{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T14:05:33Z","timestamp":1771509933769,"version":"3.50.1"},"publisher-location":"Cham","reference-count":21,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319656359","type":"print"},{"value":"9783319656366","type":"electronic"}],"license":[{"start":{"date-parts":[[2017,8,17]],"date-time":"2017-08-17T00:00:00Z","timestamp":1502928000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-65636-6_23","type":"book-chapter","created":{"date-parts":[[2017,8,16]],"date-time":"2017-08-16T00:13:28Z","timestamp":1502842408000},"page":"262-273","source":"Crossref","is-referenced-by-count":6,"title":["Open Proctor: An Academic Integrity Tool for the Open Learning Environment"],"prefix":"10.1007","author":[{"given":"Alexander","family":"Amigud","sequence":"first","affiliation":[]},{"given":"Joan","family":"Arnedo-Moreno","sequence":"additional","affiliation":[]},{"given":"Thanasis","family":"Daradoumis","sequence":"additional","affiliation":[]},{"given":"Ana-Elena","family":"Guerrero-Roldan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,8,17]]},"reference":[{"key":"23_CR1","first-page":"143","volume":"73","author":"PA Aceves","year":"2009","unstructured":"Aceves, P.A., Aceves, R.I.: Student identity and authentication in distance education: a primer for distance learning administrators. Contin. High. Educ. Rev. 73, 143\u2013152 (2009)","journal-title":"Contin. High. Educ. Rev."},{"key":"23_CR2","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1007\/978-1-4614-3223-4_6","volume-title":"Mining Text Data","author":"CC Aggarwal","year":"2012","unstructured":"Aggarwal, C.C., Zhai, C.: A survey of text classification algorithms. In: Aggarwal, C., Zhai, C. (eds.) Mining Text Data, pp. 163\u2013222. Springer Nature, Boston (2012). doi: 10.1007\/978-1-4614-3223-4_6"},{"issue":"5","key":"23_CR3","doi-asserted-by":"crossref","first-page":"128","DOI":"10.19173\/irrodl.v14i5.1541","volume":"14","author":"A Amigud","year":"2013","unstructured":"Amigud, A.: Institutional level identity control strategies in the distance education environment: a survey of administrative staff. Int. Rev. Res. Open Distrib. Learn. 14(5), 128\u2013143 (2013)","journal-title":"Int. Rev. Res. Open Distrib. Learn."},{"key":"23_CR4","doi-asserted-by":"crossref","unstructured":"Amigud, A., Arnedo-Moreno, J., Daradoumis, T., Guerrero-Roldan, A.E.: A behavioral biometrics based and machine learning aided framework for academic integrity in e-assessment. In: 2016 International Conference on Intelligent Networking and Collaborative Systems (INCoS), pp. 255\u2013262. IEEE (2016)","DOI":"10.1109\/INCoS.2016.16"},{"key":"23_CR5","first-page":"65","volume":"3","author":"JL Bailie","year":"2008","unstructured":"Bailie, J.L., Jortberg, M.A.: Distance learning student authentication: verifying the identity of online students. Find. Common Ground Programs Strat. Struct. Support Stud. Success 3, 65\u201368 (2008)","journal-title":"Find. Common Ground Programs Strat. Struct. Support Stud. Success"},{"key":"23_CR6","unstructured":"Bichsel, J.: The state of e-learning in higher education: an eye toward growth and increased access. EDUCAUSE Center for Analysis and Research (2013)"},{"key":"23_CR7","doi-asserted-by":"crossref","unstructured":"Bird, S.: Nltk: the natural language toolkit. In: Proceedings of the COLING\/ACL on Interactive Presentation Sessions, pp. 69\u201372. Association for Computational Linguistics (2006)","DOI":"10.3115\/1225403.1225421"},{"issue":"3","key":"23_CR8","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/2382448.2382450","volume":"15","author":"M Brennan","year":"2012","unstructured":"Brennan, M., Afroz, S., Greenstadt, R.: Adversarial stylometry: circumventing authorship recognition to preserve privacy and anonymity. ACM Trans. Inf. Syst. Secur. 15(3), 1 (2012)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"23_CR9","doi-asserted-by":"crossref","unstructured":"Brocardo, M.L., Traore, I., Saad, S., Woungang, I.: Authorship verification for short messages using stylometry. In: 2013 International Conference on Computer, Information and Telecommunication Systems (CITS), pp. 1\u20136. IEEE (2013)","DOI":"10.1109\/CITS.2013.6705711"},{"issue":"10","key":"23_CR10","doi-asserted-by":"crossref","first-page":"78","DOI":"10.1145\/2347736.2347755","volume":"55","author":"P Domingos","year":"2012","unstructured":"Domingos, P.: A few useful things to know about machine learning. Commun. ACM 55(10), 78\u201387 (2012)","journal-title":"Commun. ACM"},{"issue":"4","key":"23_CR11","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1109\/MTS.2010.939225","volume":"29","author":"RL Fiedler","year":"2010","unstructured":"Fiedler, R.L., Kaner, C.: Plagiarism-detection services: how well do they actually perform? IEEE Technol. Soc. Mag. 29(4), 37\u201343 (2010)","journal-title":"IEEE Technol. Soc. Mag."},{"issue":"1","key":"23_CR12","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1007\/s10994-006-6226-1","volume":"63","author":"P Geurts","year":"2006","unstructured":"Geurts, P., Ernst, D., Wehenkel, L.: Extremely randomized trees. Mach. Learn. 63(1), 3\u201342 (2006)","journal-title":"Mach. Learn."},{"issue":"3","key":"23_CR13","doi-asserted-by":"crossref","first-page":"229","DOI":"10.1080\/15391523.2013.10782604","volume":"45","author":"NC Heckler","year":"2013","unstructured":"Heckler, N.C., Rice, M., Hobson Bryan, C.: Turnitin systems: a deterrent to plagiarism in college classrooms. J. Res. Technol. Educ. 45(3), 229\u2013248 (2013)","journal-title":"J. Res. Technol. Educ."},{"key":"23_CR14","unstructured":"Jortberg, M.: Experiences verifying the identity of distance learning students. Third annual report on identity in distance learning. http:\/\/www.uwex.edu\/disted\/conference\/Resource_library\/proceedings"},{"key":"23_CR15","doi-asserted-by":"crossref","unstructured":"Kang, B.H., Kim, H.: Proposal: a design of e-learning user authentication system. Int. J. Secur. Appl. 9(1), 45\u201350 (2015). http:\/\/dx.doi.org\/10.14257\/ijsia.2015.9.1.05","DOI":"10.14257\/ijsia.2015.9.1.05"},{"key":"23_CR16","doi-asserted-by":"crossref","unstructured":"Lilley, M., et al.: Remote live invigilation: a pilot study. J. Interact. Media Educ. 2016(1), p. 6 (2016). http:\/\/dx.doi.org\/10.5334\/jime.408 . 1-5","DOI":"10.5334\/jime.408"},{"key":"23_CR17","doi-asserted-by":"crossref","unstructured":"Mothukuri, U., Jain, S., Muralidharan, V.: Invigilated online assessment: various ways to minimize unauthorized help. In: 2012 IEEE Symposium on E-Learning, E-Management and E-Services (IS3e), pp. 1\u20134, October 2012","DOI":"10.1109\/IS3e.2012.6414961"},{"key":"23_CR18","first-page":"2825","volume":"12","author":"F Pedregosa","year":"2011","unstructured":"Pedregosa, F., Varoquaux, G., Gramfort, A., Michel, V., Thirion, B., Grisel, O., Blondel, M., Prettenhofer, P., Weiss, R., Dubourg, V., Vanderplas, J., Passos, A., Cournapeau, D., Brucher, M., Perrot, M., Duchesnay, E.: Scikit-learn: machine learning in python. J. Mach. Learn. Res. 12, 2825\u20132830 (2011)","journal-title":"J. Mach. Learn. Res."},{"key":"23_CR19","volume-title":"Python Machine Learning","author":"S Raschka","year":"2015","unstructured":"Raschka, S.: Python Machine Learning. Packt Publishing Ltd., Birmingham (2015)"},{"issue":"6","key":"23_CR20","first-page":"25","volume":"5","author":"G Saunders","year":"2011","unstructured":"Saunders, G., Wenzel, L., Stivason, C.T.: Internet courses: who is doing the work? J. Coll. Teach. Learn. (TLC) 5(6), 25\u201336 (2011)","journal-title":"J. Coll. Teach. Learn. (TLC)"},{"issue":"3","key":"23_CR21","doi-asserted-by":"crossref","first-page":"538","DOI":"10.1002\/asi.21001","volume":"60","author":"E Stamatatos","year":"2009","unstructured":"Stamatatos, E.: A survey of modern authorship attribution methods. J. Am. Soc. Inform. Sci. Technol. 60(3), 538\u2013556 (2009)","journal-title":"J. Am. Soc. Inform. Sci. Technol."}],"container-title":["Lecture Notes on Data Engineering and Communications Technologies","Advances in Intelligent Networking and Collaborative Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-65636-6_23","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,2]],"date-time":"2019-10-02T08:42:16Z","timestamp":1570005736000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-65636-6_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,8,17]]},"ISBN":["9783319656359","9783319656366"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-65636-6_23","relation":{},"ISSN":["2367-4512","2367-4520"],"issn-type":[{"value":"2367-4512","type":"print"},{"value":"2367-4520","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,8,17]]}}}