| 
  • If you are citizen of an European Union member nation, you may not use this service unless you are at least 16 years old.

  • You already know Dokkio is an AI-powered assistant to organize & manage your digital files & messages. Very soon, Dokkio will support Outlook as well as One Drive. Check it out today!

View
 

e-Learning assessment methods

This version was saved 17 years, 4 months ago View current version     Page history
Saved by PBworks
on November 15, 2006 at 10:24:29 pm
 

e-Learning Assessment Methods & Innovative Technologies to Facilitate Authentication - An Italian Perspective

 

Techniques & Methods for Bio-Metric Authentication


 

INTRODUCTION

Scope of the report

The objective of this report is to trace, through desk research, the general framework of experiences and tendencies in Italy in adopting security systems in ICT application with particular regards to the aspects of user recognition in e-learning solutions and in the field of such a system intend to certify the results of their distance learning.

 

Defining “e-learning authentication and assessment”

In order to guarantee absolute certainty of the system’s validity of user authentication and certification of the learning results, it is necessary to prepare a system that is able to:

 

  • Identify in an unambiguous way the user each time he/she accesses his/her computer to study;
  • Arrange a tracking system of the route taken (pages visited), of completion times (total and partial for each course section or lesson); of the results of the tests carried out during the training course;
  • Arrange a secure user identification system and validation conditions in the environment in which the certification tests are carried out of the final learning results. By validation of the test environment we mean the contextual verification of the test guarantees that the user can not receive help or support of any kind.

 

Structure of the report

This abstract underlines the main ideas of the report.

The following provides an indication of the main clusters of documentation that has established the basis of the research, as well as the glossary defining electronic and data transmission security.

 

  • Forensic Area
  • Government and legislative acts
  • Biometrics
  • Certification and digital signatures
  • Essential experience carried out by:
  1. Polytechnic of Turin
  2. ANEE (permanent Observatory of Assinform (with reference to the Industrial Association of Lombardy)
  3. CISCO
  4. CNIPA (National Centre for IT in Public Administration)
  5. CNR (National Research Centre)
  6. INDIRE (National Institute of Documentation for Innovation and Educative Research)
  7. ISVOR FIAT (Corporate University of Fiat Group)
  8. Poste Italiane (Italian postal service)
  • Glossary - Glossary of electronic– data transmission security

 

E-LEARNING ASSESSMENT METHODS

AND RELATED SOCIO-CULTURAL ISSUES

 

The Italian experience on user identification systems for distance learning students to evaluate learning results in e-learning environments can be catalogued according to the following access methods:

a. In a virtual class, or rather single individuals that have subscribed to a course and have used web based training products

b. In dedicated environments called Learning Points in which it is possible various forms of ICT in an integrated way

c. In videoconference settings that can refer to and use virtual classes/environments; or can refer to class- laboratory type settings. This second case is represented by “business television”.

In reference to these three types of learning environment, here follows a summary of identification systems that are currently being used deduced from real cases and consolidated experience.

“TRIO” Case

TRIO is a capillary network of laboratories distributed in the Tuscan region that constantly uses ICT technology for self learning training through the internet.

The user identification system that accesses the training offer and the support services and learning assessment managed by a CLMS platform (Content Learning Management System), is based exclusively on the classic system of login and password

 

“Learning Point” Case

 

Learning Points are locations which supply a blended type of training. This is a type of assisted self learning with a tutor and supported for about 25% of the learning time by teachers/contents experts either in person and/or at a distance. The user identification system when accessing the training services on line through a CLMS platform is the classic form of login and password. Learning assessment for activities carried out online is entrusted to normal platform tracking systems; vice versa the intermediate and final learning certification is given following direct contact with teachers/experts in person or at a distance through the use of videoconference system both in relation to presence in a role play and/or simulation of real conditions of use of competences acquired.

This type of experience has been carried out predominantly by ISVOR Fiat, which constitutes the Corporate University of Fiat, both for the real needs of internal training and in interesting applications in the field of the Public Administration and for the development of the territorial areas and technological Parks.

 

“Business television” Case

The BTV (Business television) is an interesting application of the use of satellite television to connect and train in “real time” several hundreds or thousands of people displaced in a very vast area, for example in a country.

The analysed case refers to a methodology used by Fiat to train its own network of sales and post sales technical assistants.

In the case of BTV, identification of the users that do not directly participate in the lesson in the television studio takes place by telephone or via login and password for internet/intranet interaction.

 

“Collaborative working Platform” Case

In this case, user identification for course subscribers who are allowed access with a login and password is led by a platform that provides and visualises in the teacher’s workstation the name of the interacting user. As far as learning assessment is concerned, except for the direct questions made by the teacher to the group or the singer user, the typical rules of online training through the CLMS platform apply.

 

Summary elements of experiences

From the point of view of user identification in the use of ICT, as concerns learning assessment and evaluation, the current situation in Italy almost sees the only condition that of assigning logins and passwords (automatic and/or by the system administrator), while the verification of results is strongly connected with CLMS platform tracking systems.

Comments (0)

You don't have permission to comment on this page.