SlideShare une entreprise Scribd logo
1  sur  32
Upcoming Caveon Events


• NCME Conference, April 26 – 30th, San Francisco
     Test Security I: Policy Issues: Technical/
     Statistical/Methodological Issues.
  – Presenters include: Dr. John J. Fremer


• USDLA Conference, April 28- May 1, St. Louis
     Will the real learner please stand up?
  – Presenters include Caveon’s Jamie Mulkey, Ed.D. and Patrick
    Martin
Latest Publications

• Handbook of Test Security – Pre-order your
  copy today. To be published March 27th. We’ll
  share a discount code before end of session.

• TILSA Guidebook for State Assessment
  Directors on Data Forensics – just released
Caveon Online
• Caveon Security Insights Blog
   – http://www.caveon.com/blog/
• twitter
   – Follow @Caveon
• LinkedIn
   – Caveon Company Page
   – “Caveon Test Security” Group
       • Please contribute!
• Facebook
   – Will you be our “friend?”
   – “Like” us!
                     www.caveon.com
Caveon Webinar Series:

     “The Handbook of Test Security”
Learn more about preventing & detecting cheating on high-stakes tests


     Dr. James A. Wollack                       Dr. John Fremer
     Associate Professor                        President
     Educational Psychology                     Caveon Consulting Service
     Director, Testing & Evaluation Services
     University of Wisconsin-Madison


                               March 21, 2013
Agenda for today


• James Wollack
  – Introduction to the Handbook of Test Security
  – Parts 1 & 2
• John Fremer
  – Part 2 & 3
• James Wollack
  – Contributing Authors
  – 10 Takeaways
HANDBOOK OF TEST SECURITY

•   Editors - James Wollack & John Fremer
•   Slated for Publication – March 2013
•   Preventing, Detecting, and Investigating Cheating
•   Testing in Many Domains
     – Certification/Licensure
    – Clinical
    – Educational
    – Industrial/Organizational
CURRENT STATE OF TESTING

• Large-scale, Standardized Testing is an
  Integral Part of our Culture
• Incentive to Cheat on Tests has never been
  Higher
   – Cheating is a very real problem
   – Extends across all walks of testing
• Presence of Test Security Themes at
  Professional Conferences has Skyrocketed
   – Much of what is known about test security
     resides in testing companies and is proprietary
PRIMARY AIMS OF THE HANDBOOK
• Advance the science of test security
• Draw on insights of psychometricians and
  policy-makers to provide a comprehensive
  resource that deals with all aspects of test
  security for all genres of testing.
   • Best practices for designing secure tests

   • Analysis of security vulnerabilities

   • Practical cheating prevention/detection
     strategies

   • Lessons learned in actual security violations
     and initiatives
ORGANIZATION OF HANDBOOK

• Part I: Designing Secure Delivery Systems
   – Security vulnerabilities unique to modality
   – Chapters focus on prevalence, major threats,
     prevention, detection
• Part II: Important Issues in Test Security
   – Maintaining security before and after exam
   – Developing a security culture throughout all
     phases of organization
   – Reconnaissance effort following breach
• Part III: Lessons Learned from Practice
   – Case studies from a variety of disciplines
INTRODUCTION
            The Test Security Threat
        James A. Wollack & John J. Fremer

– Cheating is pervasive and no testing program is immune
– Extremely costly to programs and reputations of both
  testing industry and discipline
– Very difficult to catch
PART I: DESIGNING SECURE DELIVERY SYSTEMS

   Security in Large-Scale Paper and Pencil Testing
            John J. Fremer and Steve Ferrara


  – K-12 accountability and national admissions testing
  – Methods
     • Cheating by examinees and administrators
     • Exposure/disclosure of secure test materials
     • Inappropriate test preparation
     • Inappropriate test administration
  – Prevention & Detection
  – Recommendations for Testing Program Managers
PART I: DESIGNING SECURE DELIVERY SYSTEMS
  Security Issues in Technology-Based Testing
                  David Foster

 • Use of technology to build and deliver tests has
   created many new vulnerabilities
        • on-demand testing
        • Internet-based testing
        • electronic distribution of test files
        • storage of item banks, test files, results, examinee
          info
        • test question over-exposure
        • testing centers
    – Theft vs. Cheating
    – Prevention, Deterrence, and Detection strategies
PART I: DESIGNING SECURE DELIVERY SYSTEMS

    Security Issues in Classroom Testing
               Louis Woodruff

 – Teacher-made tests, predominantly paper-based
 – Many of the types of cheating are the same as those
   on standardized tests, but particulars are often quite
   different
    • Teacher usually knows students, sometimes quite well
    • Students know each other, often very well
    • Much greater physical security vulnerabilities
 – Deterring cheating & mitigating motivations to cheat
    • Practical, realistic, straightforward approaches
PART I: DESIGNING SECURE DELIVERY SYSTEMS

        Security Issues in Writing Assessment
                    Suzanne Lane

    – Both large-scale and classroom writing assessments
    – Security vulnerabilities:
       • Prompts (and related text, if applicable)
       • Responses
    – Plagiarism
       • Detection systems
       • Prevention of plagiarism
    – Automated essay scoring and gaming
PART II: IMPORTANT ISSUES IN TEST SECURITY

Physical Security at Test Centers and the Testing Company
       Anthony R. Scicchitano and Roger D. Meade

  – Controlling physical testing environment to protect data
     • layout of the testing environment
     • check-in/examinee authentication process
     • proctoring
     • handling of test materials
     • security audits
PART II: IMPORTANT ISSUES IN TEST SECURITY

  Educator Cheating and the Statistical Detection of
        Group-Based Test Security Threats
                  Dennis Maynes

   – Data Forensics with focus on detecting collusion or
     groups of individuals
       • largely non-technical description
       • credibility of various sources of data
   – Standards for statistical evidence of test security
     breaches
PART II: IMPORTANT ISSUES IN TEST SECURITY

       Legal Matters in Test Security
  Jennifer Ancona Semko and Robert Hunt

  – Examined case law related to score cancelation
    and the basics of U.S. Copyright law
  – Before the exam: Candidate agreements and
    organizational security policies
  – During the exam: legal issues with biometric data
    & proctor intervention
  – After the exam: No need to “prove” cheating,
    taking action against copyright infringement
  – Emphasis on being prepared for a possible lawsuit
    before the incident.
PART II: IMPORTANT ISSUES IN TEST SECURITY

    Security Planning, Training, and Monitoring
   Cyndy Thomas Fitzgerald and Jamie R. Mulkey

    –   Need comprehensive written security plan
    –   Develop related training materials
    –   Provide and keep current training
    –   Follow clear guidelines
PART II: IMPORTANT ISSUES IN TEST SECURITY

       Conducting Investigations of Misconduct
   Deborah J. Harris and Rachel R. Watkins Schoenig

   –   Importance of examinee/sponsor agreements
   –   Decide on “triggers” for investigations
   –   Provide “understandable” results
   –   Scrupulously follow your rules
PART II: IMPORTANT ISSUES IN TEST SECURITY

         Security Related Communications
        Susan M. Case and Beth E. Donahue

    – Need thoughtful plan of communication
    – Regular briefings and updates
    – Decision makers identified
       • Operational
       • Policy
    – Document security threats and their resolution
PART III – CASE STUDIES

Certification/Licensure Testing Case Studies
              Janet Duffy Carson

–   Healthy level of paranoia
–   Commitment to follow up on problems identified
–   Careful attention to training
–   Include dealing with “unusual events”
–   Register copyrights
–   Use outside resources when appropriate
PART III – CASE STUDIES
      Prevention, Detection, and Management of
       Falsified Test Development Data (Clinical)
     Kevin M. Williams, Sara Rzepa, Gill Sitarenios,
                      Hazel Wheldon

• Very real danger of fraudulent data
   – Develop industry standards
      • Preventative methods
      • Warning signals
   – Compare data from different sites
PART III – CASE STUDIES

              Educational Testing
                Neal Kingston

–   Pressures to cheat increasing
–   Make unethical behavior very clear
–   Use multiple statistical methods
–   Must act on data
–   Management of communications essential
PART III – CASE STUDIES
Industrial/Organizational Testing Case Studies
       Dave Bartram and Eugene Burke

 – Body of knowledge growing
 – Use multiple testing and scoring mechanisms
 – Benefit to using honesty contracts
PART III – CASE STUDIES
             Commentary on Case Studies
                 William Hatherill


- Offers useful observations that cut across all of the case
studies
ADVICE FOR THE READER
• Identify your most significant vulnerabilities
• “Skim read” chapters relating to your program
   – Earmark chapters and sections for you and/or staff to
     read carefully
   – Cross-reference those sections with list of
     vulnerabilities
   – Update your list of vulnerabilities as you read
• Develop a plan for addressing these
  vulnerabilities
• Re-read sections as you deal with the issues
  addressed
• Follow the advice of the leading security
  experts
HANDBOOK CONTRIBUTORS
Dave Bartram, SHL Group Ltd.                            Suzanne Lane, University of Pittsburgh
Eugene Burke, SHL Group Ltd.                            Dennis Maynes, Caveon Test Security
Janet Duffy Carson, Legal Consultant                    Roger D. Meade, Prometric, Inc.
Susan M. Case, National Conference of Bar Examiners     Jaime R. Mulkey, , Caveon Test Security
Beth E. Donahue, Data Recognition Corporation           Sara Rzepa , Multi-Health Systems, Inc.
Steve Ferrara, Pearson                                  Rachel R. Watkins Schoenig, ACT, Inc.
Cyndy Thomas Fitzgerald, Fitzgerald & Associates        Anthony R. Scicchitano , Prometric, Inc.
David Foster, Kryterion, Inc.                           Jennifer Ancona Semko, Baker & McKenzie LLP
John J. Fremer, Caveon Test Security                    Gill Sitarenios , Multi-Health Systems, Inc.
Deborah J. Harris, ACT, Inc.                            Hazel Wheldon, Multi-Health Systems, Inc.
William Hatherill, Fed. of State Boards of Phys. Therapy Kevin M. Williams , Multi-Health Systems, Inc.
Robert Hunt, Western Governors University               James A. Wollack, University of Wisconsin
Neal Kingston, University of Kansas                     Louis Woodruff, Caveon Test Security
TOP 10 TAKEAWAYS FROM HANDBOOK

 1. Don’t become desensitized to cheating
 2. Know your vulnerabilities
 3. Many tools are available to identify, reduce
    likelihood of and mitigate damage from
    security breaches
 4. Most serious threats to security happen
    before or after the test
 5. Legal standards exist for score cancelation
    policies and admissibility of statistical
    evidence
TOP 10 TAKEAWAYS FROM HANDBOOK
6. Security planning is critically important
7. Technology is both a friend and enemy
8. We can learn important lessons from the test
   compromise experiences of our colleagues
9. It takes a village to protect the integrity of
   our tests
10. Test fraud is dynamic…we must respond in
    kind
RESOURCES

• CCSSO/ATP – Operational Best Practices
• ATP Security Committee
• Caveon Test Security
   – Blog
   – Webinars
• (Just released) NCME Guidelines
• (Just released) TILSA Guidebook for State
  Assessment Directors on Data Forensics
WHERE TO PURCHASE

• Don’t forget to pre-order your copy of the
  Handbook of Test Security
• www.routledge.com
   – http://bit.ly/HandbookTS (Case Sensitive)
   – Save 20% - Enter discount code: HYJ82
THANK YOU!
Dr. James A. Wollack                  Dr. John Fremer
Associate Professor                     President
Educational Psychology                  Caveon Consulting Services
Director, Testing & Evaluation Services john.fremer@caveon.com
University of Wisconsin-Madison
jwollack@wisc.edu



            - Follow Caveon on twitter @caveon
            - Check out our blog…www.caveon.com/blog/
            - LinkedIn Group – “Caveon Test Security”

Contenu connexe

En vedette

Caveon Webinar Series Lessons Learned at NCSA and ITC July 2014
Caveon Webinar Series Lessons Learned at NCSA and ITC July 2014Caveon Webinar Series Lessons Learned at NCSA and ITC July 2014
Caveon Webinar Series Lessons Learned at NCSA and ITC July 2014Caveon Test Security
 
Caveon Webinar Series - Mastering the US DOE Test Security Requirements Janua...
Caveon Webinar Series - Mastering the US DOE Test Security Requirements Janua...Caveon Webinar Series - Mastering the US DOE Test Security Requirements Janua...
Caveon Webinar Series - Mastering the US DOE Test Security Requirements Janua...Caveon Test Security
 
Caveon Webinar Series - Creating Your Test Security Game Plan - March 2016
Caveon Webinar Series -  Creating Your Test Security Game Plan - March 2016Caveon Webinar Series -  Creating Your Test Security Game Plan - March 2016
Caveon Webinar Series - Creating Your Test Security Game Plan - March 2016Caveon Test Security
 
Caveon Webinar - Weathering the Perfect Test Security Storm May 2015 edited
Caveon Webinar  - Weathering the Perfect Test Security Storm May 2015 editedCaveon Webinar  - Weathering the Perfect Test Security Storm May 2015 edited
Caveon Webinar - Weathering the Perfect Test Security Storm May 2015 editedCaveon Test Security
 
Caveon Webinar Series - Integrating Data Forensics into the Entire Test Secur...
Caveon Webinar Series - Integrating Data Forensics into the Entire Test Secur...Caveon Webinar Series - Integrating Data Forensics into the Entire Test Secur...
Caveon Webinar Series - Integrating Data Forensics into the Entire Test Secur...Caveon Test Security
 
Caveon Webinar Series - Learning and Teaching Best Practices in Test Security...
Caveon Webinar Series - Learning and Teaching Best Practices in Test Security...Caveon Webinar Series - Learning and Teaching Best Practices in Test Security...
Caveon Webinar Series - Learning and Teaching Best Practices in Test Security...Caveon Test Security
 
Caveon Webinar Series: Preventing and Detecting Cheating, Lessons from CCSSO...
Caveon Webinar Series: Preventing and Detecting Cheating,  Lessons from CCSSO...Caveon Webinar Series: Preventing and Detecting Cheating,  Lessons from CCSSO...
Caveon Webinar Series: Preventing and Detecting Cheating, Lessons from CCSSO...Caveon Test Security
 
Caveon Webinar - International Testing 11-15-2011
Caveon Webinar - International Testing 11-15-2011Caveon Webinar - International Testing 11-15-2011
Caveon Webinar - International Testing 11-15-2011Caveon Test Security
 
Caveon Webinar Series: Protecting Tests Using Copyright Law
Caveon Webinar Series: Protecting Tests Using Copyright Law Caveon Webinar Series: Protecting Tests Using Copyright Law
Caveon Webinar Series: Protecting Tests Using Copyright Law Caveon Test Security
 
Caveon Webinar Series - Weathering the Perfect Test Security Storm May 2015
Caveon Webinar Series - Weathering the Perfect Test Security Storm May 2015Caveon Webinar Series - Weathering the Perfect Test Security Storm May 2015
Caveon Webinar Series - Weathering the Perfect Test Security Storm May 2015Caveon Test Security
 
Caveon Webinar Series: Weathering the Perfect Test Security Storm - February ...
Caveon Webinar Series: Weathering the Perfect Test Security Storm - February ...Caveon Webinar Series: Weathering the Perfect Test Security Storm - February ...
Caveon Webinar Series: Weathering the Perfect Test Security Storm - February ...Caveon Test Security
 
Caveon Webinar Series - Security Challenges in Creating Testing Programs - Se...
Caveon Webinar Series - Security Challenges in Creating Testing Programs - Se...Caveon Webinar Series - Security Challenges in Creating Testing Programs - Se...
Caveon Webinar Series - Security Challenges in Creating Testing Programs - Se...Caveon Test Security
 
Caveon Webinar Series: Considerations for Online Assessment Program Design
Caveon Webinar Series: Considerations for Online Assessment Program Design Caveon Webinar Series: Considerations for Online Assessment Program Design
Caveon Webinar Series: Considerations for Online Assessment Program Design Caveon Test Security
 
Caveon Webinar Series - The Test Security Framework- Why Different Tests Nee...
Caveon Webinar Series -  The Test Security Framework- Why Different Tests Nee...Caveon Webinar Series -  The Test Security Framework- Why Different Tests Nee...
Caveon Webinar Series - The Test Security Framework- Why Different Tests Nee...Caveon Test Security
 
Caveon Webinar Series - Test Cheaters Say the Darnedest Things! - 072016
Caveon Webinar Series -  Test Cheaters Say the Darnedest Things! - 072016Caveon Webinar Series -  Test Cheaters Say the Darnedest Things! - 072016
Caveon Webinar Series - Test Cheaters Say the Darnedest Things! - 072016Caveon Test Security
 

En vedette (15)

Caveon Webinar Series Lessons Learned at NCSA and ITC July 2014
Caveon Webinar Series Lessons Learned at NCSA and ITC July 2014Caveon Webinar Series Lessons Learned at NCSA and ITC July 2014
Caveon Webinar Series Lessons Learned at NCSA and ITC July 2014
 
Caveon Webinar Series - Mastering the US DOE Test Security Requirements Janua...
Caveon Webinar Series - Mastering the US DOE Test Security Requirements Janua...Caveon Webinar Series - Mastering the US DOE Test Security Requirements Janua...
Caveon Webinar Series - Mastering the US DOE Test Security Requirements Janua...
 
Caveon Webinar Series - Creating Your Test Security Game Plan - March 2016
Caveon Webinar Series -  Creating Your Test Security Game Plan - March 2016Caveon Webinar Series -  Creating Your Test Security Game Plan - March 2016
Caveon Webinar Series - Creating Your Test Security Game Plan - March 2016
 
Caveon Webinar - Weathering the Perfect Test Security Storm May 2015 edited
Caveon Webinar  - Weathering the Perfect Test Security Storm May 2015 editedCaveon Webinar  - Weathering the Perfect Test Security Storm May 2015 edited
Caveon Webinar - Weathering the Perfect Test Security Storm May 2015 edited
 
Caveon Webinar Series - Integrating Data Forensics into the Entire Test Secur...
Caveon Webinar Series - Integrating Data Forensics into the Entire Test Secur...Caveon Webinar Series - Integrating Data Forensics into the Entire Test Secur...
Caveon Webinar Series - Integrating Data Forensics into the Entire Test Secur...
 
Caveon Webinar Series - Learning and Teaching Best Practices in Test Security...
Caveon Webinar Series - Learning and Teaching Best Practices in Test Security...Caveon Webinar Series - Learning and Teaching Best Practices in Test Security...
Caveon Webinar Series - Learning and Teaching Best Practices in Test Security...
 
Caveon Webinar Series: Preventing and Detecting Cheating, Lessons from CCSSO...
Caveon Webinar Series: Preventing and Detecting Cheating,  Lessons from CCSSO...Caveon Webinar Series: Preventing and Detecting Cheating,  Lessons from CCSSO...
Caveon Webinar Series: Preventing and Detecting Cheating, Lessons from CCSSO...
 
Caveon Webinar - International Testing 11-15-2011
Caveon Webinar - International Testing 11-15-2011Caveon Webinar - International Testing 11-15-2011
Caveon Webinar - International Testing 11-15-2011
 
Caveon Webinar Series: Protecting Tests Using Copyright Law
Caveon Webinar Series: Protecting Tests Using Copyright Law Caveon Webinar Series: Protecting Tests Using Copyright Law
Caveon Webinar Series: Protecting Tests Using Copyright Law
 
Caveon Webinar Series - Weathering the Perfect Test Security Storm May 2015
Caveon Webinar Series - Weathering the Perfect Test Security Storm May 2015Caveon Webinar Series - Weathering the Perfect Test Security Storm May 2015
Caveon Webinar Series - Weathering the Perfect Test Security Storm May 2015
 
Caveon Webinar Series: Weathering the Perfect Test Security Storm - February ...
Caveon Webinar Series: Weathering the Perfect Test Security Storm - February ...Caveon Webinar Series: Weathering the Perfect Test Security Storm - February ...
Caveon Webinar Series: Weathering the Perfect Test Security Storm - February ...
 
Caveon Webinar Series - Security Challenges in Creating Testing Programs - Se...
Caveon Webinar Series - Security Challenges in Creating Testing Programs - Se...Caveon Webinar Series - Security Challenges in Creating Testing Programs - Se...
Caveon Webinar Series - Security Challenges in Creating Testing Programs - Se...
 
Caveon Webinar Series: Considerations for Online Assessment Program Design
Caveon Webinar Series: Considerations for Online Assessment Program Design Caveon Webinar Series: Considerations for Online Assessment Program Design
Caveon Webinar Series: Considerations for Online Assessment Program Design
 
Caveon Webinar Series - The Test Security Framework- Why Different Tests Nee...
Caveon Webinar Series -  The Test Security Framework- Why Different Tests Nee...Caveon Webinar Series -  The Test Security Framework- Why Different Tests Nee...
Caveon Webinar Series - The Test Security Framework- Why Different Tests Nee...
 
Caveon Webinar Series - Test Cheaters Say the Darnedest Things! - 072016
Caveon Webinar Series -  Test Cheaters Say the Darnedest Things! - 072016Caveon Webinar Series -  Test Cheaters Say the Darnedest Things! - 072016
Caveon Webinar Series - Test Cheaters Say the Darnedest Things! - 072016
 

Similaire à Upcoming Caveon Events and Latest Publications

Caveon Webinar Series: What you Should Know about High Stakes Cheating in You...
Caveon Webinar Series: What you Should Know about High Stakes Cheating in You...Caveon Webinar Series: What you Should Know about High Stakes Cheating in You...
Caveon Webinar Series: What you Should Know about High Stakes Cheating in You...Caveon Test Security
 
The Endless Security Summer - Caveon Webinar 8-22-2012
The Endless Security Summer - Caveon Webinar 8-22-2012The Endless Security Summer - Caveon Webinar 8-22-2012
The Endless Security Summer - Caveon Webinar 8-22-2012Caveon Test Security
 
SEC401 Threat and VulnerabilityManagementCopyright ©201.docx
SEC401 Threat and VulnerabilityManagementCopyright ©201.docxSEC401 Threat and VulnerabilityManagementCopyright ©201.docx
SEC401 Threat and VulnerabilityManagementCopyright ©201.docxrtodd280
 
01-intro.pptx
01-intro.pptx01-intro.pptx
01-intro.pptxEmanAzam
 
Ensuring Security through Continuous Testing
Ensuring Security through Continuous TestingEnsuring Security through Continuous Testing
Ensuring Security through Continuous TestingTechWell
 
Leverage Your EDC Solution to Mitigate Risk in Clinical Research
Leverage Your EDC Solution to Mitigate Risk in Clinical ResearchLeverage Your EDC Solution to Mitigate Risk in Clinical Research
Leverage Your EDC Solution to Mitigate Risk in Clinical Researchwww.datatrak.com
 
Application of Q methodology in critical success factors of information secur...
Application of Q methodology in critical success factors of information secur...Application of Q methodology in critical success factors of information secur...
Application of Q methodology in critical success factors of information secur...stuimrozsm
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information securityKATHEESKUMAR S
 
Caveon Webinar Series: The Good and Bad of Online Proctoring
Caveon Webinar Series: The Good and Bad of Online ProctoringCaveon Webinar Series: The Good and Bad of Online Proctoring
Caveon Webinar Series: The Good and Bad of Online ProctoringCaveon Test Security
 
NEBOSH HSE PSM Element 1 v1.pdf
NEBOSH HSE PSM Element 1 v1.pdfNEBOSH HSE PSM Element 1 v1.pdf
NEBOSH HSE PSM Element 1 v1.pdfMohamed Ghonema
 
Research & Statistics.pptx
Research & Statistics.pptxResearch & Statistics.pptx
Research & Statistics.pptxalexcarpio12
 
How to assess and manage cyber risk
How to assess and manage cyber riskHow to assess and manage cyber risk
How to assess and manage cyber riskStephen Cobb
 
Lessons from Texas City | Michael P. Broadribb, Baker Engineering & Risk Cons...
Lessons from Texas City | Michael P. Broadribb, Baker Engineering & Risk Cons...Lessons from Texas City | Michael P. Broadribb, Baker Engineering & Risk Cons...
Lessons from Texas City | Michael P. Broadribb, Baker Engineering & Risk Cons...Cairn India Limited
 
Honours Project - Poster
Honours Project - PosterHonours Project - Poster
Honours Project - PosterAndrew Kerr
 
Focusing on the Threats to the Detriment of the Vulnerabilities
Focusing on the Threats to the Detriment of the VulnerabilitiesFocusing on the Threats to the Detriment of the Vulnerabilities
Focusing on the Threats to the Detriment of the VulnerabilitiesRoger Johnston
 
Experimentalmethod
ExperimentalmethodExperimentalmethod
ExperimentalmethodCedrickOuano
 
Experimentalmethod 120928102524-phpapp02
Experimentalmethod 120928102524-phpapp02Experimentalmethod 120928102524-phpapp02
Experimentalmethod 120928102524-phpapp02Vikrant Singh
 
Safety culture _ Aguilera version
Safety culture _ Aguilera versionSafety culture _ Aguilera version
Safety culture _ Aguilera versionChristina Aguilera
 
Caveon Webinar Series - Exam Integrity Investigations, An Introduction to th...
Caveon Webinar Series -  Exam Integrity Investigations, An Introduction to th...Caveon Webinar Series -  Exam Integrity Investigations, An Introduction to th...
Caveon Webinar Series - Exam Integrity Investigations, An Introduction to th...Caveon Test Security
 
information security management
information security managementinformation security management
information security managementGurpreetkaur838
 

Similaire à Upcoming Caveon Events and Latest Publications (20)

Caveon Webinar Series: What you Should Know about High Stakes Cheating in You...
Caveon Webinar Series: What you Should Know about High Stakes Cheating in You...Caveon Webinar Series: What you Should Know about High Stakes Cheating in You...
Caveon Webinar Series: What you Should Know about High Stakes Cheating in You...
 
The Endless Security Summer - Caveon Webinar 8-22-2012
The Endless Security Summer - Caveon Webinar 8-22-2012The Endless Security Summer - Caveon Webinar 8-22-2012
The Endless Security Summer - Caveon Webinar 8-22-2012
 
SEC401 Threat and VulnerabilityManagementCopyright ©201.docx
SEC401 Threat and VulnerabilityManagementCopyright ©201.docxSEC401 Threat and VulnerabilityManagementCopyright ©201.docx
SEC401 Threat and VulnerabilityManagementCopyright ©201.docx
 
01-intro.pptx
01-intro.pptx01-intro.pptx
01-intro.pptx
 
Ensuring Security through Continuous Testing
Ensuring Security through Continuous TestingEnsuring Security through Continuous Testing
Ensuring Security through Continuous Testing
 
Leverage Your EDC Solution to Mitigate Risk in Clinical Research
Leverage Your EDC Solution to Mitigate Risk in Clinical ResearchLeverage Your EDC Solution to Mitigate Risk in Clinical Research
Leverage Your EDC Solution to Mitigate Risk in Clinical Research
 
Application of Q methodology in critical success factors of information secur...
Application of Q methodology in critical success factors of information secur...Application of Q methodology in critical success factors of information secur...
Application of Q methodology in critical success factors of information secur...
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information security
 
Caveon Webinar Series: The Good and Bad of Online Proctoring
Caveon Webinar Series: The Good and Bad of Online ProctoringCaveon Webinar Series: The Good and Bad of Online Proctoring
Caveon Webinar Series: The Good and Bad of Online Proctoring
 
NEBOSH HSE PSM Element 1 v1.pdf
NEBOSH HSE PSM Element 1 v1.pdfNEBOSH HSE PSM Element 1 v1.pdf
NEBOSH HSE PSM Element 1 v1.pdf
 
Research & Statistics.pptx
Research & Statistics.pptxResearch & Statistics.pptx
Research & Statistics.pptx
 
How to assess and manage cyber risk
How to assess and manage cyber riskHow to assess and manage cyber risk
How to assess and manage cyber risk
 
Lessons from Texas City | Michael P. Broadribb, Baker Engineering & Risk Cons...
Lessons from Texas City | Michael P. Broadribb, Baker Engineering & Risk Cons...Lessons from Texas City | Michael P. Broadribb, Baker Engineering & Risk Cons...
Lessons from Texas City | Michael P. Broadribb, Baker Engineering & Risk Cons...
 
Honours Project - Poster
Honours Project - PosterHonours Project - Poster
Honours Project - Poster
 
Focusing on the Threats to the Detriment of the Vulnerabilities
Focusing on the Threats to the Detriment of the VulnerabilitiesFocusing on the Threats to the Detriment of the Vulnerabilities
Focusing on the Threats to the Detriment of the Vulnerabilities
 
Experimentalmethod
ExperimentalmethodExperimentalmethod
Experimentalmethod
 
Experimentalmethod 120928102524-phpapp02
Experimentalmethod 120928102524-phpapp02Experimentalmethod 120928102524-phpapp02
Experimentalmethod 120928102524-phpapp02
 
Safety culture _ Aguilera version
Safety culture _ Aguilera versionSafety culture _ Aguilera version
Safety culture _ Aguilera version
 
Caveon Webinar Series - Exam Integrity Investigations, An Introduction to th...
Caveon Webinar Series -  Exam Integrity Investigations, An Introduction to th...Caveon Webinar Series -  Exam Integrity Investigations, An Introduction to th...
Caveon Webinar Series - Exam Integrity Investigations, An Introduction to th...
 
information security management
information security managementinformation security management
information security management
 

Plus de Caveon Test Security

Unpublished study indicates high chance of fraud in thousands of tests of enem
Unpublished study indicates high chance of fraud in thousands of tests of enemUnpublished study indicates high chance of fraud in thousands of tests of enem
Unpublished study indicates high chance of fraud in thousands of tests of enemCaveon Test Security
 
Caveon webinar series - smart items- using innovative item design to make you...
Caveon webinar series - smart items- using innovative item design to make you...Caveon webinar series - smart items- using innovative item design to make you...
Caveon webinar series - smart items- using innovative item design to make you...Caveon Test Security
 
Caveon webinar series - smart items- using innovative item design to make you...
Caveon webinar series - smart items- using innovative item design to make you...Caveon webinar series - smart items- using innovative item design to make you...
Caveon webinar series - smart items- using innovative item design to make you...Caveon Test Security
 
Caveon Webinar Series - A Guide to Online Protection Strategies - March 28, ...
Caveon Webinar Series -  A Guide to Online Protection Strategies - March 28, ...Caveon Webinar Series -  A Guide to Online Protection Strategies - March 28, ...
Caveon Webinar Series - A Guide to Online Protection Strategies - March 28, ...Caveon Test Security
 
Caveon Webinar Series - Five Things You Can Do Now to Protect Your Assessment...
Caveon Webinar Series - Five Things You Can Do Now to Protect Your Assessment...Caveon Webinar Series - Five Things You Can Do Now to Protect Your Assessment...
Caveon Webinar Series - Five Things You Can Do Now to Protect Your Assessment...Caveon Test Security
 
The Do's and Dont's of Administering High Stakes Tests in Schools Final 121217
The Do's and Dont's of Administering High Stakes Tests in Schools Final 121217The Do's and Dont's of Administering High Stakes Tests in Schools Final 121217
The Do's and Dont's of Administering High Stakes Tests in Schools Final 121217Caveon Test Security
 
Caveon Webinar Series - The Art of Test Security - Know Thy Enemy - November ...
Caveon Webinar Series - The Art of Test Security - Know Thy Enemy - November ...Caveon Webinar Series - The Art of Test Security - Know Thy Enemy - November ...
Caveon Webinar Series - The Art of Test Security - Know Thy Enemy - November ...Caveon Test Security
 
Caveon Webinar Series - Four Steps to Effective Investigations in School Dis...
Caveon Webinar Series -  Four Steps to Effective Investigations in School Dis...Caveon Webinar Series -  Four Steps to Effective Investigations in School Dis...
Caveon Webinar Series - Four Steps to Effective Investigations in School Dis...Caveon Test Security
 
Caveon Webinar Series - On-site Monitoring in Districts 0317
Caveon Webinar Series - On-site Monitoring in Districts 0317Caveon Webinar Series - On-site Monitoring in Districts 0317
Caveon Webinar Series - On-site Monitoring in Districts 0317Caveon Test Security
 
CESP Study Session #1 October 2016
CESP Study Session #1 October 2016CESP Study Session #1 October 2016
CESP Study Session #1 October 2016Caveon Test Security
 
A Tale of Two Cities - School District Webinar #1 Jan 2017
A Tale of Two Cities - School District Webinar  #1 Jan 2017A Tale of Two Cities - School District Webinar  #1 Jan 2017
A Tale of Two Cities - School District Webinar #1 Jan 2017Caveon Test Security
 
Caveon Webinar Series - Discrete Option Multiple Choice: A Revolution in Te...
Caveon Webinar Series  - Discrete Option Multiple Choice:  A Revolution in Te...Caveon Webinar Series  - Discrete Option Multiple Choice:  A Revolution in Te...
Caveon Webinar Series - Discrete Option Multiple Choice: A Revolution in Te...Caveon Test Security
 
Caveon Webinar Series - Conducting Test Security Investigations in School Di...
Caveon Webinar Series -  Conducting Test Security Investigations in School Di...Caveon Webinar Series -  Conducting Test Security Investigations in School Di...
Caveon Webinar Series - Conducting Test Security Investigations in School Di...Caveon Test Security
 
Caveon Webinar Series - Will the Real Cloned Item Please Stand Up? final
Caveon Webinar Series -  Will the Real Cloned Item Please Stand Up? finalCaveon Webinar Series -  Will the Real Cloned Item Please Stand Up? final
Caveon Webinar Series - Will the Real Cloned Item Please Stand Up? finalCaveon Test Security
 
Caveon Webinar Series - Lessons Learned at the 2015 National Conference on S...
Caveon Webinar Series -  Lessons Learned at the 2015 National Conference on S...Caveon Webinar Series -  Lessons Learned at the 2015 National Conference on S...
Caveon Webinar Series - Lessons Learned at the 2015 National Conference on S...Caveon Test Security
 
Caveon Webinar Series - Unlocking the Mystery of the Validity Triangle 11-2014
Caveon Webinar Series - Unlocking the Mystery of the Validity Triangle 11-2014Caveon Webinar Series - Unlocking the Mystery of the Validity Triangle 11-2014
Caveon Webinar Series - Unlocking the Mystery of the Validity Triangle 11-2014Caveon Test Security
 
Caveon Webinar Series - Lessons Learned at the European Association of Test...
Caveon Webinar Series -  Lessons Learned at the  European Association of Test...Caveon Webinar Series -  Lessons Learned at the  European Association of Test...
Caveon Webinar Series - Lessons Learned at the European Association of Test...Caveon Test Security
 
Caveon webinar series Standard Setting for the 21st Century, Using Informa...
Caveon webinar series    Standard Setting for the 21st Century, Using Informa...Caveon webinar series    Standard Setting for the 21st Century, Using Informa...
Caveon webinar series Standard Setting for the 21st Century, Using Informa...Caveon Test Security
 

Plus de Caveon Test Security (18)

Unpublished study indicates high chance of fraud in thousands of tests of enem
Unpublished study indicates high chance of fraud in thousands of tests of enemUnpublished study indicates high chance of fraud in thousands of tests of enem
Unpublished study indicates high chance of fraud in thousands of tests of enem
 
Caveon webinar series - smart items- using innovative item design to make you...
Caveon webinar series - smart items- using innovative item design to make you...Caveon webinar series - smart items- using innovative item design to make you...
Caveon webinar series - smart items- using innovative item design to make you...
 
Caveon webinar series - smart items- using innovative item design to make you...
Caveon webinar series - smart items- using innovative item design to make you...Caveon webinar series - smart items- using innovative item design to make you...
Caveon webinar series - smart items- using innovative item design to make you...
 
Caveon Webinar Series - A Guide to Online Protection Strategies - March 28, ...
Caveon Webinar Series -  A Guide to Online Protection Strategies - March 28, ...Caveon Webinar Series -  A Guide to Online Protection Strategies - March 28, ...
Caveon Webinar Series - A Guide to Online Protection Strategies - March 28, ...
 
Caveon Webinar Series - Five Things You Can Do Now to Protect Your Assessment...
Caveon Webinar Series - Five Things You Can Do Now to Protect Your Assessment...Caveon Webinar Series - Five Things You Can Do Now to Protect Your Assessment...
Caveon Webinar Series - Five Things You Can Do Now to Protect Your Assessment...
 
The Do's and Dont's of Administering High Stakes Tests in Schools Final 121217
The Do's and Dont's of Administering High Stakes Tests in Schools Final 121217The Do's and Dont's of Administering High Stakes Tests in Schools Final 121217
The Do's and Dont's of Administering High Stakes Tests in Schools Final 121217
 
Caveon Webinar Series - The Art of Test Security - Know Thy Enemy - November ...
Caveon Webinar Series - The Art of Test Security - Know Thy Enemy - November ...Caveon Webinar Series - The Art of Test Security - Know Thy Enemy - November ...
Caveon Webinar Series - The Art of Test Security - Know Thy Enemy - November ...
 
Caveon Webinar Series - Four Steps to Effective Investigations in School Dis...
Caveon Webinar Series -  Four Steps to Effective Investigations in School Dis...Caveon Webinar Series -  Four Steps to Effective Investigations in School Dis...
Caveon Webinar Series - Four Steps to Effective Investigations in School Dis...
 
Caveon Webinar Series - On-site Monitoring in Districts 0317
Caveon Webinar Series - On-site Monitoring in Districts 0317Caveon Webinar Series - On-site Monitoring in Districts 0317
Caveon Webinar Series - On-site Monitoring in Districts 0317
 
CESP Study Session #1 October 2016
CESP Study Session #1 October 2016CESP Study Session #1 October 2016
CESP Study Session #1 October 2016
 
A Tale of Two Cities - School District Webinar #1 Jan 2017
A Tale of Two Cities - School District Webinar  #1 Jan 2017A Tale of Two Cities - School District Webinar  #1 Jan 2017
A Tale of Two Cities - School District Webinar #1 Jan 2017
 
Caveon Webinar Series - Discrete Option Multiple Choice: A Revolution in Te...
Caveon Webinar Series  - Discrete Option Multiple Choice:  A Revolution in Te...Caveon Webinar Series  - Discrete Option Multiple Choice:  A Revolution in Te...
Caveon Webinar Series - Discrete Option Multiple Choice: A Revolution in Te...
 
Caveon Webinar Series - Conducting Test Security Investigations in School Di...
Caveon Webinar Series -  Conducting Test Security Investigations in School Di...Caveon Webinar Series -  Conducting Test Security Investigations in School Di...
Caveon Webinar Series - Conducting Test Security Investigations in School Di...
 
Caveon Webinar Series - Will the Real Cloned Item Please Stand Up? final
Caveon Webinar Series -  Will the Real Cloned Item Please Stand Up? finalCaveon Webinar Series -  Will the Real Cloned Item Please Stand Up? final
Caveon Webinar Series - Will the Real Cloned Item Please Stand Up? final
 
Caveon Webinar Series - Lessons Learned at the 2015 National Conference on S...
Caveon Webinar Series -  Lessons Learned at the 2015 National Conference on S...Caveon Webinar Series -  Lessons Learned at the 2015 National Conference on S...
Caveon Webinar Series - Lessons Learned at the 2015 National Conference on S...
 
Caveon Webinar Series - Unlocking the Mystery of the Validity Triangle 11-2014
Caveon Webinar Series - Unlocking the Mystery of the Validity Triangle 11-2014Caveon Webinar Series - Unlocking the Mystery of the Validity Triangle 11-2014
Caveon Webinar Series - Unlocking the Mystery of the Validity Triangle 11-2014
 
Caveon Webinar Series - Lessons Learned at the European Association of Test...
Caveon Webinar Series -  Lessons Learned at the  European Association of Test...Caveon Webinar Series -  Lessons Learned at the  European Association of Test...
Caveon Webinar Series - Lessons Learned at the European Association of Test...
 
Caveon webinar series Standard Setting for the 21st Century, Using Informa...
Caveon webinar series    Standard Setting for the 21st Century, Using Informa...Caveon webinar series    Standard Setting for the 21st Century, Using Informa...
Caveon webinar series Standard Setting for the 21st Century, Using Informa...
 

Dernier

Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parentsnavabharathschool99
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4MiaBumagat1
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptxSherlyMaeNeri
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfSpandanaRallapalli
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxCarlos105
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSJoshuaGantuangco2
 

Dernier (20)

Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parents
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptx
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdf
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptxYOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptxFINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
 

Upcoming Caveon Events and Latest Publications

  • 1. Upcoming Caveon Events • NCME Conference, April 26 – 30th, San Francisco Test Security I: Policy Issues: Technical/ Statistical/Methodological Issues. – Presenters include: Dr. John J. Fremer • USDLA Conference, April 28- May 1, St. Louis Will the real learner please stand up? – Presenters include Caveon’s Jamie Mulkey, Ed.D. and Patrick Martin
  • 2. Latest Publications • Handbook of Test Security – Pre-order your copy today. To be published March 27th. We’ll share a discount code before end of session. • TILSA Guidebook for State Assessment Directors on Data Forensics – just released
  • 3. Caveon Online • Caveon Security Insights Blog – http://www.caveon.com/blog/ • twitter – Follow @Caveon • LinkedIn – Caveon Company Page – “Caveon Test Security” Group • Please contribute! • Facebook – Will you be our “friend?” – “Like” us! www.caveon.com
  • 4. Caveon Webinar Series: “The Handbook of Test Security” Learn more about preventing & detecting cheating on high-stakes tests Dr. James A. Wollack Dr. John Fremer Associate Professor President Educational Psychology Caveon Consulting Service Director, Testing & Evaluation Services University of Wisconsin-Madison March 21, 2013
  • 5. Agenda for today • James Wollack – Introduction to the Handbook of Test Security – Parts 1 & 2 • John Fremer – Part 2 & 3 • James Wollack – Contributing Authors – 10 Takeaways
  • 6. HANDBOOK OF TEST SECURITY • Editors - James Wollack & John Fremer • Slated for Publication – March 2013 • Preventing, Detecting, and Investigating Cheating • Testing in Many Domains – Certification/Licensure – Clinical – Educational – Industrial/Organizational
  • 7. CURRENT STATE OF TESTING • Large-scale, Standardized Testing is an Integral Part of our Culture • Incentive to Cheat on Tests has never been Higher – Cheating is a very real problem – Extends across all walks of testing • Presence of Test Security Themes at Professional Conferences has Skyrocketed – Much of what is known about test security resides in testing companies and is proprietary
  • 8. PRIMARY AIMS OF THE HANDBOOK • Advance the science of test security • Draw on insights of psychometricians and policy-makers to provide a comprehensive resource that deals with all aspects of test security for all genres of testing. • Best practices for designing secure tests • Analysis of security vulnerabilities • Practical cheating prevention/detection strategies • Lessons learned in actual security violations and initiatives
  • 9. ORGANIZATION OF HANDBOOK • Part I: Designing Secure Delivery Systems – Security vulnerabilities unique to modality – Chapters focus on prevalence, major threats, prevention, detection • Part II: Important Issues in Test Security – Maintaining security before and after exam – Developing a security culture throughout all phases of organization – Reconnaissance effort following breach • Part III: Lessons Learned from Practice – Case studies from a variety of disciplines
  • 10. INTRODUCTION The Test Security Threat James A. Wollack & John J. Fremer – Cheating is pervasive and no testing program is immune – Extremely costly to programs and reputations of both testing industry and discipline – Very difficult to catch
  • 11. PART I: DESIGNING SECURE DELIVERY SYSTEMS Security in Large-Scale Paper and Pencil Testing John J. Fremer and Steve Ferrara – K-12 accountability and national admissions testing – Methods • Cheating by examinees and administrators • Exposure/disclosure of secure test materials • Inappropriate test preparation • Inappropriate test administration – Prevention & Detection – Recommendations for Testing Program Managers
  • 12. PART I: DESIGNING SECURE DELIVERY SYSTEMS Security Issues in Technology-Based Testing David Foster • Use of technology to build and deliver tests has created many new vulnerabilities • on-demand testing • Internet-based testing • electronic distribution of test files • storage of item banks, test files, results, examinee info • test question over-exposure • testing centers – Theft vs. Cheating – Prevention, Deterrence, and Detection strategies
  • 13. PART I: DESIGNING SECURE DELIVERY SYSTEMS Security Issues in Classroom Testing Louis Woodruff – Teacher-made tests, predominantly paper-based – Many of the types of cheating are the same as those on standardized tests, but particulars are often quite different • Teacher usually knows students, sometimes quite well • Students know each other, often very well • Much greater physical security vulnerabilities – Deterring cheating & mitigating motivations to cheat • Practical, realistic, straightforward approaches
  • 14. PART I: DESIGNING SECURE DELIVERY SYSTEMS Security Issues in Writing Assessment Suzanne Lane – Both large-scale and classroom writing assessments – Security vulnerabilities: • Prompts (and related text, if applicable) • Responses – Plagiarism • Detection systems • Prevention of plagiarism – Automated essay scoring and gaming
  • 15. PART II: IMPORTANT ISSUES IN TEST SECURITY Physical Security at Test Centers and the Testing Company Anthony R. Scicchitano and Roger D. Meade – Controlling physical testing environment to protect data • layout of the testing environment • check-in/examinee authentication process • proctoring • handling of test materials • security audits
  • 16. PART II: IMPORTANT ISSUES IN TEST SECURITY Educator Cheating and the Statistical Detection of Group-Based Test Security Threats Dennis Maynes – Data Forensics with focus on detecting collusion or groups of individuals • largely non-technical description • credibility of various sources of data – Standards for statistical evidence of test security breaches
  • 17. PART II: IMPORTANT ISSUES IN TEST SECURITY Legal Matters in Test Security Jennifer Ancona Semko and Robert Hunt – Examined case law related to score cancelation and the basics of U.S. Copyright law – Before the exam: Candidate agreements and organizational security policies – During the exam: legal issues with biometric data & proctor intervention – After the exam: No need to “prove” cheating, taking action against copyright infringement – Emphasis on being prepared for a possible lawsuit before the incident.
  • 18. PART II: IMPORTANT ISSUES IN TEST SECURITY Security Planning, Training, and Monitoring Cyndy Thomas Fitzgerald and Jamie R. Mulkey – Need comprehensive written security plan – Develop related training materials – Provide and keep current training – Follow clear guidelines
  • 19. PART II: IMPORTANT ISSUES IN TEST SECURITY Conducting Investigations of Misconduct Deborah J. Harris and Rachel R. Watkins Schoenig – Importance of examinee/sponsor agreements – Decide on “triggers” for investigations – Provide “understandable” results – Scrupulously follow your rules
  • 20. PART II: IMPORTANT ISSUES IN TEST SECURITY Security Related Communications Susan M. Case and Beth E. Donahue – Need thoughtful plan of communication – Regular briefings and updates – Decision makers identified • Operational • Policy – Document security threats and their resolution
  • 21. PART III – CASE STUDIES Certification/Licensure Testing Case Studies Janet Duffy Carson – Healthy level of paranoia – Commitment to follow up on problems identified – Careful attention to training – Include dealing with “unusual events” – Register copyrights – Use outside resources when appropriate
  • 22. PART III – CASE STUDIES Prevention, Detection, and Management of Falsified Test Development Data (Clinical) Kevin M. Williams, Sara Rzepa, Gill Sitarenios, Hazel Wheldon • Very real danger of fraudulent data – Develop industry standards • Preventative methods • Warning signals – Compare data from different sites
  • 23. PART III – CASE STUDIES Educational Testing Neal Kingston – Pressures to cheat increasing – Make unethical behavior very clear – Use multiple statistical methods – Must act on data – Management of communications essential
  • 24. PART III – CASE STUDIES Industrial/Organizational Testing Case Studies Dave Bartram and Eugene Burke – Body of knowledge growing – Use multiple testing and scoring mechanisms – Benefit to using honesty contracts
  • 25. PART III – CASE STUDIES Commentary on Case Studies William Hatherill - Offers useful observations that cut across all of the case studies
  • 26. ADVICE FOR THE READER • Identify your most significant vulnerabilities • “Skim read” chapters relating to your program – Earmark chapters and sections for you and/or staff to read carefully – Cross-reference those sections with list of vulnerabilities – Update your list of vulnerabilities as you read • Develop a plan for addressing these vulnerabilities • Re-read sections as you deal with the issues addressed • Follow the advice of the leading security experts
  • 27. HANDBOOK CONTRIBUTORS Dave Bartram, SHL Group Ltd. Suzanne Lane, University of Pittsburgh Eugene Burke, SHL Group Ltd. Dennis Maynes, Caveon Test Security Janet Duffy Carson, Legal Consultant Roger D. Meade, Prometric, Inc. Susan M. Case, National Conference of Bar Examiners Jaime R. Mulkey, , Caveon Test Security Beth E. Donahue, Data Recognition Corporation Sara Rzepa , Multi-Health Systems, Inc. Steve Ferrara, Pearson Rachel R. Watkins Schoenig, ACT, Inc. Cyndy Thomas Fitzgerald, Fitzgerald & Associates Anthony R. Scicchitano , Prometric, Inc. David Foster, Kryterion, Inc. Jennifer Ancona Semko, Baker & McKenzie LLP John J. Fremer, Caveon Test Security Gill Sitarenios , Multi-Health Systems, Inc. Deborah J. Harris, ACT, Inc. Hazel Wheldon, Multi-Health Systems, Inc. William Hatherill, Fed. of State Boards of Phys. Therapy Kevin M. Williams , Multi-Health Systems, Inc. Robert Hunt, Western Governors University James A. Wollack, University of Wisconsin Neal Kingston, University of Kansas Louis Woodruff, Caveon Test Security
  • 28. TOP 10 TAKEAWAYS FROM HANDBOOK 1. Don’t become desensitized to cheating 2. Know your vulnerabilities 3. Many tools are available to identify, reduce likelihood of and mitigate damage from security breaches 4. Most serious threats to security happen before or after the test 5. Legal standards exist for score cancelation policies and admissibility of statistical evidence
  • 29. TOP 10 TAKEAWAYS FROM HANDBOOK 6. Security planning is critically important 7. Technology is both a friend and enemy 8. We can learn important lessons from the test compromise experiences of our colleagues 9. It takes a village to protect the integrity of our tests 10. Test fraud is dynamic…we must respond in kind
  • 30. RESOURCES • CCSSO/ATP – Operational Best Practices • ATP Security Committee • Caveon Test Security – Blog – Webinars • (Just released) NCME Guidelines • (Just released) TILSA Guidebook for State Assessment Directors on Data Forensics
  • 31. WHERE TO PURCHASE • Don’t forget to pre-order your copy of the Handbook of Test Security • www.routledge.com – http://bit.ly/HandbookTS (Case Sensitive) – Save 20% - Enter discount code: HYJ82
  • 32. THANK YOU! Dr. James A. Wollack Dr. John Fremer Associate Professor President Educational Psychology Caveon Consulting Services Director, Testing & Evaluation Services john.fremer@caveon.com University of Wisconsin-Madison jwollack@wisc.edu - Follow Caveon on twitter @caveon - Check out our blog…www.caveon.com/blog/ - LinkedIn Group – “Caveon Test Security”

Notes de l'éditeur

  1. Test are used as gatekeepers for so many professional goals: licensure/certification, advancement in school/graduation, admissions to higher education, job promotion.
  2. Create a comprehensive resource so that testing entities can build upon one another’s expertise and aren’t stuck recreating their own test security wheels.
  3. Richelle to help on this one… Make changes as Jim has mentioned
  4. Examples of these before, during, and after the testWhere do we draw the line between proper and improper test prep
  5. Rooms aren’t designed specifically for testing, students know the layout of everything, students often have unsupervised access to testing rooms in advanceTeachers aren’t professional proctors and generally prefer not to police their classrooms. Chapter provides practical, realistic, and straightforward approaches to prevent and deter cheating, as well as to reduce student’s motivation to cheat
  6. Stand-alone writing prompts require students to produce a written response to a given brief topic or prompt. Text-based writing prompts reflect the reading and writing connection, in that students areasked to read about a topic from one or more sources, analyze it from a particular perspective, and then write a response
  7. Protect data: test content, IP, examinee’s personal identification dataMore than just testing environment: layout of test materials environments, including dealing with access issues for testing and non-testing personnelHandling of test materials, not just final copy, but items and materials in different phases. Deals with issues related to access and monitoring, firewalls/encryption, working with outside non-testing contractors (printers/shippers),
  8. Item preknowledge (Illegal test preparation or Internet-based discussion groups or exam wholesalers), test tampering, organized proxy testing, etc.Similarity and copying analyses, erasure analysis, gain score analysis, person-fit, response latency, What’s required for statistical evidence to be admissible in court? Advice on managing one’s false positive rate, particularly when using data forensics for data mining. Thoughts on using multiple indexes in combination
  9. What has led to organizations winning or losing in court?Limits to how biometric data can be usedCarry out their duties and contractual obligations in “Good faith”
  10. Should reference Bill Hatherill’s studies
  11. Know that it really is happening. You have to stay vigilant. You have to look for cheating. You have to actively safeguard against it. Sometimes it’s right after, like item harvesting. Hacking, tampering, illegal coaching, item sharing/distributionDuring the exam: proxy testing, item capturing/transmission, copying, communication