9+ Discreet Ways: How to Cheat on a Proctored Test? (Risks)


9+ Discreet Ways: How to Cheat on a Proctored Test? (Risks)

The act of gaining an unfair benefit throughout a supervised examination, circumventing the supposed evaluation course of, is a severe breach of educational or skilled integrity. This includes using misleading strategies to entry unauthorized data or help with the intention to obtain the next rating than would in any other case be potential by means of legit means. For instance, a candidate may try and entry notes hid on their particular person throughout a closed-book examination, or talk with an confederate remotely throughout a digitally monitored take a look at.

The significance of educational integrity can’t be overstated. A good and equitable evaluation course of is important for making certain that people are evaluated precisely based mostly on their information and expertise. Traditionally, measures to stop this habits have developed alongside technological developments, from easy invigilation to classy distant proctoring methods. Sustaining the validity of evaluations is essential for the credibility of instructional establishments {and professional} certifications, safeguarding the worth of {qualifications} earned by means of trustworthy effort.

This examination will delve into the strategies, motivations, and ramifications related to undermining the integrity of a proctored testing atmosphere. It explores the measures employed to detect and forestall such actions and highlights the moral issues inherent in sustaining a good and correct evaluation course of.

1. Know-how Exploitation

Know-how exploitation, within the context of compromised proctored assessments, represents a big problem to educational {and professional} integrity. The utilization of gadgets and software program functions, usually hid or disguised, permits candidates to entry unauthorized data or talk with exterior events throughout examinations. This exploitation straight undermines the basic ideas of truthful analysis, because it grants an unfair benefit not afforded to all test-takers. The cause-and-effect relationship is obvious: technological instruments, when misused, result in inaccurate illustration of a candidate’s precise information and expertise. For instance, a pupil may use a smartwatch to view pre-stored solutions or make use of subtle software program to remotely entry textbook content material, thereby circumventing the examination’s supposed goal.

The significance of understanding expertise exploitation lies in growing efficient countermeasures. Instructional establishments and testing organizations should proactively adapt safety protocols to handle rising technological threats. Sensible functions embody the implementation of superior monitoring software program that detects unauthorized machine exercise, coupled with stringent bodily examination procedures. Furthermore, fostering a tradition of educational honesty by means of schooling and clear moral tips is essential in deterring people from searching for to take advantage of expertise for dishonest functions. A deeper understanding of how expertise is utilized, and the fixed altering nature of its capabilities to cheat, turns into the cornerstone of easy methods to successfully defend towards new and rising threats.

In abstract, expertise exploitation is a vital part of undermining the validity of proctored checks. Recognizing the precise strategies employed and proactively addressing the vulnerabilities they expose is important for sustaining a good and equitable evaluation atmosphere. The continuing battle to protect take a look at integrity requires steady adaptation and a dedication to moral ideas, making certain that evaluations precisely mirror the capabilities of every candidate.

2. Id Masking

Id masking, within the context of proctored assessments, represents a severe type of educational dishonesty, because it includes concealing or misrepresenting one’s true id to bypass safety measures and acquire an unfair benefit. This misleading observe straight undermines the validity of the evaluation course of and compromises the integrity of the outcomes.

  • Impersonation

    Impersonation includes having one other particular person take the take a look at instead of the registered candidate. This might contain the presentation of falsified identification paperwork or exploiting vulnerabilities within the proctoring system’s authentication course of. For example, a extra educated particular person may pose because the registered pupil, finishing the examination on their behalf and making certain the next rating. The implications are vital, as this results in a misrepresentation of the candidate’s precise talents and a distortion of the analysis course of.

  • Account Sharing/Compromise

    Sharing login credentials or gaining unauthorized entry to a different candidate’s account constitutes a type of id masking. By utilizing one other particular person’s account, a person can take the take a look at below a false id, doubtlessly getting access to prior information or assets particular to that account. For instance, a pupil may get hold of the login particulars of a classmate who has already taken the examination, enabling them to anticipate questions and put together solutions upfront. This breach of safety protocols can result in widespread dishonest and an erosion of belief within the evaluation’s validity.

  • Circumventing Biometric Authentication

    Fashionable proctoring methods usually make use of biometric authentication strategies, corresponding to facial recognition or fingerprint scanning, to confirm the id of the test-taker. Makes an attempt to bypass these measures, by means of the usage of manipulated photos, prosthetics, or different misleading strategies, represent a severe type of id masking. For instance, a candidate may try to make use of a deepfake video to idiot the facial recognition software program, permitting another person to take the take a look at of their stead. This circumvention of safety protocols poses a big problem to sustaining the integrity of distant proctoring methods.

  • VPN and Proxy Utilization

    Whereas circuitously masking id, the usage of VPNs and proxy servers can obscure the test-taker’s location and doubtlessly circumvent geo-restriction measures applied by the proctoring system. This will enable people to entry prohibited supplies or assets from totally different areas, and even create the phantasm that the take a look at is being taken from a licensed location. This oblique masking of id and site facilitates the broader effort of dishonest and undermining the equity of the evaluation.

These aspects of id masking spotlight the assorted methods by which people try and deceive proctoring methods and acquire an unfair benefit. The usage of impersonation, compromised accounts, biometric circumvention, and site masking every contributes to the erosion of belief within the evaluation course of. Understanding these strategies is essential for growing strong safety measures and making certain the integrity of proctored examinations.

3. Communication Channels

Communication channels characterize a vital part in facilitating dishonest habits throughout proctored checks. These channels, each overt and covert, allow test-takers to obtain unauthorized help, share solutions, or coordinate methods, straight undermining the validity and integrity of the evaluation. The impact is {that a} take a look at designed to measure particular person competence turns into a collaborative train in deception, rendering the outcomes meaningless. The importance of communication channels on this context lies of their skill to bypass proctoring controls, whatever the sophistication of these controls. For instance, a test-taker could use a hidden earpiece related to a distant confederate who supplies solutions, or make use of a pre-arranged code to sign particular responses to different individuals.

The sensible functions of understanding these communication channels are manifold. From a safety perspective, it requires implementing strong monitoring methods able to detecting uncommon community site visitors or suspicious audio indicators. Instructional establishments and testing organizations should put money into superior applied sciences that may successfully block or disrupt these channels. Moreover, a heightened consciousness amongst proctors concerning the potential for covert communication is essential. This entails coaching proctors to acknowledge behavioral cues, corresponding to extreme fidgeting, delicate gestures, or extended eye contact with different test-takers, which can point out that communication is going on. The rise of encrypted messaging apps presents a problem. This implies it’s changing into much more sophisticated for instructors to find out easy methods to detect a pupil.

In conclusion, communication channels are indispensable for orchestrating dishonest actions throughout proctored checks. Recognizing the various strategies and applied sciences employed for unauthorized communication is important for growing efficient countermeasures. The continuing problem lies in adapting safety protocols to maintain tempo with evolving communication applied sciences and fostering a tradition of educational integrity that daunts college students from resorting to dishonest habits. A complete strategy, combining technological options with human vigilance, is critical to safeguard the equity and accuracy of proctored assessments.

4. Collusion Networks

Collusion networks characterize a big risk to the integrity of proctored assessments. These networks, fashioned by people coordinating to realize an unfair benefit, function by sharing data, offering help, and circumventing safety measures. Their existence straight undermines the validity of the analysis course of, because the outcomes now not precisely mirror particular person information or talents.

  • Pre-Check Data Sharing

    This includes the dissemination of examination questions or solutions previous to the scheduled evaluation. Such data is likely to be obtained by means of compromised sources or people with entry to confidential supplies. The influence is substantial, as individuals are capable of put together particularly for the take a look at content material, resulting in inflated scores and a distorted analysis of their precise capabilities. This type of collusion can lengthen past a single test-taking occasion, doubtlessly compromising future assessments as nicely.

  • Actual-Time Help In the course of the Examination

    This aspect includes people speaking with one another throughout the examination to share solutions, methods, or related data. This may be facilitated by means of numerous means, together with hidden communication gadgets, pre-arranged indicators, or distant help from people exterior the testing atmosphere. The result’s a coordinated effort to bypass the proctoring system and obtain larger scores, no matter particular person information. The size of such networks can differ, from small teams of individuals to large-scale organizations devoted to offering dishonest providers.

  • Publish-Check Evaluation and Suggestions

    After finishing the evaluation, community individuals could share details about the questions requested, the problem degree, or potential areas of focus for future test-takers. This collaborative evaluation can be utilized to create research guides, put together future individuals, and additional refine the community’s dishonest methods. The long-term impact is a gradual erosion of the evaluation’s validity, because the examination turns into predictable and simply manipulated by these throughout the collusion community.

  • Useful resource Pooling and Distribution

    Collusion networks usually pool assets, corresponding to research supplies, reply keys, and even monetary assist to facilitate dishonest actions. These assets are then distributed amongst community members, offering a collective benefit over those that will not be a part of the group. This unequal entry to assets additional exacerbates the unfairness of the evaluation course of and reinforces the community’s skill to control the outcomes.

The coordinated nature of collusion networks amplifies the potential for educational dishonesty and considerably undermines the integrity of proctored assessments. Addressing this problem requires a multi-faceted strategy, together with enhanced safety measures, improved monitoring strategies, and a powerful emphasis on educational ethics. Combating collusion networks is important for preserving the equity and accuracy of analysis processes, making certain that people are assessed based mostly on their very own deserves and capabilities.

5. Surveillance Evasion

Surveillance evasion is intrinsically linked to the act of compromising a proctored take a look at. The elemental goal of proctoring, whether or not in-person or distant, is to watch test-takers and forestall unauthorized actions. Due to this fact, any methodology employed to realize an unfair benefit necessitates circumventing this oversight. Surveillance evasion is just not merely a supplementary tactic; it’s a foundational requirement for profitable take a look at compromise. For instance, a candidate utilizing a hidden communication machine should concurrently discover methods to stop the proctor from detecting the machine or observing suspicious habits. The effectiveness of any dishonest technique is straight proportional to the test-taker’s skill to evade detection.

Understanding surveillance evasion strategies is important for growing extra strong proctoring methods. These strategies vary from easy bodily maneuvers, corresponding to positioning oneself out of digital camera view, to classy technological approaches, corresponding to utilizing digital machines to masks exercise on a pc. Actual-world examples embody college students strategically inserting mirrors to mirror take a look at content material to accomplices, or using software program that disables or deceives proctoring software program. Analyzing these strategies reveals vulnerabilities in current surveillance methods and informs the design of more practical countermeasures. Sensible functions embody bettering digital camera angles, enhancing audio evaluation capabilities, and implementing extra subtle software program detection algorithms. Surveillance Evasion is a ability that cheaters are evolving daily so you will need to research their technique to stop college students from dishonest.

In abstract, surveillance evasion is a vital part of compromised proctored testing environments. Recognizing the various strategies employed to bypass oversight is important for growing and implementing efficient prevention methods. The problem lies in staying forward of evolving evasion strategies, requiring fixed adaptation and innovation in proctoring expertise and protocols. By understanding how people try and evade surveillance, establishments can higher safeguard the integrity of assessments and guarantee truthful analysis of all candidates.

6. Hidden Assets

The profitable subversion of a proctored examination is commonly predicated on entry to hidden assets. These assets, inaccessible by means of legit means, present a definite benefit to test-takers searching for to compromise the integrity of the evaluation. The presence of those assets undermines the basic precept of truthful analysis, because it introduces an unequal taking part in subject the place some candidates have entry to unauthorized help whereas others don’t. The act of dishonest, subsequently, depends closely on the strategic concealment and utilization of those assets. For instance, a pupil may pre-program a calculator with related formulation or entry a cloud-based doc containing solutions to potential examination questions. The cause-and-effect relationship is obvious: the supply of hidden assets straight results in the potential for compromised take a look at outcomes.

The sensible significance of understanding the position of hidden assets lies in growing efficient prevention methods. Proctors should be skilled to establish and detect these assets, no matter their sophistication or concealment. Technological options, corresponding to safe browser environments and keystroke monitoring software program, may help forestall entry to unauthorized on-line content material. Moreover, bodily inspections of the testing atmosphere, together with examination of calculators and different permitted supplies, may help to uncover hid data. The significance of addressing hidden assets is underscored by the truth that they’re usually probably the most direct and efficient technique of gaining an unfair benefit throughout a proctored examination.

In conclusion, hidden assets represent a vital component within the panorama of compromised proctored testing. Recognizing the various kinds these assets can take and implementing proactive measures to stop their use are important for sustaining the integrity of assessments. The continuing problem lies in adapting safety protocols to maintain tempo with evolving strategies of concealment and making certain that every one candidates are evaluated pretty and equitably, free from the affect of unauthorized help. The moral strategy that instructors could have that their college students wouldnt cheat is just not sufficient, new strategies of stopping it ought to are available in place with the intention to keep away from college students to cheat.

7. Pre-Check Compromise

Pre-test compromise, referring to the unauthorized acquisition and dissemination of examination supplies previous to the scheduled evaluation, represents a very egregious type of educational dishonesty and a direct methodology of compromising a proctored take a look at. The inherent hyperlink stems from the truth that possession of examination content material beforehand renders the proctoring course of largely ineffective. If a test-taker already possesses the questions and solutions, the surveillance and safety measures in place throughout the examination change into virtually irrelevant. This creates a scenario the place the end result is predetermined, negating the aim of the evaluation as a good and correct analysis of information. For example, a pupil getting access to a college member’s pc and downloading a take a look at financial institution would exemplify pre-test compromise, offering them with a considerable and unfair benefit. This exercise straight facilitates the flexibility to cheat on a proctored take a look at with close to impunity.

The significance of understanding pre-test compromise lies in its influence on the credibility of instructional establishments {and professional} certifications. Stopping one of these breach requires a multi-faceted strategy, encompassing strong safety protocols for examination creation and storage, stringent entry controls to stop unauthorized personnel from viewing take a look at supplies, and mechanisms for detecting and monitoring potential leaks. Sensible measures embody encrypting examination recordsdata, implementing two-factor authentication for entry to safe databases, and repeatedly auditing safety protocols. Moreover, using query randomization and creating a number of variations of the identical examination can mitigate the influence of a possible pre-test compromise. Stringent background checks for take a look at proctors can deter take a look at compromise as nicely. The worth of every safety measures is necessary, and ought to be applied with highest-quality for safety causes.

In abstract, pre-test compromise constitutes a vital vulnerability within the proctored testing atmosphere. Its potential to undermine the integrity of assessments is substantial, rendering conventional proctoring strategies ineffective. Addressing this risk necessitates a complete safety framework, proactive prevention measures, and steady vigilance to establish and mitigate potential breaches. By specializing in stopping pre-test compromise, establishments can considerably improve the reliability and validity of their assessments and preserve the integrity of the analysis course of.

8. Proctor Circumvention

Proctor circumvention is a direct enabler of actions to cheat on a proctored take a look at. By efficiently evading the oversight and monitoring of a proctor, people can interact in actions that might in any other case be detected and prevented. This circumvention can take many kinds, starting from delicate maneuvers to classy technological exploits, every designed to reduce the chance of detection whereas maximizing the chance for gaining an unfair benefit.

  • Exploiting Proctor Inattentiveness

    Proctors, notably in large-scale testing environments, could expertise lapses in consideration or have restricted visibility over all test-takers concurrently. This inattentiveness could be exploited by candidates partaking in fast glances at unauthorized supplies, discreet communication with others, or delicate manipulation of gadgets. For instance, a test-taker may briefly seek the advice of a pre-written word hid on their particular person when the proctor’s consideration is directed elsewhere. The success of this tactic depends on timing and an evaluation of the proctor’s vigilance, straight enabling the act of dishonest.

  • Using Blind Spots in Digicam Protection

    Distant proctoring methods depend on digital camera feeds to watch test-takers. Nevertheless, limitations in digital camera angles, lighting circumstances, or bodily obstructions can create blind spots that aren’t seen to the proctor. Candidates could strategically place themselves or manipulate their atmosphere to take advantage of these blind spots, permitting them to interact in unauthorized actions with out being detected. For example, a test-taker may place a textbook simply exterior the digital camera’s subject of view, glancing at it periodically for solutions. The power to establish and make the most of these blind spots is a key component in efficiently dishonest on a proctored take a look at.

  • Misleading Physique Language and Actions

    Expert cheaters could make use of misleading physique language and actions to distract the proctor or create a misunderstanding of honesty. This will contain feigning confusion, asking irrelevant questions, or partaking in different behaviors designed to divert the proctor’s consideration from their true actions. For instance, a test-taker may deliberately drop a pen or make a loud noise to create a momentary distraction, utilizing that chance to shortly entry unauthorized data. The effectiveness of this strategy lies in its skill to control the proctor’s notion and create alternatives for dishonest.

  • Disabling or Manipulating Proctoring Software program

    Technologically savvy people could try and disable or manipulate proctoring software program to bypass its monitoring capabilities. This will contain utilizing digital machines, tampering with system settings, or using specialised software program designed to bypass safety protocols. For instance, a test-taker may use a program to briefly disable the webcam or microphone, stopping the proctor from monitoring their actions. Efficiently disabling or manipulating the proctoring software program considerably reduces the chance of detection and permits for a wider vary of dishonest methods to be employed.

These examples of proctor circumvention spotlight the assorted methods by which people try and evade oversight and have interaction in dishonest actions throughout proctored checks. Whether or not by means of exploiting inattentiveness, using blind spots, using misleading techniques, or manipulating expertise, the flexibility to bypass the proctor is a vital enabler of dishonest. Addressing this problem requires a complete strategy that mixes enhanced proctor coaching, improved monitoring applied sciences, and a powerful emphasis on educational integrity to discourage such habits.

9. Behavioral Deception

Behavioral deception, within the context of compromising a proctored take a look at, represents a classy methodology of concealing dishonest actions by manipulating observable actions and demeanor. The connection is direct: profitable dishonest usually hinges not solely on accessing unauthorized data but in addition on evading suspicion by means of strategic behavioral manipulation. The trigger and impact are intertwined; misleading behaviors are employed to mitigate the chance of detection, thereby facilitating the act of dishonest. For instance, a test-taker may feign intense focus whereas subtly glancing at hidden notes, or simulate confusion to elicit help from the proctor, utilizing the chance to glean solutions not directly. With out this part, makes an attempt to cheat are rendered extra seen and, consequently, extra prone to be thwarted.

The significance of behavioral deception lies in its skill to take advantage of the human component of proctoring. Whereas technological safeguards give attention to stopping entry to unauthorized assets, misleading behaviors goal the proctor’s notion and judgment. Sensible functions of this understanding embody coaching proctors to acknowledge micro-expressions, inconsistencies in habits, and different delicate cues that will point out deception. This additionally includes implementing protocols that decrease alternatives for test-takers to interact in misleading techniques, corresponding to limiting interactions with proctors and making certain clear visibility of all test-takers’ actions. Actual-world examples additionally consists of utilizing eye-tracking software program to establish suspicious gaze patterns indicative of test-takers unauthorized sources for dishonest.

In conclusion, behavioral deception constitutes an important component within the arsenal of these searching for to cheat on proctored checks. By understanding the nuances of misleading habits and implementing measures to detect and mitigate its results, establishments can considerably improve the integrity of their assessments. The problem lies in staying forward of evolving misleading techniques and fostering a tradition of educational honesty that daunts such habits. That is an important line of protection.

Often Requested Questions Concerning Educational Dishonesty in Proctored Testing Environments

This part addresses widespread inquiries and misconceptions surrounding the subversion of proctored examinations. The data supplied is meant for informational functions solely and doesn’t condone or encourage unethical habits. It’s important to uphold educational integrity and cling to institutional tips.

Query 1: What are the first motivations for people to interact within the act of dishonest on a proctored take a look at?

Motivations are multifaceted and may embody stress to attain excessive grades, concern of failure, perceived unfairness of the evaluation, time constraints, or a basic lack of dedication to educational integrity. Exterior elements, corresponding to parental expectations or competitors for scholarships, also can contribute to this habits.

Query 2: How do distant proctoring methods try to stop or detect unauthorized actions?

Distant proctoring methods make use of numerous strategies, together with webcam monitoring, display recording, browser lockdown, keystroke evaluation, and AI-powered behavioral evaluation to detect suspicious actions. These methods intention to duplicate the in-person proctoring expertise by monitoring the test-taker’s atmosphere and actions in real-time.

Query 3: What are the potential penalties of being caught dishonest on a proctored take a look at?

Penalties can vary from a failing grade on the task to suspension or expulsion from the tutorial establishment. In skilled certification exams, dishonest may end up in revocation of credentials, harm to popularity, and authorized repercussions.

Query 4: Are there any authorized ramifications related to trying to realize an unfair benefit on a proctored evaluation?

In some instances, relying on the character of the evaluation and the actions taken, there could also be authorized ramifications. For instance, unauthorized entry to safe examination supplies or impersonation of one other particular person may represent legal offenses.

Query 5: How efficient are present proctoring applied sciences in stopping educational dishonesty?

The effectiveness of proctoring applied sciences varies relying on the sophistication of the expertise and the ingenuity of the people trying to bypass it. Whereas these applied sciences can deter many situations of dishonest, decided people could discover methods to bypass the safety measures in place. Due to this fact, expertise alone is just not ample to make sure educational integrity; a powerful moral tradition can also be important.

Query 6: What position does educational integrity play in stopping dishonest on proctored checks?

Educational integrity kinds the muse of a good and equitable instructional atmosphere. By selling moral conduct, fostering a way of duty, and establishing clear tips and penalties for educational dishonesty, establishments can domesticate a tradition the place dishonest is considered as unacceptable. Educating college students in regards to the significance of integrity and offering assets for educational assist can additional deter dishonest habits.

Sustaining the integrity of assessments is a shared duty involving college students, educators, and establishments. Upholding moral requirements is important for making certain that evaluations precisely mirror the information and expertise of every candidate.

The following part will summarize efficient methods to counter actions to compromise examination integrity.

Methods to Counter Check Compromise

The next outlines efficient methods for safeguarding the integrity of proctored examinations and mitigating the chance of educational dishonesty. These measures handle vulnerabilities throughout numerous levels of the evaluation course of.

Tip 1: Strengthen Examination Safety Protocols: Implement strong safety protocols for the creation, storage, and distribution of examination supplies. This consists of encryption of digital recordsdata, restricted entry to safe databases, and common auditing of safety measures. For example, make the most of multi-factor authentication for accessing delicate examination knowledge.

Tip 2: Improve Proctor Coaching: Present complete coaching to proctors on recognizing and responding to suspicious habits, figuring out unauthorized supplies, and using proctoring software program successfully. Prepare proctors on the delicate clues and verbal cues that may denote take a look at compromise.

Tip 3: Make the most of Superior Monitoring Applied sciences: Deploy superior monitoring applied sciences, corresponding to AI-powered behavioral evaluation, display recording, and keystroke evaluation, to detect and forestall unauthorized actions throughout the examination. Make use of eye-tracking software program to establish suspicious gaze patterns and deter unauthorized supplies.

Tip 4: Implement Query Randomization and Check Variations: Create a number of variations of the identical examination with randomized query order to reduce the effectiveness of collusion networks. Use query banks and automatic take a look at technology to make sure uniqueness throughout assessments.

Tip 5: Promote a Tradition of Educational Integrity: Foster a tradition of educational integrity by educating college students about moral conduct, emphasizing the significance of trustworthy work, and clearly speaking the implications of educational dishonesty. Set up honor codes and encourage college students to report suspicious exercise.

Tip 6: Conduct Common Safety Audits: Conduct common safety audits of the proctoring atmosphere, together with bodily and digital safety measures, to establish vulnerabilities and implement vital enhancements. This may occasionally contain penetration testing and vulnerability assessments of proctoring software program.

Tip 7: Decrease Pre-Check Publicity: Restrict entry to examination supplies to approved personnel solely and implement strict protocols for stopping pre-test compromise. Use safe file switch strategies and prohibit printing of examination copies.

These methods characterize a complete strategy to safeguarding the integrity of proctored checks. By implementing these measures, establishments can considerably cut back the chance of educational dishonesty and guarantee truthful analysis of all candidates.

The following section will ship a abstract of the exploration regarding educational dishonestly.

Conclusion

This exploration of strategies employed to bypass proctored take a look at environments underscores the persistent problem posed to educational {and professional} integrity. The evaluation reveals numerous strategies, starting from technological exploitation and id masking to classy collusion networks and behavioral deception. Every tactic highlights vulnerabilities inside current evaluation methods and emphasizes the willpower of some people to realize an unfair benefit. The underlying facilitation of “easy methods to cheat on a proctored take a look at” is thru vulnerabilities discovered inside its implementation.

The continued evolution of dishonest strategies necessitates a proactive and multifaceted strategy to safeguard evaluation validity. Sustained funding in strong safety protocols, superior monitoring applied sciences, and complete proctor coaching is important. Equally necessary is fostering a tradition of educational honesty, emphasizing the moral duties of each test-takers and establishments. Solely by means of collaborative and steady vigilance can the integrity of proctored assessments be preserved.