Caveon Webinar Series: Six Security Challenges to Your High Stakes Test Program Jan 2014

469 views

Published on

Presented by Dennis Maynes, Chief Scientist Data Forensics and Steve Addicott, Vice President, Caveon Test Security
It’s no secret, your items and tests are under attack. The problem is big, and the challenges are…well…challenging.
In this informative session, Dennis Maynes and Steve Addicott explore six security challenges initially faced by the IT certification industry, but which now impact all high stakes tests in Certification/Licensure, Higher Ed, K12 Education, and I/O. These challenges include:
• Proxy test taking is big business
• Braindump usage continues to undermine trustworthy test results
• Test theft appears to be unchecked
• Technology greatly facilitates collusive test taking
• Stakeholder support must be won
• Many test administration models present dilemmas
While the threats are severe, many test program directors choose to stand up and fight. Maynes and Addicott present both tried and tested as well as new methods to both measure and manage against these threats.

Published in: Education, Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
469
On SlideShare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
8
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide
  • Paper written in 2009…IT challenges lead other types of testing…challenges for the future , if not already feeling them
  • Find some other, non-IT-specific proxy solicitations
  • Here’s a real world example from a program BEFORE they started using Caveon. An important medical certrification program, with two administrations per year. A few years ago, about 7,500 candidates were getting ready to take the test on Saturday. They had been in school for years, studied for the exam, registered for the exam, made travel arrangements, and everything, nationwide is set to go on Saturday. However, the Wednesday before the test, the test program manager receives and anonymous email, just saying, “I thought you’want to know. Attached to the email? THE ENTIRE ITEM BANK!! I mean…
  • WHAT WOULD YOU DO? Really, what…would…you…do? Cancel the exam, right? That’s what this one did…but what a nightmare! No contingency plan. No spare item banks. No Security Incident response plan. No emergency budgets. And, what about the last administrations? Who passed, but didn’t really have the requisite knowledge and skills to practice this branch of medicine?
  • Caveon Webinar Series: Six Security Challenges to Your High Stakes Test Program Jan 2014

    1. 1. Caveon Webinar Series: Six Security Challenges to Your High Stakes Test Program and How Data Forensics May Help Thwart Them Steve Addicott, Vice President Dennis Maynes, Chief Scientist Caveon Test Security January 22, 2014
    2. 2. Upcoming Caveon Events Caveon Webinar Series: Next session, February 19 Protecting Your Tests Using U.S. Copyright Law ATP Innovations In Testing Annual Conference • March 2-5 in Scottsdale, AZ • Check out our sessions here: • http://www.caveon.com/atp-2014-innovations-in-testing-caveonsessions/ • Visit us in Booth 33 or make an appointment to talk to us about your specific test security or test development concerns.
    3. 3. Agenda for Today • • • • •
    4. 4. Magnitude of the Problem • • • • • • • •
    5. 5. Six Challenges
    6. 6. Proxy Test Taking • • • • • • • • • • •
    7. 7. From the Internet
    8. 8. We Believe • • • • • • • •
    9. 9. Braindump Usage
    10. 10. Braindump/Theft Usage Case 2012 • • • • • • • • •
    11. 11. We Believe • • • • • • •
    12. 12. Test Theft • • •
    13. 13. A Real-Life Example • Medical certification program • Administration to 3,500 candidates on Saturday • Anonymous email on Wednesday – “I thought you should know…” – ENTIRE ITEM BANK ATTACHED!!
    14. 14. About Stolen Tests • • • • • • • • • •
    15. 15. Technology • • •
    16. 16. Technology
    17. 17. Technology
    18. 18. Technology
    19. 19. Technology
    20. 20. Technology
    21. 21. Stakeholder Support
    22. 22. In Our Experience • • • •
    23. 23. Stakeholder Support Can Be Won
    24. 24. Test Administration Models • • • • • • •
    25. 25. We Believe • • •
    26. 26. Test Security is a Process, Not a State Protect Improve Detect Respond
    27. 27. Protect Against Security Breaches • • • • • • • • • • •
    28. 28. Detect and Respond • • • • • • •
    29. 29. Exam Inoculation • • • • • • •
    30. 30. Data Forensics Detection Statistical Anomalies Testing Irregularities Security Violations Security Breaches Test Fraud
    31. 31. Type I Versus Type II Errors • • • • • •
    32. 32. Communicating with Stakeholders • • • • • • •
    33. 33. Questions?
    34. 34. Caveon Online • • • • • • •
    35. 35. Thank you!

    ×