{"id":178122,"date":"2025-08-29T12:24:07","date_gmt":"2025-08-29T11:24:07","guid":{"rendered":"https:\/\/www.network-it.be\/ongecategoriseerd\/how-chatgpt-abuse-in-physician-entrance-exam-could-have-been-prevented-an-it-and-cybersecurity-perspective\/"},"modified":"2025-12-28T20:47:51","modified_gmt":"2025-12-28T19:47:51","slug":"how-chatgpt-abuse-in-physician-entrance-exam-could-have-been-prevented-an-it-and-cybersecurity-perspective","status":"publish","type":"post","link":"https:\/\/www.network-it.be\/en\/information\/how-chatgpt-abuse-in-physician-entrance-exam-could-have-been-prevented-an-it-and-cybersecurity-perspective\/","title":{"rendered":"How ChatGPT abuse in physician entrance exam could have been prevented &#8211; an IT and cybersecurity perspective"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"178122\" class=\"elementor elementor-178122 elementor-60211\">\n\t\t\t\t<div class=\"elementor-element elementor-element-55a4ab4 e-flex e-con-boxed e-con e-parent\" data-id=\"55a4ab4\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-74e1500 elementor-widget elementor-widget-text-editor\" data-id=\"74e1500\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span class=\"relative -mx-px my-[-0.2rem] rounded px-px py-[0.2rem] transition-colors duration-100 ease-in-out\">In July 2025, it was first found that students used ChatGPT during the medical entrance exam in Flanders, despite security measures such as disabling Internet access<\/span>. <span class=\"relative -mx-px my-[-0.2rem] rounded px-px py-[0.2rem] transition-colors duration-100 ease-in-out\">This scandal brought acute attention to exam integrity and raises important questions about the robustness of technical and operational safeguards, especially in temporarily set-up exam environments where IT resources are limited. In this blog, IT and cybersecurity experts highlight the risks of AI-assisted fraud, evaluate existing deficiencies and explain how organizations can ensure integrity with smart measures, even in small-scale exams. You&#8217;ll learn what technologies and processes, at a minimum, are necessary to effectively keep ChatGPT and similar systems out of physician training access depots.<\/span><\/p><h3 data-start=\"395\" data-end=\"458\">1. Context: the incident and the cybersecurity challenge<\/h3><p data-start=\"459\" data-end=\"650\"><span class=\"relative -mx-px my-[-0.2rem] rounded px-px py-[0.2rem] transition-colors duration-100 ease-in-out\">In July 2025, three candidates were caught using ChatGPT during the nursing and medicine exam despite the fact that exam booths should have prevented Internet access<\/span>. <span class=\"relative -mx-px my-[-0.2rem] rounded px-px py-[0.2rem] transition-colors duration-100 ease-in-out\">This proves that even with supposedly layered security, vulnerabilities remain. In addition, the exam board is currently investigating objections from other students about possible mass fraud and a remarkably high pass rate (47%, versus 19% in 2024)<\/span>. <span class=\"relative -mx-px my-[-0.2rem] rounded px-px py-[0.2rem] transition-colors duration-100 ease-in-out\">Such incidents demonstrate that exam environments need robust cybersecurity design, even when resources are limited.<\/span><\/p><h3 data-start=\"459\" data-end=\"650\">2. Technical measures against AI-based fraud<\/h3><h4 data-start=\"714\" data-end=\"773\">2.1 Secure (lockdown) browser &amp; screen monitoring<\/h4><ul data-start=\"774\" data-end=\"1024\"><li data-start=\"774\" data-end=\"856\"><p data-start=\"776\" data-end=\"856\"><span class=\"relative -mx-px my-[-0.2rem] rounded px-px py-[0.2rem] transition-colors duration-100 ease-in-out\">Use a secure browser that blocks all access to unauthorized websites, tabs and apps<\/span>.<\/p><\/li><li data-start=\"857\" data-end=\"941\"><p data-start=\"859\" data-end=\"941\"><span class=\"relative -mx-px my-[-0.2rem] rounded px-px py-[0.2rem] transition-colors duration-100 ease-in-out\">Screen captures and screenshots allow suspicious activity to be captured automatically<\/span>.<\/p><\/li><li data-start=\"942\" data-end=\"1024\"><p data-start=\"944\" data-end=\"1024\"><span class=\"relative -mx-px my-[-0.2rem] rounded px-px py-[0.2rem] transition-colors duration-100 ease-in-out\">Platforms such as Exam.net prevent copy\/paste and detect focus-switching<\/span><\/p><\/li><\/ul><h4 data-start=\"1026\" data-end=\"1083\">2.2 AI-assisted proctoring and live monitoring<\/h4><ul data-start=\"1084\" data-end=\"1293\"><li data-start=\"1084\" data-end=\"1168\"><p data-start=\"1086\" data-end=\"1168\"><span class=\"relative -mx-px my-[-0.2rem] rounded px-px py-[0.2rem] transition-colors duration-100 ease-in-out\">Tools such as Proctor360 offer cameras with 360\u00b0 views, multi-camera setups, AI behavioral analysis and live intervention capabilities<\/span>.<\/p><\/li><li data-start=\"1169\" data-end=\"1293\"><p data-start=\"1171\" data-end=\"1293\"><span class=\"relative -mx-px my-[-0.2rem] rounded px-px py-[0.2rem] transition-colors duration-100 ease-in-out\">Talview combines secure browser, room check from 360\u00b0, behavioral analysis and proctor logs<\/span>.<br data-start=\"1251\" data-end=\"1254\"><span class=\"relative -mx-px my-[-0.2rem] rounded px-px py-[0.2rem] transition-colors duration-100 ease-in-out\">This hybrid approach reduces risk of fraud as well as enabling human grip action.<\/span><\/p><\/li><\/ul><h4 data-start=\"1295\" data-end=\"1340\">2.3 Demand design and multimodality<\/h4><ul data-start=\"1341\" data-end=\"1552\"><li data-start=\"1341\" data-end=\"1425\"><p data-start=\"1343\" data-end=\"1425\"><span class=\"relative -mx-px my-[-0.2rem] rounded px-px py-[0.2rem] transition-colors duration-100 ease-in-out\">Avoid reusing questions. Create unique, ever-changing exam questions-so ChatGPT has less opportunity to anticipate<\/span>.<\/p><\/li><li data-start=\"1426\" data-end=\"1510\"><p data-start=\"1428\" data-end=\"1510\"><span class=\"relative -mx-px my-[-0.2rem] rounded px-px py-[0.2rem] transition-colors duration-100 ease-in-out\">Insert images and drawings into questions, including embedded text labels; such multimodal questions have been found to significantly weaken ChatGPT<\/span>.<\/p><\/li><li data-start=\"1511\" data-end=\"1552\"><p data-start=\"1513\" data-end=\"1552\"><span class=\"relative -mx-px my-[-0.2rem] rounded px-px py-[0.2rem] transition-colors duration-100 ease-in-out\">Use question sets with sequential building blocks that test comprehension and frustrate AI-generated answers.<\/span><\/p><\/li><\/ul><h4 data-start=\"1554\" data-end=\"1596\">2.4 Question-fulnerability scoring<\/h4><ul data-start=\"1597\" data-end=\"1679\"><li data-start=\"1597\" data-end=\"1679\"><p data-start=\"1599\" data-end=\"1679\"><span class=\"relative -mx-px my-[-0.2rem] rounded px-px py-[0.2rem] transition-colors duration-100 ease-in-out\">Investigate which question types ChatGPT answers least well. Use NLP analysis to measure this by question type and avoid vulnerable questions. <\/span><\/p><\/li><\/ul><h4 data-start=\"1681\" data-end=\"1754\">2 3. Operational approach for temporary and small-scale sites <\/h4><p data-start=\"1755\" data-end=\"1794\"><span class=\"relative -mx-px my-[-0.2rem] rounded px-px py-[0.2rem] transition-colors duration-100 ease-in-out\">Even in those situations, at least the following measures can be applied:<\/span><\/p><ul data-start=\"1796\" data-end=\"2013\"><li data-start=\"1796\" data-end=\"1839\"><p data-start=\"1798\" data-end=\"1839\"><span class=\"relative -mx-px my-[-0.2rem] rounded px-px py-[0.2rem] transition-colors duration-100 ease-in-out\"><strong data-start=\"0\" data-end=\"43\" data-is-only-node=\"\">Preliminary room and device check<\/strong>: well in advance, scan the room and table for hidden devices. A security officer performs this check. <\/span><\/p><\/li><li data-start=\"1840\" data-end=\"1883\"><p data-start=\"1842\" data-end=\"1883\"><span class=\"relative -mx-px my-[-0.2rem] rounded px-px py-[0.2rem] transition-colors duration-100 ease-in-out\"><strong data-start=\"0\" data-end=\"26\" data-is-only-node=\"\">Mobile proctoring kit<\/strong>: a tablet or smartphone with proctoring app (with secure browser + video stream) is already sufficient for small exam cohorts.<\/span><\/p><\/li><li data-start=\"1884\" data-end=\"1927\"><p data-start=\"1886\" data-end=\"1927\"><span class=\"relative -mx-px my-[-0.2rem] rounded px-px py-[0.2rem] transition-colors duration-100 ease-in-out\"><strong data-start=\"0\" data-end=\"21\" data-is-only-node=\"\">Hybrid proctoring<\/strong>: combine live camera monitoring with an attendant; for balance between cost and security.<\/span><\/p><\/li><li data-start=\"1928\" data-end=\"1971\"><p data-start=\"1930\" data-end=\"1971\"><span class=\"relative -mx-px my-[-0.2rem] rounded px-px py-[0.2rem] transition-colors duration-100 ease-in-out\"><strong data-start=\"0\" data-end=\"24\" data-is-only-node=\"\">Log and video usage<\/strong>: keep logs of device usage, behavioral data, video recordings and suspicious events.<\/span><\/p><\/li><li data-start=\"1972\" data-end=\"2013\"><p data-start=\"1974\" data-end=\"2013\"><span class=\"relative -mx-px my-[-0.2rem] rounded px-px py-[0.2rem] transition-colors duration-100 ease-in-out\"><strong data-start=\"0\" data-end=\"40\" data-is-only-node=\"\">Backup paper exams\/pen-and-paper<\/strong>: if technology fails, can quickly switch to traditional forms of exam.<\/span><\/p><\/li><\/ul><h4 data-start=\"2015\" data-end=\"2065\">2 4. Prevention through processes and awareness <\/h4><ul data-start=\"2066\" data-end=\"2318\"><li data-start=\"2066\" data-end=\"2150\"><p data-start=\"2068\" data-end=\"2150\"><span class=\"relative -mx-px my-[-0.2rem] rounded px-px py-[0.2rem] transition-colors duration-100 ease-in-out\"><strong data-start=\"0\" data-end=\"43\" data-is-only-node=\"\">Oral or spoken testing (viva voce)<\/strong>: as applied by the University of South Australia, rapid oral questioning of less than 20 minutes can greatly inhibit fraud<\/span>.<\/p><\/li><li data-start=\"2151\" data-end=\"2235\"><p data-start=\"2153\" data-end=\"2235\"><span class=\"relative -mx-px my-[-0.2rem] rounded px-px py-[0.2rem] transition-colors duration-100 ease-in-out\"><strong data-start=\"0\" data-end=\"45\" data-is-only-node=\"\">Behavioral analysis and forensic log analysis<\/strong>: an AI human-in-the-loop system helps detect patterns of exam fraud<\/span>.<\/p><\/li><li data-start=\"2236\" data-end=\"2318\"><p data-start=\"2238\" data-end=\"2318\"><span class=\"relative -mx-px my-[-0.2rem] rounded px-px py-[0.2rem] transition-colors duration-100 ease-in-out\"><strong data-start=\"0\" data-end=\"40\" data-is-only-node=\"\">Cultural shift to digital ethics<\/strong>: educate candidates about AI tools, their impact and while promoting fair use; it may help as suggested by Reading study on AI-assisted deception.<\/span><\/p><\/li><\/ul><h3>3. AI-cheat-proof exam framework: 6 layered layers of defense<\/h3><h4 data-start=\"505\" data-end=\"564\">3.1 Layer 1: Identity authentication &amp; access management<\/h4><p data-start=\"566\" data-end=\"727\">The first layer of defense must absolutely guarantee that the right candidate is taking the exam &#8211; and that he\/she is not switching or receiving outside help.<\/p><p data-start=\"729\" data-end=\"756\"><strong data-start=\"729\" data-end=\"756\">Technical measures:<\/strong><\/p><ul data-start=\"757\" data-end=\"1156\"><li data-start=\"757\" data-end=\"835\"><p data-start=\"759\" data-end=\"835\"><strong data-start=\"759\" data-end=\"795\">Multi-Factor Authentication (MFA)<\/strong> at login: password + mobile OTP code.<\/p><\/li><li data-start=\"836\" data-end=\"950\"><p data-start=\"838\" data-end=\"950\"><strong data-start=\"838\" data-end=\"879\">Biometric verification (face match)<\/strong>: used before and during the exam to validate identity.<\/p><\/li><li data-start=\"951\" data-end=\"1062\"><p data-start=\"953\" data-end=\"1062\"><strong data-start=\"953\" data-end=\"967\">Geofencing<\/strong> via GPS\/IP logging: prevents candidates from connecting from outside approved locations.<\/p><\/li><li data-start=\"1063\" data-end=\"1156\"><p data-start=\"1065\" data-end=\"1156\"><strong data-start=\"1065\" data-end=\"1091\">Randomization schemes<\/strong> for seat or login times to make collusion more difficult.<\/p><\/li><\/ul><p data-start=\"1158\" data-end=\"1198\"><strong data-start=\"1158\" data-end=\"1198\">Relevance to temporary sites:<\/strong><\/p><ul data-start=\"1199\" data-end=\"1348\"><li data-start=\"1199\" data-end=\"1279\"><p data-start=\"1201\" data-end=\"1279\">Easily deployable via cloud-based tools (such as ProctorExam or Talview).<\/p><\/li><li data-start=\"1280\" data-end=\"1348\"><p data-start=\"1282\" data-end=\"1348\">Requires only basic cameras + internet; no heavy infrastructure.<\/p><\/li><\/ul><h4 data-start=\"1350\" data-end=\"1397\">3.2 Layer 2: Device and system hardening<\/h4><p data-start=\"1399\" data-end=\"1564\">Once identity is confirmed, the device on which the exam is taking place must be under full control. AI interfaces such as ChatGPT must be inaccessible. <\/p><p data-start=\"1566\" data-end=\"1593\"><strong data-start=\"1566\" data-end=\"1593\">Technical measures:<\/strong><\/p><ul data-start=\"1594\" data-end=\"2069\"><li data-start=\"1594\" data-end=\"1700\"><p data-start=\"1596\" data-end=\"1700\"><strong data-start=\"1596\" data-end=\"1623\">Secure lockdown browser<\/strong>: blocks access to Internet, apps, keyboard shortcuts, copy-paste, print screen.<\/p><\/li><li data-start=\"1701\" data-end=\"1792\"><p data-start=\"1703\" data-end=\"1792\"><strong data-start=\"1703\" data-end=\"1748\">Completely closed OS profile (kiosk mode)<\/strong>: only the exam application is accessible.<\/p><\/li><li data-start=\"1793\" data-end=\"1909\"><p data-start=\"1795\" data-end=\"1909\"><strong data-start=\"1795\" data-end=\"1836\">MDM policy for temporary devices<\/strong>: checks for USB injections, Bluetooth connections, microphone usage.<\/p><\/li><li data-start=\"1910\" data-end=\"1980\"><p data-start=\"1912\" data-end=\"1980\"><strong data-start=\"1912\" data-end=\"1937\">BIOS\/UEFI security<\/strong>: prevents booting via USB or network drive.<\/p><\/li><li data-start=\"1981\" data-end=\"2069\"><p data-start=\"1983\" data-end=\"2069\"><strong data-start=\"1983\" data-end=\"2018\">Whitelisting of network traffic<\/strong>: only traffic to the exam server is allowed.<\/p><\/li><\/ul><p data-start=\"2071\" data-end=\"2112\"><strong data-start=\"2071\" data-end=\"2112\">Application to temporary exam rooms:<\/strong><\/p><ul data-start=\"2113\" data-end=\"2261\"><li data-start=\"2113\" data-end=\"2190\"><p data-start=\"2115\" data-end=\"2190\">Use of preconfigured laptops based on &#8220;immutable images&#8221;.<\/p><\/li><li data-start=\"2191\" data-end=\"2261\"><p data-start=\"2193\" data-end=\"2261\">Network segregation per device via VLAN or private WiFi SSID per row.<\/p><\/li><\/ul><h4 data-start=\"2263\" data-end=\"2328\">3.3 Layer 3: Environmental security &amp; infrastructure control<\/h4><p data-start=\"2330\" data-end=\"2497\">In addition to the device, the candidate&#8217;s physical and digital environment must also be rigorously monitored to rule out hidden AI tools or spy devices.<\/p><p data-start=\"2499\" data-end=\"2526\"><strong data-start=\"2499\" data-end=\"2526\">Technical measures:<\/strong><\/p><ul data-start=\"2527\" data-end=\"2939\"><li data-start=\"2527\" data-end=\"2632\"><p data-start=\"2529\" data-end=\"2632\"><strong data-start=\"2529\" data-end=\"2569\">RFID, Bluetooth, and Wi-Fi scanning<\/strong> for unauthorized signals (smartwatches, mobile hotspots).<\/p><\/li><li data-start=\"2633\" data-end=\"2751\"><p data-start=\"2635\" data-end=\"2751\"><strong data-start=\"2635\" data-end=\"2671\">Use of Faraday devices<\/strong> (signal blocking): for example, domes over desks or shielded classrooms.<\/p><\/li><li data-start=\"2752\" data-end=\"2841\"><p data-start=\"2754\" data-end=\"2841\"><strong data-start=\"2754\" data-end=\"2781\">360\u00b0 video surveillance<\/strong> or <strong data-start=\"2785\" data-end=\"2818\">dual camera setup<\/strong> (frontal + overhead).<\/p><\/li><li data-start=\"2842\" data-end=\"2939\"><p data-start=\"2844\" data-end=\"2939\"><strong data-start=\"2844\" data-end=\"2872\">Ambient noise monitoring<\/strong> to detect voice assistants (such as Siri or Google Assistant).<\/p><\/li><\/ul><p data-start=\"2941\" data-end=\"2969\"><strong data-start=\"2941\" data-end=\"2969\">For temporary spaces:<\/strong><\/p><ul data-start=\"2970\" data-end=\"3123\"><li data-start=\"2970\" data-end=\"3063\"><p data-start=\"2972\" data-end=\"3063\">Portable scanners (such as Flipper Zero or Wi-Spy Air) are ideal for on-site pre-scan.<\/p><\/li><li data-start=\"3064\" data-end=\"3123\"><p data-start=\"3066\" data-end=\"3123\">Backup power &amp; failover internet for surveillance cameras.<\/p><\/li><\/ul><h4 data-start=\"3125\" data-end=\"3192\">3.4 Layer 4: Content AI resistance of exam questions<\/h4><p data-start=\"3194\" data-end=\"3320\">Even if candidates had access to AI, smart question design can prevent those tools from generating useful answers.<\/p><p data-start=\"3322\" data-end=\"3363\"><strong data-start=\"3322\" data-end=\"3363\">Technical &amp; didactic strategies:<\/strong><\/p><ul data-start=\"3364\" data-end=\"3713\"><li data-start=\"3364\" data-end=\"3459\"><p data-start=\"3366\" data-end=\"3459\"><strong data-start=\"3366\" data-end=\"3388\">Multimodal questions<\/strong> with pictures, diagrams or charts in which AIs perform weaker.<\/p><\/li><li data-start=\"3460\" data-end=\"3540\"><p data-start=\"3462\" data-end=\"3540\"><strong data-start=\"3462\" data-end=\"3490\">Cumulative question sets<\/strong>: where each answer depends on prior understanding.<\/p><\/li><li data-start=\"3541\" data-end=\"3630\"><p data-start=\"3543\" data-end=\"3630\"><strong data-start=\"3543\" data-end=\"3574\">Context-sensitive assignments<\/strong> (e.g., clinical cases with conflicting information).<\/p><\/li><li data-start=\"3631\" data-end=\"3713\"><p data-start=\"3633\" data-end=\"3713\"><strong data-start=\"3633\" data-end=\"3660\">Dynamic randomization<\/strong>: no two candidates receive the exact same questions.<\/p><\/li><\/ul><p data-start=\"3715\" data-end=\"3744\"><strong data-start=\"3715\" data-end=\"3744\">Support techniques:<\/strong><\/p><ul data-start=\"3745\" data-end=\"3906\"><li data-start=\"3745\" data-end=\"3828\"><p data-start=\"3747\" data-end=\"3828\">AI vulnerability scoring: test which questions are easily solved by LLMs.<\/p><\/li><li data-start=\"3829\" data-end=\"3906\"><p data-start=\"3831\" data-end=\"3906\">Use tools such as OpenAI Detector, GPTZero for pre-screening queries.<\/p><\/li><\/ul><h4 data-start=\"3908\" data-end=\"3970\">3.5 Layer 5: Monitoring &amp; behavioral analysis during examination<\/h4><p data-start=\"3972\" data-end=\"4062\">Live detection of suspicious patterns is essential for real-time action.<\/p><p data-start=\"4064\" data-end=\"4088\"><strong data-start=\"4064\" data-end=\"4088\">Technical resources:<\/strong><\/p><ul data-start=\"4089\" data-end=\"4494\"><li data-start=\"4089\" data-end=\"4226\"><p data-start=\"4091\" data-end=\"4226\"><strong data-start=\"4091\" data-end=\"4130\">Live video &amp; screenshare monitoring<\/strong>, combined with AI analysis of facial expressions, eye movement, and mouse\/key interactions.<\/p><\/li><li data-start=\"4227\" data-end=\"4318\"><p data-start=\"4229\" data-end=\"4318\"><strong data-start=\"4229\" data-end=\"4249\">Input monitoring<\/strong>: detection of inhuman typing rates or patterns (burst typing).<\/p><\/li><li data-start=\"4319\" data-end=\"4408\"><p data-start=\"4321\" data-end=\"4408\"><strong data-start=\"4321\" data-end=\"4345\">Browser focus analysis<\/strong>: records when the candidate clicks out of the exam window.<\/p><\/li><li data-start=\"4409\" data-end=\"4494\"><p data-start=\"4411\" data-end=\"4494\"><strong data-start=\"4411\" data-end=\"4428\">Audit logging<\/strong>: central recording of all system and user interactions.<\/p><\/li><\/ul><p data-start=\"4496\" data-end=\"4535\"><strong data-start=\"4496\" data-end=\"4535\">For scalable temporary setups:<\/strong><\/p><ul data-start=\"4536\" data-end=\"4667\"><li data-start=\"4536\" data-end=\"4602\"><p data-start=\"4538\" data-end=\"4602\">Cloud-based proctoring platforms with integrated analytics.<\/p><\/li><li data-start=\"4603\" data-end=\"4667\"><p data-start=\"4605\" data-end=\"4667\">Lightweight clients (Chromebook, tablets with external camera).<\/p><\/li><\/ul><h4 data-start=\"4669\" data-end=\"4741\">3.6 Layer 6: Post-exam forensic evaluation &amp; anomaly detection<\/h4><p data-start=\"4743\" data-end=\"4856\">After the exam, automatic analysis should detect anomalous patterns and escalate potential frauds.<\/p><p data-start=\"4858\" data-end=\"4873\"><strong data-start=\"4858\" data-end=\"4873\">Techniques:<\/strong><\/p><ul data-start=\"4874\" data-end=\"5230\"><li data-start=\"4874\" data-end=\"4975\"><p data-start=\"4876\" data-end=\"4975\"><strong data-start=\"4876\" data-end=\"4906\">Natural Language Forensics<\/strong>: recognizes output that resembles LLM language structure (repetitions, style).<\/p><\/li><li data-start=\"4976\" data-end=\"5075\"><p data-start=\"4978\" data-end=\"5075\"><strong data-start=\"4978\" data-end=\"5016\">Statistical comparison models<\/strong>: comparison of individual scores with group mean.<\/p><\/li><li data-start=\"5076\" data-end=\"5135\"><p data-start=\"5078\" data-end=\"5135\"><strong data-start=\"5078\" data-end=\"5112\">Plagiarism &amp; duplication control<\/strong> on answer structures.<\/p><\/li><li data-start=\"5136\" data-end=\"5230\"><p data-start=\"5138\" data-end=\"5230\"><strong data-start=\"5138\" data-end=\"5162\">Behavioral forensics<\/strong>: comparison with historical behavioral pattern of the same candidate.<\/p><\/li><\/ul><p data-start=\"5232\" data-end=\"5256\"><strong data-start=\"5232\" data-end=\"5256\">Temporary locations:<\/strong><\/p><ul data-start=\"5257\" data-end=\"5391\"><li data-start=\"5257\" data-end=\"5319\"><p data-start=\"5259\" data-end=\"5319\">Data automatically sent to central server for analysis.<\/p><\/li><li data-start=\"5320\" data-end=\"5391\"><p data-start=\"5322\" data-end=\"5391\">Low latency required to synchronize video and input data in a timely manner.<\/p><\/li><\/ul><h3 data-start=\"2325\" data-end=\"2383\">Conclusion<\/h3><p data-start=\"2384\" data-end=\"2423\"><span class=\"relative -mx-px my-[-0.2rem] rounded px-px py-[0.2rem] transition-colors duration-100 ease-in-out\">The observation of ChatGPT use during the medical entrance exam in Flanders shows that technical as well as organizational security layers are crucial-even in small, temporary exam environments. By deploying a block of secure browsers, proctoring (AI assisted and human), multimodal question design, behavioral analysis and clear processes, we significantly reduce the risk of AI-based fraud. Add digital ethics and oral review for maximum robustness. Want support implementing a secure exam environment? Then schedule a call to discuss how Network IT can secure your exam processes against ChatGPT abuse.    <\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div style=\"margin: 20px 0;\"><div class=\"qrcswholewtapper\" style=\"text-align:left;\"><div class=\"qrcprowrapper\"  id=\"qrcwraa2leds\"><div class=\"qrc_canvass\" id=\"qrc_cuttenpages_2\" style=\"display:none\" data-text=\"https:\/\/www.network-it.be\/en\/information\/how-chatgpt-abuse-in-physician-entrance-exam-could-have-been-prevented-an-it-and-cybersecurity-perspective\/\"><\/div><\/div><\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>In July 2025, it was first found that students used ChatGPT during the medical entrance exam in Flanders, despite security measures such as disabling Internet access.<span class=\"excerpt-hellip\"> [\u2026]<\/span><\/p>\n","protected":false},"author":1,"featured_media":157259,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":"","wds_primary_category":0,"footnotes":""},"categories":[63,62,54,60],"tags":[],"class_list":["post-178122","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ai","category-cybersecurity","category-information","category-security"],"_links":{"self":[{"href":"https:\/\/www.network-it.be\/en\/wp-json\/wp\/v2\/posts\/178122","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.network-it.be\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.network-it.be\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.network-it.be\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.network-it.be\/en\/wp-json\/wp\/v2\/comments?post=178122"}],"version-history":[{"count":1,"href":"https:\/\/www.network-it.be\/en\/wp-json\/wp\/v2\/posts\/178122\/revisions"}],"predecessor-version":[{"id":178127,"href":"https:\/\/www.network-it.be\/en\/wp-json\/wp\/v2\/posts\/178122\/revisions\/178127"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.network-it.be\/en\/wp-json\/wp\/v2\/media\/157259"}],"wp:attachment":[{"href":"https:\/\/www.network-it.be\/en\/wp-json\/wp\/v2\/media?parent=178122"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.network-it.be\/en\/wp-json\/wp\/v2\/categories?post=178122"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.network-it.be\/en\/wp-json\/wp\/v2\/tags?post=178122"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}