390 likes | 509 Views
PUSHING THE BOUNDARIES OF REGULATION. 23 rd Annual Conference September 11-13, 2003 Westin Harbour Castle Toronto, Canada. Technology, Service and Delivery. September 12 th , 2003 1:30 – 3:00 p.m. Dan Luk CTO, Capstar.
E N D
PUSHING THE BOUNDARIES OF REGULATION 23rd Annual Conference September 11-13, 2003 Westin Harbour Castle Toronto, Canada
Technology, Service and Delivery September 12th, 2003 1:30 – 3:00 p.m. Dan Luk CTO, Capstar
First Topic:“Point and Click – Using the Internet to Enhance your Testing Program”
Why the Internet? • Convenient • Fast • 24 X 7 • Efficient • Cost-Effective
Why Not the Internet? • Security • Control • Fairness
Web Usage and GrowthSource http://www.nielsen-netratings.com/new.jsp on 1/8/2003
When to use the Internet? Pre-Test Post-Test
Test Development • Web-based Test Development Tools • Collaborative Computing • Item Development and Review • Resolve Geographical Differences • Security • Authentication • Access Restrictions • Encryption
Communications • Types of Technology • Push Technology • e.g. e-mail • Pull Technology • e.g. Web Site
Push Technology • Main Advantages • Selective or Targeted • Customized Contents • Concise • Main Disadvantages • “Spam” • Frequent Address Changes
Pull Technology • Main Advantages • General Availability • Broad-based Information • Information Available On-Demand • Consistent Messaging • Interactive Contents • Main Disadvantages • Must be Easy to Navigate • Must Visit Frequently to View New Contents • Random Arrival
Types of Information • Bulletins • Application Procedures • Application Forms • Study Materials • Practice Exams • Etc.
Registration/Scheduling • Self-Service Vs. Call Center • Accessibility • Skills • Online Help Vs. Help Desk • High Availability • Easy to Review Information or to Make Changes • Implementation Methods • Real-time • Back-end Processed
Registration/Scheduling (Continued) • Business Rule Enforcement • Upper Vs. Lower Case • Data Consistency Vs. Data Cleansing • Browser Compatibility • ADA Accommodation such as Section 508 Compliancy • E-commerce (Electronic Payment Required) • Identity Theft
Test Delivery • High Stake Vs. Low Stake • Anyone Can Test Vs. Positive ID • Proctored Vs. Self-proctored • Connection Performance • Timed Exams • Test Driver Features • Test Security • Browser Compatibility
Data Management • On-Demand Vs. FTP • Dynamic Vs. PDF • Registration/Scheduling Records • Eligibility Processing • Test Reporting • Psychometric Analysis
Capstar Internet Usage • Exceeded Expectations • Anticipate Continued Growth • Continued Area of Focus
When to use Technology? Pre-Test Post-Test
When to use Technology? Lie! Cheat! Steal!
Lie • Whom Are You Really Testing?
Lie • Typical Preventive Measures • Policies and Procedures as Deterrent • Positive Identification Via Proctor
Traditional Identification Techniques • Government Issued Pictured Ids • ATT • Tamper Resistance Paper and Printing • Smart Cards • Holographic Images • Microprints • Bar Code • Data Strip
Biometrics ‘Recently, the term "Biometrics" has also been used to refer to the emerging field of technology devoted to identification of individuals using biological traits, such as those based on retinal or iris scanning, fingerprints, or face recognition.’ http://stat.tamu.edu/Biometrics/
Biometrics (Continued) • Access to Testing Area • Authentication Process • Re-entry to Testing Area (Same Day Vs. Future) • Re-authentication Process (Same Day Vs. Future) • Initial Testing Vs. Repeat Testing • Same Person Vs. Different Person
Cheat • Typical Preventive Measures • Policies and Procedures as Deterrent • Rules for Taking Breaks • Business, Eligibility or Re-take Rules • Proctored Exams • Clean Test Rooms
Traditional Monitoring Techniques • Active Proctoring • Proctor Window • Video and Audio Surveillance
Other Monitoring Techniques • Remote Proctoring • Remote Video and Audio Surveillance • Back-end Monitoring • Extreme Low Score • Extreme High Score • Sudden Score Fluctuation • Time-to-respond • Item Performance • Form/Test Performance • DB Cross-checking
Other Monitoring Techniques • Biometrics • Candidate’s Photo • Access to Testing Area • Authentication Process • Re-entry to testing area • Re-Authentication Process
Steal • Reasons for Prevention to Include: • Intellectual Property Protection • Exam Integrity • Public Safety
Steal • Typical Preventive Measures • Policies and Procedures • Business, Eligibility or Re-take Rules • Rules for Taking Breaks • Active Proctoring • Proctor Window • Video and Audio Surveillance
Other Techniques • Remote Proctoring • Remote Video and Audio Surveillance • Back-end Monitoring • Extreme Low Score • Extreme High Score • Sudden Score Fluctuation • Time-to-respond • Item Performance • Form/Test Performance • DB Cross-checking
Other Techniques (Continued) • Initial Testing Vs. Repeat Testing • Same Person Vs. Different Person • New Items • New Forms • Continuous Testing Vs. Windowed Testing • Software Algorithms • Randomization • Computer Adaptive • Item Algorithms
Trade-off Security Cost
Other Technologies Used in Testing • Improved Paper-and-pencil Process • Dynamic Scanning and Scoring • Fax-based Scoring • Simulation-based Testing • Innovative Item Types • Computer-based Practical Testing • 3-D Display
Other Technologies Used in Testing (Continued) • Standards • SCORM • IMS QTI • Other Testing Devices • PDAs • Tablet PCs • IVR/Cell Phones • Alternate Devices • Wireless Technologies
Presentation Follow-up • Please pick up a handout from this presentation –AND/OR- • Please give me your business card to receive an e-mail of the presentation materials –OR- • Presentation materials will be posted on CLEAR’s website
Technology, Service and Delivery September 12th, 2003 1:30 – 3:00 p.m. Dan Luk CTO, Capstar