Muthoga Kioni
Early every year, national examination results are released. We have become familiar with the joy and disappointment that come with these releases. The seriousness of exams is best symbolised by the media saturation at this time and when cheating is unearthed. Exam fraud is the uglier flip side that reminds us how critical exams have become in modern Kenya. All manner of tricks are conjured up and applied to obtain exam content.
An exam’s credibility is proportional to the security applied at every stage. An exam that does not ensure that candidates are who they say they are and that their performance is based solely on their own efforts is worthless and derided by all.
Reliance on technology
It is now evident that the lifecycle process of examinations from formulation to exam results has become reliant on technology. Computers, servers, networks, text messages and mobile phones are used at each stage. Technology, therefore, provides a risk that can contaminate the whole process. To compound this problem is the fact that many people are involved in each phase.
Content theft is the most popular method of exam fraud. This is where attacks on computers or exam setting centres are conducted so as to steal test content. Due to the number of people involved in the process, exam content can be, and is usually, stolen by internal and external fraudsters. It is, therefore, prudent to create test items in a secure environment.
By using appropriate workflow management controls it is possible to track exam content through the development process. These controls can also be used to implement role-based access rights where exam setters have limited access to the content. These workflow controls can also be designed to allow as few individuals as possible to have access to the final examination that resides in a server/computer.
Another popular method of exam fraud is proxy testing where the exam taker gains an unfair advantage by using someone else to take their exam for them. This can be prevented by using biometrics to identify and authenticate exam takers.
Apart from implementing workflow controls to prevent content theft, forensic analysis software can be used to detect pass rates, unusual patterns in scores and other aspects. Analysis of exam results is vital in identifying anomalies and reducing the likelihood of examination fraud.
The writer is an ICT Security and Forensic Specialist. Email: bmuthoga@hotmail.com