| 
  • If you are citizen of an European Union member nation, you may not use this service unless you are at least 16 years old.

  • You already know Dokkio is an AI-powered assistant to organize & manage your digital files & messages. Very soon, Dokkio will support Outlook as well as One Drive. Check it out today!

View
 

e-Learning assessment methods

This version was saved 17 years, 4 months ago View current version     Page history
Saved by PBworks
on November 16, 2006 at 12:46:59 am
 

User recognition in e-Learning - An Italian Perspective

 

Techniques & Methods for Bio-Metric Authentication

 


 

INTRODUCTION

Scope of the report

The objective of this report is to trace, through desk research, the general framework of experiences and tendencies in Italy in adopting security systems in ICT application with particular regards to the aspects of user recognition in e-learning solutions and in the field of such a system intend to certify the results of their distance learning.

 

Defining “e-learning authentication and assessment”

In order to guarantee absolute certainty of the system’s validity of user authentication and certification of the learning results, it is necessary to prepare a system that is able to:

 

  • Identify in an unambiguous way the user each time he/she accesses his/her computer to study;
  • Arrange a tracking system of the route taken (pages visited), of completion times (total and partial for each course section or lesson); of the results of the tests carried out during the training course;
  • Arrange a secure user identification system and validation conditions in the environment in which the certification tests are carried out of the final learning results. By validation of the test environment we mean the contextual verification of the test guarantees that the user can not receive help or support of any kind.

 

Structure of the report

This abstract underlines the main ideas of the report.

The following provides an indication of the main clusters of documentation that has established the basis of the research, as well as the glossary defining electronic and data transmission security.

 

  • Forensic Area
  • Government and legislative acts
  • Biometrics
  • Certification and digital signatures
  • Essential experience carried out by:
  1. Polytechnic of Turin
  2. ANEE (permanent Observatory of Assinform (with reference to the Industrial Association of Lombardy)
  3. CISCO
  4. CNIPA (National Centre for IT in Public Administration)
  5. CNR (National Research Centre)
  6. INDIRE (National Institute of Documentation for Innovation and Educative Research)
  7. ISVOR FIAT (Corporate University of Fiat Group)
  8. Poste Italiane (Italian postal service)
  • Glossary - Glossary of electronic– data transmission security

 

E-LEARNING ASSESSMENT METHODS

AND RELATED SOCIO-CULTURAL ISSUES

 

The Italian experience on user identification systems for distance learning students to evaluate learning results in e-learning environments can be catalogued according to the following access methods:

a. In a virtual class, or rather single individuals that have subscribed to a course and have used web based training products

b. In dedicated environments called Learning Points in which it is possible various forms of ICT in an integrated way

c. In videoconference settings that can refer to and use virtual classes/environments; or can refer to class- laboratory type settings. This second case is represented by “business television”.

In reference to these three types of learning environment, here follows a summary of identification systems that are currently being used deduced from real cases and consolidated experience.

 

“TRIO” Case

 

TRIO is a capillary network of laboratories distributed in the Tuscan region that constantly uses ICT technology for self learning training through the internet. The user identification system that accesses the training offer and the support services and learning assessment managed by

a CLMS platform (Content Learning Management System), is based exclusively on the classic system of login and password

 

“Learning Point” Case

 

Learning Points are locations which supply a blended type of training. This is a type of assisted self learning with a tutor and supported for about 25% of the learning time by teachers/contents experts either in person and/or at a distance. The user identification system when accessing the training services on line through a CLMS platform is the classic form of login and password. Learning assessment for activities carried out online is entrusted to normal platform tracking systems; vice versa the intermediate and final learning certification is given following direct contact with teachers/experts in person or at a distance through the use of videoconference system both in relation to presence in a role play and/or simulation of real conditions of use of competences acquired. This type of experience has been carried out predominantly by ISVOR Fiat, which constitutes the Corporate University of Fiat, both for the real needs of internal training and in interesting applications in the field of the Public Administration and for the development of the territorial areas and technological Parks.

 

“Business television” Case

 

The BTV (Business television) is an interesting application of the use of satellite television to connect and train in “real time” several hundreds or thousands of people displaced in a very vast area, for example in a country. The analysed case refers to a methodology used by Fiat to train its own network of sales and post sales technical assistants.

In the case of BTV, identification of the users that do not directly participate in the lesson in the television studio takes place by telephone or via login and password for internet/intranet interaction.

 

“Collaborative working Platform” Case

 

In this case, user identification for course subscribers who are allowed access with a login and password is led by a platform that provides and visualises in the teacher’s workstation the name of the interacting user. As far as learning assessment is concerned, except for the direct questions made by the teacher to the group or the singer user, the typical rules of online training through the CLMS platform apply.

 

Summary elements of experiences

 

From the point of view of user identification in the use of ICT, as concerns learning assessment and evaluation, the current situation in Italy almost sees the only condition that of assigning logins and passwords (automatic and/or by the system administrator), while the verification of results is strongly connected with CLMS platform tracking systems.

 

BIO-METRICS AUTHENTICATION EU SUPPLIER NETWORK

 

Before confronting the specific analysis of the biometric authentication system and the other themes connected with the development and use of IT, it is important to recall the attention to what was the level of awareness and political determination of the development and diffusion of information technology.

 

For this reason, please refer to the “DIGITAL REFORM TO INNOVATE ITALY” report that is provided in the attached main report, edited by the Ministry for Innovation and Technology. This report tracks, in particular, an evolutionary description of the Italian situation in the last 5-6 years supplying a historical socio-cultural analysis and legislative reform put into act by computer literacy in the development and diffused use of technologies.

 

Bio-metrics used to scan analyse Human characteristics

The desk investigation has highlighted considerable attention to the development of biometrics in the analysis and recognition of human characteristics for commercial, business and security reasons. In the last few years, this last point has become particularly topical to prevent and combat terrorism.

From the enormous amount of documentation resulting from the desk research we have identified and supply a report edited by CNIPA (National Centre for IT in Public Administration) that summarises the state of the art on this theme. We refer however to the analysis of the attachments for further investigation of the subject.

 

CNIPA report

 

Introduction

 

Due to the incessant generalised request for measures to enhance “safety”, in Italy too greater knowledge of biometric techniques is becoming rapidly diffused. Finger prints, characteristics of the iris or geometry of the hand, have at this point definitively left the world of fiction and arrived in daily life and recent measures (January 2004) adapted by the United States Administration in terms of immigration probably represent the more important example. This document analyses various aspects of biometric techniques, gives a quick illustration of the operative ways of analysing strengths and weaknesses of each use sector. Beyond, however, any general evaluation of an individual sensor or individual technique, the objective of the document, is to highlight that the correct implementation of a biometric process is based not only on the satisfaction of technical and economic factors, but also, and above all, on the complete performance of juridical and social duties, lack of consideration of which has lead in the past to misunderstandings and an evident series of failures.

 

TAXONOMY

 

The term “biometric authentication” often more simply put “biometrics”, comes from the Greek bios (life) and metros (measure), even if also used in other scientific contexts1, in today’s IT meaning, refers to the automatic identification or the verification of the identity of a person on the basis of physical and/or behavioural characteristics.

We can therefore divide biometrics into:

• Physical Biometrics which is based on the derivative data of the measurements of the physical characteristics of a person such as the iris, fingerprints, facial/ hand or other characteristics.

and:

• Behavioural Biometrics which is based on reference to behavioural characteristics such as, for example, voice emission, writing a signature, or the type of walk

 

Considering that, as we will see in more depth later, each biometric process starts with a preliminary phase called “enrolment” in which, generically2, the subject provides the biometric system, through a sensor, his/her own physical/behavioural characteristics, that is subsequently transformed into a mathematical model (template). The two operative ways of biometrics are:

• 1:1 (one-to-one) where the data produced by the biometric sensor is compared with a single template thus creating a verification process;

• 1:N (one-to-many) where the data is compared with a group of templates contained in an archive thus creating an identification process. In biometrics two recurrent terms are:

• Physical Access (Biometric control of), verification procedure of legal right of the subject to enter a room, building, district or area;

• Logical Access, (Biometric Control), verification procedure of legal right of the subject to access an IT resource.

 

For example, an employee of a company can enter an office (physical access) through biometric control of his/her own physical characteristics (for example a fingerprint) with one deposited on a smart-card (1:1 process).

In accessing his/her own computer (logical access) the same fingerprint could be compared with what is present in the authorised users archive (1:N process).

 

THE BIOMETRIC PROCESS

 

Biometric systems are characterised by a process of use that, generally, lead back to the comparison of a physical or behavioural characteristic acquired by a subject with one or more samples of the individual that have been previously recorded. Both the recording and the comparison take place according to the series of steps shown in figure 1.

 

 

Enrolment

 

In the registration process (that will now be called “enrolment”, the user provides the biometric system with one of his/her physical or behavioural characteristic by means of an acquisition device (for example a digital imprint scanner or a video camera).

The sample is processed to extract the distinctive characteristic information, that create the so-called template that can be defined as a mathematical representation of the biometric data. The template is essentially made up of a sequence of numbers from which it is, generally, impossible to reconstruct the physical characteristic and that, theoretically, is like a sort of user’s “physical password”.

At the end of the enrolment process, the template is registered in a central database, or, for example, only on a smart card.

 

Verification

 

During the verification process, the acquisition of the sample and the extraction of the template occur as explained above. The latter is compared with the one that has already been acquired to undertake both authentication and recognition.

 

Authentication

 

In the case of authentication the biometric system verifies an identity confirmation, or rather tries to provide an answer to the question “Is this person who he/she says he/she is?”, completing a 1 to 1 comparison between the template of the subject and the reference template contained in the archive (or on the smart card).

Authentication requires that identity is provided, for example, inputting a user name or a pin and the output of the comparison algorithm is a score, that corresponds to the positive verification if higher than a certain threshold, and a negative verification if it is less than the threshold. The comparison threshold is an adjustable parameter of the system.

 

Recognition/identification

 

In this case, the system determines the user’s identity, or rather it tries to provide an answer to the question “Who is the user?”, completing a series of comparisons with the biometric data contained in models recorded in its archive. When the search algorithm produces an output with a higher score to the so-called “threshold”, a sign appears (saying “matching” or “hit”).

Authentication is generally an evident (ouvert) and cooperative process whilst identification can also be evident or concealed from users (covert).

Whilst in the evident processes, the subject voluntarily claims his/her own identity, generally to access a place (physical access) or to receive a service (logical access), in the case of hidden biometrics the physical and/or behavioural characteristic(s) are compared, without the subject knowing, with data stored in an archive, with an operation that, in the case of biometrics of the somatic characteristics, is often defined “surveillance”.

 

BIOMETRIC TECHNIQUES

 

The more diffused biometric identification techniques consist in evaluating:

• Digital imprints

• Geometry of the hand http://biometrics.pbwiki.com/Authentication%20technologies#Hand/FingerGeometry

• Iris characteristics http://biometrics.pbwiki.com/Authentication%20technologies#IrisScan

• Analysis of somatic characteristics http://biometrics.pbwiki.com/Authentication%20technologies#EmergingBiometricTechnologies

• Dynamics of signature writing http://biometrics.pbwiki.com/Authentication%20technologies#DynamicSignatureVerification

• Voice characteristics http://biometrics.pbwiki.com/Authentication%20technologies#VoiceRecognition

• Retina characteristics http://biometrics.pbwiki.com/Authentication%20technologies#RetinalScan

 

Other technologies should also be added to this list, but although in evolution, at the moment, they don’t have a notable presence on the market. One could finally include DNA analysis that, even if it represents the biometric method par excellence, due to its intrinsic complexity and the impossibilities of operating in real time, isn’t commonly included within biometric techniques. We will give further information on the complete processing and the experience matured in Italy on the use of the single techniques in the main report.

 

Public key infrastructure

such as encrypted Internet transaction using digital signatures

The Italian Ministry of Innovation through the “e-government” plan has issued, making EC directives its own, orientation and laws for the regulation of infrastructures, reference standards and management methods for the use and safety of electronic transactions and electronic signature information systems (see attached integral document from the Ministry of Innovation)

In order to provide an initial general description of the type of initiatives that concern electronic security, with particular reference to the Public Administration (PA) and primary national organisations accredited for the management of the processing and digital certification of data systems, here follows some summary elements whilst for further investigation and consultation one should refer to documental elements cited in Chapter 1.

 

The model

 

The model that the government intends to implement is that of a Public Administration orientated to the user, citizen and company, a supplier of modern services, a creator of “public” values, with which it is easy to operate.

An e-government system in its more advanced developments will also represent a strong tool to involve and have citizens participate in decision making processes, evolving towards innovative models of eDemocracy.

Within this model, e-government represents a fundamental, innovative passage that inserts itself in the process of deep transformation that all public organisations are facing to serve citizens and enterprises as “clients” to be managed with maximum attention. The client concept does not mean that the Administrations operate with a view to profit, but simply put that their objective becomes that of supplying services in line with the needs of those who use it and the recipient’s satisfaction with service is an important tool to verify quality.

In order to completely fulfil this concept the Department has developed the following strategic “e-government” reference model.

 

The model is made up of six key elements:

 

• Service supplies – A group of services that should be made available in an innovative way and to a high standard for users-clients (citizens and companies). To focus the development efforts, some services have been identified as being priority for users-clients and these will be considered in the digitalisation initiative. These services will be provided via a single access point, even if they imply the intervention of more than one Administration. The internal complexities of the Public Administration are hidden from the user/client.

• Digital recognition – method of recognition of the user and secure signature through Electronic Identity Card, National Services Card and digital signature

• Access channels- a multitude of innovative channels with which the user accesses different services offered: Internet, call centres, mobiles, third party networks etc

• Supply centres – An efficient and economically optimised back office of different supply centres

• Collaboration and cooperation – Interface standard between Administrations that allow efficient and transparent external communications

• Communication infrastructure – A communication infrastructure that connects all Administrations

 

 

In addition to these components, the available technologies today are usable also to improve the efficiency of the internal processes of the Public Administration (e.g. buying goods and services from PA) and to valorise the internal human resources, raising competences and know-how.

 

Network forensic to analyse Internet use using computer and network identifiers

Also in the forensic field, the desk research has shown a broad literature both to pertaining legislative elements, and illustrative case studies concerning security.

 

Basis of national scientific take-off

 

The increasing request of services provided through data transmission networks has rendered the need to guarantee security in data processing and transmission more and more current and pressing.

While many resources have developed and there has been great effort in the development of tools for the “digital signature”, the weak loop in all security systems is authentication, or rather the verification of personal identity of the individual who accesses the system.

Biometrics provides an efficient answer to the need for authentication, providing the methodologies to recognise the personal identity on the basis of the user’s physical characteristics. There are numerous advantages:

• one avoids the use of a PIN and password that can be stolen, released, forgotten or lost,

• one can change the tolerance of the system toward false alarms on the basis of security requirements. It is extremely difficult to forge the access data.

There are multiple potential applications of these technologies and they range from access control to attendance, from automatic surveillance to the protection of valuable resources, from network security of computers to secure Internet transactions.

 

BUILT IN MICROPROCESSORS

TOWARDS AN E-LEARNING WITH BUILT IN MICROPROCESSORS

The problem with secure recognition of users that benefit from on line training services and control the conditions in which the same undertake learning verification tests, undoubtedly establishes an obstacle to the certification of learning results.

Scientific research in the biometric field and the development of support technology contribute to the solution of this problem.

However, to resolve this problem in an efficient way, it is necessary to consider the whole interaction process between the user and the data transmission system; in this sense we can identify some significant steps such as:

• User enrolment and system access

• User interaction with the system during the completion of the courses

• The formal learning verification

 

In the first step, the traditional system of login and password can be substituted by recognition of fingerprints or a tool such as a smart card or other methods taken from biometric experience in the previous chapter.

In the second step, presuming that the user is interested in participating in the course in order to learn, once the user has been identified by the assigned recognition system available on his/her workstation used for course delivery, we retain that to control the activities that he/she carries out and the outcome of interim questionnaires, the current tracking system available in any Content Learning Manager System platform that responds to the international standards SCORM can be sufficient.

 

The real control problem is connected with the third step, or rather the moment in which it is necessary to have maximum possible certainty not only of user recognition but also that he/she does not receive support or help from other people.

In this case, verification of the physical presence of the user in front of his/her workstation is not sufficient, but could be possibly achievable with an imprint recognition system installed on the mouse or an iris recognition system installed on the computer screen, as other people present in the location could help the user with vocal or written messages.

In this case, in order to validate the test, either the physical presence on site of a certifier of the execution conditions of the said test could be necessary or alternatively an audio-video recording of the location carried out at the same test as the test, so as to document, through filming at 360° that the user has effectively carried out the test completely on his/her own.

 

CONCLUSION AND RECOMMENDATIONS

 

In an e-learning system, the problem of recognising the user and certifying the performance conditions of the tests showing the true learning level is very important and must be dealt with.

It could be wise, however, to undertake a cost-benefit balance to evaluate up to what point it is worth using solutions deriving from biometric research or whether it is better to opt for the conclusive phase of the verification and certification of learning results by using more traditional solutions with a person on site.

Comments (0)

You don't have permission to comment on this page.