Open Conference Systems, ITC 2016 Conference

Font Size: 
SYMPOSIUM: Combatting Technology-Enhanced Efforts to Cheat and to Steal Items from High Stakes Examinations
John Fremer, Ardeshir Geranpayeh, Alex Tong

Building: Pinnacle
Room: 3F-Port of New York
Date: 2016-07-04 11:00 AM – 12:30 PM
Last modified: 2016-06-08

Abstract


The problem of cheating and test item theft continues to grow in all of the countries that make substantial use of high stakes examinations to make decisions in admissions, school evaluation, selection and promotion, and other critical areas.  The problem has existed for decades and can be found even in historical records going back to the time of the emperors in China and to the Middle Ages and earlier in Europe.

In recent years, technology-enhanced efforts to cheat have become increasingly common.  Cameras are concealed in everyday objects - eyeglasses, watches, pens, jewelry, etc.  Sophisticated communication devices relay answers into the testing room to test takers with concealed and hard to detect receivers.  Literally dozens of devices are being used and the validity of test results is being undermined to a very troubling extent.

The first presentation, by a leading test security professional from the UK will describe activities that are intended to deter or detect such technology-enhanced efforts to cheat.  The first presentation will describe the kinds of devices readily obtainable from the Internet and how proctors or invigilators can be trained to detect attempts to use such devices.  Attendees for this presentation will see specific and practical examples of methods to build the skills and knowledge of test administrators, our first line of defense for test validity.

The second presentation will describe an effort to cooperate across a number of testing entities in Asia to scope out the technology-based cheating problem.  What cheating and test theft efforts are being attempted? What counter strategies are being employed and to what effect?  How are test administration policies and procedures being revised?  What are the test security practices that seem most in need of revision in the light of these technology-based cheating efforts?

The final presentation will address detection and follow-up on efforts to cheat and to steal test items of otherwise comprise test results, by changing the answers to questions or altering test scores, for example. Methods being employed and their strengths and weaknesses will be reviewed.  A model detection and investigation program will be presented.


An account with this site is required in order to view papers. Click here to create an account.