“…To corroborate that the assessment is completed by the student in the online evaluations, the authentication system must be effective (Al Ansi and Al-Ansi, 2020;Al-Ansi, 2022;Alraimi et al, 2015;Amigud, 2013). In this authentication process, notable developments include procedures similar to those used in the financial services industry, which use random security questions from the student's profile (Bailie and Jortberg, 2009;Ullah et al, 2012), in addition to more advanced methods that use software to biometrically authenticate students through voice (Rudrapal et al, 2012), digital fingerprints (Clodfelter, 2010), iris eye readers (Li et al, 2018), face recognition (Kar et al, 2012) or others that use several of the aforementioned options (Fenu et al, 2018;Ramu and Arivoli, 2013).…”