Document 7607186

Download Report

Transcript Document 7607186

Migrating your Paper-n-Pencil
Test to the Computer with
Security in Mind
Jamie Mulkey
Caveon Test
Security
Laura Culver-Edgar
NCCAOM
® Caveon, 2006
Secure Test Administration
Prevention
Detection
Remediation
® Caveon, 2006
Agenda
 Why move to CBT?
 Prevention (Before)
 Policy and process considerations
 Detection (During)
 Monitoring candidates
 Remediation (After)
 Candidate, record, and data
management
® Caveon, 2006
Making the decision to move to
CBT
 Better access and distribution of
testing program
 More efficient testing
 More flexible testing
 Ability to develop/deliver innovative
item types
 Better test security…
® Caveon, 2006
Security Advantages
 Ability to turn items on and off as needed.
 Bad items, compromised items, overexposed
items.
 Unlikely that people will get the same
items
 CBT, especially CAT can help in this regard
 Ability to investigate item-level data
better
 Response time, unexpected change in ability
during the test, etc.
 Faster reporting mechanisms
 Important in cases of irregular behavior
® Caveon, 2006
Test Administration (Before)
 Proper identification procedures
 Define authorized/unauthorized
devices
 Process to report any discrepancies
 Proctors and other test administration
personnel trained
 Interventions are used when suspicious
activity occurs
® Caveon, 2006
Security Measures - Biometrics
® Caveon, 2006
Testing continuously vs. testing
windows
 Size of testing population and the availability of
testing sites/seats
 Length of test and availability of testing
sites/seats
 Monitoring of item exposure through internet
braindumping/forums/chatrooms
 Monitoring of possible item exposure in various
time zones
 Results to candidate are released immediately or
after a period of time
 Size of your item pool
 Test administration: form-based or CAT
® Caveon, 2006
Test Administration (During)
 Managing candidate identification
 biometrics
 Continuous monitoring or examinees
 Personnel, video/audio monitoring
 Physical control over unauthorized
material and devices
 Physical space to hold personal items
 Taking advantage of computer technology
 Managing an intervention when suspicious
activity occurs
 Halt testing, notification and escalation
® Caveon, 2006
Confirming exam exposure
with Data Forensics™
Helps validate level of
exposure
 Has a test been compromised
and to what extent?
 When and where was it
compromised?
 Who are the potential culprits?
® Caveon, 2006
Caveon Case Study: Global Certification
Exams - Effect on Test Performance
® Caveon, 2006
Incidence of Test Abuse by Exam
Exam 425 has experienced the
greatest incidence of test abuse with
suspected test abuse occurring in
~180 of every 1000 tests.
High instance
of collusion
and cheating
indicate
probable sale
and/or sharing
of test content
on the Internet.
® Caveon, 2006
Test Administration (After)
 Relevant data immediately forwarded
to the test sponsor
 Score validation and reporting
 Using Data Forensics to Identify and:
 Invalidate scores
 Manage rogue test centers
 Manage item exposure
® Caveon, 2006
Remediation
 Execution of policies
 Incident response matrix
 Sanctions for poor-performing sites
 Investigation
 Warning
 Closure
 Cease & Desist / Take down
® Caveon, 2006
Tier 1
® Caveon, 2006
Security Planning




Roles and Responsibilities
Security Budget
Policies and Procedures
Putting an overall plan together
® Caveon, 2006
Questions & Answers
® Caveon, 2006
Thanks for attending!
Please contact us:
Jamie Mulkey, Ed.D.
[email protected]
916 652-4017 phone
www.caveon.com
Laura Culver-Edgar, MBA, MT(ASCP)
703 299-5891
[email protected]