Browser unable to execute script; please use the site map to navigate the site.

The Role of Key loggers in Computer-based Assessment Forensics

Laubscher, Olivier, Venter, Eloff, and Rabe

2005

(Citation)Citation information

R. Laubscher, M. S. Olivier, H. S. Venter, J. H. P. Eloff, and D. J. Rabe. “The Role of Key loggers in Computer-based Assessment Forensics”. In: Research for a changing world — Proceedings of SAICSIT 2005. Ed. by J. Bishop and D. G. Kourie. White River, South Africa, Sept. 2005, pp. 123–130

(Abstract)Abstract

When conducting a computer-based assessment in an educational environment, several infringements of assessment regulations could arise. Examples are, illegal communication (e.g. by e-mail, web or cell phone); hiding of computer objects with the aim of accessing or utilising it; impersonation of another student and presenting the assessment material (e.g. file containing answers of WebCT test, files that form part of a programming project) of another student. To determine beyond reasonable doubt that no infringement has taken place, various tools could be utilised. One such a tool, the key logger, is the subject of scrutiny for this study. Key loggers are considered a type of spyware. Spyware is software that gathers information secretly about a computer’s use, usually installed without the user’s consent or knowledge, and relays that information, also covertly, back to a third party. This paper reports the results of an explorative experiment applied to computer-based assessments with the aim to investigate the role of key loggers in computer-based assessment forensics. This exploratory experiment was conducted during computer-based assessments of different groups of students in different subjects. The results include a description of the set up of the controlled environment for the computer-based assessment, execution of the assessment with the accompanying data collection, preserving of the data, analysis of the data, effectiveness of the specific key logger in the forensic process and the conclusions derived from the data.

(Full text)Full text

A pre- or postprint of the publication is available at https://mo.co.za/open/keylog.pdf.

(Authoritative version on publisher's site)Definitive version

The definitive version of the paper is available from the publisher.
URL: //dl.acm.org/citation.cfm?id=1145675.1145689

(BibTeX record)BibTeX reference

@inproceedings(keylog,
author={Rut Laubscher and Martin S Olivier and Hein S Venter and Jan H P Eloff and D Jacobus Rabe} ,
title={The Role of Key loggers in Computer-based Assessment Forensics},
booktitle={Research for a changing world --- Proceedings of SAICSIT 2005},
editor={Judith Bishop and Derrick G Kourie},
address={White River, South Africa},
pages={123--130},
month=sep,
year={2005},
)