Академический Документы
Профессиональный Документы
Культура Документы
1.0 INTRODUCTION
Electronic cheating in the Nigerian educational system is widely discussed. It also
cheating by students at school and colleges, which conflict with the core purpose of
education, the training of the mind and character for the acquisition of practical and
theoretical skills, knowledge and functional ideas for development; and the search for
truth and knowledge and the creation and communication of ideas (Nanna, 1997;
examinations. (Usman 1994). While Shaman (1990) elaborates further and better that
have personal advantage in examination over their colleagues or mates who are
surrounds examination and it came to an alarming rate in the last three decades.
The hues and cries about Electronic cheating which took place at all level of the Nigeria
The Nigerian society is that which celebrates mediocre and view cheats as being
smart. The society does not want to know how an individual achieves success. The
important thing, is the success, in actual fact, Electronic cheating is a variant of the
The politicians employ rigging at elections and enjoy enviable political offices and so do
students cheats from primary to tertiary institutions to move from one level of education
to another. All sorts of misconduct take place in and around examination venues in order
to achieve success.
To make matter worse, it is not only students that are involved, parents, teachers,
school heads, examination officials all collude with students to perpetrate this misconduct
(Ijaiya, 2004). The collusion between one and more of these agents makes it more
difficult to combat. Even the penalties stipulated in Act33 of 1999 ranging from
cancellation of results to 21 years jail term has failed to achieve any significant shift from
out various investigations and discovered that Electronic cheating is a phenomenon that
has started some decades ago and the effort by government administrators and stake
holders in the educational sector to curtail the ugly trend have not yielded any fruit.
pollution of our education by both stake holders and students is now pointing towards the
wrong direction.
Our dependency on external technology results from our inability to purge out this
menace. Nigerians known with our emphasis on certificate orientation (i.e. presentation
many acquiring same certificate by all means, positively or negatively. All forms of
misconduct and malpractices had and are still been introduced to achieve this eccentric
menace (certificate). Our mind, which is part of that, that control our thoughts and action
and are channel towards the easiest way out of achieving this eccentric goods. The
development of our intellectual capacity are derail due to the fact that state holders
(government, administrators, teachers, students and parents) are primarily focusing on the
The term Electronic cheating has been defined by various researchers in different ways.
and Daramola, (1992) remark that Electronic cheating is any irregular behaviour
during or after the examination which contravenes the rules and regulations governing the
The aim of this project is to devise a mechanism for curbing the rate of
examination cheating in the university. The mechanism would serve as a restriction for
students and lecturers alike who indulge in the act of examination cheating during exams.
This mechanism would put a check on the rate at which this ugly trend is being
students/lecturers take and conduct examinations. The students over some period of time
would begin to realise the consequences and negative effect of Electronic cheating and at
the end of the day, this would instil some form of self-confidence in these students, in
order for them to study and write their examinations themselves without any form of
unwillingly in the mind of the lecturers and parents alike to refrain themselves from such
ugly acts.
Applying a strict check on how examination is being run and taken in the university
would improve the quality of graduates that are being sent out of the university. This
reduced because for students who are busy with their academic work, would not have the
time to indulge in one form of violent activity or the other because he/she is unaware of
The scope of this project is to analyze the causes of electronic cheating and various forms
that it takes. Also an automated system will be developed for this project work, where the
head of Electronic cheating panel can have a pictorial overview of cases of exam
This project work during research was limited by the fact that some students were
not willing to release the right information for fear of being exposed or implicated. Again,
some students carried away questions with the intension of filling it and returning it but
they never did so, due to this fact, some questionnaires were lost. This led to the fact that
the numbers of questionnaires given out were not the number of questionnaires returned,
moreover, the behaviour of the respondent (students) during the collection of the data, so
part of the world, just as it is in our university today. The first Electronic cheating in
Nigeria was reported in 1914, when there was a leakage of question paper into the senior
Cambridge local examination, others traced the origin of Electronic cheatings to the wave
1991). The most pronounce malpractice in Nigeria in early examination was that of 1964
that was tagged expo, subsequently in 1970, 1973, 1974, 1979, 1981, and 1991
followed (Oladope 1997). Since 1991 till date Electronic cheating has taken advanced
and more sophisticated dimensions in the university today, records are been emerged
The Nigerian former president, Chief Olusegun Obasanjo said student in the
country perceived education as a means of getting a meal ticket and a job (Bello etal as
2003), the president further argued that the perception or orientation must change, so that
students would appreciate the intrinsic value of education, which is the total development
stakeholders in the education sector to curtail the ugly trend have not yielded any fruit.
We can extrapolate to some extent from the present trend that Electronic cheating will
utterly destroy the quality of education in Nigeria, if decisive steps are not taken to
checkmate the trend. Little wonder, Afigho (1997) called Electronic cheating the demon
with a thousand faces. The intractable nature of Electronic cheating has resulted in high
From all available evidence, Electronic cheating is real and like the HIV scourge
that is still growing fast in the Nigerian educational system. What is missing now is an
Electronic cheating continues to grow at all level of the educational system. It has
educational standard.
There is a great need for Nigeria to look for a permanent solution in this millennium if
education is going to be the catalyst for national development and if Nigerian certificates
cheating in examination and its implication for professionalism, Rani (2004) said that
considering the fact that a medical doctor makes a mistake, the patient dies, if an engineer
makes a mistake, the bridge collapse but if a teacher makes a mistake it affects the unborn
generation, showing that while the mistake of the medical doctor and the engineer have
It is clear that many people are involved in Electronic cheatings. It is therefore a serious
matter that must be stopped at all cost. Electronic cheating and its widespread
manifestations have received attention; accusing fingers have been pointed to lecturers,
parents, and invigilators as being agents of Electronic cheating. In order to stop the
apparent intractability of the crime, it is necessary to identify the role of these agents,
factors responsible for Electronic cheating, the causes of Electronic cheating and the
The agents of these Electronic cheatings are those through which the act of malpractice is
i. The students
v. Lecturers
While the factors responsible for Electronic cheating with options and facts gathered.
Aina (1991) and Aliyu etal (1991) agreed in their various submissions that the desire to
pass at all cost is responsible for Electronic cheating. The fact remains that Nigerian
school management tend to push harder on wards to get the certificate and good grade at
higher institution(s). All this factors according to Denga (1993) are boiled down to three
factors of;
Psychological
Environmental
Intelligence
This includes all the stress, which is often induced in by parent, the peer pressure group
and students; this they experience enormous stress and anxiety in trying to meet the
various demand of subjects significantly. A study conducted by drake (1971) and Keller
(1941), Monday (1971) and Keller (1976) support this psychological reasons, that stress
and anxiety experienced by students tend to develop undesirable habit (Ward 1981,
Murphy 1988, Lamm 1984), which normally led them to be poorly prepared for
which emphasized the basic need i.e. psychological need of man, he argued that these
needs motivate and enhance learning, that if students psychological needs are not
physically met, it will affect their concentration in a teaching / learning situation, thereby
preparing the student cognition at a very low level and malpractice during examinations.
This is another factor stated by Denga (1983) that basically led students / co riders to
Electronic cheating and misconduct, the environmental factor includes the crowded
nature of our classrooms / theatres as well as examination halls with few invigilators
during examination.
Teachers / Lecturers inability to cover up the stipulated syllabus, for the period been
which are inadequate in the schools; may force students to cheat even if they do not want
to, in an examination.
Adeloye (2004) in his book stated that the concept of individual difference must be built
at the back of our mind when comparing academics competence, ability and
comprehension from one student to another, the failure of student to recognize the fact
that the IQ (intelligent quotient) differs and cannot be compared on, is another factor, thus
academically weak students will at times try to compare himself with naturally gifted
student who is brilliant when the weak academically student are not able to meet up with
the challenges, they opt the missing link with crops or external help to pass their
examination, this missing links are associated misconduct and malpractices. Salem
(1998) further elaborated this view from the psychological point that been intelligent and
been smart are two different concept or been academically gifted. Been smart means
ability to handle situations with what is physically available within the limited time
implies smartness while intelligent involves your cognition and reaction to stimulus. A
smart student may not be intelligent but can easily pass his/her examination than an
intelligent student.
different reasons are given to exonerate advocates from these acts. These exonerate tend
to expose the causes of Electronic cheating. Maduka (2001) sees undue emphasis placed
on certificate as one of the causes of Electronic cheating in Nigeria. Maduka said that the
Nigerian society places too much emphasis on certificates obtained and examination
passed on his own determinants. He further said that paper qualification and certificates
This argument was strongly agreed to by doctor Tolofari (2006) a director of river state
information ministry. He agreed that we should realize that the certificates mentality is
one of the root causes of Electronic cheating and fraud in Nigeria. This also emphases the
education as a means of getting all they ever desire in life. As a result of this trend,
morality and honesty have been thrown to the dogs to pass examination and obtain
certificates, so long as emphases are not on ones performance but on the paper first.
The economy is another cause of Electronic cheating Alausa (1994) states in a journal
publish entitle students performance in examination. He asserted that the clue to the
dwindling economic standard, low income to meet the ever growing human wants,
exchange of money (bribe), gift items, contract and other watering offers from either the
Electronic cheating. He state that the World Bank and international community
assessment of the poverty level of Nigerians has moved from 40% in 1992 to 70% in
1996. This poverty level has injected almost all civil servants with the virus called
bribery.
Bribery in our educational system has given birth to the monster called malpractices.
These monsters are presently destroying the value of our education and making nonsense
tertiary institution will not produce the graduates who would stand tall among equals and
who would make tangible and lasting contributions to the advancement of humanity.
Fafunwa (1974) identifies another cause, the lack of proper guidance and counselling
programs. He states that some schools do not have guidance and counselling programs
for students as such, students take courses without proper guidance. Parents sometimes in
pride impose courses on their children not minding the capacity of the emotional,
cognition of their wards before the imposition. These kids are pushed too hard and too far
their pride.
truancy and absenteeism made some students to be ill prepared for examination, not only
because they absent themselves from school and lectures but they do not know what
others have been thought, some of the student are just lazy therefore they have to result to
examination, in a bid to come out with excellent grades, without working hard for it
through the process of diligent studying. It is no longer news but has now become that
This is the reason why drastic steps must be taken because even parent are not left out of
the menace called Electronic cheating. Some of these dimensions for Electronic
This is a situation where student bring into examination hall notes, textbooks and other
prepared materials. This method is nicknamed hide and seek, microchips, Chukwuli,
magic desk that is a situation whereby a student write answers on his/her desk called
hall and are known as bullets, missiles, bombs, pregnant biro, reminders, escort, super
print which can also be called minimization whereby a lecture not is compressed and
photocopied into smaller strips of papers. There are also other names like contraband,
handkerchief method, writing on laps called femler method or on palms or the body
which is called tattoo. Usually only the candidates/students are involved in this act.
Some parents and students go to any length in buying examination questions, while some
other parents/student buy certificates. Invigilators collide with lecturers to come around
to teach student or give already prepared answers to the student during the examination.
The printing location where this material are sent to for printing also indulge in the habit
of leaking questions out to students for money or favour. Afolabi (1998) states that
leakage is one problem which appears to defy all solutions. Its persistent, despite
society.
The World Bank group (2001) states that it usually one or more of the following: staff
school administrators.
Some lecturers, for the sake of one thing or the other allow certain students, who have
lecturers/students.
HALLS
Students who have it in mind to cheat during examination exhibit strange and
Tearing part of the question paper or answer booklet during the examination to enhance
cheating.
The world bank group (2001) states it usually involves invigilators (exam room
worked answers during the course of the exam, or acting as couriers of materials into the
examination centre. In some instances, external helpers have used pagers, phones to
broadcast answers.
2.5.5 IMPERSONATION
This is a situation where a candidate sits for an examination for another candidate,
Impersonators write the examination on behalf of the candidate they are impersonating.
The plot is hatched right from the entry stage by making the impersonators to enter for
the same course and sit for examinations in hall with the same candidate. He writes the
candidate name and matriculation number on his booklet, while the candidate writes the
This is a situation whereby candidates entering for the same examinations in several part
of the vicinity. It has also been observed that several candidates struggle unnecessarily for
live question papers at the beginning of a paper, which are then passed to fellow-students
it was stated that it usually involves collusion between lecturers and the examination
supervisors. Frequently involves university students or lecturers taking the test for
These are cases of students insulting examination officials as they carry out their duties.
The aim is to distract them from effective supervision, so that they can have a way out,
In recent times, it has been discovered that students make use of electronic gadgets to
compact disks (the smallest size) and mobile phones (GSM) which is the most commonly
2.5.11 COLLUSION
assistance to each others during examinations. Some students go as far as paying their
fellow-students some agree some of money, in order for the paid students to teach
the mix of average, dull students in order for them to receive assistance from him or her.
There is also the case of talking fingers, where the agreed parties involved have already
decided what fingers represent what alphabets, which is mostly used in examinations
We also have the common method of copying from students or course mates which is
Afolabi (1998) said that collusion involves exchange of scripts, passing notes for help
from outside and inside the hall, delaying commencement of examination in one hall, in
order to obtain question papers from nearby examination halls which has started,
supervisors.
There are cases whereby some influential students make use of godfathers in politics,
economic high towers, parents and cult members to influence the outcome of
examinations, these people manipulate these scores by going as far as looking for
information about these lecturers friends or close family members, in order to penetrate
questions or inflates scores, especially when they perform poorly in that particular
lecturers course. Most times, when they discovered that they are unable to get through
with that particular lecturer, some people have gone as far as burning the office in order
for biometric authentication. The selection of a particular biometric for use in a specific
Jain (1999) identified seven such factors to be used when assessing the suitability
of any trait for use in biometric authentication. Universality means that every person
using a system should possess the trait. Uniqueness means the trait should be sufficiently
different for individuals in the relevant population such that they can be distinguished
from one another. Permanence relates to the manner in which a trait varies over time.
More specifically, a trait with good permanence will be reasonably invariant over time
the ease of acquisition or measurement of the trait. In addition, acquired data should be in
a form that permits subsequent processing and extraction of the relevant feature sets.
Performance relates to the accuracy, speed, and robustness of technology used (see
performance section for more details). Acceptability relates to how well individuals in the
relevant population accept the technology such that they are willing to have their
biometric trait captured and assessed. Circumvention relates to the ease with which a trait
might be imitated using an artifact or substitute. No single biometric will meet all the
biometric with a specific template stored in a biometric database in order to verify the
individual data from database. Three steps involved in person verification. In the first
step, reference models for all the users are generated and stored in the model database. In
the second step, some samples are matched with reference models to generate the genuine
Third step is the testing step, this process may use a smart card, username or ID
number (e.g. PIN) to indicate which template should be used for comparison. Positive
recognition is a common use of verification mode where the aim is to prevent multiple
system will succeed in identifying the individual if the comparison of the biometric
sample to a template in the database falls within a previously set threshold. Identification
mode can be used either for positive recognition (so that the user does not have to provide
any information about the template to be used) or for Negative recognition of the person
where the system establishes whether the person is who she (implicitly or explicitly)
denies to be. The latter function can only be achieved through biometrics since other
subsequent uses biometric information is detected and compared with the information
stored at the time of enrollment. Note, that it is crucial that storage and retrieval of such
systems themselves be secure if the biometric system is to be robust. The first block
(sensor) is the interface between the real world and the system, it has to acquire all the
necessary data. Most of the times it is an image acquisition system but it can change
according to the characteristics desired. The second block performs all the necessary pre-
processing: it has to remove artifacts from the sensor, to enhance the input (e.g. removing
background noise), to use some kind of normalization,etc. In the third block necessary
features are extracted. This step is an important step as the correct features need to be
extracted in the optimal way. A vector of numbers or an image with particular properties
extracted from the source. Elements of the biometric measurement that are not used in the
comparison algorithm are discarded in the template to reduce the file size and to protect
limitations of un-modal biometric systems. For instance, iris recognition systems can be
While un-modal biometric systems are limited by the integrity of their identifier, it is
unlikely that several un-modal systems will suffer from identical limitations. Multi-
biometric obtain sets of information from the same marker (i.e., multiple images of an
iris, or scans of the same finger) or information from different biometrics (requiring
combination there of, or in series, which refer to sequential, parallel, hierarchical and
detailed tradeoffs of response time, accuracy, and costs between integration modes.
Biometrics has been around since about 29,000 BC when cavemen would sign
their drawings with handprints. In 500 BC, Babylonian business transactions were signed
in clay tablets with fingerprints. The earliest cataloging of fingerprints dates back to 1891
intraclass variation of the operational data. The two-fold advantages of these systems are
solving the problem of limited training data and tracking the temporal variations of the
input data through adaptation. Recently, adaptive biometrics has received a significant
attention from the research community. This research direction is expected to gain
biometric system, one no longer needs to collect a large number of biometric samples
during the enrollment process. Second, it is no longer necessary to re-enroll or retrain the
system from the scratch in order to cope up with the changing environment. This
convenience can significantly reduce the cost of maintaining a biometric system. Despite
these advantages, there are several open issues involved with these systems. For mis-
classification error (false acceptance) by the biometric system, cause adaptation using
impostor sample. However, continuous research efforts are directed to resolve the open
issues associated to the field of adaptive biometrics. More information about adaptive
CHAPTER THREE
It has been established that physical achieves are not always helpful a much better
This implies the creation of database management system (DBMS) which ensure that
computer records are kept up to date and made available on demand to those who need
them for planning and operational purpose. The level of success achieved in caring out
defined procedure that should be followed in caring out a thorough research work .an
Ensure a very detail research work and ensure a higher degree of accuracy and efficiency
is adopted.
In other to attain quiet a reasonable acceptance of the research work we made use of the
tasks concern with the analysis of the current system logical data design , logical process
design, etc. The research methodology used helps us to ensure that a thorough study of
the present system is effectively carried out thus helping the project research team to
completely understand the modus operandi of the present system so as to know how to
the new system should be structured and the functionalities needed in it to address the
seemingly existing problems discovered. This helps to know if there should be total
overhauling of the existing system or if only modification should be made. From the
research carried out the existing system is a manual system which gives the option of
overhauling the manual system the SSADM is adopted to create entirely a new system.
developers must integrate with a development strategy that include the process, methods
and tools layer and generic phases. This strategy is often referred to a process model or a
Having achieved the software requirements, the next step was to source for
information relative to the subject. This process of information gathering was achieved
Start
Validate pwd
exit
3.5 RESEARCH DESIGN
The research design adopted for this study is the survey research design in which
The population of the study was taken randomly from the population of the entire
university. Therefore, the study includes students drawn from different faculties namely;
faculty of physical sciences, faculty of life sciences, faculty of arts, faculty of pharmacy,
school of medicine.
Questionnaires were randomly distributed to student drawn from the various faculties of
section comprises of various questions numbering about ten, for the purpose of eliciting
information from the respondents. The questionnaire contained terms based on student,
students personal data (bio-data) such as name, sex, age, level and faculty.
The 10-item questionnaire was geared towards eliciting response from students on
their personal perception as well as their opinion of students were also sort on the cause
of Electronic cheating the various Electronic cheating and the possible solution to curb
The response pattern of the questionnaire were yes, no and student individual
opinions.
3.7 Validity
To meet the objective of validity adequately, the researcher has to carry out a thorough
validation of the instrument by the assistant of selected experts. The questionnaire used
for the study was given to my supervisor, in person of Mrs. S. Konyeha of the department
limited number of questionnaires, which was about 100 copies, which cannot be able to
meet the entire population of the university. The questionnaire was thus distributed
randomly.
Some students posed some resistance in terms of answering the entire question in the
questionnaire while some took away the questionnaires and thus about 70 copies of the
In analyzing data collected, the researcher tallied the responses provided by the
respondents in the university. The researcher further enumerated the figures obtained
from the tally into raw scores on the table. The researcher then found the percentage of
each raw score for analyzing the results of the study. The frequency of the responses was
tabulated and the ranking also, all this was made possible by the technique SPSS
CHAPTER FOUR
This section gives a description of the input data to the system. Specifies how the input
The designed automatic disciplinary panel is interactive based software with good user
interface which makes it user friendly. The input screen is design in such a way that the
system users can enter input data to the system during the keyboard to type to type in the
required data or information. This system has two interfaces namely the student
registration and student exam registration, in which the student exam registration is
divided into section A and section B which contains the students verdict status. The input
i. Name
ii. Sex
v. Nationality
i. Phone number
Section A
i. Name
ii. Sex
i. Nature of offence
ii. Verdict
This information in the student verdict status is already stored in the system
This describes the processing task of the system. The automatic disciplinary panel will be
This section gives a description of the output to be generated from the system. Outputs
from the system are to be generated via unit (VDU) and the printer.
Program execution
Instruction Code.
Visual BASIC is an Object Orient programming language which has more advantages
than its procedural language counterpart. It is quite flexible and effective in database
The hardware requirements for the implementation of the system are as follows:
v. Flash drive
vii. Printer
In order for the hardware to function, the need for software components cannot be
undermined. Hence the software requirements for the system implementation are as
follows:
Start button
Microsoft VB
Click existing
Click on look in
Press f5 to play
application.
i. User manual
ii. Online help
iii. Online tutorials
The user interface of the system is a web user interface. A proficient user of the internet
4.5 TRAINING
The development software application has been done using design principle of
software development. It is design a consistent manner and users if the system can
order to ensure that the software still meet its initial objectives.
The system would also need to be reviewed and maintained periodically for the
following reason:
1. To ascertain that the system is able to cope with changing requirement of the system
i. Corrective Maintenance
ii. Adaptive Maintenance
iii. Perfective Maintenance
The corrective Maintenance for the project would require running the codes and
locating errors that may result well as correcting the errors. Adaptive maintenance would
ensure that the developed system can be easily adjusted and up graded into newer
system developed would run on any windows operating hardware platform with the
stages involved as well as the component. The documentation includes the comments in
the program codes as the user guide. Other forms of maintenance are handling of the
system component which include the power supply, memory, hard drive and input
devices.
the system. A backup of the database should be carried out by the database administrator.
CHAPTER FIVE
5.1 SUMMARY
in the Nigerian educational system, it is no doubt necessary to research into the area
Also in the era of anti-corruption in the Nigerian society, the educational system needs to
join this crusade and totally rid the system of this plague.
It was therefore the intention of this project work to look into forms of Electronic
cheatings, the causes and also evaluate the penalties for Electronic cheating, while
creating possible solutions to curb Electronic cheating in the Nigeria universities, using
5.2 CONCLUSION
The root cause of Electronic cheating is that there is poor preparation as a result of
decreasing level of quality teaching and learning in our universities. Proper preparation
universities. While all other remedies to curb Electronic cheating like punitive measures,
public enlightenment campaign and printing of question papers few hours to exams
should continue, we should try to emphasize qualitative teaching and learning in our
universities. There are cost implications to improving the quality of teaching and
learning.
All the stakeholders in education should be ready to contribute to the funding of our
universities. There should be proper monitoring and supervision to ensure that the end
5.3 RECOMMENDATION
and to carry out this exercise fully, the following recommendations are also made,
which are:
ii. Many students who engage in Electronic cheating have been found to be
iii. Should facilities in terms of sitting arrangement and halls have been a major cause
be good environment, like good ventilation, good examination chairs and adequate
spacing between students. A lot of temptations to cheat exist when they are close
Undue familiarity which can make some students to have advanced knowledge of
Finally, Electronic cheating is without any doubt, a part of our educational systems. The
federal government through the national orientation agency is working hard to change the
value system of the society by mounting many campaign against corruption, electric
cable and pipeline vandalization, University of Benin should mount more frequently
campaign on the ills and penalties of Electronic cheating until the evil is totally stamped
Aaron, R.M: Student academic dishonesty; are collegiate institutions addressing the
Ehiozuwa, A.O. (Ed). Etiology effect and control of malignancies in Nigerian education
Afigbo, A.E (1997). The demon with a thousand faces: Electronic cheatings in historical
Examination: who is the strongest link? Paper presented at the 7 th national conference of
Nana, E.M: (1997). Teachers behaviour amongst school pupils as a factor in Electronic
cheating in secondary school: A study of schools in Ugheli North Local Government Area
of Delta State. Unpublished bachelors of education desertion, Edo State University,
Ekpoma-Nigeria
Onyechere, I (2004). Cheating: A world wide problem. In cones mat east 33 ways all
Rani, E.O (2004): Counselling students of the faculty of education at the University of
Sooze, S (2004). Way out of Electronic cheatings. Dailytimes. May 29, 2003