“…The authentication of students is considered as a major challenge for educational organizations offering e-learning (JISC, 2016;Obeidallah, Al Ahmad, Farouq, & Awad, 2015;Okada, Whitelock, Holmes, & Edwards, 2018) since it plays an important role for preventing academic dishonesty which has increased a lot over the past years (McCabe, 2016;Mellar, Peytcheva-Forsyth, Kocdar, Karadeniz, & Yovkova, 2018;QAA, 2016). On the other hand, there are systems which can validate the identity of learners doing assessment (JISC, 2016) and the research interest in their effectiveness to deter academic dishonesty is increasing (Adkins, Kenkel, & Lim, 2005;Bailie & Jortberg, 2009, Pittam, Elander, Lusher, Fox, & Payne, 2009Levy & Ramim, 2007;Obeidallah et al, 2015). Two types of technologies which address academic dishonesty are recognized in the literature: 1) authentication technologies which seek to establish that the student taking the assessment is really who claim to be (Peytcheva-Forsyth, Mellar, & Aleksieva, 2019, McNabb, 2010; and 2) authorship checking technologies which seek to establish whether a document was actually written by the student who submits it .…”