Cheating in E-learning from the perspective of lecturers within Iraqi universities: Cheating in E-learning from the perspective of lecturers within Iraqi universities

Cheating in E-learning from the perspective of lecturers within Iraqi universities

Cheating in E-learning from the perspective of lecturers within Iraqi universities


  • mohammed hasan abd Baghdad University



university , e-learning , electronic exam ,e-cheating , pilot study, Cronbach's Alpha ,G Power, Iraq


Online examination is an integral and vital component of online learning. Student authentication is going to be widely seen when one of these major challenges within the online assessment. This study aims to investigate potential threats to student authentication in the online examinations. Adopting cheating in E-learning in a university of Iraq brings essential security issues for e-exam . In this document, these analysts suggested  a model making use of a quantitative research style to confirm the suggested aspects and create this relationship between these. The major elements that might impact universities to adopt cheating electronics were declared as Educational methods, Organizational methods, Teaching methods, Technical methods. In order to verify that the design of the questionnaire, has been followed up with two steps of verification. First of all, a approval stage within that , the list of questions examined by the section of  specialists in this subject in computer technology and teaching in universities, the feedback received was implemented before proceeding in order in order to this second stage . Second of all, the pilot research has been carried out to check the dependability of the factors . The gathered data has been examined using the Cronbach’s Alpha coefficient dependability test in SPSS 18 software package. This final results demonstrated this all factors are dependable as they acquired a value of 0.9126 and above inside test.


Karami, M.e.a., Advantages and Disadvantages of Electronic Assessments in Biomedical Education. IFMBE Proceedings, 2009. 25/XII:: p. p. 61-64.

K. Curran, G. Middleton, et C. Doherty, « Cheating in Exams with Technology »:, International Journal of Cyber Ethics in Education, vol. 1, no 2, p. 54 62, avr. 2011.

B. Keresztury et L. Cser, « New Cheating Methods in the Electronic Teaching Era », Procedia - Social and Behavioral Sciences, vol. 93, p. 1516 1520, oct. 2013.

R. Bawarith, D. A. Basuhail, D. A. Fattouh, et P. D. S. GamalelDin, « E-exam Cheating Detection System », International Journal of Advanced Computer Science and Applications (IJACSA), vol. 8, n o 4, 2017.

A. Ullah, H. Xiao, M. Lilley, et T. Barker, « Using Challenge Questions for Student Authentication in Online Examination », 2012

P. Bours et H. Barghouthi, « Continuous Authentication using Biometric Keystroke Dynamics », p. 12, 2009.

A. Moini et A. M. Madni, « Leveraging Biometrics for User Authentication in Online Learning: A Systems Perspective », IEEE Systems Journal, vol. 3, no 4, p. 469 476, déc. 2009.

H. Al-Assam, H. Sellahewa, et S. Jassim, « On security of multifactor biometric authentication », in 2010 International Conference for Internet Technology and Secured Transactions, 2010, p. 1 6.

I. Velásquez, A. Caro, et A. Rodríguez, « Authentication schemes and methods: A systematic literature review », Information and Software Technology, vol. 94, p. 30 37, févr. 2018.

I. Velásquez, A. Caro, et A. Rodríguez, « Kontun: A Framework for recommendation of authentication schemes and methods », Information and Software Technology, vol. 96, p. 27 37, 2018.

M. Ghizlane, F. H. Reda, et B. Hicham, « A Smart Card Digital Identity Check Model for University Services Access », in Proceedings of the 2Nd International Conference on Networking, Information Systems & Security, New York, NY, USA, 2019, p. 67:1–67:4.

G. Moukhliss, R. F. Hilali, H. Belhadaoui, et M. Rifi, « A New Smart Cards Based Model for Securing Services », vol. 17, no 1, p. 15, 2019.

K. M. Apampa, G. Wills, et D. Argles, « An approach to presence verification in summative e-assessment security », in 2010 International Conference on Information Society, 2010, p. 647 651.

N. A. Mahadi, M. A. Mohamed, A. IhsanMohamad, M. Makhtar, et M. F. A. K. and M. Mamat, « A Survey of Machine Learning Techniques for Behavioral-Based Biometric User Authentication », Recent Advances in Cryptography and Network Security, oct. 2018.

R. Saifan, A. Salem, D. Zaidan, et A. Swidan, « A Survey of behavioral authentication using keystroke dynamics: Touch screens and mobile devices », Journal of Social Sciences (COES&RJ-JSS), vol. 5, no 1, p. 29 41, 2016.

P. V. Lakshmi et V. S. Susan, Biometric Authentication Using ElGamal Cryptosystem And DNA Sequence. .

S. Prabhakar, S. Pankanti, et A. K. Jain, « Biometric recognition: security and privacy concerns », IEEE Security Privacy, vol. 1, no 2, p. 33 42, mars 2003.

O. Enström, Authentication Using Deep Learning on User Generated Mouse Movement Images. 2019.

A. C. Weaver, « Biometric authentication », Computer, vol. 39, no 2, p. 96 97, févr. 2006.

« A New Fingerprint Authentication Scheme Based on SecretSplitting for Enhanced Cloud Security - Semantic Scholar ». [En ligne]. Disponible sur: [21] « A face recognition scheme using wavelet-based local features - IEEE Conference Publication ». Disponible sur:

« An Iris Biometric System for Public and Personal Use ». Disponible sur:

P. Bours et S. Mondal, « Continuous Authentication with Keystroke Dynamics », in Gate to Computer Science and Research, 1st éd., vol. 2, Y. Zhong et Y. Deng, Éd. Science Gate Publishing P.C., 2015, p. 41 58.

C. Shen, Z. Cai, X. Guan, Y. Du, et R. A. Maxion, « User Authentication Through Mouse Dynamics », IEEE Transactions on Information Forensics and Security, vol. 8, p. 16 30, 2013.




How to Cite

hasan abd, mohammed. (2022). Cheating in E-learning from the perspective of lecturers within Iraqi universities: Cheating in E-learning from the perspective of lecturers within Iraqi universities. Wasit Journal of Computer and Mathematics Sciences, 1(4), 56–69.