The Detection + Reaction Lockbox
Jamie Mulkey, Ed.D., CESP
Jamie Mulkey, Ed.D., CESP, VP of Sales Enablement, Caveon
What's in Your Detection Toolkit?
Dr. Jamie Mulkey is Vice President of Sales Enablement for Caveon. Dr. Mulkey has a distinguished history; holding major positions in testing organizations, certification task forces, and testing-related non-profit associations. As a Caveon founder, Jamie was a major contributor to shaping the testing industry’s discussion around test security and bringing test security services to market. Dr. Mulkey believes that sound, secure test security planning and practices provide the foundation for quality testing and trustworthy results. Her current focus is working with clients to design pre-emptive policies and processes that protect their most important assets—their tests. Dr. Mulkey is also the Executive Director of the Institute for Exam Security (i4ES), whose mission it is to broaden the understanding and importance of test security.
Many of you undoubtedly have toolkits for various routine tasks, as well as for the occasional emergency that surfaces. You likely have a toolkit in your car to fix a flat tire. If you’re like me, you have a small toolkit in your kitchen with hammers, screwdrivers, tape, picture hangers, 3M strips, and nails to do minor repairs, hang pictures, and tighten loose screws. If you’re a gardener, you may have a potter’s workbench with a hand rake, a spade, and pruning shears. But what’s in your toolkit for detecting test security problems? “Hmmm,” you may be thinking. “I’m not sure I HAVE a test security detection toolkit.” Well, good news! If you don’t have a toolbox for detecting potential test security threats, or if you’re looking to revamp yours, here’s a list of five tools every detection toolkit should have (plus a handy printable for my fellow list enthusiasts!):

1. Identification Systems

When we come across an individual taking a high-stakes exam (or any exam for that matter), I’m sure we can all relate to asking ourselves, “Is this person who they say they are,” “Do we have the right candidate for the right exam,” or “Could this be an imposter taking a test for someone else?” Luckily, we have detection tools—such as biometrics, anatomy scans, and facial recognition—for identifying and authenticating test-takers and solving these exact scenarios. Artificial Intelligence is continually making these tools more efficient and effective in verifying an individual’s identity.
2. Data Forensics

If you’re looking for a way to reduce the fear of unknown test-taking maleficence, using statistical analysis to detect irregularities in exam performance can help your program better understand your exam’s health, and take action when anomalous results are uncovered. With Data Forensics, you have access to compelling information about your program’s potential test security risks, which can give you a jump start on taking steps to mitigate those risks.
3. Web and Media Monitoring

Recent concerns with data privacy have given us pause in how we manage important information in electronic spaces. Testing programs need to check the Internet and social media sites to ensure test content isn’t being shared or sold for the benefit of those who use unorthodox and unsanctioned methods for test preparation. Continuously conducting web and media monitoring keeps your program ever-vigilant and allows you to swiftly respond when content does unceremoniously appear online.
4. On-Site Monitoring

Observing test-takers and verifying that your test administration protocols are being followed sets a precedent for taking action when processes aren’t appropriately administered. By including an on-site monitoring plan in your detection toolkit, your testing program can train observers to the right standard, allowing you to make corrections when inappropriate test administration activities arise.
5. Video Recording

Where feasible and lawful, testing programs should use video recording capabilities to memorialize test administration sessions. Recordings are a source of evidence when test-takers make bad choices about skirting test administration rules. Having this tool of detection can provide corroborating evidence when wrongdoing does occur.
Of all the toolkits you have at your disposal, your Detection Toolkit is among the most critical. With it, you have the power to identify and mitigate test security incidents, enabling you to swiftly and consistently manage any security incidents just as soon as they arise.
You might also like...
More Reads
Ghosts and Ghouls are no competition for these test security nightmares! Find out how Detection and Reaction methods go hand-in-hand at obliterating your program's worst fears and achieving your heftiest test integrity goals.
In a world where social media dominates online discourse and braindump conglomerates threaten to destroy, web patrol acts as one of the most powerful security tools in detecting fraud and defending our tests.
Submit
Join our mailing list
Thanks!
Copyright© 2019 Caveon, LLC.
All rights reserved. Privacy Policy | Terms of Use
Contact
Interested in learning more about how to secure your testing program? Want to contribute to this magazine? Contact us.
Download & print for a handy way to check off your "Deterrence To-Do's"!
TAP AND HOLD THUMBNAIL TO DOWNLOAD