Presenters: Promoting Regulatory Excellence Danny Breidenbach, Applied Measurement Professionals Stephen Hennessey, Prometric Mark Poole, Pearson How to.

Slides:



Advertisements
Similar presentations
© Caveon, 2006 Under Lock and Key: Conducting a Physical Security Audit John Fremer, Ph.D – President, Caveon Jamie Mulkey, Ed.D. – Sr. Director Caveon.
Advertisements

pan Testing Centers I-9 Training
10,000 Issues Testing In a Tough Economy Jonathan Miller Director, Global Channel Sales & Development Pearson VUE Ryan Ulwelling Manager, Global PVTC Selects.
FCAT Writing Field Test December 4 th & 5 th 2012.
Experts Respond to Your Questions 2006 Annual ConferenceAlexandria, Virginia Council on Licensure, Enforcement and Regulation Expect the Unexpected: Are.
Pearson Access for SAC’s
Test Monitor Training Administering Minnesota Assessments.
© Caveon, 2006 Test Administration Manuals: Content Overview Jim Impara, Ph.D. Caveon, LLC.
Maintaining Test Security in the U.S. and Internationally Barbara Halsey CLEAR Conference Chauncey Group International San Antonio, TX January 10, 2002.
Presenters: Promoting Regulatory Excellence Stacy Lawson, Prometric Thefts, Threats and Cheating: Addressing Security Issues in the Credentialing Process.
Department of Labor HSPD-12
Discovering Computers 2010
E-Commerce Security Issues. General E-Business Security Issues Any E-Business needs to be concerned about network security. The Internet is a “ public.
Presenters: Promoting Regulatory Excellence 1 Christine R. Buckley, Canadian Nurses Association Rachel Buttle, Assessment Strategies John Shultz, Professional.
You’ve Been Shown: Now It’s Your Turn to Ask! CLEAR 2004Kansas City, Missouri Responding to Your Questions About Testing.
Assessment Services, SDUSD CAHSEE Test Examiner Training.
AUTOMATIC DATA CAPTURE  a term to describe technologies which aim to immediately identify data with 100 percent accuracy.
PMI Inventory Tracker™
Presenters: Promoting Regulatory Excellence ASK THE EXPERTS Sandra Greenberg, PhD Professional Examination Service Joseph McClintock, PhD Measurement Incorporated.
Adapted from CTAE Resources Network PROFITT Curriculum Basic Computer Skills Module 1 Hardware.
This is a technology free training zone. Please silence your cell phones. Note taking only on iPads or computers. Thank you.
Alternative Input Devices. Digital Camcorder View recordings on a regular TV or copy them to VHS tape Send MPEG video clips by way of to a mobile.
Muhammad Tehseen Qureshi.  What is input?  Input device is any hardware component that allows users to enter data and instructions  Data or instructions.
The Impact of Physical Security on Network Security
INPUT DEVICES. KEYBOARD Most common input device for a computer.
 Review the security rule as it pertains to ›Physical Safeguards ♦ How to protect the ePHI in the work environment ♦ Implementation ideas for your office.
Confidential Crisis Management Innovations, LLC. CMI CrisisPad TM Product Overview Copyright © 2011, Crisis Management Innovations, LLC. All Rights Reserved.
College-Level Examination Program ® (CLEP ® ) College-Level Examination Program ® (CLEP ® ) CLEP: What Every Test Administrator Needs to Know.
The Nuts & Bolts of Being an IELTS Test Center in a College Setting 2010 NCTA Annual Conference Atlanta, GA.
Alternative Input Devices Part B There will be a test on this information (both part a & b).
FSA Writing Component Spring 2015.
Data management in the field Ari Haukijärvi 2nd EHES training seminar.
1 Examination Accreditation Program Exam Security: Preventing Exam Espionage Saturday, October 1 Baltimore – Maryland - USA.
Environment for Information Security n Distributed computing n Decentralization of IS function n Outsourcing.
CLEAR 2003 Annual Conference Toronto, Ontario Technology, Service, and Delivery Stephen Greenfield Product Services Manager.
CIITS: Scheduling and Administering Online Common Assessments Copyright © 2011 Schoolnet, Inc. All rights reserved.
Rowland Unified School District (Slides from ETS) CAHSEE Test Site Coordinator Information.
Jeopardy K201 – The Computer In Business Exam Review 2 Manjit Trehan.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
BNR – Stroke: data entry and data management CAREC/PAHO Curacoa,15-16 November 2010 Gina Pitts, BNR-CVD Registrar Chronic Disease Research Centre, Jemmotts.
Rowland Unified School District Student Assessment California High School Exit Examination (CAHSEE) Test Examiner Training Rowland Unified School.
Lesson 9-Information Security Best Practices. Overview Understanding administrative security. Security project plans. Understanding technical security.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
About MeritTrac. “Evaluate Knowledge, Skills, Abilities & Personality Traits through the use of scientifically designed assessments Delivery Tests in.
Test Chair 101: Guidelines and Tips for New Test Chairpersons Wanda L. Cunningham 1.
Proctor Training Thank you for serving as a proctor in the Charlotte-Mecklenburg Schools testing program!
Test Examiner Responsibilities CAHSEE Rowland Unified School District 1 TE.
CIITS: Scheduling and Administering Online Common Assessments Copyright © 2011 Schoolnet, Inc. All rights reserved.
Computer Applications I I dentify alternative input devices and techniques.
INPUT DEVICES. Keyboard & Mouse  Keyboard: Enter text and commands  Mouse: Point, Select & enter Commands.
Unit 32 – Networked Systems Security
Oral Exam Administration Training May 25, 2016 NATIONAL CENTER FOR STATE COURTS.
Lesson 4 Alternative Methods Of Input.
A device tat transfers data from the outside world into a computer
Book room proctor training
Software Application Overview
PN Comprehensive Predictor Testing at the Joliet Junior College Academic Skills Center PowerPoint created by AIAS Director on February 3, 2015.
Biometrics Reg: AMP/HNDIT/F/F/E/2013/067.
Chapter 5 - Input.
Lesson 4 Alternative Methods Of Input.
Jessica Dare, Principal Consultant
Level 2 Diploma Unit 11 IT Security
Introduction to Computers
Chapter 5THE NCLEX-PN®
Illinois Nurse Assistant/ Aide Competency Evaluation Exam at the Joliet Junior College Academic Skills Center PowerPoint edited by AIAS Director on February.
Introduction to Computers
What is it and why should I have it?
Mobile Registration App Training Guide for OPO Staffers
Chapter 5THE NCLEX-PN®
Chapter 5THE NCLEX-PN®
Presentation transcript:

Presenters: Promoting Regulatory Excellence Danny Breidenbach, Applied Measurement Professionals Stephen Hennessey, Prometric Mark Poole, Pearson How to Cheat on Credentialing Exams

2 Before the Exam Danny Breidenbach, Applied Measurement Professionals

3 Security During Examination Development Internal vs. External Testing company vs. Credentialing organization and Subject Matter Expert (SME)

Security During Examination Development Physical Access Staffing Inventory / Storage Other Functions Translation, Printing, Artwork, etc. Working with SMEs 4

Development — Physical Access Secure Room/Area Vault — Key Access Limited Authorized Access Print copies vs. Electronic copies Chain-of-Custody Shredding — including notes/drafts 5

Development — Staffing Staff Confidentiality Agreements Conflict of Interest Audits 6

Development — Inventory and Distribution Printing (internal vs. outsourced, serial #’s, sealed booklets, shrink wrap) Shipping (multiple counts, traceable shipping, courier) Electronic Transmission Web Access 7

Development — Other Functions Translators Artwork Supplies for Practical Exams Printers Couriers 8

Development — Working with SMEs Face-to-Face Meetings Passwords Selective Access Permission Specific Time Period Read-only, non-print, non-export “Screen security” Web-conferences 9

Summary — Security During Development Main threat: unintended exposure of materials Responsibility must be shared among testing company, credentialing organization, volunteer subject matter experts 10

11 During the Exam Stephen Hennessey, Prometric

Various Types and Levels of Threats Single cheater Collusion Proxy testing Item harvesting Hackers 12

Common Cheating Methods Copying from other examinees Hidden notes –in clothes –on hands or legs –inside books or exhibits –underneath hats or taped to brim –Inside bottle/ labels –inside food packages Accessing notes on a break Notes hidden in bathroom Bribery of Test Administrator 13 Paper Cheating Notes Cheating Notes

Facility- Computer Based Testing Separate area for check-in & testing rooms Window into test room & surveillance system –video & audio recording Signs posted notifying of recording Secure lockers for personal items Partitions between workstations or privacy screens Surveillance cameras view desktops ADA compliant

Facility- Paper Based Testing Separate areas for check-in and testing All testing materials kept secured by proctor Optimum proctor to examinee ratio- no more than 1:20 Provide storage for personal belongings Exam booklets numbered, tracked by examinee Maintain examinee seating chart Monitor examinees on breaks

Proctors - Best Defense Available Qualifications Background checks- include 5-7 year country criminal search, State Police are an inexpensive option Formal training & certification program with annual re- certification required Monitoring Conflict of interest restrictions – proctor agreement Examinees monitored at ALL times Conduct frequent walk-throughs Be vigilant for suspicious 16

Emerging Threats 17

Emerging Trends in Detection Technology Hand Held Metal Detectors Wireless Jamming Devices & Cell Signal Detectors Screen Monitor Obfuscation

Biometric Identity Management Scan & Validate ID Capture Fingerprints The examinee’s ID is swiped in the combined magnetic strip and 2D barcode reader which verifies the legitimacy of government issued ID (North America only). The ID is then placed on a flatbed scanner which captures an electronic image of the photo ID and uses optical character recognition (OCR), to compare printed data and encoded data. The examinee then places a finger on the fingerprint scanner, which collects a unique physical characteristic which is then linked to the examinee’s identity record. Capture examinee Information from ID Scan & Validate ID Capture Fingerprints

Day of testing - steps to mitigate risk during test delivery

21 After the Exam Mark Poole, Pearson

22 Security After the Test Data Forensics Monitoring Websites Item Updating Facility Screening Audits Incident Reporting

23 After – Data Forensics - Items p-value: Percentage of candidates who answer an item correctly pbis:Correlation between performance on an item and performance on the overall exam option stats: Percentage of candidates who answer each option correctly option pbis: Correlation between performance on the options and the overall exam

24 After – Data Forensics - Items p-value: Too high, too low pbis:Too low options:Distractors with no responses Distractors with more responses than key O pbis:Distractors higher than key OmitsAbove expectations

25 After – Data Forensics - Candidates Suspicious Candidate Activity Test for significant differences in pass rates Better performance on harder items High scores in low test times Suspicious improvement in scores

26 After – Monitoring Websites Cram Schools Sample Exams False Advertising Social Networking

27 After – Item Updating Monitor Item Statistics Replace Items Add New Items

28 After – Facility Screening Look for Notes in Testing Station Screen Restrooms and Hallways

29 After - Audits Test Center Audits “Secret Shopper” Programs Inventory Continuing Education for Proctors

30 After – Incident Reporting Documentation Evidence Reporting to Client

31 Examples Cheating Incidents

Danny H. Breidenbach, Psychometrician Stephen Hennessey, Director Global Security Mark Poole, Product Strategist Tadas Dabsys, Executive Vice President 32 Speaker Contact Information