Institutional Level Identity Control Strategies in the Distance Education Environment: A Survey of Administrative Staff

Physical separation of students and instructors creates the gap of anonymity and limited control over the remote learning environment. The ability of academic institutions to authenticate students and validate authorship of academic work at various points during a course is necessary for preserving not only perceived credibility but also public safety. With the growing scope of distance education programs that permeate critical areas such as healthcare, airspace, water management, and food solutions, universities have a moral obligation to employ secure measures to verify learning outcomes. This study examines the measures universities with large distance education programs employ to align identity of learners with the academic work they do, as well as the effectiveness of and challenges and barriers to their implementation. The research was undertaken using a multiple case approach and examined survey responses from five academic administrators at five officially accredited post secondary institutions in three countries. The cases examined in the study include: Athabasca University, Open University UK, Penn State University World Campus, University of Maryland University College, and eConcordia,Concordia University's distance learning facility. This study is not an exhaustive attempt to examine all aspects of academic integrity, but rather to create awareness about various learner authentication strategies. This study confirms that secure learner authentication in the distance education environment is possible. However, with greater pressure to enhance security of learner authentication, the openness of open learning is challenged and may change as we know it.


Résumé de l'article
Physical separation of students and instructors creates the gap of anonymity and limited control over the remote learning environment. The ability of academic institutions to authenticate students and validate authorship of academic work at various points during a course is necessary for preserving not only perceived credibility but also public safety. With the growing scope of distance education programs that permeate critical areas such as healthcare, airspace, water management, and food solutions, universities have a moral obligation to employ secure measures to verify learning outcomes. This study examines the measures universities with large distance education programs employ to align identity of learners with the academic work they do, as well as the effectiveness of and challenges and barriers to their implementation. The research was undertaken using a multiple case approach and examined survey responses from five academic administrators at five officially accredited post secondary institutions in three countries. The cases examined in the study include: Athabasca University, Open University UK, Penn State University World Campus, University of Maryland University College, and eConcordia,Concordia University's distance learning facility. This study is not an exhaustive attempt to examine all aspects of academic integrity, but rather to create awareness about various learner authentication strategies. This study confirms that secure learner authentication in the distance education environment is possible. However, with greater pressure to enhance security of learner authentication, the openness of open learning is challenged and may change as we know it.

Introduction
Technology improves learning and teaching by making it more effective and efficient, by increasing accessibility to a wider range of learning resources, and by creating authentic learner environments that address individual learning styles (Bates & Poole, 2003).
And as technology becomes more embedded into the academic structure, it may generate new ethical challenges (Mitchell, 2009). One crucial ethical concern strongly influenced by the advancement of technology, coupled with the growth of popularity of online learning, is academic integrity (Chiesl, 2007;Faculty Senate Committee on Technology, 2005;Grijalva, Nowell, & Kerkvliet, 2006;Mott, 2010).
Some scholars note that assessment of remote learners and the identity validation aspect of it in particular has historically been a challenging issue often cited by critics of distance education (Bailie & Jortberg, 2008;Moore & Kearsley, 1996). There are many benefits of using online assessments not only in distance courses but in traditional courses as well. These may include cost savings and greater accessibility. But the very same technology that makes education more accessible presents a cornucopia of cheating methods (Mott, 2010). For example, mobile devices play a pivotal role in enabling mobile learning. However, electronic communication and computing devices capable of transmitting, capturing, storing, retrieving, and processing information also pose a challenge for the exam integrity (Faculty Senate Committee on Technology, 2005). These devices may not only simplify finding solutions to a variety of test problems, but also streamline capture and distribution of digitized exam documentation. They are compact and easy to conceal, and they provide high processing power. Another important concern is the increasing availability of over-the-counter essays (Sheridan, Alany, & Brake, 2005).
In a traditional school setting, many of the examinations are taken in a proctored environment. Identity documents are verified by proctors, thus to spoof an identity, a proxy test taker must forge the identity documents or work in collusion with proctors.
In distance environments, proctored examinations through examination invigilation networks remain a popular choice of secure assessment. However, institutions of distance education tend to shift away from secure testing towards project-based or authentic assessment strategies such as written assignments, projects, and portfolios (Bailie & Jortberg, 2008, p. 65). Instructional design strategies that minimize pressure to engage in unethical behavior have also been adopted as an alternative to traditional testing and examination (Chiesl, 2007).
As a result, courses that do not follow a proctored exam route may require students to submit a number of written assignments. In an online environment where username and password are often the only credentials used for identity verification, there is no need to forge documents. Changing identity is as easy as typing two strings of text on a login screen. Thus, without a secure process that aligns student virtual identities with the academic work they do, the identify validation by legitimate universities offering Much literature on academic misconduct in distance education is concerned with prevention of plagiarism, with wrongful appropriation of intellectual property, and with the technological means of prevention. There is little research done on the institutional level identity control measures or their effectiveness. Data on the incidence rates of student academic dishonesty show a wide variance. One of the challenges with academic integrity research is that it often relies on self-reporting (Scanlon & Neumann, 2002). A study conducted by McCabe and Trevino (1996) examines the magnitude of academic dishonesty and historical trends of student behavior in traditional universities by comparing data from two research projects conducted almost 30 years apart involving multiple campuses and large samples. The patterns observed in these two studies are relatively consistent and at the same time raise serious concerns about academic integrity. The findings suggest that over 80% of students cheated at least once on a major written assignment. Although, this research was aimed at analyzing data from traditional college settings where testing and examinations are proctored, one may argue that the trends identified in the study are transferable to the distance education environment, where project based assessment may replace secure examination and where proctoring is not always an option. Some scholars argue that students who admit engaging in cheating behavior may not limit its scope to only one medium, but rather employ both conventional and internet plagiarism (Scanlon & Neumann, 2002). The internet may simplify access to a wider source of information, but whether or not it influences one's preference for cheating is still unknown. Data from studies on academic integrity in a distance environment suggest that student and faculty perceptions of cheating in distance courses are similar and that it is easier to cheat in the distance environment (Kennedy, Nowak, Raghuraman, Thomas, & Davis, 2000).
Some scholars consider academic integrity a policy issue (Isa, Samah, & Jusoff, 2008;Sheridan et al., 2005) while others argue for a technology-based solution (Mott, 2010;Kennedy et al., 2000). There is a variety of technology available to institutions ranging from plagiarism detection tools (Sheridan et al., 2005) and remote proctoring services to biometric authentication systems designed to secure the process of remote learner authentication. These technologies have been pilot tested at several universities (Case & Cabalka, 2009;McNabb & Maynard, 2010). The pilot project results suggest that biometric and remote monitoring technologies hold great promise in providing learner identity assurance. Publicly available information from university websites was used to generate a preliminary participant list of V.P. Academic and Registrar office staff involved in academic integrity matters. Introductory emails were then sent out to the preliminary list of participants in order to introduce the study and identify the key experts on the academic integrity and in particular identity control issues at each institution.
Additional referrals were received, and the final participant list was created. The data from one participant from each university to the total of five participants for the entire study was collected and analyzed. Participants were selected on the basis of involvement in development, administration, or enforcement of an academic integrity policy and expressed interest in participating in this research project.
The rationale for choosing to survey administrative staff as opposed to faculty or academic leaders was that the administrators tend to have broader knowledge of academic integrity issues and are responsible for overseeing the entire academic integrity process from policy making to financing to enforcement, whereas other groups tend to have limited involvement and are delegated specialized tasks within the process.
Although faculty and staff share a common understanding of the academic integrity process, the survey results should be interpreted as the opinions of the stakeholder group that is likely to be most informed on the subject of academic integrity. However, a note of caution on this interpretation is appropriate since administrators' opinions may not be widely, and are certainly not unanimously, endorsed by all university faculty and staff.

Data Collection Strategies
The data collection process was divided into four phases. First, each university's website was examined for general academic integrity guidelines as well as admission requirements and examination instructions for students. In the second phase of the data collection, strategic convenience sampling was used to select an administrative office staff member from each university and these were invited to answer a brief questionnaire and participate in a follow up interview. A personal introductory email was sent to prospective participants by the researcher to introduce the study and identify the key experts responsible for the development, administration, or enforcement of the academic integrity policy. During the third phase of the data collection process and once a final list of participants had been established, an introductory letter containing a brief description of the study and the questionnaire was distributed via email. In the final phase of the data collection process, follow up questions were asked through email and via telephone to clarify the questionnaire responses. As well, the participants were provided an opportunity to review, validate, and provide additional comments on the summary of the research findings.

Data Analysis Procedures
Upon collecting the necessary data from documents, surveys, and follow up emails or phone interviews, the collected information was organized into categories and crosscompared. Data analysis was concluded using the analytic comparison framework (Neuman, 2006).

Results
The survey results are summarized from questions as depicted in Table 1 and 2.  Identity fraud is an issue that affects all academic institutions and is particularly a concern for those who provide service to remote learners. One administrator indicated reported cases of students sharing login credentials and hiring others to complete online assignments. Since physical separation creates the gap of anonymity, authentication protocols need to be implemented to close the gap and align virtual identities with the work that students do. Access to academic resources and learning management systems is often protected by a username and password authentication. This method is not designed to validate one's identity or authorship of submitted materials, but rather act as a gatekeeper granting access to anyone with the correct user name and password Students are provided with academic integrity tutorials and resources, and they may be required to sign a statement of academic integrity or complete a quiz. In serious cases, penalties are assigned by designated committees on a case by case basis as the magnitude of an offence may hinge on a number of factors. It often takes a retributive justice approach. Since copying and pasting of a website article is different from uploading a digital image of a final exam taken with a smart phone to a file sharing website, the penalty needs to be proportional to the damages caused. Tracking incident data is a vital part of risk management and is a process that is worth examining in itself.

Authentication Strategies
There are several authentication strategies available to universities, aimed at enhancing authentication of student work. These are depicted in Table 3. They also provide different levels of assurance. A course or program may employ any combination of these strategies to manage academic integrity and maximize identity assurance. Some strategies provide a greater degree of confidence in the identification of students than others; therefore, they are classified into two categories. Courses that do not follow the exam route often employ low level authentication measures for validation of student identity before submission of projects, assignments, and papers as well as participation in online discussion groups or completion of an online quiz. They often rely on the username and password authentication for access to learning management systems. In order to compensate for limitations of the traditional authentication methods, additional validation measures such as login pattern analysis, instructor validation, and plagiarism detection tools are often employed. Although the latter is not an identity control strategy, but rather a method of disproving authorship of any written work, assignments that are submitted electronically are often screened by instructors for plagiarism, using plagiarism detection tools. Turnitin was cited in all five cases, and Copycatch was used by one institution. Google search engine was also occasionally used by some instructors as a first line of defense against plagiarism.  However, the second list of strategies shares much of the same validation protocols as that employed by the traditional institutions. This usually involves interaction with instructors or support staff, validation of officially issued identification documents, and participation in proctored exams at designated examination facilities. Technologies that enable synchronous communication such as video conferencing substitute for physical meetings. Even in project route courses, instructors may include interactive participation components through the web or telephone conference systems, allowing students to present and discuss their ideas, research, and assignments and to conduct thesis defense and oral examination.
Unlike electronic paper and project submissions, exams emphasize higher security measures. Facilitation of exams requires traditional methods of authentication such as verification of officially issued identification. The remote proctoring process follows a similar pattern. When remote proctoring is used outside of the designated test centers, students are required to create an identity profile often comprised of a keystroke signature and a photograph before access to the exam is allowed.
The survey results show that perceived adequacy of identifying students before final and/or midterm exams was reported to be higher than that of a project or paper submission. Furthermore, four out of five administrators consider proctoring as the best practice for remote learner authentication. Three administrators selected traditional proctoring, and one selected remote proctoring. Although proctoring is perceived favourably and offered by all universities examined in this study, it is not the primary learner authentication strategy that is consistently applied across all courses, likely due to costs and management challenges. Only one institution reported proctoring all of the final exams.

Challenges
In the distance education environment, academic integrity and technology are interconnected and continuously evolving. New methods of student authentication emerge, as do technologies that facilitate cheating. For some institutions, technology was not able to provide the desired level of performance. For others, the high cost of technology created a barrier to implementation. In addition to the cost of technology selection and initial deployment, maintenance, support, and administration may exert a significant impact on the budget. This in turn may affect student tuition rates and consequently accessibility.

Organizational Issues
Logistical and administrative issues were reported among the challenges facing administrators for the provision of examination facilities. Technical issues were also reported when technology based authentication was employed. As new technologies emerge, institutions should not only examine the benefits, but also implications for the organizational structure (Bates, 2005 (Bates, 2005). With greater pressure to enhance security of learner authentication, the openness of distance learning is challenged and may change.
One may argue that the very process that promises secure authentication of distance learners is also a barrier to accessibility. Regardless of technology employed, an identity profile needs to be accurately created prior to the authentication stage. The quality of authentication depends not only on the type of technology used, but also on the quality of initial identity enrollment. In order for a student to enroll and create a student profile, the university must provide a designated facility to do just that, either internally or through external service providers. It may work well for local institutions, but in the case of international students enrolling in a single distance course in another country or in a city that is not within driving distance, the logistics of student registration and identity validation pose a serious challenge.

Future Research
As previously noted, institutions put onus on instructors to conduct authentication tasks such as monitoring students' progress and flagging irregularities in their work. A future study may examine the process of validation of students' identities from instructors' perspectives and analyze the effectiveness of both the non technical means and technology tools instructors employ. Furthermore, studies on academic misconduct usually report data collected from student surveys. Since institutions track and trend academic misconduct data, future research may focus on an institutional level academic integrity incident reporting and not only compare institutional data collection and analysis procedures, but also examine the magnitude of academic dishonesty and identity fraud in particular. and remote proctoring systems. This study confirms that secure learner authentication in the distance education environment is possible not only through the use of technology, but also through application of policy that requires adequate identity assurance measures to be embedded into course design.
The findings from this study tend to reinforce the idea that the values and standards of academic integrity remain the same regardless of the medium of instruction. One may argue that a project paper or assignment collected by a teaching assistant in a large auditorium of a traditional school provides the same level of identity assurance as the one submitted electronically. Neither identity of students nor authorship of manuscripts is validated at the time of collection. Students are expected to be honest across all academic activities they participate in whether in class or online. The issue of trust is key, however one may not merely rely on an assumption that the virtue of integrity is maintained by all students. Authentication measures are important not only for preserving the perceived credibility of the institution, but also for public safety as may be the case with critical areas such as aviation training or health care studies. Therefore, secure authentication is justified and ought to provide a system of checks and balances that ensures that the relationship of trust is intact.
The underlying issue when dealing with remote learner authentication is finding not only the right technology, but also a healthy compromise between the credibility and accessibility of distance learning. Low level authentication methods make academic resources more accessible, as access is open to anyone with a computer and internet access. In contrast, high level authentication methods often require additional technical or administrative resources and add logistical challenges. A system of checks and balances is what defines credibility, and credibility of distance education entails greater responsibilities for all the stakeholders. Therefore, putting greater emphasis on high level authentication strategies may require greater involvement of students, administrative, and teaching staff in the evaluation process. By minimizing overreliance on measures that do not provide authorship and identity validation, the convenience and accessibility levels of distance courses may be affected. This may consequently change the face of distance education once again.