Tuesday, May 14, 2019
Reauthorization Act of the Higher Education Act Research Paper
Reauthorization Act of the Higher Education Act - Research Paper lessonThe act clarifies in writing that colleges are obliged to use processes that guarantee the security of distance study savants and inform students or so any probable extra student fees related to student identity verification, if any, when the student is registering of enrolling. How will this impact the college in terms of instruction, resources, economics, testing, and privacy? The consequence of this authorization is that colleges that are presently fling distance learning programs in all states will pee-pee to acquire authorization in from from each one one of those states. Authorization agencies at the state level are recognized in all the fifty states and nine U.S. territories. In sixteen states, more than one governing agency exists, bringing the full number of agencies to seventy-six. Since each state and agency has its unique authority to set up unique requirements, standards, and procedures this p rocedure will be extremely lengthy and intricate.The application processes and fees in some states are ambiguous others are exposed to interpretation, slice many are presently under revision or review. It is not in all states that accreditation is necessary as part of its authorization process and a small number of agencies by now bespeak to be authorized in terms of physical presence. Furthermore, several factors determine where and how to request authorization. These include institutional delivery formats, the type of institution, and the kinds of educational activities that are to be undertaken within the borders of a state. In summary, colleges will have to meet the following requirements going by the act i. Create a unique username/ password dissolvent in case they have not already done that. (ITC Annual Survey for 2008 found that 96% of institutions report they already do this) ii. Expand past this standard depending on projected accreditation expectations and enhanced solu tions. iii. pore more attention to academic integrity issues. (ACE Analysis, 2008) What technological tools exist to assist with coming upon the requirements of this provision? Both high-tech and low-tech technological instruments can be used to meet the requirements of this provision. Studies about biometric student authentication systems show that there are a range of familiar identification technologies quick that might be used (Mann & Ward, 2011). Colleges can use these systems anytime a student logs into the learning administration system, during cooccurring lecture sessions and in proctoring circumstances. Some of the high-tech technologies include iris scanning, fingerprint scanning, keyboard typing cadence, handwriting cognition and speech recognition. In terms of non-biometric authentication, some of the technologies that can be used include remote, onsite proctors who supervise the students posing for the exam at the location of the students Microphones and web camer as that visually record the surrounding of the student during the examination, including background encumbrance and movements out-of-wallet data withdrawal of private information that necessitates that the students answer personal questions prior to taking the exam or in the course of the exam verification of IP address verification this requires students to take their exam on a definite computer lockdown browsers that forbid students browsing the internet or using instant pass along applications during the course of the exam (inside a learning administ
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.