Cheating in E-learning from the perspective of lecturers within Iraqi universities

Cheating in E-learning from the perspective of lecturers within Iraqi universities


  • Mohammad Hasan Abd The Students Affairs And Registration Department. University Baghdad , Iraq
  • Osamah Waleed Allawi Delta Al-Rafidain Mixed Secondary School , Baghdad,AL-Medaen Iraq
  • Jamal kh-madhloom College of computer science and information technology,university of Wasit, Iraq



university , e-learning , electronic exam ,e-cheating , pilot study, Cronbach's Alpha ,G Power, Iraq


Online examination is an integral and vital component of online learning. Student authentication is going to be widely seen when one of these major challenges within the online assessment. This study aims to investigate potential threats to student authentication in the online examinations. Adopting cheating in E-learning in a university of Iraq brings essential security issues for e-exam . In this document, these analysts suggested  a model making use of a quantitative research style to confirm the suggested aspects and create this relationship between these. The major elements that might impact universities to adopt cheating electronics were declared as Educational methods, Organizational methods, Teaching methods, Technical methods. In order to verify that the design of the questionnaire, has been followed up with two steps of verification. First of all, a approval stage within that , the list of questions examined by the section of  specialists in this subject in computer technology and teaching in universities, the feedback received was implemented before proceeding in order in order to this second stage . Second of all, the pilot research has been carried out to check the dependability of the factors . The gathered data has been examined using the Cronbach’s Alpha coefficient dependability test in SPSS 18 software package. This final results demonstrated this all factors are dependable as they acquired a value of 0.9126 and above inside test.


M. Karami, “Advantages and Disadvantages of Electronic Assessments in Biomedical Education,” IFMBE Proceedings, vol. 25, pp. 61 64, 2009.

K. Curran, G. Middleton, and C. Doherty International Journal of Cyber Ethics in Education, vol. 1, no. 2, pp. 54–8209, 2011.

B. Keresztury and L. Cser New Cheating Methods in the Electronic Teaching Era, vol. 93, pp. 1516–8209, 2013.

R. Bawarith, D. A. Basuhail, D. A. Fattouh, and P. D. S. Gamaleldin

A. Ullah, H. Xiao, M. Lilley, and T. Barker, “Using Challenge Questions for Student Authentication in Online Examination.” 2012-2012.

P. Bours and H. Barghouthi, “Continuous Authentication using Biometric Keystroke Dynamics,” 2009. 12-12.

A. Moini and A. M. Madni, “Leveraging biometrics for user authentication in online learning: A systems perspective,” IEEE Systems Journal, vol. 3, 2009.

H. Al-Assam, H. Sellahewa, and E. S. Jassim, “On security of multifactor biometric authentication,” 2010 International Conference for Internet Technology and Secured Transactions, pp. 1–8209, 2010.

I. Velásquez, A. Caro, and A. Rodríguez, “Authentication schemes and methods: A systematic literature review,” Information and Software Technology, vol. 94, pp. 30–8209, 2018.

I. Velásquez, A. Caro, A. Rodríguez, and Kontun, “A Framework for recommendation of authentication schemes and methods,” Information and Software Technology, vol. 96, pp. 27–8209, 2018.

M. Ghizlane, F. H. Reda, B. Hicham, and A. S. Card, “Proceedings of the 2nd international conference on networking, information systems & security,” vol. 67, pp. 4–4, 2019.

G. Moukhliss, R. F. Hilali, H. Belhadaoui, and M. Rifi A New Smart Cards Based Model for Securing Services, vol. 17, pp. 15–15, 2019.

K. M. Apampa, G. Wills, and D. Argles, “An approach to presence verification in summative e-assessment security,” 2010 International Conference on Information Society, pp. 651–651, 2010.

N. A. Mahadi, M. A. Mohamed, A. Ihsanmohamad, M. Makhtar, M. F. A. K, and M. Mamat, “A Survey of Machine Learning Techniques for Behavioral-Based Biometric User Authentication, Recent Advances in Cryptography and Network Security,” 2018.

R. Saifan, A. Salem, D. Zaidan, and A. Swidan, “A survey of behavioral authentication using keystroke dynamics: Touch screens and mobile devices,” Journal of Social Sciences (COES&RJ-JSS), vol. 5, no. 1, pp. 29–8209, 2016.

P. V. Lakshmi and V. S. Susan, “Biometric Authentication Using ElGamal Cryptosystem And DNA Sequence.”

S. Prabhakar, S. Pankanti, and A. K. Jain, “Biometric recognition: security and privacy concerns,” IEEE Security Privacy, vol. 1, no. 2, pp. 33– 8209, 2003.

O. Enström, “Authentication Using Deep Learning on User Generated Mouse Movement Images,” 2019.

A. C. Weaver Biometric authentication, vol. 39, pp. 96–8209, 2006.

A. New, “Fingerprint Authentication Scheme Based on SecretSplitting for Enhanced Cloud Security - Semantic Scholar.” onWangKu/57f12f64a2a73cbebfc5f51014fc60075490d632.

“A face recognition scheme using wavelet-based local features - ieee conference publication.”

“An iris biometric system for public and personal use.”

P. Bours and S. Mondal Continuous Authentication with Keystroke Dynamics, vol. 2, pp. 41–8209, 2015.

C. Shen, Z. Cai, X. Guan, Y. Du, and R. A. Maxion User Authentication Through Mouse Dynamics, vol. 8, pp. 16–8209, 2013.







How to Cite

Mohammad Hasan Abd, Osamah Waleed Allawi, and Jamal kh-madhloom, “Cheating in E-learning from the perspective of lecturers within Iraqi universities: Cheating in E-learning from the perspective of lecturers within Iraqi universities”, WJCMS, vol. 1, no. 4, pp. 39–43, Dec. 2022, doi: 10.31185/wjcm.70.