<?xml version="1.0" encoding="ISO-8859-1"?><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
<front>
<journal-meta>
<journal-id>1405-5546</journal-id>
<journal-title><![CDATA[Computación y Sistemas]]></journal-title>
<abbrev-journal-title><![CDATA[Comp. y Sist.]]></abbrev-journal-title>
<issn>1405-5546</issn>
<publisher>
<publisher-name><![CDATA[Instituto Politécnico Nacional, Centro de Investigación en Computación]]></publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id>S1405-55462010000200009</article-id>
<title-group>
<article-title xml:lang="en"><![CDATA[Design and Implementation of an Advanced Security Remote Assessment System for Universities Using Data Mining]]></article-title>
<article-title xml:lang="es"><![CDATA[Diseño e Implementación de un Sistema de Evaluación Remota con Seguridad Avanzada para Universidades Utilizando Minería de Datos]]></article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Hernández Aguilar]]></surname>
<given-names><![CDATA[José Alberto]]></given-names>
</name>
<xref ref-type="aff" rid="A01"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Burlak]]></surname>
<given-names><![CDATA[Gennadiy]]></given-names>
</name>
<xref ref-type="aff" rid="A02"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Lara]]></surname>
<given-names><![CDATA[Bruno]]></given-names>
</name>
<xref ref-type="aff" rid="A03"/>
</contrib>
</contrib-group>
<aff id="A01">
<institution><![CDATA[,Universidad Autónoma del Estado de Morelos Centro de Investigación en Ingeniería y Ciencias Aplicadas ]]></institution>
<addr-line><![CDATA[ ]]></addr-line>
</aff>
<aff id="A02">
<institution><![CDATA[,Universidad Autónoma del Estado de Morelos Centro de Investigación en Ingeniería y Ciencias Aplicadas ]]></institution>
<addr-line><![CDATA[ ]]></addr-line>
</aff>
<aff id="A03">
<institution><![CDATA[,Universidad Autónoma del Estado de Morelos Centro de Investigación en Ingeniería y Ciencias Aplicadas ]]></institution>
<addr-line><![CDATA[ ]]></addr-line>
</aff>
<pub-date pub-type="pub">
<day>00</day>
<month>06</month>
<year>2010</year>
</pub-date>
<pub-date pub-type="epub">
<day>00</day>
<month>06</month>
<year>2010</year>
</pub-date>
<volume>13</volume>
<numero>4</numero>
<fpage>463</fpage>
<lpage>473</lpage>
<copyright-statement/>
<copyright-year/>
<self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_arttext&amp;pid=S1405-55462010000200009&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_abstract&amp;pid=S1405-55462010000200009&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_pdf&amp;pid=S1405-55462010000200009&amp;lng=en&amp;nrm=iso"></self-uri><abstract abstract-type="short" xml:lang="en"><p><![CDATA[We develop the detailed application of the computer technology on testing the student's level of knowledge. We implemented a Java original code, client-server technology based on the natural process of evaluation where the college students (clients) are tested for an examiner (server). Later, we discuss the security measures implemented by leading suppliers of e-learning tools, and we distinguish an important opportunity area on the use of advanced security measures that we used to differentiate our tool. Then, we present a data mining methodology to analyze activities of students in online assessments to detect any suspicious behavior (cheating), and show the results of applying it on a real class. Finally, we propose an affordable biometric technology to recognize remote students in online assessments to solve the well-known problem of: "who's there".]]></p></abstract>
<abstract abstract-type="short" xml:lang="es"><p><![CDATA[Desarrollamos una aplicación de la tecnología computational en la evaluación del conocimiento de los estudiantes. Implementamos una tecnología cliente-servidor, de código original en Java, basada en el proceso natural de evaluación donde los estudiantes (clientes) universitarios son evaluados por un examinador (servidor). Mas adelante, discutimos las medidas de seguridad implementadas por los proveedores líderes en herramientas de e-aprendizaje, y distinguimos una importante área de oportunidad en el uso de medidas de seguridad avanzada que usamos para diferenciar a nuestra herramienta. Entonces, presentamos una metodología de minería de datos para analizar las actividades de los estudiantes en evaluaciones en línea para detectar cualquier comportamiento sospechoso (trampas), y mostramos los resultados obtenidos de aplicarla en una clase real. Finalmente, proponemos una tecnología biométrica asequible para identificar a los estudiantes remotos en evaluaciones en línea para solucionar el bien conocido problema de: "¿quién está ahí?".]]></p></abstract>
<kwd-group>
<kwd lng="en"><![CDATA[Online Aassessment System]]></kwd>
<kwd lng="en"><![CDATA[Data Mining]]></kwd>
<kwd lng="en"><![CDATA[Advanced Security]]></kwd>
<kwd lng="en"><![CDATA[Biometry]]></kwd>
<kwd lng="es"><![CDATA[Sistema de Evaluación en Línea]]></kwd>
<kwd lng="es"><![CDATA[Minería de Datos]]></kwd>
<kwd lng="es"><![CDATA[Seguridad Avanzada]]></kwd>
<kwd lng="es"><![CDATA[Biometría]]></kwd>
</kwd-group>
</article-meta>
</front><body><![CDATA[ <p align="justify"><font face="verdana" size="4">Resumen de tesis doctoral</font></p>     <p align="justify"><font face="verdana" size="4">&nbsp;</font></p>     <p align="center"><font face="verdana" size="4"><b>Design and Implementation of an Advanced Security Remote Assessment System for Universities Using Data Mining</b></font></p>     <p align="center"><font face="verdana" size="2">&nbsp;</font></p>     <p align="center"><font face="verdana" size="3"><b><i>Dise&ntilde;o e Implementaci&oacute;n de un Sistema de Evaluaci&oacute;n Remota con Seguridad Avanzada para Universidades Utilizando Miner&iacute;a de Datos</i></b></font></p>     <p align="justify"><font face="verdana" size="2">&nbsp;</font></p>     <p align="justify"><font face="verdana" size="2"><b>Graduated: Jos&eacute; Alberto Hern&aacute;ndez Aguilar    <br> </b></font><font face="verdana" size="2"><i>Centro de Investigaci&oacute;n en Ingenier&iacute;a y Ciencias Aplicadas (CIICAp) Universidad Aut&oacute;noma del Estado de Morelos (UAEM).</i> <a href="mailto:jose_hernandez@uaem.mx">jose_hernandez@uaem.mx</a> </font></p>     <p align="justify"><font face="verdana" size="2"><b>Advisor: Gennadiy Burlak    <br> </b></font><font face="verdana" size="2"><i>Centro de Investigaci&oacute;n en Ingenier&iacute;a y Ciencias Aplicadas (CIICAp) Universidad Aut&oacute;noma del Estado de Morelos (UAEM). </i><a href="mailto:gburlak@uaem.mx">gburlak@uaem.mx</a></font></p>     ]]></body>
<body><![CDATA[<p align="justify"><font face="verdana" size="2"><b>Advisor: Bruno Lara    <br> </b></font><font face="verdana" size="2"><i>Facultad de Ciencias Universidad Aut&oacute;noma del Estado de Morelos (UAEM). </i><a href="mailto:bruno.lara@uaem.mx">bruno.lara@uaem.mx</a></font></p>     <p align="justify"><font face="verdana" size="2">&nbsp;</font></p>     <p align="center"><font face="verdana" size="2">Graduated on November 28, 2008</font></p>     <p align="justify"><font face="verdana" size="2">&nbsp;</font></p>     <p align="justify"><font face="verdana" size="2"><b>Abstract</b></font></p>     <p align="justify"><font face="verdana" size="2">We develop the detailed application of the computer technology on testing the student's level of knowledge. We implemented a Java original code, client&#150;server technology based on the natural process of evaluation where the college students (clients) are tested for an examiner (server). Later, we discuss the security measures implemented by leading suppliers of e&#150;learning tools, and we distinguish an important opportunity area on the use of advanced security measures that we used to differentiate our tool. Then, we present a data mining methodology to analyze activities of students in online assessments to detect any suspicious behavior (cheating), and show the results of applying it on a real class. Finally, we propose an affordable biometric technology to recognize remote students in online assessments to solve the well&#150;known problem of: "who's there". </font></p>     <p align="justify"><font face="verdana" size="2"><b>Keywords:</b> Online Aassessment System, Data Mining, Advanced Security, Biometry.</font></p>     <p align="justify"><font face="verdana" size="2">&nbsp;</font></p>     <p align="justify"><font face="verdana" size="2"><b>Resumen</b></font></p>     ]]></body>
<body><![CDATA[<p align="justify"><font face="verdana" size="2">Desarrollamos una aplicaci&oacute;n de la tecnolog&iacute;a computational en la evaluaci&oacute;n del conocimiento de los estudiantes. Implementamos una tecnolog&iacute;a cliente&#150;servidor, de c&oacute;digo original en Java, basada en el proceso natural de evaluaci&oacute;n donde los estudiantes (clientes) universitarios son evaluados por un examinador (servidor). Mas adelante, discutimos las medidas de seguridad implementadas por los proveedores l&iacute;deres en herramientas de e&#150;aprendizaje, y distinguimos una importante &aacute;rea de oportunidad en el uso de medidas de seguridad avanzada que usamos para diferenciar a nuestra herramienta. Entonces, presentamos una metodolog&iacute;a de miner&iacute;a de datos para analizar las actividades de los estudiantes en evaluaciones en l&iacute;nea para detectar cualquier comportamiento sospechoso (trampas), y mostramos los resultados obtenidos de aplicarla en una clase real. Finalmente, proponemos una tecnolog&iacute;a biom&eacute;trica asequible para identificar a los estudiantes remotos en evaluaciones en l&iacute;nea para solucionar el bien conocido problema de: "&iquest;qui&eacute;n est&aacute; ah&iacute;?".</font></p>     <p align="justify"><font face="verdana" size="2"><b>Palabras clave:</b> Sistema de Evaluaci&oacute;n en L&iacute;nea, Miner&iacute;a de Datos, Seguridad Avanzada, Biometr&iacute;a.</font></p>     <p align="justify"><font face="verdana" size="2">&nbsp;</font></p>     <p align="justify"><font face="verdana" size="2"><a href="/pdf/cys/v13n4/v13n4a9.pdf" target="_blank">DESCARGAR ART&Iacute;CULO EN FORMATO PDF</a> </font></p>     <p align="justify"><font face="verdana" size="2">&nbsp;</font></p>     <p align="justify"><font face="verdana" size="2"><b>References</b></font></p>     <!-- ref --><p align="justify"><font face="verdana" size="2">1. <b>Blackboard (2006, agosto). </b>Security. Retrieved from <a href="http://www.blackboard.com/us/index.aspx" target="_blank">http://www.blackboard.com/us/index.aspx</a></font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2049755&pid=S1405-5546201000020000900001&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">2. <b>BSU Ball State University (2006, agosto). </b>Technology assessment reports on The use of Biometrics in education. Retrieved from <a href="http://web.bsu.edu/dpmuller/biometrics/" target="_blank">http://web.bsu.edu/dpmuller/biometrics/</a></font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2049756&pid=S1405-5546201000020000900002&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">3. <b>Bugai, Y., Burlak, G., Demchenko, A. &amp; Kuz'menko, N. (1997).</b> On Application of Computer Technology Testing In Educational Process, <i>Conference Role of Universities in the Future Information Society RUFIS'97, </i>Prague, Czech Republic, 141&#150;144.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2049757&pid=S1405-5546201000020000900003&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">4. <b>Burlak, G.N., Hern&aacute;ndez, J.A. &amp; Zamudio&#150;Lara, A. (2005). </b>The Application Of Online Testing For Educational Process In Client&#150;Server System. <i>CONGRESS: IADIS International Conference, </i>Lisbon, Portugal, vol. 2, 389&#150;392.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2049758&pid=S1405-5546201000020000900004&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">5. <b>Burlak, G., Ochoa. A. &amp; Hern&aacute;ndez, J.A. (2005a). </b>The application of learning objects and Client&#150;Server technology in online testing to measure basic knowledge level. In <i>CONGRESS: X. Simp&oacute;sio de Inform&aacute;tica, V Mostra de Software Academico da PUCRS, </i>Uruguaiana, RS Brasil, 51&#150;58.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2049759&pid=S1405-5546201000020000900005&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">6. <b>Burlak, G., Hern&aacute;ndez, J.A., Ochoa, A. &amp; Mu&ntilde;oz, J. (2006). </b>The measurement of the Student's basic Knowledge obtained by means of computer assessments, <i> Research in Computing Science, Special issue: Advances in Computer Science and Engineering. </i>23, 201&#150;213.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2049760&pid=S1405-5546201000020000900006&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">7. <b>Cavalli, A., Magg, S., Papagiannaki, S. &amp; Verigakis, G. (2005).</b> From UML models to automatic generated tests for the dotLRN e&#150;learning platform, <i>Electronic Notes in Theoretical Computer Science </i>116, 133&#150;144. Retrieved form <a href="http://www.elsevier.com/locate/entcs" target="_blank">http://www.elsevier.com/locate/entcs</a></font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2049761&pid=S1405-5546201000020000900007&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">8. <b>Hern&aacute;ndez, J.A., Ochoa, A., Mu&ntilde;oz, J. &amp; Burlak, G. (2006).</b> Detecting cheats in online student assessments using Data Mining. <i>Dmin06, </i>Las Vegas Nevada, USA, 204&#150;210.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2049762&pid=S1405-5546201000020000900008&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">9. <b>Hern&aacute;ndez, J.A., Ochoa, A., Andaverde, A. &amp; Burlak, G. (2008).</b> Biometrics in online assessments: A Study Case in High School Students. <i>18th International Conference on Electronics, Communications and Computers Conielecomp, </i>Puebla, Mexico, 111&#150;116.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2049763&pid=S1405-5546201000020000900009&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">10. <b>Hunt, N., Hughes, J. &amp; Rowe, G. (2002).</b> Formative Automated Computer Testing (FACT). <i>British Journal of Educational Technology, </i>33(5), 525&#150;535</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2049764&pid=S1405-5546201000020000900010&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">11. <b>Jing, L. &amp; Derrick, J. (2005, December).</b> Data Mining and Its applications in Higher Education. Retrieved from <a href="http://www.ebscohost.com/" target="_blank">http://www.ebscohost.com/</a></font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2049765&pid=S1405-5546201000020000900011&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">12. <b>McCabe, D. L. &amp; Trevino, L. K. (1996).</b> What we know about cheating in college: Longitudinal trends and recent developments. <i>Change, </i>28(1), 28&#150;33.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2049766&pid=S1405-5546201000020000900012&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">13. <b>McCabe, D. L. &amp; Trevino, L. K. (1997).</b> Individual and contextual influences on academic dishonesty: A multi&#150;campus investigation. <i>Research in Higher Education, </i>38(3), 379&#150;396.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2049767&pid=S1405-5546201000020000900013&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">14. <b>Michigan Org (2007, agosto).</b> Fingerprint Classification. Retrieved from <a href="http://www.reachoutmichigan.org/funexperiments/agesubiect/lessons/prints_ext.html" target="_blank">http://www.reachoutmichigan.org/funexperiments/agesubiect/lessons/prints_ext.html</a></font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2049768&pid=S1405-5546201000020000900014&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">15. <b>Morris, T. A. (2005, 30 de diciembre).</b> Cheating and plagiarism in the information age. Retrieved from <a href="http://terrymorris.net/tohe2004/CPIA_morris.pdf" target="_blank">http://terrymorris.net/tohe2004/CPIA_morris.pdf</a> </font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2049769&pid=S1405-5546201000020000900015&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">16.   <b>Ochoa, A. (2006).</b> <i>M&aacute;s all&aacute; del Razonamiento Basado en Casos y una aproximaci&oacute;n al Modelado de Sociedades Utilizando Miner&iacute;a de Datos</i>. Post Doctoral Thesis, State University of Campinas, Radamelli, SP Brazil. </font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2049770&pid=S1405-5546201000020000900016&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">17. <b>Ochoa, A., et al. (2006).</b> Italianit&aacute;: Discovering a Pygmalion Effect on Italian Communities. <i>Advances in Computer Science and Engineering, </i>19, 57&#150;67.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2049771&pid=S1405-5546201000020000900017&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">18. <b>Ochoa, A., Hern&aacute;ndez, J.A., Gonz&aacute;lez, S., Castro, A. &amp; Ponce, J.C. (2008).</b> Evaluating the Authority in a Weblog Community. <i>Computaci&oacute;n y Sistemas</i>,11(4), 370&#150;380.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2049772&pid=S1405-5546201000020000900018&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">19. <b>Pearson (2006, agosto).</b> Pearson Online Assessment Software from Pearson Assessments. Retrieved from <a href="http://www.pearsonassessments.com/pai/" target="_blank">http://www.pearsonassessments.com</a></font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2049773&pid=S1405-5546201000020000900019&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">20. <b>QuestionMark   (2006,   agosto).</b>   QuestionMark   Perception  Product   Information.   Retrieved from <a href="http://www.questionmark.com/us/perception/" target="_blank">http://www.questionmark.com/us/perception/</a></font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2049774&pid=S1405-5546201000020000900020&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">21. <b>Rove, N. C. (2005, 30 de diciembre).</b> Cheating in Online Assessment: Beyond Plagiarism. <i>Online Journal of Distance Learning Administration, </i>3(2), State University of West Georgia, Distance Education Center. Retrieved from <a href="http://www.westga.edu/%7Edistance/ojdla/summer72/rowe72.html" target="_blank">http://www.westga.edu/&#126;distance/ojdla/summer72/rowe72.html</a></font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2049775&pid=S1405-5546201000020000900021&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">22. <b>Tapiador, M. &amp; Sing&uuml;enza, J. A. (2005).</b> <i>Tecnolog&iacute;as biom&eacute;tricas aplicadas a la seguridad. </i>M&eacute;xico, D.F. : Alfaomega.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2049776&pid=S1405-5546201000020000900022&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">23. <b>Van Horn, Royal. (1998).</b> Data Mining For Research and Evaluation. <i>Phi&#150;Delta&#150;Kappan Technology Section,</i> 251&#150;252. </font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2049777&pid=S1405-5546201000020000900023&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">24. <b>Varughese, J. (2005, abril).</b> Testing, Testing: Ensure the success of students with online assessment tools. Retrieved from <a href="http://www.universitybusiness.com/" target="_blank">http://www.universitybusiness.com/</a></font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2049778&pid=S1405-5546201000020000900024&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">25. <b>Weka    (2005,    21    de    diciembre).</b>    Data    Mining    Software    in    Java.    Retrieved from <a href="http://www.cs.waikato.ac.nz/ml/weka/" target="_blank">http://www.cs.waikato.ac.nz/ml/weka/</a></font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2049779&pid=S1405-5546201000020000900025&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">26. <b>Wisher, R., Curnow, C. &amp; Belanich, J.</b> (2005). Verifying the Learner in distance learning. <i>18 Annual Conference on Distance Teaching and Learning. </i>Wisconsin, USA.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2049780&pid=S1405-5546201000020000900026&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --> ]]></body><back>
<ref-list>
<ref id="B1">
<label>1</label><nlm-citation citation-type="">
<collab>Blackboard</collab>
<source><![CDATA[Security]]></source>
<year>2006</year>
</nlm-citation>
</ref>
<ref id="B2">
<label>2</label><nlm-citation citation-type="">
<collab>BSU Ball State University</collab>
<source><![CDATA[Technology assessment reports on The use of Biometrics in education]]></source>
<year>2006</year>
</nlm-citation>
</ref>
<ref id="B3">
<label>3</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Bugai]]></surname>
<given-names><![CDATA[Y]]></given-names>
</name>
<name>
<surname><![CDATA[Burlak]]></surname>
<given-names><![CDATA[G]]></given-names>
</name>
<name>
<surname><![CDATA[Demchenko]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
<name>
<surname><![CDATA[Kuz'menko]]></surname>
<given-names><![CDATA[N]]></given-names>
</name>
</person-group>
<source><![CDATA[On Application of Computer Technology Testing In Educational Process]]></source>
<year>1997</year>
<conf-name><![CDATA[ Conference Role of Universities in the Future Information Society RUFIS'97]]></conf-name>
<conf-loc>Prague </conf-loc>
<page-range>141-144</page-range></nlm-citation>
</ref>
<ref id="B4">
<label>4</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Burlak]]></surname>
<given-names><![CDATA[G.N.]]></given-names>
</name>
<name>
<surname><![CDATA[Hernández]]></surname>
<given-names><![CDATA[J.A.]]></given-names>
</name>
<name>
<surname><![CDATA[Zamudio-Lara]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
</person-group>
<source><![CDATA[The Application Of Online Testing For Educational Process In Client-Server System]]></source>
<year>2005</year>
<volume>2</volume>
<conf-name><![CDATA[ IADIS International Conference]]></conf-name>
<conf-loc>Lisbon </conf-loc>
<page-range>389-392</page-range></nlm-citation>
</ref>
<ref id="B5">
<label>5</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Burlak]]></surname>
<given-names><![CDATA[G]]></given-names>
</name>
<name>
<surname><![CDATA[Ochoa]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
<name>
<surname><![CDATA[Hernández]]></surname>
<given-names><![CDATA[J.A.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[The application of learning objects and Client-Server technology in online testing to measure basic knowledge level]]></article-title>
<source><![CDATA[]]></source>
<year>2005</year>
<conf-name><![CDATA[X Simpósio de Informática]]></conf-name>
<conf-loc> </conf-loc>
<page-range>51-58</page-range><publisher-loc><![CDATA[Uruguaiana ]]></publisher-loc>
</nlm-citation>
</ref>
<ref id="B6">
<label>6</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Burlak]]></surname>
<given-names><![CDATA[G]]></given-names>
</name>
<name>
<surname><![CDATA[Hernández]]></surname>
<given-names><![CDATA[J.A.]]></given-names>
</name>
<name>
<surname><![CDATA[Ochoa]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
<name>
<surname><![CDATA[Muñoz]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[The measurement of the Student's basic Knowledge obtained by means of computer assessments]]></article-title>
<source><![CDATA[Research in Computing Science]]></source>
<year>2006</year>
<volume>23</volume>
<page-range>201-213</page-range></nlm-citation>
</ref>
<ref id="B7">
<label>7</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Cavalli]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
<name>
<surname><![CDATA[Magg]]></surname>
<given-names><![CDATA[S]]></given-names>
</name>
<name>
<surname><![CDATA[Papagiannaki]]></surname>
<given-names><![CDATA[S]]></given-names>
</name>
<name>
<surname><![CDATA[Verigakis]]></surname>
<given-names><![CDATA[G]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[From UML models to automatic generated tests for the dotLRN e-learning platform]]></article-title>
<source><![CDATA[Electronic Notes in Theoretical Computer Science]]></source>
<year>2005</year>
<volume>116</volume>
<page-range>133-144</page-range></nlm-citation>
</ref>
<ref id="B8">
<label>8</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Hernández]]></surname>
<given-names><![CDATA[J.A.]]></given-names>
</name>
<name>
<surname><![CDATA[Ochoa]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
<name>
<surname><![CDATA[Muñoz]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
<name>
<surname><![CDATA[Burlak]]></surname>
<given-names><![CDATA[G]]></given-names>
</name>
</person-group>
<source><![CDATA[Detecting cheats in online student assessments using Data Mining]]></source>
<year>2006</year>
<page-range>204-210</page-range><publisher-loc><![CDATA[^eLas Vegas Nevada Las Vegas Nevada]]></publisher-loc>
</nlm-citation>
</ref>
<ref id="B9">
<label>9</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Hernández]]></surname>
<given-names><![CDATA[J.A.]]></given-names>
</name>
<name>
<surname><![CDATA[Ochoa]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
<name>
<surname><![CDATA[Andaverde]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
<name>
<surname><![CDATA[Burlak]]></surname>
<given-names><![CDATA[G]]></given-names>
</name>
</person-group>
<source><![CDATA[Biometrics in online assessments: A Study Case in High School Students]]></source>
<year>2008</year>
<conf-name><![CDATA[18 International Conference on Electronics, Communications and Computers Conielecomp]]></conf-name>
<conf-loc>Puebla Puebla</conf-loc>
<page-range>111-116</page-range></nlm-citation>
</ref>
<ref id="B10">
<label>10</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Hunt]]></surname>
<given-names><![CDATA[N]]></given-names>
</name>
<name>
<surname><![CDATA[Hughes]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
<name>
<surname><![CDATA[Rowe]]></surname>
<given-names><![CDATA[G]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Formative Automated Computer Testing (FACT)]]></article-title>
<source><![CDATA[British Journal of Educational Technology]]></source>
<year>2002</year>
<volume>33</volume>
<numero>5</numero>
<issue>5</issue>
<page-range>525-535</page-range></nlm-citation>
</ref>
<ref id="B11">
<label>11</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Jing]]></surname>
<given-names><![CDATA[L]]></given-names>
</name>
<name>
<surname><![CDATA[Derrick]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
</person-group>
<source><![CDATA[Data Mining and Its applications in Higher Education]]></source>
<year>2005</year>
</nlm-citation>
</ref>
<ref id="B12">
<label>12</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[McCabe]]></surname>
<given-names><![CDATA[D. L.]]></given-names>
</name>
<name>
<surname><![CDATA[Trevino]]></surname>
<given-names><![CDATA[L. K.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[What we know about cheating in college: Longitudinal trends and recent developments]]></article-title>
<source><![CDATA[Change]]></source>
<year>1996</year>
<volume>28</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>28-33</page-range></nlm-citation>
</ref>
<ref id="B13">
<label>13</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[McCabe]]></surname>
<given-names><![CDATA[D. L.]]></given-names>
</name>
<name>
<surname><![CDATA[Trevino]]></surname>
<given-names><![CDATA[L. K.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Individual and contextual influences on academic dishonesty: A multi-campus investigation]]></article-title>
<source><![CDATA[Research in Higher Education]]></source>
<year>1997</year>
<volume>38</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>379-396</page-range></nlm-citation>
</ref>
<ref id="B14">
<label>14</label><nlm-citation citation-type="">
<collab>Michigan Org</collab>
<source><![CDATA[Fingerprint Classification]]></source>
<year>2007</year>
</nlm-citation>
</ref>
<ref id="B15">
<label>15</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Morris]]></surname>
<given-names><![CDATA[T. A.]]></given-names>
</name>
</person-group>
<source><![CDATA[Cheating and plagiarism in the information age]]></source>
<year>2005</year>
</nlm-citation>
</ref>
<ref id="B16">
<label>16</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ochoa]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
</person-group>
<source><![CDATA[Más allá del Razonamiento Basado en Casos y una aproximación al Modelado de Sociedades Utilizando Minería de Datos]]></source>
<year>2006</year>
</nlm-citation>
</ref>
<ref id="B17">
<label>17</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ochoa]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Italianitá: Discovering a Pygmalion Effect on Italian Communities]]></article-title>
<source><![CDATA[Advances in Computer Science and Engineering]]></source>
<year>2006</year>
<volume>19</volume>
<page-range>57-67</page-range></nlm-citation>
</ref>
<ref id="B18">
<label>18</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ochoa]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
<name>
<surname><![CDATA[Hernández]]></surname>
<given-names><![CDATA[J.A.]]></given-names>
</name>
<name>
<surname><![CDATA[González]]></surname>
<given-names><![CDATA[S]]></given-names>
</name>
<name>
<surname><![CDATA[Castro]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
<name>
<surname><![CDATA[Ponce]]></surname>
<given-names><![CDATA[J.C.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Evaluating the Authority in a Weblog Community]]></article-title>
<source><![CDATA[Computación y Sistemas]]></source>
<year>2008</year>
<volume>11</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>370-380</page-range></nlm-citation>
</ref>
<ref id="B19">
<label>19</label><nlm-citation citation-type="">
<collab>Pearson</collab>
<source><![CDATA[Pearson Online Assessment Software from Pearson Assessments]]></source>
<year>2006</year>
</nlm-citation>
</ref>
<ref id="B20">
<label>20</label><nlm-citation citation-type="">
<collab>QuestionMark</collab>
<source><![CDATA[QuestionMark Perception Product Information]]></source>
<year>2006</year>
</nlm-citation>
</ref>
<ref id="B21">
<label>21</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Rove]]></surname>
<given-names><![CDATA[N. C.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Cheating in Online Assessment: Beyond Plagiarism]]></article-title>
<source><![CDATA[Online Journal of Distance Learning Administration]]></source>
<year>2005</year>
<volume>3</volume>
<numero>2</numero>
<issue>2</issue>
<publisher-name><![CDATA[State University of West GeorgiaDistance Education Center]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B22">
<label>22</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Tapiador]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
<name>
<surname><![CDATA[Singüenza]]></surname>
<given-names><![CDATA[J. A.]]></given-names>
</name>
</person-group>
<source><![CDATA[Tecnologías biométricas aplicadas a la seguridad]]></source>
<year>2005</year>
<publisher-loc><![CDATA[México^eD.F. D.F.]]></publisher-loc>
<publisher-name><![CDATA[Alfaomega]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B23">
<label>23</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Van Horn]]></surname>
<given-names><![CDATA[Royal]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Data Mining For Research and Evaluation]]></article-title>
<source><![CDATA[Phi-Delta-Kappan Technology Section]]></source>
<year>1998</year>
<page-range>251-252</page-range></nlm-citation>
</ref>
<ref id="B24">
<label>24</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Varughese]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
</person-group>
<source><![CDATA[Testing, Testing: Ensure the success of students with online assessment tools]]></source>
<year>2005</year>
</nlm-citation>
</ref>
<ref id="B25">
<label>25</label><nlm-citation citation-type="">
<collab>Weka</collab>
<source><![CDATA[Data Mining Software in Java]]></source>
<year>2005</year>
</nlm-citation>
</ref>
<ref id="B26">
<label>26</label><nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Wisher]]></surname>
<given-names><![CDATA[R]]></given-names>
</name>
<name>
<surname><![CDATA[Curnow]]></surname>
<given-names><![CDATA[C]]></given-names>
</name>
<name>
<surname><![CDATA[Belanich]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
</person-group>
<source><![CDATA[Verifying the Learner in distance learning]]></source>
<year>2005</year>
<conf-name><![CDATA[18 Annual Conference on Distance Teaching and Learning]]></conf-name>
<conf-loc>Wisconsin Wisconsin</conf-loc>
</nlm-citation>
</ref>
</ref-list>
</back>
</article>
