| |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Editor’s Note: The question of student identity verification arises from time to time. In this instance, it is requested by a United States Federal Law, the Higher Education Opportunity Act of 2008. This study collects data from administrators and faculty to discover their levels of concern and actions currently undertaken to confirm correct identity for distance learning students. Student Identity Verification |
Answer options | Response percent | Response count |
Administrator | 5.4% | 23 |
Chair | 5.6% | 24 |
Dean | 2.1% | 9 |
Faculty | 84.5% | 361 |
Other | 2.3% | 10 |
Total responses | 427 | |
Skipped question | 0 |
Question 2: The level of student identity verification performed at my educational institution definitely confirms the identity of the student and ensures that the individual completing graded elements is in fact the student.
Answer options | Response percent | Response count |
Strongly disagree | 7.8% | 33 |
Disagree | 16.4% | 69 |
Neutral | 23.2% | 98 |
Agree | 38.4% | 162 |
Strongly agree | 14.2% | 60 |
Total responses | 422 | |
Skipped question | 5 |
Question 3: The process utilized for student identity verification is (or should be) embedded within the institutions learning management system (LMS).
Answer options | Response percent | Response count |
Strongly disagree | 3.1% | 13 |
Disagree | 2.4% | 10 |
Neutral | 13.8% | 58 |
Agree | 52.3% | 220 |
Strongly agree | 28.5% | 120 |
Total responses | 421 | |
Skipped question | 6 |
Question 4: The following methods are utilized as means to confirm student identity at my institution (select all that apply).
Answer options | Response percent | Response count |
Username/Password | 89.6% | 380 |
Proctored exams (in person or remote) | 51.9% | 220 |
Security questions – 3rd-party driven | 6.4% | 27 |
Security questions – student driven | 9.2% | 39 |
Exam Passwords – Instructor/platform driven | 25.7% | 109 |
Other (please specify) | 15.1% | 64 |
Total responses | 424 | |
Skipped question | 3 |
Question 5: The primary responsibility for student identity verification lies with the
(select all that apply).
Answer options | Response percent | Response count |
Instructor | 59.4% | 252 |
Registrar | 40.1% | 170 |
Information technology | 40.8% | 173 |
Administration | 32.5% | 138 |
Other (please specify) | 12.0% | 51 |
Total responses | 424 | |
Skipped question | 3 |
Question 6: My institution is actively looking for improved methodologies to confirm student identity verification.
Answer options | Response percent | Response count |
Strongly disagree | 4.3% | 18 |
Disagree | 10.0% | 42 |
Neutral/Do not know | 63.1% | 265 |
Agree | 17.4% | 73 |
Strongly agree | 5.2% | 22 |
Total responses | 420 | |
Skipped question | 7 |
Question 7: The issues faced by institutions with online components in the area of student identity verification are similar to those experienced on traditional ground campuses.
Answer options | Response percent | Response count |
Strongly disagree | 13.8% | 58 |
Disagree | 41.8% | 176 |
Neutral | 14.0% | 59 |
Agree | 26.6% | 112 |
Strongly agree | 3.9% | 16 |
Total responses | 421 | |
Skipped question | 6 |
Question 8: The following best describes the nature of my institution’s online learning environment.
Answer options | Response percent | Response count |
Fully online | 24.9% | 105 |
Hybrid approach with both classroom and online course offerings | 53.3% | 225 |
Classroom instruction with online exams | 2.4% | 10 |
Supplemental learning only offers online. Graded elements completed in person or with proctor. | 7.8% | 33 |
Online components not offered | 2.4% | 10 |
Other (please specify) | 9.2% | 39 |
Total responses | 422 | |
Skipped question | 5 |
Question 9: In my estimation, the need for improved methods of student identity verification is.
Answer options | Response percent | Response count |
Not very important | 8.9% | 37 |
Important | 40.2% | 168 |
Very important | 39.7% | 166 |
Urgent | 11.2% | 47 |
Total responses | 418 | |
Skipped question | 9 |
Question 10: The ability to confirm student identity in my institution’s programs impacts its reputation in the marketplace and the quality of its graduates.
Answer options | Response percent | Response count |
Strongly disagree | 4.1% | 17 |
Disagree | 11.0% | 46 |
Neutral | 19.7% | 82 |
Agree | 43.4% | 181 |
Strongly agree | 21.8% | 91 |
Total responses | 417 | |
Skipped question | 10 |
Question 11: My level of familiarity of recent legislation leading to the reauthorization of the Higher Education Act (HEA), specifically the College Opportunity and Affordability Act (H.R. 4137), which contains verbiage directing accrediting agencies to “require an institution that offers distance education to have processes through which the institution establishes that the student who registers in a distance education course or program is the same student who participates in and completes the program and receives the academic credit”
(H.R. 4137, 110th Congress, 2007).
Answer options | Response percent | Response count |
Not very familiar | 59.9% | 252 |
Somewhat familiar | 20.4% | 86 |
Familiar | 14.3% | 60 |
Very familiar | 5.5% | 23 |
Total Responses | 421 | |
Skipped Question | 6 |
Question 12: I wish to share the following additional comments on the topic.
Answer options | Response percent | Response count |
Total responses | 18.7% | 80 |
Skipped question | 81.3% | 347 |
It was clear from the feedback that this study addressed a topic that many of the participants were interested in. Some respondents noted that they had never really thought about student identity verification, so this study brought forth new information that allowed them to reflect on how student identity verification is currently conducted and the importance of improved methodologies.
The results of the survey were examined by all three researchers independently to identify emergent themes. Notes were then compared, consolidated, and agreed upon. The identified themes are discussed next.
Over 50% of the respondents stated that they agreed or strongly agreed that their institutions’ current identity verification methodologies definitively confirm the identities of the students and ensure that the students who are registered actually are the students taking the course. The majority of respondents noted that a hybrid approach to online learning is being utilized. These outcomes, coupled with the data points indicating that username and password are the most widely used forms of verification, with a little more than half additionally using proctoring and a quarter using exam passwords, suggested that perhaps the term definitively was not clearly understood by the respondents or that they had given enough reflection to the question. Over 50% of the respondents suggested that improved methods of identity verification are very important or are urgently needed.
The respondents felt that the responsibility for student identity verification should be assumed by multiple parties within the academic institutions. In addition, there was a high level of support (over 65%) that the process should be embedded in the LMS. Despite the recognition that faculty have a significant responsibility in the process of student identity verification, the majority of the respondents were unaware of their institutions’ efforts in this area. This finding suggested a communication breakdown or many institutions have not fully launched initiatives in this area.
Approximately 56% of the respondents felt that online and ground-based instruction face different issues in this regard; however, a substantial subset representing 30% of the sample believed that there are similarities. This finding suggested that adaptations or new methodologies need to be implemented in online learning environments and that institutions should not simply rely on the status quo. It also suggested that perhaps the methodologies utilized on ground-based campuses are not definitive in establishing student identities in all situations.
Although 60% of the respondents were not very familiar with the HEOA legislation, over 65% agreed or strongly agreed that the ability of institutions to verify student identities can impact the institutions’ reputation and quality of their graduates. This finding was supported by the high level of importance placed upon developing improved methodologies, but it also clearly indicated that increased awareness of this law and the changes it potentially will drive are required.
The results of this study strongly suggested that there is a need for additional education within the occupational category of postsecondary teachers in reference to the HEOA of 2008. The focus needs to be specific to Section 602.17, Subsection G, which
Requires institutions that offer distance education or correspondence education to have processes in place through which the institution establishes that the student who registers in a distance education or correspondence education course or program is the same student who participates in and completes the course or program and receives the academic credit. (n.p.)
Regardless of this need for additional education, the respondents strongly felt that there is a need for improvement in the methods utilized to verify students’ identities. A clear majority believed that the process currently being utilized should be embedded within the LMS; however, the respondents also recognized that technology is not the entire answer and that faculty must play a significant role in implementing safeguards and processes to ensure the integrity of the academic system.
A number of extant technologies and techniques can facilitate the validation of students’ identities throughout their academic endeavors. These alternatives include, but are not limited to, improved course design that emphasizes student portfolios, projects, and papers; the utilization of proctored exams (in person and via webcam); technological solutions that validate biometric attributes such as fingerprints, retinal scans, and facial and voice characteristics; synchronous monitoring techniques that include such items as IP authentication, response pattern analysis, and telephonic callbacks; and the use of challenge questions derived from third-party data providers that are not student driven (Bailie & Jortberg, 2008). To be effective, multiple methods need to be utilized in conjunction with one another.
Pilots and partnerships are currently underway among educational institutions; corporations such as Acxiom and PupilCity; and education platform providers such as Blackboard, eCollege, and Moodle to develop, prototype, and test various methods to improve the student identity verification process. Although great strides are being made on this front, no system will fully eliminate the issue of student dishonesty. “If someone is determined to be dishonest, there is always a way around any system, whether it’s online or classroom-based” (WCET, 2005, ¶ 14).
Future research should continue to focus on the relationship between the adoption of more advanced student identity verification techniques and the perceptions of faculty, students, and other stakeholders regarding improvements in academic honesty, institutional creditability, and program accessibility. Research to find effective and efficient student verification techniques should be pursued, and consideration should be given to the return on investment of the various implementation methods and tools, along with a determination of the best fit of these methods based on the nature of the learning environment.
Although the natural assumption is that student verification will be conducted using technology-based strategies, exploration into other avenues of student verification should be considered. For example, if the solution is a technology-based student verification method, consideration should be given to the IT departments of the learning institutions to determine the difficulty of implementing technologically enabled student verification solutions. In addition, one might wish to solicit the views and opinions of universities’ boards of directors and executive bodies regarding the prioritization of online student verification. Finally, one might wish to determine whether policing compliance for student verification by online postsecondary learning institutions should become the responsibility of the accreditation bodies.
Allen, I. E., & Seaman, J. S. (2008). Staying the course: Online education in the United States, 2008. Newburyport, MA: Sloan Consortium.
Bailie, J. L., & Jortberg, M. A. (2008). Online learning student authentication: Verifying the identity of online users. Retrieved August 14, 2009, from http://jolt/merlot.org.vol5no2/bailie_0609.htm.
Bureau of Labor Statistics. (2009). Teachers - Postsecondary. Retrieved August 7, 2009, from http://www.bls.gov/oco/ocos066.htm
Higher Education Opportunity Act. (2007). Retrieved August 9, 2009, from http://www.govtrack.us/congress/bill.xpd?bill=h110-4137.
Lederman, D. (2009). College for all. Retrieved August 12, 2009, from http://www.insidehighered.com/news/2009/02/25/obama.
Virtual Student. (n.d.). Integrity in education online. Retrieved August 7, 2009, from http://www.virtualstudent.com/html/integrity.html.
WCET. (2005). Executive briefing. Retrieved August 14, 2009, from http://wiche.edattachment_library/Student_Authentication/Executive_Briefing0805.pdf .
| Dr. Thomas Schaefer is an academic department chair and professor at Kaplan University in the area of operations management. He has served in a variety of senior management positions within Fortune 500 companies. His educational background includes a Doctorate of Business Administration in Management and a Masters of Business Administration in International Trade from Argosy University. Dr. Schaefer provides guidance and services to large and medium sized organizations who are seeking to enhance and refine organizational effectiveness, business process, and overall profitability. He can be reached at drschaefer@cfl.rr.com. |
| Dr. Marguerite Barta is a full time professor at Kaplan University in the area operations management. Her background includes a broad range of business knowledge including supply chain management, organizational behavior, human resources, and information technologies. She completed her PhD in Organizational Management with a specialization in Electronic Commerce from Capella University in Minneapolis, Minnesota, and earned a Master of Science in Managerial Leadership and a Master of Science in Electronic Commerce from National Louis University in Chicago, Illinois. Dr. Barta’s current academic studies are concentrated in the science of e-business, e-commerce, e-learning and cybergogy. She can be reached at professorbarta@comcast.net. |
| Dr. Theresa Pavone is an academic department chair and professor at Kaplan University in the area of human resource management and organizational behavior. She is an experienced and well respected educator with years of traditional and online experience. She holds a PhD in Industrial and Organizational Psychology from Capella University, a Masters of Arts in Organizational Management from the University of Phoenix, as well as BS in Marketing from Eastern Michigan University. Dr. Pavone’s theoretical and practical knowledge has been exercised in various high level private firms and is put to work in her current online teaching. She can be reached at theresamp@aol.com. |