Applying Forensic Principles to Computer-Based Assessment
A computer forensic investigator investigates computer crime. Currently only a few academic institutions have a computer forensic department and, therefore, the investigative responsibility (in case of contravention of assessment regulations for computer-based assessments) rests upon the lecturers.
The purpose of our project is to apply computer forensic principles to a computer-based assessment environment to facilitate the identification and prosecution of any party that contravenes assessment regulations. This paper is the first step in that project; its purpose is to consider the nature of such an environment. This nature is derived from the established computer forensic principles. In particular, we focus on the forensic process to determine the policies, procedures and types of tools that should be present in such an environment. The intention of the paper is not to consider any of the issues raised in detail, but to consider the process from a high level. The utilization of different tools, namely a key logger, CCTV camera, audit log and a report of logins, facilitates the identification of any party that contravenes assessment regulations. The proposed process consists of four phases: preparation of the environment, collection of evidence, analysis of evidence, and reporting findings.
KeywordsComputer-based programming assessment forensic process key logging
- I. Armstrong, Computer forensics: Detecting the imprint, SC Magazine, August 2002.Google Scholar
- M. Bigler, Computer forensics, Internal Auditor, vol. 57(1), p. 53, 2000.Google Scholar
- J. Feldman, Collecting and preserving electronic media, Computer Forensics Inc., Seattle, Washington, 2001.Google Scholar
- J. Holley, Market survey: Product review, SC Magazine, September 2000.Google Scholar
- W. Kruse and J. Heiser, Computer Forensics: Incident Response Essentials, Addison-Wesley Longman, Amsterdam, The Netherlands, 2001.Google Scholar
- C. Pfleeger and S. Pfleeger, Security in Computing, Prentice Hall, Upper Saddle River, New Jersey, 2003.Google Scholar
- S.T. Ltd., Top ten key loggers in review (www.keylogger.org).Google Scholar
- W. Soukoreff and S. Mackenzie, KeyCapture (www.dynamicservices. com/~will/academic/textinput/keycapture), 2003.Google Scholar
- M. Wyer and S. Eisenbach, LEXIS: An exam invigilation system, Proceedings of the Fifteenth Conference on Systems Administration, 2001.Google Scholar