Test security has been emerging as a cohesive discipline for the past ten years. There are no college courses that teach test security. And, even if there were, many practitioners don't have time to take those classes. How do you stay abreast of current developments? How do you train your staff in latest best practices if you don't know about them? Are there resources out there, and how do you find them?
In this webinar, Caveon will host several special guest practitioners from various industries. These test security veterans have had to answer these very questions. They will address how continuing education will help you improve test security in your organization.
Stephen Harvey (Learning Resources Centre Manager) and Sam Kennedy (e-Learning Coordinator) reflect on previous attempts to raise awareness of the importance of online safety amongst learners and staff at Hertford Regional College
Late February presented two auspicious testing industry events: ATP's “Innovations in Testing” Conference, and the US Department of Education’s National Center for Education Statistics' “Testing Integrity Symposium.”
Join Caveon leaders John Fremer and Steve Addicott as they share the Top Ten Security Lessons Learned from the two events.
Caveon Webinar Series - Lessons Learned at the European Association of Test...Caveon Test Security
Join us for some groundbreaking exam security developments
Several members of the Caveon team just returned from the first annual Conference on Test Security in Iowa City, where a gathering of industry experts presented information and key developments that are essential in keeping the road to secure exams soundly paved.
Caveon's Steve Addicott and John Fremer will share messages from the sessions they presented, and what they learned from others during the conference. Steve and John are industry veterans, and have decades of experience in test security. They know what security lessons are most important to testing programs today.
They will be joined by industry rock star, Rachel Schoenig, Assistant Vice President and Head of Test Security at ACT, who presented several sessions on the agenda, including one focused on measuring the effectiveness of your test security program.
In addition, Steve and John attended and presented at the European Association of Test Publisher's (EATP) annual conference in late September, and will share a few lessons learned from the international gathering as well.
This could be the most important webinar you attend this year.
Caveon Webinar Series - Conducting Test Security Investigations in School Di...Caveon Test Security
In the coming weeks, schools all over the country will be administering standardized exams to millions of students. And inevitably, test security incidents will arise, many of which may directly impact test score validity. Is your team prepared to answer the following tough questions?
• What will you do if you find yourself in a position of having to respond to an incident or breach in your state or district?
• What process will you follow?
• What is your incident escalation plan?
• How will you communicate with internal and external stakeholders?
• Most importantly, how will you discover the truth of what did or did not occur, and its impact on test scores?
Join Caveon’s test security experts for an important, hour-long webinar to help you understand the steps to take when challenging situations arise. We will share:
• Recent experiences other districts have had with possible cheating, and what they have done to resolve their concerns
• Information and tools for you to arm yourself before an issue arises, and to help you be better equipped to deal effectively and efficiently
• Essential tips you need to know when invoking a Security Incident Response Plan, and further conducting a security investigation
Caveon Webinar Series - Security Challenges in Creating Testing Programs - Se...Caveon Test Security
Think back to when you first started your certification program... there were so many things to think about:
• Who will develop your items?
• Where were items going to be housed?
• Where will the tests be delivered?
• Who was going to do the fulfillment of certification awards?
What you weren't thinking about:
• How am I going to protect my test questions from getting stolen?
Join us for a virtual coffee and conversation as we discuss the processes you can put in place, things you can do, and tools you can use to stop test theft before it happens. Two programs will be featured and you'll hear lessons learned from each.
Josephine Elizaga, Senior Manager of Certification for Genesys will present information from her experience with the recently released Genesys Professional Certification Program. Josephine has fifteen years of experience in training and certification with HP Software Education. She holds an engineering degree with further studies in instructional design and training methods for business and industry.
Jamie Mulkey, Executive Director of the Certified Exam Security Professional (CESP) Program and Vice President of Client Services for Caveon, will present some key strategies currently being deployed for the upcoming CESP - Generalist exam.
Even if your certification program is not-so-new, you will gain insight on security tips and techniques that will strengthen your testing program.
Stephen Harvey (Learning Resources Centre Manager) and Sam Kennedy (e-Learning Coordinator) reflect on previous attempts to raise awareness of the importance of online safety amongst learners and staff at Hertford Regional College
Late February presented two auspicious testing industry events: ATP's “Innovations in Testing” Conference, and the US Department of Education’s National Center for Education Statistics' “Testing Integrity Symposium.”
Join Caveon leaders John Fremer and Steve Addicott as they share the Top Ten Security Lessons Learned from the two events.
Caveon Webinar Series - Lessons Learned at the European Association of Test...Caveon Test Security
Join us for some groundbreaking exam security developments
Several members of the Caveon team just returned from the first annual Conference on Test Security in Iowa City, where a gathering of industry experts presented information and key developments that are essential in keeping the road to secure exams soundly paved.
Caveon's Steve Addicott and John Fremer will share messages from the sessions they presented, and what they learned from others during the conference. Steve and John are industry veterans, and have decades of experience in test security. They know what security lessons are most important to testing programs today.
They will be joined by industry rock star, Rachel Schoenig, Assistant Vice President and Head of Test Security at ACT, who presented several sessions on the agenda, including one focused on measuring the effectiveness of your test security program.
In addition, Steve and John attended and presented at the European Association of Test Publisher's (EATP) annual conference in late September, and will share a few lessons learned from the international gathering as well.
This could be the most important webinar you attend this year.
Caveon Webinar Series - Conducting Test Security Investigations in School Di...Caveon Test Security
In the coming weeks, schools all over the country will be administering standardized exams to millions of students. And inevitably, test security incidents will arise, many of which may directly impact test score validity. Is your team prepared to answer the following tough questions?
• What will you do if you find yourself in a position of having to respond to an incident or breach in your state or district?
• What process will you follow?
• What is your incident escalation plan?
• How will you communicate with internal and external stakeholders?
• Most importantly, how will you discover the truth of what did or did not occur, and its impact on test scores?
Join Caveon’s test security experts for an important, hour-long webinar to help you understand the steps to take when challenging situations arise. We will share:
• Recent experiences other districts have had with possible cheating, and what they have done to resolve their concerns
• Information and tools for you to arm yourself before an issue arises, and to help you be better equipped to deal effectively and efficiently
• Essential tips you need to know when invoking a Security Incident Response Plan, and further conducting a security investigation
Caveon Webinar Series - Security Challenges in Creating Testing Programs - Se...Caveon Test Security
Think back to when you first started your certification program... there were so many things to think about:
• Who will develop your items?
• Where were items going to be housed?
• Where will the tests be delivered?
• Who was going to do the fulfillment of certification awards?
What you weren't thinking about:
• How am I going to protect my test questions from getting stolen?
Join us for a virtual coffee and conversation as we discuss the processes you can put in place, things you can do, and tools you can use to stop test theft before it happens. Two programs will be featured and you'll hear lessons learned from each.
Josephine Elizaga, Senior Manager of Certification for Genesys will present information from her experience with the recently released Genesys Professional Certification Program. Josephine has fifteen years of experience in training and certification with HP Software Education. She holds an engineering degree with further studies in instructional design and training methods for business and industry.
Jamie Mulkey, Executive Director of the Certified Exam Security Professional (CESP) Program and Vice President of Client Services for Caveon, will present some key strategies currently being deployed for the upcoming CESP - Generalist exam.
Even if your certification program is not-so-new, you will gain insight on security tips and techniques that will strengthen your testing program.
Caveon Webinar Series - Creating Your Test Security Game Plan - March 2016Caveon Test Security
History has shown that as stakes rise for testing programs, so do threats to the program's test result validity. There are stories in the media almost daily about high-stakes programs suffering at the hands of those intent on obtaining the content for disingenuous purposes. Having a game plan in place before a threat or validity issue occurs is vital. This month's webinar will focus on key steps your organization can take to maximize your protection from test fraud, and stay one step ahead of the game.
Caveon Webinar Series - Ten Test Security Lessons Learned at ATP 2014 march 2014Caveon Test Security
This year's Association of Test Publishers (ATP) Innovations in Testing Conference focused more than ever on test security, and the Caveon team was there. We share with you not only the concepts which we presented, but also new things we learned at the conference.
Caveon leaders John Fremer and Steve Addicott summarize the test security ideas and strategies from ATP and the things you can do to protect your high-stakes tests.
Testing industry veterans John Fremer and Steve Addicott of Caveon are joined by Lou Woodruff, past president of the National College Testing Association to share their "lessons learned" from several of this summer's biggest testing conferences. For more information, please go to www.caveon.com
Caveon Webinar Series - Lessons Learned at the 2015 National Conference on S...Caveon Test Security
The National Conference on Student Assessment (NCSA) was held last month in San Diego, and Caveon was there. This month's webinar will focus on lessons learned at the conference regarding test security, and what's happening in the state assessment arena in terms of test security right now.
Caveon's Steve Addicott and Jamie Mulkey will be joined by special guest Walt Drane, State Assessment Director, Mississippi Department of Education. The panelists will summarize the test security trends and strategies that they drew from the conference, and also share key points from sessions they presented.
Data forensics has become a critical tool for strengthening exam security, detecting security risks, and providing guidance for responding to security breaches. Because the stakes associated with the exams are increasing, there is more danger that the security of your exam will be exploited by cheaters and thieves. Whether you’ve never heard the term ‘Data Forensics’ or your organization is currently implementing a program of its own, this is one session you can’t afford to miss. The information shared in this webinar could save your organization time, money, and heartache in the future!
Caveon Webinar Series: The Handbook of Test Security – Learn more about preve...Caveon Test Security
Caveon Webinar Series presents it's March Webinar session:
"The Handbook of Test Security – Learn more about preventing and detecting cheating on high stakes tests”
Handbook editors, Professor Jim Wollack, University of Wisconsin, and Dr. John Fremer, Caveon Consulting Services, provide a synopsis of the brand new “Handbook of Test Security,” and present key ideas covering the full spectrum of testing types and domains.
All of our sessions are offered at NO CHARGE, and last less than an hour.
Follow @caveon on twitter for discussion & updates about this and other Webinars!
Caveon Webinar Series - Test Cheaters Say the Darnedest Things! - 072016Caveon Test Security
You won't believe what's actually happened in the world of testing!
What goes on in the mind of a would-be test cheater? While cheating is a serious offense, some of test takers go to great (and sometimes comical) lengths to try gaining an unfair advantage to achieve a successful testing outcome.
Join us as we look at some of the most memorable proctor/test taker cheating encounters. Our special guest, Jarret Dyer, of the College of DuPage Testing Center, has created a compilation of test proctor stories from testing centers around the United States and across the globe. Jarret will share his 'best of' stories, while Caveon's John Fremer will discuss the consequences of not following the right test security processes and procedures. You don't want to miss this fun, yet informative session! To listen to the recording that goes along with these slides, go to https://youtu.be/r-CCaDf7NEk
Presentation for Queensland VDC
Topics covered include:
What is e-Assessment?
Issues and concerns around using eAssesments
Mobile evidence capture and submission
Principles for developing self paced assessment tasks
(Quizzes, Scenarios, Decision making trees)
Webinar based assessment and peer review
Using discussion forums to uncover student ?stories? and understanding
Tools and approaches for Student placement reporting
Group work projects ? measuring contributions
Other interesting approaches from the field.
Benefits and learning outcomes include:
* Understanding and application of various types e-assessments
* Application of relevant e-Assessment approaches to specific training context
In today’s market, global outreach, quick time to release, and a feature rich design are the major factors that determine a product’s success. Organizations are constantly on the lookout for innovative testing techniques to match these driving forces. Crowdsourced testing is a paradigm increasing in popularity because it addresses these factors through its scale, flexibility, cost effectiveness, and fast turnaround. Join Rajini Padmanaban and Mukesh Sharma as they describe what it takes to implement a crowdsourced testing effort including its definition, models, relevance to today’s development world, and challenges and mitigation strategies. Rajini and Mukesh share the facts and myths about crowdsourced testing. They span a range of theory and practice including case studies of real-life experiences and exercises to illustrate the message, and explain what it takes to maximize the benefits of a crowdsourced test implementation.
Ensuring Security through Continuous TestingTechWell
Many companies develop strong software development practices that include ongoing testing throughout the development lifecycle but fail to account for the testing of security-related use cases. This leads to security controls being tacked on to an application just before it goes to production. With security controls implemented in this manner, more security vulnerabilities will be found with less time to correct them. As more applications move to cloud-based architectures, this will become an even greater problem as some of the protection enjoyed by applications hosted on-premise no longer exists. Jeremy Faircloth discusses a better approach—ensuring that testing throughout the development lifecycle includes the appropriate focus on security controls. Jeremy illustrates this through the establishment of security-related use cases, static code analysis, dynamic analysis, fuzzing, availability testing, and other techniques. Save yourself from last minute security issues by proactively testing the security of your application!
Embracing Disruption: How One Multinational is Changing its ApproachCornerstone OnDemand
Digital disruption and flatter workplace organizations are changing employee expectations regarding corporate learning. Organizations must take advantage of the opportunities created by these changes and align existing organizational expertise to them in order to fulfill business objectives.
Caveon Webinar Series - Creating Your Test Security Game Plan - March 2016Caveon Test Security
History has shown that as stakes rise for testing programs, so do threats to the program's test result validity. There are stories in the media almost daily about high-stakes programs suffering at the hands of those intent on obtaining the content for disingenuous purposes. Having a game plan in place before a threat or validity issue occurs is vital. This month's webinar will focus on key steps your organization can take to maximize your protection from test fraud, and stay one step ahead of the game.
Caveon Webinar Series - Ten Test Security Lessons Learned at ATP 2014 march 2014Caveon Test Security
This year's Association of Test Publishers (ATP) Innovations in Testing Conference focused more than ever on test security, and the Caveon team was there. We share with you not only the concepts which we presented, but also new things we learned at the conference.
Caveon leaders John Fremer and Steve Addicott summarize the test security ideas and strategies from ATP and the things you can do to protect your high-stakes tests.
Testing industry veterans John Fremer and Steve Addicott of Caveon are joined by Lou Woodruff, past president of the National College Testing Association to share their "lessons learned" from several of this summer's biggest testing conferences. For more information, please go to www.caveon.com
Caveon Webinar Series - Lessons Learned at the 2015 National Conference on S...Caveon Test Security
The National Conference on Student Assessment (NCSA) was held last month in San Diego, and Caveon was there. This month's webinar will focus on lessons learned at the conference regarding test security, and what's happening in the state assessment arena in terms of test security right now.
Caveon's Steve Addicott and Jamie Mulkey will be joined by special guest Walt Drane, State Assessment Director, Mississippi Department of Education. The panelists will summarize the test security trends and strategies that they drew from the conference, and also share key points from sessions they presented.
Data forensics has become a critical tool for strengthening exam security, detecting security risks, and providing guidance for responding to security breaches. Because the stakes associated with the exams are increasing, there is more danger that the security of your exam will be exploited by cheaters and thieves. Whether you’ve never heard the term ‘Data Forensics’ or your organization is currently implementing a program of its own, this is one session you can’t afford to miss. The information shared in this webinar could save your organization time, money, and heartache in the future!
Caveon Webinar Series: The Handbook of Test Security – Learn more about preve...Caveon Test Security
Caveon Webinar Series presents it's March Webinar session:
"The Handbook of Test Security – Learn more about preventing and detecting cheating on high stakes tests”
Handbook editors, Professor Jim Wollack, University of Wisconsin, and Dr. John Fremer, Caveon Consulting Services, provide a synopsis of the brand new “Handbook of Test Security,” and present key ideas covering the full spectrum of testing types and domains.
All of our sessions are offered at NO CHARGE, and last less than an hour.
Follow @caveon on twitter for discussion & updates about this and other Webinars!
Caveon Webinar Series - Test Cheaters Say the Darnedest Things! - 072016Caveon Test Security
You won't believe what's actually happened in the world of testing!
What goes on in the mind of a would-be test cheater? While cheating is a serious offense, some of test takers go to great (and sometimes comical) lengths to try gaining an unfair advantage to achieve a successful testing outcome.
Join us as we look at some of the most memorable proctor/test taker cheating encounters. Our special guest, Jarret Dyer, of the College of DuPage Testing Center, has created a compilation of test proctor stories from testing centers around the United States and across the globe. Jarret will share his 'best of' stories, while Caveon's John Fremer will discuss the consequences of not following the right test security processes and procedures. You don't want to miss this fun, yet informative session! To listen to the recording that goes along with these slides, go to https://youtu.be/r-CCaDf7NEk
Presentation for Queensland VDC
Topics covered include:
What is e-Assessment?
Issues and concerns around using eAssesments
Mobile evidence capture and submission
Principles for developing self paced assessment tasks
(Quizzes, Scenarios, Decision making trees)
Webinar based assessment and peer review
Using discussion forums to uncover student ?stories? and understanding
Tools and approaches for Student placement reporting
Group work projects ? measuring contributions
Other interesting approaches from the field.
Benefits and learning outcomes include:
* Understanding and application of various types e-assessments
* Application of relevant e-Assessment approaches to specific training context
In today’s market, global outreach, quick time to release, and a feature rich design are the major factors that determine a product’s success. Organizations are constantly on the lookout for innovative testing techniques to match these driving forces. Crowdsourced testing is a paradigm increasing in popularity because it addresses these factors through its scale, flexibility, cost effectiveness, and fast turnaround. Join Rajini Padmanaban and Mukesh Sharma as they describe what it takes to implement a crowdsourced testing effort including its definition, models, relevance to today’s development world, and challenges and mitigation strategies. Rajini and Mukesh share the facts and myths about crowdsourced testing. They span a range of theory and practice including case studies of real-life experiences and exercises to illustrate the message, and explain what it takes to maximize the benefits of a crowdsourced test implementation.
Ensuring Security through Continuous TestingTechWell
Many companies develop strong software development practices that include ongoing testing throughout the development lifecycle but fail to account for the testing of security-related use cases. This leads to security controls being tacked on to an application just before it goes to production. With security controls implemented in this manner, more security vulnerabilities will be found with less time to correct them. As more applications move to cloud-based architectures, this will become an even greater problem as some of the protection enjoyed by applications hosted on-premise no longer exists. Jeremy Faircloth discusses a better approach—ensuring that testing throughout the development lifecycle includes the appropriate focus on security controls. Jeremy illustrates this through the establishment of security-related use cases, static code analysis, dynamic analysis, fuzzing, availability testing, and other techniques. Save yourself from last minute security issues by proactively testing the security of your application!
Embracing Disruption: How One Multinational is Changing its ApproachCornerstone OnDemand
Digital disruption and flatter workplace organizations are changing employee expectations regarding corporate learning. Organizations must take advantage of the opportunities created by these changes and align existing organizational expertise to them in order to fulfill business objectives.
Similar to Caveon Webinar Series - Learning and Teaching Best Practices in Test Security - June 2015 (20)
Caveon Webinar Series - A Guide to Online Protection Strategies - March 28, ...Caveon Test Security
Join Executive Web Patrol Managers, Cary Straw and Jen Baldwin, as we explore the systems, methods and steps you need to successfully protect and extend the life of your high stakes certification, licensure, and state assessment exams from online threats.
Some of the questions we will answer include:
• Which processes should I implement to decrease the chance of my content appearing online?
• Where are the best places to use online security resources?
• Where do I look next if I found a threat, and where are the threats likely to spread?
• What are proactive steps I can take to protect my exams online?
• Who should be in my protection hierarchy?
• Am I "safe" after I've found a threat, and have had it removed?
Caveon Webinar Series - Five Things You Can Do Now to Protect Your Assessment...Caveon Test Security
Test season is approaching quickly! Maintaining the security and validity of assessment results is critical to support federal accountability and peer review requirements.
Kick off testing season with this year's first Caveon Webinar, "Five Things You Can Do Right Now to Protect Your Assessment Programs."
This webinar will focus on:
• Test security threats & risk analysis
• Creating test security policies and procedures
• Planning and implementing on-site monitoring
• Reviewing anomalous test results
• Managing incident reports
Join the webinar to learn more, and you'll be off to a strong start in protecting your tests, your results, and your reputation.
If you missed the first three sessions, you can still view them. And, if you can't attend on January 17, go ahead and register anyway and we will send you the recording and slides after the session.
The Do's and Dont's of Administering High Stakes Tests in Schools Final 121217Caveon Test Security
There is a great deal of advice available about giving high stakes tests securely in school settings. States run annual training sessions and provide test administration manuals. Major vendors serving schools provide training and guidelines of varying types. Sometimes the different sources disagree and the emphases vary by the nature of the helping agency. What is a test administrator to do?
This webinar focuses on administering tests in schools and identifies ten "best practices" that apply to all high stakes testing. The content is drawn from careful analyses of current testing practices by states, districts, and testing vendors.
To be an effective test administrator, you will need to read the background materials about each testing program and attend any training that is provided. If you also follow the guidelines presented in this webinar, you will be in a very good position to promote fairness and validity in each of the programs for which you share responsibility.
In this webinar, you will learn:
* Ten Best Practices that apply to all high stakes testing
* What is required to be an effective test administrator
* How to promote fairness and validity in your testing programs
Sponsored by the National Association of Assessment Directors and Caveon Consulting Services, Caveon Test Security
Caveon Webinar Series - The Art of Test Security - Know Thy Enemy - November ...Caveon Test Security
As Sun Tsu famously said... "If you know your enemy as you know yourself, you need not fear 100 battles." On the battlefield of security -- whether home security, airport security, or test security - the first step to success is knowing the threats.
Are you worried about tests being stolen and shared online? Or test takers cheating by being coached by an expert? If so, the steps to successfully protecting your test and triumphing over these fears include:
• conducting a risk assessment
• determining (and ranking) which threats pose the greatest risk
• strategizing how to render those threats impotent
• determining the right combination of prevention, detection and deterrence tactics for your program
This webinar will teach you to conquer the steps in this test security process. Join Caveon CEO David Foster to learn how to analyze and rank the threats that are specific to your program. You will also discover the three solutions necessary to counter any and all of these threats.
Caveon Webinar Series - Four Steps to Effective Investigations in School Dis...Caveon Test Security
Now that spring test administrations are almost over, K-12 districts and schools can breathe a sigh of relief. Weeks of vigilance have paid off with a smooth, incident-free test administration. Not your district? You’re not alone. No matter the extent of planning, training, and oversight, there are always unforeseen events that result in testing irregularities. Most will be straightforward and covered by standard policies and procedures. But some incidents may set off your internal alarms. By themselves, these reports are only single data points and need to be explored to determine the larger context and what really happened. This webinar will provide information on:
How to develop a plan for responding to test irregularity reports and;
How to carry out investigations if additional information is needed.
The session is free, and will only last 30 minutes. Space is limited, so register today! We look forward to seeing you on May 18th!
If you missed the first two sessions, you can still view them. And, if you can't attend on May 18, go ahead and register anyway and we will automatically send you the recording and slides after the session.
Caveon Webinar Series - On-site Monitoring in Districts 0317Caveon Test Security
Are you sure that school leaders and educators are following your state and local assessment policies and procedures during the administration of assessments?
On-site monitoring of assessment administrations at schools and in classrooms is an effective quality assurance measure that:
• ensures compliance with standardized policies and procedures
• helps identify the greatest areas of vulnerability in your assessment administration processes
• creates opportunities to improve training, and
• clarifies messaging about assessments for school leaders and educators.
Finally, LEA-sponsored monitoring demonstrates a strong commitment to the integrity of assessments and the important decisions made based upon assessment results.
By attending this webinar, you will gain exposure to:
1) the goals and purposes of monitoring,
2) best-practice monitoring activities during assessment administrations,
3) evaluating data from monitoring reports,
4) potential outcomes from monitoring and
5) first steps in implementing a monitoring program.
Caveon Test Security, the industry leader in providing security solutions for protecting high-stakes, K-12 assessments, is pleased to announce the first webinar in a series of 3, focused on test security challenges faced specifically by districts.
Session #1: Avoiding A School District Test Cheating Scandal:
A Tale of Two Cities
January 25, 2017, 12:00 p.m. ET
As a number of U.S. school districts have learned, mishandling of cheating incidents on tests, particularly state assessments, can have very negative and pervasive effects. This webinar reviews two examples of actual test cheating situations in school districts, contrasts how they were handled, and lays out practical and "battle-tested" strategies for avoiding and, if necessary, coping with test cheating events. Having a strong security plan and acting wisely and decisively when you see signs of trouble can be a very productive approach. This webinar will give you tools to manage a test cheating incident if you have a suspected or confirmed report of cheating.
Caveon Webinar Series - Discrete Option Multiple Choice: A Revolution in Te...Caveon Test Security
High-stakes testing faces major changes due to the use of computers and other technology in test administration. Some such changes include new test designs (such as computerized adaptive testing), proctoring tests online, and even administering tests on tablets and smartphones to improve test taker convenience. One of the most important changes is innovative new item types that better measure important skills. The Discrete Option Multiple Choice item type, or DOMC, is one of these ground-breaking new item types.
The DOMC item has the potential to revolutionize testing. It brings significant benefits in security, quality of measurement, fairness, test development, and test administration.
Caveon Webinar Series - The Test Security Framework- Why Different Tests Nee...Caveon Test Security
The need for global workforce skills credentials continues to grow. At the same time, the global workforce is shrinking. It is imperative that skill recognition be accurate and the level of test security be appropriate for the skills being assessed. The Security subcommittee of the new Workforce Skills Credentialing division of ATP created a new test security framework that will provide guidance to testing organizations when selecting the level of security needed for their assessments.
Join our guest presenters, Rachel Schoenig and Jennifer Geraets of ACT, as they discuss the challenge of identifying global workforce skills and how this new test security framework will help to align the expectations of those involved with workforce credentialing (e.g., test publishers, examinees, and employers). Rachel and Jennifer will also provide a call to action, requesting your comments on this new framework.
Caveon Webinar Series - Mastering the US DOE Test Security Requirements Janua...Caveon Test Security
The U.S. Department of Education recently issued the Peer Review of State Assessment Systems, which includes a required "Critical Element" on Test Security. To fulfill this requirement, States must submit documentation of policies and procedures in four categories of test security: prevention, detection, remediation, and investigation.
It is up to each State to determine which steps to implement and what evidence to submit to prove they have met each of these requirements. Evidence could, and should, include a myriad of test security measures ranging from Security Handbooks and annual proctor training, to data forensics and web monitoring procedures (and everything in between).
Caveon can help guide you through this complicated process. In the upcoming session, our test security experts will unpack the requirements of this section of the Peer Review process. The goal is to help you form a road map moving forward, provide information on the best practices for protecting your assessments, and outline resources to streamline the process.
Caveon Webinar Series - Will the Real Cloned Item Please Stand Up? finalCaveon Test Security
Join us for this month's webinar on the ins and outs of developing item clones. While many of us are aware of the benefits cloning can provide, such as expanding an item bank, lengthening the shelf life of an exam, or deterring and detecting cheating, questions remain regarding the best practices for implementation. Secure exam development experts will address the question, "How do we know, during development, when an item has been sufficiently altered, making it a "real clone" and not just an "imitator" of a clone?" The answer isn't as clear cut as it would seem.
Additional topics will include:
• General information on cloning
• Lessons learned from the field
• Creative ideas for streamlining cloning processes
This webinar will help assessment and program managers be better positioned to put on their cloning lab coats and reap the rewards of this best practice in test security.
Caveon Webinar Series - Weathering the Perfect Test Security Storm May 2015Caveon Test Security
In recent years, test security issues have received greater attention, almost to the point of distraction, by school system administrators. Motivations to cheat on state assessments appear to be higher than ever. The number of test security violations, the severity of breaches, and risks to state assessments have been increasing. Members of the PARCC and SBAC consortia are using the same tests, increasing the likelihood that actual content of state assessments will be illicitly distributed on the internet. Unless action is taken soon, we may experience the perfect test security storm in state assessments. This storm is likely to result in more educators being forced to contend with security issues, more revelations of test security breaches, and more emergency funding requests to deal with the aftermath. Presenters of this webinar will explain why this has happened and what state departments of education and school districts can do to handle and mitigate test security breaches.
Important, timely topics to be covered in the presentation are:
* Best practices that can be used to prevent, detect, and respond to breaches.
* Recommendations for formalizing processes and adopting a quality improvement approach to test security.
* Suggestions for how to measure, monitor, and manage test security risks.
Caveon Webinar Series - Integrating Data Forensics into the Entire Test Secur...Caveon Test Security
Data Forensics has been primarily viewed as a means for detecting potential test security threats. This webinar offers an expanded view of data forensics. In addition to detecting test security violations, the analysis of data is critical for protecting against test security threats, responding to test security breaches, and improving test security—thereby, reducing test security risks. The presenters illustrate how data forensics may be applied in all areas of test security using three examples of test security threats that are common to all testing programs. Participants will learn how to think about data analytics in a broader context so that statistics can be used effectively to measure and manage test security threats and risks.
Caveon Webinar Series: Weathering the Perfect Test Security Storm - February ...Caveon Test Security
In recent years, test security issues have received greater attention, almost to the point of distraction, by school system administrators. Motivations to cheat on state assessments appear to be higher than ever. The number of test security violations, the severity of breaches, and risks to state assessments have been increasing. Members of the PARCC and SBAC consortia are using the same tests, increasing the likelihood that actual content of state assessments will be illicitly distributed on the Internet. Unless action is taken soon, we may experience the perfect test security storm in state assessments. This storm is likely to result in more educators being forced to contend with security issues, more revelations of test security breaches, and more emergency funding requests to deal with the aftermath. Presenters of this webinar will explain why this has happened and what state departments of education and school districts can do to handle and mitigate test security breaches.
Dennis Maynes and Jennifer Miller from the Caveon Data Forensics team will present this informative session. They will be joined by special guest Michelle Croft, Principal Research Associate at ACT, Inc. Prior to joining ACT, Michelle worked in the assessment division at the District of Columbia Office of State Superintendent of Education.
Important, timely topics to be covered in the presentation are:
• Best practices that can be used to prevent, detect, and respond to breaches.
• Recommendations for formalizing processes and adopting a quality improvement approach to test security.
• Suggestions for how to measure, monitor, and manage test security risks.
Caveon Webinar Series - Exam Integrity Investigations, An Introduction to th...Caveon Test Security
In today’s high-speed, electronically connected society, exam integrity incidents occur more frequently and present greater risks to test sponsors and their examinations. When incidents occur that threaten the integrity of your exam, you must have a comprehensive investigation plan in place that your team members understand and are prepared to execute swiftly and thoroughly.
Thorough investigations of exam integrity violations are needed in response to a wide range of possible exam integrity incidents; from individual cheating, to collusion, to item harvesting. It’s important to have personnel trained and ready to respond with effective strategies to (1) detect and mitigate exam integrity vulnerabilities and (2) conduct internal exam integrity investigations when incidents occur.
Join our hosts, Marc Weinstein and Ben Mannes of Caveon Investigation Services as they discuss why a sound investigation plan is necessary, what to consider when an investigation is conducted, and why having the right resources is so important.
Caveon Webinar Series - Unlocking the Mystery of the Validity Triangle 11-2014Caveon Test Security
Is Test Security Required for Test Score Validity?
We're pleased to announce that Dr. Philip Dickison, the Director of Examinations at the National Council of State Boards of Nursing (NCSBN), will join us as a special guest for this month's session of the Caveon Webinar Series.
Eleven years ago (when Caveon was founded), many measurement professionals viewed test security as an intriguing anachronism. At that time, we were determined to "catch" cheaters by analyzing test data with statistics. Since then, many measurement professionals have agreed that test security is foundational to test score validity. You cannot trust the test scores when the security of the exam is suspect. At Caveon, we have learned that using statistics to catch cheaters was fraught with scientific, operational, and perhaps most daunting, legal challenges.
Many measurement professionals now use statistics to assess the validity of test scores. They focus on test takers' scores, rather than cheating behaviors. This evolution was crystalized recently when Dr. Dickison presented his "Validity Triangle" model in a Plenary Session during last month's Conference on Test Security.
Please join Dr. Dickison and Caveon Chief Scientist Dennis Maynes for an important exploration on the use of statistics in supporting test score validity. This session will:
• Provide a timeline of important milestones in the use of Data Forensics in supporting Test Security
• Share invaluable "lessons learned" (often, the hard way) in implementing a Data Forensics program
• Discuss the opportunities and challenges Data Forensics can present to program directors
• Present an important evolution in gauging test score validity
Palestine last event orientationfvgnh .pptxRaedMohamed3
An EFL lesson about the current events in Palestine. It is intended to be for intermediate students who wish to increase their listening skills through a short lesson in power point.
The Art Pastor's Guide to Sabbath | Steve ThomasonSteve Thomason
What is the purpose of the Sabbath Law in the Torah. It is interesting to compare how the context of the law shifts from Exodus to Deuteronomy. Who gets to rest, and why?
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdfTechSoup
In this webinar you will learn how your organization can access TechSoup's wide variety of product discount and donation programs. From hardware to software, we'll give you a tour of the tools available to help your nonprofit with productivity, collaboration, financial management, donor tracking, security, and more.
The Indian economy is classified into different sectors to simplify the analysis and understanding of economic activities. For Class 10, it's essential to grasp the sectors of the Indian economy, understand their characteristics, and recognize their importance. This guide will provide detailed notes on the Sectors of the Indian Economy Class 10, using specific long-tail keywords to enhance comprehension.
For more information, visit-www.vavaclasses.com
Unit 8 - Information and Communication Technology (Paper I).pdfThiyagu K
This slides describes the basic concepts of ICT, basics of Email, Emerging Technology and Digital Initiatives in Education. This presentations aligns with the UGC Paper I syllabus.
Model Attribute Check Company Auto PropertyCeline George
In Odoo, the multi-company feature allows you to manage multiple companies within a single Odoo database instance. Each company can have its own configurations while still sharing common resources such as products, customers, and suppliers.
How to Make a Field invisible in Odoo 17Celine George
It is possible to hide or invisible some fields in odoo. Commonly using “invisible” attribute in the field definition to invisible the fields. This slide will show how to make a field invisible in odoo 17.
The French Revolution, which began in 1789, was a period of radical social and political upheaval in France. It marked the decline of absolute monarchies, the rise of secular and democratic republics, and the eventual rise of Napoleon Bonaparte. This revolutionary period is crucial in understanding the transition from feudalism to modernity in Europe.
For more information, visit-www.vavaclasses.com
Instructions for Submissions thorugh G- Classroom.pptxJheel Barad
This presentation provides a briefing on how to upload submissions and documents in Google Classroom. It was prepared as part of an orientation for new Sainik School in-service teacher trainees. As a training officer, my goal is to ensure that you are comfortable and proficient with this essential tool for managing assignments and fostering student engagement.
We all have good and bad thoughts from time to time and situation to situation. We are bombarded daily with spiraling thoughts(both negative and positive) creating all-consuming feel , making us difficult to manage with associated suffering. Good thoughts are like our Mob Signal (Positive thought) amidst noise(negative thought) in the atmosphere. Negative thoughts like noise outweigh positive thoughts. These thoughts often create unwanted confusion, trouble, stress and frustration in our mind as well as chaos in our physical world. Negative thoughts are also known as “distorted thinking”.
Operation “Blue Star” is the only event in the history of Independent India where the state went into war with its own people. Even after about 40 years it is not clear if it was culmination of states anger over people of the region, a political game of power or start of dictatorial chapter in the democratic setup.
The people of Punjab felt alienated from main stream due to denial of their just demands during a long democratic struggle since independence. As it happen all over the word, it led to militant struggle with great loss of lives of military, police and civilian personnel. Killing of Indira Gandhi and massacre of innocent Sikhs in Delhi and other India cities was also associated with this movement.
The Roman Empire A Historical Colossus.pdfkaushalkr1407
The Roman Empire, a vast and enduring power, stands as one of history's most remarkable civilizations, leaving an indelible imprint on the world. It emerged from the Roman Republic, transitioning into an imperial powerhouse under the leadership of Augustus Caesar in 27 BCE. This transformation marked the beginning of an era defined by unprecedented territorial expansion, architectural marvels, and profound cultural influence.
The empire's roots lie in the city of Rome, founded, according to legend, by Romulus in 753 BCE. Over centuries, Rome evolved from a small settlement to a formidable republic, characterized by a complex political system with elected officials and checks on power. However, internal strife, class conflicts, and military ambitions paved the way for the end of the Republic. Julius Caesar’s dictatorship and subsequent assassination in 44 BCE created a power vacuum, leading to a civil war. Octavian, later Augustus, emerged victorious, heralding the Roman Empire’s birth.
Under Augustus, the empire experienced the Pax Romana, a 200-year period of relative peace and stability. Augustus reformed the military, established efficient administrative systems, and initiated grand construction projects. The empire's borders expanded, encompassing territories from Britain to Egypt and from Spain to the Euphrates. Roman legions, renowned for their discipline and engineering prowess, secured and maintained these vast territories, building roads, fortifications, and cities that facilitated control and integration.
The Roman Empire’s society was hierarchical, with a rigid class system. At the top were the patricians, wealthy elites who held significant political power. Below them were the plebeians, free citizens with limited political influence, and the vast numbers of slaves who formed the backbone of the economy. The family unit was central, governed by the paterfamilias, the male head who held absolute authority.
Culturally, the Romans were eclectic, absorbing and adapting elements from the civilizations they encountered, particularly the Greeks. Roman art, literature, and philosophy reflected this synthesis, creating a rich cultural tapestry. Latin, the Roman language, became the lingua franca of the Western world, influencing numerous modern languages.
Roman architecture and engineering achievements were monumental. They perfected the arch, vault, and dome, constructing enduring structures like the Colosseum, Pantheon, and aqueducts. These engineering marvels not only showcased Roman ingenuity but also served practical purposes, from public entertainment to water supply.
Basic phrases for greeting and assisting costumers
Caveon Webinar Series - Learning and Teaching Best Practices in Test Security - June 2015
1. Caveon Webinar Series
www.caveon.com 1
June 17, 2015
Aimée Rhodes, CFA Institute
Joe Kamell, American Board of Radiology
Dennis Maynes, Caveon Test Security
Learning About and Teaching Best
Practices in Test Security;
A Panel Discussion
2. Why this topic?
www.caveon.com 2
Training and education
are essential for
improving test security
Respond
Protect
DetectImprove
5. Aimée Rhodes
Director of Exam Security at CFA Institute, Aimée is tasked
with maintaining the public confidence in CFA-sponsored
designations by ensuring that:
1. exam content is secure;
2. no candidate has an unfair
advantage over another;
3. only those individuals truly
qualified to pass the exam do
so; and
4. the risks inherent in our exam
programs are identified and
addressed appropriately.
www.caveon.com 5
6. Aimée’s Story
• A lawyer by education, Aimée served on active
duty in the US Army JAG Corps before entering
private practice.
• Aimée moved to ACT as Director, Test Security in
2005.
– She oversaw the security of all of ACT’s resident and
contract programs
• Joined CFA Institute in 2008 and has built their
exam security program from scratch, including:
– A data forensic program
– Web patrol program
– Unusual candidate behavior tracking
– Site visit program
www.caveon.com 6
7. Joe Kamell
1. exam content is secure,
2. Exams are delivered in a
consistent and fair exam
environment,
3. all security related events are
investigated, and,
4. risks to the security of all ABR
exams are identified and
addressed
www.caveon.com 7
As a manager of exam delivery and security at the American
Board of Radiology, Joe is tasked with maintaining the
integrity of ABR Certification by ensuring that:
8. Joe’s Story
• BS – Health Education / MBA in Technology Mgmt.
• Several years in retail loss prevention
• Training in interviewing and interrogation
techniques (Wicklander-Zulawski)
• As a result of a public event in 2011, ABR added
the responsibilities of exam security to my duties,
where the program was built from the ground up,
including:
– Web patrolling
– Data forensics
– Site visit program
– Investigative process
www.caveon.com 8
9. Dennis Maynes
Chief Scientist
Dennis oversees the statistical analysis
of exams for detecting potential test
fraud and strengthening the security of
client exams.
Other responsibilities:
1. Present and discuss test security
topics at conferences, workshops,
and webinars
2. Provide expert testimony support as
necessary
3. Conduct research for furthering the
state of the art of data forensics
www.caveon.com 9
10. Dennis’ Story
• With several others, founded Caveon in
2003
• Developed data forensics methodologies
• Presented in dozens of conferences
• Testified as an expert witness
• Favorite tag lines:
– The answer’s in the data!
– You can’t manage what you don’t measure!
www.caveon.com 10
12. Reference Works
• https://cespcert.org/resources
• Handbook of Test Security
– CCSSO TILSA Guidebook
– Operational Best Practices for Statewide Large-
Scale Assessment Programs
– Standards for Educational and Psychological
Testing
– The ITC Guidelines on Test Security
www.caveon.com 12
13. Topic-specific Monographs
• ATP Test Security Committee
– ATP Guidelines for Legal Protection of
Assessment Content,
– ATP Online Piracy Enforcement Strategies:
Guidelines and Best Practices,
– ATP Security Survey Report 2013,
– Assessment Security Options: Considerations
by Delivery Channel and Assessment Model
www.caveon.com 13
14. Journals and Publications
• Journal of Educational and Behavioral
Statistics
• Applied Measurement in Education
www.caveon.com 14
21. Q1: How do you stay current with test
security developments and ideas?
• Conferences are a good source of
information
• Benchmarking with colleagues in the
industry
– Vendors
– Testing partners
– Other Directors, Exam Security
• Test security is ALWAYS in the news!
www.caveon.com 21
Aimée Rhodes
22. • Warning – blatant plug!
– Caveon newsletters provide perspective and
news on current issues
– Caveon often discusses current issues in
webinars
• Get engaged on Social Media
– Current trends are often discussed on LinkedIn
– Some folks regularly “tweet” on test security
news
www.caveon.com 22
Q1: How do you stay current with test
security developments and ideas?
Dennis Maynes
24. • Vocabulary and language are very important
• You need to know the differences between
– Vulnerabilities, Threats, Risks
– Anomalies, Irregularities, Violations, Breaches
• You need to be able to talk about “loss”
• Watch how you talk about potential test fraud
– Are you worried about “cheating” or “validity?”
• Learn how to precisely discuss issues without
stereotyping or implying malfeasance
www.caveon.com 24
Q2: Is there a special vocabulary for test
security? If so, how do I learn it?
Dennis Maynes
25. Q3
www.caveon.com 25
• What advice would you give for someone who is
new to this area and needs to create a test
security program from scratch?
26. www.caveon.com 26
• NETWORK!
• Reach out to other exam security professionals
and spend some time learning from them.
• Ask for examples of various documentation
(policies, letters, etc.).
• Conduct audits to understand where you are and
attack the major issues first.
• Attend training sessions, webinars and
conferences as much as you can.
Q3: What advice would you give for someone who is new to
this area and needs to create a test security program from
scratch?
Joe Kamell
27. • Build relationships with folks who have been there
before!
• Conduct a security audit or peer review to identify
and prioritize your needs
• Identify resources from within your organization
that you can rely on for help:
– Exam Development - Exam Administration
– Legal - Risk Management
– Internal Audit - Professional Conduct
www.caveon.com 27
Q3: What advice would you give for someone who is new to
this area and needs to create a test security program from
scratch?
Aimée Rhodes
28. Q4
www.caveon.com 28
• What things can you do to network with others
who are learning and teaching about test security?
29. www.caveon.com 29
• The most important thing is to pick up the
phone and don’t be shy asking questions.
• Partner with companies such as Caveon
and see what services are available that
would be useful to you. Realize that you
may not need the full menu of options they
provide.
Q4: What things can you do to network with
others who are learning and teaching about test
security?
Joe Kamell
30. • Find the right contacts among your vendors
• Attend conferences
• Seek out others who are in your position
• Establish peer groups
– Non-disclosure agreements
– Regular meetings
– Share information and experiences
www.caveon.com 30
Q4: What things can you do to network with
others who are learning and teaching about test
security?
Aimée Rhodes
31. Q5
www.caveon.com 31
• How can I get involved in promoting test security
education and providing training materials and
experiences for others in test security?
32. www.caveon.com 32
• Be willing to speak up and share your
experiences. Every testing program is
unique.
• Regardless of expertise, there is always
an opportunity to learn from others how
they have handled different security-
related events.
Q5: How can I get involved in promoting test security education
and providing training materials and experiences for others in test
security?
Joe Kamell
34. www.caveon.com 34
• Educating myself and others what constitutes a
complete or comprehensive test security
program
• The field is still developing and resources are
not unified
• I read a lot. I read from other disciplines and I
listen to what others are saying.
• I think about how writings like “The Art of War”
apply to our discipline.
Q6: What has been your biggest challenge
and how have you handled it?
Dennis Maynes
35. Summary
• Education is critical – an uneducated
individual is one who can’t make choices
• We need to learn from others if we do not
wish to repeat the mistakes that others
have made.
www.caveon.com 35
36. Thank You!
www.caveon.com 36
Aimée Rhodes
Director, Exam Security
aimee.rhodes@cfainstitute.org
Dennis Maynes
Chief Scientist
dennis.maynes@caveon.com
Follow Caveon on twitter @caveon
Check out our blog
www.caveon.com/blog
LinkedIn Group “Caveon Test Security”
Joe Kamell
Exam Delivery and
Security Manager
jkamell@theabr.org
Editor's Notes
Test security is a process, not a state. I have at home a security system. Simply installing the system did not make my home secure. Instead, I need to arm and disarm the system, daily. I need to maintain the system. I need to stay current with my monitoring service. And, even after doing those things, I cannot affirm that my home is secure. The idea of “being secure” is somewhat fleeting and unattainable. It is not possible to know that test security was not or will not be breached. Instead, we seek to maintain the integrity of the testing program by performing the activities which we know will improve test security. These activities are succinctly described using the four-step model: Protect-Detect-Response-Improve. You will probably hear this from me again, “If you don’t measure test security risks and threats, you won’t be able to manage them. Conversely, when you do measure test security risks, you will be in a position to proactively and reactively manage them.”