Publication Date
| In 2026 | 0 |
| Since 2025 | 0 |
| Since 2022 (last 5 years) | 1 |
| Since 2017 (last 10 years) | 5 |
| Since 2007 (last 20 years) | 6 |
Descriptor
| Identification | 7 |
| Keyboarding (Data Entry) | 7 |
| Accuracy | 3 |
| College Students | 2 |
| Computer Assisted Testing | 2 |
| Computer Science Education | 2 |
| Computer Security | 2 |
| Computer Software | 2 |
| Data Analysis | 2 |
| Data Collection | 2 |
| Foreign Countries | 2 |
| More ▼ | |
Source
| Journal of Learning Analytics | 2 |
| Campus Technology | 1 |
| Computers in the Schools | 1 |
| Journal of Educational Data… | 1 |
| Journal of Psycholinguistic… | 1 |
| ProQuest LLC | 1 |
Author
| Casey, Kevin | 1 |
| Davies, Randall S. | 1 |
| Edwards, John | 1 |
| Gale, Doug | 1 |
| Hart, Kaden | 1 |
| Jenkins, Jeffrey L. | 1 |
| Kennedy, Gregor | 1 |
| Marchand, Yannick | 1 |
| Mazerolle, Erin L. | 1 |
| Pfleger, Isaac | 1 |
| Ryan, Tracii | 1 |
| More ▼ | |
Publication Type
| Journal Articles | 6 |
| Reports - Research | 4 |
| Reports - Descriptive | 2 |
| Dissertations/Theses -… | 1 |
Education Level
| Higher Education | 4 |
| Postsecondary Education | 4 |
| High Schools | 1 |
| Secondary Education | 1 |
Audience
Location
| Australia | 1 |
| Ireland (Dublin) | 1 |
| Utah | 1 |
Laws, Policies, & Programs
Assessments and Surveys
| ACT Assessment | 1 |
What Works Clearinghouse Rating
Young, Jay Richards – ProQuest LLC, 2018
This study examined the potential use of keystroke dynamics to create keyprints (typing fingerprints) to authenticate individuals in online assessment situations. The implications of this study are best understood in terms of the keystroke behavioral biometric. While previous studies considered the degree to which keystroke typing patterns are…
Descriptors: Keyboarding (Data Entry), Identification, Measurement Techniques, Computer Assisted Testing
Trezise, Kelly; Ryan, Tracii; de Barba, Paula; Kennedy, Gregor – Journal of Learning Analytics, 2019
Rural teachers and educators are increasingly called upon to build partnerships with families who use languages other than English in the home (US DOE, 2016). This is equally true for rural schools, where the number of multilingual families is small, and the language and cultural backgrounds of students differs from those of school. This article…
Descriptors: College Students, Cheating, Identification, Learning Analytics
Young, Jay R.; Davies, Randall S.; Jenkins, Jeffrey L.; Pfleger, Isaac – Computers in the Schools, 2019
This study examined the potential use of keystroke dynamics to create keyprints (typing fingerprints) to authenticate individuals in online courses. Previous studies have determined that keystroke typing patterns are unique; in addition to replicating these findings, this study explored best practices for implementing keyprint signatures in…
Descriptors: Identification, Keyboarding (Data Entry), Users (Information), Online Courses
Edwards, John; Hart, Kaden; Shrestha, Raj – Journal of Educational Data Mining, 2023
Analysis of programming process data has become popular in computing education research and educational data mining in the last decade. This type of data is quantitative, often of high temporal resolution, and it can be collected non-intrusively while the student is in a natural setting. Many levels of granularity can be obtained, such as…
Descriptors: Data Analysis, Computer Science Education, Learning Analytics, Research Methodology
Mazerolle, Erin L.; Marchand, Yannick – Journal of Psycholinguistic Research, 2015
Research into typing patterns has broad applications in both psycholinguistics and biometrics (i.e., improving security of computer access via each user's unique typing patterns). We present a new software package, TypingSuite, which can be used for presenting visual and auditory stimuli, collecting typing data, and summarizing and analyzing the…
Descriptors: Computer Software, Keyboarding (Data Entry), Psycholinguistics, Visual Stimuli
Casey, Kevin – Journal of Learning Analytics, 2017
Learning analytics offers insights into student behaviour and the potential to detect poor performers before they fail exams. If the activity is primarily online (for example computer programming), a wealth of low-level data can be made available that allows unprecedented accuracy in predicting which students will pass or fail. In this paper, we…
Descriptors: Keyboarding (Data Entry), Educational Research, Data Collection, Data Analysis
Gale, Doug – Campus Technology, 2006
Authentication is based on something one knows (e.g., a password), something one has (e.g., a driver's license), or something one is (e.g., a fingerprint). The last of these refers to the use of biometrics for authentication. With the blink of an eye, the touch of a finger, or the uttering of a pass-phrase, colleges and schools can now get deadly…
Descriptors: Human Body, Identification, Technological Advancement, Genetics

Direct link
Peer reviewed
