SlideShare a Scribd company logo
Upcoming Caveon Events
• NCME in Vancouver, April 12-16
   – NATD Breakfast Plenary, Dr. John Fremer, April 13
• CCSSO TILSA SCASS at National Harbor, MD
• Conference for the Statistical Detection of Potential
  Test Fraud, University of Kansas, May 23-24
• National Conference on Student Assessment in
  Minneapolis, June 26-29
• International Testing Commission Conference in
  Amsterdam, July 3-5
• National Collegiate Testing Association in
  Minneapolis, August 1-4
                  www.caveon.com
Caveon Online
• Caveon Security Insights Blog
   – http://www.caveon.com/blog/
• Twitter
   – @Caveon
• LinkedIn
   – Caveon Company Page
   – Caveon Test Security Group
       • Please contribute!
• Facebook
   – Will you be our “friend?”
   – “Like” us!
                     www.caveon.com
Caveon Webinar Series

“Lessons Learned at ATP and NCES”
      Steve Addicott         Dr. John Fremer
      Vice President         President
      Caveon                 Caveon Consulting Services



                  March 28, 2012
Agenda
• ATP 2012 Security Lessons Learned
   – Steve Addicott


• NCES 2012 Security Lessons Learned
   – Dr. John Fremer


• Q&A
About Caveon….
• Our mission: To help protect the tests, programs,
  and reputations of our clients, some of the most
  important test programs and test publishers in the
  world
   –   Certification & Licensure
   –   State DOEs & School Districts
   –   DOD
   –   International
• Entering our 9th year of operation
• Provide practical, measureable security
  enhancements
                   www.caveon.com
Test Security Highlights from ATP

Theme:



• A dozen sessions focused on security
   – Too many at the same time!
• Caveon sessions with our clients
   –   Conducting investigations
   –   Managing the media in cheating scandals
   –   How to implement Data Forensics
   –   Embedded verification tests
• Security Committee breakfast
   – Standing room only, despite the 7am start time!
Key Industry Veterans Focusing on
Security
• Liberty Munson,     • Ashok Sarathy,
  Microsoft             GMAT
• Chad Buckendahl,    • Steven Barkley,
  Alpine Testing        CFP
• Mark Poole, Pearson • Daniel Eyob,
  VUE                   GMAT
• Cathy Donath,       • Nikki Eatchel,
  Donath Group          Questar
• Ray Nicosia,
  ETS
Conducting Investigations

Ben Mannes, Director of Test Security, ABIM

Lessons Learned
• Was a security breach (due to a possible vulnerability in your
  policies or infrastructure) identified during the incident?
•   If so, what can be done to change policies, procedures, or
    technologies to fix it?
•   A cost/benefit analysis should be done to address the
    vulnerability identified by the incident.
•   Are there other ramifications to the organization from the
    incident?
Gimme Shelter: Managing the Media Storm
of a Security Breach

 Jim Vasalek, Sr Director of Public Affairs, LSAC

 NON-Traditional Media
 Blogs, bulletin boards, chat rooms, file-sharing sites, and social
    media
    No professional code of ethics
    No editors
    No fact checkers
    No obligation to get your side of the story


 Can keep a story alive well after traditional media has lost
   interest, even well after it actually has died

 May be more influential with your key audiences than traditional
   media
Implementing Data Forensics

Aimee Hobby Rhodes, Director of Exam Security,
  CFA Institute

Collect All the Evidence You Can!!
• Use multiple statistical analyses
    – Similarity Analysis, Erasure Analysis, Prior score analysis
      (gains/losses), identical response analysis, etc
•   Suspected Cheating/Incident Reports
•   Seating Chart/Floor plans
•   Candidate Connections
•   Anything else you can find!
Implementing Data Forensics
Jennifer Semko, Partner, Baker & McKenzie

Your Candidate Agreement is foundational!
• Are candidates on notice that
   – sharing items is a breach?
   – studying from recalled items is improper?
   – Data Forensics may be used?
• Did you reserve the right to:
   – Invalidate scores? Suspend access to examination? Take
     other action?
• What are the grounds for action? Is there a “catch all”?
• Do you:
   – regularly review your agreement language?
   – have uniform security procedures and policies in place?
Embedded Verification Test
Liz Burns, Senior Manager of Technical
  Certifications Programs, Juniper Networks

Key Benefits of New Security Tactic, EVT
• Legally defensible “proof” for enforcement actions
   – Does not require “intent”
• Enforces against unqualified candidate
• Works on broad range of content theft
• Fairly inexpensive to do
• Provides intelligence on vulnerability of your exams
• Can do “results hold” for proactive enforcement
   – Changes definition of “PASS” to reaching the cut
     score AND the fraud detection threshold
Social Media
• Large emphasis placed on Social Media at the
  conference.
   – twitter hash tags, QR codes, or LinkedIn links


• Many were tweeting and blogging about the
  conference during live sessions
   – Getting the word out instantaneously.


• Get on the train….NOW!
   – be a part of the online conversation
   – how information is being shared.
Security Committee Breakfast
• Standing room only…really
   – Early morning didn’t deter anyone
   – Despite myriad “celebrations” the evening before
• Lots of important work
   –   Security Survey
   –   Enforcement
   –   Lobbying
   –   Standards
• All volunteers
   – Pat yourself on the back!!
JOHN FREMER – CAVEON TEST SECURITY
  STATE ASSESSMENTS IN TRANSITION



                 The Perfect
                   Test Security
                       Storm
SECRETARY DUNCAN

• “States, districts, schools, and testing
  companies should have sensible
  procedures in place to ensure tests
  accurately reflect student learning.”
• Quoted in recent Atlanta Journal
  Constitution article
  – “Cheating our children: Suspicious school
    test scores across the nation.”
ETS – CARSWELL WHITEHEAD


 • All High Stakes Tests are Subject to
   Attempts to Gain an Unfair Advantage
 • Must Build in Processes to Detect
   Irregularities
   – Before
   – During
   – After
GREG CIZEK – UNC, CHAPEL HILL
PREVENTION OF IRREGULARITIES IN
      ACADEMIC TESTING:


• Test Providers / Contractors

    * Clear definition of cheating
    * Clear, educator-referenced materials
    * Web-based qualification utility, database?
    * Less corruptible formats
    * CBT/CAT delivery
DAVID FOSTER – KRYTERION
     SEVEN DETECTION PRINCIPLES


1.   Focus…Concentrate on high-risk threats first
2.   Adapt…Match detection methods to the threat
3.   Backup…Use layers of detection methods
4.   Predict…Watch out for new threats
5.   Filter…Rule out other explanations
6.   Evaluate…Use detection to evaluate security
7.   Plan…Set up to succeed
BRIAN JACOBS - UNIV OF MICHIGAN
     DETECTING IRREGULARITES

• Benefits of statistical analysis
   – Relatively low cost
   – Covers the entire population
   – Measure of the “extent” of the irregularity – e.g.,
     likelihood it would have occurred by chance
   – Systemic patterns as well as individual cases of concern
• Limits of statistical analysis
   – Like preliminary screens for rare diseases, statistical
     analyses to detect cheating can have a high rate of false
     positives and false negatives
       • Critical to complement statistical analyses with other
         methods
   – Can never identify the individual responsible for the
     manipulation
JAMES LIEBMAN –
COLUMBIA UNIVERSITY LAW SCHOOL

 •       Keep an open line for reports of
         infractions
     •     Teachers as allies
     •     Duty to report immediately
 •       Multiple locations (principal, monitors,
         local test office, state test office,
         “special investigations”)
 •       Allow anonymity; offer confidentiality
SCOTT NORTON – LA DEPT OF ED
Areas for Improvement at State Level

• More state oversight is needed for district-led
  investigations.
• Standardization across states may be needed
  for established procedures such as erasure
  analysis.
• Better information is needed about other
  statistical analysis procedures for detecting
  suspect patterns of responses, unusual gains
  or losses, etc.
STEVE FERRARA – PEARSON

• [Speaking primarily as a former Maryland SAD]

• School Personnel Not Well Equipped to Handle
  Investigations

• Don’t have Training

• Teaching Draws on Nurturing and Supporting
  Skills
John Fremer – Caveon Test Security
     Ten Recommendations Moving Forward


1. Acknowledge the seriousness of security issues

2. Expect cheating and plan to be proactive

3. Use multiple detection methods and forensic statistics

4. Minimize testing windows

5. Strengthen the chain of custody
Ten Recommendations Moving Forward…Cont.


6. Increase the emphasis on security training

7. Allocate adequate resources for test security

8. Pilot techniques for detection of cheating

9. Continue to learn from others

10. Monitor new advances in anomaly detection and
    prevention (e.g. “Epidemiological Model”)
RESOURCES

• CCSSO/ATP – Operational Best Practices
• ATP Security Committee
• Caveon Test Security
  – Blog
  – Webinars
• (In development) NCME Guidelines
• (In development) TILSA Guidebook for State
  Assessment Directors on Data Forensics
Caveon webinar lessons learned at atp and nces
Continue The Conversation
- Follow us on twitter @caveon for updates and events

- Check out our blog…www.caveon.com/blog/

- LinkedIn Group – Join our Caveon Test Security group
  to ask questions and join discussions about test
  security topics

- Slides of this and past Webinars are available at
  www.caveon.com/resources/webinars
Thank you!


Steve Addicott              Dr. John Fremer
Vice President              President
Caveon, LLC                 Caveon Consulting Services
steve.addicott@caveon.com   john.fremer@caveon.com

More Related Content

PPTX
Caveon Webinar Series: The Handbook of Test Security – Learn more about preve...
PPTX
'Conducing Security Investigations' Webinar 1-17-2012
PPTX
The psychology of technology / Zohar arad
PDF
Testing Is How You Avoid Looking Stupid
PPTX
The challenge of security awareness
PPTX
Course Tech 2013, Mark Ciampa, Helping Students Stay Secure
PPTX
Intro to a Data-Driven Computer Security Defense
PPSX
Caveon Webinar - Weathering the Perfect Test Security Storm May 2015 edited
Caveon Webinar Series: The Handbook of Test Security – Learn more about preve...
'Conducing Security Investigations' Webinar 1-17-2012
The psychology of technology / Zohar arad
Testing Is How You Avoid Looking Stupid
The challenge of security awareness
Course Tech 2013, Mark Ciampa, Helping Students Stay Secure
Intro to a Data-Driven Computer Security Defense
Caveon Webinar - Weathering the Perfect Test Security Storm May 2015 edited

Viewers also liked (6)

PPSX
Caveon Webinar Series - Learning and Teaching Best Practices in Test Security...
PPSX
Caveon Webinar Series: Weathering the Perfect Test Security Storm - February ...
PPSX
Caveon Webinar Series - Integrating Data Forensics into the Entire Test Secur...
PPSX
Caveon Webinar - International Testing 11-15-2011
PPS
Caveon Webinar Series - Creating Your Test Security Game Plan - March 2016
PPSX
Caveon Webinar Series - Lessons Learned from Using Statistics to Invalidate ...
Caveon Webinar Series - Learning and Teaching Best Practices in Test Security...
Caveon Webinar Series: Weathering the Perfect Test Security Storm - February ...
Caveon Webinar Series - Integrating Data Forensics into the Entire Test Secur...
Caveon Webinar - International Testing 11-15-2011
Caveon Webinar Series - Creating Your Test Security Game Plan - March 2016
Caveon Webinar Series - Lessons Learned from Using Statistics to Invalidate ...
Ad

Similar to Caveon webinar lessons learned at atp and nces (20)

PPTX
The Endless Security Summer - Caveon Webinar 8-22-2012
PPSX
Caveon Webinar Series: Preventing and Detecting Cheating, Lessons from CCSSO...
PPS
Caveon Webinar Series: What you Should Know about High Stakes Cheating in You...
PPSX
Caveon Webinar Series - Lessons Learned at the European Association of Test...
PPSX
The Do's and Dont's of Administering High Stakes Tests in Schools Final 121217
PPSX
Caveon Webinar Series - Lessons Learned at the 2015 National Conference on S...
PPSX
Everything you need to implement a data forensics program
PPSX
Caveon Webinar Series - Ten Test Security Lessons Learned at ATP 2014 march 2014
PPSX
Caveon Webinar Series - Five Things You Can Do Now to Protect Your Assessment...
PPSX
Caveon Webinar Series Lessons Learned at NCSA and ITC July 2014
PPSX
Caveon Webinar Series: Lessons Learned from EATP and CSDPTF November 2013
PPSX
Don't Be The Next Atlanta Public Schools - Caveon Webinar
PPSX
Caveon Webinar Series - Conducting Test Security Investigations in School Di...
PPSX
Caveon Webinar Series - Mastering the US DOE Test Security Requirements Janua...
PPSX
Caveon Webinar Series - The Art of Test Security - Know Thy Enemy - November ...
PPSX
A Tale of Two Cities - School District Webinar #1 Jan 2017
PPSX
Caveon Webinar Series - Exam Integrity Investigations, An Introduction to th...
PPSX
Caveon Webinar Series - Security Challenges in Creating Testing Programs - Se...
PPSX
Caveon Webinar Series - Four Steps to Effective Investigations in School Dis...
PPSX
Caveon Webinar Series - Unlocking the Mystery of the Validity Triangle 11-2014
The Endless Security Summer - Caveon Webinar 8-22-2012
Caveon Webinar Series: Preventing and Detecting Cheating, Lessons from CCSSO...
Caveon Webinar Series: What you Should Know about High Stakes Cheating in You...
Caveon Webinar Series - Lessons Learned at the European Association of Test...
The Do's and Dont's of Administering High Stakes Tests in Schools Final 121217
Caveon Webinar Series - Lessons Learned at the 2015 National Conference on S...
Everything you need to implement a data forensics program
Caveon Webinar Series - Ten Test Security Lessons Learned at ATP 2014 march 2014
Caveon Webinar Series - Five Things You Can Do Now to Protect Your Assessment...
Caveon Webinar Series Lessons Learned at NCSA and ITC July 2014
Caveon Webinar Series: Lessons Learned from EATP and CSDPTF November 2013
Don't Be The Next Atlanta Public Schools - Caveon Webinar
Caveon Webinar Series - Conducting Test Security Investigations in School Di...
Caveon Webinar Series - Mastering the US DOE Test Security Requirements Janua...
Caveon Webinar Series - The Art of Test Security - Know Thy Enemy - November ...
A Tale of Two Cities - School District Webinar #1 Jan 2017
Caveon Webinar Series - Exam Integrity Investigations, An Introduction to th...
Caveon Webinar Series - Security Challenges in Creating Testing Programs - Se...
Caveon Webinar Series - Four Steps to Effective Investigations in School Dis...
Caveon Webinar Series - Unlocking the Mystery of the Validity Triangle 11-2014
Ad

More from Caveon Test Security (12)

PDF
Unpublished study indicates high chance of fraud in thousands of tests of enem
PDF
Caveon webinar series - smart items- using innovative item design to make you...
PDF
Caveon webinar series - smart items- using innovative item design to make you...
PPSX
Caveon Webinar Series - A Guide to Online Protection Strategies - March 28, ...
PPS
Caveon Webinar Series - On-site Monitoring in Districts 0317
PPSX
CESP Study Session #1 October 2016
PPSX
Caveon Webinar Series - Discrete Option Multiple Choice: A Revolution in Te...
PPSX
Caveon Webinar Series - Test Cheaters Say the Darnedest Things! - 072016
PPSX
Caveon Webinar Series - The Test Security Framework- Why Different Tests Nee...
PPSX
Caveon Webinar Series - Will the Real Cloned Item Please Stand Up? final
PPSX
Caveon Webinar Series - Weathering the Perfect Test Security Storm May 2015
PPSX
Caveon webinar series Standard Setting for the 21st Century, Using Informa...
Unpublished study indicates high chance of fraud in thousands of tests of enem
Caveon webinar series - smart items- using innovative item design to make you...
Caveon webinar series - smart items- using innovative item design to make you...
Caveon Webinar Series - A Guide to Online Protection Strategies - March 28, ...
Caveon Webinar Series - On-site Monitoring in Districts 0317
CESP Study Session #1 October 2016
Caveon Webinar Series - Discrete Option Multiple Choice: A Revolution in Te...
Caveon Webinar Series - Test Cheaters Say the Darnedest Things! - 072016
Caveon Webinar Series - The Test Security Framework- Why Different Tests Nee...
Caveon Webinar Series - Will the Real Cloned Item Please Stand Up? final
Caveon Webinar Series - Weathering the Perfect Test Security Storm May 2015
Caveon webinar series Standard Setting for the 21st Century, Using Informa...

Recently uploaded (20)

PPTX
human mycosis Human fungal infections are called human mycosis..pptx
PDF
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
PDF
Trump Administration's workforce development strategy
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PDF
Classroom Observation Tools for Teachers
PDF
Weekly quiz Compilation Jan -July 25.pdf
PDF
Chinmaya Tiranga quiz Grand Finale.pdf
PPTX
Tissue processing ( HISTOPATHOLOGICAL TECHNIQUE
PDF
STATICS OF THE RIGID BODIES Hibbelers.pdf
PPTX
master seminar digital applications in india
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PDF
Yogi Goddess Pres Conference Studio Updates
PPTX
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PPTX
Cell Structure & Organelles in detailed.
PPTX
GDM (1) (1).pptx small presentation for students
PDF
Complications of Minimal Access Surgery at WLH
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PPTX
202450812 BayCHI UCSC-SV 20250812 v17.pptx
human mycosis Human fungal infections are called human mycosis..pptx
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
Trump Administration's workforce development strategy
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
Classroom Observation Tools for Teachers
Weekly quiz Compilation Jan -July 25.pdf
Chinmaya Tiranga quiz Grand Finale.pdf
Tissue processing ( HISTOPATHOLOGICAL TECHNIQUE
STATICS OF THE RIGID BODIES Hibbelers.pdf
master seminar digital applications in india
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
Yogi Goddess Pres Conference Studio Updates
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
Cell Structure & Organelles in detailed.
GDM (1) (1).pptx small presentation for students
Complications of Minimal Access Surgery at WLH
Final Presentation General Medicine 03-08-2024.pptx
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
202450812 BayCHI UCSC-SV 20250812 v17.pptx

Caveon webinar lessons learned at atp and nces

  • 1. Upcoming Caveon Events • NCME in Vancouver, April 12-16 – NATD Breakfast Plenary, Dr. John Fremer, April 13 • CCSSO TILSA SCASS at National Harbor, MD • Conference for the Statistical Detection of Potential Test Fraud, University of Kansas, May 23-24 • National Conference on Student Assessment in Minneapolis, June 26-29 • International Testing Commission Conference in Amsterdam, July 3-5 • National Collegiate Testing Association in Minneapolis, August 1-4 www.caveon.com
  • 2. Caveon Online • Caveon Security Insights Blog – http://www.caveon.com/blog/ • Twitter – @Caveon • LinkedIn – Caveon Company Page – Caveon Test Security Group • Please contribute! • Facebook – Will you be our “friend?” – “Like” us! www.caveon.com
  • 3. Caveon Webinar Series “Lessons Learned at ATP and NCES” Steve Addicott Dr. John Fremer Vice President President Caveon Caveon Consulting Services March 28, 2012
  • 4. Agenda • ATP 2012 Security Lessons Learned – Steve Addicott • NCES 2012 Security Lessons Learned – Dr. John Fremer • Q&A
  • 5. About Caveon…. • Our mission: To help protect the tests, programs, and reputations of our clients, some of the most important test programs and test publishers in the world – Certification & Licensure – State DOEs & School Districts – DOD – International • Entering our 9th year of operation • Provide practical, measureable security enhancements www.caveon.com
  • 6. Test Security Highlights from ATP Theme: • A dozen sessions focused on security – Too many at the same time! • Caveon sessions with our clients – Conducting investigations – Managing the media in cheating scandals – How to implement Data Forensics – Embedded verification tests • Security Committee breakfast – Standing room only, despite the 7am start time!
  • 7. Key Industry Veterans Focusing on Security • Liberty Munson, • Ashok Sarathy, Microsoft GMAT • Chad Buckendahl, • Steven Barkley, Alpine Testing CFP • Mark Poole, Pearson • Daniel Eyob, VUE GMAT • Cathy Donath, • Nikki Eatchel, Donath Group Questar • Ray Nicosia, ETS
  • 8. Conducting Investigations Ben Mannes, Director of Test Security, ABIM Lessons Learned • Was a security breach (due to a possible vulnerability in your policies or infrastructure) identified during the incident? • If so, what can be done to change policies, procedures, or technologies to fix it? • A cost/benefit analysis should be done to address the vulnerability identified by the incident. • Are there other ramifications to the organization from the incident?
  • 9. Gimme Shelter: Managing the Media Storm of a Security Breach Jim Vasalek, Sr Director of Public Affairs, LSAC NON-Traditional Media Blogs, bulletin boards, chat rooms, file-sharing sites, and social media No professional code of ethics No editors No fact checkers No obligation to get your side of the story Can keep a story alive well after traditional media has lost interest, even well after it actually has died May be more influential with your key audiences than traditional media
  • 10. Implementing Data Forensics Aimee Hobby Rhodes, Director of Exam Security, CFA Institute Collect All the Evidence You Can!! • Use multiple statistical analyses – Similarity Analysis, Erasure Analysis, Prior score analysis (gains/losses), identical response analysis, etc • Suspected Cheating/Incident Reports • Seating Chart/Floor plans • Candidate Connections • Anything else you can find!
  • 11. Implementing Data Forensics Jennifer Semko, Partner, Baker & McKenzie Your Candidate Agreement is foundational! • Are candidates on notice that – sharing items is a breach? – studying from recalled items is improper? – Data Forensics may be used? • Did you reserve the right to: – Invalidate scores? Suspend access to examination? Take other action? • What are the grounds for action? Is there a “catch all”? • Do you: – regularly review your agreement language? – have uniform security procedures and policies in place?
  • 12. Embedded Verification Test Liz Burns, Senior Manager of Technical Certifications Programs, Juniper Networks Key Benefits of New Security Tactic, EVT • Legally defensible “proof” for enforcement actions – Does not require “intent” • Enforces against unqualified candidate • Works on broad range of content theft • Fairly inexpensive to do • Provides intelligence on vulnerability of your exams • Can do “results hold” for proactive enforcement – Changes definition of “PASS” to reaching the cut score AND the fraud detection threshold
  • 13. Social Media • Large emphasis placed on Social Media at the conference. – twitter hash tags, QR codes, or LinkedIn links • Many were tweeting and blogging about the conference during live sessions – Getting the word out instantaneously. • Get on the train….NOW! – be a part of the online conversation – how information is being shared.
  • 14. Security Committee Breakfast • Standing room only…really – Early morning didn’t deter anyone – Despite myriad “celebrations” the evening before • Lots of important work – Security Survey – Enforcement – Lobbying – Standards • All volunteers – Pat yourself on the back!!
  • 15. JOHN FREMER – CAVEON TEST SECURITY STATE ASSESSMENTS IN TRANSITION The Perfect Test Security Storm
  • 16. SECRETARY DUNCAN • “States, districts, schools, and testing companies should have sensible procedures in place to ensure tests accurately reflect student learning.” • Quoted in recent Atlanta Journal Constitution article – “Cheating our children: Suspicious school test scores across the nation.”
  • 17. ETS – CARSWELL WHITEHEAD • All High Stakes Tests are Subject to Attempts to Gain an Unfair Advantage • Must Build in Processes to Detect Irregularities – Before – During – After
  • 18. GREG CIZEK – UNC, CHAPEL HILL PREVENTION OF IRREGULARITIES IN ACADEMIC TESTING: • Test Providers / Contractors * Clear definition of cheating * Clear, educator-referenced materials * Web-based qualification utility, database? * Less corruptible formats * CBT/CAT delivery
  • 19. DAVID FOSTER – KRYTERION SEVEN DETECTION PRINCIPLES 1. Focus…Concentrate on high-risk threats first 2. Adapt…Match detection methods to the threat 3. Backup…Use layers of detection methods 4. Predict…Watch out for new threats 5. Filter…Rule out other explanations 6. Evaluate…Use detection to evaluate security 7. Plan…Set up to succeed
  • 20. BRIAN JACOBS - UNIV OF MICHIGAN DETECTING IRREGULARITES • Benefits of statistical analysis – Relatively low cost – Covers the entire population – Measure of the “extent” of the irregularity – e.g., likelihood it would have occurred by chance – Systemic patterns as well as individual cases of concern • Limits of statistical analysis – Like preliminary screens for rare diseases, statistical analyses to detect cheating can have a high rate of false positives and false negatives • Critical to complement statistical analyses with other methods – Can never identify the individual responsible for the manipulation
  • 21. JAMES LIEBMAN – COLUMBIA UNIVERSITY LAW SCHOOL • Keep an open line for reports of infractions • Teachers as allies • Duty to report immediately • Multiple locations (principal, monitors, local test office, state test office, “special investigations”) • Allow anonymity; offer confidentiality
  • 22. SCOTT NORTON – LA DEPT OF ED Areas for Improvement at State Level • More state oversight is needed for district-led investigations. • Standardization across states may be needed for established procedures such as erasure analysis. • Better information is needed about other statistical analysis procedures for detecting suspect patterns of responses, unusual gains or losses, etc.
  • 23. STEVE FERRARA – PEARSON • [Speaking primarily as a former Maryland SAD] • School Personnel Not Well Equipped to Handle Investigations • Don’t have Training • Teaching Draws on Nurturing and Supporting Skills
  • 24. John Fremer – Caveon Test Security Ten Recommendations Moving Forward 1. Acknowledge the seriousness of security issues 2. Expect cheating and plan to be proactive 3. Use multiple detection methods and forensic statistics 4. Minimize testing windows 5. Strengthen the chain of custody
  • 25. Ten Recommendations Moving Forward…Cont. 6. Increase the emphasis on security training 7. Allocate adequate resources for test security 8. Pilot techniques for detection of cheating 9. Continue to learn from others 10. Monitor new advances in anomaly detection and prevention (e.g. “Epidemiological Model”)
  • 26. RESOURCES • CCSSO/ATP – Operational Best Practices • ATP Security Committee • Caveon Test Security – Blog – Webinars • (In development) NCME Guidelines • (In development) TILSA Guidebook for State Assessment Directors on Data Forensics
  • 28. Continue The Conversation - Follow us on twitter @caveon for updates and events - Check out our blog…www.caveon.com/blog/ - LinkedIn Group – Join our Caveon Test Security group to ask questions and join discussions about test security topics - Slides of this and past Webinars are available at www.caveon.com/resources/webinars
  • 29. Thank you! Steve Addicott Dr. John Fremer Vice President President Caveon, LLC Caveon Consulting Services steve.addicott@caveon.com john.fremer@caveon.com