Вы находитесь на странице: 1из 41

CHAPTER ONE

1.0 INTRODUCTION
Electronic cheating in the Nigerian educational system is widely discussed. It also

becomes a major challenge to examination bodies, the government of Nigeria, school

administrators and parent alike. Evidence abound of increasing incidents of Electronic

cheating by students at school and colleges, which conflict with the core purpose of

education, the training of the mind and character for the acquisition of practical and

theoretical skills, knowledge and functional ideas for development; and the search for

truth and knowledge and the creation and communication of ideas (Nanna, 1997;

Peterson, 1998, as cited in Aaron, 1992).

Electronic cheating involves methods employed by candidates to cheat during

examinations. (Usman 1994). While Shaman (1990) elaborates further and better that

malpractice in examination is an unlawful behaviour or activity engaged by students to

have personal advantage in examination over their colleagues or mates who are

competing in the same examination. Many of these irregular behaviour or misconduct

surrounds examination and it came to an alarming rate in the last three decades.

The hues and cries about Electronic cheating which took place at all level of the Nigeria

educational system is nothing but a reflection of the society.

The Nigerian society is that which celebrates mediocre and view cheats as being

smart. The society does not want to know how an individual achieves success. The
important thing, is the success, in actual fact, Electronic cheating is a variant of the

corruption in the society.

The politicians employ rigging at elections and enjoy enviable political offices and so do

students cheats from primary to tertiary institutions to move from one level of education

to another. All sorts of misconduct take place in and around examination venues in order

to achieve success.

To make matter worse, it is not only students that are involved, parents, teachers,

school heads, examination officials all collude with students to perpetrate this misconduct

(Ijaiya, 2004). The collusion between one and more of these agents makes it more

difficult to combat. Even the penalties stipulated in Act33 of 1999 ranging from

cancellation of results to 21 years jail term has failed to achieve any significant shift from

the cheating culture (Olasehinde, 1993)

1.1 BACKGROUND OF ELECTRONIC CHEATINGS

Although many educational researchers from a variety of background has carried

out various investigations and discovered that Electronic cheating is a phenomenon that

has started some decades ago and the effort by government administrators and stake

holders in the educational sector to curtail the ugly trend have not yielded any fruit.

The derogative falling of our educational standard is becoming uncontrollable, the

pollution of our education by both stake holders and students is now pointing towards the

wrong direction.
Our dependency on external technology results from our inability to purge out this

menace. Nigerians known with our emphasis on certificate orientation (i.e. presentation

of certificate for job employment is gradually telling on our technological development.

The certificate qualification orientation unknowingly bedded in us (our nation), leads to

many acquiring same certificate by all means, positively or negatively. All forms of

misconduct and malpractices had and are still been introduced to achieve this eccentric

menace (certificate). Our mind, which is part of that, that control our thoughts and action

and are channel towards the easiest way out of achieving this eccentric goods. The

development of our intellectual capacity are derail due to the fact that state holders

(government, administrators, teachers, students and parents) are primarily focusing on the

end result of our education.

1.2 EXAMINATION CHEATING OVERVIEW

The term Electronic cheating has been defined by various researchers in different ways.

Electronic cheating is an illegal or unethical behaviour by somebody in the process of

testing an examiners ability or knowledge by means of questions (Ikupa, 1997). Oluyeba

and Daramola, (1992) remark that Electronic cheating is any irregular behaviour

exhibited by a candidate or anybody charged with the conduct of examination before,

during or after the examination which contravenes the rules and regulations governing the

conduct of such examination.


WAEC (2003) defined Electronic cheating as any irregular behaviour exhibited by

candidates or anybody charged with the responsibility of conducting examination in or

outside the examination hall, before, during or after such examination.

1.3 AIM AND OBJECTIVE OF STUDY

The aim of this project is to devise a mechanism for curbing the rate of

examination cheating in the university. The mechanism would serve as a restriction for

students and lecturers alike who indulge in the act of examination cheating during exams.

This mechanism would put a check on the rate at which this ugly trend is being

popularized by the university.

The mechanism will be anchored on a process which overseas how

students/lecturers take and conduct examinations. The students over some period of time

would begin to realise the consequences and negative effect of Electronic cheating and at

the end of the day, this would instil some form of self-confidence in these students, in

order for them to study and write their examinations themselves without any form of

assistance or external aid. A check would also be created eventually, willingly or

unwillingly in the mind of the lecturers and parents alike to refrain themselves from such

ugly acts.

1.4 SIGNIFICANCE OF STUDY

Applying a strict check on how examination is being run and taken in the university

would improve the quality of graduates that are being sent out of the university. This

leads to the rebuilding and growth of the society eventually.


It curtails the rate of violence and other negative occurrences in the university to be

reduced because for students who are busy with their academic work, would not have the

time to indulge in one form of violent activity or the other because he/she is unaware of

the consequences involved when they do so.

1.5 SCOPE OF STUDY

The scope of this project is to analyze the causes of electronic cheating and various forms

that it takes. Also an automated system will be developed for this project work, where the

head of Electronic cheating panel can have a pictorial overview of cases of exam

malpractice relating to any student. By this, he is able to pass an instant

judgement/punishment without any form of lobbying/bribery.

1.6 LIMITATION OF STUDY

This project work during research was limited by the fact that some students were

not willing to release the right information for fear of being exposed or implicated. Again,

some students carried away questions with the intension of filling it and returning it but

they never did so, due to this fact, some questionnaires were lost. This led to the fact that

the numbers of questionnaires given out were not the number of questionnaires returned,

moreover, the behaviour of the respondent (students) during the collection of the data, so

there was no 100% collection of data.


CHAPTER TWO
LITERATURE REVIEW
2.0 THE VARIOUS FORMS OF ELECTRONIC CHEATING

Electronic cheating is not a new phenomenon in Nigeria, as well as indeed in any

part of the world, just as it is in our university today. The first Electronic cheating in

Nigeria was reported in 1914, when there was a leakage of question paper into the senior

Cambridge local examination, others traced the origin of Electronic cheatings to the wave

of cancellation of Nigerians candidate to the then Yaba Nigeria technical (Soleye

1991). The most pronounce malpractice in Nigeria in early examination was that of 1964

that was tagged expo, subsequently in 1970, 1973, 1974, 1979, 1981, and 1991

followed (Oladope 1997). Since 1991 till date Electronic cheating has taken advanced

and more sophisticated dimensions in the university today, records are been emerged

yearly indicating high or low percentage in Electronic cheating.

The Nigerian former president, Chief Olusegun Obasanjo said student in the

country perceived education as a means of getting a meal ticket and a job (Bello etal as

2003), the president further argued that the perception or orientation must change, so that

students would appreciate the intrinsic value of education, which is the total development

of the individual to be able to make meaningful contributions to the family, community

and the country at large.

Electronic cheating in Nigeria has attained a frightening proportion, it is

sophisticated and institutionalized. Efforts by government administrators and

stakeholders in the education sector to curtail the ugly trend have not yielded any fruit.
We can extrapolate to some extent from the present trend that Electronic cheating will

utterly destroy the quality of education in Nigeria, if decisive steps are not taken to

checkmate the trend. Little wonder, Afigho (1997) called Electronic cheating the demon

with a thousand faces. The intractable nature of Electronic cheating has resulted in high

turnover of half-baked graduates by institutions of higher learning.

From all available evidence, Electronic cheating is real and like the HIV scourge

that is still growing fast in the Nigerian educational system. What is missing now is an

effective solution to the scourge before it destroys the whole system.

Electronic cheating continues to grow at all level of the educational system. It has

proved to be an incurable disease in the educational system making nonsense of the

educational standard.

There is a great need for Nigeria to look for a permanent solution in this millennium if

education is going to be the catalyst for national development and if Nigerian certificates

are going to be respected in this era of globalisation. To emphasize the seriousness of

cheating in examination and its implication for professionalism, Rani (2004) said that

considering the fact that a medical doctor makes a mistake, the patient dies, if an engineer

makes a mistake, the bridge collapse but if a teacher makes a mistake it affects the unborn

generation, showing that while the mistake of the medical doctor and the engineer have

immediate repercussions, that of the teacher is eternal.

It is clear that many people are involved in Electronic cheatings. It is therefore a serious

matter that must be stopped at all cost. Electronic cheating and its widespread
manifestations have received attention; accusing fingers have been pointed to lecturers,

parents, and invigilators as being agents of Electronic cheating. In order to stop the

apparent intractability of the crime, it is necessary to identify the role of these agents,

factors responsible for Electronic cheating, the causes of Electronic cheating and the

various forms of Electronic cheating.

The agents of these Electronic cheatings are those through which the act of malpractice is

carried out and they are:

i. The students

ii. The parents or guardians

iii. Schools: management, department and their staffs.

iv. Examination officers or invigilators

v. Lecturers

While the factors responsible for Electronic cheating with options and facts gathered.

Aina (1991) and Aliyu etal (1991) agreed in their various submissions that the desire to

pass at all cost is responsible for Electronic cheating. The fact remains that Nigerian

orientation in education is certificate and high grade intensiveness, students, parents,

school management tend to push harder on wards to get the certificate and good grade at

all means to secure employment, others prefer to manipulate to be admitted in a choicest

higher institution(s). All this factors according to Denga (1993) are boiled down to three

factors of;

Psychological
Environmental

Intelligence

2.1 PSYCHOLOGICAL FACTOR

This includes all the stress, which is often induced in by parent, the peer pressure group

and students; this they experience enormous stress and anxiety in trying to meet the

various demand of subjects significantly. A study conducted by drake (1971) and Keller

(1941), Monday (1971) and Keller (1976) support this psychological reasons, that stress

and anxiety experienced by students tend to develop undesirable habit (Ward 1981,

Murphy 1988, Lamm 1984), which normally led them to be poorly prepared for

examination and subsequently expose them to in engaging Electronic cheating and

misconduct. This psychological factor also brings in Maslows motivational theories,

which emphasized the basic need i.e. psychological need of man, he argued that these

needs motivate and enhance learning, that if students psychological needs are not

physically met, it will affect their concentration in a teaching / learning situation, thereby

preparing the student cognition at a very low level and malpractice during examinations.

2.2 ENVIRONMENTAL FACTOR

This is another factor stated by Denga (1983) that basically led students / co riders to

Electronic cheating and misconduct, the environmental factor includes the crowded

nature of our classrooms / theatres as well as examination halls with few invigilators

during examination.
Teachers / Lecturers inability to cover up the stipulated syllabus, for the period been

stated before an internal examination, obsolete and observed instructional materials

which are inadequate in the schools; may force students to cheat even if they do not want

to, in an examination.

2.3 INTELLIGENT FACTOR

Adeloye (2004) in his book stated that the concept of individual difference must be built

at the back of our mind when comparing academics competence, ability and

comprehension from one student to another, the failure of student to recognize the fact

that the IQ (intelligent quotient) differs and cannot be compared on, is another factor, thus

academically weak students will at times try to compare himself with naturally gifted

student who is brilliant when the weak academically student are not able to meet up with

the challenges, they opt the missing link with crops or external help to pass their

examination, this missing links are associated misconduct and malpractices. Salem

(1998) further elaborated this view from the psychological point that been intelligent and

been smart are two different concept or been academically gifted. Been smart means

ability to handle situations with what is physically available within the limited time

implies smartness while intelligent involves your cognition and reaction to stimulus. A

smart student may not be intelligent but can easily pass his/her examination than an

intelligent student.

2.4 CAUSES OF ELECTRONIC CHEATING


The causes of Electronic cheating are numerous as one encounter examination;

different reasons are given to exonerate advocates from these acts. These exonerate tend

to expose the causes of Electronic cheating. Maduka (2001) sees undue emphasis placed

on certificate as one of the causes of Electronic cheating in Nigeria. Maduka said that the

Nigerian society places too much emphasis on certificates obtained and examination

passed on his own determinants. He further said that paper qualification and certificates

serves as a means of getting well paid job achievement of social status.

This argument was strongly agreed to by doctor Tolofari (2006) a director of river state

information ministry. He agreed that we should realize that the certificates mentality is

one of the root causes of Electronic cheating and fraud in Nigeria. This also emphases the

former presidents statement, (2005) Obasanjo said students in Nigeria perceived

education as a means of getting all they ever desire in life. As a result of this trend,

morality and honesty have been thrown to the dogs to pass examination and obtain

certificates, so long as emphases are not on ones performance but on the paper first.

Many holders of certificates cannot practically defend them through performance.

The economy is another cause of Electronic cheating Alausa (1994) states in a journal

publish entitle students performance in examination. He asserted that the clue to the

dwindling economic standard, low income to meet the ever growing human wants,

lecturers cum supervisor engages in misconduct and malpractice, these they do in

exchange of money (bribe), gift items, contract and other watering offers from either the

candidates or their advocates.


Akinyode (2004) agreed with the poverty level of Nigerians as one of the causes of

Electronic cheating. He state that the World Bank and international community

assessment of the poverty level of Nigerians has moved from 40% in 1992 to 70% in

1996. This poverty level has injected almost all civil servants with the virus called

bribery.

Bribery in our educational system has given birth to the monster called malpractices.

These monsters are presently destroying the value of our education and making nonsense

of our certificates. Bribery in our institutions of learning be it primary, secondary or

tertiary institution will not produce the graduates who would stand tall among equals and

who would make tangible and lasting contributions to the advancement of humanity.

Fafunwa (1974) identifies another cause, the lack of proper guidance and counselling

programs. He states that some schools do not have guidance and counselling programs

for students as such, students take courses without proper guidance. Parents sometimes in

pride impose courses on their children not minding the capacity of the emotional,

cognition of their wards before the imposition. These kids are pushed too hard and too far

thereby making them corrupt through engagement in malpractice and misconduct to

please their parent(s) or parent encouraging forms of misconduct of malpractice to justify

their pride.

An article in Vanguage newspaper (1999) carried a sketch of Electronic cheating that

truancy and absenteeism made some students to be ill prepared for examination, not only

because they absent themselves from school and lectures but they do not know what
others have been thought, some of the student are just lazy therefore they have to result to

Electronic cheating as an alternative therapy in their careers.

The quota system of admission in our federal universities/schools is another factors

uprooted as causes of Electronic cheatings. It was observed that admitting unqualified

candidates to meet geographical spread, thus emerging of low performance, culminating

in cheating or unconventional behaviour called Electronic cheating.

In the university today, students have devised various means of excelling in an

examination, in a bid to come out with excellent grades, without working hard for it

through the process of diligent studying. It is no longer news but has now become that

year-in-year-out, student come out with dimensions of Electronic cheatings.

This is the reason why drastic steps must be taken because even parent are not left out of

the menace called Electronic cheating. Some of these dimensions for Electronic

cheatings are discussed below.

2.5 THE VARIOUS FORMS OF ELECTRONIC CHEATINGS

2.5.1 Bringing of Foreign Materials into Examination Hall

This is a situation where student bring into examination hall notes, textbooks and other

prepared materials. This method is nicknamed hide and seek, microchips, Chukwuli,

magic desk that is a situation whereby a student write answers on his/her desk called

desktops publishing before or during examination.


Abba (1998) identified some methods which entails bringing foreign materials into the

hall and are known as bullets, missiles, bombs, pregnant biro, reminders, escort, super

print which can also be called minimization whereby a lecture not is compressed and

photocopied into smaller strips of papers. There are also other names like contraband,

handkerchief method, writing on laps called femler method or on palms or the body

which is called tattoo. Usually only the candidates/students are involved in this act.

(The World Bank group, 2001).

2.5.2 Assistance from Educational Stakeholders

Educational / examination stakeholders include parents, lecturers, supervisors, security

agents, printers and staffs of the department/university.

Some parents and students go to any length in buying examination questions, while some

other parents/student buy certificates. Invigilators collide with lecturers to come around

to teach student or give already prepared answers to the student during the examination.

Lecturers releases question papers or giving undeserved marks.

The printing location where this material are sent to for printing also indulge in the habit

of leaking questions out to students for money or favour. Afolabi (1998) states that

leakage is one problem which appears to defy all solutions. Its persistent, despite

methods of blocking loopholes, is an indication of the malaise and corruption in the

society.

The World Bank group (2001) states that it usually one or more of the following: staff

members of examination authorities, printers, proofreaders and messengers, personnel


employed to develop the papers (setters) or to determine its suitability, moderators and

school administrators.

2.5.3 ILLEGALLY RETAKE EXAMINATION PAPERS

Some lecturers, for the sake of one thing or the other allow certain students, who have

discovered they have performed poorly during an examination, to retake these

examinations in their offices privately, out of the knowledge of other innocent

lecturers/students.

2.5.4 IRREGULAR ACTIVITIES INSIDE AND OUTSIDE EXAMINATION

HALLS

Students who have it in mind to cheat during examination exhibit strange and

unwholesome behaviours. They use various methods such as:

Stealing, converting, substituting or misappropriating the scripts of other candidates.

Substituting worked scripts during or after an examination.

Tearing part of the question paper or answer booklet during the examination to enhance

cheating.

Seeking and receiving helps from other candidates.

The world bank group (2001) states it usually involves invigilators (exam room

supervisors) dictating answers, writing answers on the blackboard, circulating sheets of

worked answers during the course of the exam, or acting as couriers of materials into the
examination centre. In some instances, external helpers have used pagers, phones to

broadcast answers.

2.5.5 IMPERSONATION

This is a situation where a candidate sits for an examination for another candidate,

thereby pretending to be the real or actual candidate.

Impersonation is becoming rampant among students. Afolabi (1998) listed various

methods that have been devised by these students. They are:

2.5.6 POSING AS A BONAFIDE CANDIDATE

Impersonators write the examination on behalf of the candidate they are impersonating.

Undergraduates, graduates and youth corpers engage in this kind of cheating.

2.5.7 ENTRY FOR SIMILAR SUBJECTS

The plot is hatched right from the entry stage by making the impersonators to enter for

the same course and sit for examinations in hall with the same candidate. He writes the

candidate name and matriculation number on his booklet, while the candidate writes the

impersonators and they exchange scripts before submitting.

2.5.8 MULTIPLE ENTRIES

This is a situation whereby candidates entering for the same examinations in several part

of the vicinity. It has also been observed that several candidates struggle unnecessarily for

live question papers at the beginning of a paper, which are then passed to fellow-students

or touts for assistance.


The World Bank (2001) states that an impersonator is an individual who is not registered,

it was stated that it usually involves collusion between lecturers and the examination

supervisors. Frequently involves university students or lecturers taking the test for

monetary reward or as a favour for a girlfriend or boyfriend.

Sometimes, young employees are coerced to take the examinations.

2.5.9 INSULT OR ASSAULT ON EXAMINATION OFFICIALS

These are cases of students insulting examination officials as they carry out their duties.

The aim is to distract them from effective supervision, so that they can have a way out,

sometimes, students disturb the conduct of examinations due to poor preparations.

2.5.10 ELECTRONICALLY ASSISTED MALPRACTICES

In recent times, it has been discovered that students make use of electronic gadgets to

cheat during examination. Such things as unauthorized scientific calculators, organizers,

compact disks (the smallest size) and mobile phones (GSM) which is the most commonly

used to take advantage of others.

2.5.11 COLLUSION

This is a situation where two or more candidates agreed to receive or give

assistance to each others during examinations. Some students go as far as paying their

fellow-students some agree some of money, in order for the paid students to teach

him/her during examinations.


Maduabun (1998) identified the use of things like laya Ecormog and so on. When the

forms of collusion is verbal it is called ecomog or ecowas, joint-effort, charm network,

life-wire, which is a situation whereby a brilliant student, usually a scholar is placed in

the mix of average, dull students in order for them to receive assistance from him or her.

There is also the case of talking fingers, where the agreed parties involved have already

decided what fingers represent what alphabets, which is mostly used in examinations

where we have multiple choice questions.

We also have the common method of copying from students or course mates which is

popularly called dubbing or giraffing or spying.

Afolabi (1998) said that collusion involves exchange of scripts, passing notes for help

from outside and inside the hall, delaying commencement of examination in one hall, in

order to obtain question papers from nearby examination halls which has started,

collusion arising from bribes or threats to the lives or properties of invigilators or

supervisors.

2.5.12 PERSONALITY CONNECTION

There are cases whereby some influential students make use of godfathers in politics,

economic high towers, parents and cult members to influence the outcome of

examinations, these people manipulate these scores by going as far as looking for

information about these lecturers friends or close family members, in order to penetrate

them through these people.

2.5.13 BREAKING INTO LECTURERS OFFICE


It has been observed that students break into lecturers office at odd times in order to steal

questions or inflates scores, especially when they perform poorly in that particular

lecturers course. Most times, when they discovered that they are unable to get through

with that particular lecturer, some people have gone as far as burning the office in order

to destroy the records.

2.6 BIOMETRIC FUNCTIONALITY

Many different aspects of human physiology, chemistry or behavior can be used

for biometric authentication. The selection of a particular biometric for use in a specific

application involves a weighting of several factors.

Jain (1999) identified seven such factors to be used when assessing the suitability

of any trait for use in biometric authentication. Universality means that every person

using a system should possess the trait. Uniqueness means the trait should be sufficiently

different for individuals in the relevant population such that they can be distinguished

from one another. Permanence relates to the manner in which a trait varies over time.

More specifically, a trait with good permanence will be reasonably invariant over time

with respect to the specific matching algorithm. Measurability (collectability) relates to

the ease of acquisition or measurement of the trait. In addition, acquired data should be in

a form that permits subsequent processing and extraction of the relevant feature sets.

Performance relates to the accuracy, speed, and robustness of technology used (see

performance section for more details). Acceptability relates to how well individuals in the

relevant population accept the technology such that they are willing to have their
biometric trait captured and assessed. Circumvention relates to the ease with which a trait

might be imitated using an artifact or substitute. No single biometric will meet all the

requirements of every possible application.

In verification mode the system performs a one-to-one comparison of a captured

biometric with a specific template stored in a biometric database in order to verify the

individual data from database. Three steps involved in person verification. In the first

step, reference models for all the users are generated and stored in the model database. In

the second step, some samples are matched with reference models to generate the genuine

and impostor scores and calculate the threshold.

Third step is the testing step, this process may use a smart card, username or ID

number (e.g. PIN) to indicate which template should be used for comparison. Positive

recognition is a common use of verification mode where the aim is to prevent multiple

people from using same identity.

In Identification mode the system performs a one-to-many comparison against a

biometric database in attempt to establish the identity of an unknown individual. The

system will succeed in identifying the individual if the comparison of the biometric

sample to a template in the database falls within a previously set threshold. Identification

mode can be used either for positive recognition (so that the user does not have to provide

any information about the template to be used) or for Negative recognition of the person

where the system establishes whether the person is who she (implicitly or explicitly)

denies to be. The latter function can only be achieved through biometrics since other

methods of personal recognition such as passwords, PINs or keys are ineffective.


The first time an individual uses a biometric system is called enrollment. During

the enrollment, biometric information from an individual is captured and stored. In

subsequent uses biometric information is detected and compared with the information

stored at the time of enrollment. Note, that it is crucial that storage and retrieval of such

systems themselves be secure if the biometric system is to be robust. The first block

(sensor) is the interface between the real world and the system, it has to acquire all the

necessary data. Most of the times it is an image acquisition system but it can change

according to the characteristics desired. The second block performs all the necessary pre-

processing: it has to remove artifacts from the sensor, to enhance the input (e.g. removing

background noise), to use some kind of normalization,etc. In the third block necessary

features are extracted. This step is an important step as the correct features need to be

extracted in the optimal way. A vector of numbers or an image with particular properties

is used to create a template. A template is a synthesis of the relevant characteristics

extracted from the source. Elements of the biometric measurement that are not used in the

comparison algorithm are discarded in the template to reduce the file size and to protect

the identity of the enrollee.

2.7 MULTI-BIOMETRIC SYSTEM

Multi-biometric systems use multiple sensors or biometrics to overcome the

limitations of un-modal biometric systems. For instance, iris recognition systems can be

compromised by aging irisesand finger scanning systems by worn-out or cut fingerprints.

While un-modal biometric systems are limited by the integrity of their identifier, it is

unlikely that several un-modal systems will suffer from identical limitations. Multi-
biometric obtain sets of information from the same marker (i.e., multiple images of an

iris, or scans of the same finger) or information from different biometrics (requiring

fingerprint scans and, using voice recognition, a spoken pass-code). Multi-biometric

systems can integrate these un-modal systems sequentially, simultaneously, a

combination there of, or in series, which refer to sequential, parallel, hierarchical and

serial integration modes, respectively. The interested reader is pointed to Cobiasfor

detailed tradeoffs of response time, accuracy, and costs between integration modes.

2.8 HISTORY OF BIOMETRICS

Biometrics has been around since about 29,000 BC when cavemen would sign

their drawings with handprints. In 500 BC, Babylonian business transactions were signed

in clay tablets with fingerprints. The earliest cataloging of fingerprints dates back to 1891

when Juan Vucetich started a collection of fingerprints of criminals in Argentina.

2.8.1 ADAPTIVE BIOMETRIC SYSTEMS

Adaptive biometric Systems aim to auto-update the templates or model to the

intraclass variation of the operational data. The two-fold advantages of these systems are

solving the problem of limited training data and tracking the temporal variations of the

input data through adaptation. Recently, adaptive biometrics has received a significant

attention from the research community. This research direction is expected to gain

momentum because of their key promulgated advantages. First, with an adaptive

biometric system, one no longer needs to collect a large number of biometric samples

during the enrollment process. Second, it is no longer necessary to re-enroll or retrain the

system from the scratch in order to cope up with the changing environment. This
convenience can significantly reduce the cost of maintaining a biometric system. Despite

these advantages, there are several open issues involved with these systems. For mis-

classification error (false acceptance) by the biometric system, cause adaptation using

impostor sample. However, continuous research efforts are directed to resolve the open

issues associated to the field of adaptive biometrics. More information about adaptive

biometric systems can be found in the critical review by Rattani.

CHAPTER THREE

SYSTEM ANALYSIS AND DESIGN

3.1 System Analysis

It has been established that physical achieves are not always helpful a much better

alternative is to use automated base examination scheduler.

This implies the creation of database management system (DBMS) which ensure that

computer records are kept up to date and made available on demand to those who need

them for planning and operational purpose. The level of success achieved in caring out

this research work is owed to the methodology adopted.


A research methodology is a systematical programming approach of a well-

defined procedure that should be followed in caring out a thorough research work .an

adequately suitable methodology would

Ensure a very detail research work and ensure a higher degree of accuracy and efficiency

is adopted.

In other to attain quiet a reasonable acceptance of the research work we made use of the

internationally accepted software engineering model, which is

Structured System Analysis and Design Methodology. (SSADM).

The (SSADM) is a system approach` to the analysis and design of information

system. It involves the application of a sequence of analysis, documentation and design

tasks concern with the analysis of the current system logical data design , logical process

design, etc. The research methodology used helps us to ensure that a thorough study of

the present system is effectively carried out thus helping the project research team to

completely understand the modus operandi of the present system so as to know how to

the new system should be structured and the functionalities needed in it to address the

seemingly existing problems discovered. This helps to know if there should be total

overhauling of the existing system or if only modification should be made. From the

research carried out the existing system is a manual system which gives the option of

overhauling the manual system the SSADM is adopted to create entirely a new system.

3.2 SOFTWARE PROCESS MODEL:


To solve an actual problems in an industry, software developer or a team of

developers must integrate with a development strategy that include the process, methods

and tools layer and generic phases. This strategy is often referred to a process model or a

software developing paradigm.

Our project follows the waterfall model.

i. The steps of waterfall model are:


ii. Requirement Definition
iii. System and Software Design
iv. Implementation
v. Integration and System E-cheating system and Maintenance

3.3 METHOD OF DATA COLLECTION

Having achieved the software requirements, the next step was to source for

information relative to the subject. This process of information gathering was achieved

through so many sources including:

i. Textbooks in the library


ii. Newspaper, Journals and articles of school publication
iii. Other publications relative to other universities and their development
iv. Personal observations of the examination in the school system.
3.4 ELECTRONIC CHEATING SYSTEM

Start

Validate pwd

Admin Questions Register Logout

exit
3.5 RESEARCH DESIGN

The research design adopted for this study is the survey research design in which

questionnaire was used to identify problem of examination malpractice or causes of

examination malpractice, the perception of students towards examination malpractice,

students perception towards examination ethics, the various forms of examination

malpractice and possible solutions to curb examination malpractice in the university.

3.6 POPULATION OF THE STUDY

The population of the study was taken randomly from the population of the entire

university. Therefore, the study includes students drawn from different faculties namely;

faculty of physical sciences, faculty of life sciences, faculty of arts, faculty of pharmacy,

faculty of engineering, faculty of social sciences, faculty of management sciences and

school of medicine.

3.6.1 Sample and Sampling Techniques

Questionnaires were randomly distributed to student drawn from the various faculties of

the university, which was used for the study.

3.6.2 Research Instrument and Methodology


The instrument used for the study was questionnaire. The questionnaire has only one

section comprises of various questions numbering about ten, for the purpose of eliciting

information from the respondents. The questionnaire contained terms based on student,

students personal data (bio-data) such as name, sex, age, level and faculty.

The 10-item questionnaire was geared towards eliciting response from students on

their personal perception as well as their opinion of students were also sort on the cause

of Electronic cheating the various Electronic cheating and the possible solution to curb

the Electronic cheating in the university.

The response pattern of the questionnaire were yes, no and student individual

opinions.

3.7 Validity

To meet the objective of validity adequately, the researcher has to carry out a thorough

validation of the instrument by the assistant of selected experts. The questionnaire used

for the study was given to my supervisor, in person of Mrs. S. Konyeha of the department

of Computer Science, University of Benin. My supervisor made some additions, after

which the instrument was approved and valid for administration.

3.8 ADMINISTRATIONS OF INSTRUMENT AND LIMITATIONS

The questionnaires were administered to students as my respondents. As a results of

limited number of questionnaires, which was about 100 copies, which cannot be able to

meet the entire population of the university. The questionnaire was thus distributed

randomly.
Some students posed some resistance in terms of answering the entire question in the

questionnaire while some took away the questionnaires and thus about 70 copies of the

questionnaire were retrieved.

3.9 Data Analysis

In analyzing data collected, the researcher tallied the responses provided by the

respondents in the university. The researcher further enumerated the figures obtained

from the tally into raw scores on the table. The researcher then found the percentage of

each raw score for analyzing the results of the study. The frequency of the responses was

tabulated and the ranking also, all this was made possible by the technique SPSS

(statistical package for social sciences).

CHAPTER FOUR

SYSTEM IMPLEMENTATION AND PERFORMANCE EVALUATION

4.1.1 Input design

This section gives a description of the input data to the system. Specifies how the input

will be entered into the system.

The designed automatic disciplinary panel is interactive based software with good user

interface which makes it user friendly. The input screen is design in such a way that the

system users can enter input data to the system during the keyboard to type to type in the

required data or information. This system has two interfaces namely the student

registration and student exam registration, in which the student exam registration is
divided into section A and section B which contains the students verdict status. The input

data to the student registration are given below;

i. Name

ii. Sex

iii. Date of birth

iv. State of origin

v. Nationality

vi. Postal address

vii. Contact address

viii. Residential address

ix. E-mail address

i. Phone number

ii. Language spoken

iii. Data of first and second next of kin

Student examination inputs are given below

Section A

i. Name

ii. Sex

iii. Student identification number

iv. Matriculation number

v. Faculty and department


Section B

Student verdict status are given below

i. Nature of offence

ii. Verdict

iii. Confirm verdict

This information in the student verdict status is already stored in the system

4.1.2 Processing requirement

This describes the processing task of the system. The automatic disciplinary panel will be

processing the following tasks:

i. Student personal information (bio data)

ii. Student malpractice cases

4.1.3 Output requirement

This section gives a description of the output to be generated from the system. Outputs

from the system are to be generated via unit (VDU) and the printer.

4.2 System implementation

Choice of programming language

System requirement-hardware and software requirement

Program execution

4.2.1 Choice of programming language


The programming language used in the development of the system is visual BASIC

programming language, which is an acronym for visual Beginner All-purpose Symbolic

Instruction Code.

Visual BASIC is an Object Orient programming language which has more advantages

than its procedural language counterpart. It is quite flexible and effective in database

manipulations, graphical interface handling and numerical handling.

4.2.2 System requirement: hardware and software requirements

The hardware requirements for the implementation of the system are as follows:

i. A Pentium iii computer or a higher version

ii. A hard disk size of at least 20 gigabytes

iii. A ram size of at least 128 megabytes

iv. CD ROM drive

v. Flash drive

vi. Uninterrupted power supply (UPS)

vii. Printer

viii. Printing paper

In order for the hardware to function, the need for software components cannot be

undermined. Hence the software requirements for the system implementation are as

follows:

i. Windows operating system (version 2000 or higher versions)

ii. Visual BASIC programming language compiler.


4.3 Program execution

Start button

Microsoft VB

Click existing

Click on look in

Click on desk top and navigate

Click exam malpractice 2

Click exam malpractice

Press f5 to play

4.3 SECURITY REQUIREMENTS

i. The database must be acceptable by unauthorized individuals


ii. All password and fingerprints template stored in the database must be hashed.
iii. Only the administrator or the end-user can view the most important aspect of this

application.

4.4 USER GUIDE

The required use components are:

i. User manual
ii. Online help
iii. Online tutorials
The user interface of the system is a web user interface. A proficient user of the internet

will find the user interface self-explanatory.

4.5 TRAINING

The development software application has been done using design principle of

software development. It is design a consistent manner and users if the system can

easily identify with the functionalities of the system.

4.6 REVIEW AND MAINTENANCE

Operational software will need to be constantly reviewed and in maintained in

order to ensure that the software still meet its initial objectives.

The system would also need to be reviewed and maintained periodically for the

following reason:

1. To ascertain that the system is able to cope with changing requirement of the system

as well as the user


2. To ensure that the requirements are met and to ensure that there is enough capacity

to modify the existing requirement


3. To deal with problem that many arise in operations.

Maintenance activities of a software system would be divided into:

i. Corrective Maintenance
ii. Adaptive Maintenance
iii. Perfective Maintenance
The corrective Maintenance for the project would require running the codes and

locating errors that may result well as correcting the errors. Adaptive maintenance would

ensure that the developed system can be easily adjusted and up graded into newer

environment as well as accommodate changes in software and hardware requirement. The

system developed would run on any windows operating hardware platform with the

software requirements stated above.

The preventive maintenance on this system includes proper documentation of all

stages involved as well as the component. The documentation includes the comments in

the program codes as the user guide. Other forms of maintenance are handling of the

system component which include the power supply, memory, hard drive and input

devices.

In addition, newer version of application software should prompt the upgrade of

the system. A backup of the database should be carried out by the database administrator.
CHAPTER FIVE

SUMMARY, CONCLUSION AND RECOMMENDATION

5.1 SUMMARY

Considering the magnitude and the continuous occurrence of Electronic cheating

in the Nigerian educational system, it is no doubt necessary to research into the area

before the Nigerian certificates become worthless papers.

Also in the era of anti-corruption in the Nigerian society, the educational system needs to

join this crusade and totally rid the system of this plague.

It was therefore the intention of this project work to look into forms of Electronic

cheatings, the causes and also evaluate the penalties for Electronic cheating, while

creating possible solutions to curb Electronic cheating in the Nigeria universities, using

University of Benin as a case study

5.2 CONCLUSION

The root cause of Electronic cheating is that there is poor preparation as a result of

decreasing level of quality teaching and learning in our universities. Proper preparation

prevents poor performance. There is gross inadequacy of qualified lecturers in our

universities. While all other remedies to curb Electronic cheating like punitive measures,

public enlightenment campaign and printing of question papers few hours to exams

should continue, we should try to emphasize qualitative teaching and learning in our
universities. There are cost implications to improving the quality of teaching and

learning.

All the stakeholders in education should be ready to contribute to the funding of our

universities. There should be proper monitoring and supervision to ensure that the end

justifies the means.

5.3 RECOMMENDATION

i. This project work is recommended to all heads of examination disciplinary panel

and to carry out this exercise fully, the following recommendations are also made,

which are:

ii. Many students who engage in Electronic cheating have been found to be

academically weak which are traceable to the faulty foundation in their

educational ladder. It is recommended that there should be improvement in the

delivery of instructions especially at the foundation i.e. primary level.

iii. Should facilities in terms of sitting arrangement and halls have been a major cause

of Electronic cheating. The universities should guide against indiscriminate

admission of students, so as not to overstretch the facilities available. There should

be good environment, like good ventilation, good examination chairs and adequate

spacing between students. A lot of temptations to cheat exist when they are close

to one another. The national universities commission (NUC) is wagging war

against overpopulation in the Nigerian universities. Universities should continue to

admit students based on facility available.


iv. Federal and state governments should continue to establish more universities to

give opportunities to more candidates seeking examination.

v. The integrity of the university lecture is important in curbing Electronic cheating.

Undue familiarity which can make some students to have advanced knowledge of

examination should be totally discouraged.

Finally, Electronic cheating is without any doubt, a part of our educational systems. The

federal government through the national orientation agency is working hard to change the

value system of the society by mounting many campaign against corruption, electric

cable and pipeline vandalization, University of Benin should mount more frequently

campaign on the ills and penalties of Electronic cheating until the evil is totally stamped

out of our educational system.


REFERENCES

Aaron, R.M: Student academic dishonesty; are collegiate institutions addressing the

issue? NAPSA Journal, 29:103-113 (1992)

Adamu, H. (1998), indiscipline in Nigeria institutions: causes, effects and solution. In

Ehiozuwa, A.O. (Ed). Etiology effect and control of malignancies in Nigerian education

(EEE of Mine) pp. 13-22. zaria: CPSE publishers.

Afigbo, A.E (1997). The demon with a thousand faces: Electronic cheatings in historical

perspective. In Onyechere I. (Ed), Promoting examination ethics; the challenge of

collective responsibility. Pp 13-22. Lagos: examination ethics project.

Bello et al (2003) manifestation of Electronic cheating in Nigeria

Ijaiya, N.Y.S (2004). Agents of Electronic cheating in Nigerian public

Examination: who is the strongest link? Paper presented at the 7 th national conference of

the national association of educational researchers and evaluators. (NAERE) held at

UNILAG 21st to 24th June 2004

Ikupa (1997): http//Ezine articles.com/? Expert-ajibola_olushola

Keller (1941): http//Ezine articles.com/? Expert-ajibola_olushola

Monday (1971): http//Ezine articles.com/? Expert-ajibola_olushola

Nana, E.M: (1997). Teachers behaviour amongst school pupils as a factor in Electronic

cheating in secondary school: A study of schools in Ugheli North Local Government Area
of Delta State. Unpublished bachelors of education desertion, Edo State University,

Ekpoma-Nigeria

Oladope (1997): manifestation of Electronic cheating in Nigeria

Olasehinde, F.A.O (1993). Cheating in examinations in the University of Ilorin: styles,

causes and remedies. Nigeria journal of educational foundations, 4(1), 16-22

Oluyeba and Daramola (1992) http//Ezine articles.com/? Expert-ajibola_olushola

Onyechere, I (2004). Cheating: A world wide problem. In cones mat east 33 ways all

Africa.com march 4, 2004

Onyecere, I. (1996). Examination ethic handbook. Lagos: examination ethics project.

Ozor, F (2004). Controversy trails examination fraud workshop. Daily Independence

Online. Monday, April 5, 2004

Rani, E.O (2004): Counselling students of the faculty of education at the University of

Maiduguri against malpractice online in Nigeria. May, 2004.

Sahman (1990) http//Ezine articles.com/? Expert-Ajibola Olushola

Soleye (1991) manifestation of Electronic cheating in Nigeria; article source:

http//Ezine articles.com/? Expert-ajibola_olushola

Sooze, S (2004). Way out of Electronic cheatings. Dailytimes. May 29, 2003

Usman (1994) http//Ezine articles.com/? Expert-Ajibola Olushola


WAEC (2003): Students tricks in examination. Lagos: WAEC.

Вам также может понравиться