Journal article Open Access

Student Assessment in the Ubiquitously Connected World

Adams, A. A.


DataCite XML Export

<?xml version='1.0' encoding='utf-8'?>
<resource xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://datacite.org/schema/kernel-4" xsi:schemaLocation="http://datacite.org/schema/kernel-4 http://schema.datacite.org/meta/kernel-4.1/metadata.xsd">
  <identifier identifierType="DOI">10.5281/zenodo.811033</identifier>
  <creators>
    <creator>
      <creatorName>Adams, A. A.</creatorName>
      <givenName>A. A.</givenName>
      <familyName>Adams</familyName>
      <affiliation>Meiji University (明治大学)</affiliation>
    </creator>
  </creators>
  <titles>
    <title>Student Assessment in the Ubiquitously Connected World</title>
  </titles>
  <publisher>Zenodo</publisher>
  <publicationYear>2017</publicationYear>
  <subjects>
    <subject>ubiquitous networking</subject>
    <subject>plagiarism</subject>
    <subject>information ethics</subject>
    <subject>higher education</subject>
    <subject>contract cheating</subject>
    <subject>network society</subject>
  </subjects>
  <dates>
    <date dateType="Issued">2017-06-19</date>
  </dates>
  <resourceType resourceTypeGeneral="Text">Journal article</resourceType>
  <alternateIdentifiers>
    <alternateIdentifier alternateIdentifierType="url">https://zenodo.org/record/811033</alternateIdentifier>
  </alternateIdentifiers>
  <relatedIdentifiers>
    <relatedIdentifier relatedIdentifierType="DOI" relationType="IsVersionOf">10.5281/zenodo.811032</relatedIdentifier>
    <relatedIdentifier relatedIdentifierType="URL" relationType="IsPartOf">https://zenodo.org/communities/opendepot</relatedIdentifier>
  </relatedIdentifiers>
  <rightsList>
    <rights rightsURI="http://creativecommons.org/licenses/by-nc/2.0/">Creative Commons Non-Commercial (Any)</rights>
    <rights rightsURI="info:eu-repo/semantics/openAccess">Open Access</rights>
  </rightsList>
  <descriptions>
    <description descriptionType="Abstract">Student cheating on university assessments from entrance exams to finals and from contract cheating on coursework to requesting exam answers using a mobile phone during the exam, has received more and more attention of late. As connection to the Internet becomes ubiquitous and computing and communications technology more embedded in our environment, it is argued that a re-focussing on providing educational opportunities is needed in higher education, rather than chasing the ever-retreating  prospect of perfect, or even adequate, assessment for the purposes of qualification. This record was migrated from the OpenDepot repository service in June, 2017 before shutting down.</description>
    <description descriptionType="Other">{"references": ["Attwood, R. 2010. We can work it out. Times Higher Education, 2nd September. www.\ntimeshighereducation.co.uk/story.asp?sectioncode=26&amp;storycode=413277.\nBaty, P. 2005. Bought essays fail to hit the mark. Times Higher Education, 8th April.\nwww.timeshighereducation.co.uk/story.asp?storycode=195169.\nBBC. 2010a (July). Finland makes broadband a 'legal right'. www.bbc.co.uk/news/\n10461048.\nBBC. 2010b (March). Internet access is a 'fundamental right'. news.bbc.co.uk/2/hi/\ntechnology/8548190.stm.\nBellucci, A., Malizia, A., Diaz, P., &amp; Aedo, I. 2010. Human-Display Interaction Technology:\nEmerging Remote Interfaces for Pervasive Display Environments. Pervasive Computing,\nIEEE, 9(2), 72\u201376.\nCastells, M. 1996. The Rise of the Network Society. The Information Age, no. 1. Chichester:\nBlackwell.\nCastellucci, S. J., &amp; MacKenzie, I. S. 2008. UniGest: Text-entry using three degrees of\nmotion. Pages 3549\u20133554 of: Extended Abstracts of the ACM Conference on Human\nFactors in Computing Systems CHI 2008. New York, NY: ACM.\nCerf, M., Thiruvengadam, N., Mormann, F., Kraskov, A., Quiroga, R. Q., Koch, C., &amp; Fried,\nI. 2010. On-line, voluntary control of human temporal lobe neurons. Nature, 467(7319),\n1104\u20131108.\nChina Daily. 2011. Use of anti-plagiarism software sparks controversy. China Daily, 17th\nJanuary. www.chinadaily.com.cn/china/2011-01/17/content_11869018.htm.\nClegg, S., &amp; Flint, A. 2006. More Heat than Light: Plagiarism in Its Appearing. British\nJournal of Sociology of Education, 27(3), pp. 373\u2013387.\nde Jager, K., &amp; Brown, C. 2010. The tangled web: investigating academics' views of\nplagiarism at the University of Cape Town. Studies in Higher Education, 35(5), 513\u2013528.\nElwood, J. 2010. Exploring girl's relatinoship to and with achievement: linking assessment,\nlearning, mind and gender. In: Jackson et al. (2010).\nFearn, H. 2008. The class of 2020? Times Higher Education, 27 November. www.\ntimeshighereducation.co.uk/story.asp?sectioncode=26&amp;storycode=404431.\nGibbs, G, &amp; Simpson, C. 2004\u20135. Conditions Under Which Assessmet Supports Students'\nLearning. Learning and Teaching in Higher Education, 1, 3\u201331. www2.glos.ac.uk/\noffload/tli/lets/lathe/issue1/issue1.pdf.\nHawk, B., Rieder, D. M., &amp; Oviedo, O. O. (eds). 2008. Small Tech: the Culture of Digital\nTools. Minneapolis, MN: University of Minnesota Press.\nHogg, C. 2009 (April). China hi-tech exam cheats jailed. news.bbc.co.uk/2/hi/\nasia-pacific/7980607.stm.\nJackson, J., Pachter, C., &amp; Renold, E. (eds). 2010. Girls and Education 3-16: Continuing\nConcerns, New Agendas. Milton Keynes: Open University Press.\nJenkins, T., &amp; Helmore, S. 2006. Coursework for Cash: The Threat from On-line Plagiarism.\nPages 121\u2013126 of: Proceedings of the 7th Annual Conference for Information and\nComputer Science, Dublin. Higher Education Academy.\nLee, S., Hong, S. H., &amp; Jeon, J. W. 2003. Designing a universal keyboard using chording\ngloves. Pages 142\u2013147 of: Proceedings of the 2003 conference on Universal usability. CUU\n'03. New York, NY: ACM.\nMacKenzie, I. S., &amp; Felzer, T. 2010. SAK: Scanning ambiguous keyboard for efficient onekey\ntext entry. ACM Transactions on Computer-Human Interaction (TOCHI), 17(11),\n1\u201339.\nNolan, J., Mann, S., &amp; Wellman, B. 2008. Sousveillance: Wearable and Digital Tools in\nSurveilled Environments. In: Hawk et al. (2008).\nOrtiz Jr, S. 2007. Brain-Computer Interfaces: Where Human and Machine Meet. Computer,\n40(1), 17 \u201321.\nPillay, G. 2010. The utilitarian fallacy. Times Higher Education, 12th November. www.\ntimeshighereducation.co.uk/story.asp?sectioncode=26&amp;storycode=414247.\nRibak, R. 2009. Remote control, umbilical cord and beyond: The mobile phone as a transitional\nobject. British Journal of Developmental Psychology, 27(1), 183\u2013196.\nVincent, D. 2000. The Rise of Mass Literacy. Cambridge: Blackwell.\nVinge, V. 2006. Rainbow's End. New York, NY: Tor.\nYomiuri Shimbun. 2011 (28th Feb). Web exam leak rocks elite school / Poster asked for answers\nin mathematics, English on Yahoo! Japan site. www.yomiuri.co.jp/dy/national/\nT110227003929.htm."]}</description>
  </descriptions>
</resource>
16
5
views
downloads
All versions This version
Views 1616
Downloads 55
Data volume 617.2 kB617.2 kB
Unique views 1616
Unique downloads 55

Share

Cite as