SlideShare a Scribd company logo
1 of 42
Caveon Webinar Series:

 Key Security Lessons Learned at
ATP’s “Innovations in Testing” 2013
    Nikki Shepherd Eatchel         Dr. John Fremer
    Vice President                 President
    Program Management             Caveon Consulting Service
    Questar Assessment




                       February 21, 2013
Upcoming Caveon Events
• National Council on Measurement in
  Education Conference, San Francisco,
  April 26-30

• United States Distance Education
  Association Conference, St. Louis,
  April 28 - May 1

• National Conference on Student
  Assessment, National Harbor,
  June 19-21
Caveon Online
• Caveon Security Insights Blog
   – http://www.caveon.com/blog/
• twitter
   – @Caveon
   – Follow us!
• LinkedIn
   – Caveon Company Page
   – Caveon Test Security Group
       • Please contribute!
• Facebook
   – Will you be our “friend?”
   – “Like” us!
                     www.caveon.com
Agenda for today

• ATP Test Security Committee & Live Lab
• Truth & Consequences, Conducting Effective Test
  Security Investigations
• The Handbook of Test Security
• Data Forensics, Opening the Black Box
• The Game’s Afoot: Sleuths Match Wits
• Tell it to the Judge, Winning with Data Forensics
  Evidence in Court
• Balancing Test Security and Accessibility
But, before we get started…

Caveon is proud to announce we are celebrating
         10 years in business in 2013!
Security Committee Briefing
                & Live Lab

Goals for the Year

•   Security Survey
•   Test Security Options
•   Enforcement
•   Candidate Rights and Responsibilities
•   Newsletters
•   Live Lab
Survey Activities
Activities Completed
• Three surveys designed by the ATPSC
• Survey review and feedback provided by the
  Institute for Credentialing Excellence (ICE)
• Survey Distributed, 117 respondents
   – 79 Certification/Licensure
   – 16 Education
   – 22 Vendor
• Initial analysis complete
Sneak Peak at the Data Trends

General Information

• Wider variety of respondents for 2012 survey

• Increased focus on security by all respondent
  organizations

• Large percentage of “Don’t Know” responses
Sneak Peak at the Data Trends (Cont.)


• Larger percentage of respondents with formal,
  internal security plans

• Significant gap in formal, external security
  processes

• Lack of standardization implementation

• Few audits
Additional ATPSC Activities



• Security Options Document
• DMCA Takedown Effort
• Candidate Rights and Responsibilities
Additional ATPSC Activities (Cont.)

Security Options Document
• Assessment Models
• Delivery Channels

Currently available at
www.testpublishers.org
Additional ATPSC Activities (Cont.)

DMCA Takedown Effort
• 6 ISP’s were Identified hosting 17 Infringing
  Websites
   – One ISP – all websites removed
   – Approximately 30% of the websites no longer exist and
     affiliate websites were also removed


Candidate Rights and Responsibilities
• 8 organizations participated
• Available May 2013
Truth & Consequences:
Conducting Effective Test Security Investigations


    Benjamin Mannes, CPP, SSI, CHS-III
    Director, Test Security
    American Board of Internal Medicine

    Marc J. Weinstein, Esq.
    Partner
    Dillworth Paxson, LLP
Truth & Consequences:
Conducting Effective Test Security Investigations (Cont.)



 • The Proliferation of Risk

 • Core Elements of Exam Integrity
    – Protect
    – Investigate
    – Enforce
Truth & Consequences:
Conducting Effective Test Security Investigations (Cont.)

 Identification and Vetting
 • Strong web presence
 • Ongoing review and analysis
 • Vetting

 Analyze
 • Collusion
 • Sharing
 • Inappropriate Study Techniques
 • Violations
 • Proxy
Truth & Consequences:
Conducting Effective Test Security Investigations (Cont.)




   Investigation
   • Gather
   • Preserve
Truth & Consequences:
Conducting Effective Test Security Investigations (Cont.)



  Field Interviews
  • Purpose
  • Participants
  • Nonverbal communication
Truth & Consequences:
Conducting Effective Test Security Investigations (Cont.)

 Enforcement
 • Options
 • Organizational Goals
 • Policy/Procedures, Laws/Regulations
 • Civil versus Criminal

 Join the conversation at:
 @ExamIntegrity on twitter
 LinkedIn Group: “Exam Integrity”
HANDBOOK OF TEST SECURITY

• Editors - James Wollack & John Fremer
• Participating Authors – Deborah Harris, William
  Hatherill, David Foster
• Slated for Publication – March 2013
• Preventing, Detecting, and Investigating Cheating
• Testing in Many Domains
   –   Certification/Licensure
   –   Clinical
   –   Educational
   –   Industrial/Organizational
HANDBOOK – PRIMARY AIMS
• Insights of Psychometricians and Policy-Makers
• Best Practices for Designing Secure Tests
• Analysis of Security Vulnerabilities
• Practical Strategies for Cheating Prevention and
  Detection
• Lessons Learned
    – Actual security violations
    – Security initiatives
HANDBOOK – FIVE TAKEAWAYS

• Security Vulnerabilities for All Genres of Testing
• Critical Importance of Security Planning
• Practical and Proven Prevention & Detection
  Strategies
• How Security Breaches Have Been Dealt With
• Lessons We Have Learned From Past Instances of
  Testing Misbehavior
HANDBOOK – FIVE PREDICTIONS

• In Many High Stakes Testing Programs
  – Cheating detection statistical analyses will be performed
    routinely
  – Computer-based testing will increasingly become the norm
  – Technology developments will be critically important to test
    security
  – Internationalization of testing programs will increase
  – “Test Security Manager” will become a recognized and valued
    position
DATA FORENSICS,
      OPENING THE BLACK BOX



•   John Fremer
•   Neal Kingston
•   James Wollack
•   Dennis Maynes
DATA FORENSICS,
  OPENING THE BLACK BOX (cont.)

• Features of “Mature” Forensics Approaches
  –   Explicit standards
  –   One or more associations
  –   Formal training programs
  –   Regular conferences
  –   One or more journals
  –   Body of published literature
  –   Regular positions in many agencies and companies
DATA FORENSICS,
   OPENING THE BLACK BOX (cont.)

• Useful Statistics
   – Similarity – Unusual number of same answers
   – Aberrance – Answering hard questions correctly while
     missing easy ones
   – Gains (or drops) Atypical score changes over time
   – Erasures – Unusual patterns such as almost always
     wrong to right
   – Fast Responding – Much faster than others –
     superhuman?
   – Shared Information – Biometrics or personal information
     – Email or home addresses, photos, etc.
THE GAME’S AFOOT:
       SLEUTHS MATCH WITS


• Kim Brunnert – Elsevier
• Joy Matthews-Lopez and Paul Jones – National
  Association of Boards of Pharmacy
• Lawrence Rudner – Graduate Management
  Admissions Council
• Dennis Maynes – Caveon Test Security
THE GAME’S AFOOT (cont.)


• Overview of Problem
• In 2010, a test preparation course
   – Harvested items
   – Imputed a key
   – Distributed the content and key
• Test Program Manager Reviewed Score Results
• Many Scores at 95 %
THE GAME’S AFOOT (cont.)


• Live Data Set
• Three Teams
• Illustration of Problem
   – 32 identical tests with a score of 95%
   – Probability of occurrence = 1 in 4 trillion
• 100 Item Test
• 387 Test Takers
THE GAME’S AFOOT (cont.)

• Similarities of Team Approaches
  –   Examination of test scores and histograms
  –   Estimation of imputed key
  –   Inspection of item performance
  –   Filtering and splitting of test takers and items
• Differences among Team Approaches
  – Types of classification rules and models
  – Degree of confidence in the number of test takers
    involved
  – Use of IRT models –may not apply when disclosed
    test content involved
THE GAME’S AFOOT (cont.)
• Summary of Project
  – Optimal solution is not obvious
  – Several models can and were used
  – Problem is harder
     • Only some items and keys are compromised
     • Imputed answer keys are the actual keys
  – More research is needed
     • Detection of imputed answer keys
     • Bayes classifiers (need probability models given
       disclosure)
  – Harvesting and disclosure one of most damaging
    security breaches
TELL IT TO THE JUDGE
    Winning With Data Forensics Evidence in Court



•   Aimee Hobby Rhodes, JD
•   James Wollack, Ph.D.
•   Rachel Schoenig, JD
•   Jennifer Ancona Semko, JD
•   Steve Addicott
TELL IT TO THE JUDGE (cont.)

•   Global Financial Certification Program
•   Newly Using Data Forensics
•   Strange Results Observed
•   Test Program Manager Investigates
•   Ethics Board Votes to “De-certify”
•   Candidate Takes Case to Court
TELL IT TO THE JUDGE (cont.)

1.   Use an Expert who is truly an Expert
2.   Use a Trusted and Tried Methodology
3.   Report Fairly
4.   Set Up Procedures Properly
5.   Be Objective
6.   Be Reasonable in What You are Concluding
TELL IT TO THE JUDGE (cont.)

7. Use Your Expert as a Teacher – Explaining what was
done and Why the Evidence is Compelling
8. Ensure that your Expert has all the Facts
9. Take into Consideration all Reasonably Available
Evidence
10. Apply the Terms of your Candidate Agreement
Reasonably and in Good Faith
Balancing Security and Accessibility




Sheryl Lazarus
Martha Thurlow
National Center on Educational Outcomes (NCEO)
University of Minnesota
Balancing Test Security and Accessibility (Cont.)

  Accessibility Issues
  • Paper-Based
  • Computer-Based

  Students can unintentionally be denied meaningful
  access to examinations.
Balancing Test Security and Accessibility (Cont.)

  Typical Accommodation Options

  •   Test Administrator Access
  •   Visual Cues
  •   Teacher Highlighting
  •   Accessibility Software
Balancing Test Security and Accessibility (Cont.)

Best Practices

•   Test Security Guidelines Addressing Accommodations
•   Test Security Agreements Addressing Accommodations
•   Consideration of Student IEP, 504, or LEP
•   Security Training
•   Protocols for Access to Testing Materials
•   Protocols for Distribution of Testing Materials
Balancing Test Security and Accessibility (Cont.)

References

Standards for Educational and Psychological Testing
(APA/AERA/NCME, 1999)

Testing and Data Integrity in the Assessment of Student
Achievement (NCME) – Draft document

Operational Best Practices for Statewide Large-Scale
Assessment Programs (ATP/CCSSO, 2010)
RESOURCES

• CCSSO/ATP – Operational Best Practices
• ATP Security Committee
• Caveon Test Security
   – Blog
   – Webinars
• (Just released) NCME Guidelines
• (Just released) TILSA Guidebook for State
  Assessment Directors on Data Forensics
CAVEON’S 10 YEAR ANNIVERSARY VIDEO
  Take a look and celebrate with us!

        http://lnkd.in/XFBKR7
THANK YOU!
    Nikki Shepherd Eatchel            Dr. John Fremer
    Vice President                    President
    Questar Assessment                Caveon Consulting Services
    neatchel@questarai                john.fremer@caveon.com




-   LinkedIn Group – Test Security
-   Follow Caveon on twitter @caveon
-   Check out our blog…www.caveon.com/blog/
-   LinkedIn Group – Caveon Test Security

More Related Content

More from Caveon Test Security

The Do's and Dont's of Administering High Stakes Tests in Schools Final 121217
The Do's and Dont's of Administering High Stakes Tests in Schools Final 121217The Do's and Dont's of Administering High Stakes Tests in Schools Final 121217
The Do's and Dont's of Administering High Stakes Tests in Schools Final 121217Caveon Test Security
 
Caveon Webinar Series - The Art of Test Security - Know Thy Enemy - November ...
Caveon Webinar Series - The Art of Test Security - Know Thy Enemy - November ...Caveon Webinar Series - The Art of Test Security - Know Thy Enemy - November ...
Caveon Webinar Series - The Art of Test Security - Know Thy Enemy - November ...Caveon Test Security
 
Caveon Webinar Series - Four Steps to Effective Investigations in School Dis...
Caveon Webinar Series -  Four Steps to Effective Investigations in School Dis...Caveon Webinar Series -  Four Steps to Effective Investigations in School Dis...
Caveon Webinar Series - Four Steps to Effective Investigations in School Dis...Caveon Test Security
 
Caveon Webinar Series - On-site Monitoring in Districts 0317
Caveon Webinar Series - On-site Monitoring in Districts 0317Caveon Webinar Series - On-site Monitoring in Districts 0317
Caveon Webinar Series - On-site Monitoring in Districts 0317Caveon Test Security
 
CESP Study Session #1 October 2016
CESP Study Session #1 October 2016CESP Study Session #1 October 2016
CESP Study Session #1 October 2016Caveon Test Security
 
A Tale of Two Cities - School District Webinar #1 Jan 2017
A Tale of Two Cities - School District Webinar  #1 Jan 2017A Tale of Two Cities - School District Webinar  #1 Jan 2017
A Tale of Two Cities - School District Webinar #1 Jan 2017Caveon Test Security
 
Caveon Webinar Series - Discrete Option Multiple Choice: A Revolution in Te...
Caveon Webinar Series  - Discrete Option Multiple Choice:  A Revolution in Te...Caveon Webinar Series  - Discrete Option Multiple Choice:  A Revolution in Te...
Caveon Webinar Series - Discrete Option Multiple Choice: A Revolution in Te...Caveon Test Security
 
Caveon Webinar Series - Test Cheaters Say the Darnedest Things! - 072016
Caveon Webinar Series -  Test Cheaters Say the Darnedest Things! - 072016Caveon Webinar Series -  Test Cheaters Say the Darnedest Things! - 072016
Caveon Webinar Series - Test Cheaters Say the Darnedest Things! - 072016Caveon Test Security
 
Caveon Webinar Series - The Test Security Framework- Why Different Tests Nee...
Caveon Webinar Series -  The Test Security Framework- Why Different Tests Nee...Caveon Webinar Series -  The Test Security Framework- Why Different Tests Nee...
Caveon Webinar Series - The Test Security Framework- Why Different Tests Nee...Caveon Test Security
 
Caveon Webinar Series - Conducting Test Security Investigations in School Di...
Caveon Webinar Series -  Conducting Test Security Investigations in School Di...Caveon Webinar Series -  Conducting Test Security Investigations in School Di...
Caveon Webinar Series - Conducting Test Security Investigations in School Di...Caveon Test Security
 
Caveon Webinar Series - Creating Your Test Security Game Plan - March 2016
Caveon Webinar Series -  Creating Your Test Security Game Plan - March 2016Caveon Webinar Series -  Creating Your Test Security Game Plan - March 2016
Caveon Webinar Series - Creating Your Test Security Game Plan - March 2016Caveon Test Security
 
Caveon Webinar Series - Mastering the US DOE Test Security Requirements Janua...
Caveon Webinar Series - Mastering the US DOE Test Security Requirements Janua...Caveon Webinar Series - Mastering the US DOE Test Security Requirements Janua...
Caveon Webinar Series - Mastering the US DOE Test Security Requirements Janua...Caveon Test Security
 
Caveon Webinar Series - Will the Real Cloned Item Please Stand Up? final
Caveon Webinar Series -  Will the Real Cloned Item Please Stand Up? finalCaveon Webinar Series -  Will the Real Cloned Item Please Stand Up? final
Caveon Webinar Series - Will the Real Cloned Item Please Stand Up? finalCaveon Test Security
 
Caveon Webinar Series - Lessons Learned at the 2015 National Conference on S...
Caveon Webinar Series -  Lessons Learned at the 2015 National Conference on S...Caveon Webinar Series -  Lessons Learned at the 2015 National Conference on S...
Caveon Webinar Series - Lessons Learned at the 2015 National Conference on S...Caveon Test Security
 
Caveon Webinar Series - Learning and Teaching Best Practices in Test Security...
Caveon Webinar Series - Learning and Teaching Best Practices in Test Security...Caveon Webinar Series - Learning and Teaching Best Practices in Test Security...
Caveon Webinar Series - Learning and Teaching Best Practices in Test Security...Caveon Test Security
 
Caveon Webinar - Weathering the Perfect Test Security Storm May 2015 edited
Caveon Webinar  - Weathering the Perfect Test Security Storm May 2015 editedCaveon Webinar  - Weathering the Perfect Test Security Storm May 2015 edited
Caveon Webinar - Weathering the Perfect Test Security Storm May 2015 editedCaveon Test Security
 
Caveon Webinar Series - Weathering the Perfect Test Security Storm May 2015
Caveon Webinar Series - Weathering the Perfect Test Security Storm May 2015Caveon Webinar Series - Weathering the Perfect Test Security Storm May 2015
Caveon Webinar Series - Weathering the Perfect Test Security Storm May 2015Caveon Test Security
 
Caveon Webinar Series - Integrating Data Forensics into the Entire Test Secur...
Caveon Webinar Series - Integrating Data Forensics into the Entire Test Secur...Caveon Webinar Series - Integrating Data Forensics into the Entire Test Secur...
Caveon Webinar Series - Integrating Data Forensics into the Entire Test Secur...Caveon Test Security
 
Caveon Webinar Series: Weathering the Perfect Test Security Storm - February ...
Caveon Webinar Series: Weathering the Perfect Test Security Storm - February ...Caveon Webinar Series: Weathering the Perfect Test Security Storm - February ...
Caveon Webinar Series: Weathering the Perfect Test Security Storm - February ...Caveon Test Security
 
Caveon Webinar Series - Exam Integrity Investigations, An Introduction to th...
Caveon Webinar Series -  Exam Integrity Investigations, An Introduction to th...Caveon Webinar Series -  Exam Integrity Investigations, An Introduction to th...
Caveon Webinar Series - Exam Integrity Investigations, An Introduction to th...Caveon Test Security
 

More from Caveon Test Security (20)

The Do's and Dont's of Administering High Stakes Tests in Schools Final 121217
The Do's and Dont's of Administering High Stakes Tests in Schools Final 121217The Do's and Dont's of Administering High Stakes Tests in Schools Final 121217
The Do's and Dont's of Administering High Stakes Tests in Schools Final 121217
 
Caveon Webinar Series - The Art of Test Security - Know Thy Enemy - November ...
Caveon Webinar Series - The Art of Test Security - Know Thy Enemy - November ...Caveon Webinar Series - The Art of Test Security - Know Thy Enemy - November ...
Caveon Webinar Series - The Art of Test Security - Know Thy Enemy - November ...
 
Caveon Webinar Series - Four Steps to Effective Investigations in School Dis...
Caveon Webinar Series -  Four Steps to Effective Investigations in School Dis...Caveon Webinar Series -  Four Steps to Effective Investigations in School Dis...
Caveon Webinar Series - Four Steps to Effective Investigations in School Dis...
 
Caveon Webinar Series - On-site Monitoring in Districts 0317
Caveon Webinar Series - On-site Monitoring in Districts 0317Caveon Webinar Series - On-site Monitoring in Districts 0317
Caveon Webinar Series - On-site Monitoring in Districts 0317
 
CESP Study Session #1 October 2016
CESP Study Session #1 October 2016CESP Study Session #1 October 2016
CESP Study Session #1 October 2016
 
A Tale of Two Cities - School District Webinar #1 Jan 2017
A Tale of Two Cities - School District Webinar  #1 Jan 2017A Tale of Two Cities - School District Webinar  #1 Jan 2017
A Tale of Two Cities - School District Webinar #1 Jan 2017
 
Caveon Webinar Series - Discrete Option Multiple Choice: A Revolution in Te...
Caveon Webinar Series  - Discrete Option Multiple Choice:  A Revolution in Te...Caveon Webinar Series  - Discrete Option Multiple Choice:  A Revolution in Te...
Caveon Webinar Series - Discrete Option Multiple Choice: A Revolution in Te...
 
Caveon Webinar Series - Test Cheaters Say the Darnedest Things! - 072016
Caveon Webinar Series -  Test Cheaters Say the Darnedest Things! - 072016Caveon Webinar Series -  Test Cheaters Say the Darnedest Things! - 072016
Caveon Webinar Series - Test Cheaters Say the Darnedest Things! - 072016
 
Caveon Webinar Series - The Test Security Framework- Why Different Tests Nee...
Caveon Webinar Series -  The Test Security Framework- Why Different Tests Nee...Caveon Webinar Series -  The Test Security Framework- Why Different Tests Nee...
Caveon Webinar Series - The Test Security Framework- Why Different Tests Nee...
 
Caveon Webinar Series - Conducting Test Security Investigations in School Di...
Caveon Webinar Series -  Conducting Test Security Investigations in School Di...Caveon Webinar Series -  Conducting Test Security Investigations in School Di...
Caveon Webinar Series - Conducting Test Security Investigations in School Di...
 
Caveon Webinar Series - Creating Your Test Security Game Plan - March 2016
Caveon Webinar Series -  Creating Your Test Security Game Plan - March 2016Caveon Webinar Series -  Creating Your Test Security Game Plan - March 2016
Caveon Webinar Series - Creating Your Test Security Game Plan - March 2016
 
Caveon Webinar Series - Mastering the US DOE Test Security Requirements Janua...
Caveon Webinar Series - Mastering the US DOE Test Security Requirements Janua...Caveon Webinar Series - Mastering the US DOE Test Security Requirements Janua...
Caveon Webinar Series - Mastering the US DOE Test Security Requirements Janua...
 
Caveon Webinar Series - Will the Real Cloned Item Please Stand Up? final
Caveon Webinar Series -  Will the Real Cloned Item Please Stand Up? finalCaveon Webinar Series -  Will the Real Cloned Item Please Stand Up? final
Caveon Webinar Series - Will the Real Cloned Item Please Stand Up? final
 
Caveon Webinar Series - Lessons Learned at the 2015 National Conference on S...
Caveon Webinar Series -  Lessons Learned at the 2015 National Conference on S...Caveon Webinar Series -  Lessons Learned at the 2015 National Conference on S...
Caveon Webinar Series - Lessons Learned at the 2015 National Conference on S...
 
Caveon Webinar Series - Learning and Teaching Best Practices in Test Security...
Caveon Webinar Series - Learning and Teaching Best Practices in Test Security...Caveon Webinar Series - Learning and Teaching Best Practices in Test Security...
Caveon Webinar Series - Learning and Teaching Best Practices in Test Security...
 
Caveon Webinar - Weathering the Perfect Test Security Storm May 2015 edited
Caveon Webinar  - Weathering the Perfect Test Security Storm May 2015 editedCaveon Webinar  - Weathering the Perfect Test Security Storm May 2015 edited
Caveon Webinar - Weathering the Perfect Test Security Storm May 2015 edited
 
Caveon Webinar Series - Weathering the Perfect Test Security Storm May 2015
Caveon Webinar Series - Weathering the Perfect Test Security Storm May 2015Caveon Webinar Series - Weathering the Perfect Test Security Storm May 2015
Caveon Webinar Series - Weathering the Perfect Test Security Storm May 2015
 
Caveon Webinar Series - Integrating Data Forensics into the Entire Test Secur...
Caveon Webinar Series - Integrating Data Forensics into the Entire Test Secur...Caveon Webinar Series - Integrating Data Forensics into the Entire Test Secur...
Caveon Webinar Series - Integrating Data Forensics into the Entire Test Secur...
 
Caveon Webinar Series: Weathering the Perfect Test Security Storm - February ...
Caveon Webinar Series: Weathering the Perfect Test Security Storm - February ...Caveon Webinar Series: Weathering the Perfect Test Security Storm - February ...
Caveon Webinar Series: Weathering the Perfect Test Security Storm - February ...
 
Caveon Webinar Series - Exam Integrity Investigations, An Introduction to th...
Caveon Webinar Series -  Exam Integrity Investigations, An Introduction to th...Caveon Webinar Series -  Exam Integrity Investigations, An Introduction to th...
Caveon Webinar Series - Exam Integrity Investigations, An Introduction to th...
 

Caveon Webinar Series: Key Security Lessons Learned at ATP's Innovations in Testing conference 2013

  • 1. Caveon Webinar Series: Key Security Lessons Learned at ATP’s “Innovations in Testing” 2013 Nikki Shepherd Eatchel Dr. John Fremer Vice President President Program Management Caveon Consulting Service Questar Assessment February 21, 2013
  • 2. Upcoming Caveon Events • National Council on Measurement in Education Conference, San Francisco, April 26-30 • United States Distance Education Association Conference, St. Louis, April 28 - May 1 • National Conference on Student Assessment, National Harbor, June 19-21
  • 3. Caveon Online • Caveon Security Insights Blog – http://www.caveon.com/blog/ • twitter – @Caveon – Follow us! • LinkedIn – Caveon Company Page – Caveon Test Security Group • Please contribute! • Facebook – Will you be our “friend?” – “Like” us! www.caveon.com
  • 4. Agenda for today • ATP Test Security Committee & Live Lab • Truth & Consequences, Conducting Effective Test Security Investigations • The Handbook of Test Security • Data Forensics, Opening the Black Box • The Game’s Afoot: Sleuths Match Wits • Tell it to the Judge, Winning with Data Forensics Evidence in Court • Balancing Test Security and Accessibility
  • 5. But, before we get started… Caveon is proud to announce we are celebrating 10 years in business in 2013!
  • 6. Security Committee Briefing & Live Lab Goals for the Year • Security Survey • Test Security Options • Enforcement • Candidate Rights and Responsibilities • Newsletters • Live Lab
  • 7. Survey Activities Activities Completed • Three surveys designed by the ATPSC • Survey review and feedback provided by the Institute for Credentialing Excellence (ICE) • Survey Distributed, 117 respondents – 79 Certification/Licensure – 16 Education – 22 Vendor • Initial analysis complete
  • 8. Sneak Peak at the Data Trends General Information • Wider variety of respondents for 2012 survey • Increased focus on security by all respondent organizations • Large percentage of “Don’t Know” responses
  • 9. Sneak Peak at the Data Trends (Cont.) • Larger percentage of respondents with formal, internal security plans • Significant gap in formal, external security processes • Lack of standardization implementation • Few audits
  • 10. Additional ATPSC Activities • Security Options Document • DMCA Takedown Effort • Candidate Rights and Responsibilities
  • 11. Additional ATPSC Activities (Cont.) Security Options Document • Assessment Models • Delivery Channels Currently available at www.testpublishers.org
  • 12. Additional ATPSC Activities (Cont.) DMCA Takedown Effort • 6 ISP’s were Identified hosting 17 Infringing Websites – One ISP – all websites removed – Approximately 30% of the websites no longer exist and affiliate websites were also removed Candidate Rights and Responsibilities • 8 organizations participated • Available May 2013
  • 13. Truth & Consequences: Conducting Effective Test Security Investigations Benjamin Mannes, CPP, SSI, CHS-III Director, Test Security American Board of Internal Medicine Marc J. Weinstein, Esq. Partner Dillworth Paxson, LLP
  • 14. Truth & Consequences: Conducting Effective Test Security Investigations (Cont.) • The Proliferation of Risk • Core Elements of Exam Integrity – Protect – Investigate – Enforce
  • 15. Truth & Consequences: Conducting Effective Test Security Investigations (Cont.) Identification and Vetting • Strong web presence • Ongoing review and analysis • Vetting Analyze • Collusion • Sharing • Inappropriate Study Techniques • Violations • Proxy
  • 16. Truth & Consequences: Conducting Effective Test Security Investigations (Cont.) Investigation • Gather • Preserve
  • 17. Truth & Consequences: Conducting Effective Test Security Investigations (Cont.) Field Interviews • Purpose • Participants • Nonverbal communication
  • 18. Truth & Consequences: Conducting Effective Test Security Investigations (Cont.) Enforcement • Options • Organizational Goals • Policy/Procedures, Laws/Regulations • Civil versus Criminal Join the conversation at: @ExamIntegrity on twitter LinkedIn Group: “Exam Integrity”
  • 19. HANDBOOK OF TEST SECURITY • Editors - James Wollack & John Fremer • Participating Authors – Deborah Harris, William Hatherill, David Foster • Slated for Publication – March 2013 • Preventing, Detecting, and Investigating Cheating • Testing in Many Domains – Certification/Licensure – Clinical – Educational – Industrial/Organizational
  • 20. HANDBOOK – PRIMARY AIMS • Insights of Psychometricians and Policy-Makers • Best Practices for Designing Secure Tests • Analysis of Security Vulnerabilities • Practical Strategies for Cheating Prevention and Detection • Lessons Learned – Actual security violations – Security initiatives
  • 21. HANDBOOK – FIVE TAKEAWAYS • Security Vulnerabilities for All Genres of Testing • Critical Importance of Security Planning • Practical and Proven Prevention & Detection Strategies • How Security Breaches Have Been Dealt With • Lessons We Have Learned From Past Instances of Testing Misbehavior
  • 22. HANDBOOK – FIVE PREDICTIONS • In Many High Stakes Testing Programs – Cheating detection statistical analyses will be performed routinely – Computer-based testing will increasingly become the norm – Technology developments will be critically important to test security – Internationalization of testing programs will increase – “Test Security Manager” will become a recognized and valued position
  • 23. DATA FORENSICS, OPENING THE BLACK BOX • John Fremer • Neal Kingston • James Wollack • Dennis Maynes
  • 24. DATA FORENSICS, OPENING THE BLACK BOX (cont.) • Features of “Mature” Forensics Approaches – Explicit standards – One or more associations – Formal training programs – Regular conferences – One or more journals – Body of published literature – Regular positions in many agencies and companies
  • 25. DATA FORENSICS, OPENING THE BLACK BOX (cont.) • Useful Statistics – Similarity – Unusual number of same answers – Aberrance – Answering hard questions correctly while missing easy ones – Gains (or drops) Atypical score changes over time – Erasures – Unusual patterns such as almost always wrong to right – Fast Responding – Much faster than others – superhuman? – Shared Information – Biometrics or personal information – Email or home addresses, photos, etc.
  • 26. THE GAME’S AFOOT: SLEUTHS MATCH WITS • Kim Brunnert – Elsevier • Joy Matthews-Lopez and Paul Jones – National Association of Boards of Pharmacy • Lawrence Rudner – Graduate Management Admissions Council • Dennis Maynes – Caveon Test Security
  • 27. THE GAME’S AFOOT (cont.) • Overview of Problem • In 2010, a test preparation course – Harvested items – Imputed a key – Distributed the content and key • Test Program Manager Reviewed Score Results • Many Scores at 95 %
  • 28. THE GAME’S AFOOT (cont.) • Live Data Set • Three Teams • Illustration of Problem – 32 identical tests with a score of 95% – Probability of occurrence = 1 in 4 trillion • 100 Item Test • 387 Test Takers
  • 29. THE GAME’S AFOOT (cont.) • Similarities of Team Approaches – Examination of test scores and histograms – Estimation of imputed key – Inspection of item performance – Filtering and splitting of test takers and items • Differences among Team Approaches – Types of classification rules and models – Degree of confidence in the number of test takers involved – Use of IRT models –may not apply when disclosed test content involved
  • 30. THE GAME’S AFOOT (cont.) • Summary of Project – Optimal solution is not obvious – Several models can and were used – Problem is harder • Only some items and keys are compromised • Imputed answer keys are the actual keys – More research is needed • Detection of imputed answer keys • Bayes classifiers (need probability models given disclosure) – Harvesting and disclosure one of most damaging security breaches
  • 31. TELL IT TO THE JUDGE Winning With Data Forensics Evidence in Court • Aimee Hobby Rhodes, JD • James Wollack, Ph.D. • Rachel Schoenig, JD • Jennifer Ancona Semko, JD • Steve Addicott
  • 32. TELL IT TO THE JUDGE (cont.) • Global Financial Certification Program • Newly Using Data Forensics • Strange Results Observed • Test Program Manager Investigates • Ethics Board Votes to “De-certify” • Candidate Takes Case to Court
  • 33. TELL IT TO THE JUDGE (cont.) 1. Use an Expert who is truly an Expert 2. Use a Trusted and Tried Methodology 3. Report Fairly 4. Set Up Procedures Properly 5. Be Objective 6. Be Reasonable in What You are Concluding
  • 34. TELL IT TO THE JUDGE (cont.) 7. Use Your Expert as a Teacher – Explaining what was done and Why the Evidence is Compelling 8. Ensure that your Expert has all the Facts 9. Take into Consideration all Reasonably Available Evidence 10. Apply the Terms of your Candidate Agreement Reasonably and in Good Faith
  • 35. Balancing Security and Accessibility Sheryl Lazarus Martha Thurlow National Center on Educational Outcomes (NCEO) University of Minnesota
  • 36. Balancing Test Security and Accessibility (Cont.) Accessibility Issues • Paper-Based • Computer-Based Students can unintentionally be denied meaningful access to examinations.
  • 37. Balancing Test Security and Accessibility (Cont.) Typical Accommodation Options • Test Administrator Access • Visual Cues • Teacher Highlighting • Accessibility Software
  • 38. Balancing Test Security and Accessibility (Cont.) Best Practices • Test Security Guidelines Addressing Accommodations • Test Security Agreements Addressing Accommodations • Consideration of Student IEP, 504, or LEP • Security Training • Protocols for Access to Testing Materials • Protocols for Distribution of Testing Materials
  • 39. Balancing Test Security and Accessibility (Cont.) References Standards for Educational and Psychological Testing (APA/AERA/NCME, 1999) Testing and Data Integrity in the Assessment of Student Achievement (NCME) – Draft document Operational Best Practices for Statewide Large-Scale Assessment Programs (ATP/CCSSO, 2010)
  • 40. RESOURCES • CCSSO/ATP – Operational Best Practices • ATP Security Committee • Caveon Test Security – Blog – Webinars • (Just released) NCME Guidelines • (Just released) TILSA Guidebook for State Assessment Directors on Data Forensics
  • 41. CAVEON’S 10 YEAR ANNIVERSARY VIDEO Take a look and celebrate with us! http://lnkd.in/XFBKR7
  • 42. THANK YOU! Nikki Shepherd Eatchel Dr. John Fremer Vice President President Questar Assessment Caveon Consulting Services neatchel@questarai john.fremer@caveon.com - LinkedIn Group – Test Security - Follow Caveon on twitter @caveon - Check out our blog…www.caveon.com/blog/ - LinkedIn Group – Caveon Test Security

Editor's Notes

  1. New item typesPerformance based itemsRemote proctoring technologies in high risk areasDevelopment a deeper item poolsData forensicsWeb patrolOnlineBiometricTechnology AdvancementsBroader use of Data Forensics
  2. Which test security group are we talking about here, Caveon’s? Then it’s Caveon Test Security - Skyler