Dissertation Molepo FJ
Dissertation Molepo FJ
by
MASTER OF ARTS
in the subject
SECURITY MANAGEMENT
at the
SUPERVISOR: Mr MA Mahambane
FEBRUARY 2024
Open Rubric
COPYRIGHT STATEMENT
The rights are mutually held in reserve by the University of South Africa (UNISA)
and Mr. Foletsi Jan Molepo. According to the Copyright Act 98 of 1978, no share of
this material may be duplicated, kept in any retrieval system, be communicated in
any form or be printed, redeployed or vetted by any means (mechanical,
electronically photocopying, recording or else) without preceding written consent
from Mr. Foletsi Jan Molepo and the University of South Africa. Though, consent to
use in these ways any material in this work that is resulting from other sources must
be obtained from the original source. For that reason, original information may be
used and referred to for research and academic purposes as long as it is referenced
properly and recognized.
© UNISA 2024
i
DECLARATION
Foletsi Jan Molepo with student number 36955280 hereby states that the
dissertation “AN ASSESSMENT OF VULNERABILITIES TO MITIGATE THE
LEAKAGE OF GRADE 12 EXAMINATION QUESTION PAPERS: CASE STUDY
OF MBOMBELA MUNICIPALITY IN MPUMALANGA PROVINCE, SOUTH
AFRICA” is my own effort and that all the sources that I have utilised have been
specified and recognised employing comprehensive references and that this work
has not been submitted in the past for any other degree at any academic
establishment.
23 February 2024
SIGNATURE DATE
ii
DEDICATION
I dedicate this dissertation to my late father Lesiba Molepo, and my late sister
Monawa Molepo. You always believed in me when I was younger, and sometimes
I felt under pressure to live up to your expectations. You still had faith in me, even
if I did nothing tangible for you, and I've never understood why. I had no notion that
what God had in store for me was already obvious to you.
iii
ACKNOWLEDGEMENTS
• Above all, I would like to express my gratitude to the all-powerful God the
Father, God the Son, and God the Holy Spirit for giving me the knowledge,
strength, and capacity to complete my degree successfully despite all of the
obstacles I faced along the way. Habakkuk Chapter 2 verse 2–3 reads: “Then
the Lord replied: ‘Write down the revelation and make it plain on tablets so
that a herald may run with it. For the revelation awaits an appointed time; it
speaks of the end and will not prove false. Though it lingers, wait for it; it will
certainly come and will not delay’”.
iv
EXECUTIVE SUMMARY
Examinee impersonation at exam centres, bribery, and the unlawful purchase and
sale of Grade 12 exam papers to minors are among the main issues that the
government and interested parties are concerned about. This study examined the
reasons for question paper leaks for the Grade 12 exam. The study demonstrates
the continuous concerns about exam fraud. The study's findings demonstrate the
variety and ongoing evolution of the cheating techniques found. Furthermore, this
study aimed to evaluate current vulnerabilities and pinpoint risk factors in order to
reduce the possibility of Grade 12 exam question papers leaking in the Mbombela
Municipality of Mpumalanga Province South Africa. A qualitative case study was
used in the research, which was ideal for investigations into intricate social
phenomena. Fifteen (15) participants took part in the study. Focus groups and one-
on-one interviews using semi-structured interview schedules to gather verbal and
written responses were used to gather data for this study.
v
LIST OF ABBREVIATIONS
ANDRE Advanced Near-field Detection Receiver
DB Distribution Box
GP Gauteng Province
MP Mpumalanga Province
vi
PO Police Officer
RF Radio Frequency
UMALUSI Council for Quality Assurance in General and Further Education and
Training
vii
TABLE OF CONTENTS
viii
2.8.3 Beneficence .................................................................................................................. 28
2.8.4 Voluntary participation................................................................................................... 28
2.8.5 Transparency ................................................................................................................ 28
2.9 Limitations of the study ......................................................................................................... 28
2.10 Summary ............................................................................................................................. 29
CHAPTER 3: THEORETICAL FRAMEWORK AND LITERATURE REVIEW ..... 30
3.1 Introduction............................................................................................................................ 30
3.2 Theories and the proponent of the theories as a basis for the manifestation of
examination leakages ............................................................................................................ 30
3.2.1 Institutional Anomie Theory (IAT) ................................................................................. 32
3.2.2 Agnew’s general strain theory ....................................................................................... 33
3.2.3 Deterrence theory ......................................................................................................... 35
3.3 The vulnerabilities and risks of the leaking of examination papers ....................................... 37
3.4 Conceptualising examination question papers ..................................................................... 38
3.4.1 Definition of examination ............................................................................................... 39
3.4.2 Examination leakage ..................................................................................................... 40
3.4.3 Examination malpractice ............................................................................................... 41
3.4.4 Security risk factor and security measures ................................................................... 43
3.5 Examination leakage perspective in Africa ........................................................................... 43
3.5.1 Nigerian perspective on examination leakage .............................................................. 43
3.5.2 Zambian perspective of examination leakage .............................................................. 44
3.5.3 Kenya’s perspective on examination leakage ............................................................... 45
3.5.4 Ghana’s perspectives on examination leakages .......................................................... 46
3.6 Examination leakages in BRICS countries ........................................................................... 47
3.6.1 Crime statistics in Mpumalanga Province ..................................................................... 49
3.7 The purpose of examination .................................................................................................. 50
3.8 Effects and impacts of examination leakages. ...................................................................... 51
3.9 Punishment for examination leakage .................................................................................... 54
3.10 Literature review .................................................................................................................. 56
3.11 Summary ............................................................................................................................. 56
CHAPTER 4: PRESENTATION OF DATA ANALYSIS, EXPLANATION AND
CONCLUSIONS............................................................................................... 58
4.1 Introduction............................................................................................................................ 58
4.2 Data analysis and administration .......................................................................................... 58
4.3 Section A: Biographical details .............................................................................................. 59
4.3.1 Participants ................................................................................................................... 59
4.3.1.1 Gender of participants........................................................................................... 59
4.3.1.2 Age of participants ................................................................................................ 60
4.3.1.3 Marital status of participants ................................................................................. 62
4.3.1.4 Educational qualifications of participants .............................................................. 63
4.4 Section B: Vulnerabilities associated with leakage of Grade 12 examination question
papers .................................................................................................................................... 64
4.4.1 What is your understanding of the concept of “leakage of Grade 12 examination
question papers”? (See Annexure “C” Question 6) .......................................................... 64
4.4.2 What is your understanding of the concept ‘vulnerabilities’ regarding leakage of
ix
Grade 12 examination question papers? (See Annexure “C” Question 7) ....................... 65
4.4.3 Which vulnerabilities to your knowledge contribute to the leakage of Grade 12
examination question papers? (See Annexure “C” Question 8) ....................................... 66
4.4.4 What are some of the vulnerabilities associated with the handling of Grade 12
examination question papers? (See Annexure “C” Question 9) ....................................... 68
4.4.5 What are some of the vulnerabilities associated with the printing of the Grade 12
examination question papers? (See Annexure “C” Question 10) ..................................... 69
4.4.6 What are some of the vulnerabilities associated with the delivery of the Grade 12
examination question papers? (See Annexure “C” Question 11) ..................................... 70
4.4.7 What are some of the vulnerabilities associated with the storage of the Grade 12
examination question papers? (See Annexure “C” Question 12) ..................................... 71
4.5 Section C: Security risk factors associated with the leakage of Grade 12 examination
question papers...................................................................................................................... 73
4.5.1 What is your understanding of the concept ‘security risk factors’ associated with
the leakage of Grade 12 examination question papers? (See Annexure “C” Question
13) ..................................................................................................................................... 73
4.5.2 What types of security risk factors to your knowledge are associated with the
leakage of Grade 12 examination question papers? (See Annexure “C” Question 14) ... 74
4.5.3 How many people are involved in the handling of Grade 12 examination question
papers in Mpumalanga Province? (See Annexure “C” Question 15) ............................... 75
4.5.4 Who are the different persons responsible for the handling of the Grade 12
examination question papers in Mpumalanga Province? (See Annexure “C”
Question 16)...................................................................................................................... 76
4.5.5 Who is responsible for the delivery of the Grade 12 examination question papers?
(See Annexure “C” Question 17) ...................................................................................... 77
4.5.6 What happens if a delivery vehicle is involved in an accident while delivering the
Grade 12 examination question papers to schools in the Province? (See Annexure
“C” Question 18) ............................................................................................................... 77
4.5.7 Are the Grade 12 examination question papers printed by private or government
printers? (See Annexure “C” Question 19) ....................................................................... 79
4.5.8 Who is involved in the printing of the Grade 12 examination question papers?
(See Annexure “C” Question 20) ...................................................................................... 79
4.5.9 What procedures are followed during the printing of the Grade 12 examination
question papers? (See Annexure “C” Question 21) ......................................................... 80
4.5.10 What facilities are used for the storage of the Grade 12 examination question
papers? (See Annexure “C” Question 22) ........................................................................ 81
4.5.11 How secure is the storage facility against theft and unlawful breaking and
entering? (See Annexure “C” Question 23) ...................................................................... 82
4.5.12 For how long is the Grade 12 examination question papers stored in the storage
facilities until they are delivered to the schools? (See Annexure “C” Question 24) .......... 83
4.6 Section D: Security measures to mitigate leakage of Grade 12 examination question
papers. ................................................................................................................................... 84
4.6.1 What security measures are in place to prevent the leakage of Grade 12
examination question papers? (See Annexure “C” question 25) ...................................... 84
4.6.2 Explain the effectiveness of these security measures. (See Annexure “C”
Question 26)...................................................................................................................... 84
4.6.3 Do all personnel handling the Grade 12 examination question papers (officials,
printing, delivering, storing guarding) undergo background checks and screening?
(See Annexure “C” Question 27) ...................................................................................... 86
4.6.4 What are the measures that are put in place during the delivery of examination
question papers? (See Annexure “C” Question 28) ......................................................... 86
4.6.5 What is the contingency plan if vehicles delivering Grade 12 question papers are
x
hijacked? (See Annexure “C” Question 29) ...................................................................... 87
4.6.6 Is the strong room register in place to record the movement of the Grade 12
examination question papers when in the storage area? (See Annexure “C”
Question 30)...................................................................................................................... 89
4.6.7 Does the strong room have a locking door mechanism? (See Annexure “C”
Question 31)...................................................................................................................... 89
4.6.8 What security measures are taken to prevent cell phones and laptops from being
brought into a printing facility, where the Grade 12 examination question papers are
printed? (See Annexure “C” Question 32) ........................................................................ 90
4.6.9 Are officials being subjected to body searches upon entering the printing facility?
(See Annexure “C” Question 33) ...................................................................................... 91
4.6.10 What are the ideal security systems that can be put in place to prevent
examination paper leakage? (See Annexure “C” Question 34) ........................................ 92
4.6.11 Are the norms and standard of handling Grade 12 examination question papers
adhered to? (See Annexure “C” Question 35) .................................................................. 93
4.7 Section E: General ................................................................................................................ 94
4.7.1 Is there anything further you would like to add? ........................................................... 94
4.8 Observation (See Annexure “B”) ........................................................................................... 94
4.9 Summary ............................................................................................................................... 95
CHAPTER 5: FINDINGS AND RECOMMENDATIONS ....................................... 96
5.1 Introduction............................................................................................................................ 96
5.2 A summary of the research ................................................................................................... 96
5.3 Findings related to the research questions ........................................................................... 97
5.3.1 Findings of research question 1 .................................................................................... 97
5.3.2 Findings of research question 2 .................................................................................... 99
5.3.3 Findings of research question 3 .................................................................................. 100
5.4 Recommendations .............................................................................................................. 101
5.4.1 Recommendations based on the findings research question 1: ................................. 101
5.4.2 Recommendations based on the findings of research question 2: ............................. 102
5.4.3 Recommendations based on the findings of research question 3: ............................. 102
5.5 Recommendations for additional research ......................................................................... 103
5.6 Conclusion ........................................................................................................................... 103
LIST OF REFERENCES .................................................................................... 105
ANNEXURE A: Ethical clearance certificate .................................................. 122
ANNEXURE B: Department of Education permission letter ......................... 124
ANNEXURE C: Semi-structured interview schedule ..................................... 125
ANNEXURE D: Informed consent letter to conduct interviews .................... 132
ANNEXURE E: Observation checklist ............................................................ 134
ANNEXURE F: Letter requesting permission to conduct research in the
Department of Education............................................................................. 136
ANNEXURE G: Confirmation of language editing ......................................... 137
ANNEXURE H: Turnitin report ......................................................................... 138
xi
LIST OF TABLES
Table 2.1: Sample of population ........................................................................... 15
Table 3.1: Crime statistics in Mpumalanga Province ............................................ 49
LIST OF FIGURES
Figure 4.1: Gender of participants ........................................................................ 60
Figure 4.2: Age of participants.............................................................................. 61
Figure 4.3: Marital status of participants............................................................... 62
Figure 4.4: Educational qualifications of participants............................................ 63
xii
CHAPTER 1: GENERAL ORIENTATION
1.1 Introduction
According to Adow, Alio and Thinguri (2015:15), all of the major stakeholders in
education are concerned about exam question paper leaks occurring at all levels,
i.e., globally, regionally, and locally. They include policy makers, students, teachers,
political leaders, and the general public. Some of the most common examples of
examination malpractice include question paper leaks, careless impersonation in
testing environments, desperate school owners bribing testing officials, and parents
purchasing leaked papers ahead of time for their children (Chaminuka & Ndudzo,
2014:79).
Considering the ambit of the problem and the manifestation of the irregularities, the
involvement of employees within the Department of Education cannot be ruled out.
It includes cheating in the examination, collusion, dubbing, assault of invigilators or
supervisors and stealing of question papers. Examination leakage is occurring as a
cover for poor learning and teaching (Adow et al, 2015:15).
This chapter discussed the research problem, the rationale for the research and
provides the research questions that were used to achieve the research aims and
objectives of this study. This is followed by key theoretical definitions and an outline
1
of the study.
2
Limpopo gained access to the second Mathematics exam paper before it was
written. The ministerial report found that every one of the 2009 matric exam papers
was leaked in Mpumalanga, devaluing examinations in the province. It is evident
that the leakage of question papers in the Mpumalanga Province was not limited to
the five papers (Maths paper 1 and 2; Physical Science paper 1 and 2 and
Accounting) that were replaced.
There were unlimited complaints from the Department and the community from
Mpumalanga on the leakage of the Grade 12 exam question papers. This research
will help the Department of Basic Education in Mpumalanga to address the
vulnerabilities to mitigate the leakage of Grade 12 examination question papers in
the province.
Since then, the Department finds it difficult to establish the factors leading to
vulnerabilities associated with leakages of Grade 12 examination question papers
for the past years and it continues to occur. These difficulties lead to the
community’s lack of trust on the education system, damaging learners that are not
engaged with leakages (Coetzee, 2015).
3
1.3 Rationale for the study
4
candidates were caught with mobile phones or other electronic devices into the
examination halls. These measures, together with the cancellation of all results of
candidates who brought mobile phones into examination venues did not seem to
yield significant results, as the leakage continued (Chux, 2018).
Leakage of matric exam question papers is a grave concern because of its potential
threat to education systems and certification, and the values that education stands
for (Adow et al, 2015:16).
There are specific question papers that are prone to leakages such as Life Sciences
and Mathematics. The leakage of question papers in the Mpumalanga Province was
not limited to the five papers (Maths Paper 1 and 2; Physical Science paper 1 and
2 and accounting paper) that were replaced (Chuenyane, 2010). Most of the
leakages of Grade 12 examination question papers takes place during printing,
packaging, delivery and within storage facilities (Akaranga & Ongong, 2013:87).
Therefore, vulnerabilities associated with the leakage of Grade 12 examination
question papers in Mpumalanga Province was no exception.
There is a high level of concern about the leakage of exam papers in general
including universities (Ngqakamba, 2019:3). The University of South Africa has
issued a statement regarding the reported leaking of examination question paper.
This time over 17 modules have been compromised and leaked just before students
sits for their final examinations. The leakage of exam papers at the University of
South Africa (UNISA) was investigated by the South African police Service (SAPS)
(Jordan, 2019).
5
of the examination system to mitigate the leakage of Grade 12 examination question
papers. Security measures should be put in place to strengthen the security of the
examination question papers during printing, packaging and transportation.
Adding to that, Nigeria has also experienced examination leakages for decades.
There was an increase in examination leakages in the last two decades in Nigeria
(Nnekwu & Odochukwu, 2016:48). The problem of exam leakages has penetrated
the educational system in Nigeria, from the primary school levels to the tertiary
institutions of learning (Dada, 2014:20). According to Gbagolo (2011:1),
examination leakages started unnoticed in Nigeria and has become a threat to the
educational system.
According to Al-Nokee (2018), during the past few years, Bangladesh has also
experienced problems with the leakage of examination question papers from within
its education system.
Research questions can be used to break the main problem down into questions to
define sub-problems (Walliman, 2011:33). To this effect, Driscoll (2011:158);
contends that a research question or hypotheses should be specific, narrow and
6
discoverable through primary research.
The research questions that were identified and used by the researcher for this
study were as follows:
• What security risk factors are associated with the leakage of Grade 12
examination question papers in Mbombela municipality in Mpumalanga
Province, South Africa?
The research questions culminated into the formulation of a research goal and
research objectives of the study (Kumar, 2005:192).
This study assessed the present vulnerabilities to identify specific risk factors to
mitigate the leakage of Grade 12 examination question papers in Mbombela
Municipality in Mpumalanga Province, South Africa.
7
leakage of the Grade 12 examination question paper may be mitigated.
The prior illegal accessing of an exam question paper by an individual, who is to sit
for the same examination is referred to as ‘examination leakage’ (Mashanyare &
Chinamasa, 2014:47). According to Chux (2018) leakage of exam question papers
occurs when students are in unlawful possession of exam question papers before
they can write the exam.
1.6.2 Examination
Akintunde and Musa (2016:110) define examination as a formal test used to assess
students’ knowledge of a particular subject to tailor the teaching-learning process.
1.6.3 Theft
1.6.4 Security
Jore (2019:157) argue that term security is defined as “perceived or actual ability to
prepare for, adapt to withstand, and recover from danger and crises caused by
people deliberate, intentional, and malicious acts such as terrorism, sabotage and
organised crime”. Security is defined as the feeling of being safe and secure, the
lack of threats, and the management of future risks (Jore, 2019:158).
Physical protection systems involve a number of features that are put in place to
prevent theft, leakages and dissemination and distribution of leaked question
papers (Van Jaarsveld, 2011:5).
8
According to Alnatheer and Nelson (2009:6), information security involves “the
prevention of, and recovery from, unauthorized or undesirable destruction,
modification, disclosure, or use of information and information resources, whether
accidental or intentional.”
1.6.9 Vulnerabilities
Paul (2013:3) argues that it can be defined as “an internal risk factor of the subject
or a system that is exposed to hazard and corresponds to its intrinsic tendency to
be affected or susceptible to damage”. For the purpose of this study, question
papers are vulnerable to theft.
9
1.6.11 Security risk
Amundrud, Aven and Flage (2017:286) define security risk factors as “the
relationship between threats towards a given asset and these assets vulnerable to
the specified threat”. In this context, are those risk factors that give rise to the
leakage of the Grade 12 exam questions paper such as, deployment of same
security guards over and over, poor infrastructure, lack of vetting for officials
involved in handling of the question papers, temptation to sell question papers and
lack of training on handling of question papers, bribery, corruption, theft, poor
safeguarding of question papers, too many persons handling question papers and
making copies of question papers.
The reason for the study, problem statement, research questions, research
purpose, research goals, definitions of essential terms, and dissertation layout were
all introduced in this chapter.
The methodological framework used in this dissertation are all covered in this
chapter.
10
used nationally and internationally.
The analysis and interpretation of data from semi-structured and focus group
interviews is the emphasis of this chapter.
The findings and recommendations of this study are discussed in this chapter.
1.8 Summary
The research problem showed the problem the Department of Basic Education in
in Mbombela municipality Mpumalanga Province is faced with. The Department of
Basic Education in in Mbombela municipality Mpumalanga Province is concerned
about the continuous leakage of Grade 12 examination question papers. Moreover,
the rationale to conduct this study was to assist the Department of Basic Education
in Mbombela municipality in Mpumalanga in addressing the vulnerabilities to
mitigate the leakage of Grade 12 examination question papers and to protect the
integrity of education system.
This study used the research questions as a point of departure to conduct the
research so that the objectives can be achieved and realised. The rationale for this
study and the key concepts defined in this chapter guided the literature study. The
next chapter discusses the research design and methodological approach of the
study.
11
CHAPTER 2: METHODOLOGICAL FRAMEWORK OF THE STUDY
2.1 Introduction
Qualitative methods value the uniqueness of people and settings and do not aim
12
for, nor claim, generalisability, nor are they bound by statistical necessities of
random sampling strategies (Creswell, 2013:23). The study assessed the
vulnerabilities to mitigate leakages of examination question papers of Grade 12 in
Mbombela Municipality, Mpumalanga Province, South Africa by using an
interpretivist phenomenological strategy with the focus on understanding the
experiences of the staff members attached to examination and assessment
directorate and the Department of Education as participants in this study rather than
an interpretation of events (Edmonds & Kennedy, 2017:168).
The research employed a qualitative case study, which is appropriate for studies
exploring a complex social phenomenon. A defining characteristic and advantage
of a case study approach is a focus on depth to obtain a rich complete picture, often
requiring a variety of data tools. In this study, the staff members were thus the “units
of analysis”. Their experiences of assessment of vulnerabilities of exam leakages,
in relation to their career pathways and leadership experiences and practices, were
explored in-depth in their district and provincial contexts and allowed for conclusions
to be drawn about these students in their specific contexts. The study intended to
assess the causes and effects of examination malpractices/leakages using a
descriptive study design with students in Mbombela Municipality, Mpumalanga
Province, South Africa in order to make narrative/descriptive statements about the
social phenomena under study. The qualitative study followed an interpretivist
approach. According to Cohen, Manion and Morrison (2011:34), “A research design
is the arrangement of conditions for collection and analysis of data in a manner that
aims to combine relevance to the research purpose with economy in procedure”.
13
(transparency), and in detail, as the researcher identified and understood the
categories of information that emerged from the data. The study was flexible; data
collection was less structured and more accessible. This reduced the data into sub-
properties, for example, for the category, “sources used to collect security
information”; its properties included open and closed sources of information. Open
sources can include public documents and closed sources may include classified
documents. Each of these documents can be further dimensional if analysis calls
for it. The researcher was able to make the necessary adjustments straight away.
This meant that the whole study was more flowing, naturalistic, participatory, and
interpretive. A case study methodology was also used in this study to aid the
researcher in ensuring validity and dependability.
The population is the entire group included in the study (Creswell, 2014:45). Creswell
(2014:78) defines a population as a well-defined or investigated category of
individuals, resources, components, activities, and groups of items or entire
aggregation of respondents that meet a designated set of criteria. A population
includes all people or items with a specific characteristic.
14
While there are several employees at Mbombela Municipality, Mpumalanga
Department of Education, inter alia, those in human resources, Accounting, etc., this
study drew the sample from employees in the Examinations Department handling the
Grade 12 national examinations. Thus, a purposive sampling technique, a form of non-
probability sampling, guided the inclusion and exclusion of participants. Purposive
sampling identifies and selects participants based on their characteristics and are
information-rich regarding the cases that the researcher is interested in. In this study,
only employees in the Examinations Department handling Grade 12 national
examinations were purposively selected and subjected to face-to-face, semi-
structured interviews. Therefore, the sample and population that were observed are
shown in Table 2.1 below.
15
2.4.1 Sampling
Leedy and Ormrod (2000:150) suggest that “it is imperative for you to determine an
aspect of the population to be involved in your study”. Participants identified for this
research were selected by employing non-probability sampling and purposive
sampling techniques (Cohen et al, 2011:53). The purposive technique is also called
“judgmental sampling” (Babbie, 2016:187). This sampling is based entirely on the
researcher's judgment that a specific sample contains the most typical attributes of
the population being studied (Adler & Clark, 2015:121). Non-probability sampling
involves a non-random selection based on convenience or other criteria, where not
every individual has a chance of being included, allowing the researcher to easily
collect initial data (Creswell, 2014:34). All participants were purposively sampled.
Grinnell and Unrau (2014:297) add that, in using a non-probability technique, the
16
units in a sampling frame do not have an equal chance of being selected for a
particular study. This is particularly acute with interpretive/hermeneutic versions of
the phenomenological method, where the semi-structured interview is almost
hegemonic (Creswell, 2013:62). This is understandable – and indeed, sensible –
given the focus in phenomenological methodology on first-person experience
(Braun & Clarke, 2013:80).
The exploratory case study design was used to study present-day standards in
examination management, both nationally and internationally. The researcher
collected many documents relevant to the case study by pursuing combinations of
procedures, such as examining, categorising, tabulating, testing, or otherwise
recombining (narrative and numeric) evidence. According to Braun and Clarke
(2013:80), the analysis of case study evidence is one of the least developed aspects
of doing case studies. The researcher decided to use the collective case study type
that, according to Fouche and Schurink (2011:322), “is an instrumental case study
which may be extended to several cases.” The reason for using the collective case
study type was to learn more about present-day standards being used in other
similar institutions, more specifically, to get to know how examinations are
conducted both nationally and internationally.
17
2.5.1 Semi-structured interviews
In a semi-structured interview, the researcher sets the outline for the topics covered,
but the interviewee’s responses determine the way in which the interview is directed.
This is the most commonly used type of interview used in qualitative research and
many studies illustrate its use. The semi-structured interview guide provides a clear
set of instructions for interviewers and can provide reliable, comparable qualitative
data. The strength of unstructured interviews is the almost complete freedom they
provide in terms of content and structure. This is in contrast to semi-structured
interviews where the researcher asks a predetermined set of questions, using the
same wording and order of questions as specified in the interview schedule. An
interview schedule is a written list of questions, open-ended or closed-ended
questions, prepared for use by an interviewer in a person-to-person interaction (this
may be face to face, by telephone or through other electronic media). Before visiting
participants, the researcher prepared an interview guide with predetermined
questions (Ellis, 2016:104). According to Ellis (2016:112), “semi-structured
interviews facilitate the collection of rich and thick descriptions and a detailed
exploration of topics from smaller samples”.
Interviews are the dominant tool for collecting qualitative data in social sciences
research (Creswell, 2014:40) because they allow for probing participants’
experiences that could not be revealed by problem-solving tasks. In this study, the
semi-structured interviews captured participants' experiences that might have been
the result of engaging. According to Ellis (2016:104), with semi-structured
interviews, the researcher enters interviews with a firm overview of the relevant
literature and has prepared numerous open questions. With this in mind, the
researcher prepared pre-determined questions to be asked during the interviews.
The primary disadvantage of semi-structured interviews is that they are time-
18
consuming for both the researcher and the participant (Braun & Clarke, 2013:80).
After collecting the data, it was first edited (Creswell, 2014:75). Biases were
acknowledged in the research report so that readers could take them into account.
On the 18th of March 2019 at 13h00, the researcher made an appointment in person
and through emails to the participants to meet them on 27th of March 2019 at 09h00,
also on 16th of April 2017 at 09h00, again on the 17th of April 2017 at 11h00 and
on the 18th of April 2019 at 10h00. They were provided with the dates of the start
and finish of the interviews and had to choose dates which suited them. A day before
the interviews, they were phoned to confirm the appointments. On 27th of March
2019, at 09h00, the researcher used the researcher’s own vehicle and travelled to
the Mpumalanga Department of Education District office A to conduct one-on-one
interviews with two (2) officials and one (1) security officer. The interviews were held
in the boardroom. The interview schedule questionnaire is attached as Annexure C.
A comfortable environment for the participants to feel safe to talk was created. The
researcher began by using personal greetings. The participants were informed of
the aim and objectives of the study. They were also informed that the research was
not funded by any organisation. The participants were given an informed consent
19
form to read and sign if they agreed to the rights contained in the interview schedule.
The letter of informed consent is thus included as Annexure D.
In addition, the researcher asked the participants for their permission to use an
audio tape recorder and were informed that it was only used to ensure that the
conversations between the researcher and the interviewees was recorded for later
use for the purpose of analysis.
20
experience. In light of this, the following researcher's experiences were pertinent to
the study.
The researcher has twenty-two (22) years of experience in the field of security. The
researcher is currently employed by Independent Communication Authority of South
Africa (ICASA) as a Security Manager since the 07th of August 2017 till to-date. The
researcher was previously employed by Mpumalanga Department of Education as
a Security and Risk Manager from 01 of March 2011 to 31 July 2017. The
researcher was responsible for the protection of Grade 12 examination question
papers in the Mpumalanga Province, Department of Education. Therefore, the
researcher has the necessary experience with regard to the study topic as the
researcher was also a former Police Officer (PO) who was responsible for the
protection of dignitaries in Gauteng Province.
In terms of the relevant training, the researcher holds various courses such as
Private Security Industry Regulatory Authority (PSIRA) certificate Grade “B”, SAPS
First phase of Basic Training, SAPS Tactical Policing: Level 1, VIP Protection
Course, SAMTRAC course, National Diploma in Business Management, National
Diploma in Policing, B-Tech degree in Policing and B-Tech degree in Security Risk
Management. Therefore, the researcher is proficient with security terminologies
hence his interest in pursuing this topic.
The researcher was able to access several materials, including security legislation
and procedures, security manuals, security reports, and media articles on security
topics because of his expertise in the field of security. The data gathered from these
sources assisted the researcher in developing the conclusions and suggestions for
this study. Due to the researcher's familiarity with security terminology from having
studied security management as part of the researcher’s qualification, the
experience also aided the researcher in information search and definition of key
concepts, among other tasks. This allowed the researcher to relate the study to the
researcher’s professional and academic experiences, and the researcher’s
accumulated knowledge. The researcher's experience was also beneficial during
observation because the researcher was able to recognise the security measures
currently being used by the Mpumalanga Department of Education to protect
examination question papers while they are in its facilities and in transit to various
21
examination centres. The researcher's ability to quickly generate follow-up
questions for both the participants and the researcher during the interviews was
another benefit of the experience. As a result, the researcher's personal experience
and knowledge were crucial to the study.
The thematic analysis model was adopted as a tool for data analysis in this study.
With this step, the researcher moved from casual, observational note-taking
activities and code identification to systematic coding by labelling the text. The
transcribed data from open-ended questions asked in focus group interviews were
coded. Braun and Clarke (2013:207) explain that “data derived codes can also be
seen as semantic codes as they are based on the semantic meaning of the data
(i.e., they mirror participants’ language and concepts”. Select quotations from the
data were used to develop the themes, appreciating that there should be enough
quotes to provide evidence that the claim of a theme is sound; no quotes were used
22
twice (McGregor, 2018:89). Essentially, the codes-to-theory model for qualitative
inquiry by Saldaña (2015:45) allowed the author to code, categorise, and align
sources with the themes of participants’ responses during the interviews. After these
themes were identified, the researcher assigned codes to categories. The
researcher analysed data manually to show the frequency of text through manual
coding for reasons of consistency and validity of that particular code or category.
2.7.1 Transferability
23
Examination Directorate officials' knowledge and abilities were obtained by the
researcher through one-on-one telephone conversations. The research questions
were structured to get unique responses from each participant. The consistency of
information received from test administrators allowed the researcher to compare the
results from each participant. Transferability was confirmed through a comparison
of one-on-one interview results.
2.7.2 Dependability
The fact that two researchers independently discovered comparable themes that
were then examined by a third researcher lends weight to the idea of dependability,
which relates to whether the conclusions are consistent and reproducible given the
available data. Dependability relates to the consistency and repeatability of the
outcomes, much like reliability does in quantitative research (Guba & Lincoln,
2011:23). An external auditor often examines and assesses the research procedure
and the reliability of the findings to show this. The researcher must create a clear
link between the data and the actions taking place at a specific site that produced
the data in order to show its dependability. Dependability refers to the likelihood that
the study will be repeated by other researchers and that the findings will be
trustworthy.
Dependability is a measure of the calibre of the collected data (Munyai, 2022). The
researcher outlined every step of the process, including choosing study participants,
gathering data, analysing it, interpreting it, and reporting the findings. The data
24
management and collection techniques used in the study produced enough
information to enable the researcher to draw conclusions.
Dependability is related to the documentation of the whole process of the study. The
process of recording the interviews for this study resulted in dependability and
transferability. Through the use of a journal and conversation recordings, the
researcher examined his biases, beliefs, and values that might have an impact on
the research in order to establish reflexivity in the study (Wantenaar, 2022).
• Self-inclusion/self-exclusion
For the purposes of this study, inclusion included all male and female Mpumalanga
Department of Education employees working at one of the department offices,
between the ages of 18 and 65. They are all aware of the security flaws associated
with leakage of Grade 12 test question papers. Fifteen (15) examination authorities
were interviewed after they responded. The selected persons arranged times and
dates for interviews with the researcher. A data saturation led to the exclusion of
fifteen (15) people from the research. Employees who discouraged others from
participating or who had expectations of receiving compensation were excluded.
2.7.3 Confirmability
If results can be independently verified by other people and are unaffected by the
researcher's values, this is referred to as confirmability. The researchers searched
for negative situations that contradicted each of the themes in order to achieve these
requirements. These all contribute to the validity and reliability of the study.
Confirmability of the results employed an audit trail to make sure that the report's
description of the data collection and data analysis methods were accurate (Nowell,
et al, 2017:3). The researcher also described how the study was coded and how
the data were collected, and the procedures of recoding, theming, and theme
naming were appropriately covered. This conversation makes it very evident that
the researcher has adhered to the study direction and has not taken the initiative to
modify the research direction.
25
2.7.4 Credibility
For this study, the researcher included quotations from the participants’ interviews
that were transcribed verbatim to support the validity of the study. After analysis,
the researcher preserved the raw data materials for a fair amount of time (Creswell,
2014:140). In this study, the participants’ information was saved by the researcher
in a locked filing cabinet and data stored in a computer were secured by a computer
password and be destroyed when the study was over. Member verification was
done to improve the validity of the data and analysis depending on the sample size.
Creswell (2014:251) claims that the purpose of member checking was to assess the
validity of the qualitative results by having participants re-evaluate the final report or
descriptions or themes to see if they felt that the findings were accurate.
26
2.8.1 Confidentiality
The proposer used pseudonyms for participants as well as the institutions involved.
As a rule, no third party that expressed an interest in analysing data obtained by the
researcher was allowed access to the data, unless this was known before the data
were collected and participants were expressly asked to consent to such use of
data. The researcher ensured that written permission, usually after the aim of such
analysis, was made known by employing a proposal. Creswell (2017:96) suggests
that raw data be kept for a period of five to ten years in a safe environment, such as
a locked room or safe. Confidentiality was deemed to be significant for the current
study and therefore was carefully respected.
2.8.2 Non-maleficence
This means “to not harm”, whether done intentionally or unintentionally. It denotes
an awareness of any potential harm participants may suffer during the study
(Hardwick & Worsely, 2011:30). To ensure no harm to participants, the author was
guided by Babbie’s (2016:62) guidelines. This included a general agreement
between the researcher and participants about the appropriate and inappropriate
conduct in the research process, e.g., participants were not paid for any time and
effort they gave for answering questions. In addition, the researchers conducted a
thorough investigation of the nature and scope of risks and benefits inherent to the
study. This enabled the author to make the judgement as to whether any risks to
participants were minimised and justifiable, as well as to provide participants with
the information they need to decide whether to take part in the study.
27
2.8.3 Beneficence
The researcher ensured that participants in this study were treated ethically by
having their decisions respected, being protected from harm, and having their well-
being ensured (Creswell, 2017:60).
Participants were advised that their participation in the interview was entirely
voluntary and that they may withdraw at any time. The researcher abided by good
ethical research practices, and participants were not coerced to take part. The
principle of reasonable expectation was observed by the author (Babbie, 2016:62).
“This requires consideration of what information can reasonably be expected from
a person in research participation” (Babbie, 2016:63).
2.8.5 Transparency
The aim, purpose and objective of the study were transparent to the participants,
with no misleading/misrepresentation of facts by the researcher (Padgett, 2017:79).
The researcher explained the aims and objectives of the research to the participants
before the commencement of the interview, and if they were not comfortable in
answering any questions during the interview, they did not need to answer the
question.
There were several limitations to the present study. Key limitations were the
dependence on purposive and snowballing sampling. One of the limitations was
access to participants who postponed the dates. Participants had other
commitments and could not adhere to the appointments. The researcher waited for
the participants to complete their daily schedules to avoid rescheduling. Time
constraints were also a limitation in that some of the participants did not show up as
scheduled. The researcher had to reschedule the meeting many times before being
successful. Future research could include conducting more in-depth interviews that
focus primarily on researchers in other fields. These suggestions for future research
can advance the understanding of examination theft research and further
demonstrate the power and consequences of sharing personal experiences. The
28
last limitation was that some participants did not respond to all the questions, while
others did, making it difficult for the researcher to draw accurate conclusions about
the various features.
2.10 Summary
This chapter included research methods, information validity and dependability, the
importance of this study, ethical issues, and the study's limits. It was essential that
the researcher and the participants maintained the secrecy of the data they had
obtained. The UNISA code of ethics was respected. Participants who had taken part
in the research were given the chance to engage voluntarily without being coerced.
Interviews were carried out skilfully and, as a result, participants expressed
satisfaction when the interview was over. In this study, achieving the study's
objectives was the researcher's main objective. The theoretical framework and
literature review are covered in the next chapter.
29
CHAPTER 3: THEORETICAL FRAMEWORK AND LITERATURE
REVIEW
3.1 Introduction
The previous chapter dealt with research design and research approach which
paved the way for the literature review on examination malpractices and
examination question paper leakage. Exploring theories and proponents thereof, an
overview of risks and vulnerabilities, understanding the concept of examination, the
problems associated with examination leakage, and how it manifests beyond the
borders of South Africa were explored. Finding solutions to examination leakage
required extensive research into the problem. The literature study contributed to
finding such solutions.
3.2 Theories and the proponent of the theories as a basis for the manifestation
of examination leakages
Robert Merton’s anomie theory has seen many interpretations and adaptations over
more than 70 years of its existence. The strain theories found the anomy theory
beneficial to explain crime in a criminological context (Agnew, 2001:38).
30
• It sets out the interrelations among a set of variables (constructs) and, in so
doing, presents a systematic view of the phenomena described by the
variables; and
Nevertheless, for the rationale of this research, three theories that could be followed
by the Department of Education in Mpumalanga Province in order to lessen the
leakage of Grade 12 examination question papers at in Mbombela municipality
Mpumalanga Province South Africa were followed. The three hypotheses are as
follows:
• Deterrence theory.
31
3.2.1 Institutional Anomie Theory (IAT)
Miller et al (2014), explain that variations in cheating across different contexts are
related to the effects of social structures on human behaviour. Messner and
Rosenfeld’s “Crime and the American Dream” (1994 cited in Miller et al, 2014), an
extension of Merton’s anomie theory, argues that the American obsession with
economic success leads to high levels of criminogenic anomie. Messner and
Rosenfeld (2001 cited in Miller et al, 2014) postulate that, when economic
deprivation is combined with weak non-economic institutions, criminogenic
conditions are prevalent. Muftic (2006 cited in Miller et al, 2014) found that American
born students, with higher adherence to the cultural values of universalism and a
fetish of money, were more likely to cheat. Gordon (1975 cited in Miller et al, 2014)
adds that the IAT also applies to the school environment, as pressure to achieve
creates stress for students which causes them to behave more aggressively.
Social controls in schools are being undermined by the global rise of standardised
testing. Teachers and administrators are therefore less able to effectively control
their students’ behaviour as a result of the education system focusing on economic
concerns and neglecting to educate the “whole student” (Miller et al, 2014). As the
IAT applies equally to the education environment, pressure to achieve causes
stress and the obsession with economic success leads to high levels of criminogenic
anomie that includes cheating by students.
32
Building on Merton's Strain Theory, Institutional Anomie Theory emphasises the role
that societal institutions and their values play in the rise in crime. Institutional
Anomie Theory suggests that the drive to succeed, including students' desires to
pass exams, can push them to commit crimes, such as question paper theft,
particularly in countries where material success is greatly prized. Because people
in these countries may resort to illegal means of achieving economic success, this
leads to a rise in crime rates and the undermining of social institutions (Kellegan &
Greeney, 2020:229).
Baijnath and Singh (2019:3), contend that students’ obsession with performance,
pressures and incentives motivate them to cheat during examinations. This includes
the pursuance of; academic accolades; scholarships or admission to postgraduate
programmes; expectations of success by family and social circle; and competitive
job environments. It also may be due to personal greed, dishonesty, and an
underdeveloped moral compass.
The foremost reason for cheating is when examination results are used for
competitive purposes that could have a profound impact on the course of an
individuals’ life, especially for future prospects. Economic circumstances dominate
the reason for cheating, but they also include the potentially low risk of getting
caught, high expectations of parents and family members, and the pressure to get
into competitive areas of tertiary qualifications, such as the medical profession, law
and engineering (Kellegan & Greeney, 2020:224).
33
additional sources of stress or frustration. Deviance is prompted by an inability to
cope, in accordance with lawful means, with negatively perceived events that
produce negative emotions, such as anger.
Smith et al (2013), analysed Agnew’s general strain theory which identified the
following three (3) deviance producing sources of strain:
In support of his deviance producing pathway, Agnew describes three (3) strain-
producing subtypes:
(a) Keeping true to the traditional view of the strain concept, he postulates that,
when a wide gulf exists between an individual’s aspirations and expectations, it
may give rise to stress.
(b) Expanding on the classic view of strain, the focus on idealistic goals would
include more imminent goals. These goals are not necessarily aimed at
achieving monetary success.
34
Baijnath and Singh (2019:2) report on the Vyapam scam, one of the biggest
education scams in the history of Indian education. The scam involved test-fixing of
the admission examination for certain medical schools and administrative positions
in the state. The cause of this scam may have been the wide gulf between individual
candidates’ aspirations and expectations that gave rise to stress and resulted in
cheating behaviour.
Some students experience strain when they feel that they are participating in an
unfair examination system where cheating is endemic. In this situation, they might
believe that their outcome was not equal to their effort and be prompted to cheat in
future examinations.
Deterrence theory suggests that a specific punishment for cheating will deter
offenders and others from committing future crimes. In a legal context, deterrence
refers to a situation in which a person considers committing criminal conduct “but
decides against it or limits it because he or she perceives a risk of legal punishment
and is afraid of the consequences” (Gibbs, 1986:45). This means that the harsher
the punishment, the more likely a rational person will refrain from unlawful conduct.
35
Deterrence theory was revived when criminologists began to speculate about the
topic again, not only as an explanation for why people commit crime, but also as a
solution to crime. The principal assumptions made by the theory include a message
relayed to a target group, secondly, the message the target group receives and
perceives it as a threat, and lastly, the group makes rational choices based on the
information received. The conjecture is made that everyone will be threatened by
the sanction for the crime. But, for some people, crime is a way of life and they
become used to coming in and out of jail. In addition, people who are addicted to
drugs or alcohol may not make rational choices.
It must be noted that deterrence theory is both micro and macro level-based theory.
It proposes that individuals who commit crime and are caught and punished will be
deterred from future criminal activities. It also proposes that “the population will be
deterred from offending when they are aware of others being apprehended and
punished” (Tomlinson, 2016:33).
• Certainty: The victim must be aware that punishment will be meted out.
Therefore, in this context, Grade 12 learners must be made aware that, should
they be caught involved in question paper scandals, they will be punished should
they be found guilty.
36
officials (who should be dismissed from employment and be given jail
sentences). These sanctions will discourage future offenders from partaking in
Grade 12 examination question paper scandals.
The likelihood that a criminal will be apprehended, which determines the certainty
of punishment, is often the weakest component of deterrence. The chance of
punishment rises with an increase in this element, strengthening the deterrent effect
of crime. This result is corroborated by empirical observation. As a result, policies
that boost police presence during the Grade 12 examination processes should be
expected to reduce crimes, such as the theft of Grade 12 examination papers,
because of the increased likelihood of detection and apprehension. In some
circumstances, the deterrent may be harsh to lower the rate of offences. Laws that
harshly punish people who steal Grade 12 examination question papers will lower
the rate of these offences. Similarly, shorter lead times to facilitate speedier trials of
examination question paper crimes will reduce the commission of these crimes
(Crump, 2018).
In this context, learners will be deterred from stealing question papers once they
realise that there will be a serious punishment or sanction like being suspended at
school or sent to jail. The fear of attending courts and long trials will deter the
students from stealing the question papers.
37
Risk, as defined by ISO 31000, is the “effect of uncertainty on objectives” and an
effect is a positive or negative deviation from what is expected. The traditional
definition of risk combines three (3) elements: a potential event and then a
combination of its probability with its potential severity (Praxiom, 2018). Airmic
(2010), mentions that the definition set out in ISO Guide 73 is that risk is the “effect
of uncertainty on objectives”. Placing it in context means that an effect may be
positive, negative or a deviation from the expected. Risks can also be described by
an event, a change in circumstance or a consequence. In the context of this
research, the risk would be examination question papers leakage.
Crossman (cited in Baijnath & Singh, 2019:4), classifies the risk of examination
cheating as an international issue which demands an international response, and
Baijnath and Singh (2019:5) ask the question: “How many institutions of higher
learning have identified examination cheating as a risk on their Strategic Institutional
Risk Registers?” All institutions of higher education should scrutinise the integrity
and credibility of institutional examination processes and create an organisational
awareness of the risks of cheating, fed by technology, human greed and student
creativity. The management of the Wollongong University in Australia pointed at the
risks brought about by technology in examination cheating, saying that the digital
age brought about more opportunities for cheating (Baijnath & Singh, 2019:2).
Kellegan and Greeney (2020:232) believe that tackling real and potential security
breaches require technical expertise and budget. Although funding technology
experts may be expensive, it can prevent potential damage caused by the
questioning of the credibility and qualifications of an institution. Baijnath and Singh
(2019:3) caution that institutions of learning will have to establish appropriate
treatment plans and resource risk mitigation strategies. The Makhere University
degree fraud of 2015 set a precedent of what happens when risk assessment
initiatives are not in place. In a risk mitigation initiative for examination fraud, the
University of Maastricht developed a number of multiple-choice examination papers.
38
3.4.1 Definition of examination
Suleman, Gul, Ambrin and Kamran (2015:166) defines examination in the context
of scrutiny, inspection, inquiry, investigation, and measurement. Nnekwu and
Odochukwu (2016:48) outline examination as a “process of testing and judging by
standard”. This means that the learner’s level of competence of the subject is tested.
Nnam and Inah (2015:52), maintain that examination is a yardstick against which
students’ competence and progress are formally measured and appraised in the
education sector. Tawiah, Alberta, Bosman and Ata (2015:145) state that
examination is a procedure of assessing the amount of learning an individual has
achieved over a certain period.
Examination is a tool used around the education systems (Akaranga & Ongong,
2013:88). Sadiq and Saeed (2017:102), concur that effective examination is the key
to quality education. It is an exercise in academia to determine the level of students’
understanding of particular concepts encountered during the learning process
(Funso, 2016:624). However, Mashanyare and Chinamasa (2014:47) indicate that
an examination is used as a tool for objective evaluation and assessment of
“students’ learning outcomes, ability to demonstrate knowledge, understanding and
potential for other employment skills”. An examination is a practical way of
determining the extent at which a student has achieved instructional objectives in a
particular course of study, according to the planned standards (Suleman et al,
2015:166). Bhirangi and Bhor (2016:28) express the view that examinations prepare
learners in their quest for knowledge.
Njoku and Njoku (2016:161) explain that “examination is one of the major means to
assess and evaluate student’s skills, knowledge and attitude in both general and
specific areas of studies” and Dabone, Graham, Fabea and Dabone (2015:145)
describe an examination as an authentic process used to ascertain the degree to
which learning targets have been inbred by students so that they can be offered
some assistance in their future studies. Examination is a formal test given to
students to evaluate their knowledge in a given subject (Kemunto, 2016:11).
39
of a subject. An examination is also a measuring instrument designed to verify both
a candidate’s value and the value of the teaching outcomes (Suleman et al,
2015:167). Anzene (2014:2), mentions that examinations consist of a formal test of
one’s knowledge or ability in a particular subject especially by means of answering
questions or oral exercises. The regulations of the Department of Basic Education
(DBE, 2014:3) define examination as “the National Senior Certificate examination
conducted at the end of the year”.
For the purpose of this study, examination means the formal instrument measuring
the mastering of a subject. In the context of this study, examination is a tool used
by high schools in Mpumalanga Province South Africa to test the knowledge and
understanding of learners on what has been taught over the academic year.
The leakage of examination question papers manifests in many ways and for
various reasons. Makaula (2018:54, 59) and Muchai (2014:10), state that question
paper leakage occurs when learners have prior knowledge of the questions that
they will answer in an examination. It involves getting examination questions illegally
before the start of the examination.
Kobiowu and Alao (2005:44), explain that the sources of leaking question papers in
public examinations include: the examiners, who set the questions; officers of the
examination body, who process the question papers, handle the printing
arrangements and transport; the printers of the question papers; the custodians who
keep the question papers; and the supervisors. When the content of an examination
or part of it is disclosed prior to taking the examination, this is regarded as
40
examination leakage (Maheka, 2015:16; Ushie & Ishanga, 2016:60). Muhammad
(2015:29) believes that examination leakage occurs when learners access the
contents of the question paper before the initial examination period. Examination
leakage is a proven case of prior knowledge of the content of examination questions
(Ufuoma, 2015:63).
The DBE (2014:1) describes cheating as dishonest acts carried out by candidates
“that are identified before the commencement of the examination, while the
examination question paper is being written or after the examination is written”.
These acts include knowingly making a false statement in respect of the authenticity
of a particular component of the internal assessment in a subject, or the internal
assessment for the subject as a whole.
41
invigilators providing answers to the learners. However, Ushie and Ishanga
(2016:59) describe examination malpractice as a deliberate act of wrongdoing,
contrary to the rules of an examination, designed to give a candidate an undue
advantage.
The former Gauteng Education MEC, Panyaza Lesufi, mentioned that since the
inception of COVID-19, learners have been using new methods to cheat during the
examinations. Examples of these are: hiding answers in their masks, smart
watches, and even on their medical certificates. During the November 2020 matric
examinations, learners were caught cheating using their cell phones and crib notes
(Seleka, 2020).
Govender (2015) reports that aspects of malpractice, such as “group copying”, and
collusion between teachers and their students, were uncovered in seven of the
provinces of south Africa during the 2014 matric examinations. Mail & Guardian
(2005), states that almost 900 Mpumalanga matric pupils, who had their 2004 exam
results nullified for allegedly cheating, would get a second chance. This follows a
finding that the learners were assisted by teachers and invigilators.
42
and the people facilitating these acts, into context.
Amundrud, Aven and Flage (2017:286) define security risk factor as “the
relationship between threats towards a given asset and these assets vulnerable to
the specified threat”. In this context, are those risk factors that give rise to the
leakage of the Grade 12 exam questions paper such as, deployment of same
security guards over and over, poor infrastructure, lack of vetting for officials
involved in handling of the question papers, temptation to sell question papers and
lack of training on handling of question papers, bribery, corruption, theft, poor
safeguarding of question papers, too many persons handling question papers and
making copies of question papers.
43
educational system, from primary school levels to tertiary institutions of learning
(Dada, 2014:20). Gbagolo (2011:1), conquer that examination leakages have
reached a stage where it has become a threat to the credibility of the educational
system.
Njoku and Njoku (2016:164) explain that examination leakages defeat the goals of
education. Despite the importance attached to examinations in schools, and the
stringent rules and regulations governing the conduct of examination processes and
procedures, leakages are very prevalent in Nigeria (Nwadike & Adimonyemma,
2015:16).
Zambia has, over the years, experienced an increase in examination leakage (Phiri
& Nakamba, 2015:327). Maheka (2015:7) states that in 2012, the Examination
44
Council of Zambia (ECZ) recorded five hundred and forty-two (542) cases of
examination leakages. Seven (7) of these cases were reported at grade seven, two
hundred and twenty (220) at grade nine, and three hundred and fifteen (315) at
grade twelve. Maheka (2015:6) remarks that new and ingenious methods of
cheating come to light every examination season. Although the schooling system in
Zambia does not experience the same levels of examination leakage as Nigeria, it
is evident from the sources studied that Zambia is experiencing worrisome levels of
examination leakages.
Munachonga (2014:10) reveals that parents in Zambia who want good grades for
their children go to the extent of bribing their way through the system, the teachers,
and the administration for unearned grades. Teachers have to deal with learners
who do not work but want to be praised and receive undeserved grades.
Owenga, Raburu and Aloka (2018:245) argue that “there has been a significant
increase in examination cheating among students in public schools in Kenya,
especially in Kisumu City”. However, little has been done to curb this practice
(Owenga et al, 2018:245). Apart from it being illegal, cheating in examinations has
a negative effect on academic standards at both institutional and individual student
level (Shibo & Gori, 2017:404).
45
against those involved in examination leakages.
Madara and Namango (2016:71) explain that cheating in Kenya is on the increase
among students in secondary schools, colleges and universities, and the situation
seems to be deteriorating to the extent where examination leakage has become the
norm in Kenya. Nyamoita and Otieno (2016:3883), contend that examination
malpractice constitutes one of the most disturbing problems facing secondary
schools in Kenya. The phenomenon is reported every year when examination
results are released. In Kenya, examination leakage occurs at all levels of
education, from secondary school level to institutions of higher learning.
As for most developed countries, the high stakes placed on examinations in Kenya
influences the prevalence of examination irregularities (Kagete, 2008:4).
Examination leakages are clear indications of the competitiveness of the
examinations, which cause anxieties in candidates, declining ethical standards, and
an erosion of confidence among examinees and other guardians (Kagete, 2008:2).
Madara and Namango (2016:72) explain that “students who are caught cheating
face embarrassment and shame”. They may be banned from the university for a
year; may be denied the right to take examinations at other universities; and may
even be expelled. Thus, the risks associated with cheating are very real (Madara &
Namango, 2016:72).
Thompson and Ansoglenang (2019:8) state that any form of examination leakage
is unacceptable, fraudulent, and implies an act of academic dishonesty with
significant punitive consequences. Folson and Awuah (2014:14) report that, since
the establishment of the West African Examination Council (WAEC) in 1952, it has
been in charge of almost all terminal examinations conducted in Ghana. Although
Ghana experiences examination malpractices, there is a dearth of research on the
46
issue in Ghana.
Since lecturers require learners to repeat the learning material almost verbatim in
the exams, students under pressure to memorise the work revert to examination
malpractices such as paraphrasing lecture notes during exams. Knowledge gained
in this fashion is forgotten soon after the exams (Tawiah et al, 2015:145). In other
words, examination malpractice is encouraged by the fact that teachers expect their
learners to reproduce what they have learnt and not to write on their own
understanding.
Brazil, Russia, India, China and South Africa (BRICS) are all signatories to a
convention to promote peace, security, development and cooperation (South Africa,
2021). The problem of examination leakages and measures taken to manage the
phenomenon within the BRICS conglomerate was briefly discussed below.
Baijnath and Singh (2019:2) report on efforts by the Rajiv Gandhi University of
Health Sciences, and the Jawaharlal Institute of Post Graduate Medical Education
and Research in India to mitigate the opportunities of examination cheating using
technology. These measures include the use of technology jammers to prevent
information sharing, and metal detectors to identify students carrying devices into
examination venues. Wrist watches are banned, and students' earrings are
inspected for hidden Bluetooth devices. Bangalore University and Rajiv Gandhi
University have also considered installing CCTV cameras in the examination
venues.
In South Africa, most of the big universities either prohibit students from wearing
smart watches or require them to be switched off upon entering the examination
venue; universities in China have introduced drones to observe the examinations,
and scan for any suspicious radio signals from hidden earpieces (Baijnath & Singh,
2019:3).
Hernandez (2016 cited in Kellegan & Greeney, 2020:225, 229) reports that the
Chinese government has taken measures to combat examination cheating by
deploying other state bodies, including the military and police, to provide support.
47
Eight police officers were deployed to each of the 96 examination centres in Beijing
to monitor cheating in 2016. Other drastic measures include a new law that provides
for a jail sentence of up to seven years and a ban from taking a national examination
for three years for candidates found guilty of examination malpractices.
The Brazilian Minister of Education announced that their goal was to combat the
electronic points that were still used in high-profile exams such as ENEM. A
statement by the Brazilian Federal Police said that they were actively involved in
repressing examination fraud. They added that, as organised crime increased, they
would introduce new security solutions to address the increase in organised crime
(Security Worldmarket, 2017). In an effort to address use of technology to facilitate
examination cheating in Brazil, the Advanced Near-field Detection Receiver
(ANDRE), a hand-held broadband receiver that detects nearby Radio Frequency
48
(RF) and other types of hidden transmitters, including mobile phones, has been
introduced to detect and prevent examination fraud in Brazil (Security World Market,
2017).
The table above represents the number of other thefts, such as theft of stationery
including examination materials, in Mpumalanga Province reported annually by the
South African Police Service (SAPS) for the past four (4) years. The table depicts a
gradual decrease on this crime in the Mpumalanga Province. However, Kole (2010)
argues that, although crime may decrease in terms of statistics, it increases in terms
of the impact. This is corroborated by the fact that leakage of examination question
papers has a significant impact in the Education sector.
Examination leakage in the BRICS countries manifests in other countries all over
the world. Apart from India and South Africa, none of the other partners had
introduced strategies at national government level to specifically address
examination leakages. Merely introducing and applying legislation to combat the
problem, but not using a multidisciplinary focused strategic approach, may not be
sufficient to solve the problem.
49
3.7 The purpose of examination
Munachonga (2014:7) and Leonard, Alhaji and Linus (2019:44), mention that
education systems around the world use examinations to evaluate and assess the
learning outcomes and the ability of students to demonstrate knowledge and
understanding of what they have learnt. The key reason for holding examinations is
to determine students’ level of understanding after taking a course (Thompson &
Ansoglenang, 2019:8). Permenus (2015:17), indicates that examination is central
to the teaching-learning process. Chaminuka and Ndudzo (2014:79) believe that
examinations test learners’ mastery of the subjects and thus increase their chances
of employment. The employment sector requires people with competitive skills who
can contribute to the economy and to the prosperity of the country.
Wanini (2018:2) mentions that an examination has the tendency to create anxiety,
apprehension and uneasiness in some students. Permenus (2015:1), believe that
examinations in schools are used to measure learners’ understanding of the content
taught to them. If this process is interrupted by examination malpractice, the
purpose of examinations is derailed.
Learners are taught from the beginning of the year and thus at the end are tested if
they understood such subject. However, learners are not encouraged to reproduce
what they have being taught from the textbook, should be encouraged to write in
their own words as a way to illustrate skills, knowledge and understanding of the
50
subject. The purpose of examinations is to test the progress of learners for the
parents and policy makers (Ossai, Ethe, Okwiedei & Edougha, 2014:38). Ndifon
and Cornelius-Ukpepi (2014:118) and Permenus (2015:17) state that examinations
are a means of getting feedback and also serve as a yardstick for assessing and
evaluating the effectiveness of instructional delivery.
51
discipline (Ashiagbot, 2019:2). Munachonga (2014:19) state that Examination
leakage also affects the education sector and the employment sector as employers
are faced with a situation where they recruit qualified, but unskilled employees.
Among the consequences of examination leakage is that the examination loses its
value since people perceive students who pass as those who have cheated (Wanini,
2018:9). Munachonga (2014:1) argues that examination malpractices threaten the
integrity of examinations and the authority of those responsible for conducting them.
It decreases confidence in the educational system (Ushie & Ishanga, 2016:64).
52
the ability of academic institutions to achieve stated objectives (Nyamoita & Otieno,
2016:3884). Examination malpractices tarnish the image and standard of education.
This means that examinations have lost their integrity.
53
or profession without the requisite skills and competence? (Baijnath & Singh,
2019:3–4). The impact of examination leakage has a detrimental effect on learners,
the educational system, the image and credibility of qualifications, productivity and
achievement of the workforce, the success of companies and businesses, and most
of all the economic prosperity of the country.
Madara and Namango (2016:72) mention that students who are caught cheating
face embarrassment and shame; they may be banned from the university for a
period, may be denied the right to take the exam at other universities, and possibly,
expulsion. Thus, the risks associated with cheating are very real (Madara &
Namango, 2016:72). The punishment for examination leakage differs from country
to country. Considering the drastic sanctions by China, it is evident that it views
examination malpractice in a serious light. The death penalty, as sanction for
examinees and examiners, should they be found guilty of cheating, are reportedly
imposed as preventative measure (Munachonga, 2014:8).
Mohlala (2005) indicates that Umalusi, the certification body for the matric exams,
and the Mpumalanga Education Department nullified the results of 843 (eight
hundred and forty-three) candidates after they were found guilty of compromising
the integrity of the matric exams. Teachers involved in cheating, who were found
guilty of misconduct during disciplinary hearings, received fines of R3 000 (three
thousand rands) and written warnings.
54
examinations in Nigeria.
In South Africa, there is no form of legislation that deals with examination leakages.
Regulations issued by the DBE provide directions on dealing with learners who
transgress. Investigation into the transgression is done, and sanction may, for
example, include that the learner be barred from writing examinations for a minimum
of one and a maximum of three subsequent examinations, excluding the
supplementary examinations, suspension from further participation during that
academic year, or a re-examination (DBE, 2014:153–167). Teachers, invigilators,
administrators and other perpetrators will be dealt with in accordance with
legislation relevant to their misconduct. Minister Motshekga, in a press release
announcing the leak of the Physics 2, and Mathematics examination papers,
revealed that the Department had asked the Directorate for Priority Crime
Investigations, The Hawks, to investigate theft and fraud cases (DBE, 2020:1).
In Kenya, candidates who copy other candidates’ work, communicate with others
with intent to assist another candidate, answer an exam question or be in
possession of a textbook, electronic device or material in the exam room without
lawful authority shall be disqualified from taking the entire exam (Permenus,
2015:23). The punishment for those involved in examination malpractice in Kenya
is not as harsh as those in China and Nigeria. Kemunto (2016:38) reports that the
Kenya National Examinations Council Act 2012 provides rules and regulations
governing national examinations conducted in Kenya. Some of the penalties laid
down include a jail term not exceeding ten (10) years or two million Kenya shillings
or both for accessing examination materials and revealing their contents knowingly.
A learner caught cheating may be suspended from taking the examination during
that period, or their examination results nullified. Other role players transgressing is
being treated more harshly, which included criminal charges with sanctions as harsh
as jail sentences. Some countries impose harsher sentences as cheating is
regarded as a criminal offence. In South Africa, specialist law enforcement, like the
DPCI (Hawks), are called upon to deal with transgressors. Most of the countries do
not have examination leakage legislation.
55
3.10 Literature review
According to Walliman (2011:52) one of the first steps in doing a literature review;
is to trawl through all the available information sources in order to track down the
latest knowledge and to assess it for relevance, quality, controversy and gaps. The
researcher views the concept of literature review as it explores the research
available on an issue that is been researched and/or writing about.
3.11 Summary
56
leakage and possible solutions to curb examination leakage were researched to find
solutions. The next chapter discusses presentation of data analysis, explanations
and conclusion.
57
CHAPTER 4: PRESENTATION OF DATA ANALYSIS,
EXPLANATION AND CONCLUSIONS
4.1 Introduction
This section covers the data analysis, interpretation, and conclusions drawn from
the study. The researcher looked over the qualitative information obtained from
observations and interviews. We conducted fifteen (15) individuals in semi-
structured interviews. The one-on-one interviews were recorded using a voice
recorder, and the notes were taken in a diary. During the observation process, a
checklist was used to record security procedures and exam centre management
strategies. The researcher coded the data after transcribing all of the data. The
information was categorized by categories and separated into digestible chunks.
Following data interpretation, the researcher came to some conclusions. This
chapter presents statistics using pie charts.
58
with each participant.
4.3.1 Participants
Mabitsela (2022:59) states that women face different challenges and are
disadvantaged in a myriad of ways. A key reason for this is that there is a perception
that women are ill-equipped to function in a masculine working environment.
Generally, there is a perception that women in the education sector occupy
supportive and administration roles rather than the actual printing of question
papers because it involves intensive labour.
59
Figure 4.1: Gender of participants
Eighty-five percent (n=10) of the 15 participants who contributed to the study were
males and 15 percent (n=5) of the 15 participants were females. Figure 4.1 above
illustrates the gender distribution of the sample. As a result, the purpose of the
participant's gender inquiry was to ascertain how well each gender was represented
in the study. The study showed that female participants were underrepresented
while male participants were overrepresented as alluded to by Mabitsela in
paragraph 4.3.1.1 above.
60
Figure 4.2: Age of participants.
Nichols, Timothy, Rogers, Fisk and West (2001:260) state that human factors
researchers are dedicated to providing data to be used for designing safe, efficient,
usable products and systems for human users. It is paramount that researchers
understand their user population in terms of relevant variables. One of critical
variables is age because age-related cognitive changes are less overt than
accompanying physiological changes. Human factors researchers who work with
populations of variable ages should be concerned with accurately accounting for
related cognitive differences in their participant sample. In this case, the researcher
preferred to work with participants of different age groups to gather a diverse range
of variables regarding the working environment at the printing facility.
The participants’ ages were categorised into four (4) groups of 25–29, 30–39, 40–
49 and 50–55 years. Figure 4.2 above shows that there were no participants from
the age group of 18–24 years and 56+. The age group of 25–29 years was
represented by 55 percent (n=6) of the 15 participants. The age group of 30–39
years was represented by 25 percent (n=4) of the 15 participants. The age group of
40–49 years was represented by 13 percent (n=3) of the 15 participants. The age
group 50–55 years was represented by 7 percent (n=2) of the 15 participants.
61
4.3.1.3 Marital status of participants
The relationship between women’s employment and the risk of divorce is both
complex and controversial. The role specialisation or interdependence view of
marriage argues that the gains for marriage for both partners decrease when both
are in the labour market and hence women’s employment destabilises marriage. In
contrast, the economic opportunity hypothesis asserts that a female labour force
participation does not intrinsically weaken marriage but gives women resources that
they can use to leave unsatisfactory marriages (Schoen, Astone, Kim, Rothert &
Standish, 2002:643) In this context, the data show that the majority of the
participants were either single or divorced.
Figure 4.3 above shows that the participants’ marital status was divided into four
categories. Furthermore, the table shows that 45 percent (n=6) of the 15
participants, which is the majority of the participants in the study, were single. The
table also shows that 30 percent (n=4) of the 15 participants were married. Fifteen
percent (15%) (n=3) of the 15 participants were divorced, whilst 10 percent (n=2) of
the 15 participants in the study were widowed.
62
4.3.1.4 Educational qualifications of participants
Massing and Schneider (2017:6) state that educational qualifications and literacy
skills are highly related. This is not surprising as it is an aim of educational systems
to equip individuals with competencies necessary to take part in society. Because
of this relationship, educational qualifications are often used as a proxy for human
capital. It is clear that participants' educational backgrounds may have an impact on
their contributions to the study.
63
4.4 Section B: Vulnerabilities associated with leakage of Grade 12
examination question papers
The researcher posed the above question to provide participants with a chance to
elaborate on their experiences. These are the verbatim responses of the
participants below:
• Participant A1: “when the students receive the question papers before they
can write that examination”.
• Participant B2: “when question papers are circulated before they can be
written”.
• Participants C3 and D4: mentioned that it is “when students get the question
papers before the scheduled date according to their timetable”.
• Participants E5 and F6: said “when learners have access to the question
paper before the writing date”.
• Participant G7: “when students get the question papers before the date of
the exam”.
• Participant H8: “when question papers reach the students before the actual
date of the examination”.
• Participants I10, K12 and N14: “refers to the question papers being accessed
by wrong person prior to the date on the timetable”.
• Participant L11: “when some of the learners get the question papers before
the actual time, i.e. before their date on the timetable”.
64
The purpose of this question was to establish whether the participants in this study
were familiar with the definition of the leakage of question papers. It is evident that
100% percent (n=15) of the 15 participants in this study indicated that they
understand the definition.
Interpretation
• Participant B2: “when question papers are exposed to risks like being stolen
and eventually leaked to the students”.
• Participant C3: “when good systems are not in place to ensure that all the
weaknesses regarding the safe keeping of question papers are monitored
and managed”.
• Participant D4: “when the measures in place are not good enough to sustain
the protection of question papers and ultimately, they are lost”.
65
• Participant J9 and I10: mentioned that “vulnerabilities relate to factors which
may lead to the leakage of Grade 12 question paper”.
• Participant L11: “when security systems are not in place to guard against the
leakage of question papers or there is poor management and control of
question papers”.
• Participant N14: “talks to factors which can lead to the leakage of question
papers”.
The purpose of this question was to establish whether the participants understand
the concept of vulnerabilities regarding leakage of Grade 12 examination question
papers in the study. It is evident that 90 percent (n=14) of the 15 participants in this
study are familiar with the concept whilst 10 percent (n=1) of the 15 participants are
not familiar with the concept of vulnerabilities as it relates to leakage of question
papers.
Interpretation
Evidently, most of the individuals involved in this research are aware of the notion
of vulnerabilities in relation to exam leaks. Not a single person said they were
unfamiliar with the idea. The definition of vulnerability, according to Paul (2013:3),
is "an internal risk factor of the subject or a system that is exposed to hazard and
corresponds to its intrinsic tendency to be affected or susceptible to damage."
66
procedures which should direct the staff on how they should conduct
themselves when dealing with question papers”.
• C3: “they are so many I can think of like lack of infrastructure particularly at
the rural areas”.
• Participant D4: “lack of protection for the question papers like deploying one
group who print question papers instead of rotating them”.
• Participants E5, G7, H8 and K12: stated that “lack of proper maintenance
plan to security systems contribute to the leakage of question papers”.
• Participant F6: “lack of screening of the officials who handle the question
papers”.
• Participant J9: “not following the norms and standards of handling question
papers contribute to the leakage of question papers”.
• Participants I10 & L11: mentioned “bulk printing of question papers and lack
of monitoring at the printing facility contribute to the leakage of question
papers”.
• Participant M13: “lack of access control to the printing facility and lack of
proper relations with stakeholders contribute to the leakage of question
papers”.
• Participant O15: “Printing of different question papers at the same day using
the same machine contribute to the leakage of question papers”.
The purpose of this question was to establish vulnerabilities which contribute to the
leakage of Grade 12 examination question papers in the study. It is evident that 100
percent (n=15) of the 15 participants in this study are familiar with vulnerabilities
which contribute to the leakage of question papers. They mentioned the following
risk factors: deployment of same security guards over and over; poor infrastructure;
lack of training on handling of question papers: poor safeguarding of question
papers; too many persons handling question papers; and using the same printing
machine contribute to the leakage of question papers.
67
Interpretation
Based on the inputs provided above, it is clear that every one of the 15 research
participants is aware of the vulnerabilities that lead to question paper leaks. The
following risk factors were mentioned by participants: Question papers leak due to
repeated use of the same security guards, inadequate infrastructure, inadequate
training for managing them, inadequate safeguarding, excessive personnel
handling them, and sharing a printing device. "Security risk factor" is defined by
Amundrud et al. (2017:286) as the connection between threats to a specific asset
and the fact that these assets are susceptible to the danger in question.
4.4.4 What are some of the vulnerabilities associated with the handling of
Grade 12 examination question papers? (See Annexure “C” Question 9)
• Participants A1, B2, C3, D4, F6, G7, J9, I10, N14 and O15: mentioned that
“too many people are handling the question papers, and this cause a problem
because of the long chain”.
Participants A1, B2, C3, D4, E5, F6, G7, J9, I10, N14 and O15 who represent 70%
(n=10) of the 15 participants in this study, mentioned that too many people are
handling the question papers. Other participants, which represent 30% (n=5),
indicated other factors like unvetted officials and negligence from the officials.
Interpretation
This question was designed to determine whether there are any printing-related
vulnerabilities that could be contributing to the leakage. A little over 70% of the
study's participants said that too many persons are handling the question papers.
Merely thirty percent of the respondents cited elements such as officials'
carelessness and lack of screening. The assertion afore was concurred to by
Makaula (2018:45), who postulate that incorrect handling of exam questions
68
happens during the printing and distribution of the papers to the testing locations.
4.4.5 What are some of the vulnerabilities associated with the printing of the
Grade 12 examination question papers? (See Annexure “C” Question 10)
• Participants A1, B2, C3, D4, E5, G7, L11, M13 and N14: mentioned that
“printing too many question papers at the same time and printing same
papers, i.e. paper 1 and 2 of Mathematics at the same time causes confusion
and mixed up”.
• Participants F6 and K12: indicated that “lack of access control at the printing
facility and allowing staff members to bring the gadgets at the printing facility”.
• Participant H08: “during lunch time the printing facility doesn’t close all
together. You will find that there are few people inside the facility with lot of
question papers lying down”.
• Participants J09 and I10: indicated that “poor handling of soft copy (memory
stick) received from National Head Office, and not flushing out the printing
machines before introducing a new job”.
The purpose of this question was to establish vulnerabilities associated with the
printing of examination question papers which contribute to the leakage.
Participants A1, B2, C3, D4, E5, G7, L11, M13 and N14, which represent 60% (n=9)
of the 15 participants in this study, mentioned that printing too many question papers
at the same time contributes to the leakage during printing. Participants F6 and
K12, which represent 15% (n=2), indicated other factors like a lack of access control
at the printing facility and allowing staff members to bring the gadgets into the
printing facility. Participants J9 and I10 which represent 15% (n=2) of the study
mentioned “poor handling of the memory stick and not flushing off the printing
machines before introducing a new job”. Participants J08 and O15, which represent
10% (2) of the study, indicated that, during lunch time, the printing facility does not
close and there are a few people in the printing facility with question papers lying
around.
69
Interpretation
4.4.6 What are some of the vulnerabilities associated with the delivery of the
Grade 12 examination question papers? (See Annexure “C” Question 11)
• Participant A1: “accidents in the road can make the question papers to be
vulnerable to theft”.
• Participant B2: “drivers who are not being vetted and use their cellphone
while they are on the road delivering question papers makes them
vulnerable”.
• Participants D4, E5, H8, L11, M13 and N14: mentioned that “community
protest is one of the vulnerabilities as angry mob can hijack the vehicle
ferrying the question papers”.
• Participant F6, G7 and K12: mentioned using “the same drivers to deliver
question papers and drivers using the same routes to deliver every day”.
• Participant J9 and I10: mentioned that “allowing one person or only the driver
to deliver the question papers from point A to point B and poor sealing of
containers carrying the question papers”.
The researcher wanted to ascertain the vulnerabilities associated with the delivery
of examination question papers. Participants A1, B2 and C3, which represent 18%
percent (n=3) of the 15 participants in this study, mentioned that road accidents,
drivers who are not vetted, and branded delivery vehicles are some of the
vulnerabilities associated with the leakage of question papers.
70
Participants D4, E5, H8, L11, M13 and N14, which represent 52% (n=6), mentioned
that community protest is one of the vulnerabilities as an angry mob can hijack the
vehicle ferrying the question papers. Participants F6, G7 and K12, which represent
16% (n=3) of the study, mentioned that drivers who prefer the same destination
every day make the delivery of question papers vulnerable. Participants J09 and
I10, which represent 10% (2) of the study, indicated that allowing only the driver to
deliver the question papers from point A to point B and poor sealing of containers
carrying the question papers make the delivery vulnerable, while participant O15,
which represents 4% (1) of the study, blamed poor recording of question papers
during the dispatch.
Interpretation
The purpose of this question was to help the researcher identify any weaknesses in
the way the exam question papers are delivered. Four (4) of the aforementioned
participants brought out the existence of vulnerabilities such as unvetted drivers,
delivery cars with branded names, and traffic accidents. One of the risks, according
to about eleven (11) study participants, is community protests, as enraged crowds
have the potential to hijack the car transporting the exam papers. Exam leakage
can also be caused by the method of transportation used to send exam question
papers, claim Mashanyare and Chinamasa (2014:50).
4.4.7 What are some of the vulnerabilities associated with the storage of the
Grade 12 examination question papers? (See Annexure “C” Question 12)
• Participant A1: “question papers should not be stored for too long at the
storage areas”.
• Participants B2 and L11: mentioned that “question papers are stored in the
storages without burglar proofs and security guards”.
• Participant C3: “same staff members work over and over without rotation,
and this create a problem to those that are side-lined”.
• Participant D4: “fire damage, rainfall can compromise the security of the
question papers at the storages”.
• Participants E05, F6, G7, N12 and M13: mentioned that “break-ins and theft
71
are some of the vulnerabilities at the storages”.
• Participants J09 and N14: mentioned that “not using a double locking system
can compromise the question as one person is responsible for the keys”.
• Participant O15: “lack of strong rooms and CCTV cameras are some of the
vulnerabilities in the storage areas”.
The researcher wanted to find out the vulnerabilities associated with the storage of
the question papers. Participants A1, B2, C3 and D4, which represent 30% percent
(n=4) of the 15 participants in this study, mentioned different factors that contribute
to the leakage at the storages such as the absence of security guards and question
papers that are stored for a very long time at the storage facilities. Participants E05,
F6, G7, N12 and M13, which represent 36% (n=5), indicated that burglary and theft
were some of the vulnerabilities at the storages. Participants H8, I10, J9 and N14,
which represent 30% (n=4) of the study, mentioned infrastructure issues at the
storages as some of the vulnerabilities. Participant O15, which represents 4% (1) of
the study mentioned the absence of strong rooms as some of the vulnerabilities.
Interpretation
72
4.5 Section C: Security risk factors associated with the leakage of Grade 12
examination question papers.
• Participants G07, H8 and I10 indicated that “there are issues which relates
to security that needs attention like malfunctioning of cameras”.
• Participant J9: refers to “any possibilities which may lead to a leakage of the
Grade 12 examination question paper”.
• Participants N14 and O15: mentioned that “security measures which are not
effective and can’t achieve the objective of protecting the examination
question papers”.
Interpretation
This question was asked by the researcher to see if the participants grasped the
idea of security risk factors. Most participants demonstrated an understanding of
the idea of security risk factors. They added that in order to prevent security lapses
that could lead to question paper leaks, these risks needed to be evaluated and
reduced. Security risk factors are defined by Amundrud et al. (2017:286) as the
73
connection between threats to a specific asset and the likelihood that these assets
will be vulnerable to the identified threat.
4.5.2 What types of security risk factors to your knowledge are associated
with the leakage of Grade 12 examination question papers? (See Annexure
“C” Question 14)
• Participants A1, B2, E5, G7, H8, J9, K12 and N14: mentioned that “lack of
maintenance of security systems”.
• Participants C3 and D4: mentioned that “staff members work over and over
without rotation, and this create a problem to those that are side-lined. There
should be a rotation so that everyone gets equal opportunity to work
overtime”.
• Participant F06: “Allowing staff members to bring the gadgets at the printing
facility and storing printed question papers at the storage facility for a long
time”.
• Participants I10 and L11: mentioned that “lack of monitoring at the printing
facilities and poor packaging of question papers”.
Participants A1, B2, E5, G7, H8, J9, K12 and N14, which represent 60% (n=8) of
the 15 participants in this study, mentioned that the lack of a preventative
maintenance plan is one of the main issues as the security systems do not always
function. Participants C3 and D4, which represent 4% (n=2) of the 15 participants,
mentioned that staff work overtime without rotation. Participants F06, I10, L11, M13
and 015, which represent 36% (n=5), mentioned various issues, such as unlawful
gadgets in the printing room and printing of more question papers at the same time,
as major contributions to question paper leakages.
Interpretation
The researcher asked this question in order to identify the kinds of security risk
variables connected to the leakage of Grade 12 exam questions. While the security
74
systems aren't always working, eight (8) participants stated that one of the biggest
problems isn't having a preventative maintenance plan. Employees are working
overtime without taking breaks, according to two (2) participants. Five (5)
participants identified a variety of problems as having a significant role in question
paper leaks, including the use of illegal devices in the printing area and the
simultaneous printing of more question papers.
4.5.3 How many people are involved in the handling of Grade 12 examination
question papers in Mpumalanga Province? (See Annexure “C” Question 15)
• Participant A1: “they are too many hands handling the question papers
because they go through a long route before, they arrive at school”. This
confirms that question papers are handled by a lot of people before they are
delivered to the schools.
• Participant D4: “that may be more than ten (10) officials because question
papers are being handled at the different layers. Like through collection from
Pretoria, printing, storage and delivery”.
• Participant E5: “At Head office is about twenty (20) officials (that include
departmental staff, printing company staff and security personnel) at the
printing facility. At the district offices, is about six (06) and circuit offices is
about two (02)”.
• Participants J9 and O15: mentioned that “two (02) senior officials in the sub-
directorate called Item Development and Question Papers”.
• Participant I10: “more than five (5) people do handle question papers”.
• Participant L11: “more than ten staff members in different areas i.e. Head
Office, Districts, Circuits and schools”.
• Participant M13: “district offices is about six people and two at the nodal
75
point”.
• Participants N14: “more than 16 people”.
Interpretation
4.5.4 Who are the different persons responsible for the handling of the Grade
12 examination question papers in Mpumalanga Province? (See Annexure
“C” Question 16)
• A Participants 1, B2, C3 and G7: mentioned that “they are collected by the
management from HQ in Pretoria, then printed at the Provincial Office, then
they go the district and then to circuits”.
• Participants D4, E5, F6, H8, I10, M13 and N14 revealed that “management
from HQ, printing officials, drivers, officials at the districts, circuits and chief
invigilators”.
• Participants J09, L11 and O15: revealed that “senior officials are involved in
the process”.
• Participant K12: “the printing manager from the private company and printing
staff”.
Participants D4, E5, F6, H8, I10 and N14, which represent 48% percent (n=6) of the
15 participants in this study, concurred that the question papers are mainly handled
by the management and other junior officials up to the school level. Participants
A1, B2, C3 and G7, which represent 38% (n=4) of the study, also indicated that
management is mainly responsible for handling the question papers. Participants
76
J09, L11, O15 and K12, which represent 14% percent (n=4) of the 15 participants,
mentioned that the senior officials and printing manager are responsible for the
handling of question papers.
Interpretation
The researcher wanted to learn more about the various layers of individuals that
manage the question papers. Six (6) individuals agreed that management and other
lower-level staff handle the question papers most of the time. According to four (4)
participants, management is mostly in charge of handling the question papers. Four
(4) more participants hinted that senior officials and printing manager are
responsible for handling the question papers. The aforementioned data
demonstrate that different individuals at different stages handle the question papers.
4.5.5 Who is responsible for the delivery of the Grade 12 examination question
papers? (See Annexure “C” Question 17)
• Participants A1 to O15 indicated that “question papers are delivered by the
same drivers every year to the same area”.
Interpretation
The researcher asked this question to determine who is in charge of distributing the
question papers. The departmental drivers are in charge of delivering the question
papers, according to every participant. The participants brought up the fact that
question papers are susceptible to leaking since the same drivers distribute the
question papers year after year without doing a rotation with other staff.
• Participants B2 and I10: said they “don’t know what should be done if
accident happens”.
77
• Participant C3: “Police will assist because sometimes they escort the
question papers”.
• Participant E5: “the matter must be reported to the nearest police station to
ensure that the accident scene is secured to avoid leakage of question
papers”.
• Participant G7: “drivers must leave the accident scene until the police arrive
or management arrive at the scene”.
• Participant H8: “there is a plan whereby Head of Security will liaise with the
Police for assistance. This means the police must be notified in time once
there is a breakdown”.
• Participant J9: “It never happened, but if it does, another vehicle should be
dispatched to the scene to take the question papers from the vehicle in an
accident”.
• Participant K12: “nearest police station will be informed to take over the
situation”.
• Participant M13: “swift report to the nearest police station to ensure that the
accident scene is secured to avoid a leakage of a question paper”.
Participants A1, C3, D4, G7, L11, K12, M13, N14 and O15, which represent 84%
percent (n=9) of the 15 participants in this study, indicated that the delivery vehicles
are escorted by the Police and, in case of an accident, they will take over.
Participants B2 and I10 which represent 10% (n=2) of the study, mentioned that
they do not know while participant F6 which represents 6% percent of the 15
participants, did not answer the question.
78
Interpretation
In the event that an accident occurs when the delivery vehicle is transporting the
question papers, the researcher was interested in learning about the backup plan.
Nine (09) participants said that the police escort the delivery cars and will take
charge in the event of an accident. One (1) participant did not respond to the
question, while four (4) participants stated that they were unsure. The
aforementioned findings demonstrate that there is a backup in case of an accident.
Interpretation
When posing this question, the researcher's goal was to find out who prints the
department's question papers. Every respondent stated that the printing company,
which has a contract with the Mpumalanga Department of Education, prints the
exam papers. Although it was evident that a private service provider was hired to
handle the services, it was unclear who will be held accountable in the event that a
question paper leaks.
• Participant D4: “not sure who is involved in printing, but it could be staff from
the Department of Education”.
79
Interpretation
The feedback provided by the aforesaid participants indicate that the process of
printing question papers is vulnerable due to the involvement of multiple parties.
Thirteen (13) participants hinted that the Department of Education's officials, the
employees of the printing company, and private security guards are overseeing the
process of printing the question papers. One participant expressed uncertainty
about the identity of those involved in printing, while another mentioned a
department official. The Department needs to figure out how to cut back on the
number of printing officials, especially those employed by commercial service
provider.
4.5.9 What procedures are followed during the printing of the Grade 12
examination question papers? (See Annexure “C” Question 21)
• According to participants A1, B2, C3, G7, I10, K12 and O15: “the question
papers are collected from National Head Office and stored in a strong room.
Two (2) senior officials will collect the question papers and submit them to
printing area”.
• As stated by participants E5, F6, L11 and N14, “senior officials collect master
copies of question papers from the Department of Basic education in Pretoria
and store them in the strong room for printing”.
• Participant M13: “One (1) paper is printed at a time then checked; if all is in
order, printing continues”.
The feedback from participants A1, B2, C3, G7, I10, K12 and O15, which represent
76% percent (n=7) of the 15 participants in this study, suggests that question papers
are collected from Head Office in Pretoria and stored in the strong room for printing
Participants D4, H8 and J9, which represent 8% (n=3) of the study, mentioned that
hard copies are retrieved from the strong room before printing starts. Meanwhile,
participants E5, F6, L11 and N14, which represent 16% percent (n=4), agree that
master copies are collected from Pretoria and stored in a strong room for printing.
80
Interpretation
The researcher was interested in learning about the processes used in question
paper printing. The majority of participants mentioned that question papers are
gathered from the central location and kept in the strong room for printing purposes.
A few participants brought up the fact that hard copies are taken out of the strong
room prior to printing. The aforementioned findings indicate that most participants
are aware of the processes involved in the printing of question papers.
4.5.10 What facilities are used for the storage of the Grade 12 examination
question papers? (See Annexure “C” Question 22)
• Participants A1, B2, C3, D4, E5, F6, G7, J9, I10, and L11: said “the strong
room is used as a storage”.
• Participants M13 and O15: said “question papers are stored in storages and
staffrooms at the schools”.
The study showed that 85 percent of the 15 participants indicated that question
papers are stored in the strong room while 15 percent of the participants mentioned
that classrooms and staff rooms are also used as the storage areas at the schools.
Interpretation
Question papers are kept in the strong room, according to twelve participants.
However, three (3) of the participants brought up the fact that staff rooms and
classrooms are also utilised as storage spaces in schools. This demonstrates that
the Department lacks appropriate policies for the storage of exam papers at various
locations. To protect the exam papers, more secure storage facilities need to be
established, and their security features need to be improved (Adeyemi, 2019).
81
4.5.11 How secure is the storage facility against theft and unlawful breaking
and entering? (See Annexure “C” Question 23)
• Participants A1, G7, H8 and L11: mentioned that “storage facilities are
secured because most of them have CCTV cameras”.
• Participants B2 and E5: mentioned that “most of the storage facilities are not
secured because of poor infrastructure”.
• Participants C3 and I10: mentioned that “they never visited the storage
facilities”.
• Participants D4 and O15: mentioned that “they look secured only at Head
office, but once the question papers are at schools, it is easy for break-ins to
happen”.
• Participant J9: “the question papers are stored in classrooms at the schools,
and it is not safe”.
• Participant K12: “most of the storages have physical guarding, but this
doesn’t mean they are secured as guards can collude with the officials”.
• Participant N14: “they are not secured because security guards sleep during
the night”.
Interpretation
According to the participants’ responses above, the majority of storage facilities are
not safe or suitable for keeping the question papers. Even at the school level, the
Department of Education ought to think about constructing study rooms to prevent
theft and break-ins. According to the study, exam papers are still susceptible to
being stolen at storage facilities. According to Liebenberg (2020:16), theft is the
unlawful appropriation with intent to steal something with the intention of stealing
something that can be stolen. The basic definition of theft, with regard to its intent
and function, was the covert removal of property from its owner's custody and
control.
82
4.5.12 For how long is the Grade 12 examination question papers stored in
the storage facilities until they are delivered to the schools? (See Annexure
“C” Question 24)
• Participants A1 and H8: indicated that they “are not sure”.
• Participants B2, D4, F6 and G7: indicated that they “are stored for a period
of more than five days”.
• Participants C3, I10 and N14: indicated that they “don’t know”.
• Participants E5 and L11: mentioned that “the district offices question papers
are stored for a week”.
• Participant J9: “at Head Office they are stored for approximately two (2)
weeks. The consignment is then delivered to districts and stored for a week.
Districts deliver to circuits where they are stored for one night”.
• Participant M13: “they are stored for three (3) days at Provincial Head Office
before they are dispatched to the schools”.
• Participant O15: “they are stored for one (1) week at Head Office. Then
delivered to districts and stored for a period of three (3) days. Then delivered
to circuit offices where they are stored for one (1) day”.
Interpretation
The purpose of the question was to ascertain how long the test papers are stored
in the facility. It is clear that before being supplied to the examination sites, the
question papers are kept in storage facilities for more than two (2) weeks. This is
risky because there is a greater chance of burglary during the extended stay at the
storage facilities. Exam papers should be printed and given to centres daily,
according to Simui, Chibale, and Namangala (2017:299), to ensure fairness in the
examination writing process and to prevent students from spending a day in class
before the exam. Unauthorised access may be possible due to weaknesses in
certain places. According to Kitainge (2019), question paper leaks are more likely
when there are insufficient security measures in place at storage facilities and during
transportation.
83
4.6 Section D: Security measures to mitigate leakage of Grade 12 examination
question papers.
4.6.1 What security measures are in place to prevent the leakage of Grade 12
examination question papers? (See Annexure “C” question 25)
• Participants A1, B2, E5, G7, H08, I10, L11 and O15: indicated that “there are
CCTV cameras, access control system and security guards”.
• Participants C3, K12 and M3: indicated that “there are boom gates and alarm
systems”.
• Participants D4 and N14: indicated that they “are not sure of any measures
in place but there are security guards patrolling”.
Interpretation
This question was intended to evaluate the security protocols in place to reduce the
risk of question paper leaks. The participants enumerated a number of procedures
put in place to lessen the possibility of question paper leaks, including physical
guarding, access restriction, and CCTV cameras. These measures are inadequate,
as evidenced by the ongoing leakage of question papers. According to Alshboul
(2010:2), a security measure is the plan to put controls and guidelines in place to
protect assets and information security. Security control lessens security threats'
and vulnerabilities' effects to an extent that the organisation can tolerate.
4.6.2 Explain the effectiveness of these security measures. (See Annexure “C”
Question 26)
• Participants A1 and E5: mentioned that “security measures are effective, but
you know that there is always a way of breaching the measures by bribing
the security guards”.
• Participants B2 and L11: mentioned that they “are not so effective because
84
we still rely on human intervention”.
• Participants D4, G7 and M13: mentioned that “we can only confirm
effectiveness if there was no human intervention because we can’t trust
guards as they are human beings”.
• Participants F6 and H8: mentioned that “security measures are not effective
due to lack of maintenance on the security systems”.
• Participants I10 and K12: mentioned that they “are not so effective because
the CCTV cameras are only monitored during the day”.
• Participant N14: mentioned that “they are not effective because there is no
uninterrupted power supply (UPS). If the electrical distribution box (DB) is
tampered with, it means all the security systems will be down”.
The researcher wanted to find out if the security measures in place are effective.
The study showed that 60% percent (n=8) of the 15 participants indicated that the
measures in place are not very effective due to the human intervention.
Furthermore, 40% percent (n=7) of the participants indicated that cameras are only
monitored during the day. This shows that security guards cannot be entrusted with
the responsibility to monitor the question papers.
Interpretation
According to the study, eight (8) of the participants said that the human interaction
makes the measures in place less effective. Seven (7) more participants agreed
with the previous assertion that the security personnel are untrustworthy and only
keep an eye on the CCTV cameras during the day. It is clear that the Department
has to bolster some of its security protocols in order to protect the exam papers.
Exam administrators and security personnel are also accountable for exam question
paper leaks, according to Furo (2015:6). There are times when certain law
enforcement officers stationed at schools are bribed (Akintunde & Musa, 2016:112).
85
4.6.3 Do all personnel handling the Grade 12 examination question papers
(officials, printing, delivering, storing guarding) undergo background checks
and screening? (See Annexure “C” Question 27)
• Participants A1, B2, D4, E5, F6, G7, H8, J9, L11, K12, N14 and O15: said
“no, not everyone handling the question papers underwent background
checks and screening”.
• Participants B3 and M13: said they “are not sure if all personnel have done
a background check as they didn’t do it themselves”.
Participants’ responses to the question show that most of the departmental staff
were not vetted or screened. The study further revealed that the majority of the
participants, which is 88 percent (n=12) of the 15 participants, indicated that not
everyone had gone through the process of background check, while 12 percent
(n=3) of the 15 participants indicated that they were “not sure
Interpretation
Most participants admitted that not all of the staff had gone through the screening
and background checks. Of the fifteen participants, three (3) said they were "not
sure." To preserve the integrity of the exam papers in this instance, the staff
handling the question papers had to go through a screening procedure. According
to Mdluli (2011:3), vetting is the practice of carefully or critically examining a
candidate before hiring them or conducting an examination and evaluation. In
general, vetting refers to running a background check on a candidate before hiring
them or bestowing an honour upon them. To preserve the integrity of the
examination paper in this situation, staff handling exam question sheets must go
through a screening procedure. It is imperative, according to (Nyaga, 2017), that all
staff members participating in the examination process receive training regarding
the significance of upholding the integrity of examination papers.
4.6.4 What are the measures that are put in place during the delivery of
examination question papers? (See Annexure “C” Question 28)
• Participants A1, D4, I10 and O15: said they “are not sure as this information
is treated as confidential”.
• Participants B2, H8, L11 and N14: said “drivers are not allowed to use their
86
cellphones while on the way to deliver question papers”.
• Participants C3 and K12: said “drivers are not allowed to drive at a speed of
more than 100km per hour to reduce the chances of accidents”.
• Participants E5, F6 and M13: “All the delivery vehicles are escorted by the
police and security guards”.
• Participants G7 and J9: said “question papers are packaged inside the bins
with seal numbers. If one (1) bin is opened, it will be difficult to seal the bins
again”.
The researcher was interested in learning about the safety precautions taken when
distributing the questions papers. Participants A1, D4, I10 and O15 which represent
16 percent (n=4) of the 15 participants, mentioned they were not sure as the
information is confidential. The majority of participants, which represent 84%
percent (n=11) of the 15 participants, mentioned that various measures are in place,
such as a police escort, drivers not allowed to use their cellphones en route and the
use of bins to load the question papers.
Interpretation
• Participants B2, C3, G7, H8 and J9: said that “the drivers should call police”.
87
• Participants E5, F6 and M13: said “it is unlikely that the vehicles can be
hijacked because they are being escorted by the police”.
• Participants K12 and N14: said they “see the possibility of hijacking as they
delivery is done during quiet times”.
88
Interpretation
The researcher was interested in learning what would happen in the event that a
car carrying exam papers was hijacked. A total of four participants mentioned that
they are not sure as the information is kept confidential, while five participants
indicated that the drivers should call the police. Five of the fifteen participants stated
that it is improbable that someone would hijack a delivery vehicle because the police
would be escorting them. The inputs above show that not all the participants knew
the contingency plan in the event of vehicle hijacking while delivering question
papers.
4.6.6 Is the strong room register in place to record the movement of the Grade
12 examination question papers when in the storage area? (See Annexure “C”
Question 30)
• Participants A1, B2, C3, D4, F6, H8, J9, I10, K12, M13, N14 and O15: said
“yes, there is a strongroom register”.
• Participants E5 and G7: said “yes, there are strong room register, officials
who access the strong room fill in the strong register”.
Interpretation
4.6.7 Does the strong room have a locking door mechanism? (See Annexure
“C” Question 31)
• Participants A1, B2, C3, D4, E5, F6, G7 H8, J9, I10, K12, M13, N14 and O15
said “yes, the strong room has a locking door mechanism”.
89
Interpretation
In response to the question above which asked participants to indicate if the strong
room has a locking mechanism. Fourteen (14) participants mentioned yes, while
only one (1) participant said he is not sure. The deduction above confirms that the
strong room has the locking mechanism and this augment other security measures
in place.
4.6.8 What security measures are taken to prevent cell phones and laptops
from being brought into a printing facility, where the Grade 12 examination
question papers are printed? (See Annexure “C” Question 32)
• Participants A1, B2, C3, E5 and H8: said “officials are being subjected to the
body searches”.
• Participants D4 and K12: said “everyone who goes into the printing facility is
being searched, but sometimes you find only males security guards and can’t
search female staff”.
• Participants F6 and M13: said “access into the printing facility is controlled,
searches are conducted by the security guards”.
• Participants L11: “not sure because he never accessed the printing area”.
• Participants N14: “searches are conducted at the door and but sometimes
you find that there is no security at the door”.
• Participants O15: “not sure as this information is confidential and the print
room is at the basement”.
90
Interpretation
The researcher intended to find out if any procedures were in place to keep
electronics out of the printing area. The preponderance of respondents indicated
that protocols are in place to guarantee that mobile phones and laptops are not
introduced into the printing establishment. A small percentage of participants said
that they were unsure of the existence of the measures. This suggests that security
mechanisms are in place to prevent cellphones from accessing the printing area.
But given that a few individuals expressed uncertainty, it raises some questions.
This demonstrates that, despite the existence of certain safeguards, their complete
implementation is hindered because some personnel are unaware of them.
Technology can spread exam question leaks through emails, cell phones, and other
electronic devices, according to Mashanyare and Chinamasa (2014:50).
4.6.9 Are officials being subjected to body searches upon entering the
printing facility? (See Annexure “C” Question 33)
• Participants A1, B2, C3, E5, F6, G7, H8, J9, I10, M13, N14 and O15: said
“yes searches are conducted”.
• Participant L11: “not sure because he never accessed the printing area”.
• Participants D4 and K12: said “everyone who goes into the printing facility is
being searched, but sometimes you find only males security guards and can’t
search female staff”.
Interpretation
The researcher was interested in learning whether searches take place before
authorities in the printing room are given access. Since the information is mostly
kept confidential, most participants stated that searches are done before entering
the printing facility, and only a small number stated that they have never visited the
location. The researcher can infer that, despite searches being done, there are
instances where there is just a male or female guard at the door, making it
challenging to search the other gender. This gives rise to certain concerns because
91
it could be a time for opportunist crime.
4.6.10 What are the ideal security systems that can be put in place to prevent
examination paper leakage? (See Annexure “C” Question 34)
• Participants A1, D4, J9 and N14: said “the Department of Education must
install CCTV cameras and fingerprint biometric readers”.
• Participants C3, I10 and O15: said “bins carrying question papers should be
installed with a tracker monitoring”.
• Participant E5: “the department should rotate security guards who are
deployed to monitor the printing and storage facilities”.
• Participant F6: “the department must not print and package different subjects
at the same time”.
• Participant G7: “the department should not print and package different
subjects at the same time”.
• Participant H8: “the department should vet all examination staff during
recruitment stage and after five (5) years”.
• Participant K12: “drivers must not deliver the question papers to the same
destination every day”.
• Participant M13: “the Department should build and install double locking
strong rooms at the schools”.
92
Interpretation
In order to find out what participants believed should be done to strengthen security
measures that can stop question papers from leaking, the researcher posed this
question. The vast majority of participants recommended that the department
should build strong rooms at the schools and install CCTV cameras.The participants
also made it apparent that there are numerous security measures that may be put
in place to secure the exam papers, thus the Department of Education will need to
take these suggestions into consideration. According to Udim et al. (2018:206),
another reason for examination leakage is the inadequate infrastructure in storage
locations.
4.6.11 Are the norms and standard of handling Grade 12 examination question
papers adhered to? (See Annexure “C” Question 35)
• Participants A1 and G7: said “the norms and standards indicate that all
question papers should be stored in a strong room. But in other areas, they
are stored in classes and staff rooms”.
• Participants B2 and E5: said they “are not being followed because of lack of
awareness workshops”.
• Participants C3, D4 and F6: said not, “because sometimes more than one
question papers are printed at the same time”.
• Participants H8 and O15: said they “are not sure if they are followed”.
• Participants I10 and K12: said “yes, but printing question papers is a very
strenuous job as there is too much pressure”.
Interpretation
The researcher aimed to ascertain whether the norms and standards for managing
question papers are followed when asking this question. According to the study, two
(2) of the 15 participants stated that norms and standards are observed, while the
93
other participants claimed that they are not followed. This indicates that the
guidelines established by the Norms and Standards are not followed when handling
the question papers. According to (Zungu, 2020), the policies and regulations that
regulate the examinations are crucial and include Norms and Standards.
The study indicated that the majority, 76% percent (n=9), of the participants
answered this question and 24 percent (n=6) of the 15 participants did not answer
this question. Therefore, in terms of anything that participants wanted to add to
assist further with this study, 76 percent (n=9) of the participants mentioned that the
Mpumalanga Department of Education should install the advance security systems
and avoid printing bulk question papers at the same time. (Smith, 2021) indicate
that utilizing advanced encryption techniques for digital examination papers and
secure distribution channels will protect against hacking and unauthorized access
of the question papers.
By examining the supplementary data above, which was supplied by the nine (09)
participants, it is evident that the department needs to improve the infrastructure in
exam premises by building strongrooms, installing CCTV cameras, biometrics
systems, alarm systems, deploying physical guarding in all exam centres and
printing one question paper at the time.
The researcher visited two examination centres where the question papers were
distributed and stored from 22 to 25 April 2019 (refer to Annexure B). The
researcher visited the examination centres during office hours on the designated
days to examine the security measures that were in place to secure the distribution
and storage of question papers. The researcher's observation checklist was divided
into four categories: physical guarding, delivery trucks, perimeter fence and CCTV
cameras. Most of the security procedures were not followed during these visits and,
according to the researcher, this compromised the confidentiality of the question
papers.
94
The most common security measures which were used to ensure the safety and
security of the question papers were CCTV cameras, boom gates, perimeter fences
and deployment of security guards. Furthermore, the researcher discovered that the
exam centres had the following security measures in place during the observations
the researcher made from April 22 to 25, 2019:
• Security personnel: All main entrances of the exam centres had guards who
were conducting access control.
• CCTV cameras: Cameras were installed in strategic areas such as the front,
back and side elevations of the premises but the cameras were not monitored
for 24 hours.
• Delivery trucks: The trucks were not escorted by the Police but only the
armed security guards who were using the Department of Education’s
vehicles. The trucks were not recorded and searched at the main gate and
the guards mentioned that they knew the drivers as they come often to the
centres for the delivery.
4.9 Summary
Exam question papers leakages for Grade 12 students were one of the study's
objectives, which included evaluating vulnerabilities. A literature study, in-person
interviews with 15 staff members, and observation were all carried out by the
researcher using a qualitative technique. Participants from both sexes participated
in the study. The data was reviewed by the researcher once data collection was
complete. Analysis, interpretation, and conclusion were drawn with respect to the
study's goals based on data from the semi-structured interviews and observation
checklist. The researcher's conclusions - which will be discussed in the next chapter
along with findings and recommendations were influenced by the study's results.
95
CHAPTER 5: FINDINGS AND RECOMMENDATIONS
5.1 Introduction
The research findings and recommendations are shown in this chapter. The
researcher's analysis and interpretation of the data the researcher gathered for the
study led to the conclusions. Recommendations were developed in light of the
findings. In Mbombela Municipality in Mpumalanga Province, South Africa, Grade
12 examination question papers are known to leak. The purpose of this study was
to assess the current vulnerabilities and pinpoint specific risk factors to reduce this
leakage. Additionally, where necessary, appropriate security measures were
established to ensure that Grade 12 examination question papers are adequately
protected from leakage. A literature review, one-on-one interviews, and
observations were used in this study's data collection process. After that, Chapter
4's analysis and interpretation of the data led to the conclusions and
recommendations that were given in this chapter.
96
Department of Education, South Africa who are in charge of administering
examination question papers. This allowed for the improvement of security
measures to ensure that Grade 12 examination paper leakage will be prevented
and managed at all costs. The recommendations for the education departments in
Mbombela Municipality in the province of Mpumalanga, South Africa were derived
from the study's findings. With the intention of assembling findings and
recommendations, the study's justification, research problem, research questions,
aim, and research objectives were assessed.
From the data the researcher collected through one-on-one interviews, the following
inferences were made. Biographical details about the participants are covered in
Section A; security risk factors associated with the leakage of Grade 12 exam
question papers in Mbombela Municipality in Mpumalanga Province, South Africa,
are covered in Section C; vulnerabilities related to the Grade 12 exam question
papers in Mbombela Municipality in Mpumalanga Province, South Africa, are
covered in Section B; and general additional information from the participants is
covered in Section E.
Ten males and five females made up the study's fifteen participants. The majority
of the participants were in the age range of 25 to 29. The majority of participants,
according to the report, were single in terms of marital status. The majority of
participants, according to the study, held certificate credentials as their greatest
educational achievement.
The following research question was posed in order to identify the vulnerabilities
connected to the question paper leakage:
Based on this question, the data showed that printing and packaging are the main
97
causes of examination question paper leaks. The simultaneous production and
packaging of multiple question papers, as well as a lack of personnel supervision,
are the causes of this. A portion of the leaks occur when the question papers are
being transferred to the districts, where two question papers - one to be written in
the morning and one in the afternoon - are transported simultaneously. This implies
that since the question papers are delivered by the same drivers each year, the
afternoon paper could be jeopardized. Another reason for question paper leaks is
the usage of the same security guards year after year without any rotation or
security clearances performed on staff members. Due to inadequate infrastructure,
particularly in remote areas where it is challenging to keep question papers safe,
some leaks happen at schools. A few participants have hinted that the examination
question paper leaks may have been caused by unmonitored staff movement in and
out of the strongroom. Employees eat lunch at the same time every day without any
set schedule, leaving the printing firm officials alone.
Nnam and Out (2015:65) claim that a wide range of people are closely connected
to the misbehaviour, including parents, teachers, exam authorities, and even
security officers. Lack of shelving, lack of awareness among officials, and lack of
quality inspections are the causes of the mixed-up question papers. Exam paper
leaks can originate from the distribution point in some cases. The disclosure of exam
98
question papers is the fault of both security personnel and exam officials (Furo,
2015:6). According to Suleman, Gul, Ambrin, and Kamran (2015:168), there is also
another reason for examination leakage when there is no security guard present.
According to Leonard, Alhaji, and Linus (2019:49), changing out the supervisors of
examination centres and installing CCTV cameras in every exam hall to monitor
malpractices were all suggested as creative ways to reduce exam insecurity.
It is acknowledged by Gbagolo (2011:3) that question paper leaks happen when the
papers are printed by individuals who are in charge of them. The majority of leaks
happen during the production and packaging of question papers, according to
Kobiowu and Alao (2005:44). Ifeakor and Anekwe (2010:361) state that one factor
contributing to question paper leakage is incorrect management of examination
question papers during printing.
In order to establish the security risk factors associated with the leakage of question
papers, the following research question was asked:
Research question 2: What security risk factors are associated with the
leakage of Grade 12 examination question papers Mbombela Municipality in
Mpumalanga Province, South Africa?
99
guards and staff that handles question papers is a major contributor to leaks. In an
effort to raise their pass rates, several schools experience leaks. Working with
examination question papers exposes some staff members to the temptation of
question paper theft for financial gain. Some students bring devices into the test
room that the monitors and invigilators fail to notice, which is another risk concern.
Some parents even purchase question papers for their children, according to
Permenus (2015:21), which gives the idea that the goal always justifies the means.
When exams are administered by unreliable individuals, it encourages parents or
students to bribe those individuals in order to give a student the chance to cheat on
the examination. Most parents want their children to be thought of as geniuses who
should be able to attend prestigious universities and succeed there. According to
Thompson and Ansoglenang (2019:10), there is evidence indicating that students,
parents, and school authorities have collaborated to commit malpractices.
Because examination papers can leak, Phiri and Nakamba (2015:327) suggest that
all officials who work with question papers utilize and complete a statement of
confidentiality.
Based on the research question, the findings showed that before being delivered,
question papers are put in bins and sealed with plastic cable ties. The study also
revealed that it is simple to tamper with these cable ties by cutting them off and
100
replacing them with fresh ones that are the same colour. The study also discovered
that several examination question papers are inadvertently packed with examination
question papers from other subjects when they are printed simultaneously. Because
they work in the question papers section permanently, the staff members who
handle the papers are also susceptible to bribery because of their familiar
surroundings. It was also discovered that while they are accustomed to exam
procedures, they do not receive any training on managing exam papers.
Additionally, the research found that exam centre monitors can be local residents.
They could feel conflicted if they know people who are taking examinations at those
locations. The security of the question papers is compromised by employees who
are not allocated to the examination question papers division having easy access
to the printing area facility. Simui et al. (2017:299) state that in order to maintain
exam fairness and prevent exam papers from being in schools ahead of time, exam
papers should be printed and sent to centres daily.
5.4 Recommendations
Drawing from the research questions, the following recommendations are put
forward:
• The Department should avoid printing different question papers at the same
time.
101
defined.
• All the employees, security guards, teachers, principals and police officials
handling the question papers should be subjected to vetting and undergo
polygraph tests annually.
• The Department should adhere to the printing plan and refrain from printing
question papers in bulk for different subjects.
• Bins should be sealed off with the unique digital seals and not cable ties. The
seal numbers should then be recorded during dispatch. This will make it
difficult for the drivers to tamper with the seals en route to the exam centres.
• The department should deploy exam monitors who are not from the same
area where the exam is written. Their primary duties will be to monitor the
exam centres during the examination.
102
• All the employees, security guards and the police should be trained on the
management and handling of examination papers.
• Find out how and by whom scribblers are destroyed after Grade 12 question
papers are set by the examiners.
• Examine the management and control of emergency question papers, which
are provided at exam centres along with the majority of question papers.
• Determine whether students are likely to use smart watches to save
information during tests in order to cheat.
5.6 Conclusion
103
Education in enhancing the security and safety of the exam question papers.
104
LIST OF REFERENCES
Adler, E.S. & Clark, R. 2015. An invitation to social research: How it’s done (5th
ed.). Stamford, CT: Cengage Learning.
Adow, I.M., Alio, A.A. & Thinguri, R. 2015. An assessment of the management KCS
examination and its influence on irregularities among students: A case of
secondary schools in Mandera County, Kenya. Journal of Education and
Practice, 6(28):15–22.
Agnew, R. 1992. An empirical test of general strain theory. Criminology, 30(4): 475–
500.
Airmic. 2010. A structured approach to enterprise risk management (ERM) and the
requirements of ISO 31000. The Public Risk Management Association.
Available at https://www.their m.org/media/88606 2/ISO31 00_doc.pdf.
Accessed on 15 September 2021.
Akaranga, S.I. & Ongong, J.J. 2013. The phenomenon of examination malpractice:
An example of Nairobi and Kenyatta Universities. Journal of Education and
105
Practice, 4(18):87–97.
Akintunde, O.O. & Musa, G.S. 2016. Pragmatic techniques of curbing examination
malpractices in secondary schools in Nigeria. Asian Pacific Journal of
Education, Arts and Science, 3(1):110–115.
Al-Nokee, S.A. 2018. Question paper lead in public examinations: The frequent
incidence of leaking out question paper is a grave concern for the nation.
Available at: https://m.theindependentbd.com/printversion/details/137617
(accessed on: 14 September 2020).
Amundrud, O., Aven, T. & Flage, R. 2017. How the definition of security risk can be
made compatible with safety definitions. Proceedings of the Institution of
Mechanical Engineers, Part O: Journal of Risk and Reliability, 231(3):286–
294.
Andafu, E.M., K’Odhiambo, A.K. & Gunga, S.O. 2019. A philosophical justification
for a paradigm shift to the metaphysical approach in combating
examination malpractices among teachers in Kenya. International Journal of
Education and Research, 7(2):1–10.
Annenbaum, C., Greaves, L. & Graham, I.D. 2016. Why sex and gender matter in
implementation research. BMC Med Res Methodol ,16:145.
106
Anzene, S.J. 2014. Trends in examination malpractice in Nigerian educational
system and its effects on the socio-economic and political development of
Nigeria. Asian Journal of Humanities and Social Sciences, 2(3):1–8.
Babbie, E.R. 2016. The practice of social research (15th ed.). Boston, MA: Cengage
Learning. https://au.cengage.com/c/the-practice-of-social-research-44-15th-
edition-15ebabbie/9780357360767/
Baijnath, N. & Singh, D. 2019. Examination cheating: Risks to the quality and
integrity of higher education. S Africa J Sci., 115(11/12): Art. #6281. Available
at: https://doi.org/10.17159/ sajs.2019/6281 (Accessed on 6 August 2021).
Braun, A. & Clarke, V. 2013. Successful qualitative research: A practical guide for
beginners. Thousand Oaks, CA: Sage.
Cavalcanti, E.R., Pires, C.E., Cavalcanti, E.P. & Pires, V.F. 2012. Detection and
evaluation of cheating on college exams using supervised classification.
Informatics in Education Vilnius University, 11(2):169–190.
Champion, D.J. 2000. Research methods for criminal justice and criminology.
Hoboken, NJ: Prentice Hall.
107
Chux, O. 2018. WAEC denies leakage of question papers. Punch. 04 May. Available
at https://Punchng.com/2018-Wassce-Waec-denies-leakage-of-question-
papers/ (accessed on 08 April 2019).
Coetzee, J. 2015. We had exam papers before the exams: Mpumalanga Matrics-
The Citizen. 30 June.
Creswell, J.W. 2009. Research design: Qualitative, quantitative and mixed methods
approaches. 3rd edition. London: Sage.
Creswell, J.W. 2013. Qualitative inquiry & research design: Choosing among five
approaches (3rd ed.). Thousand Oaks, CA: Sage.
Crump, D. 2018. Deterrence. St. Mary’s Law Journal. Vol. 49, No. 2, Art. 2
Dabone, K.T., Graham, Y.A., Fabea, I.B. & Dabone, A.S. 2015. The perception and
108
reasons of examination malpractice among students. International Journal of
Innovative Research and Development, 4(4):145–148.
Dada, O.M.O. 2014. A sociological investigation of the causes, effects and solutions
to the problem of examination malpractice: The opinions of the Crawford
University students in Nigeria. International Journal of Advanced Research
in Management and Social Sciences, 3(5):19–34.
Dambhare, S., Dahare, K., Namdagwali, B., Banait, M. & Wanjari, K. 2018. Paper
leak security system. International Journal of Scientific Research in Science,
Engineering and Technology, 4(1):123–126.
Delport, C.S.L. & Roestenburg, W.J.H. 2011. Qualitative data collection methods:
Indexes and scales. (pp. 171–205). In A.S. de Vos, H. Strydom, C.B. Fouche
& C.S.L. Delport (Eds.). Research at grass roots: For the social sciences and
human services professions (4th ed.). Pretoria: Van Schaik.
Denzin, N.K. & Lincoln, Y.S. (Eds.). 2011. The SAGE handbook of qualitative
research (4th ed.). Thousand Oaks, CA: Sage.
E&T Editorial Staff. 2019. Exam papers to be tracked using microchips as police
probe test leaks. 24 April. Available at
109
https://eandt.theiet.org/content/articles/ 2019/04/school-exam-papers-to-be-
tracked-using-microchips-as-police-probe-test-leaks/ (accessed on 07 June
2020).
Folson, D. & Awuah, F.K. 2014. Combating examination malpractices in the Basic
Education Certificate Examinations (BECE) in Ghana. International Journal
of Computer Applications, 100(7):12–23.
Fouche, C.B. & Schurink, W. 2011. Qualitative research design. Pretoria: Van
Schaik.
Gibbs, J.P. 1986. Deterrence theory and Research. Lincoln, NE: University of
Nebraska Press.
Gower, P. 2010. Motshekga Acts on Exam Leaks. Johannesburg: Mail & Guardian.
08 January 2010. Available at: https://mg.co.za/article/2010-01-08-
motshekga-acts-on-exam-leaks/ (Accessed on 22 June 2024)
Govender, P. 2015. Matric cheats uncovered in seven out of nine provinces. Times
Live, 4 January. Available at: https://www.timeslive.co.za/news/south-
110
africa/2015-01-04-matric-cheats-uncovered-in-seven-out-of-nine-provinces/
(Accessed on 6 August 2021).
Grinnell, R.M. & Unrau, Y.A. (Eds.). 2014. Social work research and evaluation:
Foundations of evidence-based practice (10th ed.). New York: Oxford
University Press.
Guba, E.G. & Lincoln, Y.S. (Eds.). 2011. The SAGE handbook of qualitative
research (4th ed.). Thousand Oaks, CA: Sage.
Hardwick, L. & Worsley, A. 2011. Doing social work research (2nd edition).
Thousand Oaks, CA: Sage.
Ifeakor, A.C. & Anekwe, J.U. 2010. Achieving standard in secondary education
through the eradication of examination malpractice: The Nigerian
experience. African Research Review, 4(4):357–377.
Ifijeh, G., Onuoha, O., Ilogho, J. & Osinulu, I. 2015. Emergence of hi-tech
examination malpractices in Nigeria: Issues and implications. International
Journal of Education and Research, 3(3):113–122.
Ituma, E., Nnandi, F.U. & Nche, G.C. 2014. The resilience of examination
malpractice in Nigeria: Cultural and religious approach. International Journal
of Research in Social Science and Human Development, 6(1):199–205.
Jaccard, J., Jacoby, J. 2010. Theory construction and model building skills: Practical
guide for social scientists. London: The Gilford Press.
111
James, A.O., Olatona, O. & Samuel, J.O. 2015. Perceptions of polytechnic students
towards examination malpractice. Research & Reviews: Journal of
Educational Studies, 1(1):20–29.
Jordan, N. 2019. UNISA confirms exam papers were leaked, and police know who
did it. Sowetan. Available at: https://www.sowetanlive.co.za/news/south-
africa/2019-11-18-unisa-confirms-exam-papers-were-leaked-and-police-
know-who-did-it/ (accessed on: 14 September 2020).
Jore, S.H. 2019. The conceptual and scientific demarcation of security in contrast
to safety. International Journal of Security Research, 4(2019):157–174.
Available at: https://link.springer.com/content/pdf/10.1007/s41125-017-
0021-9.pdf (accessed on: 14 September 2020).
Kobiowu, S.V. & Alao, F. 2005. The challenges of examination management in the
developing societies: The Nigerian scenario. International Journal of African
112
American Studies, IV(2):40–47.
Kole, O.J. 2010. An examination of security measures for the protection of petrol
stations: An analysis of case studies in Gauteng. Unpublished PhD
Dissertation, University of South Africa, Pretoria.
Kole, O.J. 2015. Partnership policing between the South African Police Services
and private security industry in reducing crime in South Africa. Unpublished
PhD Thesis, University of South Africa, Pretoria.
Kraska, P.B. & Neuman, W.L. 2008. Criminal Justice and Criminology: Research
Methods. Boston, MA: Pearson Education.
Leedy, P.D. & Ormrod, J.E. 2000. Practical research: Planning and design. (10th
ed.). Boston, MA: Pearson Education.
Leedy, P.D., & Ormrod, J.E. 2013. Practical Research: Planning and Design. 10th
edition. Boston: Pearson Education.
Leonard, S., Alhaji, Y.A. & Linus, I. 2019. Curbing examination insecurity and its
implications for the management of public secondary schools in Kogi east
education zone of Kogi state. International Journal of Advanced Research
and Development, 4(3):44–52.
Liebenberg, A.S. 2020. An evaluation of the impact of the non-ferrous metals crime
combating committee on copper cable theft. Unpublished PHD Thesis.
University of South Africa, Pretoria.
Lincoln, Y.S. & Guba, E.G. 1985. Naturalistic inquiry. Thousand Oaks, CA: Sage.
113
November 2016. Available at: https://www.sowetanlive.co.za/news/2016-11-
03-matric-maths-papers-to-be-inspected-after-leak/( Accessed on 22 June
2024)
Madara, D.S. & Namango, S.S. 2016. Faculty perceptions on cheating in exams in
undergraduate engineering. Journal of Education and Practice, 7(30):70–86.
Mahambane, M.A. 2018. Safety and security of consumers at retail stores in the
Gauteng Province: An assessment of security measures. Unpublished PhD
Dissertation, University of South Africa, Pretoria.
Mail & Guardian. 2005. Second chance for “cheating” matrics. 23rd March. Mail &
Guardian. Available at: https://mg.co.za/article/2005-03-23-second-chance-
for-cheating-matrics/ (Accessed on 3 August 2021).
Mascareño, A. & Carvajal, F. 2015. The different faces of inclusion and exclusion.
Cepal Review Journal, 116:133–134.
Masondo, S.E. 2015. Matric exam results spread. Johannesburg: City Press, 22
Nov 2015. Available at: https://www.news24.com/citypress/news/matric-
114
exam-leak-spreads-20151121 (Accessed on: 22 June 2024)
Miller, B.L., Agnich, L.E., Posick, C. & Gould, A.E. 2014. Cheating around the world:
A cross-national analysis of principal reported cheating. Journal of Criminal
Justice Education, 26(2). Available at: http://dx.doi.org/10.1080/
10511253.2014.986148 (Accessed on 14 September 2021).
Mohlala, T. 2005. Guilty officials fined R3000 each for matric scandal. Mail &
Guardian, 17 September. Available at: https://mg.co.za/article/2005-08-17-
guilty-officials-fined-r3-000-each-for-matric-scandal/ (Accessed on 6 August
2021).
Mthethwa, B., Govender, P., Shoba, S. & Nombeme, P. 2015. Matric cheating: How
pupils and teachers colluded. Times Live, 11 January.
https://www.timeslive.co.za/news/south-africa/2015-01-11-matric-cheating-
how-pupils-and-teachers-colluded/ (Accessed 1 August 2021).
Mulongo, M., Kimosop, M.K. & Njoka, J.N. 2019. Assessment of mitigation
115
strategies used in the management of examination malpractice by
universities in Mount Kenya region. International Journal of Social Sciences
& Educational Studies, 6(2):1–13.
Ndifon, R.A. & Cornelius-Ukpepi, B.U. 2014. Examination malpractice in the primary
school: Problems and prospects. International Journal of Humanities Social
Sciences and Education, 1(9):118–121.
Ngqakamba, S. 2019. UNISA probes possible exam paper leak. News24, 27 May.
Available at: https://www.news24.com/news24/southafrica/news/unisa-
probes-possible-exam-paper-leak-20190527 (accessed on: 14 September
2020).
Nichols, T.A., Rogers, W.A., Fisk, A.D. & West, L.D. 2001. How old are your
participants? An investigation of age classifications as reported in human
factors. Proceedings of the human factors and Ergonomics Society. Santa
Monica, 260–261.
Njoku, N.C. & Njoku, D.I. 2016. Curbing examination malpractice in secondary
schools in Nigeria through moral education. Research on Humanities and
Social Sciences, 6(18):161–169.
Nnam, M.U. & Inah, A.F. 2015. Empirical investigation into the causes, forms and
consequences of examination malpractice in Nigeria institutions of higher
learning. International Journal of Novel Research in Humanity and Social
Sciences, 2(1):52–62.
116
schools in Nigeria. European Journal of Education Studies, 2(11):48–70.
Nowell, S., Morris, J.M., White, D.E. & Moules, N.J. 2017. Thematic analysis:
Striving to meet trustworthiness criteria. International Journal of Qualitative
Methods, 16:1–13.
Nwadike, C.C. & Adimonyemma, R.N. 2015. The investigation into examination
malpractice among science students in Nigerian tertiary institutions. Journal
of Research in Pure and Applied Sciences, 5(1):15–24.
Onuka, A.O.U & Durowoju, E.O. 2013.. Stakeholders' role in curbing examination
malpractice in Nigeria. International Journal of Economy, Management and
Social Sciences, 2(6):342–348.
Ossai, M.C., Ethe, N., Okwiedei, C.A. & Edougha, D.E. 2014. Development of
examination behavior inventory: An integrity measure for prevention of
cheating in school exams. World Journal of Education, 4(2):37–49.
Owenga, J.T.O., Raburu, P.A. & Aloka, V. 2018. Relationship between selected
school determinants and examination cheating tendencies among Kenyan
secondary school students. Mediterranean Journal of Social Sciences,
9(3):243–252.
117
Padgett, D.K. 2017. Qualitative methods in social work research. Thousand Oaks,
CA: Sage.
Paul, S.K. 2013. Vulnerability concepts and its application in various fields: A review
on geographical perspective. Journal of Life Earth Science, 8:63–81.
Raji, I.A. & Okunlola, J.O. 2017. Examination malpractice and quality assurance of
senior secondary school certificate examination in Oyo State, Nigeria. Afro
Asian Journal of Social Sciences, VIII(II):1–21.
Saldaña, J. 2015. The coding manual for qualitative researchers (3rd edition).
Thousand Oaks, CA: Sage.
Sarantakos, S. 2002. Social research. (2nd edition). New York: Palgrave Publishers.
118
Schoen, R., Astone, N.M., Kim, Y.J., Rothert, K. & Standish, N.J. 2002) Social
Forces, 81:643–662.
Schurink, W., Fouche, C.B. & De Vos, A.S. 2011. Qualitative data analysis and
interpretation. (Pp. 397–423). In: A.S. De Vos, H. Strydom, C.B. Fouche &
C.S.L. Delport, (Eds.). Research at grass roots (4th edition). Pretoria: Van
Schaik.
Seleka, N. 2020. Five Gauteng pupils caught cheating during final examinations.
News24, 29 November. Available at: https://www.news24.com/
news24/southafrica/news/matric-2020-five-gauteng-pupils-caught-cheating-
during-final-exams-20201129 (Accessed on 4 August 2021).
Shaibu, L., Yakubu, A.A. & Igoche, L. 2019. Curbing examination insecurity and its
implications for the management of public secondary schools in Kogi East
education zone of Kogi State. International Journal of Advanced Research
and Development, 4(3):44–52.
Shibo, M.N. & Gori, F.O.J. 2017. The adequacy of Kenya national examination
councils’ malpractice penalties in public and private secondary schools in
Kisii County, Kenya. Scholars Journal of Arts, Humanities and Social
Sciences, 5(4B):403–411.
Sirisha, M. & Syalamala, N. 2018. RFID based security for exam paper leakage
system. International Journal of Technology, 7(4):841–844.
119
Smith, T.R., Langenbacher, M., Kudlac, C. & Fera, A.G. 2013. Deviant reactions to
the college pressure cooker: A test of General Strain Theory on
undergraduate students in the United States. International Journal of
Criminal Justice Sciences (IJCJS), 8(2):88–104. Available at:
https://citeseerx.ist.psuedu/viewdoc/download?doi=10.1.1.687.5050&rep=r
ep1&type=pdf. (Accessed on 16 September 2021).
South Africa. 2021. BRICS (Brazil, Russia, India, China, South Africa). Available at:
https://www.gov.za/about-government/brics-brazil-russia-india-china-south-
africa-1 (Accessed on 16 September 2021).
Suleman, Q., Gul, R., Ambrin, S. & Kamran, F. 2015. Factors contributing to
examination malpractices at secondary school level in Kohat Division,
Pakistan. Journal of Education and Learning, 9(2):165–182.
Tawiah, D.K., Alberta, G.Y., Bosman, F.I. & Ata, D.S. 2015. The perception and
reasons of examination malpractice among students. International Journal of
Innovative Research & Development, 4(4):154–148.
Udim, D.K., Abubakar, U. & Essien, J.O. 2018. An in-depth evaluation on the issue
of examination malpractice in Nigeria. Research in Pedagogy, 8(2):204–213.
120
Ukpepi, B.U.C. & Ndifon, R.A. 2012. Factors that influence examination malpractice
and academic performance in primary science among Primary Six Pupils in
Cross River State, Nigeria. Journal of Education and Practice, 3(9):59-68.
University of South Africa (UNISA). 2007. Policy on research ethics. Available at:
https://my.unisa.ac.za/tool/a87dd927a9e04b5900125ab7d72ca660/content
s/colleges/col_grad_studies/docs/Policy_research_ethics_21September200
7.pdf (Accessed on: 28 Nov 2020).
Ushie, O.S. & Ishanga, A.R. 2016. Examination malpractice: Causes, effects and
possible ways of curbing the menace. A study of Cross River University of
Technology. International Journal of Managerial Studies and Research,
4(1):59–65.
121
ANNEXURE A: Ethical clearance certificate
122
123
ANNEXURE B: Department of Education permission letter
124
ANNEXURE C: Semi-structured interview schedule
INTERVIEW SCHEDULE
125
the University Research Ethics Review Committee (URERC), Dr Retha Visagie at
visagrg@unisa.ac.za. Alternatively, you can report any serious unethical behaviour
at the University’s Toll-Free Hotline 0800 86 96 93.
Please decide whether or not to participate in this interview choosing the appropriate
option below.
Do you agree to participate in this interview? Yes1 No2
SECTION A
Biographical Details
1. Gender
Female 1
Male 2
2. Age range
18-35 1
36-45 2
3. Educational qualification
Below Grade 12 1
Grade 12 2
Diploma 4
Undergraduate Degree 5
………………………………………………………………………………………………
How long have you been working for your current company /employer?
………………………………………………………………………………………………
126
…
SECTION B
6. ………………………………………………………………………………………
What is your understanding of the concept ‘vulnerabilities’ regarding
leakage of Grade 12 examination question papers?
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
What are some of the vulnerabilities associated with the printing of the Grade
12 examination question papers?
………………………………………………………………………………………………
………………………………………………………………………………………………
What are some of the vulnerabilities associated with the delivery of the Grade
12 examination question papers?
………………………………………………………………………………………………
………………………………………………………………………………………………
What are some of the vulnerabilities associated with the storage of the Grade
12 examination question papers?
………………………………………………………………………………………………
127
………………………………………………………………………………………………
SECTION C
Security risk factors associated with the leakage of Grade 12 examination question
papers in Mpumalanga Province, South Africa.
………………………………………………………………………………………………
………………………………………………………………………………………………
What types of security risk factors to your knowledge are associated with the
leakage of Grade 12 examination question papers?
..……………………………………………………………………………………………
………………………………………………………………………………………………
10. How many people are involved in the handling of Grade 12 examination
question papers in Mpumalanga Province?
……………………………………………………………………………………………
……………………………………………………………………………………………
11. Who are the different persons responsible for the handling of the Grade 12
examination question papers in Mpumalanga Province?
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
12. Who is responsible for the delivery of the Grade 12 examination question
papers?
………………………………………………………………………………………………
………………………………………………………………………………………………
What happens if a delivery vehicle is involved in an accident while delivering the
Grade 12 examination question papers to Schools in the Province?
………………………………………………………………………………………………
………………………………………………………………………………………………
Are the Grade 12 examination question papers printed by private or government
128
printers?
………………………………………………………………………………………………
………………………………………………………………………………………………
Who is involved in the printing of the Grade 12 examination question papers?
………………………………………………………………………………………………
………………………………………………………………………………………………
What procedures are followed during the printing of the Grade 12 examination
question papers?
………………………………………………………………………………………………
………………………………………………………………………………………………
13. What facilities are used for the storage of the Grade 12 examination question
papers?
………………………………………………………………………………………………
………………………………………………………………………………………………
14. How secure is the storage facility against theft and unlawful breaking and
entering?
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
15. For how long is the Grade 12 examination question papers stored in the
storage facilities until they are delivered to the schools?
………………………………………………………………………………………………
………………………………………………………………………………………………
SECTION D
16. What security measures are in place to prevent the leakage of Grade 12
examination question papers?
………………………………………………………………………………………………
………………………………………………………………………………………………
129
17. Explain the effectiveness of these security measures.
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
19. What are the measures that are put in place during the delivery of
examination question papers?
………………………………………………………………………………………………
………………………………………………………………………………………………
20. What is the contingency plan if vehicles delivering Grade 12 question papers
are hijacked?
………………………………………………………………………………………………
………………………………………………………………………………………………
21. Is the strong room register in place to record the movement of the Grade 12
examination question papers when in the storage area?
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
23. What security measures are taken to prevent cell phones and laptops from
being brought into a printing facility, where the Grade 12 examination
question papers are printed?
………………………………………………………………………………………………
………………………………………………………………………………………………
24. Are officials being subjected to body searches upon entering the printing
130
facility?
………………………………………………………………………………………………
………………………………………………………………………………………………
25. What are the ideal security systems that can be put in place to prevent
examination paper leakage?
………………………………………………………………………………………………
………………………………………………………………………………………………
26. Are the norms and standard of handling Grade 12 examination question
papers adhered to?
………………………………………………………………………………………………
………………………………………………………………………………………………
SECTION E: GENERAL
………………………………………………………………………………………………
………………………………………………………………………………………………
………………………………………………………………………………………………
Date:
Time:
Place:
Number of Interview:
131
ANNEXURE D: Informed consent letter to conduct interviews
This study aims to determine the risks linked to question paper leaks and assess
the efficacy of the security mechanisms currently in place at the printing facility in
Mpumalanga Province in order to recommend new security measures.
• What security risk factors are associated with the leakage of Grade 12
examination question papers in Mpumalanga Province, South Africa?
• How should the vulnerabilities be eliminated to mitigate the leakage of the Grade
12 examination question paper in Mpumalanga Province, South Africa?
You are welcome to contact the researcher on cellphone number. 082 9500 904
should you have any enquiries.
I hereby consent and grant permission to be interviewed for the research study as
described above on behalf of....................................................... (Name and
Surname). I've been told what the research's goal is. I acknowledge that
132
participation in the interview is entirely optional and that I may end it at any moment
(up until the point of publishing). I am aware that neither the study nor its publication
will disclose my identify. I agree to the following because I have read and
comprehended the material above and all of my questions have been addressed.
3. Agree that the information I provide might be used in the research report: Yes/No
133
ANNEXURE E: Observation checklist
OBSERVATION CHECKLIST
Research questions
The researcher tested the following research question during the observation:
What security measures are currently being implemented at the exam centres
during the delivery of question papers in Mpumalanga Province?
DATE OF SURVEY:
ASPECTS OBSERVED:
A. PHYSICAL GUARDING Yes No Comments
Any Comment:
B. CCTV CAMERAS Yes No Comments
134
12. How many cameras are installed at the exam centre?
Any Comment:
Any comment:
C. Delivery trucks Yes No Comments
21. Are the trucks monitored when the question papers are •
offloaded?
22. Are the trucks recorded and searched upon exit at the
exam centres?
135
ANNEXURE F: Letter requesting permission to conduct research in the
Department of Education
136
ANNEXURE G: Confirmation of language editing
Barbara Shaw
Editing/proofreading services
18 Balvicar Road, Blairgowrie, 2194
Cell: 072 1233 881
Email: barbarashaw16@gmail.com
Full member of The Professional Editors’ Guild
This letter serves to inform you that I have done formatting, language editing and
reference checking on the thesis.
Barbara Shaw
19/02/2024
137
ANNEXURE H: Turnitin report
138