<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Counteracting Exam Cheating by Leveraging Configuration and Recommendation Techniques</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Viet-Man Le</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Thi Ngoc Trang Tran</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Andrei Popescu</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Lisa Weißl</string-name>
          <email>lisa.weissl@student.tugraz.at</email>
        </contrib>
      </contrib-group>
      <abstract>
        <p>Exam cheating indicates behaviors of students to fraudulently achieve their desired grades through various forms, such as item harvesting, item pre-knowledge, item memorizing, collusion and answer copying, and answer checking from available sources. Such dishonesty behaviors become manifest in e-learning scenarios, where exams are often conducted via online assessment platforms without the physical supervision of proctors. In this paper, we propose an approach to counteract exam cheating based on configuration and recommendation techniques. Our approach allows examiners to configure questions and exams using feature models. We support the configuration of parameterized questions, which helps to generate a large number of exam instances. Besides, a content-based recommendation mechanism is integrated into the exam configuration process, which helps examiners to select questions that have not appeared in the latest exams. We also propose mock-ups to show how question and exam generation processes can be proceeded in a real exam generator system.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>INTRODUCTION</title>
      <p>
        Cheating refers to a tendency of students to fraudulently achieve their
desired grades rather than investing a sufficient amount of time and
effort in learning and improving their knowledge [
        <xref ref-type="bibr" rid="ref42">42</xref>
        ]. In exam
scenarios, cheating behaviors can be shown in different forms, such as
item harvesting, item pre-knowledge, item memorizing, collusion and
answer copying, and answer checking [
        <xref ref-type="bibr" rid="ref11 ref13 ref34 ref41">11, 13, 34, 41</xref>
        ]. Item
harvesting occurs when a concerted attempt is made to collect exam
questions. Students can do this by memorizing exam content, recording
it, or transcribing it. Item pre-knowledge occurs when students obtain
knowledge of the exam questions and/or answers (e.g., through the
Internet or other multi-media sources) prior to the exam. Item
memorizing occurs when a student answers the questions several times to
reach an estimated level ability close to his/her true ability. He/she
is assumed to use his/her time only to memorize a fixed number of
questions. Collusion or answer copying denotes a scenario where two
or more students work together to complete an exam. This type of
cheating is triggered when students sit close to each other and try
to copy answers from each other during the exam. The final exam
cheating type is answer checking, in which students try to check the
answers to the questions from available resources.
      </p>
      <p>
        In e-learning scenarios where learning and testing activities are
done primarily via web-based platforms [
        <xref ref-type="bibr" rid="ref10 ref5">5, 10</xref>
        ], the mentioned exam
cheating behaviors have become even more intensively, which is,
therefore, more challenging to be detected and counteracted
compared to traditional learning formats [
        <xref ref-type="bibr" rid="ref37">37</xref>
        ]. In this context, looking for
effective approaches to avoid exam cheating behaviors has become
one of the most critical challenges of education institutions. This
action is crucial to assure the integrity of student work and to increase
trust in online education systems [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ].
      </p>
      <p>
        While extensive research has been conducted to detect cheating
reasons as well as factors affecting students’ exam cheating
behaviors [
        <xref ref-type="bibr" rid="ref11 ref15 ref16 ref30 ref9">9, 11, 15, 16, 30</xref>
        ], there exist only a few studies that
propose solutions for counteracting or avoiding such dishonesty
behaviors. Most of these studies target at preventing exam cheating in
online exams (i.e., exams conducted via Internet-based platforms) [
        <xref ref-type="bibr" rid="ref37">37</xref>
        ].
Alessio et al. [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ] and Dendir and Maxwell [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ] proposed approaches
to prevent exam cheating using a proctoring software that activates
the camera on a computer and then records the exam of students. This
software allows examiners to observe the behaviors of students and
thereby detect their cheating behaviors. It also helps to prevent
students from talking to each other or looking up relevant information
in books or other sources. Although this approach helps to mitigate
academic dishonesty behaviors in online exams, it could raise privacy
issues. Another problem is related to the efficiency of the approach,
especially in the context of big courses where exams are conducted
with hundreds of students at the same time. Detecting exam cheating
of a large number of students by just analyzing students’ recorded
videos might be a sub-optimal solution since it would consume too
much effort of examiners or proctors.
      </p>
      <p>
        A more efficient approach is to randomize exam questions and
answers, which has been widely applied in Learning Management
Systems such as WebCT and Blackboard2. This approach allows
examiners to prepare randomized questions in such a way that no two
exams are alike [
        <xref ref-type="bibr" rid="ref31">31</xref>
        ]. Besides, in order to increase the probability of
generating different exam instances, this approach requires a large
question bank that consists of a large number of questions and
answers [
        <xref ref-type="bibr" rid="ref29">29</xref>
        ]. Additionally, paraphrasing techniques might be needed
to reformulate questions that have been selected from the question
bank. Golden and Kohlbeck [
        <xref ref-type="bibr" rid="ref22">22</xref>
        ] show that paraphrasing questions
selected from a question bank is, on the one hand, essential for
reducing the benefits of students from cheating in online exams. On
the other hand, this helps to increase the performance of students in
completing the exam.
      </p>
      <p>
        Inspired by the ideas discussed by Mccabe [
        <xref ref-type="bibr" rid="ref29">29</xref>
        ] and Golden and
Kohlbeck [
        <xref ref-type="bibr" rid="ref22">22</xref>
        ], we propose in this paper an approach to
counteract exam cheating behaviors by generating a large question bank, in
which questions and corresponding answers are generated
automatically. Our approach supports the generation of different instances
      </p>
      <sec id="sec-1-1">
        <title>2 https://www.blackboard.com</title>
        <p>of a question topic. For instance, we could create two instances for
a question topic regarding “minimal conflict sets” using equivalent
terms. The two instances could be (1) “What is a minimal conflict
set?” and (2) “What is a minimal unsatisfiable subset?”.</p>
        <p>
          In order to support this, our approach enables question
configuration mechanisms using feature models - one of the core technologies
of configuration systems [
          <xref ref-type="bibr" rid="ref24">24</xref>
          ]. In the context of exams and questions
modeling, where examiners are not always good at technology,
feature models might be an appropriate choice. The reason is that the
representation of feature models is straightforward and does not
require any special expertise of the examiner to create them [
          <xref ref-type="bibr" rid="ref6">6</xref>
          ].
Furthermore, a feature model utilizes a tree-based representation that
provides a good overview of knowledge structure as well as
facilitates feature model management [
          <xref ref-type="bibr" rid="ref20 ref27 ref6">6, 20, 27</xref>
          ]. These are the
advantages of feature models, which motivate us to leverage them in our
approach to exam and question configuration.
        </p>
        <p>Besides, we also encourage the configuration of parameterized
questions, in which each question is configured using relationships
or constraints defined in the corresponding feature model. With
specific question settings, all instances are generated. Each instance
represents a complete question with a question statement, correct
answers, and incorrect answers (see also Figure 3). This way, our
approach helps to significantly increase the solution space of questions
and, therefore, increase the question bank’s size. After the question
generation phase, an exam configuration process is activated, which
allows an examiner to configure a set of exams by selecting
questions that have been generated. The question selection can be made
based on constraints specified by an examiner, such as total
number of exam instances, number of questions in each exam instance,
duration, the similarity with previous exams, and the share of
different question types in each exam instance. Furthermore, question
and exam configuration processes are further supported by a
recommendation mechanism that helps to generate exams that are different
from previous exams as much as possible.</p>
        <p>The contributions of our work are therefore two-fold:
1. We propose an exam creation approach supporting question and
answer parameterization, which significantly increases the
solution space and automatically generates many exam instances. This
way, each student will receive a different exam, which therefore
helps effectively counteract cheating behaviors, especially in
exams for big courses.
2. We develop mock-ups of a real exam creator system to support the
mentioned approach.</p>
        <p>The remainder of the paper is organized as follows. In Section 2,
we provide basic knowledge regarding feature models, feature model
configuration, and recommendation techniques. Section 3 and
Section 4 are the main parts of our work, in which we present how
configuration and recommendation techniques are exploited in our
approach to generate exams. Finally, we conclude the paper and
discuss open issues for future work in Section 5.
2
2.1</p>
      </sec>
    </sec>
    <sec id="sec-2">
      <title>PRELIMINARIES</title>
    </sec>
    <sec id="sec-3">
      <title>Feature Models</title>
      <p>
        Feature models are used to specify the variability and commonality
of complex items, such as software artifacts, configurable products,
and highly-variant services [
        <xref ref-type="bibr" rid="ref26 ref3 ref6">3, 6, 26</xref>
        ]. Applications based on feature
models help users to decide which features should be included in a
specific configuration.
      </p>
      <p>
        A feature model is a hierarchical representation of a set of features
and their interrelationships [
        <xref ref-type="bibr" rid="ref26 ref6">6, 26</xref>
        ]. In such a representation, features
are represented by nodes, and relationships between features are
represented by links. The root of the feature model is a so-called root
feature (fr), which is involved in every configuration (fr = true).
      </p>
      <p>A feature model can be exploited in exam scenarios to
represent a set of questions for an exam that share common features. For
instance, given a set of two multiple-choice questions Q1 and Q2
shown in Table 1, a corresponding feature model representing these
questions is depicted in Figure 1.</p>
      <p>
        Feature models can be distinguished with regard to the used
knowledge representation [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ]. In this section, we present three
wellknown feature models (basic feature models [
        <xref ref-type="bibr" rid="ref26">26</xref>
        ], cardinality-based
feature models [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ], and extended feature models [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ]), where their
notations are used in our approach.
      </p>
      <p>
        Basic Feature Models. A basic feature model [
        <xref ref-type="bibr" rid="ref26 ref27">26, 27</xref>
        ] consists of
two parts: structural part and constraint part. The former establishes
a hierarchical relationship between features. The latter combines
additional constraints that represent so-called cross-tree constraints.
      </p>
      <p>Structurally, the relationship between a feature and its sub-features
can be typically classified as follows: mandatory, optional,
alternative, and or. A mandatory relationship indicates that a child feature
will be included in a configuration if and only if its parent feature is
included in the configuration (e.g., see the relationship between f1
and f3). An optional relationship denotes the fact that the inclusion
of a child feature is optional if the parent feature is included (e.g., see
the relationship between f1 and f4). An alternative relationship
describes the fact that exactly one child feature has to be included if the
parent feature has been included (e.g., see the relationships between
f8 and its child features f10 and f11). Finally, an or relationship
indicates that at least one of the child features should be included if the
parent feature has been included (e.g., see the relationships between
f9 and its child features f12::f15).</p>
      <p>
        In the constraint part, cross-tree constraints are integrated
graphically into the model to set cross-hierarchical restrictions for features.
There are two constraint types, requires and excludes, that can be
used for the specification of feature models [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ]. A requires constraint
shows that if one feature is included in the configuration, then another
feature must be included as well (e.g., f5 requires f10). An excludes
constraint denotes that two certain features must not be included in
the same configuration (e.g., f6 excludes f12).
      </p>
      <p>
        Cardinality-based Feature Models. Cardinality-based feature
models [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ] extend the basic ones to allow cardinalities with an
upper bound &gt; 1 of feature relationships. These feature models
support two new relationships: feature cardinality and group
cardinality. Feature cardinality is a sequence of intervals denoted [n::m] (n
lower bound, m - upper bound), determining the number of instances
of the feature that can be part of a product. Group cardinality is an
interval denoted hn::mi (n - lower bound, m - upper bound),
limiting the number of child features that can be part of a product when its
parent feature is selected. For instance, the group cardinality h2::3i
between feature f9 and its child features f12::f15 indicates that a
configuration for Question 1 has minimum two and maximum three
incorrect answers.
      </p>
      <p>
        Extended Feature Models. Extended feature models [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ] support
the description of features with attributes. For instance, in an exam
feature model, each question is described by two attributes: question
complexity and question type. These feature models can also include
complex constraints among attributes and features. One example
constraint can be: “If the question complexity of Question 1 is
‘important to know’, then this question should be included in the exam”.
2.2
      </p>
    </sec>
    <sec id="sec-4">
      <title>Feature Model Configuration</title>
      <p>
        For the discussions in the later sections, we introduce the definitions
of a feature model configuration task and a feature model
configuration (solution) [
        <xref ref-type="bibr" rid="ref17 ref24">17, 24</xref>
        ]. A feature model configuration task can be
defined as a constraint satisfaction problem (CSP) [
        <xref ref-type="bibr" rid="ref40">40</xref>
        ].
      </p>
      <p>Definition 1 (Feature model configuration task) A
feature configuration task is defined by a triple (F; D; C),
where F = ff1; f2; :::; fng is a set of features, D =
fdom(f1); dom(f2); :::; dom(fn)g is a set of feature domains,
and C = CF [ CR is a set of constraints restricting possible
configurations, CF = fc1; c2; :::; ckg represents a set of feature
model constraints, and CR = fck+1; ck+2; :::; cmg represents a set
of user requirements.</p>
      <sec id="sec-4-1">
        <title>Definition 2 (Feature model configuration) A feature model</title>
        <p>configuration S for a given feature model configuration task
(F; D; C) is an assignment of the features fi 2 F; 8i 2 [1::n]. S
is valid if it is complete (i.e., each feature in F has a value) and
consistent (i.e., S fulfills the constraints in C).
2.3</p>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>Recommendation</title>
      <p>
        Recommendation techniques have been employed in various
domains such as movies, music, books, tourism destinations, financial
services, and healthcare to recommend products/services that meet
users’ needs and preferences [
        <xref ref-type="bibr" rid="ref18 ref28 ref38 ref39 ref43 ref8">8, 18, 28, 38, 39, 43</xref>
        ]. More recently,
recommendation techniques have also been applied in the e-learning
domain to support learners in choosing courses, resources, or
learning materials [
        <xref ref-type="bibr" rid="ref43">43</xref>
        ]. Besides, these techniques can also be exploited to
support teachers/lecturers/instructors for generating exams [
        <xref ref-type="bibr" rid="ref23">23</xref>
        ].
      </p>
      <p>
        There exist three well-known recommendation approaches that
have been extensively studied in the recommender systems research:
collaborative filtering, content-based, and knowledge-based [
        <xref ref-type="bibr" rid="ref36">36</xref>
        ].
Each of these approaches has its own characteristics and suitable
application scenarios. Content-based recommendation builds a user’s
profile based on his/her past preferences and recommends items that
are similar to his/her profile. This approach is suitable for
recommending items with abundant content information such as
documents or webpages [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. Collaborative filtering suggests a specific
item to a user based on the preferences of similar users. This
approach is widely used and well-known through the Netflix
competition [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ]. Knowledge-based approaches are usually applied to
generate recommendations in domains where the quantity of available
item ratings is quite limited (such as cars, apartments, and financial
services) or when the user wants to explicitly define his/her
requirements for items (e.g., “the apartment should be close to working
area”). These approaches generate recommendations based on the
knowledge about the items, explicit user preferences, and a set of
constraints describing the dependencies between users’ preferences
and items’ properties [
        <xref ref-type="bibr" rid="ref18">18</xref>
        ].
      </p>
      <p>In this study, we select content-based recommendation to be
integrated into our approach since the items in our recommendation
scenario are exams and questions that are mostly represented in text
forms. Our recommendation approach helps to filter exams with a
low number of questions that have been used in previous exams (see
further details in Section 4).
3
3.1</p>
    </sec>
    <sec id="sec-6">
      <title>QUESTION AND EXAM CONFIGURATION</title>
    </sec>
    <sec id="sec-7">
      <title>Configuring Questions using Feature Models</title>
      <p>In this section, we present our approach to model a set of
questions using feature models. Although our approach is illustrated
by multiple-choice questions, it is also applicable to other question
types, such as matching, drag-drop, reordering, and freetext (i.e.,
questions whose answers can be entered by students using free texts).</p>
      <p>Example question configuration scenario. Assume an examiner
wants to create a feature model that represents two multiple-choice
questions Q1 and Q2 as shown in Table 1. For the purpose of
generating further instances that are different from Q1 and Q2, the examiner
sets the minimum and the maximum number of correct/incorrect
answers. The number of correct answers to each question is exactly 1
(i.e., min = max = 1), the number of incorrect answers stays in
the range of [2..3]. In the following, we analyze Q1 and Q2, which
is the basic to construct the feature model of these two questions:
The phrases “What is” and “?” are located at the same relative
positions and obligatory parts of the questions. Therefore, they
are referred to as mandatory phrases.</p>
      <p>The phrase “the definition of ” appears only in question Q2, and
this question will not change its meaning without this phrase.
Hence, this phrase can be referred to as an optional phrase.
The phrases “a minimal diagnosis” and “a minimal conflict set”
can be replaced with each other, they are therefore referred to as
alternative phrases.</p>
      <p>There are the same incorrect answers such as “an arbitrary
subset” and “a maximal subset”, which are referred to as or phrases.
The correct answers (“a minimal deletion subset” and “a minimal
unsatisfiable subset”) are chosen depending on which phrase (“a
minimal diagnosis” or “a minimal conflict set”) has been selected
to tailor the question. If “a minimal diagnosis” is selected, then
the correct answer should be “a minimal deletion subset” (Q1).
If “a minimal conflict set” is selected, then the correct answer
should be “a minimal unsatisfiable subset” (Q2). These show the
requires relationships between the mentioned phrases.</p>
      <p>Q1 What is</p>
      <p>a minimal diagnosis ?
Q2 What is the definition of a minimal conflict set ?
mandatory
optional
alternative mandatory</p>
      <p>Question feature model. Based on the above analysis, a
corresponding feature model that specifies the variability and the
commonality of Q1, Q2, and all other instances can be generated (see
Figure 1). The feature model shows two mandatory sub-features of
the root feature, referring to two main parts of a question Question
- f1 and Answers - f2. The statement of a question is now modelled
based on the sub-features of f1. The answers of a question are
modelled based on the sub-features of f2.3</p>
      <p>The feature Question has five sub-features f3::f7, where f3 and
f7 are mandatory features, f4 is an optional feature, and f5 and
f6 are alternative features. In the branch of the feature Answers,
two sub-features f8 and f9 have to be added to distinguish between
correct and incorrect answers4. The feature Correct Answers
connects to its sub-features f10 and f11 using an alternative
relationship since there is only one correct answer to the question. This
relationship could be replaced with an or relationship with a group
cardinality if the examiner has specified the maximum number of
3 In the context of free-text questions, the feature Answers does not have
sub-features since no answers should be pre-specified (i.e., for a
freetext/open question, the answer is entered by students).
4 Another way is to create direct connections from f2 to correct and incorrect
answers without splitting them into two branches.
1</p>
      <p>Question
What is
01-01
a minimal conflict
a minimal diagnosis
!
Answers
a minimal deletion subset
a minimal unsatisfiable subset
an arbitrary subset
a maximal deletion subset
a maximal subset
#Correct answers: m1in
- 1
max
correct answers is greater than 1. Since the number of incorrect
answers stays in the range of [2::3], a group cardinality h2::3i between
the feature Incorrect Answers and its sub-features f12::f15
is needed. Two cross-tree constraints fcstr1: f5 requires f10g and
fcstr2: f6 requires f11g should be defined to identify the correct
answers. The constraint fcstr3: f6 excludes f12g indicates that if f6
is selected then f12 cannot be an incorrect answer.</p>
      <sec id="sec-7-1">
        <title>Supported tool for question configuration. The question config</title>
        <p>uration process of an examiner can be supported by an envisioned
exam generator tool. In the following, we propose a mock-up
showing how such a configuration is proceeded.</p>
        <p>Figure 3 shows the mock-up for configuring a set of
multiplechoice questions, which consists of the following parts:
Part 1 - Question &amp; Answers Editor: The editor represents the
structural part of a feature model in a tree view control, where
each feature is represented by a node in the tree. The sub-tree
Question shows phrases used to tailor the question statement.
The sub-tree Answer shows correct answers (with X) and
incorrect answers5. At the bottom of this part, the editor asks an
examiner to enter the number of correct/incorrect answers to the
question.</p>
        <p>
          Part 2 - Constraint Editor: The editor allows an examiner to add,
edit, or delete constraints used in the feature model. When
clicking on the “Add” or “Edit” button, the Constraint Editor dialog
is shown to let the examiner create constraints (see Figure 5).
Besides, when defining a constraint, an inconsistency detection
mechanism is activated to identify constraints triggering
inconsistencies [
          <xref ref-type="bibr" rid="ref21 ref35">21, 35</xref>
          ]. The identified constraints are highlighted to
inform the examiner that these constraints should be adapted for
resolving inconsistencies.
5 In the Question &amp; Answers Editor, the correct and incorrect answers are
not separated into two branches as shown in the feature model (see Figure
1). The reason is to visualize answers in the traditional form of a
multiplechoice question.
        </p>
        <p>Part 3 - Question Instances: An examiner is able to see the
number of question instances generated based on the feature model
and constraints defined in Parts 1 &amp; 2. In our example, six
question instances have been generated (“#Instances: 6”). The
examiner can browse through all instances by using the pagination
control. For each instance, a recommendation mechanism is activated
to specify how often the instance has been used in previous
exams (e.g., “This question instance has been used twice in the last
two exams”). Besides, the system calculates the number of
instances used in previous exams. For example, “#Used instances:
3” means three out of six instances have been used in previous
exams. For further details of the recommendation mechanism, see
Section 4.</p>
        <p>Part 4 - Question-Attribute Settings: This part allows an examiner
to set the attributes of a question, such as answer randomizing,
important level, question points, estimated duration and question
type.
3.2</p>
      </sec>
    </sec>
    <sec id="sec-8">
      <title>Configuring Parameterized Questions</title>
      <p>A parameterized question is a template with mathematical
expressions that are changed based on a specific set of replacement
values. A straightforward template for parameterized questions can be:
“What is the result of X + Y?”, in which X and Y are the
parameters whose values are in the range of [1::5]. Based on this template,
many instances can be generated by randomly selecting different
valReuqeusirfeosr X a&lt;nn..dm&gt;YGirnotuhpeicradrodminaailnit.yThis way, we can generate a set of
Exqculuedsetisons r e[nl.a.mt]edFteoatthueresucmardoifnatwlitoy parameters X and Y .</p>
      <p>In this work, we support the configuration of parameterized
questions for the purpose of increasing the number of exam instances.
A set of parameterized questions can be represented using a feature
model. The same as discussed in Section 3.1, a feature model for a set
of parameterized questions represents the relationships between
features using basic feature concepts. However, one difference lies in the
parameterized features that are often used for a specific calculation
(e.g., X + Y ). Besides, the answers to a parameterized question are
not predefined. They are instead automatically calculated depending
on the selection of the parameterized features.</p>
      <p>In the following, we present an example of parameterized question
configuration using the feature model depicted in Figure 4:</p>
      <sec id="sec-8-1">
        <title>Features f4::f7, f11, f12 are parameterized features.</title>
        <p>
          Features f4::f7 represent constraints of a CSP problem [
          <xref ref-type="bibr" rid="ref40">40</xref>
          ]. Their
relationship with feature Question - f1 is represented using a
group cardinality h2::4i, that specifies the minimum and
maximum numbers of constraints to tailor the question statement.
Features f11 and f12 represent correct and incorrect answers
respectively, which can be automatically calculated depending on
which parameterized features have been selected for the question.
Assume features f4::f7 and the statement “What is/are the
corresponding minimal conflict(s)?” have been selected, #correct
answers = #incorrect answers = 2. Corresponding correct answers
would be fc1; c2; c3g and fc1; c4g, and corresponding incorrect
answers would be fc2g and fc3g.
        </p>
        <p>Due to the support of parameterized features and an automated
answer calculation mechanism, the definition of cross-tree
constraints is pretty complex. Instead of using requires/excludes
constraints, more complex constraints have to be defined. The
semantics of the constraints is summarized in the following:
– cstr1 specifies the domain of variables v1::v3.
– cstr2 and cstr3 assure to trigger at least one inconsistency
among the selected features f4::f7.
– cstr4 ensures the existence of many conflicts.
– cstr5 specifies which of the features (f4 .. f7) have been
seTopic 1
&lt;2..2&gt;
Topic 2
&lt;2..2&gt;
&lt;3..3&gt;</p>
        <p>Topic 3 Topic 4 Topic 5
…</p>
        <p>In order to support the configuration of parameterized questions,
we propose a mock-up as shown in Figure 7, whose design is
similar to the mock-up for configuring multiple-choice questions (see
Figure 3).
3.3</p>
      </sec>
    </sec>
    <sec id="sec-9">
      <title>Exam Configuration</title>
      <p>A set of exams can be modeled using a feature model, in which each
feature represents a topic and/or a question (see Figure 6). The
relationships between questions, as well as the relationships between
exam topics and corresponding questions, can be represented by the
constraints described in basic feature models, cardinality-based
feature models, and extended feature models. Constraints in basic
feature models can be used to describe the relationship between topics
and questions. For instance, there exists a mandatory relationship
between a topic and a question, showing that a question should belong
to a specific topic. Constraints in cardinality-based feature models
can be exploited to define the minimum number and the maximum
number of questions in a specific topic. For instance, there exists a
group cardinality h2::3i between the feature Topic 2 and its
subfeatures (Question 8..Question 13), showing that there are
minimum two questions and maximum three questions to be included
in Topic 2. Constraints in extended feature models can be used
to define question complexity constraints. For instance, the
distribution of question complexity in the exam should be 50% for “nice
to know” questions, 30% for “important to know” questions, and
20% for “extremely important to know questions” (see constraints
cstr8..cstr10). Further constraints regarding number of questions,
duration, and question types could also be defined (see constraints
cstr6, cstr7, and cstr11).</p>
      <p>Overview / Category 1
Question 5</p>
      <p>Question
Given the constraints
02-04
v1 &gt; v2
v2 &gt; v3
v3 &gt; v1
v2 &gt; v1
where variables have the domain of [1. 5].
01-01
What is/are corresponding minimal conflict(s)!</p>
      <p>What is the preferred minimal conflict!
Answers
CS</p>
      <p>S
#Correct answers: 1
min
- 2
max</p>
      <p>
        Based on the generated constraints, a set of exam instances can be
generated using a constraint solver. Before activating the solver, the
exam feature model has to be translated into a CSP [
        <xref ref-type="bibr" rid="ref40">40</xref>
        ]. On the basis
of this representation, solutions (configurations) are directly
determined by the solver, such as Excel Solver [
        <xref ref-type="bibr" rid="ref19">19</xref>
        ] or Choco Solver [
        <xref ref-type="bibr" rid="ref33">33</xref>
        ].
Each configuration indicates an exam instance, which is generated
by traversing selected features in the depth-first fashion.
      </p>
      <p>To support the exam configuration process, we propose a mock-up
as shown in Figure 8. Similar to the mock-up for question
configuration, Exam Editor (Part 1) and Constraint Editor (Part 2) are shown
on the left-hand side, which allow an examiner to describe the exam
structure (based on a feature model) as well as corresponding
constraints between topics and questions. Settings placed in the
righthand slide allow an examiner to specify further constraints regarding
resource constraints (Part 3), question complexity constraints (Part
4), and the distribution of question types in the exam (Part 5). Besides
these parts, the mockup allows an examiner to specify the number of
exam instances (e.g., #Exam instances = 120) and how much each
exam instance similar to previous exams (e.g., %Similar to previous
exams &lt; 20%).
4</p>
    </sec>
    <sec id="sec-10">
      <title>RECOMMENDATION ALGORITHM</title>
      <p>As mentioned in Section 1, to counteract exam cheating, besides
increasing the question bank, the exam generation process should be
supported by a recommendation mechanism that helps to select
exams that are less similar to previous exams as much as possible. To
address this goal, we use a content-based recommendation approach
that filters exams based on the similarity between the questions of
the generated exams and the questions of previous exams.</p>
      <p>
        Given a set of question instances, we need to specify instances
that have been used in previous exams as well as their frequency.
Instances that were frequently used in the previous exams should be
omitted. To do this, for a question instance P , we need to calculate
the frequency fP of instance P to be used in a previous exam Ej .
We first build the profile for the question using a vector space model
[
        <xref ref-type="bibr" rid="ref32">32</xref>
        ]. The question is represented as a n-dimensional vector, in which
each dimension corresponds to a term. The value of each term is
the frequency of the term appearing in the question. The similarity
between P and a question Qi in exam Ej is calculated using cosine
      </p>
      <p>P</p>
      <p>Qi
sim(P; Qi) =</p>
      <p>jjP jj jjQijj</p>
      <p>The calculated similarity between two questions P and Qi is then
compared with a threshold that has been specified by the
examiner. In our mock-up shown in Figure 8, the examiner can specify the
threshold in the item “%Similar to questions in previous exams”. If
the similarity is greater than , we can conclude that P is very
similar to Qi and increases fP by 1. The same procedure can be done
for other previous exams. Finally, the frequency of P to appear in
n previous exams can be identified by Formula 2. The lower the fP
value, the higher the probability of choosing question instance P for
the exam.
(1)
fP = jsim(P; Qi) &gt;</p>
      <p>: 8Qi 2 Ej ; i 2 [1::m] ; j 2 [1::n] j (2)
where n is the number of the previous exams and m is the number of
questions in Ej .
5</p>
    </sec>
    <sec id="sec-11">
      <title>CONCLUSION</title>
      <p>The paper has proposed an approach that exploits configuration and
recommendation techniques to counteract exam cheating. Thank to
question and exam configuration mechanisms, our approach is able to
generate a large number of exam instances, which assures the
distribution of different exams to students. Supported by a content-based
recommendation algorithm, our approach also helps to generate
exams that are different from previous exams. This way, it can prevent
students from dishonesty behaviors regarding item harvesting, item
pre-knowledge, and item memorizing.</p>
      <p>Our approach, however, shows some limitations. Automated
question and exam generation could trigger issues regarding the
preciseness of generated questions and exams, emerging as a gap to be
bridged within the scope of future work. Although we have
developed mock-ups to support examiners’ question and exam generation
processes, the implementation of an exam generator prototype is still
needed to further analyze user needs, the applicability of the
proposed mock-ups, and the effectiveness of our approach.</p>
      <p>
        Future work will include the analysis of the applicability of
the presented concepts in the exam configuration domain (e.g.,
we will identify a complete set of typically relevant domain
constraints) as well as in further multi- configuration scenarios.
Furthermore, we will analyze new user interfaces and interaction
requirements triggered by the application of multi-configuration
concepts. The knowledge representation concepts discussed within
the context of our exam configuration scenario are currently
integrated into the KNOWLEDGECHECKR elearning environment
(www.knowledgecheckr.com) [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ]. Our major motivation is to
increase the flexibility of exam generation but also to counteract
cheating in online exams through an increased exam variability. In cases
where individual user requirements induce an inconsistency with the
exam model constraints, we propose the application of model-based
diagnosis concepts [
        <xref ref-type="bibr" rid="ref10 ref5 ref9">5, 9, 10</xref>
        ] which can help to deter- mine
minimal conflict resolutions that also take into account aspects such as
fairness and representativeness of the remaining questions.
      </p>
    </sec>
    <sec id="sec-12">
      <title>ACKNOWLEDGMENTS</title>
      <p>The presented work has been conducted in the PARXCEL project
funded by the Austrian Research Promotion Agency (880657).</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>Gediminas</given-names>
            <surname>Adomavicius</surname>
          </string-name>
          and Alexander Tuzhilin, '
          <article-title>Toward the next generation of recommender systems: A survey of the state-of-the-art and possible extensions'</article-title>
          ,
          <source>IEEE Trans. on Knowl. and Data Eng</source>
          .,
          <volume>17</volume>
          (
          <issue>6</issue>
          ),
          <fpage>734</fpage>
          -
          <lpage>749</lpage>
          , (Jun.
          <year>2005</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>Helaine</given-names>
            <surname>Alessio</surname>
          </string-name>
          , Nancy Malay,
          <string-name>
            <given-names>Karsten</given-names>
            <surname>Maurer</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Bailer</surname>
          </string-name>
          , and Beth Rubin, '
          <article-title>Examining the effect of proctoring on online test scores'</article-title>
          ,
          <source>Online Learning</source>
          ,
          <volume>21</volume>
          (
          <issue>1</issue>
          ), (
          <year>2017</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>Sven</given-names>
            <surname>Apel</surname>
          </string-name>
          , Don Batory, Christian Ka¨stner, and Gunter Saake,
          <source>FeatureOriented Software Product Lines: Concepts and Implementation</source>
          , Springer Science &amp; Business
          <string-name>
            <surname>Media</surname>
          </string-name>
          ,
          <year>2013</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>Don</given-names>
            <surname>Batory</surname>
          </string-name>
          , 'Feature Models, Grammars, and Propositional Formulas', in International Conference on Software Product Lines, eds.,
          <source>Henk Obbink and Klaus Pohl</source>
          , pp.
          <fpage>7</fpage>
          -
          <lpage>20</lpage>
          , Berlin, Heidelberg, (
          <year>2005</year>
          ). Springer Berlin Heidelberg.
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>Razan</given-names>
            <surname>Bawarith</surname>
          </string-name>
          , Abdullah Basuhail, Anas Fattouh, and
          <string-name>
            <surname>Shehab</surname>
          </string-name>
          Gamalel-Din, '
          <article-title>E-exam cheating detection system'</article-title>
          ,
          <source>International Journal of Advanced Computer Science and Applications</source>
          ,
          <volume>8</volume>
          (
          <issue>4</issue>
          ),
          <fpage>176</fpage>
          -
          <lpage>181</lpage>
          , (
          <year>2017</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>David</given-names>
            <surname>Benavides</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Sergio</given-names>
            <surname>Segura</surname>
          </string-name>
          , and Antonio Ruiz-Corte´s, '
          <source>Automated Analysis of Feature Models 20 Years Later: A Literature Review', Information Systems</source>
          ,
          <volume>35</volume>
          (
          <issue>6</issue>
          ),
          <fpage>615</fpage>
          -
          <lpage>636</lpage>
          , (
          <year>2010</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>James</given-names>
            <surname>Bennett</surname>
          </string-name>
          and Stan Lanning, '
          <article-title>The netflix prize'</article-title>
          ,
          <source>in Proceedings of KDD Cup and Workshop</source>
          , pp.
          <fpage>3</fpage>
          -
          <lpage>6</lpage>
          , New York, (
          <year>2007</year>
          ). ACM.
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>Robin</given-names>
            <surname>Burke</surname>
          </string-name>
          , Alexander Felfernig, and
          <string-name>
            <surname>Mehmet H. Go</surname>
          </string-name>
          <article-title>¨ker, 'Recommender systems: An overview'</article-title>
          ,
          <source>AI Magazine</source>
          ,
          <volume>32</volume>
          (
          <issue>3</issue>
          ),
          <fpage>13</fpage>
          -
          <lpage>18</lpage>
          , (Jun.
          <year>2011</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>Mason</given-names>
            <surname>Chen</surname>
          </string-name>
          , '
          <article-title>Detect multiple choice exam cheating pattern by applying multivariate statistics'</article-title>
          ,
          <source>in Proceedings of the International Conference on Industrial Engineering and Operations Management</source>
          , pp.
          <fpage>173</fpage>
          -
          <lpage>181</lpage>
          , Bogota, Colombia, (Oct.
          <year>2017</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>Chia</given-names>
            <surname>Yuan</surname>
          </string-name>
          <string-name>
            <surname>Chuang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Scotty D.</given-names>
            <surname>Craig</surname>
          </string-name>
          , and John Femiani, '
          <article-title>Detecting probable cheating during online assessments based on time delay</article-title>
          and head pose',
          <source>Higher Education Research &amp; Development</source>
          ,
          <volume>36</volume>
          (
          <issue>6</issue>
          ),
          <fpage>1123</fpage>
          -
          <lpage>1137</lpage>
          , (
          <year>2017</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <surname>Gregory</surname>
            <given-names>J.</given-names>
          </string-name>
          <string-name>
            <surname>Cizek</surname>
          </string-name>
          and James A. Wollack, eds.,
          <source>Detecting Potential Collusion among Individual Examinees using Similarity Analysis</source>
          , chapter
          <volume>3</volume>
          ,
          <fpage>47</fpage>
          -
          <lpage>69</lpage>
          , Routledge, Oct.
          <year>2016</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <surname>Krzysztof</surname>
            <given-names>Czarnecki</given-names>
          </string-name>
          , Simon Helsen, and Ulrich Eisenecker, '
          <article-title>Formalizing cardinality-based feature models and their specialization'</article-title>
          ,
          <source>Software Process: Improvement and Practice</source>
          ,
          <volume>10</volume>
          (
          <issue>1</issue>
          ),
          <fpage>7</fpage>
          -
          <lpage>29</lpage>
          , (
          <year>2005</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <surname>Jennifer</surname>
            <given-names>P.</given-names>
          </string-name>
          <string-name>
            <surname>Davis</surname>
          </string-name>
          .
          <article-title>Using data forensics to detect cheating: An illustration</article-title>
          ,
          <year>2018</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>Seife</given-names>
            <surname>Dendir</surname>
          </string-name>
          and
          <string-name>
            <given-names>R.</given-names>
            <surname>Maxwell</surname>
          </string-name>
          , '
          <article-title>Cheating in online courses: Evidence from online proctoring'</article-title>
          ,
          <source>Computers in Human Behavior Reports</source>
          ,
          <volume>2</volume>
          ,
          <fpage>100033</fpage>
          , (Aug.
          <year>2020</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <surname>Martin</surname>
            <given-names>Dick</given-names>
          </string-name>
          , Judy Sheard, Cathy Bareiss, Janet Carter, Donald Joyce, Trevor Harding, and Cary Laxer, '
          <article-title>Addressing student cheating: Definitions and solutions'</article-title>
          ,
          <source>SIGCSE Bull.</source>
          ,
          <volume>35</volume>
          (
          <issue>2</issue>
          ),
          <fpage>172</fpage>
          -
          <lpage>184</lpage>
          , (Jun.
          <year>2002</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <surname>George</surname>
            <given-names>M.</given-names>
          </string-name>
          <string-name>
            <surname>Diekhoff</surname>
            , Emily E. LaBeff, Robert E. Clark,
            <given-names>Larry E.</given-names>
          </string-name>
          <string-name>
            <surname>Williams</surname>
            ,
            <given-names>Billy</given-names>
          </string-name>
          <string-name>
            <surname>Francis</surname>
          </string-name>
          , and
          <string-name>
            <surname>Valerie J. Haines</surname>
          </string-name>
          , 'College cheating: Ten years later', Research in Higher Education,
          <volume>37</volume>
          ,
          <fpage>487</fpage>
          -
          <lpage>502</lpage>
          , (
          <year>1996</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <surname>Alexander</surname>
            <given-names>Felfernig</given-names>
          </string-name>
          , David Benavides, Jose´ Galindo, and Florian Reinfrank, '
          <article-title>Towards Anomaly Explanation in Feature Models'</article-title>
          , in ConfWS-2013
          <source>: 15th International Configuration Workshop</source>
          (
          <year>2013</year>
          ), volume
          <volume>1128</volume>
          , pp.
          <fpage>117</fpage>
          -
          <lpage>124</lpage>
          , (Aug.
          <year>2013</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <given-names>Alexander</given-names>
            <surname>Felfernig</surname>
          </string-name>
          and Robin Burke, '
          <article-title>Constraint-based recommender systems: Technologies and research issues'</article-title>
          ,
          <source>in Proceedings of the 10th International Conference on Electronic Commerce, ICEC'08</source>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>10</lpage>
          , New York, NY, USA, (
          <year>2008</year>
          ). ACM.
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19]
          <string-name>
            <surname>Alexander</surname>
            <given-names>Felfernig</given-names>
          </string-name>
          , Gerhard Friedrich, Dietmar Jannach,
          <string-name>
            <given-names>Christian</given-names>
            <surname>Russ</surname>
          </string-name>
          , and Markus Zanker, '
          <article-title>Developing Constraint-Based Applications with Spreadsheets'</article-title>
          , in Developments in Applied Artificial Intelligence, eds.,
          <string-name>
            <given-names>Paul W. H.</given-names>
            <surname>Chung</surname>
          </string-name>
          , Chris Hinde, and Moonis Ali, volume
          <volume>2718</volume>
          <source>of IEA/AIE</source>
          <year>2003</year>
          , pp.
          <fpage>197</fpage>
          -
          <lpage>207</lpage>
          , Berlin, Heidelberg, (
          <year>2003</year>
          ). Springer.
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [20]
          <string-name>
            <surname>Alexander</surname>
            <given-names>Felfernig</given-names>
          </string-name>
          , Viet Man Le, and Trang Tran, '
          <article-title>Supporting feature model-based configuration in microsoft excel'</article-title>
          ,
          <source>in 22nd International Configuration Workshop</source>
          , (
          <year>2020</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [21]
          <string-name>
            <surname>Alexander</surname>
            <given-names>Felfernig</given-names>
          </string-name>
          , Monika Schubert, and Christoph Zehentner, '
          <article-title>An efficient diagnosis algorithm for inconsistent constraint sets'</article-title>
          ,
          <source>Artif. Intell. Eng. Des. Anal. Manuf</source>
          .,
          <volume>26</volume>
          (
          <issue>1</issue>
          ), (Feb.
          <year>2012</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          [22]
          <string-name>
            <given-names>Joanna</given-names>
            <surname>Golden</surname>
          </string-name>
          and
          <string-name>
            <given-names>Mark</given-names>
            <surname>Kohlbeck</surname>
          </string-name>
          , '
          <article-title>Addressing cheating when using test bank questions in online Classes'</article-title>
          ,
          <source>Journal of Accounting Education</source>
          , 52(C), (
          <year>2020</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          [23]
          <string-name>
            <given-names>Hicham</given-names>
            <surname>Hage</surname>
          </string-name>
          and
          <article-title>Esma A¨ımeur, 'Exam question recommender system'</article-title>
          ,
          <source>in Proceedings of the 2005 Conference on Artificial Intelligence in Education: Supporting Learning through Intelligent and Socially Informed Technology</source>
          , p.
          <fpage>249</fpage>
          -
          <lpage>257</lpage>
          , NLD, (
          <year>2005</year>
          ). IOS Press.
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          [24]
          <string-name>
            <surname>Lothar</surname>
            <given-names>Hotz</given-names>
          </string-name>
          , Alexander Felfernig, Markus Stumptner, Anna Ryabokon, Claire Bagley, and Katharina Wolter, 'Chapter 6
          <article-title>- Configuration Knowledge Representation and Reasoning', in Knowledge-Based Configuration</article-title>
          , eds.,
          <string-name>
            <surname>Alexander</surname>
            <given-names>Felfernig</given-names>
          </string-name>
          , Lothar Hotz, Claire Bagley, and Juha Tiihonen,
          <fpage>41</fpage>
          -
          <lpage>72</lpage>
          , Morgan Kaufmann, Boston, (
          <year>2014</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          [25]
          <string-name>
            <surname>Ulrich</surname>
            <given-names>Junker</given-names>
          </string-name>
          , 'QUICKXPLAIN:
          <article-title>Preferred explanations and relaxations for over-constrained problems'</article-title>
          ,
          <source>in Proceedings of the 19th National Conference on Artifical Intelligence</source>
          ,
          <source>AAAI'04</source>
          , p.
          <fpage>167</fpage>
          -
          <lpage>172</lpage>
          . AAAI Press, (
          <year>2004</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          [26]
          <string-name>
            <surname>Kyo</surname>
            <given-names>Kang</given-names>
          </string-name>
          , Sholom Cohen, James Hess,
          <string-name>
            <given-names>William</given-names>
            <surname>Novak</surname>
          </string-name>
          ,
          <article-title>and</article-title>
          <string-name>
            <given-names>A.</given-names>
            <surname>Peterson</surname>
          </string-name>
          , '
          <string-name>
            <surname>Feature-Oriented Domain Analysis (FODA) Feasibility</surname>
            <given-names>Study'</given-names>
          </string-name>
          ,
          <source>Technical Report CMU/SEI-90-TR-021</source>
          , Software Engineering Institute, Carnegie Mellon University, Pittsburgh, PA, (
          <year>1990</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          [27]
          <string-name>
            <surname>Viet-Man Le</surname>
          </string-name>
          ,
          <article-title>Thi Ngoc Trang Tran, and Alexander Felfernig, 'A conversion of feature models into an executable representation in microsoft excel'</article-title>
          ,
          <source>in Intelligent Systems in Industrial Applications</source>
          , eds.,
          <string-name>
            <surname>Martin</surname>
            <given-names>Stettinger</given-names>
          </string-name>
          , Gerhard Leitner, Alexander Felfernig, and Zbigniew W. Ras, pp.
          <fpage>153</fpage>
          -
          <lpage>168</lpage>
          , Cham, (
          <year>2021</year>
          ). Springer International Publishing.
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          [28]
          <string-name>
            <surname>Greg</surname>
            <given-names>Linden</given-names>
          </string-name>
          ,
          <string-name>
            <given-names>Brent</given-names>
            <surname>Smith</surname>
          </string-name>
          , and Jeremy York, 'Amazon.
          <article-title>com recommendations: Item-to-item collaborative filtering'</article-title>
          ,
          <source>IEEE Internet Computing</source>
          ,
          <volume>7</volume>
          (
          <issue>1</issue>
          ),
          <fpage>76</fpage>
          -
          <lpage>80</lpage>
          , (Jan.
          <year>2003</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          [29]
          <string-name>
            <surname>Donald</surname>
            <given-names>McCabe</given-names>
          </string-name>
          , '
          <article-title>Cheating on tests: How to do it, detect it, and prevent it (review)'</article-title>
          ,
          <source>The Journal of Higher Education</source>
          ,
          <volume>73</volume>
          ,
          <fpage>297</fpage>
          -
          <lpage>298</lpage>
          , (Jan.
          <year>2002</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref30">
        <mixed-citation>
          [30]
          <string-name>
            <surname>Donald L. McCabe</surname>
            ,
            <given-names>Kenneth D.</given-names>
          </string-name>
          <string-name>
            <surname>Butterfield</surname>
          </string-name>
          , and Linda Klebe Trevin˜o, '
          <article-title>Academic dishonesty in graduate business programs: Prevalence, causes</article-title>
          , and proposed action',
          <source>Academy of Management Learning and Education</source>
          ,
          <volume>5</volume>
          (
          <issue>3</issue>
          ),
          <fpage>294</fpage>
          -
          <lpage>305</lpage>
          , (Sep.
          <year>2006</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref31">
        <mixed-citation>
          [31]
          <string-name>
            <given-names>James</given-names>
            <surname>Moten</surname>
          </string-name>
          <string-name>
            <surname>Jr</surname>
          </string-name>
          , Alex Fitterer, Elise Brazier, Jonathan Leonard, and Avis Brown, '
          <article-title>Examining online college cyber cheating methods and prevention measures'</article-title>
          ,
          <source>Electronic Journal of e-Learning</source>
          ,
          <volume>11</volume>
          ,
          <fpage>139</fpage>
          -
          <lpage>146</lpage>
          , (
          <year>2013</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref32">
        <mixed-citation>
          [32]
          <string-name>
            <surname>Michael</surname>
            <given-names>J.</given-names>
          </string-name>
          <string-name>
            <surname>Pazzani</surname>
            and
            <given-names>Daniel</given-names>
          </string-name>
          <string-name>
            <surname>Billsus</surname>
          </string-name>
          ,
          <source>Content-Based Recommendation Systems</source>
          ,
          <volume>325</volume>
          -
          <fpage>341</fpage>
          , Springer Berlin Heidelberg, Berlin, Heidelberg,
          <year>2007</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref33">
        <mixed-citation>
          [33]
          <string-name>
            <given-names>Charles</given-names>
            <surname>Prud'homme</surname>
          </string-name>
          ,
          <string-name>
            <surname>Jean-Guillaume Fages</surname>
            , and Xavier Lorca, Choco Solver Documentation,
            <given-names>TASC</given-names>
          </string-name>
          , INRIA Rennes,
          <source>LINA CNRS UMR 6241</source>
          ,
          <string-name>
            <surname>COSLING</surname>
            <given-names>S.A.S.</given-names>
          </string-name>
          ,
          <year>2016</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref34">
        <mixed-citation>
          [34]
          <string-name>
            <surname>Hong</surname>
            <given-names>Qian</given-names>
          </string-name>
          , Dorota Staniewska,
          <string-name>
            <given-names>Mark</given-names>
            <surname>Reckase</surname>
          </string-name>
          , and Ada Woo, '
          <article-title>Using response time to detect item preknowledge in computer-based licensure examinations'</article-title>
          ,
          <source>Educational Measurement: Issues and Practice</source>
          ,
          <volume>35</volume>
          , n/a-n/a, (
          <year>Feb</year>
          .
          <year>2016</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref35">
        <mixed-citation>
          [35]
          <string-name>
            <surname>Raymond</surname>
            <given-names>Reiter</given-names>
          </string-name>
          , '
          <article-title>A theory of diagnosis from first principles'</article-title>
          ,
          <source>Artificial Intelligence</source>
          ,
          <volume>32</volume>
          (
          <issue>1</issue>
          ),
          <fpage>57</fpage>
          -
          <lpage>95</lpage>
          , (
          <year>1987</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref36">
        <mixed-citation>
          [36]
          <string-name>
            <surname>Francesco</surname>
            <given-names>Ricci</given-names>
          </string-name>
          , Lior Rokach, Bracha Shapira, and
          <string-name>
            <given-names>Paul B.</given-names>
            <surname>Kantor</surname>
          </string-name>
          , Recommender Systems Handbook, Springer-Verlag, Berlin, Heidelberg, 1st edn.,
          <year>2011</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref37">
        <mixed-citation>
          [37]
          <string-name>
            <surname>Neil</surname>
            <given-names>C.</given-names>
          </string-name>
          <string-name>
            <surname>Rowe</surname>
          </string-name>
          , '
          <article-title>Cheating in online student assessment: Beyond plagiarism'</article-title>
          ,
          <source>Online Journal of Distance Learning Administration</source>
          ,
          <volume>7</volume>
          (
          <issue>2</issue>
          ), (
          <year>2004</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref38">
        <mixed-citation>
          [38]
          <string-name>
            <given-names>Thi</given-names>
            <surname>Ngoc Trang Tran</surname>
          </string-name>
          , Mu¨slu¨m Atas,
          <string-name>
            <given-names>Alexander</given-names>
            <surname>Felfernig</surname>
          </string-name>
          , and Martin Stettinger, '
          <article-title>An overview of recommender systems in the healthy food domain'</article-title>
          ,
          <source>Journal of Intelligent Information Systems</source>
          ,
          <volume>50</volume>
          (
          <issue>3</issue>
          ),
          <fpage>501</fpage>
          -
          <lpage>526</lpage>
          , (Jun.
          <year>2018</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref39">
        <mixed-citation>
          [39]
          <string-name>
            <given-names>Thi</given-names>
            <surname>Ngoc Trang Tran</surname>
          </string-name>
          , Alexander Felfernig, Christoph Trattner, and Andreas Holzinger, '
          <article-title>Recommender systems in the healthcare domain: state-of-the-art and research issues'</article-title>
          ,
          <source>Journal of Intelligent Information Systems</source>
          ,
          <volume>1</volume>
          -
          <fpage>31</fpage>
          , (Dec.
          <year>2020</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref40">
        <mixed-citation>
          [40]
          <string-name>
            <surname>Edward</surname>
            <given-names>Tsang</given-names>
          </string-name>
          , Foundations of Constraint Satisfaction, Academic Press, London,
          <year>1993</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref41">
        <mixed-citation>
          [41]
          <string-name>
            <surname>W. J. van der Linden</surname>
          </string-name>
          and Guo Fanmin, '
          <article-title>Bayesian procedures for identifying aberrant response-time patterns in adaptive testing'</article-title>
          ,
          <source>Psychometrika</source>
          ,
          <volume>73</volume>
          ,
          <fpage>365</fpage>
          -
          <lpage>384</lpage>
          , (
          <year>2008</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref42">
        <mixed-citation>
          [42]
          <string-name>
            <given-names>George</given-names>
            <surname>Watson</surname>
          </string-name>
          and James Sottile, '
          <article-title>Cheating in the digital age: Do students cheat more in online courses?'</article-title>
          ,
          <source>Online Journal of Distance Learning Administration, (Jan</source>
          .
          <year>2010</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref43">
        <mixed-citation>
          [43]
          <string-name>
            <surname>Qian</surname>
            <given-names>Zhang</given-names>
          </string-name>
          , Jie Lu, and Zhang Guangquan, '
          <article-title>Recommender systems in e-learning'</article-title>
          ,
          <source>J Smart Environ Green Comput</source>
          ,
          <volume>1</volume>
          ,
          <fpage>76</fpage>
          -
          <lpage>89</lpage>
          , (Jun.
          <year>2020</year>
          ).
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>