{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,7]],"date-time":"2025-07-07T04:01:28Z","timestamp":1751860888525,"version":"3.41.0"},"publisher-location":"Cham","reference-count":51,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319978062"},{"type":"electronic","value":"9783319978079"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-97807-9_7","type":"book-chapter","created":{"date-parts":[[2018,8,17]],"date-time":"2018-08-17T14:39:03Z","timestamp":1534516743000},"page":"83-95","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A Framework for e-Assessment on Students\u2019 Devices: Technical Considerations"],"prefix":"10.1007","author":[{"given":"Bastian","family":"K\u00fcppers","sequence":"first","affiliation":[]},{"given":"Ulrik","family":"Schroeder","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,8,18]]},"reference":[{"key":"7_CR1","unstructured":"Themengruppe Change Management & Organisationsentwicklung: E-Assessment als Herausforderung - Handlungsempfehlungen f\u00fcr Hochschulen. Arbeitspapier Nr. 2. Berlin: Hochschulforum Digitalisierung. (2015). https:\/\/hochschulforumdigitalisierung.de\/sites\/default\/files\/dateien\/HFD%20AP%20Nr%202_E-Asessment%20als%20Herausforderung%20Handlungsempfehlungen%20fuer%20Hochschulen.pdf"},{"key":"7_CR2","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1186\/s41239-016-0015-0","volume":"13","author":"R James","year":"2016","unstructured":"James, R.: Tertiary student attitudes to invigilated, online summative examinations. Int. J. Educ. Technol. High. Educ. 13, 19 (2016). https:\/\/doi.org\/10.1186\/s41239-016-0015-0","journal-title":"Int. J. Educ. Technol. High. Educ."},{"issue":"3","key":"7_CR3","first-page":"100","volume":"11","author":"B Berggren","year":"2015","unstructured":"Berggren, B., Fili, A., Nordberg, O.: Digital examination in higher education\u2013experiences from three different perspectives. Int. J. Educ. Dev. Inf. Commun. Technol. 11(3), 100\u2013108 (2015)","journal-title":"Int. J. Educ. Dev. Inf. Commun. Technol."},{"key":"7_CR4","unstructured":"JISC: Effective Practice with e-Assessment (2007). https:\/\/www.webarchive.org.uk\/wayback\/archive\/20140615085433\/http:\/\/www.jisc.ac.uk\/media\/documents\/themes\/elearning\/effpraceassess.pdf"},{"key":"7_CR5","unstructured":"Biella, D., Engert, S., Huth, D.: Design and delivery of an e-assessment solution at the University of Duisburg-Essen. In: Proceedings of EUNIS 2009 (2009)"},{"key":"7_CR6","unstructured":"B\u00fccking, J.: eKlausuren im Testcenter der Universit\u00e4t Bremen: Ein Praxisbericht (2010). https:\/\/www.campussource.de\/events\/e1010tudortmund\/docs\/Buecking.pdf"},{"key":"7_CR7","unstructured":"Brooks, D.C., Pomerantz, J.: ECAR Study of Undergraduate Students and Information Technology (2017). https:\/\/library.educause.edu\/~\/media\/files\/library\/2017\/10\/studentitstudy2017.pdf"},{"key":"7_CR8","unstructured":"Poll, H.: Student Mobile Device Survey 2015: National Report: College Students (2015). https:\/\/www.pearsoned.com\/wp-content\/uploads\/2015-Pearson-Student-Mobile-Device-Survey-College.pdf"},{"key":"7_CR9","unstructured":"Willige, J.: Auslandsmobilit\u00e4t und digitale Medien. Arbeitspapier Nr. 23. Berlin: Hochschulforum Digitalisierung. (2016). https:\/\/hochschulforumdigitalisierung.de\/sites\/default\/files\/dateien\/HFD_AP_Nr23_Digitale_Medien_und_Mobilitaet.pdf"},{"key":"7_CR10","unstructured":"Forg\u00f3, N., Graupe, S., Pfeiffenbring, J.: Rechtliche Aspekte von E-Assessments an Hochschulen (2016). https:\/\/dx.doi.org\/10.17185\/duepublico\/42871"},{"key":"7_CR11","unstructured":"RWTH Aachen University: Richtlinien zur Aufbewahrung, Aussonderung, Archivierung und Vernichtung von Akten und Unterlagen der RWTH Aachen (2016). http:\/\/www.rwth-aachen.de\/global\/show_document.asp?id=aaaaaaaaaatmzml"},{"key":"7_CR12","unstructured":"German Bundestag: Basic Law for the Federal Republic of Germany (2012). https:\/\/www.btg-bestellservice.de\/pdf\/80201000.pdf"},{"key":"7_CR13","unstructured":"Frank, A.J.: Dependable distributed testing: can the online proctor be reliably computerized? In: Marca, D.A. (ed.) Proceedings of the International Conference on E-Business. SciTePress, S.l (2010)"},{"key":"7_CR14","unstructured":"Safe Exam Browser. https:\/\/www.safeexambrowser.org\/"},{"key":"7_CR15","unstructured":"Inspera Assessment. https:\/\/www.inspera.no\/"},{"key":"7_CR16","unstructured":"WISEflow. https:\/\/europe.wiseflow.net\/"},{"key":"7_CR17","unstructured":"LockDown Browser. http:\/\/www.respondus.com\/products\/lockdown-browser\/"},{"key":"7_CR18","unstructured":"Dahinden, M.: Designprinzipien und Evaluation eines reliablen CBA-Systems zur Erhebung valider Leistungsdaten. Ph.D. thesis (2014). https:\/\/dx.doi.org\/10.3929\/ethz-a-010264032"},{"key":"7_CR19","unstructured":"K\u00fcppers, B., Politze, M., Schroeder, U.: Reliable e-assessment with git practical considerations and implementation (2017). https:\/\/dx.doi.org\/10.17879\/21299722960"},{"key":"7_CR20","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.aci.2016.11.002","volume":"14","author":"K Akherfi","year":"2016","unstructured":"Akherfi, K., Gerndt, M., Harroud, H.: Mobile cloud computing for computation offloading: issues and challenges. Appl. Comput. Inform. 14, 1\u201316 (2016). https:\/\/doi.org\/10.1016\/j.aci.2016.11.002 . ISSN 2210-8327","journal-title":"Appl. Comput. Inform."},{"issue":"7","key":"7_CR21","doi-asserted-by":"publisher","first-page":"6","DOI":"10.9781\/ijimai.2012.171","volume":"1","author":"D Kovachev","year":"2012","unstructured":"Kovachev, D., Klamma, R.: Framework for computation offloading in mobile cloud computing. Int. J. Interact. Multimed. Artif. Intell. 1(7), 6\u201315 (2012). https:\/\/doi.org\/10.9781\/ijimai.2012.171","journal-title":"Int. J. Interact. Multimed. Artif. Intell."},{"issue":"6","key":"7_CR22","doi-asserted-by":"publisher","first-page":"500","DOI":"10.1007\/s11576-008-0095-0","volume":"50","author":"P Buxmann","year":"2008","unstructured":"Buxmann, P., Hess, T., Lehmann, S.: Software as a service. Wirtschaftsinformatik 50(6), 500\u2013503 (2008). https:\/\/doi.org\/10.1007\/s11576-008-0095-0","journal-title":"Wirtschaftsinformatik"},{"key":"7_CR23","unstructured":"Google Chrome. https:\/\/www.google.com\/intl\/en\/chrome\/browser\/desktop\/"},{"key":"7_CR24","unstructured":"Mozilla Firefox. https:\/\/www.mozilla.org\/en-US\/firefox\/"},{"key":"7_CR25","doi-asserted-by":"crossref","unstructured":"K\u00fcppers, B., Schroeder, U.: Bring Your Own Device for e-Assessment \u2013 a review. In: EDULEARN 2016 Proceedings, pp. 8770\u20138776 (2016). https:\/\/dx.doi.org\/10.21125\/edulearn.2016.0919 . ISSN 2340-1117","DOI":"10.21125\/edulearn.2016.0919"},{"key":"7_CR26","unstructured":"About Digital Assessment @Brunel (2017). http:\/\/www.brunel.ac.uk\/about\/education-innovation\/Digital-Assessment-Brunel\/About"},{"key":"7_CR27","unstructured":"eAssessment an der Universit\u00e4t Basel, Basel (2017). https:\/\/bbit-hsd.unibas.ch\/medien\/2017\/10\/EvaExam-Betriebskonzept.pdf"},{"key":"7_CR28","unstructured":"Sadiki, J.: E-Assessment with BYOD, SEB and Moodle at the FFHS (2017). https:\/\/www.eduhub.ch\/export\/sites\/default\/files\/E-Assessment_eduhubdays_showtell.pdf"},{"key":"7_CR29","unstructured":"Kavanagh, M.; Lozza, D.; Messenzehl, L.: Moodle-exams with Safe Exam Browser (SEB) on BYOD (2017). https:\/\/www.eduhub.ch\/export\/sites\/default\/files\/ShowTell_ZHAW.pdf"},{"key":"7_CR30","unstructured":"Die ersten\u2009\u00abBYOD\u00bb\u2009E-Assessments an der PHTG (2016). http:\/\/www.phtg.ch\/news-detail\/456-260216-laessig-die-ersten-byod-e-assessments-an-der-phtg\/"},{"key":"7_CR31","unstructured":"Written examinations. https:\/\/www.uia.no\/en\/student\/examinations\/written-examinations"},{"key":"7_CR32","unstructured":"WISEflow implemented on the University of Agder, Norway. http:\/\/uniwise.dk\/2014\/07\/31\/wiseflow-uia\/"},{"key":"7_CR33","unstructured":"S\u00f8gaard, T.M.: Mitigation of Cheating Threats in Digital BYOD exams. Master\u2019s thesis (2016). https:\/\/dx.doi.org\/11250\/2410735"},{"issue":"4","key":"7_CR34","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1016\/0167-9236(94)00041-2","volume":"15","author":"ST March","year":"1995","unstructured":"March, S.T., Smith, G.F.: Design and natural science research on information technology. Decis. Support Syst. 15(4), 251\u2013266 (1995). https:\/\/doi.org\/10.1016\/0167-9236(94)00041-2 . ISSN 0167-9236","journal-title":"Decis. Support Syst."},{"key":"7_CR35","doi-asserted-by":"publisher","unstructured":"Kaur, R., Kaur, A.: Digital signature. In: 2012 International Conference on Computing Sciences, pp. 295\u2013301 (2012). https:\/\/doi.org\/10.1109\/ICCS.2012.25","DOI":"10.1109\/ICCS.2012.25"},{"issue":"4","key":"7_CR36","first-page":"12","volume":"27","author":"RL Morgan","year":"2004","unstructured":"Morgan, R.L., Cantor, S., Carmody, S., Hoehn, W., Klingenstein, K.: Federated security: the Shibboleth approach. EDUCAUSE Q. 27(4), 12\u201317 (2004)","journal-title":"EDUCAUSE Q."},{"key":"7_CR37","unstructured":"K\u00fcppers, B., Kerber, F., Meyer, U., Schroeder, U.: Beyond lockdown: towards reliable e-assessment. In: GI-Edition - Lecture Notes in Informatics (LNI), P-273, pp. 191\u2013196 (2017). ISSN 1617-5468"},{"issue":"5","key":"7_CR38","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1095810.1095812","volume":"39","author":"A Seshadri","year":"2005","unstructured":"Seshadri, A., Luk, M., Shi, E., Perrig, A., van Doorn, L., Khosla, P.: Pioneer: verifying code integrity and enforcing untampered code execution on legacy systems. ACM SIGOPS Oper. Syst. Rev. 39(5), 1\u201316 (2005). https:\/\/doi.org\/10.1145\/1095810.1095812","journal-title":"ACM SIGOPS Oper. Syst. Rev."},{"key":"7_CR39","doi-asserted-by":"crossref","unstructured":"Garay, J.A., Huelsbergen, L.: Software integrity protection using timed executable agents. In: Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, pp. 189\u2013200 (2006). https:\/\/dx.doi.org\/10.1145\/1128817.1128847","DOI":"10.1145\/1128817.1128847"},{"key":"7_CR40","unstructured":"Electron Framework. https:\/\/electron.atom.io\/"},{"key":"7_CR41","unstructured":"Node.js. https:\/\/nodejs.org\/en\/"},{"key":"7_CR42","unstructured":"JAVA. https:\/\/www.java.com\/de\/"},{"key":"7_CR43","unstructured":"Namiot, D.; Sneps-Sneppe, M.: On micro-services architecture. Int. J. Open Inf. Technol. 2(9) (2014)"},{"key":"7_CR44","doi-asserted-by":"crossref","unstructured":"K\u00fcppers, B., Politze, M., Zameitat, R., Kerber, F., Schroeder, U.: Practical security for electronic examinations on students\u2019 devices. In: Proceedings of SAI Computing Conference 2018 (2018, in Press)","DOI":"10.1007\/978-3-030-01177-2_21"},{"key":"7_CR45","unstructured":"CodeMirror. https:\/\/codemirror.net\/"},{"key":"7_CR46","unstructured":"Zameitat, R., K\u00fcppers, B.: JDB \u2013 Eine Bibliothek f\u00fcr Java-Debugging im Browser (in Press)"},{"key":"7_CR47","doi-asserted-by":"crossref","unstructured":"Fielding, R.T., Taylor, R.N.: Principled design of the modern Web architecture (2002). https:\/\/dx.doi.org\/10.1145\/514183.514185","DOI":"10.1145\/514183.514185"},{"key":"7_CR48","unstructured":"Docker. https:\/\/www.docker.com\/"},{"key":"7_CR49","volume-title":"Pragmatic unit testing in Java 8 with Junit","author":"J Langr","year":"2015","unstructured":"Langr, J., Hunt, A., Thomas, D.: Pragmatic unit testing in Java 8 with Junit, 1st edn. Pragmatic Bookshelf, Raleigh (2015). ISBN 978-1-94122-259-1","edition":"1"},{"key":"7_CR50","doi-asserted-by":"crossref","unstructured":"Queir\u00f3s, R., Leal, J.P.: Programming exercises evaluation systems - an interoperability survey. In: Helfert, M., Martins, M.J., Cordeiro, J. (eds.) CSEDU (1), pp. 83\u201390. SciTePress (2012)","DOI":"10.5220\/0003924900830090"},{"key":"7_CR51","unstructured":"Caliskan-Islam, A., Liu, A., Voss, C., Greenstadt, R.: De-anonymizing programmers via code stylometry. In: Proceedings of the 24th USENIX Security Symposium (2015). ISBN 978-1-931971-232"}],"container-title":["Communications in Computer and Information Science","Technology Enhanced Assessment"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-97807-9_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,6]],"date-time":"2025-07-06T11:38:00Z","timestamp":1751801880000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-97807-9_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319978062","9783319978079"],"references-count":51,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-97807-9_7","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2018]]}}}