Presented by Dr. John Fremer, Dennis Maynes and Steve Addicott, Caveon Test Security
Two important industry conferences have been held in the last couple of months, the European Association of Test Publishers (E-ATP) Conference and the Conference on Statistical Detection of Potential Test Fraud (CSDPTF). Caveon was at both of these events and wants to share some important information with you.
Join Dr. John Fremer, President of Caveon Consulting Services, Steve Addicott, Vice President, Sales and Marketing, and Dennis Maynes, Chief Scientist, Caveon Data Forensics, who attended both conferences and presented sessions. They will explore key takeaways and lessons learned on security. Stay updated on the latest and greatest industry security trends.
Testing industry veterans John Fremer and Steve Addicott of Caveon are joined by Lou Woodruff, past president of the National College Testing Association to share their "lessons learned" from several of this summer's biggest testing conferences. For more information, please go to www.caveon.com
Caveon Webinar Series Lessons Learned at NCSA and ITC July 2014Caveon Test Security
Two important industry events were held in the last 30 days, the National Conference on Student Assessment (NCSA), and the 9th Annual International Test Commission (ITC) Conference. Caveon was there for both, and we learned crucial information that you don't want to miss.
Caveon Leaders Dave Foster and Steve Addicott will summarize the test security trends and strategies that they drew from both the NCSA and ITC conferences, and also share key points from sessions they presented.
We also welcome special guest, John Olson, President and Founder of Olson Educational Measurement & Assessment Services, who will share what's hot on the plates of those in the state assessment arena, and what he learned at NCSA that can help with these issues.
Although Drupal 8 is still in its beta phase, there are numerous live multilingual sites built on it. Gábor Hojtsy presented all the features that the Drupal community worked on for the new release in an earlier webinar.
However, there are a lot more exciting things in Drupal 8 other than the multilingual changes, and some are opening up whole new ways of doing things effectively even for sites with multiple languages. In this webinar, join Gábor Hojtsy of Acquia again to look into neat hacks to benefit multilingual site needs in part based on experiences from the above mentioned live sites. You'll learn more about:
- Important site modeling tricks on the new version
- Combining various Drupal 8 features into hacks to benefit multilingual site needs
- Simple contributed modules (depending on availability)
Testing industry veterans John Fremer and Steve Addicott of Caveon are joined by Lou Woodruff, past president of the National College Testing Association to share their "lessons learned" from several of this summer's biggest testing conferences. For more information, please go to www.caveon.com
Caveon Webinar Series Lessons Learned at NCSA and ITC July 2014Caveon Test Security
Two important industry events were held in the last 30 days, the National Conference on Student Assessment (NCSA), and the 9th Annual International Test Commission (ITC) Conference. Caveon was there for both, and we learned crucial information that you don't want to miss.
Caveon Leaders Dave Foster and Steve Addicott will summarize the test security trends and strategies that they drew from both the NCSA and ITC conferences, and also share key points from sessions they presented.
We also welcome special guest, John Olson, President and Founder of Olson Educational Measurement & Assessment Services, who will share what's hot on the plates of those in the state assessment arena, and what he learned at NCSA that can help with these issues.
Although Drupal 8 is still in its beta phase, there are numerous live multilingual sites built on it. Gábor Hojtsy presented all the features that the Drupal community worked on for the new release in an earlier webinar.
However, there are a lot more exciting things in Drupal 8 other than the multilingual changes, and some are opening up whole new ways of doing things effectively even for sites with multiple languages. In this webinar, join Gábor Hojtsy of Acquia again to look into neat hacks to benefit multilingual site needs in part based on experiences from the above mentioned live sites. You'll learn more about:
- Important site modeling tricks on the new version
- Combining various Drupal 8 features into hacks to benefit multilingual site needs
- Simple contributed modules (depending on availability)
Findings from Work Package 3 of the CRISP project. Analysis of stakeholder needs from and views on proposed CRISP certification scheme for security products, systems and services.
Laboratory, medical and device performance and validation followingGlobalCompliancePanel
This course is designed to introduce to individuals the understanding and interpretation of the statistical concepts one uses when investigating quantitative ICH Guidelines such as analytical methods validation, procedures and acceptance criteria in calibration limits, and process and quality control.
Laboratory, medical and device performance and validation following regulator...GlobalCompliancePanel
Too often, we focus on getting things done and results and miss working on our self-development. Let's face it: this is how we get paid yet this is also how we keep falling behind when it comes to our careers. It's time to get ahead! Don't miss an opportunity to advance as a manager again!
The Innovation Commercialization Process:A Case StudyCheryl Tulkoff
When people think of innovation, they frequently think of the “big idea” or product while overlooking the fact that innovation is really a process.
They think of innovation solely in the creative sense rather than considering the importance or even existence of an innovation methodology.
Countless examples exist of good inventions that never succeeded in the marketplace or failed to live up to expectations while lesser ones thrived.
Many of these failures could have been eliminated through use of an innovation commercialization process.
This presentation describes the process and demonstrates its application through a case study.
Journal Club - Best Practices for Scientific ComputingBram Zandbelt
Journal Club presentation for Cools lab at Donders Institute, Radboud University, Nijmegen, the Netherlands
Date: October 28, 2015
Paper:
Wilson, G., Aruliah, D. A., Brown, C. T., Hong, N. P. C., Davis, M., Guy, R. T., ... & Wilson, P. (2014). Best practices for scientific computing. PLoS Biology, 12(1), e1001745.
CRISP project works towards building a certification scheme for video surveillance systems, based on the evaluation of their social impact. The slides present findings from the stakeholder analysis phase of the project.
The webinar will include an introduction to COVID-END and an overview of how COVID-END’s resources can support you in your response to COVID-19. With tips, tools, and a guide to evidence sources for both researchers and decision-makers, COVID-END has something for everyone.
PrEP Implementation Planning for the USCHAMP Network
CHAMP Monthly Teleconference Training - PrEP's the Word: Everyone's Talking About It... But What Do We Need To Know, And Do, About Pre-Exposure Prophylaxis
Presentations from the March meeting of the Implementation Network of Ireland and Northern Ireland in the Department of Justice. Keynote presentation from Dr Peter Neyroud of the University of Cambridge.
Risk management plan
Executive Summary
The past few decades have seen technological evolutions on a rapid scale with the growth of the industry taking over the world by storm. Governments and companies alike are investing in further research and development of futuristic technologies in order to work towards a more efficient future in terms of productivity and task automation. The evolution of computers and powerful technologies being made available to the public with them having high processing power and some being small, powerful and portable has led to people having information in their hands, literally.
However, with the advantages of the recently introduced technologies, there still are threats brought about by the same since they have raised privacy and other security concerns as well as health concerns associated with a number of the devices. This paper is aimed at identification of strategies to handle risks which may arise from the continuous development of new technologies (Galati, 2015). Comment by Schneider, Paul: This is the only sentence in this summary which focuses on the paper, and it does a very poor job of previewing everything that the reader will see in this paper.
Project Summary
Scope Comment by Schneider, Paul: This section tells me nothing about the scope for your project. What are the task/activities needed to successfully complete your project?
This report is important in analysis of the importance of information technologies being managed and security implemented since with their introduction, most companies have taken them up therefore the need to prevent attacks via technologies implemented. Critical processes in business are reliant to information technologies therefore need for safeguarding them against hacking attacks among other similar threats relating to information technologies.
Milestones Comment by Schneider, Paul: This section tells me nothing about the milestones for your project. When does the project start? When does the project end? What are all of the milestones between the start & end?
All businesses especially in a technologically growing and depend world need to learn the vulnerabilities posed by the developments as well as methods which can be used to control or curb them. Most companies have successfully put in place firewalls and administrators of networks to monitor, analyze and notify of irregularities which may cause a breach to sensitive company information.
Cost Constraints Comment by Schneider, Paul: Very poor job.
In implementation of security within information technologies, there are costs involved, some being one off and others being recurrent however all serving the same purpose. Costs inclusive in implementation of security protocols are such as purchase as hardware and software offering security such as firewalls, antiviruses, antimalware programs and programs for detection of network intrusions. Costs can also arise from contracting an external organization to ...
Data Analytics for Internal Auditors - Understanding SamplingJim Kaplan CIA CFE
Since the spread of IT systems has made it a pre-requisite that auditors as well as management have the ability to examine high volumes of data and transaction in order to determine patterns and trends. In addition, the increasing need to continuously monitor and audit IT systems has created an imperative for the effective use of appropriate data mining tools.
While a variety of powerful tools are readily available today, the skills required to utilize such tools are not. Not only must the correct testing techniques be selected but the effective interpretation of outcomes presented by the software is essential in the drawing of appropriate conclusions based on the data analysis. This 6 webinar series, based on Richard Cascarino’s book “Data Analytics for Internal Auditors” covers these skills and techniques.
Webinar 1 Understanding Sampling
Judgmental vs Statistical Sampling
Probability theory in Data Analysis
Types of Evidence
Population Analysis
Correlations and Regressions
Laboratory, Medical and Device Performance and Validation following Regulator...GlobalCompliancePanel
This course is designed to introduce to individuals the understanding and interpretation of the statistical concepts one uses when investigating quantitative ICH Guidelines such as analytical methods validation, procedures and acceptance criteria in calibration limits, and process and quality control.
Findings from Work Package 3 of the CRISP project. Analysis of stakeholder needs from and views on proposed CRISP certification scheme for security products, systems and services.
Laboratory, medical and device performance and validation followingGlobalCompliancePanel
This course is designed to introduce to individuals the understanding and interpretation of the statistical concepts one uses when investigating quantitative ICH Guidelines such as analytical methods validation, procedures and acceptance criteria in calibration limits, and process and quality control.
Laboratory, medical and device performance and validation following regulator...GlobalCompliancePanel
Too often, we focus on getting things done and results and miss working on our self-development. Let's face it: this is how we get paid yet this is also how we keep falling behind when it comes to our careers. It's time to get ahead! Don't miss an opportunity to advance as a manager again!
The Innovation Commercialization Process:A Case StudyCheryl Tulkoff
When people think of innovation, they frequently think of the “big idea” or product while overlooking the fact that innovation is really a process.
They think of innovation solely in the creative sense rather than considering the importance or even existence of an innovation methodology.
Countless examples exist of good inventions that never succeeded in the marketplace or failed to live up to expectations while lesser ones thrived.
Many of these failures could have been eliminated through use of an innovation commercialization process.
This presentation describes the process and demonstrates its application through a case study.
Journal Club - Best Practices for Scientific ComputingBram Zandbelt
Journal Club presentation for Cools lab at Donders Institute, Radboud University, Nijmegen, the Netherlands
Date: October 28, 2015
Paper:
Wilson, G., Aruliah, D. A., Brown, C. T., Hong, N. P. C., Davis, M., Guy, R. T., ... & Wilson, P. (2014). Best practices for scientific computing. PLoS Biology, 12(1), e1001745.
CRISP project works towards building a certification scheme for video surveillance systems, based on the evaluation of their social impact. The slides present findings from the stakeholder analysis phase of the project.
The webinar will include an introduction to COVID-END and an overview of how COVID-END’s resources can support you in your response to COVID-19. With tips, tools, and a guide to evidence sources for both researchers and decision-makers, COVID-END has something for everyone.
PrEP Implementation Planning for the USCHAMP Network
CHAMP Monthly Teleconference Training - PrEP's the Word: Everyone's Talking About It... But What Do We Need To Know, And Do, About Pre-Exposure Prophylaxis
Presentations from the March meeting of the Implementation Network of Ireland and Northern Ireland in the Department of Justice. Keynote presentation from Dr Peter Neyroud of the University of Cambridge.
Risk management plan
Executive Summary
The past few decades have seen technological evolutions on a rapid scale with the growth of the industry taking over the world by storm. Governments and companies alike are investing in further research and development of futuristic technologies in order to work towards a more efficient future in terms of productivity and task automation. The evolution of computers and powerful technologies being made available to the public with them having high processing power and some being small, powerful and portable has led to people having information in their hands, literally.
However, with the advantages of the recently introduced technologies, there still are threats brought about by the same since they have raised privacy and other security concerns as well as health concerns associated with a number of the devices. This paper is aimed at identification of strategies to handle risks which may arise from the continuous development of new technologies (Galati, 2015). Comment by Schneider, Paul: This is the only sentence in this summary which focuses on the paper, and it does a very poor job of previewing everything that the reader will see in this paper.
Project Summary
Scope Comment by Schneider, Paul: This section tells me nothing about the scope for your project. What are the task/activities needed to successfully complete your project?
This report is important in analysis of the importance of information technologies being managed and security implemented since with their introduction, most companies have taken them up therefore the need to prevent attacks via technologies implemented. Critical processes in business are reliant to information technologies therefore need for safeguarding them against hacking attacks among other similar threats relating to information technologies.
Milestones Comment by Schneider, Paul: This section tells me nothing about the milestones for your project. When does the project start? When does the project end? What are all of the milestones between the start & end?
All businesses especially in a technologically growing and depend world need to learn the vulnerabilities posed by the developments as well as methods which can be used to control or curb them. Most companies have successfully put in place firewalls and administrators of networks to monitor, analyze and notify of irregularities which may cause a breach to sensitive company information.
Cost Constraints Comment by Schneider, Paul: Very poor job.
In implementation of security within information technologies, there are costs involved, some being one off and others being recurrent however all serving the same purpose. Costs inclusive in implementation of security protocols are such as purchase as hardware and software offering security such as firewalls, antiviruses, antimalware programs and programs for detection of network intrusions. Costs can also arise from contracting an external organization to ...
Data Analytics for Internal Auditors - Understanding SamplingJim Kaplan CIA CFE
Since the spread of IT systems has made it a pre-requisite that auditors as well as management have the ability to examine high volumes of data and transaction in order to determine patterns and trends. In addition, the increasing need to continuously monitor and audit IT systems has created an imperative for the effective use of appropriate data mining tools.
While a variety of powerful tools are readily available today, the skills required to utilize such tools are not. Not only must the correct testing techniques be selected but the effective interpretation of outcomes presented by the software is essential in the drawing of appropriate conclusions based on the data analysis. This 6 webinar series, based on Richard Cascarino’s book “Data Analytics for Internal Auditors” covers these skills and techniques.
Webinar 1 Understanding Sampling
Judgmental vs Statistical Sampling
Probability theory in Data Analysis
Types of Evidence
Population Analysis
Correlations and Regressions
Laboratory, Medical and Device Performance and Validation following Regulator...GlobalCompliancePanel
This course is designed to introduce to individuals the understanding and interpretation of the statistical concepts one uses when investigating quantitative ICH Guidelines such as analytical methods validation, procedures and acceptance criteria in calibration limits, and process and quality control.
Caveon Webinar Series - A Guide to Online Protection Strategies - March 28, ...Caveon Test Security
Join Executive Web Patrol Managers, Cary Straw and Jen Baldwin, as we explore the systems, methods and steps you need to successfully protect and extend the life of your high stakes certification, licensure, and state assessment exams from online threats.
Some of the questions we will answer include:
• Which processes should I implement to decrease the chance of my content appearing online?
• Where are the best places to use online security resources?
• Where do I look next if I found a threat, and where are the threats likely to spread?
• What are proactive steps I can take to protect my exams online?
• Who should be in my protection hierarchy?
• Am I "safe" after I've found a threat, and have had it removed?
Caveon Webinar Series - Five Things You Can Do Now to Protect Your Assessment...Caveon Test Security
Test season is approaching quickly! Maintaining the security and validity of assessment results is critical to support federal accountability and peer review requirements.
Kick off testing season with this year's first Caveon Webinar, "Five Things You Can Do Right Now to Protect Your Assessment Programs."
This webinar will focus on:
• Test security threats & risk analysis
• Creating test security policies and procedures
• Planning and implementing on-site monitoring
• Reviewing anomalous test results
• Managing incident reports
Join the webinar to learn more, and you'll be off to a strong start in protecting your tests, your results, and your reputation.
If you missed the first three sessions, you can still view them. And, if you can't attend on January 17, go ahead and register anyway and we will send you the recording and slides after the session.
The Do's and Dont's of Administering High Stakes Tests in Schools Final 121217Caveon Test Security
There is a great deal of advice available about giving high stakes tests securely in school settings. States run annual training sessions and provide test administration manuals. Major vendors serving schools provide training and guidelines of varying types. Sometimes the different sources disagree and the emphases vary by the nature of the helping agency. What is a test administrator to do?
This webinar focuses on administering tests in schools and identifies ten "best practices" that apply to all high stakes testing. The content is drawn from careful analyses of current testing practices by states, districts, and testing vendors.
To be an effective test administrator, you will need to read the background materials about each testing program and attend any training that is provided. If you also follow the guidelines presented in this webinar, you will be in a very good position to promote fairness and validity in each of the programs for which you share responsibility.
In this webinar, you will learn:
* Ten Best Practices that apply to all high stakes testing
* What is required to be an effective test administrator
* How to promote fairness and validity in your testing programs
Sponsored by the National Association of Assessment Directors and Caveon Consulting Services, Caveon Test Security
Caveon Webinar Series - The Art of Test Security - Know Thy Enemy - November ...Caveon Test Security
As Sun Tsu famously said... "If you know your enemy as you know yourself, you need not fear 100 battles." On the battlefield of security -- whether home security, airport security, or test security - the first step to success is knowing the threats.
Are you worried about tests being stolen and shared online? Or test takers cheating by being coached by an expert? If so, the steps to successfully protecting your test and triumphing over these fears include:
• conducting a risk assessment
• determining (and ranking) which threats pose the greatest risk
• strategizing how to render those threats impotent
• determining the right combination of prevention, detection and deterrence tactics for your program
This webinar will teach you to conquer the steps in this test security process. Join Caveon CEO David Foster to learn how to analyze and rank the threats that are specific to your program. You will also discover the three solutions necessary to counter any and all of these threats.
Caveon Webinar Series - Four Steps to Effective Investigations in School Dis...Caveon Test Security
Now that spring test administrations are almost over, K-12 districts and schools can breathe a sigh of relief. Weeks of vigilance have paid off with a smooth, incident-free test administration. Not your district? You’re not alone. No matter the extent of planning, training, and oversight, there are always unforeseen events that result in testing irregularities. Most will be straightforward and covered by standard policies and procedures. But some incidents may set off your internal alarms. By themselves, these reports are only single data points and need to be explored to determine the larger context and what really happened. This webinar will provide information on:
How to develop a plan for responding to test irregularity reports and;
How to carry out investigations if additional information is needed.
The session is free, and will only last 30 minutes. Space is limited, so register today! We look forward to seeing you on May 18th!
If you missed the first two sessions, you can still view them. And, if you can't attend on May 18, go ahead and register anyway and we will automatically send you the recording and slides after the session.
Caveon Webinar Series - On-site Monitoring in Districts 0317Caveon Test Security
Are you sure that school leaders and educators are following your state and local assessment policies and procedures during the administration of assessments?
On-site monitoring of assessment administrations at schools and in classrooms is an effective quality assurance measure that:
• ensures compliance with standardized policies and procedures
• helps identify the greatest areas of vulnerability in your assessment administration processes
• creates opportunities to improve training, and
• clarifies messaging about assessments for school leaders and educators.
Finally, LEA-sponsored monitoring demonstrates a strong commitment to the integrity of assessments and the important decisions made based upon assessment results.
By attending this webinar, you will gain exposure to:
1) the goals and purposes of monitoring,
2) best-practice monitoring activities during assessment administrations,
3) evaluating data from monitoring reports,
4) potential outcomes from monitoring and
5) first steps in implementing a monitoring program.
Caveon Test Security, the industry leader in providing security solutions for protecting high-stakes, K-12 assessments, is pleased to announce the first webinar in a series of 3, focused on test security challenges faced specifically by districts.
Session #1: Avoiding A School District Test Cheating Scandal:
A Tale of Two Cities
January 25, 2017, 12:00 p.m. ET
As a number of U.S. school districts have learned, mishandling of cheating incidents on tests, particularly state assessments, can have very negative and pervasive effects. This webinar reviews two examples of actual test cheating situations in school districts, contrasts how they were handled, and lays out practical and "battle-tested" strategies for avoiding and, if necessary, coping with test cheating events. Having a strong security plan and acting wisely and decisively when you see signs of trouble can be a very productive approach. This webinar will give you tools to manage a test cheating incident if you have a suspected or confirmed report of cheating.
Caveon Webinar Series - Discrete Option Multiple Choice: A Revolution in Te...Caveon Test Security
High-stakes testing faces major changes due to the use of computers and other technology in test administration. Some such changes include new test designs (such as computerized adaptive testing), proctoring tests online, and even administering tests on tablets and smartphones to improve test taker convenience. One of the most important changes is innovative new item types that better measure important skills. The Discrete Option Multiple Choice item type, or DOMC, is one of these ground-breaking new item types.
The DOMC item has the potential to revolutionize testing. It brings significant benefits in security, quality of measurement, fairness, test development, and test administration.
Caveon Webinar Series - Test Cheaters Say the Darnedest Things! - 072016Caveon Test Security
You won't believe what's actually happened in the world of testing!
What goes on in the mind of a would-be test cheater? While cheating is a serious offense, some of test takers go to great (and sometimes comical) lengths to try gaining an unfair advantage to achieve a successful testing outcome.
Join us as we look at some of the most memorable proctor/test taker cheating encounters. Our special guest, Jarret Dyer, of the College of DuPage Testing Center, has created a compilation of test proctor stories from testing centers around the United States and across the globe. Jarret will share his 'best of' stories, while Caveon's John Fremer will discuss the consequences of not following the right test security processes and procedures. You don't want to miss this fun, yet informative session! To listen to the recording that goes along with these slides, go to https://youtu.be/r-CCaDf7NEk
Caveon Webinar Series - The Test Security Framework- Why Different Tests Nee...Caveon Test Security
The need for global workforce skills credentials continues to grow. At the same time, the global workforce is shrinking. It is imperative that skill recognition be accurate and the level of test security be appropriate for the skills being assessed. The Security subcommittee of the new Workforce Skills Credentialing division of ATP created a new test security framework that will provide guidance to testing organizations when selecting the level of security needed for their assessments.
Join our guest presenters, Rachel Schoenig and Jennifer Geraets of ACT, as they discuss the challenge of identifying global workforce skills and how this new test security framework will help to align the expectations of those involved with workforce credentialing (e.g., test publishers, examinees, and employers). Rachel and Jennifer will also provide a call to action, requesting your comments on this new framework.
Caveon Webinar Series - Conducting Test Security Investigations in School Di...Caveon Test Security
In the coming weeks, schools all over the country will be administering standardized exams to millions of students. And inevitably, test security incidents will arise, many of which may directly impact test score validity. Is your team prepared to answer the following tough questions?
• What will you do if you find yourself in a position of having to respond to an incident or breach in your state or district?
• What process will you follow?
• What is your incident escalation plan?
• How will you communicate with internal and external stakeholders?
• Most importantly, how will you discover the truth of what did or did not occur, and its impact on test scores?
Join Caveon’s test security experts for an important, hour-long webinar to help you understand the steps to take when challenging situations arise. We will share:
• Recent experiences other districts have had with possible cheating, and what they have done to resolve their concerns
• Information and tools for you to arm yourself before an issue arises, and to help you be better equipped to deal effectively and efficiently
• Essential tips you need to know when invoking a Security Incident Response Plan, and further conducting a security investigation
Caveon Webinar Series - Creating Your Test Security Game Plan - March 2016Caveon Test Security
History has shown that as stakes rise for testing programs, so do threats to the program's test result validity. There are stories in the media almost daily about high-stakes programs suffering at the hands of those intent on obtaining the content for disingenuous purposes. Having a game plan in place before a threat or validity issue occurs is vital. This month's webinar will focus on key steps your organization can take to maximize your protection from test fraud, and stay one step ahead of the game.
Caveon Webinar Series - Mastering the US DOE Test Security Requirements Janua...Caveon Test Security
The U.S. Department of Education recently issued the Peer Review of State Assessment Systems, which includes a required "Critical Element" on Test Security. To fulfill this requirement, States must submit documentation of policies and procedures in four categories of test security: prevention, detection, remediation, and investigation.
It is up to each State to determine which steps to implement and what evidence to submit to prove they have met each of these requirements. Evidence could, and should, include a myriad of test security measures ranging from Security Handbooks and annual proctor training, to data forensics and web monitoring procedures (and everything in between).
Caveon can help guide you through this complicated process. In the upcoming session, our test security experts will unpack the requirements of this section of the Peer Review process. The goal is to help you form a road map moving forward, provide information on the best practices for protecting your assessments, and outline resources to streamline the process.
Caveon Webinar Series - Will the Real Cloned Item Please Stand Up? finalCaveon Test Security
Join us for this month's webinar on the ins and outs of developing item clones. While many of us are aware of the benefits cloning can provide, such as expanding an item bank, lengthening the shelf life of an exam, or deterring and detecting cheating, questions remain regarding the best practices for implementation. Secure exam development experts will address the question, "How do we know, during development, when an item has been sufficiently altered, making it a "real clone" and not just an "imitator" of a clone?" The answer isn't as clear cut as it would seem.
Additional topics will include:
• General information on cloning
• Lessons learned from the field
• Creative ideas for streamlining cloning processes
This webinar will help assessment and program managers be better positioned to put on their cloning lab coats and reap the rewards of this best practice in test security.
Caveon Webinar Series - Lessons Learned at the 2015 National Conference on S...Caveon Test Security
The National Conference on Student Assessment (NCSA) was held last month in San Diego, and Caveon was there. This month's webinar will focus on lessons learned at the conference regarding test security, and what's happening in the state assessment arena in terms of test security right now.
Caveon's Steve Addicott and Jamie Mulkey will be joined by special guest Walt Drane, State Assessment Director, Mississippi Department of Education. The panelists will summarize the test security trends and strategies that they drew from the conference, and also share key points from sessions they presented.
Caveon Webinar Series - Learning and Teaching Best Practices in Test Security...Caveon Test Security
Test security has been emerging as a cohesive discipline for the past ten years. There are no college courses that teach test security. And, even if there were, many practitioners don't have time to take those classes. How do you stay abreast of current developments? How do you train your staff in latest best practices if you don't know about them? Are there resources out there, and how do you find them?
In this webinar, Caveon will host several special guest practitioners from various industries. These test security veterans have had to answer these very questions. They will address how continuing education will help you improve test security in your organization.
2024.06.01 Introducing a competency framework for languag learning materials ...Sandy Millin
http://sandymillin.wordpress.com/iateflwebinar2024
Published classroom materials form the basis of syllabuses, drive teacher professional development, and have a potentially huge influence on learners, teachers and education systems. All teachers also create their own materials, whether a few sentences on a blackboard, a highly-structured fully-realised online course, or anything in between. Despite this, the knowledge and skills needed to create effective language learning materials are rarely part of teacher training, and are mostly learnt by trial and error.
Knowledge and skills frameworks, generally called competency frameworks, for ELT teachers, trainers and managers have existed for a few years now. However, until I created one for my MA dissertation, there wasn’t one drawing together what we need to know and do to be able to effectively produce language learning materials.
This webinar will introduce you to my framework, highlighting the key competencies I identified from my research. It will also show how anybody involved in language teaching (any language, not just English!), teacher training, managing schools or developing language learning materials can benefit from using the framework.
How to Split Bills in the Odoo 17 POS ModuleCeline George
Bills have a main role in point of sale procedure. It will help to track sales, handling payments and giving receipts to customers. Bill splitting also has an important role in POS. For example, If some friends come together for dinner and if they want to divide the bill then it is possible by POS bill splitting. This slide will show how to split bills in odoo 17 POS.
The Indian economy is classified into different sectors to simplify the analysis and understanding of economic activities. For Class 10, it's essential to grasp the sectors of the Indian economy, understand their characteristics, and recognize their importance. This guide will provide detailed notes on the Sectors of the Indian Economy Class 10, using specific long-tail keywords to enhance comprehension.
For more information, visit-www.vavaclasses.com
The Art Pastor's Guide to Sabbath | Steve ThomasonSteve Thomason
What is the purpose of the Sabbath Law in the Torah. It is interesting to compare how the context of the law shifts from Exodus to Deuteronomy. Who gets to rest, and why?
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdfTechSoup
In this webinar you will learn how your organization can access TechSoup's wide variety of product discount and donation programs. From hardware to software, we'll give you a tour of the tools available to help your nonprofit with productivity, collaboration, financial management, donor tracking, security, and more.
Synthetic Fiber Construction in lab .pptxPavel ( NSTU)
Synthetic fiber production is a fascinating and complex field that blends chemistry, engineering, and environmental science. By understanding these aspects, students can gain a comprehensive view of synthetic fiber production, its impact on society and the environment, and the potential for future innovations. Synthetic fibers play a crucial role in modern society, impacting various aspects of daily life, industry, and the environment. ynthetic fibers are integral to modern life, offering a range of benefits from cost-effectiveness and versatility to innovative applications and performance characteristics. While they pose environmental challenges, ongoing research and development aim to create more sustainable and eco-friendly alternatives. Understanding the importance of synthetic fibers helps in appreciating their role in the economy, industry, and daily life, while also emphasizing the need for sustainable practices and innovation.
We all have good and bad thoughts from time to time and situation to situation. We are bombarded daily with spiraling thoughts(both negative and positive) creating all-consuming feel , making us difficult to manage with associated suffering. Good thoughts are like our Mob Signal (Positive thought) amidst noise(negative thought) in the atmosphere. Negative thoughts like noise outweigh positive thoughts. These thoughts often create unwanted confusion, trouble, stress and frustration in our mind as well as chaos in our physical world. Negative thoughts are also known as “distorted thinking”.
Thesis Statement for students diagnonsed withADHD.ppt
Caveon Webinar Series: Lessons Learned from EATP and CSDPTF November 2013
1. November 20, 2013
Caveon Webinar Series:
Lessons Learned from
The European Association of Test Publishers Conference and
The Conference on Statistical Detection of Potential Test Fraud
John Fremer, President Caveon Consulting Services
Steve Addicott, Vice President, Client Services
Dennis Maynes, Chief Scientist, Caveon Data Forensics
2. Agenda for Today
John Fremer, Observations from E-ATP
Handbook of Test Security
CCSSO TILSA Test Security Guidebook
The Emergence of Social Media
Steve Addicott, Observations from E-ATP and CSDPTF
ATP/CCSSO OBP ITC Guidelines
Electronic Badging
ATP Security Committee
CSDPTF Observations
Dennis Maynes, Observations from CSDPTF
Progress, Research and Direction
Techniques that work, and don’t work
Challenges in this field
4. European Association of Test
Publishers (E-ATP) Annual Conference
5th Annual E-ATP conference:
Growing Talent In Europe:
Gaining Advantage Through
Assessment
Brings together European and
other international test
publishers and related
organizations
Held in beautiful St.
Julian, Malta
5. HANDBOOK OF TEST SECURITY,
FIVE TAKEAWAYS
1. What security vulnerabilities exist
for all genres of testing?
2. The critical importance of security
planning
3. Practical and proven strategies for
preventing and detecting cheating
4. How security breaches have been
dealt with in specific programs
5. What lessons have we learned from
past instances of testing
misbehavior?
6. HANDBOOK OF TEST SECURITY,
FIVE PREDICTIONS
In many high stakes testing programs:
1. Cheating detection statistical analyses will be
performed routinely
2. Computer-based testing will increasingly become
the norm
3. Technology developments will be critically
important to test security
4. The internationalization of the program will
increase
5. “Test Security Expert” will become a recognized
and valued position
7. ADVICE FOR THE READER
Review the Table of Contents
“Skim read“ the chapters
Earmark chapters and sections for staff to read or for
you to return to
Read sections as you deal with the issues addressed
To get the Handbook,
http://www.psypress.com/books/details/978041
5816540/ use discount code HYJ82 for a 20%
discount.
8. TILSA GUIDEBOOK
Guidebook: Preventing,
Detecting, and
Following up on Testing
Irregularities
Center for Chief State
School Officers
Designed for State
Assessment Directors
11. TEST SECURITY INVESTIGATIONS
(Sample #1)
Areas Needing Attention
Level of evidence warranting an
investigation
Roles for state, district, and other staff
Time lines
Model investigations kit
12. TEST SECURITY INVESTIGATIONS (cont.)
(Sample #2)
Model Investigations Kit
Clear definition of responsibilities
Procedures for evaluating evidence
Planning and conducting interviews
Developing a report with
recommendations
13. TILSA GUIDEBOOK
To get a copy of the
Guidebook,
Download a PDF for free or
purchase your own copy
for only $3.59.
http://www.ccsso.org/Reso
urces/Publications
14. SOCIAL MEDIA
Importance of Social Media -- several presentations
Sessions suggest using “Glocal” approach
Social Media continue to gain users in testing
internationally
15. Ignite Session: Are You One Post
Away From a Social Media Crisis?
Speaker: Matthew Poyiadgi, Managing Director,
Pearson VUE
3 P’s to deal with a social media crisis:
Police
Proactive Stance
Proportional Response
Customers expect a 1-day response from you.
20% get it.
16. Ignite Session: Are You One Post Away
From a Social Media Crisis? (cont)
Summary
Choose your communication channels wisely
Write your guidelines – make them practical
Choose and train those representing your agency
Be proactive – put your guidelines in action
Be proportionate with resources and responses
Track what you do – watch for patterns
Be personable on social media! You’re dealing
with people!
17. Lessons Learned from
The European ATP Conference &
The Conference on Statistical Detection of
Potential Test Fraud
Steve Addicott
18. Important Test Security Resources
ATP/CCSSO Operational Best Practices for Statewide
Large Scale Assessment Programs
International Test Commission Guidelines for the
Security of Examinations, Tests and Other Assessments
19. ATP/CCSSO Operational Best Practices
Published in Spring 2010:
Enhance the quality, accuracy, and
timeliness of student test data
derived from large scale
assessments
Strengthen public confidence in the
accuracy and quality of testing
data and their uses
20. ATP/CCSSO Operational Best Practices
2013: Revised OBP for CBT and Online Testing
Just published September 2013!
May not be precisely applicable to “…(test programs)
used on an international basis”
Provides a solid framework from which others might
seek to define a set of practices tailored to their
testing programs
ATP and the CCSSO encourage others to use this
document
21. ATP/CCSSO Operational Best Practices
To get a copy of the OBP,
Purchase a copy for $29.99 at
http://www.ccsso.org/resourc
es/publications
22. International Test Commission (ITC)
Security Guidelines
International Test Commission Guidelines for the
Security of Examinations, Tests and Other
Assessments
23. ITC Guidelines: Purpose
With increasing security problems, the guidelines are:
intended to share key elements of security best
practices to promote better security, and
defend the value of scores produced through the
assessment process
24. ITC Guidelines: Scope
All high-stakes assessments, tests and exams
All stakeholders in the assessment process (publishers,
users, students, test developers, etc.)
The entire assessment process from development to
administration to results processing and scoring
Across all areas of testing (e.g., education, employment,
certification/licensure government, clinical psychology,
etc.)
25. ITC Guidelines: Value
The ITC Guidelines provide answers to these questions:
Threats. What are the dangers?
Test Fraud. How can we deal effectively with increasing
security problems?
Terminology. How can we best communicate about test
security
26. Electronic Badging
What is electronic badging?
Big industry players involved
Compelling value
Badging + accreditation + assessment = ???
Stay tuned
27. ATP Security Committee
Picking up from last February’s
conference
Annual Survey results released:
https://www.createspace.com/4418924
Hands-on demonstrations of new tech
innovations used by test thieves and
pirates
Harder and harder for the “good guys” to
keep up
28. About the Conference
The Conference on Statistical Detection of Potential
Test Fraud (CSDPTF)
2nd Annual Conference this year
Presents various methods of cheating detection and
offers an important forum to examine a variety of
methods
Huge thanks to University of Wisconsin at Madison’s Dr.
James Wollack and team!
29. Conference on Statistical Detection of
Potential Test Fraud
Last year’s event was groundbreaking
This year, growing momentum…
Premier academic & industry organizations
supporting/sponsoring
Attendance steadily increasing
Publishing of selected papers
Plans for future years already underway!
Rumors of a scholarly journal – stay tuned!!
30. Conference on Statistical Detection of
Potential Test Fraud
Compelling dynamics behind the conference:
Growth in testing
Stakes growing ever-higher
Focus on trustworthy test results
How could we NOT focus on statistical detection?
31. Conference on Statistical Detection of
Potential Test Fraud
Challenge:
Current research on the use of statistics.
What about the policies and procedures- the legal
defensibility- wrapping their use?
32. Lessons Learned from
The Conference on Statistical Detection
of Potential Test Fraud
Dennis Maynes
33. Summary of CSDPTF
There were three general sessions on Friday with
four or five presentations and a discussant.
About ten poster presentations were on display
Friday evening.
There were three concurrent sessions on Saturday
with five presentations in the first session, four in
the second, and a symposium/workshop in the
third.
The conference was attended by over
120 researchers!
34. Topics Covered at CSDPTF
Similarity and Person Misfit
Pre-knowledge and “Braindumps”
Unusual Gains
Robustness and Sensitivity Issues
Test Tampering
Computer-Based Testing
Policy
Test Fraud Detection Challenge
Security Planning
35. CSDPTF: 2012 versus 2013
The conference this year was more
varied in terms of topics and research
than last year. Attendees were from
all over the world. The conference
has expanded in its reach, focus, and
attractiveness.
36. Progress
For this field to progress, the following are needed:
A set of data sets that have known characteristics of security breaches.
Commonly accepted ways to compare the efficacy of methods.
Consensus on the utility and implementation of statistical methods.
Consensus on how to make inferences concerning potential test fraud.
Guidance to practitioners on how to use the statistics.
37. Research
The current state of research is that of individual or
organization-based efforts with low cross-fertilization
between those efforts.
39. Techniques that work well and/or
are gaining greater acceptance
Test Tampering aka “Erasure Analysis”
Similarity aka “Answer Copying”
40. Techniques that do not work well
Detection of item compromise in all its forms such as braindumps,
rogue review courses, and disclosure of live exam content by
teachers and/or instructors
Analysis of gain scores for detecting potential test compromise
Analysis of response times to detect potential test compromise
41. Challenges Practitioners in This Field Face
1. Using statistics to invalidate test scores because the scores
are not valid. The problem is that the public and
measurement professionals have focused on the behavior
not the scores.
2. Conducting investigations when the evidence that
misbehavior occurred is circumstantial. There are no
missing persons, broken doors, or misappropriated funds.
42. Challenges Practitioners in This Field Face
3. Demonstrating the science behind the
techniques that are being used:
Reproducible results
Sound reasoning
Quantitative measures
Defensible assumptions
Measurement of error
44. Caveon Online
Caveon Security Insights Blog
http://www.caveon.com/blog/
twitter
Follow @Caveon
LinkedIn
“Caveon Test Security” Group
Please contribute!
Dr. John’s Test Security Tip of the Day
Caveon Security Minute
Facebook
“Like” us!
45. Thank you for your attendance!
Dr. John Fremer
President, Consulting Services
John.fremer@caveon.com
@TestSecurityGuy
Steve Addicott
Vice President, Client Services
Steve.addicott@caveon.com
@SdAddicott
Dennis Maynes
Chief Scientist
Dennis.Maynes@caveon.com
@DennisMaynes
At Caveon, we fundamentally believe in quality
testing and trustworthy test results.