SlideShare una empresa de Scribd logo
1 de 32
Upcoming Caveon Events


• NCME Conference, April 26 – 30th, San Francisco
     Test Security I: Policy Issues: Technical/
     Statistical/Methodological Issues.
  – Presenters include: Dr. John J. Fremer


• USDLA Conference, April 28- May 1, St. Louis
     Will the real learner please stand up?
  – Presenters include Caveon’s Jamie Mulkey, Ed.D. and Patrick
    Martin
Latest Publications

• Handbook of Test Security – Pre-order your
  copy today. To be published March 27th. We’ll
  share a discount code before end of session.

• TILSA Guidebook for State Assessment
  Directors on Data Forensics – just released
Caveon Online
• Caveon Security Insights Blog
   – http://www.caveon.com/blog/
• twitter
   – Follow @Caveon
• LinkedIn
   – Caveon Company Page
   – “Caveon Test Security” Group
       • Please contribute!
• Facebook
   – Will you be our “friend?”
   – “Like” us!
                     www.caveon.com
Caveon Webinar Series:

     “The Handbook of Test Security”
Learn more about preventing & detecting cheating on high-stakes tests


     Dr. James A. Wollack                       Dr. John Fremer
     Associate Professor                        President
     Educational Psychology                     Caveon Consulting Service
     Director, Testing & Evaluation Services
     University of Wisconsin-Madison


                               March 21, 2013
Agenda for today


• James Wollack
  – Introduction to the Handbook of Test Security
  – Parts 1 & 2
• John Fremer
  – Part 2 & 3
• James Wollack
  – Contributing Authors
  – 10 Takeaways
HANDBOOK OF TEST SECURITY

•   Editors - James Wollack & John Fremer
•   Slated for Publication – March 2013
•   Preventing, Detecting, and Investigating Cheating
•   Testing in Many Domains
     – Certification/Licensure
    – Clinical
    – Educational
    – Industrial/Organizational
CURRENT STATE OF TESTING

• Large-scale, Standardized Testing is an
  Integral Part of our Culture
• Incentive to Cheat on Tests has never been
  Higher
   – Cheating is a very real problem
   – Extends across all walks of testing
• Presence of Test Security Themes at
  Professional Conferences has Skyrocketed
   – Much of what is known about test security
     resides in testing companies and is proprietary
PRIMARY AIMS OF THE HANDBOOK
• Advance the science of test security
• Draw on insights of psychometricians and
  policy-makers to provide a comprehensive
  resource that deals with all aspects of test
  security for all genres of testing.
   • Best practices for designing secure tests

   • Analysis of security vulnerabilities

   • Practical cheating prevention/detection
     strategies

   • Lessons learned in actual security violations
     and initiatives
ORGANIZATION OF HANDBOOK

• Part I: Designing Secure Delivery Systems
   – Security vulnerabilities unique to modality
   – Chapters focus on prevalence, major threats,
     prevention, detection
• Part II: Important Issues in Test Security
   – Maintaining security before and after exam
   – Developing a security culture throughout all
     phases of organization
   – Reconnaissance effort following breach
• Part III: Lessons Learned from Practice
   – Case studies from a variety of disciplines
INTRODUCTION
            The Test Security Threat
        James A. Wollack & John J. Fremer

– Cheating is pervasive and no testing program is immune
– Extremely costly to programs and reputations of both
  testing industry and discipline
– Very difficult to catch
PART I: DESIGNING SECURE DELIVERY SYSTEMS

   Security in Large-Scale Paper and Pencil Testing
            John J. Fremer and Steve Ferrara


  – K-12 accountability and national admissions testing
  – Methods
     • Cheating by examinees and administrators
     • Exposure/disclosure of secure test materials
     • Inappropriate test preparation
     • Inappropriate test administration
  – Prevention & Detection
  – Recommendations for Testing Program Managers
PART I: DESIGNING SECURE DELIVERY SYSTEMS
  Security Issues in Technology-Based Testing
                  David Foster

 • Use of technology to build and deliver tests has
   created many new vulnerabilities
        • on-demand testing
        • Internet-based testing
        • electronic distribution of test files
        • storage of item banks, test files, results, examinee
          info
        • test question over-exposure
        • testing centers
    – Theft vs. Cheating
    – Prevention, Deterrence, and Detection strategies
PART I: DESIGNING SECURE DELIVERY SYSTEMS

    Security Issues in Classroom Testing
               Louis Woodruff

 – Teacher-made tests, predominantly paper-based
 – Many of the types of cheating are the same as those
   on standardized tests, but particulars are often quite
   different
    • Teacher usually knows students, sometimes quite well
    • Students know each other, often very well
    • Much greater physical security vulnerabilities
 – Deterring cheating & mitigating motivations to cheat
    • Practical, realistic, straightforward approaches
PART I: DESIGNING SECURE DELIVERY SYSTEMS

        Security Issues in Writing Assessment
                    Suzanne Lane

    – Both large-scale and classroom writing assessments
    – Security vulnerabilities:
       • Prompts (and related text, if applicable)
       • Responses
    – Plagiarism
       • Detection systems
       • Prevention of plagiarism
    – Automated essay scoring and gaming
PART II: IMPORTANT ISSUES IN TEST SECURITY

Physical Security at Test Centers and the Testing Company
       Anthony R. Scicchitano and Roger D. Meade

  – Controlling physical testing environment to protect data
     • layout of the testing environment
     • check-in/examinee authentication process
     • proctoring
     • handling of test materials
     • security audits
PART II: IMPORTANT ISSUES IN TEST SECURITY

  Educator Cheating and the Statistical Detection of
        Group-Based Test Security Threats
                  Dennis Maynes

   – Data Forensics with focus on detecting collusion or
     groups of individuals
       • largely non-technical description
       • credibility of various sources of data
   – Standards for statistical evidence of test security
     breaches
PART II: IMPORTANT ISSUES IN TEST SECURITY

       Legal Matters in Test Security
  Jennifer Ancona Semko and Robert Hunt

  – Examined case law related to score cancelation
    and the basics of U.S. Copyright law
  – Before the exam: Candidate agreements and
    organizational security policies
  – During the exam: legal issues with biometric data
    & proctor intervention
  – After the exam: No need to “prove” cheating,
    taking action against copyright infringement
  – Emphasis on being prepared for a possible lawsuit
    before the incident.
PART II: IMPORTANT ISSUES IN TEST SECURITY

    Security Planning, Training, and Monitoring
   Cyndy Thomas Fitzgerald and Jamie R. Mulkey

    –   Need comprehensive written security plan
    –   Develop related training materials
    –   Provide and keep current training
    –   Follow clear guidelines
PART II: IMPORTANT ISSUES IN TEST SECURITY

       Conducting Investigations of Misconduct
   Deborah J. Harris and Rachel R. Watkins Schoenig

   –   Importance of examinee/sponsor agreements
   –   Decide on “triggers” for investigations
   –   Provide “understandable” results
   –   Scrupulously follow your rules
PART II: IMPORTANT ISSUES IN TEST SECURITY

         Security Related Communications
        Susan M. Case and Beth E. Donahue

    – Need thoughtful plan of communication
    – Regular briefings and updates
    – Decision makers identified
       • Operational
       • Policy
    – Document security threats and their resolution
PART III – CASE STUDIES

Certification/Licensure Testing Case Studies
              Janet Duffy Carson

–   Healthy level of paranoia
–   Commitment to follow up on problems identified
–   Careful attention to training
–   Include dealing with “unusual events”
–   Register copyrights
–   Use outside resources when appropriate
PART III – CASE STUDIES
      Prevention, Detection, and Management of
       Falsified Test Development Data (Clinical)
     Kevin M. Williams, Sara Rzepa, Gill Sitarenios,
                      Hazel Wheldon

• Very real danger of fraudulent data
   – Develop industry standards
      • Preventative methods
      • Warning signals
   – Compare data from different sites
PART III – CASE STUDIES

              Educational Testing
                Neal Kingston

–   Pressures to cheat increasing
–   Make unethical behavior very clear
–   Use multiple statistical methods
–   Must act on data
–   Management of communications essential
PART III – CASE STUDIES
Industrial/Organizational Testing Case Studies
       Dave Bartram and Eugene Burke

 – Body of knowledge growing
 – Use multiple testing and scoring mechanisms
 – Benefit to using honesty contracts
PART III – CASE STUDIES
             Commentary on Case Studies
                 William Hatherill


- Offers useful observations that cut across all of the case
studies
ADVICE FOR THE READER
• Identify your most significant vulnerabilities
• “Skim read” chapters relating to your program
   – Earmark chapters and sections for you and/or staff to
     read carefully
   – Cross-reference those sections with list of
     vulnerabilities
   – Update your list of vulnerabilities as you read
• Develop a plan for addressing these
  vulnerabilities
• Re-read sections as you deal with the issues
  addressed
• Follow the advice of the leading security
  experts
HANDBOOK CONTRIBUTORS
Dave Bartram, SHL Group Ltd.                            Suzanne Lane, University of Pittsburgh
Eugene Burke, SHL Group Ltd.                            Dennis Maynes, Caveon Test Security
Janet Duffy Carson, Legal Consultant                    Roger D. Meade, Prometric, Inc.
Susan M. Case, National Conference of Bar Examiners     Jaime R. Mulkey, , Caveon Test Security
Beth E. Donahue, Data Recognition Corporation           Sara Rzepa , Multi-Health Systems, Inc.
Steve Ferrara, Pearson                                  Rachel R. Watkins Schoenig, ACT, Inc.
Cyndy Thomas Fitzgerald, Fitzgerald & Associates        Anthony R. Scicchitano , Prometric, Inc.
David Foster, Kryterion, Inc.                           Jennifer Ancona Semko, Baker & McKenzie LLP
John J. Fremer, Caveon Test Security                    Gill Sitarenios , Multi-Health Systems, Inc.
Deborah J. Harris, ACT, Inc.                            Hazel Wheldon, Multi-Health Systems, Inc.
William Hatherill, Fed. of State Boards of Phys. Therapy Kevin M. Williams , Multi-Health Systems, Inc.
Robert Hunt, Western Governors University               James A. Wollack, University of Wisconsin
Neal Kingston, University of Kansas                     Louis Woodruff, Caveon Test Security
TOP 10 TAKEAWAYS FROM HANDBOOK

 1. Don’t become desensitized to cheating
 2. Know your vulnerabilities
 3. Many tools are available to identify, reduce
    likelihood of and mitigate damage from
    security breaches
 4. Most serious threats to security happen
    before or after the test
 5. Legal standards exist for score cancelation
    policies and admissibility of statistical
    evidence
TOP 10 TAKEAWAYS FROM HANDBOOK
6. Security planning is critically important
7. Technology is both a friend and enemy
8. We can learn important lessons from the test
   compromise experiences of our colleagues
9. It takes a village to protect the integrity of
   our tests
10. Test fraud is dynamic…we must respond in
    kind
RESOURCES

• CCSSO/ATP – Operational Best Practices
• ATP Security Committee
• Caveon Test Security
   – Blog
   – Webinars
• (Just released) NCME Guidelines
• (Just released) TILSA Guidebook for State
  Assessment Directors on Data Forensics
WHERE TO PURCHASE

• Don’t forget to pre-order your copy of the
  Handbook of Test Security
• www.routledge.com
   – http://bit.ly/HandbookTS (Case Sensitive)
   – Save 20% - Enter discount code: HYJ82
THANK YOU!
Dr. James A. Wollack                  Dr. John Fremer
Associate Professor                     President
Educational Psychology                  Caveon Consulting Services
Director, Testing & Evaluation Services john.fremer@caveon.com
University of Wisconsin-Madison
jwollack@wisc.edu



            - Follow Caveon on twitter @caveon
            - Check out our blog…www.caveon.com/blog/
            - LinkedIn Group – “Caveon Test Security”

Más contenido relacionado

Destacado

Caveon Webinar - Weathering the Perfect Test Security Storm May 2015 edited
Caveon Webinar  - Weathering the Perfect Test Security Storm May 2015 editedCaveon Webinar  - Weathering the Perfect Test Security Storm May 2015 edited
Caveon Webinar - Weathering the Perfect Test Security Storm May 2015 edited
Caveon Test Security
 
Caveon Webinar Series: Weathering the Perfect Test Security Storm - February ...
Caveon Webinar Series: Weathering the Perfect Test Security Storm - February ...Caveon Webinar Series: Weathering the Perfect Test Security Storm - February ...
Caveon Webinar Series: Weathering the Perfect Test Security Storm - February ...
Caveon Test Security
 
Caveon Webinar Series - Security Challenges in Creating Testing Programs - Se...
Caveon Webinar Series - Security Challenges in Creating Testing Programs - Se...Caveon Webinar Series - Security Challenges in Creating Testing Programs - Se...
Caveon Webinar Series - Security Challenges in Creating Testing Programs - Se...
Caveon Test Security
 
Caveon Webinar Series: Considerations for Online Assessment Program Design
Caveon Webinar Series: Considerations for Online Assessment Program Design Caveon Webinar Series: Considerations for Online Assessment Program Design
Caveon Webinar Series: Considerations for Online Assessment Program Design
Caveon Test Security
 

Destacado (15)

Caveon Webinar Series Lessons Learned at NCSA and ITC July 2014
Caveon Webinar Series Lessons Learned at NCSA and ITC July 2014Caveon Webinar Series Lessons Learned at NCSA and ITC July 2014
Caveon Webinar Series Lessons Learned at NCSA and ITC July 2014
 
Caveon Webinar Series - Mastering the US DOE Test Security Requirements Janua...
Caveon Webinar Series - Mastering the US DOE Test Security Requirements Janua...Caveon Webinar Series - Mastering the US DOE Test Security Requirements Janua...
Caveon Webinar Series - Mastering the US DOE Test Security Requirements Janua...
 
Caveon Webinar Series - Creating Your Test Security Game Plan - March 2016
Caveon Webinar Series -  Creating Your Test Security Game Plan - March 2016Caveon Webinar Series -  Creating Your Test Security Game Plan - March 2016
Caveon Webinar Series - Creating Your Test Security Game Plan - March 2016
 
Caveon Webinar - Weathering the Perfect Test Security Storm May 2015 edited
Caveon Webinar  - Weathering the Perfect Test Security Storm May 2015 editedCaveon Webinar  - Weathering the Perfect Test Security Storm May 2015 edited
Caveon Webinar - Weathering the Perfect Test Security Storm May 2015 edited
 
Caveon Webinar Series - Integrating Data Forensics into the Entire Test Secur...
Caveon Webinar Series - Integrating Data Forensics into the Entire Test Secur...Caveon Webinar Series - Integrating Data Forensics into the Entire Test Secur...
Caveon Webinar Series - Integrating Data Forensics into the Entire Test Secur...
 
Caveon Webinar Series - Learning and Teaching Best Practices in Test Security...
Caveon Webinar Series - Learning and Teaching Best Practices in Test Security...Caveon Webinar Series - Learning and Teaching Best Practices in Test Security...
Caveon Webinar Series - Learning and Teaching Best Practices in Test Security...
 
Caveon Webinar Series: Preventing and Detecting Cheating, Lessons from CCSSO...
Caveon Webinar Series: Preventing and Detecting Cheating,  Lessons from CCSSO...Caveon Webinar Series: Preventing and Detecting Cheating,  Lessons from CCSSO...
Caveon Webinar Series: Preventing and Detecting Cheating, Lessons from CCSSO...
 
Caveon Webinar - International Testing 11-15-2011
Caveon Webinar - International Testing 11-15-2011Caveon Webinar - International Testing 11-15-2011
Caveon Webinar - International Testing 11-15-2011
 
Caveon Webinar Series: Protecting Tests Using Copyright Law
Caveon Webinar Series: Protecting Tests Using Copyright Law Caveon Webinar Series: Protecting Tests Using Copyright Law
Caveon Webinar Series: Protecting Tests Using Copyright Law
 
Caveon Webinar Series - Weathering the Perfect Test Security Storm May 2015
Caveon Webinar Series - Weathering the Perfect Test Security Storm May 2015Caveon Webinar Series - Weathering the Perfect Test Security Storm May 2015
Caveon Webinar Series - Weathering the Perfect Test Security Storm May 2015
 
Caveon Webinar Series: Weathering the Perfect Test Security Storm - February ...
Caveon Webinar Series: Weathering the Perfect Test Security Storm - February ...Caveon Webinar Series: Weathering the Perfect Test Security Storm - February ...
Caveon Webinar Series: Weathering the Perfect Test Security Storm - February ...
 
Caveon Webinar Series - Security Challenges in Creating Testing Programs - Se...
Caveon Webinar Series - Security Challenges in Creating Testing Programs - Se...Caveon Webinar Series - Security Challenges in Creating Testing Programs - Se...
Caveon Webinar Series - Security Challenges in Creating Testing Programs - Se...
 
Caveon Webinar Series: Considerations for Online Assessment Program Design
Caveon Webinar Series: Considerations for Online Assessment Program Design Caveon Webinar Series: Considerations for Online Assessment Program Design
Caveon Webinar Series: Considerations for Online Assessment Program Design
 
Caveon Webinar Series - The Test Security Framework- Why Different Tests Nee...
Caveon Webinar Series -  The Test Security Framework- Why Different Tests Nee...Caveon Webinar Series -  The Test Security Framework- Why Different Tests Nee...
Caveon Webinar Series - The Test Security Framework- Why Different Tests Nee...
 
Caveon Webinar Series - Test Cheaters Say the Darnedest Things! - 072016
Caveon Webinar Series -  Test Cheaters Say the Darnedest Things! - 072016Caveon Webinar Series -  Test Cheaters Say the Darnedest Things! - 072016
Caveon Webinar Series - Test Cheaters Say the Darnedest Things! - 072016
 

Similar a Caveon Webinar Series: The Handbook of Test Security – Learn more about preventing and detecting cheating on high stakes tests

SEC401 Threat and VulnerabilityManagementCopyright ©201.docx
SEC401 Threat and VulnerabilityManagementCopyright ©201.docxSEC401 Threat and VulnerabilityManagementCopyright ©201.docx
SEC401 Threat and VulnerabilityManagementCopyright ©201.docx
rtodd280
 
Application of Q methodology in critical success factors of information secur...
Application of Q methodology in critical success factors of information secur...Application of Q methodology in critical success factors of information secur...
Application of Q methodology in critical success factors of information secur...
stuimrozsm
 
Honours Project - Poster
Honours Project - PosterHonours Project - Poster
Honours Project - Poster
Andrew Kerr
 
Safety culture _ Aguilera version
Safety culture _ Aguilera versionSafety culture _ Aguilera version
Safety culture _ Aguilera version
Christina Aguilera
 

Similar a Caveon Webinar Series: The Handbook of Test Security – Learn more about preventing and detecting cheating on high stakes tests (20)

Caveon Webinar Series: What you Should Know about High Stakes Cheating in You...
Caveon Webinar Series: What you Should Know about High Stakes Cheating in You...Caveon Webinar Series: What you Should Know about High Stakes Cheating in You...
Caveon Webinar Series: What you Should Know about High Stakes Cheating in You...
 
The Endless Security Summer - Caveon Webinar 8-22-2012
The Endless Security Summer - Caveon Webinar 8-22-2012The Endless Security Summer - Caveon Webinar 8-22-2012
The Endless Security Summer - Caveon Webinar 8-22-2012
 
SEC401 Threat and VulnerabilityManagementCopyright ©201.docx
SEC401 Threat and VulnerabilityManagementCopyright ©201.docxSEC401 Threat and VulnerabilityManagementCopyright ©201.docx
SEC401 Threat and VulnerabilityManagementCopyright ©201.docx
 
01-intro.pptx
01-intro.pptx01-intro.pptx
01-intro.pptx
 
Ensuring Security through Continuous Testing
Ensuring Security through Continuous TestingEnsuring Security through Continuous Testing
Ensuring Security through Continuous Testing
 
Leverage Your EDC Solution to Mitigate Risk in Clinical Research
Leverage Your EDC Solution to Mitigate Risk in Clinical ResearchLeverage Your EDC Solution to Mitigate Risk in Clinical Research
Leverage Your EDC Solution to Mitigate Risk in Clinical Research
 
Application of Q methodology in critical success factors of information secur...
Application of Q methodology in critical success factors of information secur...Application of Q methodology in critical success factors of information secur...
Application of Q methodology in critical success factors of information secur...
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information security
 
Caveon Webinar Series: The Good and Bad of Online Proctoring
Caveon Webinar Series: The Good and Bad of Online ProctoringCaveon Webinar Series: The Good and Bad of Online Proctoring
Caveon Webinar Series: The Good and Bad of Online Proctoring
 
NEBOSH HSE PSM Element 1 v1.pdf
NEBOSH HSE PSM Element 1 v1.pdfNEBOSH HSE PSM Element 1 v1.pdf
NEBOSH HSE PSM Element 1 v1.pdf
 
Research & Statistics.pptx
Research & Statistics.pptxResearch & Statistics.pptx
Research & Statistics.pptx
 
How to assess and manage cyber risk
How to assess and manage cyber riskHow to assess and manage cyber risk
How to assess and manage cyber risk
 
Lessons from Texas City | Michael P. Broadribb, Baker Engineering & Risk Cons...
Lessons from Texas City | Michael P. Broadribb, Baker Engineering & Risk Cons...Lessons from Texas City | Michael P. Broadribb, Baker Engineering & Risk Cons...
Lessons from Texas City | Michael P. Broadribb, Baker Engineering & Risk Cons...
 
Honours Project - Poster
Honours Project - PosterHonours Project - Poster
Honours Project - Poster
 
Focusing on the Threats to the Detriment of the Vulnerabilities
Focusing on the Threats to the Detriment of the VulnerabilitiesFocusing on the Threats to the Detriment of the Vulnerabilities
Focusing on the Threats to the Detriment of the Vulnerabilities
 
Experimentalmethod
ExperimentalmethodExperimentalmethod
Experimentalmethod
 
Experimentalmethod 120928102524-phpapp02
Experimentalmethod 120928102524-phpapp02Experimentalmethod 120928102524-phpapp02
Experimentalmethod 120928102524-phpapp02
 
Safety culture _ Aguilera version
Safety culture _ Aguilera versionSafety culture _ Aguilera version
Safety culture _ Aguilera version
 
Caveon Webinar Series - Exam Integrity Investigations, An Introduction to th...
Caveon Webinar Series -  Exam Integrity Investigations, An Introduction to th...Caveon Webinar Series -  Exam Integrity Investigations, An Introduction to th...
Caveon Webinar Series - Exam Integrity Investigations, An Introduction to th...
 
information security management
information security managementinformation security management
information security management
 

Más de Caveon Test Security

Caveon webinar series - smart items- using innovative item design to make you...
Caveon webinar series - smart items- using innovative item design to make you...Caveon webinar series - smart items- using innovative item design to make you...
Caveon webinar series - smart items- using innovative item design to make you...
Caveon Test Security
 
Caveon webinar series - smart items- using innovative item design to make you...
Caveon webinar series - smart items- using innovative item design to make you...Caveon webinar series - smart items- using innovative item design to make you...
Caveon webinar series - smart items- using innovative item design to make you...
Caveon Test Security
 
Caveon Webinar Series - Unlocking the Mystery of the Validity Triangle 11-2014
Caveon Webinar Series - Unlocking the Mystery of the Validity Triangle 11-2014Caveon Webinar Series - Unlocking the Mystery of the Validity Triangle 11-2014
Caveon Webinar Series - Unlocking the Mystery of the Validity Triangle 11-2014
Caveon Test Security
 
Caveon webinar series Standard Setting for the 21st Century, Using Informa...
Caveon webinar series    Standard Setting for the 21st Century, Using Informa...Caveon webinar series    Standard Setting for the 21st Century, Using Informa...
Caveon webinar series Standard Setting for the 21st Century, Using Informa...
Caveon Test Security
 

Más de Caveon Test Security (18)

Unpublished study indicates high chance of fraud in thousands of tests of enem
Unpublished study indicates high chance of fraud in thousands of tests of enemUnpublished study indicates high chance of fraud in thousands of tests of enem
Unpublished study indicates high chance of fraud in thousands of tests of enem
 
Caveon webinar series - smart items- using innovative item design to make you...
Caveon webinar series - smart items- using innovative item design to make you...Caveon webinar series - smart items- using innovative item design to make you...
Caveon webinar series - smart items- using innovative item design to make you...
 
Caveon webinar series - smart items- using innovative item design to make you...
Caveon webinar series - smart items- using innovative item design to make you...Caveon webinar series - smart items- using innovative item design to make you...
Caveon webinar series - smart items- using innovative item design to make you...
 
Caveon Webinar Series - A Guide to Online Protection Strategies - March 28, ...
Caveon Webinar Series -  A Guide to Online Protection Strategies - March 28, ...Caveon Webinar Series -  A Guide to Online Protection Strategies - March 28, ...
Caveon Webinar Series - A Guide to Online Protection Strategies - March 28, ...
 
Caveon Webinar Series - Five Things You Can Do Now to Protect Your Assessment...
Caveon Webinar Series - Five Things You Can Do Now to Protect Your Assessment...Caveon Webinar Series - Five Things You Can Do Now to Protect Your Assessment...
Caveon Webinar Series - Five Things You Can Do Now to Protect Your Assessment...
 
The Do's and Dont's of Administering High Stakes Tests in Schools Final 121217
The Do's and Dont's of Administering High Stakes Tests in Schools Final 121217The Do's and Dont's of Administering High Stakes Tests in Schools Final 121217
The Do's and Dont's of Administering High Stakes Tests in Schools Final 121217
 
Caveon Webinar Series - The Art of Test Security - Know Thy Enemy - November ...
Caveon Webinar Series - The Art of Test Security - Know Thy Enemy - November ...Caveon Webinar Series - The Art of Test Security - Know Thy Enemy - November ...
Caveon Webinar Series - The Art of Test Security - Know Thy Enemy - November ...
 
Caveon Webinar Series - Four Steps to Effective Investigations in School Dis...
Caveon Webinar Series -  Four Steps to Effective Investigations in School Dis...Caveon Webinar Series -  Four Steps to Effective Investigations in School Dis...
Caveon Webinar Series - Four Steps to Effective Investigations in School Dis...
 
Caveon Webinar Series - On-site Monitoring in Districts 0317
Caveon Webinar Series - On-site Monitoring in Districts 0317Caveon Webinar Series - On-site Monitoring in Districts 0317
Caveon Webinar Series - On-site Monitoring in Districts 0317
 
CESP Study Session #1 October 2016
CESP Study Session #1 October 2016CESP Study Session #1 October 2016
CESP Study Session #1 October 2016
 
A Tale of Two Cities - School District Webinar #1 Jan 2017
A Tale of Two Cities - School District Webinar  #1 Jan 2017A Tale of Two Cities - School District Webinar  #1 Jan 2017
A Tale of Two Cities - School District Webinar #1 Jan 2017
 
Caveon Webinar Series - Discrete Option Multiple Choice: A Revolution in Te...
Caveon Webinar Series  - Discrete Option Multiple Choice:  A Revolution in Te...Caveon Webinar Series  - Discrete Option Multiple Choice:  A Revolution in Te...
Caveon Webinar Series - Discrete Option Multiple Choice: A Revolution in Te...
 
Caveon Webinar Series - Conducting Test Security Investigations in School Di...
Caveon Webinar Series -  Conducting Test Security Investigations in School Di...Caveon Webinar Series -  Conducting Test Security Investigations in School Di...
Caveon Webinar Series - Conducting Test Security Investigations in School Di...
 
Caveon Webinar Series - Will the Real Cloned Item Please Stand Up? final
Caveon Webinar Series -  Will the Real Cloned Item Please Stand Up? finalCaveon Webinar Series -  Will the Real Cloned Item Please Stand Up? final
Caveon Webinar Series - Will the Real Cloned Item Please Stand Up? final
 
Caveon Webinar Series - Lessons Learned at the 2015 National Conference on S...
Caveon Webinar Series -  Lessons Learned at the 2015 National Conference on S...Caveon Webinar Series -  Lessons Learned at the 2015 National Conference on S...
Caveon Webinar Series - Lessons Learned at the 2015 National Conference on S...
 
Caveon Webinar Series - Unlocking the Mystery of the Validity Triangle 11-2014
Caveon Webinar Series - Unlocking the Mystery of the Validity Triangle 11-2014Caveon Webinar Series - Unlocking the Mystery of the Validity Triangle 11-2014
Caveon Webinar Series - Unlocking the Mystery of the Validity Triangle 11-2014
 
Caveon Webinar Series - Lessons Learned at the European Association of Test...
Caveon Webinar Series -  Lessons Learned at the  European Association of Test...Caveon Webinar Series -  Lessons Learned at the  European Association of Test...
Caveon Webinar Series - Lessons Learned at the European Association of Test...
 
Caveon webinar series Standard Setting for the 21st Century, Using Informa...
Caveon webinar series    Standard Setting for the 21st Century, Using Informa...Caveon webinar series    Standard Setting for the 21st Century, Using Informa...
Caveon webinar series Standard Setting for the 21st Century, Using Informa...
 

Último

Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
KarakKing
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 

Último (20)

SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Plant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxPlant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptx
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 

Caveon Webinar Series: The Handbook of Test Security – Learn more about preventing and detecting cheating on high stakes tests

  • 1. Upcoming Caveon Events • NCME Conference, April 26 – 30th, San Francisco Test Security I: Policy Issues: Technical/ Statistical/Methodological Issues. – Presenters include: Dr. John J. Fremer • USDLA Conference, April 28- May 1, St. Louis Will the real learner please stand up? – Presenters include Caveon’s Jamie Mulkey, Ed.D. and Patrick Martin
  • 2. Latest Publications • Handbook of Test Security – Pre-order your copy today. To be published March 27th. We’ll share a discount code before end of session. • TILSA Guidebook for State Assessment Directors on Data Forensics – just released
  • 3. Caveon Online • Caveon Security Insights Blog – http://www.caveon.com/blog/ • twitter – Follow @Caveon • LinkedIn – Caveon Company Page – “Caveon Test Security” Group • Please contribute! • Facebook – Will you be our “friend?” – “Like” us! www.caveon.com
  • 4. Caveon Webinar Series: “The Handbook of Test Security” Learn more about preventing & detecting cheating on high-stakes tests Dr. James A. Wollack Dr. John Fremer Associate Professor President Educational Psychology Caveon Consulting Service Director, Testing & Evaluation Services University of Wisconsin-Madison March 21, 2013
  • 5. Agenda for today • James Wollack – Introduction to the Handbook of Test Security – Parts 1 & 2 • John Fremer – Part 2 & 3 • James Wollack – Contributing Authors – 10 Takeaways
  • 6. HANDBOOK OF TEST SECURITY • Editors - James Wollack & John Fremer • Slated for Publication – March 2013 • Preventing, Detecting, and Investigating Cheating • Testing in Many Domains – Certification/Licensure – Clinical – Educational – Industrial/Organizational
  • 7. CURRENT STATE OF TESTING • Large-scale, Standardized Testing is an Integral Part of our Culture • Incentive to Cheat on Tests has never been Higher – Cheating is a very real problem – Extends across all walks of testing • Presence of Test Security Themes at Professional Conferences has Skyrocketed – Much of what is known about test security resides in testing companies and is proprietary
  • 8. PRIMARY AIMS OF THE HANDBOOK • Advance the science of test security • Draw on insights of psychometricians and policy-makers to provide a comprehensive resource that deals with all aspects of test security for all genres of testing. • Best practices for designing secure tests • Analysis of security vulnerabilities • Practical cheating prevention/detection strategies • Lessons learned in actual security violations and initiatives
  • 9. ORGANIZATION OF HANDBOOK • Part I: Designing Secure Delivery Systems – Security vulnerabilities unique to modality – Chapters focus on prevalence, major threats, prevention, detection • Part II: Important Issues in Test Security – Maintaining security before and after exam – Developing a security culture throughout all phases of organization – Reconnaissance effort following breach • Part III: Lessons Learned from Practice – Case studies from a variety of disciplines
  • 10. INTRODUCTION The Test Security Threat James A. Wollack & John J. Fremer – Cheating is pervasive and no testing program is immune – Extremely costly to programs and reputations of both testing industry and discipline – Very difficult to catch
  • 11. PART I: DESIGNING SECURE DELIVERY SYSTEMS Security in Large-Scale Paper and Pencil Testing John J. Fremer and Steve Ferrara – K-12 accountability and national admissions testing – Methods • Cheating by examinees and administrators • Exposure/disclosure of secure test materials • Inappropriate test preparation • Inappropriate test administration – Prevention & Detection – Recommendations for Testing Program Managers
  • 12. PART I: DESIGNING SECURE DELIVERY SYSTEMS Security Issues in Technology-Based Testing David Foster • Use of technology to build and deliver tests has created many new vulnerabilities • on-demand testing • Internet-based testing • electronic distribution of test files • storage of item banks, test files, results, examinee info • test question over-exposure • testing centers – Theft vs. Cheating – Prevention, Deterrence, and Detection strategies
  • 13. PART I: DESIGNING SECURE DELIVERY SYSTEMS Security Issues in Classroom Testing Louis Woodruff – Teacher-made tests, predominantly paper-based – Many of the types of cheating are the same as those on standardized tests, but particulars are often quite different • Teacher usually knows students, sometimes quite well • Students know each other, often very well • Much greater physical security vulnerabilities – Deterring cheating & mitigating motivations to cheat • Practical, realistic, straightforward approaches
  • 14. PART I: DESIGNING SECURE DELIVERY SYSTEMS Security Issues in Writing Assessment Suzanne Lane – Both large-scale and classroom writing assessments – Security vulnerabilities: • Prompts (and related text, if applicable) • Responses – Plagiarism • Detection systems • Prevention of plagiarism – Automated essay scoring and gaming
  • 15. PART II: IMPORTANT ISSUES IN TEST SECURITY Physical Security at Test Centers and the Testing Company Anthony R. Scicchitano and Roger D. Meade – Controlling physical testing environment to protect data • layout of the testing environment • check-in/examinee authentication process • proctoring • handling of test materials • security audits
  • 16. PART II: IMPORTANT ISSUES IN TEST SECURITY Educator Cheating and the Statistical Detection of Group-Based Test Security Threats Dennis Maynes – Data Forensics with focus on detecting collusion or groups of individuals • largely non-technical description • credibility of various sources of data – Standards for statistical evidence of test security breaches
  • 17. PART II: IMPORTANT ISSUES IN TEST SECURITY Legal Matters in Test Security Jennifer Ancona Semko and Robert Hunt – Examined case law related to score cancelation and the basics of U.S. Copyright law – Before the exam: Candidate agreements and organizational security policies – During the exam: legal issues with biometric data & proctor intervention – After the exam: No need to “prove” cheating, taking action against copyright infringement – Emphasis on being prepared for a possible lawsuit before the incident.
  • 18. PART II: IMPORTANT ISSUES IN TEST SECURITY Security Planning, Training, and Monitoring Cyndy Thomas Fitzgerald and Jamie R. Mulkey – Need comprehensive written security plan – Develop related training materials – Provide and keep current training – Follow clear guidelines
  • 19. PART II: IMPORTANT ISSUES IN TEST SECURITY Conducting Investigations of Misconduct Deborah J. Harris and Rachel R. Watkins Schoenig – Importance of examinee/sponsor agreements – Decide on “triggers” for investigations – Provide “understandable” results – Scrupulously follow your rules
  • 20. PART II: IMPORTANT ISSUES IN TEST SECURITY Security Related Communications Susan M. Case and Beth E. Donahue – Need thoughtful plan of communication – Regular briefings and updates – Decision makers identified • Operational • Policy – Document security threats and their resolution
  • 21. PART III – CASE STUDIES Certification/Licensure Testing Case Studies Janet Duffy Carson – Healthy level of paranoia – Commitment to follow up on problems identified – Careful attention to training – Include dealing with “unusual events” – Register copyrights – Use outside resources when appropriate
  • 22. PART III – CASE STUDIES Prevention, Detection, and Management of Falsified Test Development Data (Clinical) Kevin M. Williams, Sara Rzepa, Gill Sitarenios, Hazel Wheldon • Very real danger of fraudulent data – Develop industry standards • Preventative methods • Warning signals – Compare data from different sites
  • 23. PART III – CASE STUDIES Educational Testing Neal Kingston – Pressures to cheat increasing – Make unethical behavior very clear – Use multiple statistical methods – Must act on data – Management of communications essential
  • 24. PART III – CASE STUDIES Industrial/Organizational Testing Case Studies Dave Bartram and Eugene Burke – Body of knowledge growing – Use multiple testing and scoring mechanisms – Benefit to using honesty contracts
  • 25. PART III – CASE STUDIES Commentary on Case Studies William Hatherill - Offers useful observations that cut across all of the case studies
  • 26. ADVICE FOR THE READER • Identify your most significant vulnerabilities • “Skim read” chapters relating to your program – Earmark chapters and sections for you and/or staff to read carefully – Cross-reference those sections with list of vulnerabilities – Update your list of vulnerabilities as you read • Develop a plan for addressing these vulnerabilities • Re-read sections as you deal with the issues addressed • Follow the advice of the leading security experts
  • 27. HANDBOOK CONTRIBUTORS Dave Bartram, SHL Group Ltd. Suzanne Lane, University of Pittsburgh Eugene Burke, SHL Group Ltd. Dennis Maynes, Caveon Test Security Janet Duffy Carson, Legal Consultant Roger D. Meade, Prometric, Inc. Susan M. Case, National Conference of Bar Examiners Jaime R. Mulkey, , Caveon Test Security Beth E. Donahue, Data Recognition Corporation Sara Rzepa , Multi-Health Systems, Inc. Steve Ferrara, Pearson Rachel R. Watkins Schoenig, ACT, Inc. Cyndy Thomas Fitzgerald, Fitzgerald & Associates Anthony R. Scicchitano , Prometric, Inc. David Foster, Kryterion, Inc. Jennifer Ancona Semko, Baker & McKenzie LLP John J. Fremer, Caveon Test Security Gill Sitarenios , Multi-Health Systems, Inc. Deborah J. Harris, ACT, Inc. Hazel Wheldon, Multi-Health Systems, Inc. William Hatherill, Fed. of State Boards of Phys. Therapy Kevin M. Williams , Multi-Health Systems, Inc. Robert Hunt, Western Governors University James A. Wollack, University of Wisconsin Neal Kingston, University of Kansas Louis Woodruff, Caveon Test Security
  • 28. TOP 10 TAKEAWAYS FROM HANDBOOK 1. Don’t become desensitized to cheating 2. Know your vulnerabilities 3. Many tools are available to identify, reduce likelihood of and mitigate damage from security breaches 4. Most serious threats to security happen before or after the test 5. Legal standards exist for score cancelation policies and admissibility of statistical evidence
  • 29. TOP 10 TAKEAWAYS FROM HANDBOOK 6. Security planning is critically important 7. Technology is both a friend and enemy 8. We can learn important lessons from the test compromise experiences of our colleagues 9. It takes a village to protect the integrity of our tests 10. Test fraud is dynamic…we must respond in kind
  • 30. RESOURCES • CCSSO/ATP – Operational Best Practices • ATP Security Committee • Caveon Test Security – Blog – Webinars • (Just released) NCME Guidelines • (Just released) TILSA Guidebook for State Assessment Directors on Data Forensics
  • 31. WHERE TO PURCHASE • Don’t forget to pre-order your copy of the Handbook of Test Security • www.routledge.com – http://bit.ly/HandbookTS (Case Sensitive) – Save 20% - Enter discount code: HYJ82
  • 32. THANK YOU! Dr. James A. Wollack Dr. John Fremer Associate Professor President Educational Psychology Caveon Consulting Services Director, Testing & Evaluation Services john.fremer@caveon.com University of Wisconsin-Madison jwollack@wisc.edu - Follow Caveon on twitter @caveon - Check out our blog…www.caveon.com/blog/ - LinkedIn Group – “Caveon Test Security”

Notas del editor

  1. Test are used as gatekeepers for so many professional goals: licensure/certification, advancement in school/graduation, admissions to higher education, job promotion.
  2. Create a comprehensive resource so that testing entities can build upon one another’s expertise and aren’t stuck recreating their own test security wheels.
  3. Richelle to help on this one… Make changes as Jim has mentioned
  4. Examples of these before, during, and after the testWhere do we draw the line between proper and improper test prep
  5. Rooms aren’t designed specifically for testing, students know the layout of everything, students often have unsupervised access to testing rooms in advanceTeachers aren’t professional proctors and generally prefer not to police their classrooms. Chapter provides practical, realistic, and straightforward approaches to prevent and deter cheating, as well as to reduce student’s motivation to cheat
  6. Stand-alone writing prompts require students to produce a written response to a given brief topic or prompt. Text-based writing prompts reflect the reading and writing connection, in that students areasked to read about a topic from one or more sources, analyze it from a particular perspective, and then write a response
  7. Protect data: test content, IP, examinee’s personal identification dataMore than just testing environment: layout of test materials environments, including dealing with access issues for testing and non-testing personnelHandling of test materials, not just final copy, but items and materials in different phases. Deals with issues related to access and monitoring, firewalls/encryption, working with outside non-testing contractors (printers/shippers),
  8. Item preknowledge (Illegal test preparation or Internet-based discussion groups or exam wholesalers), test tampering, organized proxy testing, etc.Similarity and copying analyses, erasure analysis, gain score analysis, person-fit, response latency, What’s required for statistical evidence to be admissible in court? Advice on managing one’s false positive rate, particularly when using data forensics for data mining. Thoughts on using multiple indexes in combination
  9. What has led to organizations winning or losing in court?Limits to how biometric data can be usedCarry out their duties and contractual obligations in “Good faith”
  10. Should reference Bill Hatherill’s studies
  11. Know that it really is happening. You have to stay vigilant. You have to look for cheating. You have to actively safeguard against it. Sometimes it’s right after, like item harvesting. Hacking, tampering, illegal coaching, item sharing/distributionDuring the exam: proxy testing, item capturing/transmission, copying, communication