Introduction to Integrity
Demystifying the Science
The Language of Data Forensics
How Does it Work?
Data Forensics & Certification
Lurking Test Security Threats
The Costs of Poor Security
What to do with Your Data Forensics Report
Talking to Your Organization about Data Forensics
We’ve been there. Enter your email to get a permanent copy of this guide sent directly to your inbox.
So you’re curious about data forensics (DF)? Good. If you’re already thinking about the health of your assessment, especially when it comes to security, then you’re on the right track! Give yourself a pat on the back.
But what is data forensics? How does it work? What security threats and vulnerabilities actually apply to your assessment? Consider this your ultimate guide, which will walk you through the basics of statistical analyses and explore security vulnerabilities that may be hidden within your certification program. Keep reading to learn about the hidden costs of poor exam security, what you should do after you conduct data forensics, and (importantly) how to help your organization adopt this program-strengthening practice.
Here’s to integrity!
What are some classic psychometric statistics that data forensics experts use to pinpoint patterns and other clues in testing data?
The path to exam validity is different for every certification program, but there are several milestones every program meets on the journey to exam integrity.
Whether you’ve experience a known incident, or you’ve decided to use data forensics for one of the reasons listed below, this is a critical first step.
From basic response booklets to online answer-change and response-time data, your vendor will want whatever you can provide to strengthen the results.
You should work with your vendor ahead of time to decide what kind of results you want to receive and put together a general security plan for incident response.
If your results show areas of potential vulnerability, work with your vendor to collect more evidence and investigate further.
If wrongdoing is uncovered by data forensics and proven in your investigation, then you should take the appropriate actions as outlined in your security plan.
Similarity statistics and source-copier statistics can sniff out examinees who peek at others’ exams or who share test content with other examinees.
Similarity statistics and flawed-key analyses detect the use of stolen exam content contained within “Test Killers,” distributed within small cheat rings and dispersed among test takers.
Wrong-to-right answer-change and similarity analyses can help detect educators and exam administrators who commit test fraud.
Data forensics can detect large-scale examinee collusion and support disciplinary actions by testing programs against individuals in cases of test fraud.
Data forensics can detect test sites operated by pirates and fraudsters and can provide the necessary evidence for taking legal action.
Data forensics can uncover the illicit activity of proxy test-takers or professionals for hire, who take tests for others, and the candidates who employ them.
You don’t need a disposable lid, bag, or box. Just download here.
Want to subscribe to our newsletter?