applicable to other scenarios for EA when leaving out
our special requirements. Based on this threat model,
we described counter measures based on our research
for our project FLEX. The subsequent discussion of
the level of security for EA in comparison to PBEs
revealed that EA is not per se less secure than PBEs,
which is in line with the results of Sindre and Veg-
endla. Based on the software architecture discussed at
the beginning of the paper, we were able to conclude
that EA is in part even more secure than PBEs. The
results in this paper are quite promising regarding the
security of EA, which affects the acceptance of EA
by students and examiners. However, the discussed
threat model was designed to fit the architecture of
our software framework. The next steps have to be
deriving a generalized threat model for EA to be able
to show the level of security of EA for a more general
setting.
REFERENCES
Apampa, K. M., Wills, G., and Argles, D. (2010). User se-
curity issues in summative e-assessment security. In-
ternational Journal for Digital Society, 1(2):135–147.
Conole, G. and Warburton, B. (2005). A review of
computer-assisted assessment. Research in Learning
Technology, 13(1).
Csap
´
o, B., Ainley, J., Bennett, R. E., Latour, T., and Law,
N. (2011). Technological issues for computer-based
assessment. In Assessment and Teaching of 21st Cen-
tury Skills, pages 143–230. Springer Netherlands.
Dawson, P. (2015). Five ways to hack and cheat with bring-
your-own-device electronic examinations. British
Journal of Educational Technology, 47(4):592–600.
Deutsches Forschungsnetz.
¨
Uberblick DFN-PKI. https:
//www.pki.dfn.de/ueberblick-dfn-pki/. Last
visited on 2019-06-07.
Heintz, A. (2017). Cheating at Digital Exams - Vulnerabili-
ties and Countermeasures. Master’s thesis, Norwegian
University of Science and Technology, Norway.
Hillier, M. (2015). e-Exams with student owned devices:
Student voices. In Proceedings of the International
Mobile Learning Festival 2015, pages 582–608.
Kaur, R. and Kaur, A. (2012). Digital signature. In
2012 International Conference on Computing Sci-
ences. IEEE.
Kiennert, C., Rocher, P.-O., Ivanova, M., Rozeva, A.,
Durcheva, M., and Garcia-Alfaro, J. (2017). Security
challenges in e-assessment and technical solutions. In
2017 21st International Conference Information Visu-
alisation (IV). IEEE.
Kordy, B., Mauw, S., Radomirovi
´
c, S., and Schweitzer,
P. (2011). Foundations of attack–defense trees. In
Lecture Notes in Computer Science, pages 80–95.
Springer Berlin Heidelberg.
K
¨
uppers, B., Kerber, F., Meyer, U., and Schroeder, U.
(2017). Beyond Lockdown. In Igel, C., Ullrich,
C., and Wessner, M., editors, Bildungsr
¨
aume 2017
- DeLFI 2017, volume 237 of Lecture Notes in In-
formatics (LNI), pages 191–196, Bonn. DeLFI 2017
- 15. e-Learning Fachtagung Informatik, Chemnitz
(Germany), 5. Sep 2017 - 8. Sep 2017, Deutsche
Geselschaft f
¨
ur Informatik e.V. (GI).
K
¨
uppers, B., Politze, M., Zameitat, R., Kerber, F., and
Schroeder, U. (2019). Practical Security for Elec-
tronic Examinations on Students’ Devices. In Arai,
K., Kapoor, S., and Bhatia, R., editors, Intelligent
Computing, volume 857 of Advances in Intelligent
Systems and Computing, pages 290–306, Cham. Com-
puting Conference 2018, London (United Kingdom),
10. Jul 2018 - 12. Jul 2018, Springer International
Publishing.
K
¨
uppers, B. and Schroeder, U. (2016). Bring Your Own
device for e-Assessment. In G
`
omez Chova, L.,
L
`
opez Mart
`
ınez, A., and Candel Torres, I., editors,
EduLearn 16 : 8th International Conference on Edu-
cation and New Learning Technologies, pages 8770–
8776, Valencia. EDULEARN 2016 - 8th International
Conference on Education and New Learning Tech-
nologies, Barcelona (Spain), 4. Jul 2016 - 6. Jul 2016
, IATED Academy.
K
¨
uppers, B. and Schroeder, U. (2017). Vergleich von pa-
pierklausuren und elektronischen pr
¨
ufungen. In IN-
FORMATIK 2017, pages 307–318. Gesellschaft f
¨
ur
Informatik, Bonn.
Metalidou, E., Marinagi, C., Trivellas, P., Eberhagen, N.,
Skourlas, C., and Giannakopoulos, G. (2014). The
human factor of information security: Unintentional
damage perspective. Procedia - Social and Behavioral
Sciences, 147:424–428.
Namiot, D. and Sneps-Sneppe, M. (2014). On Micro-
services Architecture. International Journal of Open
Information Technologies, 2(9):24–27.
Opgen-Rhein, J., K
¨
uppers, B., and Schroeder, U. (2018).
An application to discover cheating in digital exams.
In Proceedings of the 18th Koli Calling International
Conference on Computing Education Research - Koli
Calling 18. ACM Press.
Søgaard, T. M. (2016). Mitigation of Cheating Threats in
Digital BYOD exams. Master’s thesis, Norwegian
University of Science and Technology, Norway.
Sindre, G. and Vegendla, A. (2015). E-exams versus paper
exams: A comparative analysis of cheating-related se-
curity threats and countermeasures. In Norwegian In-
formation Security Conference (NISK 2015).
Stanek, D. and Eifert, T. (2012). Maßnahmen f
¨
ur
verl
¨
assliche und schnelle datenwiederherstellung. PIK
- Praxis der Informationsverarbeitung und Kommu-
nikation, 35(3).
CSEDU 2020 - 12th International Conference on Computer Supported Education
502