Cheating in E-learning from the perspective of lecturers within Iraqi universities

— Online examination is an integral and vital component of online learning. Student authentication is going to be widely seen when one of these major challenges within the online assessment. This study aims to investigate potential threats to student authentication in the online examinations. Adopting cheating in E-learning in a university of Iraq brings essential security issues for e-exam . In this document, these analysts suggested a model making use of a quantitative research style to confirm the suggested aspects and create this relationship between these. The major elements that might impact universities to adopt cheating electronics were declared as Educational methods, Organizational methods, Teaching methods, Technical methods. In order to verify that the design of the questionnaire, has been followed up with two steps of verification. First of all, a approval stage within that , the list of questions examined by the section of specialists in this subject in computer technology and teaching in universities, the feedback received was implemented before proceeding in order in order to this second stage . Second of all, the pilot research has been carried out to check the dependability of the factors . The gathered data has been examined using the Cronbach’s Alpha coefficient dependability test in SPSS 18 software package. This final results demonstrated this all factors are dependable as they acquired a value of 0.9126 and above inside test.


Introduction
E-learning and distance education have received a great attention in today's life.The key challenge in e-learning is the assessment of students in online exams.This is because, cheating in online exam is so easy.By a wide analysis on examination papers within exam cheating, we found that the main cause of test cheating is the paper and the environment which makes exam cheating possible for students .Hence online proctoring is necessary to prevent cheating in online exams .E-cheating or electronic cheating: using some form of ICT to perform academic dishonesty in or out of classrooms in order to gain unfair advantage .The benefits of E-evaluation consist of faster announcements of test results, improvement in examining assessment objectivity [1].A lot of research is actually performed on pupils cheating actions and indicates that a university may attempt to overcome the trouble [2].Students might select to cheat with regard to a number of psychological or cultural factors [3], like time restriction, little opportunity to be caught, a concern of failing, incompetence experience, the parent's pressure, wanting a much better score, teachers/lecturers' failure to impart information, laziness as well as indolence for the part regarding students, insufficient preparing and concern of failing... 978-1-7281-4216-6/19/$31.00 ©2019 IEEE E-Exam will be the most utilized way to assess students studying.It's several benefits [4], which includes: save printing as well as paperwork, decrease expenses, time, safeguard the environment .Additionally, this kind of assessment provides a great problem for the tutor; first, how perform we show this on the internet college students are exactly what they declare being through a test?Moreover, the way to prevent students from coming from cheating?To solve this trouble, it was suggested a recognition service platform that may confirm within real-time applicants' identities throughout the online exam.However, with regard to an e-exam the following present student's authentication in the process is usually essential [5].Authentication could be the cosmetic foundation concerning electronic digital identity's protection.This lets to help evaluation in the event the customer could be the an individual people comments in becoming [6].Accordingly, candidate's authentication could be the vital element inside on line assessment regulate solutions protection [7].Authentication factors is usually labeled inside a few forms [8]: control variables (something people get hold of to be a clever card), recognizing variables (something we all assume say for example PIN NUMBER code) and biometrics ( an issue we've been say for example biometric data) [9].Sole issue authentication is in fact contingent on just a particular distinction.Nevertheless, you can use a great number of options with authentication [10] this is merged.Precisely what is identified as multiple -factor authentication like running a clever card account using connection in conjunction with some sort of PERSONAL IDENTIFICATION NUMBER code).There can be a few categories of authentication [6]: static authentication together with continuing authentication.A. Static Authentication When on this internet examination, static authentication will be done at the starting to gain access to the exam, as well as will stay valid during the session till the person closes this particular session.In this technique, for the 1st stage of security, we utilize a smart card regarding access for the assessment room [11],and also for authentication to the exam management system [12].The solution consists of two authentication aspects , specifically a smart card and also a password.B. Continuous Authentication Continuous or dynamic authentication gives |one more security calculate next towards the initial authentication.It is applicable after beginning an exam session in addition to continuously inspections the student's identification (when the current student will be the identical to the one that began the exam) through the exam interval.In like a higher-risk environment (online checking platform), student's continuous authentication is extremely essential .While possession as well as knowledge authentication aspects could be stolen, borrowed or transferred into a third party.He may have exactly the same access without having the system picks up it.With this reason, those techniques aren't sufficient to verify this student's online identification.This can be a potential threat regarding an online exam [13].Those factors are consequently vulnerable.Biometrics stays a potential solution regarding continuous authentication [14].Because it can be depending on this natural person's confirmation and this cannot be lent or changed .III. BIOMETRICS : Biometrics may be the science regarding utilizing digital technology to recognize individuals depending on this unique physical as well as biological features of each individual [14].Utilizing a human features may be the best method to authenticate the user [15].In other words, the authentication aspect depending on biometrics can't be forgotten or missing contrary towards the possession and also knowledge aspects [16].The online biometric authentication technique can be a system regarding verifying a person's identification with real time by calculating their specific features or the body's behavior [17].Biometric devices like fingerprint readers or even eye scanning devices gather a personal biometric data as well as transform this directly into digital forms.A biometric authentication system, recognizes a person through comparing the real data to these already saved in a database utilizing algorithms [18].A number of biometric authentication's models [19] are usually suggested some depend on physiological features for example fingerprints [20], face recognition [21] as well as iris scan [22] or even voice.As well as others provide person 's behavior aspect as the signature, the actual keyboard dynamics [23] or even mouse dynamics [24][25][26][27] .Or even a mixture of a number of characteristics within multimodal biometrics form.Generally, regardless regarding biometric indicates utilized, the rule regarding the authentication system may be the exact same: to certify this person's identification by evaluating data offered together with prerecorded ones regarding the person this claims being .Aim of the Study The aim of the study is to reduced and discover the cheating by many factors based on the lecturers s in universities within Iraq .For data collection we develop a questionnaires form for collect opinions of lecturers towards the reduced cheating electronic exam.After this.Collected data from 66 academics.The significantly of such behavior had forced institutions to employ several policies associated to cheating penalties and to use several mechanisms to detect plagiarism such as: the use of turnitin.com .The adoption of factors to reduced cheating in e-learning from the perspective of lecturers within Iraqi universities offers become one regarding the essential criteria regarding making the items required with regard to modern society.Great interest is paid to such as key |aspects for the development of an suitable developing style in different developing nations , that consequently includes understanding together with the proficiency of the use of factors to reduced e-cheating and important experiments in order to adopt them as a core component in the universities.

Research Model
The current study comes within the broad theoretical field.The research model proposes the adoption regarding cheating in e-learning within terms of e-exam challenges as a dependent adjustable.This may be taken the level associated with the intention which universities have got to adopt these factors to reduced e-cheating.The main factors that can affect the universities to adopt to reduced e-cheating were declared as: Educational methods, Organizational methods, Teaching methods, Technical methods.In the current study, the variables affiliated are identified based on the current review of several models and theories.After that, these parameters have conceptualized to get studied with this study.Figure1 shows the main conceptual model of this study.

Material AND Method
A illustrative, study investigation style has been selected in order to research the major aspects associated in order to adopting this factors to reduced cheating in e-learning within Iraqi universities.A set of questions technique has been utilized regarding data collection within order to ascertain university staff opinions.This main cause for selecting a questionnaire returning in order to its feasibility inside simplifying this investigation from this data a lot more 'scientifically' plus objectively compared to additional types of investigation.Additionally, it might additionally assist the investigator to evaluate as well as comparison another investigation as well as might be utilized in order to calculate modify positivists think for analyzing current hypotheses (Wright, 2005).Based on this paper on Cronbach's Alpha reliability test and G Power G Power is a free, open-source program for power analysis and sample size calculations we used the method it linear multiple regression: fixed model, R 2 deviation from zero by F test Where effect size f 2 0.35, α err prob 0.05, power ( 1-β err prob ) 0.80 for determining the total sample size.

Teaching methods 4
Questionnaire Construction regarding every question/item.Just about all of this items had been modified via prior research which depending on the material regarding every factor.Table 1 indicates this operationalization from this factors as well as items.Five likert scale (strongly disagree, disagree, not sure, agree, strongly agree) utilized with this research to find out the stage of agreement between the participants.Five likert scale can be one with the broadly utilized scale for supplying a clear view regarding one's proposal in certain factor.Before beginning the questionnaire, a short explanation about this investigation research as well as its objectives together with a discretion rules have got been supplied.The particular questionnaire well prepared in English as well as after this translated into Arabic, that may be this official language within Iraq .

Questionnaire Validation
This questionnaire validity evaluated by obtained several steps before this last submission to be able to make sure that queries /items are suitable as well as free associated with mistakes.Those types of ways involve delivering this questionnaire to six specialists within the field.These specialists are lecturers within the Iraqi universities which have experience utilizing E-learning technology.This questionnaire examined regarding language, clearness , contradiction, or even replication.Prior to the distribution, a few suggestions and remarks followed up through using suitable modifications.

PILOT STUDY
A variety regarding scientists suggested doing pilot research (Goodman, Meltzer, & Bailey, 1998 Smith & Studd, 1992).This goal from the pilot research would be to check the study instrument.Based on Cohen, Manion & Morrison (2013), all collected data have to be piloted within order to confirm which all questions as well as even directions are very obvious.That process enables the scientists to remove any: items which do not deliver useful data.Consequently, the perform regarding the pilot research is to create sure that the selected format regarding the study can be suitable before proceeding in order to utilize the primary tool.Therefore, the questionnaire had been allocated |between the academic staff that are using E-learning technology in different private and public universities in Baghdad-Iraq.A total of 66 replies has been obtained and that considered suitable for a pilot research as advised by (Johanson & Brooks, 2010), that announced that 66 representative members from this population of attention is a sensible minimum suggestion for pilot research .This participants' demographic foundation items are usually gender (37 males and 29 females), (2) age group (10 of these 37 years old, 26 aged 38-50 years old, 14 aged 32-35 years old, 5 aged below 32 years old , 5 aged below 29 years old ,while 6 aged over 50 years old.

Pilot Study Results
The most generally used check-in dependability way of measuring any kind of pilot research questionnaire will be Cronbach's Alpha (Cronbach, 1946;Sekaran & Bougie, 2010).Based on George & Mallery (2003), Cronbach's Alpha check offers values inside the selection of 0 to 1; a greater stage regarding range signifies higher value regarding dependability.Values of 0.9 as well as over are usually excellent, 0.8 as well as over are good,0.7 and over are appropriate, 0.6 and over are in question, and below 0.6 are weak.This data gathered from this pilot research happen to be examined using Statistical Package for the Social Sciences (SPSS v.18) to recognize this values of every factor in Cronbach's Alpha.
Depending on this pilot research, the test outcome demonstrated which all items are dependable since it lead in a value of about 0.9126 and over Cronbach's alpha reliability test.8

Conclusion
This kind of research was suggested to examine this impacting on factors that impact this actual cheating in electronic-learning inside Iraqi universities in terms of cheating in e-exam concerns.This research was motivated through a real requirement to look at the needs, difficulties , and spaces dealing with the complete usage of e-learning technology within Iraqi universities.A questionnaire had been designed depending prior studies that check out the suggested factors.A pilot research was carried out to examine every impacting on factor as well as to check the dependability of this questionnaire.This type of study was needed to confirm this all those items will be dependable as well as free of mistakes.Cronbach's Alpha check within the pilot research discloses that all those factors get values of 0.9126 and over, which are suitable.The pilot research was performed utilizing a questionnaire that was displayed to users e-learning technology in a number of private and public universities in Iraq.A study paper follows this kind of study to demonstrate the results from the data analysis from the main study.Future investigation will check the ideas and verify the last design .

Questionnaire Survey
cheating in E-learning from the perspective of lecturers within Iraqi universities : PILOT STUDY

Dear Respondent
You are invited to participate in research being conducted for an academic purpose.This research aims at showing the concerns and challenges of the adoption of reduced and discover cheating in e-learning technology to develop an adoption model in Iraqi universities.
I will be obliged if you co-operate with me in completing the questionnaire.It will take approximately 20 minutes to complete the survey.
If you have any question or concern regarding this study, please feel free to contact me via mobile: (07736003453), E-mail: osamah.waleed@gmail.com or mohammed.h@uobaghdad.edu.iq .
Since the questionnaire is being used for academic purposes, the information gathered will be strictly confidential.
Thank you for your participation in this study.Your contribution is greatly appreciated.

Part I
This section collects anonymous demographic information pertaining to you.Please tick the most appropriate answer.

Index
Academic cheating cases Strongly Disagree

Disagree
Neutral Agree Strongly Agree    Use one calendar for students to be face to face .

5
Connecting assessments to students 'personal experiences .

6
The evaluation focuses on the learning process rather than the average .

7 .(
In the lectures that I give it , a typical class size would be.The act of cases the cheating in e-learning ) for each statement, indicate the extent of your agreement or disagreement based on your personal knowledge of cheating in e-learning .

3 5 A
Determine the penal procedures for perpetrators of academic cheating in the e-learning environment 4 Coordination between the concerned authorities of information technology at the universities level to prevent academic cheating

2
Using student groups to do homework and study requirements .3Renewal in the work of homework, requirements and academic tests .

Table 1 :
Operationalization of the factors/items and Cronbach's Alpha