“The Role of Key loggers in Computer-based Assessment Forensics”

Laubscher et al.


Citation information

R. Laubscher et al. “The Role of Key loggers in Computer-based Assessment Forensics”. In: Research for a changing world — Proceedings of SAICSIT 2005. Ed. by J. Bishop and D. G. Kourie. White River, South Africa, Sept. 2005, pp. 123–130


When conducting a computer-based assessment in an educational environment, several infringements of assessment regulations could arise. Examples are, illegal communication (e.g. by e-mail, web or cell phone); hiding of computer objects with the aim of accessing or utilising it; impersonation of another student and presenting the assessment material (e.g. file containing answers of WebCT test, files that form part of a programming project) of another student. To determine beyond reasonable doubt that no infringement has taken place, various tools could be utilised. One such a tool, the key logger, is the subject of scrutiny for this study. Key loggers are considered a type of spyware. Spyware is software that gathers information secretly about a computers use, usually installed without the users consent or knowledge, and relays that information, also covertly, back to a third party. This paper reports the results of an explorative experiment applied to computer-based assessments with the aim to investigate the role of key loggers in computer-based assessment forensics. This exploratory experiment was conducted during computer-based assessments of different groups of students in different subjects. The results include a description of the set up of the controlled environment for the computer-based assessment, execution of the assessment with the accompanying data collection, preserving of the data, analysis of the data, effectiveness of the specific key logger in the forensic process and the conclusions derived from the data.

Full text

A pre- or postprint of the publication is available at http://mo.co.za/open/keylog.pdf.

BibTeX reference

AUTHOR={Rut Laubscher and Martin S Olivier and Hein S Venter and Jan H P Eloff and D Jacobus Rabe} ,
TITLE={The Role of Key loggers in Computer-based Assessment Forensics},
BOOKTITLE={Research for a changing world --- Proceedings of SAICSIT 2005},
EDITOR={Judith Bishop and Derrick G Kourie},
ADDRESS={White River, South Africa},

[Publications] [Home]
Page maintained by Martin Olivier
Database updated: November 8, 2015

Beta version of new bibliography database; please report errors (or copyright violations) that may have slipped in.