dAppER: decentralised application for examination reviews

Conference paper


Mitchell, I., Hara, S. and Sheriff, M. 2019. dAppER: decentralised application for examination reviews. 12th International Conference on Global Security, Safety & Sustainability. Northumbria University London, England 16 - 18 Jan 2019 IEEE. https://doi.org/10.1109/ICGS3.2019.8688143
TypeConference paper
TitledAppER: decentralised application for examination reviews
AuthorsMitchell, I., Hara, S. and Sheriff, M.
Abstract

dAppER is to provide an automated quality assurance mechanism for the internal procedures put in place for the production of exam papers and their respective assessment schemes. Higher Education Providers (HEP) in the UK, or for that matter Universities worldwide, have a duty to meet the quality standards and requirements set out in their respective curricula and programme specifications. Such requirements usually include internal moderation of unseen examination papers and independent review by an external examiner to ensure necessary checks have taken place. These checks are likely to be scrutinised during audit trails. Permissioned blockchain facilitates the secure distribution of the exam paper, whilst maintaining an immutable and trusted ledger for audits. The system allows transparency that is ideal for External Examiners and Auditors to view. A prototype was developed using HyperLedger and implemented on three mock exam papers. The results demonstrate that dAppER can be successfully implemented and provide some insights into whether the development of decentralised applications complements quality assurance systems in general.

Conference12th International Conference on Global Security, Safety & Sustainability
ISBN
Electronic9781538670019
Paperback9781538670026
PublisherIEEE
Publication dates
Print12 Jan 2019
Online11 Apr 2019
Publication process dates
Deposited04 Feb 2020
Accepted25 Sep 2018
Output statusPublished
Additional information

INSPEC Accession Number: 18600033

Digital Object Identifier (DOI)https://doi.org/10.1109/ICGS3.2019.8688143
LanguageEnglish
Book title2019 IEEE 12th International Conference on Global Security, Safety and Sustainability (ICGS3)
Permalink -

https://repository.mdx.ac.uk/item/88w2v

  • 61
    total views
  • 0
    total downloads
  • 6
    views this month
  • 0
    downloads this month

Export as

Related outputs

CAGE: Consensus Algorithm Genetically Enhanced
Mitchell, I. and Maka, K. 2023. CAGE: Consensus Algorithm Genetically Enhanced. 15th International Conference on Global Security, Safety & Sustainability. Virtual Online 11 - 12 Oct 2023 Springer.
A matter of life and death: how the Covid-19 pandemic threw the spotlight on digital financial exclusion in the UK
Hara, S., Whitney, G. and Whitney, L. 2021. A matter of life and death: how the Covid-19 pandemic threw the spotlight on digital financial exclusion in the UK. in: Jahankhani, H., Kendzierskyj, S. and Akhgar, B. (ed.) Information Security Technologies for Controlling Pandemics Springer International Publishing. pp. 65-108
IoT and cloud forensic investigation guidelines
Mitchell, I., Hara, S., Ibarra-Jiminez, J., Jahankhani, H. and Montasari, R. 2020. IoT and cloud forensic investigation guidelines. in: Jahankhani, H., Akhgar, B., Cochrane, P. and Dastbaz, M. (ed.) Policing in the Era of AI and Smart Societies Cham, Switzerland Springer. pp. 119-138
Blockchain of custody, BoC
Mitchell, I., Hara, S., Jahankhani, H. and Neilson, D. 2020. Blockchain of custody, BoC. in: Jahankhani, H. (ed.) Cyber Security Practitioner's Guide World Scientific. pp. 365-397
BMAR - blockchain for medication administration records
Mitchell, I. and Hara, S. 2019. BMAR - blockchain for medication administration records. in: Jahankhani, H., Kendzierskyj, S., Jamal, A., Epiphaniou, G. and Al-Khateeb, H. (ed.) Blockchain and Clinical Trial: Securing Patient Data Cham, Switzerland Springer.
Quality audits with Blockchain for healthcare in the UK
Mitchell, I. and Hara, S. 2019. Quality audits with Blockchain for healthcare in the UK. George, C., Whitehouse, D. and Duquenoy, P. (ed.) Health IT Workshop 2019. Middlesex University, London 07 - 08 Nov 2019 pp. 42-43
Study on risks and opportunities of digitalisation for financial inclusion. The perspective of vulnerable users in Estonia, Italy and UK with a focus on groups covered by the European Accessibility Act
Whitney, G., Hara, S. and Whitney, L. 2018. Study on risks and opportunities of digitalisation for financial inclusion. The perspective of vulnerable users in Estonia, Italy and UK with a focus on groups covered by the European Accessibility Act. European Union. https://doi.org/10.2874/447984
DaP∀ : Deconstruct and Preserve for all: a procedure for the preservation of digital evidence on solid state drives and traditional storage media
Mitchell, I., Ferriera, J., Anandaraja, T. and Hara, S. 2018. DaP∀ : Deconstruct and Preserve for all: a procedure for the preservation of digital evidence on solid state drives and traditional storage media. in: Jahankhani, H. (ed.) Cyber Criminology Cham, Switzerland Springer. pp. 275-281
SMERF: Social Media, Ethics and Risk Framework
Mitchell, I., Cockerton, T., Hara, S. and Evans, C. 2018. SMERF: Social Media, Ethics and Risk Framework. in: Jahankhani, H. (ed.) Cyber Criminology Cham, Switzerland Springer. pp. 203-225
CABots and other neural agents
Huyck, C. and Mitchell, I. 2018. CABots and other neural agents. Frontiers in Neurorobotics. 12, pp. 1-12. https://doi.org/10.3389/fnbot.2018.00079
State of the art in computer forensic education-a review of computer forensic programmes in the UK, Europe and US
Dafoulas, G., Neilson, D. and Hara, S. 2017. State of the art in computer forensic education-a review of computer forensic programmes in the UK, Europe and US. 1st International Conference on New Trends in Computing Sciences. Amman, Jordan 11 - 13 Oct 2017 Institute of Electrical and Electronics Engineers. pp. 144-154 https://doi.org/10.1109/ICTCS.2017.65
Bitcoin forensics: a tutorial
Neilson, D., Hara, S. and Mitchell, I. 2017. Bitcoin forensics: a tutorial. Jahankhani, H., Carlile, A., Emm, D., Hosseinian-Far, A., Brown, G., Sexton, G. and Jamal, A. (ed.) 11th International Conference on Global Security, Safety and Sustainability. London, UK 18 - 20 Jan 2017 Cham Springer. pp. 12-26 https://doi.org/10.1007/978-3-319-51064-4_2
Deconstruct and preserve (DaP): a method for the preservation of digital evidence on solid state drives (SSD)
Mitchell, I., Anandaraja, T., Hara, S., Hadzhinenov, G. and Neilson, D. 2017. Deconstruct and preserve (DaP): a method for the preservation of digital evidence on solid state drives (SSD). Jahankhani, H., Carlile, A., Emm, D., Hosseinian-Far, A., Brown, G., Sexton, G. and Jamal, A. (ed.) 11th International Conference on Global Security, Safety and Sustainability. London, UK 18 - 20 Jan 2017 Cham Springer. https://doi.org/10.1007/978-3-319-51064-4_1
Programming with simulated neurons: a first design pattern
Evans, C., Mitchell, I. and Huyck, C. 2016. Programming with simulated neurons: a first design pattern. PPIG 2016 - 27th Annual Workshop of the Psychology of Programming Interest Group. University of Cambridge, Cambridge, UK 07 - 10 Sep 2016 Psychology of Programming Interest Group. pp. 36-45
PlaNeural: spiking neural networks that plan
Mitchell, I., Huyck, C. and Evans, C. 2016. PlaNeural: spiking neural networks that plan. 7th Annual International Conference on Biologically Inspired Cognitive Architectures, BICA 2016. New York City, NY, USA 16 Jul 2016 Elsevier. pp. 198-204 https://doi.org/10.1016/j.procs.2016.07.425
Self organising maps with a point neuron model
Huyck, C. and Mitchell, I. 2013. Self organising maps with a point neuron model. Intl Conf. on Cognitive and Neural Systems.
Computer forensics: challenges to evidential integrity
Mitchell, I. and Hara, S. 2014. Computer forensics: challenges to evidential integrity. in: Jennions, I. (ed.) Integrated vehicle health management: implementation and lessons learned Warrendale, PA, USA SAE International.
A comparison of simple agents implemented in simulated neurons
Huyck, C., Evans, C. and Mitchell, I. 2015. A comparison of simple agents implemented in simulated neurons. Biologically Inspired Cognitive Architectures. 12, pp. 9-19. https://doi.org/10.1016/j.bica.2015.03.001
Compensatory Hebbian learning for categorisation in simulated biological neural nets
Huyck, C. and Mitchell, I. 2013. Compensatory Hebbian learning for categorisation in simulated biological neural nets. Biologically Inspired Cognitive Architectures. 6 (5), pp. 3-7. https://doi.org/10.1016/j.bica.2013.06.003
eFRIEND: an ethical framework for intelligent environments development
Jones, S., Hara, S. and Augusto, J. 2015. eFRIEND: an ethical framework for intelligent environments development. Ethics and Information Technology. 17 (1), pp. 11-25. https://doi.org/10.1007/s10676-014-9358-1
eFRIEND: an ethical framework for intelligent environment development
Jones, S., Augusto, J. and Hara, S. 2014. eFRIEND: an ethical framework for intelligent environment development. The 7th ACM International Conference on Pervasive Technologies Related to Assistive Environments: PETRA 2014. Rhodes, Greece 27 - 30 May 2014 Association for Computing Machinery (ACM). https://doi.org/10.1145/2674396.2674410
Post and pre-compensatory Hebbian Learning for categorisation
Huyck, C. and Mitchell, I. 2014. Post and pre-compensatory Hebbian Learning for categorisation. Cognitive Neurodynamics. 8 (4), pp. 299-311. https://doi.org/10.1007/s11571-014-9282-4
A framework for digital investigations: a case study using BPB modifications
Mitchell, I. 2011. A framework for digital investigations: a case study using BPB modifications. 6th International Annual Workshop on Digital Forensics and Incident Analysis (WDFIA 2011). Kingston University, London Jul 2011
KCMAC-BYY: Kernel CMAC using Bayesian Ying-Yang learning
Tian, K., Guo, B., Liu, G., Mitchell, I., Cheng, D. and Zhao, W. 2013. KCMAC-BYY: Kernel CMAC using Bayesian Ying-Yang learning. Neurocomputing. 101, pp. 24-31. https://doi.org/10.1016/j.neucom.2012.06.028
Genetic sequences: tracing the mutations of a disease.
Mitchell, I., Passmore, P. and Xu, K. 2010. Genetic sequences: tracing the mutations of a disease. IEEE VAST Symposium 2010 Challenge. Salt Lake City, Utah, USA 24 - 29 Oct 2010
Sense-making in visual analytics: processes and challenges
Attfield, S., Hara, S. and Wong, B. 2010. Sense-making in visual analytics: processes and challenges. EuroVAST 2010: The 1st European Symposium on Visual Analytics Science and Technology.. Bordeaux, France 08 Jun 2010
A connectionist inference model for pattern-directed knowledge representation
Mitchell, I. and Bavan, A. 2000. A connectionist inference model for pattern-directed knowledge representation. Expert Systems. 17 (2), pp. 106-113.
Quality assurance of curricula through the use of an integrated framework for programme validation.
Mitchell, I., Sheriff, M. and Georgiadou, E. 2008. Quality assurance of curricula through the use of an integrated framework for programme validation. Tempus JEP-27178-2006, Dissemination Workshop.. Yerevan, Armenia Sep 2008
MESSM: a framework for protein fold recognition using neural networks and support vector machines.
Mitchell, I., Jiang, N. and Wu, W. 2006. MESSM: a framework for protein fold recognition using neural networks and support vector machines. International Journal of Bioinformatics Research and Applications. 2 (4), pp. 381-393. https://doi.org/10.1504/IJBRA.2006.011037
Selection enthusiasm.
Mitchell, I. and Agrawal, A. 2006. Selection enthusiasm. in: 6th International Conference on Simulated Evolutionand Learning, Hefei, China. Proceedings. Heidelberg Springer Verlag.
Dynamics in proportionate selection.
Mitchell, I., Agrawal, A., Litovski, I. and Passmore, P. 2005. Dynamics in proportionate selection. in: International Conference on Adaptive and Natural Computnig Alogorithms, Coimbra, Portugal. Proceedings. Vienna. Springer. pp. 226-229
Threading with environment-specific score by artificial neural networks
Mitchell, I., Jiang, N. and Wu, W. 2006. Threading with environment-specific score by artificial neural networks. Soft Computing. 10 (4), pp. 305-314. https://doi.org/10.1007/s00500-005-0488-6