol5no2/bailie_0609.pdf
Bedford, W., Gregg, J. & Clinton, S. (2009).
Implementing Technology to Prevent Online
Cheating: A Case Study at a Small Southern Regional
University (SSRU). MERLOT JOLT, 5(2), 230-238.
http://jolt.merlot.org/vol5no2/gregg_0609.pdf
Carter, D. (2009, July 10). ED OKs Proctors, Secure
Logins for Online Tests. eSchool News. http:/
/www.eschoolnews.com/2009/07/10/ed-oks-proctors-
secure-logins-for-online-tests-2
Ellis, R. K. (2009). Field Guide to Learning Management
Systems. ASTD Learning Circuits. http://
www.astd.org/NR/rdonlyres/12ECDB99-3B91-403E-
9B15-7E597444645D/23395/LMS_fieldguide_20091.pdf
Eplion, D. M. & Keefe, T. J. (2007). Practical Tips for
Preventing Cheating on Online Exams. Faculty Focus.
http://www.magnapubs.com/issues/magnapubs_ff/4_4
/news/600136-1.html.
Foster, A. L. (2008, July 25). New Systems Keep a Close
Eye on Online Students at Home. The Chronicle of Higher
Education, Information Technology, 54(46). http://
chronicle.com/article/New-Systems-Keep-a-Close-
Eye/22559
Graf, F. (2002). Providing Security for eLearning.
Computers & Graphics, 26(2), 355-365.doi:10.1016/
S0097-8493(02)00062-6
Guess, A. (2008, October 8). From Blue Books to Secure
Laptops. Inside Higher Ed. Retrieved Feb 3, 2010,
http://www.insidehighered.com/news/2008/10/08/tests
Heubert, J. P. & Hauser, R. M. (Eds.). (1999). High
Stakes: Testing for Tracking, Promotion, and
Graduation. National Research Council, Washington,
DC: The National Academies Press. http://
www.nap.edu/openbook.php?record_id=6336
Jortberg, M. A. (2009). Student Authentication Solution
Comparison. Online Student Identity blog. http://
mikejortberg.blogspot.com/2009/06/student authentic
cation-solution.html
King, C. G., Guyette, R.W. & Piotrowski, C. (2009).
Online Exams and Cheating: An Empirical Analysis of
Business Students’ Views, The Journal of Educators
Online, 6(1). Retrieved February 3, 2010, http://
www.thejeo.com/Archives/Volume6Number1/Kingeta
lpaper.pdf
KioWare (n.d.). KioWare Browser Lockdown Software.
www.kioware.com/default.aspx?source=kmshowcase
Kopetz, H. & Verissimo, P. (1993). Real Time and
Dependability Concepts, In Mullender, S. (Ed.),
Distributed Systems, Addison-Wesley, 411-446.
Kryterion (n.d.). Webassessor. www.kryteriononline.com
KryterionOLP (n.d.). Kryterion Online Proctoring.
http://www.kryteriononline.com/delivery_options
McCabe, D. L., Trevino., L. K. & Butterfield. K. D.
(2001). Cheating in Academic Institutions: A Decade
of Research. Ethics & Behavior, 11(3), 219-232.
http://www.swarthmore.edu/NatSci/cpurrin1/plagiaris
m/docs/McCabe_et_al.pdf
Morgan, J. (2008). Online Proctoring Perfected, Spun off
by Tech-savvy University. Retrieved February 3, 2010,
www.webwire.com/ViewPressRel.asp?aId=80502
Naimark, M. (2002). How to ZAP a Camera: Using Lasers
to Temporarily Neutralize Camera Sensors. http://
www.naimark.net/projects/zap/howto.html
Powers, E. (2006, June 2). Proctor 2.0. Inside Higher Ed.
www.insidehighered.com/news/2006/06/02/proctor
Prabhakar, S., Pankanti, S. & Jain A. K. (2003). Biometric
Recognition: Security and Privacy Concerns. IEEE
Security & Privacy, 1(2), 33-42. doi:10.1109/
MSECP.2003.1193209
Pupilcity (n.d.). Pupilcity ProctorU. www.proctoru.com
Questionmark (n.d.). Questionmark Perception Secure.
http://www.questionmark.com/us/perception/
Respondus (n.d). LockdownBroswer. www.respondus.com
Schaefer, T., Barta, M. & Pavone, T. (2009). Student
Identity Verification and the Higher Education
Opportunity Act: A Faculty Perspective. Intl. J. of
Instructional Tech. and Distance Learning, 6(8),
51-58. http://itdl.org/Journal/Aug_09/article05.htm
SEB (n.d.). SEB, www.safeexambrowser.org/
Securexam (n.d.). Securexam
Remote Proctor. http://
www.remoteproctor.com/SERP
Shearer, R., Lehman, E., Hamaty, P. & Mattoon, N.
(2009). Online Proctored Exams at a Distance: How
can you Help Assure Academic Integrity?. UCEA 94th
Annual Conference, Boston, Massachusetts.
Simonson, M. R., Smaldino, S. E., Albright, M. & Zvacek,
S. (2009). Teaching and Learning at a Distance:
Foundations of Distance Education. Allyn and Bacon.
Simpliciti (n.d.). Lockdown Solutions. www.simpliciti.biz
SoftwareSecure (n.d.). www.softwaresecure.com
StudentPen (n.d.). Bio-Pen. http://www.studentpen.com
VS1 (n.d.). Integrity in Education Online.
http://www.virtualstudent.com/?page_id=19
VS2 (n.d.). Accreditation in Online Degree Programs.
http://www.virtualstudent.com/?page_id=9
Weippl, E. R. (2005). Security in E-Learning. Advances in
Information Security, Springer, Vol. 16.
Wollenhaupt, G. (2005). How Cell Phone Jammers
Work, www.howstuffworks.com/cell-phone-jammer.
htm
DEPENDABLE DISTRIBUTED TESTING - Can the Online Proctor be Reliably Computerized?
31