SlideShare a Scribd company logo
November 20, 2013

Caveon Webinar Series:
Lessons Learned from
The European Association of Test Publishers Conference and
The Conference on Statistical Detection of Potential Test Fraud

John Fremer, President Caveon Consulting Services
Steve Addicott, Vice President, Client Services
Dennis Maynes, Chief Scientist, Caveon Data Forensics
Agenda for Today
 John Fremer, Observations from E-ATP
 Handbook of Test Security
 CCSSO TILSA Test Security Guidebook
 The Emergence of Social Media

 Steve Addicott, Observations from E-ATP and CSDPTF





ATP/CCSSO OBP ITC Guidelines
Electronic Badging
ATP Security Committee
CSDPTF Observations

 Dennis Maynes, Observations from CSDPTF
 Progress, Research and Direction
 Techniques that work, and don’t work
 Challenges in this field
Lessons Learned from
The European Association of Test
Publishers Conference

John Fremer
European Association of Test
Publishers (E-ATP) Annual Conference
 5th Annual E-ATP conference:
Growing Talent In Europe:
Gaining Advantage Through
Assessment
 Brings together European and
other international test
publishers and related
organizations

 Held in beautiful St.
Julian, Malta
HANDBOOK OF TEST SECURITY,
FIVE TAKEAWAYS
1. What security vulnerabilities exist
for all genres of testing?
2. The critical importance of security
planning
3. Practical and proven strategies for
preventing and detecting cheating
4. How security breaches have been
dealt with in specific programs
5. What lessons have we learned from
past instances of testing
misbehavior?
HANDBOOK OF TEST SECURITY,
FIVE PREDICTIONS
In many high stakes testing programs:
1. Cheating detection statistical analyses will be
performed routinely
2. Computer-based testing will increasingly become
the norm
3. Technology developments will be critically
important to test security
4. The internationalization of the program will
increase
5. “Test Security Expert” will become a recognized
and valued position
ADVICE FOR THE READER
 Review the Table of Contents
 “Skim read“ the chapters
 Earmark chapters and sections for staff to read or for
you to return to
 Read sections as you deal with the issues addressed

To get the Handbook,
http://www.psypress.com/books/details/978041
5816540/ use discount code HYJ82 for a 20%
discount.
TILSA GUIDEBOOK
 Guidebook: Preventing,
Detecting, and
Following up on Testing
Irregularities
 Center for Chief State
School Officers

 Designed for State
Assessment Directors
PREVENTION
(Sample)
Communicate Zero Tolerance
1. Clear
2. Consistent
3. Frequently emphasized messages
Develop a Security Plan
 Comprehensive
 Up to date
DETECTION
(Sample)
Use Multiple Data Forensics Methods
1. Unusual Gains
2. Similarity
3. Erasures (Answer Changing)
4. Person Fit Analyses
TEST SECURITY INVESTIGATIONS
(Sample #1)
Areas Needing Attention
 Level of evidence warranting an
investigation
 Roles for state, district, and other staff
 Time lines
 Model investigations kit
TEST SECURITY INVESTIGATIONS (cont.)
(Sample #2)
Model Investigations Kit
 Clear definition of responsibilities
 Procedures for evaluating evidence
 Planning and conducting interviews
 Developing a report with
recommendations
TILSA GUIDEBOOK
To get a copy of the
Guidebook,
Download a PDF for free or
purchase your own copy
for only $3.59.
http://www.ccsso.org/Reso
urces/Publications
SOCIAL MEDIA
Importance of Social Media -- several presentations

 Sessions suggest using “Glocal” approach

 Social Media continue to gain users in testing
internationally
Ignite Session: Are You One Post
Away From a Social Media Crisis?
Speaker: Matthew Poyiadgi, Managing Director,
Pearson VUE
 3 P’s to deal with a social media crisis:
 Police
 Proactive Stance
 Proportional Response
 Customers expect a 1-day response from you.
 20% get it.
Ignite Session: Are You One Post Away
From a Social Media Crisis? (cont)
Summary
 Choose your communication channels wisely
 Write your guidelines – make them practical
 Choose and train those representing your agency
 Be proactive – put your guidelines in action
 Be proportionate with resources and responses
 Track what you do – watch for patterns
 Be personable on social media! You’re dealing
with people!
Lessons Learned from
The European ATP Conference &
The Conference on Statistical Detection of
Potential Test Fraud

Steve Addicott
Important Test Security Resources
 ATP/CCSSO Operational Best Practices for Statewide
Large Scale Assessment Programs
 International Test Commission Guidelines for the
Security of Examinations, Tests and Other Assessments
ATP/CCSSO Operational Best Practices
 Published in Spring 2010:
 Enhance the quality, accuracy, and
timeliness of student test data
derived from large scale
assessments

 Strengthen public confidence in the
accuracy and quality of testing
data and their uses
ATP/CCSSO Operational Best Practices
2013: Revised OBP for CBT and Online Testing
 Just published September 2013!
 May not be precisely applicable to “…(test programs)
used on an international basis”
 Provides a solid framework from which others might
seek to define a set of practices tailored to their
testing programs
 ATP and the CCSSO encourage others to use this
document
ATP/CCSSO Operational Best Practices
To get a copy of the OBP,
Purchase a copy for $29.99 at

http://www.ccsso.org/resourc
es/publications
International Test Commission (ITC)
Security Guidelines
 International Test Commission Guidelines for the
Security of Examinations, Tests and Other
Assessments
ITC Guidelines: Purpose
With increasing security problems, the guidelines are:
 intended to share key elements of security best
practices to promote better security, and

 defend the value of scores produced through the
assessment process
ITC Guidelines: Scope
 All high-stakes assessments, tests and exams
 All stakeholders in the assessment process (publishers,
users, students, test developers, etc.)
 The entire assessment process from development to
administration to results processing and scoring
 Across all areas of testing (e.g., education, employment,
certification/licensure government, clinical psychology,
etc.)
ITC Guidelines: Value
The ITC Guidelines provide answers to these questions:
 Threats. What are the dangers?
 Test Fraud. How can we deal effectively with increasing
security problems?
 Terminology. How can we best communicate about test
security
Electronic Badging
 What is electronic badging?
 Big industry players involved
 Compelling value
 Badging + accreditation + assessment = ???
 Stay tuned
ATP Security Committee
 Picking up from last February’s
conference
 Annual Survey results released:
https://www.createspace.com/4418924
 Hands-on demonstrations of new tech
innovations used by test thieves and
pirates

 Harder and harder for the “good guys” to
keep up
About the Conference
The Conference on Statistical Detection of Potential
Test Fraud (CSDPTF)
 2nd Annual Conference this year

 Presents various methods of cheating detection and
offers an important forum to examine a variety of
methods
 Huge thanks to University of Wisconsin at Madison’s Dr.
James Wollack and team!
Conference on Statistical Detection of
Potential Test Fraud
 Last year’s event was groundbreaking
 This year, growing momentum…
 Premier academic & industry organizations
supporting/sponsoring
 Attendance steadily increasing
 Publishing of selected papers
 Plans for future years already underway!
 Rumors of a scholarly journal – stay tuned!!
Conference on Statistical Detection of
Potential Test Fraud
 Compelling dynamics behind the conference:





Growth in testing
Stakes growing ever-higher
Focus on trustworthy test results
How could we NOT focus on statistical detection?
Conference on Statistical Detection of
Potential Test Fraud
 Challenge:
 Current research on the use of statistics.
 What about the policies and procedures- the legal
defensibility- wrapping their use?
Lessons Learned from
The Conference on Statistical Detection
of Potential Test Fraud

Dennis Maynes
Summary of CSDPTF
 There were three general sessions on Friday with
four or five presentations and a discussant.
 About ten poster presentations were on display
Friday evening.

 There were three concurrent sessions on Saturday
with five presentations in the first session, four in
the second, and a symposium/workshop in the
third.
 The conference was attended by over
120 researchers!
Topics Covered at CSDPTF










Similarity and Person Misfit
Pre-knowledge and “Braindumps”
Unusual Gains
Robustness and Sensitivity Issues
Test Tampering
Computer-Based Testing
Policy
Test Fraud Detection Challenge
Security Planning
CSDPTF: 2012 versus 2013
The conference this year was more
varied in terms of topics and research
than last year. Attendees were from
all over the world. The conference
has expanded in its reach, focus, and
attractiveness.
Progress
 For this field to progress, the following are needed:
 A set of data sets that have known characteristics of security breaches.
 Commonly accepted ways to compare the efficacy of methods.
 Consensus on the utility and implementation of statistical methods.
 Consensus on how to make inferences concerning potential test fraud.

 Guidance to practitioners on how to use the statistics.
Research
The current state of research is that of individual or
organization-based efforts with low cross-fertilization
between those efforts.
Direction
Greg Cizek presented the keynote speech. He discussed
where this field has been and where it is going.
Techniques that work well and/or
are gaining greater acceptance
 Test Tampering aka “Erasure Analysis”
 Similarity aka “Answer Copying”
Techniques that do not work well
 Detection of item compromise in all its forms such as braindumps,
rogue review courses, and disclosure of live exam content by
teachers and/or instructors
 Analysis of gain scores for detecting potential test compromise
 Analysis of response times to detect potential test compromise
Challenges Practitioners in This Field Face
1. Using statistics to invalidate test scores because the scores
are not valid. The problem is that the public and
measurement professionals have focused on the behavior
not the scores.
2. Conducting investigations when the evidence that
misbehavior occurred is circumstantial. There are no
missing persons, broken doors, or misappropriated funds.
Challenges Practitioners in This Field Face
3. Demonstrating the science behind the
techniques that are being used:







Reproducible results
Sound reasoning
Quantitative measures
Defensible assumptions
Measurement of error
Questions?
Caveon Online
 Caveon Security Insights Blog
 http://www.caveon.com/blog/
 twitter
 Follow @Caveon
 LinkedIn
 “Caveon Test Security” Group
 Please contribute!
 Dr. John’s Test Security Tip of the Day
 Caveon Security Minute
 Facebook
 “Like” us!
Thank you for your attendance!
Dr. John Fremer
President, Consulting Services
John.fremer@caveon.com
@TestSecurityGuy

Steve Addicott
Vice President, Client Services
Steve.addicott@caveon.com
@SdAddicott

Dennis Maynes
Chief Scientist
Dennis.Maynes@caveon.com
@DennisMaynes

At Caveon, we fundamentally believe in quality
testing and trustworthy test results.

More Related Content

PPTX
The Endless Security Summer - Caveon Webinar 8-22-2012
PPSX
Caveon Webinar Series Lessons Learned at NCSA and ITC July 2014
PPT
iConference Popovsky
PPTX
How Tag Management Drives Results
PPTX
Your Mobile Action Plan
PDF
Drupal 8 Multilingual Site Building Hacks
PPT
Deliverability Drives Revenue
PPT
Relationship Marketing in a Social Media World
The Endless Security Summer - Caveon Webinar 8-22-2012
Caveon Webinar Series Lessons Learned at NCSA and ITC July 2014
iConference Popovsky
How Tag Management Drives Results
Your Mobile Action Plan
Drupal 8 Multilingual Site Building Hacks
Deliverability Drives Revenue
Relationship Marketing in a Social Media World

Similar to Caveon Webinar Series: Lessons Learned from EATP and CSDPTF November 2013 (20)

PPTX
Caveon Webinar Series: The Handbook of Test Security – Learn more about preve...
PPS
Caveon webinar lessons learned at atp and nces
PPSX
Caveon Webinar Series: Preventing and Detecting Cheating, Lessons from CCSSO...
PPSX
Caveon Webinar Series - Lessons Learned at the European Association of Test...
PPSX
Caveon Webinar Series - Ten Test Security Lessons Learned at ATP 2014 march 2014
PPS
Caveon Webinar Series: What you Should Know about High Stakes Cheating in You...
PPSX
Caveon Webinar Series - Unlocking the Mystery of the Validity Triangle 11-2014
PPSX
Caveon Webinar Series - Five Things You Can Do Now to Protect Your Assessment...
PPSX
The Do's and Dont's of Administering High Stakes Tests in Schools Final 121217
PPSX
Everything you need to implement a data forensics program
PPSX
Caveon Webinar Series - Integrating Data Forensics into the Entire Test Secur...
PPSX
Caveon Webinar Series - The Test Security Framework- Why Different Tests Nee...
PPTX
'Conducing Security Investigations' Webinar 1-17-2012
PDF
Test Driver Selection 10.8.16 2
PPSX
Caveon Webinar Series - Lessons Learned at the 2015 National Conference on S...
PPT
QV Automated Testing Overview
PPSX
Caveon Webinar Series - The Art of Test Security - Know Thy Enemy - November ...
PDF
Key Concepts And Principles Of Internal Quality Assurance...
PPSX
Caveon Webinar Series - Exam Integrity Investigations, An Introduction to th...
PPTX
Statistical detection of test fraud (data forensics) - where do I start?
Caveon Webinar Series: The Handbook of Test Security – Learn more about preve...
Caveon webinar lessons learned at atp and nces
Caveon Webinar Series: Preventing and Detecting Cheating, Lessons from CCSSO...
Caveon Webinar Series - Lessons Learned at the European Association of Test...
Caveon Webinar Series - Ten Test Security Lessons Learned at ATP 2014 march 2014
Caveon Webinar Series: What you Should Know about High Stakes Cheating in You...
Caveon Webinar Series - Unlocking the Mystery of the Validity Triangle 11-2014
Caveon Webinar Series - Five Things You Can Do Now to Protect Your Assessment...
The Do's and Dont's of Administering High Stakes Tests in Schools Final 121217
Everything you need to implement a data forensics program
Caveon Webinar Series - Integrating Data Forensics into the Entire Test Secur...
Caveon Webinar Series - The Test Security Framework- Why Different Tests Nee...
'Conducing Security Investigations' Webinar 1-17-2012
Test Driver Selection 10.8.16 2
Caveon Webinar Series - Lessons Learned at the 2015 National Conference on S...
QV Automated Testing Overview
Caveon Webinar Series - The Art of Test Security - Know Thy Enemy - November ...
Key Concepts And Principles Of Internal Quality Assurance...
Caveon Webinar Series - Exam Integrity Investigations, An Introduction to th...
Statistical detection of test fraud (data forensics) - where do I start?
Ad

More from Caveon Test Security (20)

PDF
Unpublished study indicates high chance of fraud in thousands of tests of enem
PDF
Caveon webinar series - smart items- using innovative item design to make you...
PDF
Caveon webinar series - smart items- using innovative item design to make you...
PPSX
Caveon Webinar Series - A Guide to Online Protection Strategies - March 28, ...
PPSX
Caveon Webinar Series - Four Steps to Effective Investigations in School Dis...
PPS
Caveon Webinar Series - On-site Monitoring in Districts 0317
PPSX
CESP Study Session #1 October 2016
PPSX
A Tale of Two Cities - School District Webinar #1 Jan 2017
PPSX
Caveon Webinar Series - Discrete Option Multiple Choice: A Revolution in Te...
PPSX
Caveon Webinar Series - Test Cheaters Say the Darnedest Things! - 072016
PPSX
Caveon Webinar Series - Conducting Test Security Investigations in School Di...
PPS
Caveon Webinar Series - Creating Your Test Security Game Plan - March 2016
PPSX
Caveon Webinar Series - Mastering the US DOE Test Security Requirements Janua...
PPSX
Caveon Webinar Series - Will the Real Cloned Item Please Stand Up? final
PPSX
Caveon Webinar Series - Learning and Teaching Best Practices in Test Security...
PPSX
Caveon Webinar - Weathering the Perfect Test Security Storm May 2015 edited
PPSX
Caveon Webinar Series - Weathering the Perfect Test Security Storm May 2015
PPSX
Caveon Webinar Series: Weathering the Perfect Test Security Storm - February ...
PPSX
Caveon Webinar Series - Security Challenges in Creating Testing Programs - Se...
PPSX
Caveon webinar series Standard Setting for the 21st Century, Using Informa...
Unpublished study indicates high chance of fraud in thousands of tests of enem
Caveon webinar series - smart items- using innovative item design to make you...
Caveon webinar series - smart items- using innovative item design to make you...
Caveon Webinar Series - A Guide to Online Protection Strategies - March 28, ...
Caveon Webinar Series - Four Steps to Effective Investigations in School Dis...
Caveon Webinar Series - On-site Monitoring in Districts 0317
CESP Study Session #1 October 2016
A Tale of Two Cities - School District Webinar #1 Jan 2017
Caveon Webinar Series - Discrete Option Multiple Choice: A Revolution in Te...
Caveon Webinar Series - Test Cheaters Say the Darnedest Things! - 072016
Caveon Webinar Series - Conducting Test Security Investigations in School Di...
Caveon Webinar Series - Creating Your Test Security Game Plan - March 2016
Caveon Webinar Series - Mastering the US DOE Test Security Requirements Janua...
Caveon Webinar Series - Will the Real Cloned Item Please Stand Up? final
Caveon Webinar Series - Learning and Teaching Best Practices in Test Security...
Caveon Webinar - Weathering the Perfect Test Security Storm May 2015 edited
Caveon Webinar Series - Weathering the Perfect Test Security Storm May 2015
Caveon Webinar Series: Weathering the Perfect Test Security Storm - February ...
Caveon Webinar Series - Security Challenges in Creating Testing Programs - Se...
Caveon webinar series Standard Setting for the 21st Century, Using Informa...
Ad

Recently uploaded (20)

PPTX
Share_Module_2_Power_conflict_and_negotiation.pptx
PDF
Trump Administration's workforce development strategy
PDF
LDMMIA Reiki Yoga Finals Review Spring Summer
PDF
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
PDF
1_English_Language_Set_2.pdf probationary
PPTX
Computer Architecture Input Output Memory.pptx
PDF
احياء السادس العلمي - الفصل الثالث (التكاثر) منهج متميزين/كلية بغداد/موهوبين
PPTX
Onco Emergencies - Spinal cord compression Superior vena cava syndrome Febr...
PDF
FORM 1 BIOLOGY MIND MAPS and their schemes
PPTX
CHAPTER IV. MAN AND BIOSPHERE AND ITS TOTALITY.pptx
PPTX
20th Century Theater, Methods, History.pptx
PDF
Vision Prelims GS PYQ Analysis 2011-2022 www.upscpdf.com.pdf
PDF
AI-driven educational solutions for real-life interventions in the Philippine...
PDF
FOISHS ANNUAL IMPLEMENTATION PLAN 2025.pdf
PDF
David L Page_DCI Research Study Journey_how Methodology can inform one's prac...
PPTX
B.Sc. DS Unit 2 Software Engineering.pptx
PDF
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
PPTX
TNA_Presentation-1-Final(SAVE)) (1).pptx
PDF
My India Quiz Book_20210205121199924.pdf
PDF
Chinmaya Tiranga quiz Grand Finale.pdf
Share_Module_2_Power_conflict_and_negotiation.pptx
Trump Administration's workforce development strategy
LDMMIA Reiki Yoga Finals Review Spring Summer
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
1_English_Language_Set_2.pdf probationary
Computer Architecture Input Output Memory.pptx
احياء السادس العلمي - الفصل الثالث (التكاثر) منهج متميزين/كلية بغداد/موهوبين
Onco Emergencies - Spinal cord compression Superior vena cava syndrome Febr...
FORM 1 BIOLOGY MIND MAPS and their schemes
CHAPTER IV. MAN AND BIOSPHERE AND ITS TOTALITY.pptx
20th Century Theater, Methods, History.pptx
Vision Prelims GS PYQ Analysis 2011-2022 www.upscpdf.com.pdf
AI-driven educational solutions for real-life interventions in the Philippine...
FOISHS ANNUAL IMPLEMENTATION PLAN 2025.pdf
David L Page_DCI Research Study Journey_how Methodology can inform one's prac...
B.Sc. DS Unit 2 Software Engineering.pptx
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
TNA_Presentation-1-Final(SAVE)) (1).pptx
My India Quiz Book_20210205121199924.pdf
Chinmaya Tiranga quiz Grand Finale.pdf

Caveon Webinar Series: Lessons Learned from EATP and CSDPTF November 2013

  • 1. November 20, 2013 Caveon Webinar Series: Lessons Learned from The European Association of Test Publishers Conference and The Conference on Statistical Detection of Potential Test Fraud John Fremer, President Caveon Consulting Services Steve Addicott, Vice President, Client Services Dennis Maynes, Chief Scientist, Caveon Data Forensics
  • 2. Agenda for Today  John Fremer, Observations from E-ATP  Handbook of Test Security  CCSSO TILSA Test Security Guidebook  The Emergence of Social Media  Steve Addicott, Observations from E-ATP and CSDPTF     ATP/CCSSO OBP ITC Guidelines Electronic Badging ATP Security Committee CSDPTF Observations  Dennis Maynes, Observations from CSDPTF  Progress, Research and Direction  Techniques that work, and don’t work  Challenges in this field
  • 3. Lessons Learned from The European Association of Test Publishers Conference John Fremer
  • 4. European Association of Test Publishers (E-ATP) Annual Conference  5th Annual E-ATP conference: Growing Talent In Europe: Gaining Advantage Through Assessment  Brings together European and other international test publishers and related organizations  Held in beautiful St. Julian, Malta
  • 5. HANDBOOK OF TEST SECURITY, FIVE TAKEAWAYS 1. What security vulnerabilities exist for all genres of testing? 2. The critical importance of security planning 3. Practical and proven strategies for preventing and detecting cheating 4. How security breaches have been dealt with in specific programs 5. What lessons have we learned from past instances of testing misbehavior?
  • 6. HANDBOOK OF TEST SECURITY, FIVE PREDICTIONS In many high stakes testing programs: 1. Cheating detection statistical analyses will be performed routinely 2. Computer-based testing will increasingly become the norm 3. Technology developments will be critically important to test security 4. The internationalization of the program will increase 5. “Test Security Expert” will become a recognized and valued position
  • 7. ADVICE FOR THE READER  Review the Table of Contents  “Skim read“ the chapters  Earmark chapters and sections for staff to read or for you to return to  Read sections as you deal with the issues addressed To get the Handbook, http://www.psypress.com/books/details/978041 5816540/ use discount code HYJ82 for a 20% discount.
  • 8. TILSA GUIDEBOOK  Guidebook: Preventing, Detecting, and Following up on Testing Irregularities  Center for Chief State School Officers  Designed for State Assessment Directors
  • 9. PREVENTION (Sample) Communicate Zero Tolerance 1. Clear 2. Consistent 3. Frequently emphasized messages Develop a Security Plan  Comprehensive  Up to date
  • 10. DETECTION (Sample) Use Multiple Data Forensics Methods 1. Unusual Gains 2. Similarity 3. Erasures (Answer Changing) 4. Person Fit Analyses
  • 11. TEST SECURITY INVESTIGATIONS (Sample #1) Areas Needing Attention  Level of evidence warranting an investigation  Roles for state, district, and other staff  Time lines  Model investigations kit
  • 12. TEST SECURITY INVESTIGATIONS (cont.) (Sample #2) Model Investigations Kit  Clear definition of responsibilities  Procedures for evaluating evidence  Planning and conducting interviews  Developing a report with recommendations
  • 13. TILSA GUIDEBOOK To get a copy of the Guidebook, Download a PDF for free or purchase your own copy for only $3.59. http://www.ccsso.org/Reso urces/Publications
  • 14. SOCIAL MEDIA Importance of Social Media -- several presentations  Sessions suggest using “Glocal” approach  Social Media continue to gain users in testing internationally
  • 15. Ignite Session: Are You One Post Away From a Social Media Crisis? Speaker: Matthew Poyiadgi, Managing Director, Pearson VUE  3 P’s to deal with a social media crisis:  Police  Proactive Stance  Proportional Response  Customers expect a 1-day response from you.  20% get it.
  • 16. Ignite Session: Are You One Post Away From a Social Media Crisis? (cont) Summary  Choose your communication channels wisely  Write your guidelines – make them practical  Choose and train those representing your agency  Be proactive – put your guidelines in action  Be proportionate with resources and responses  Track what you do – watch for patterns  Be personable on social media! You’re dealing with people!
  • 17. Lessons Learned from The European ATP Conference & The Conference on Statistical Detection of Potential Test Fraud Steve Addicott
  • 18. Important Test Security Resources  ATP/CCSSO Operational Best Practices for Statewide Large Scale Assessment Programs  International Test Commission Guidelines for the Security of Examinations, Tests and Other Assessments
  • 19. ATP/CCSSO Operational Best Practices  Published in Spring 2010:  Enhance the quality, accuracy, and timeliness of student test data derived from large scale assessments  Strengthen public confidence in the accuracy and quality of testing data and their uses
  • 20. ATP/CCSSO Operational Best Practices 2013: Revised OBP for CBT and Online Testing  Just published September 2013!  May not be precisely applicable to “…(test programs) used on an international basis”  Provides a solid framework from which others might seek to define a set of practices tailored to their testing programs  ATP and the CCSSO encourage others to use this document
  • 21. ATP/CCSSO Operational Best Practices To get a copy of the OBP, Purchase a copy for $29.99 at http://www.ccsso.org/resourc es/publications
  • 22. International Test Commission (ITC) Security Guidelines  International Test Commission Guidelines for the Security of Examinations, Tests and Other Assessments
  • 23. ITC Guidelines: Purpose With increasing security problems, the guidelines are:  intended to share key elements of security best practices to promote better security, and  defend the value of scores produced through the assessment process
  • 24. ITC Guidelines: Scope  All high-stakes assessments, tests and exams  All stakeholders in the assessment process (publishers, users, students, test developers, etc.)  The entire assessment process from development to administration to results processing and scoring  Across all areas of testing (e.g., education, employment, certification/licensure government, clinical psychology, etc.)
  • 25. ITC Guidelines: Value The ITC Guidelines provide answers to these questions:  Threats. What are the dangers?  Test Fraud. How can we deal effectively with increasing security problems?  Terminology. How can we best communicate about test security
  • 26. Electronic Badging  What is electronic badging?  Big industry players involved  Compelling value  Badging + accreditation + assessment = ???  Stay tuned
  • 27. ATP Security Committee  Picking up from last February’s conference  Annual Survey results released: https://www.createspace.com/4418924  Hands-on demonstrations of new tech innovations used by test thieves and pirates  Harder and harder for the “good guys” to keep up
  • 28. About the Conference The Conference on Statistical Detection of Potential Test Fraud (CSDPTF)  2nd Annual Conference this year  Presents various methods of cheating detection and offers an important forum to examine a variety of methods  Huge thanks to University of Wisconsin at Madison’s Dr. James Wollack and team!
  • 29. Conference on Statistical Detection of Potential Test Fraud  Last year’s event was groundbreaking  This year, growing momentum…  Premier academic & industry organizations supporting/sponsoring  Attendance steadily increasing  Publishing of selected papers  Plans for future years already underway!  Rumors of a scholarly journal – stay tuned!!
  • 30. Conference on Statistical Detection of Potential Test Fraud  Compelling dynamics behind the conference:     Growth in testing Stakes growing ever-higher Focus on trustworthy test results How could we NOT focus on statistical detection?
  • 31. Conference on Statistical Detection of Potential Test Fraud  Challenge:  Current research on the use of statistics.  What about the policies and procedures- the legal defensibility- wrapping their use?
  • 32. Lessons Learned from The Conference on Statistical Detection of Potential Test Fraud Dennis Maynes
  • 33. Summary of CSDPTF  There were three general sessions on Friday with four or five presentations and a discussant.  About ten poster presentations were on display Friday evening.  There were three concurrent sessions on Saturday with five presentations in the first session, four in the second, and a symposium/workshop in the third.  The conference was attended by over 120 researchers!
  • 34. Topics Covered at CSDPTF          Similarity and Person Misfit Pre-knowledge and “Braindumps” Unusual Gains Robustness and Sensitivity Issues Test Tampering Computer-Based Testing Policy Test Fraud Detection Challenge Security Planning
  • 35. CSDPTF: 2012 versus 2013 The conference this year was more varied in terms of topics and research than last year. Attendees were from all over the world. The conference has expanded in its reach, focus, and attractiveness.
  • 36. Progress  For this field to progress, the following are needed:  A set of data sets that have known characteristics of security breaches.  Commonly accepted ways to compare the efficacy of methods.  Consensus on the utility and implementation of statistical methods.  Consensus on how to make inferences concerning potential test fraud.  Guidance to practitioners on how to use the statistics.
  • 37. Research The current state of research is that of individual or organization-based efforts with low cross-fertilization between those efforts.
  • 38. Direction Greg Cizek presented the keynote speech. He discussed where this field has been and where it is going.
  • 39. Techniques that work well and/or are gaining greater acceptance  Test Tampering aka “Erasure Analysis”  Similarity aka “Answer Copying”
  • 40. Techniques that do not work well  Detection of item compromise in all its forms such as braindumps, rogue review courses, and disclosure of live exam content by teachers and/or instructors  Analysis of gain scores for detecting potential test compromise  Analysis of response times to detect potential test compromise
  • 41. Challenges Practitioners in This Field Face 1. Using statistics to invalidate test scores because the scores are not valid. The problem is that the public and measurement professionals have focused on the behavior not the scores. 2. Conducting investigations when the evidence that misbehavior occurred is circumstantial. There are no missing persons, broken doors, or misappropriated funds.
  • 42. Challenges Practitioners in This Field Face 3. Demonstrating the science behind the techniques that are being used:      Reproducible results Sound reasoning Quantitative measures Defensible assumptions Measurement of error
  • 44. Caveon Online  Caveon Security Insights Blog  http://www.caveon.com/blog/  twitter  Follow @Caveon  LinkedIn  “Caveon Test Security” Group  Please contribute!  Dr. John’s Test Security Tip of the Day  Caveon Security Minute  Facebook  “Like” us!
  • 45. Thank you for your attendance! Dr. John Fremer President, Consulting Services John.fremer@caveon.com @TestSecurityGuy Steve Addicott Vice President, Client Services Steve.addicott@caveon.com @SdAddicott Dennis Maynes Chief Scientist Dennis.Maynes@caveon.com @DennisMaynes At Caveon, we fundamentally believe in quality testing and trustworthy test results.

Editor's Notes

  • #4: 25, 28, 30, 31, 33, 34, 35
  • #18: 25, 28, 30, 31, 33, 34, 35
  • #33: 25, 28, 30, 31, 33, 34, 35