Publication Date
In 2025 | 0 |
Since 2024 | 3 |
Since 2021 (last 5 years) | 5 |
Since 2016 (last 10 years) | 10 |
Since 2006 (last 20 years) | 14 |
Descriptor
Computer Assisted Testing | 15 |
Computer Security | 15 |
Comparative Analysis | 4 |
Computer Software | 4 |
Test Format | 4 |
Adaptive Testing | 3 |
Foreign Countries | 3 |
Language Tests | 3 |
Scores | 3 |
Second Language Learning | 3 |
Test Items | 3 |
More ▼ |
Source
Author
Ayfer Beylik | 1 |
Baris Yigit | 1 |
Cai, Yan | 1 |
Chang, Hua-Hua | 1 |
Chen, Yong | 1 |
Choi, Ikkyu | 1 |
Clarke, Nathan L. | 1 |
Davis, Laurie Laughlin | 1 |
Dawson, Phillip | 1 |
Deane, Paul | 1 |
Eckerly, Carol | 1 |
More ▼ |
Publication Type
Journal Articles | 15 |
Reports - Research | 15 |
Information Analyses | 1 |
Education Level
Higher Education | 4 |
Postsecondary Education | 3 |
Secondary Education | 2 |
Adult Education | 1 |
High School Equivalency… | 1 |
High Schools | 1 |
Audience
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
William Belzak; J. R. Lockwood; Yigal Attali – Educational Measurement: Issues and Practice, 2024
Remote proctoring, or monitoring test takers through internet-based, video-recording software, has become critical for maintaining test security on high-stakes assessments. The main role of remote proctors is to make judgments about test takers' behaviors and decide whether these behaviors constitute rule violations. Variability in proctor…
Descriptors: Computer Security, High Stakes Tests, English (Second Language), Second Language Learning
Esra Pinar Uça Günes; Nuray Gedik; Mehmet Ali Isikoglu; Baris Yigit; Ihsan Günes; Ayfer Beylik – Open Praxis, 2024
The primary objective of this manuscript is to examine the online assessment and exam security procedures during the pandemic, with a particular focus on higher education. In this context, the study investigates the measures employed by instructors, the challenges they encountered, and the strategies they employed to overcome these challenges in a…
Descriptors: Tests, Distance Education, Supervision, COVID-19
Yishen Song; Qianta Zhu; Huaibo Wang; Qinhua Zheng – IEEE Transactions on Learning Technologies, 2024
Manually scoring and revising student essays has long been a time-consuming task for educators. With the rise of natural language processing techniques, automated essay scoring (AES) and automated essay revising (AER) have emerged to alleviate this burden. However, current AES and AER models require large amounts of training data and lack…
Descriptors: Scoring, Essays, Writing Evaluation, Computer Software
Liu, Shuchang; Cai, Yan; Tu, Dongbo – Journal of Educational Measurement, 2018
This study applied the mode of on-the-fly assembled multistage adaptive testing to cognitive diagnosis (CD-OMST). Several and several module assembly methods for CD-OMST were proposed and compared in terms of measurement precision, test security, and constrain management. The module assembly methods in the study included the maximum priority index…
Descriptors: Adaptive Testing, Monte Carlo Methods, Computer Security, Clinical Diagnosis
Whitelock, Denise; Edwards, Chris; Okada, Alexandra – Journal of Learning for Development, 2020
The EU-funded TeSLA project -- Adaptive Trust-based e-Assessment System for Learning (http://tesla-project.eu) -- has developed a suite of instruments for e-Authentication. These include face recognition, voice recognition, keystroke dynamics, forensic analysis and plagiarism detection, which were designed for integration within a university's…
Descriptors: Computer Security, Electronic Learning, Student Attitudes, Teacher Attitudes
Dawson, Phillip – British Journal of Educational Technology, 2016
Bring-your-own-device electronic examinations (BYOD e-exams) are a relatively new type of assessment where students sit an in-person exam under invigilated conditions with their own laptop. Special software restricts student access to prohibited computer functions and files, and provides access to any resources or software the examiner approves.…
Descriptors: Cheating, Computer Software, Laptop Computers, Computer Security
Choi, Ikkyu; Hao, Jiangang; Deane, Paul; Zhang, Mo – ETS Research Report Series, 2021
"Biometrics" are physical or behavioral human characteristics that can be used to identify a person. It is widely known that keystroke or typing dynamics for short, fixed texts (e.g., passwords) could serve as a behavioral biometric. In this study, we investigate whether keystroke data from essay responses can lead to a reliable…
Descriptors: Accuracy, High Stakes Tests, Writing Tests, Benchmarking
Eckerly, Carol; Smith, Russell; Sowles, John – Practical Assessment, Research & Evaluation, 2018
The Discrete Option Multiple Choice (DOMC) item format was introduced by Foster and Miller (2009) with the intent of improving the security of test content. However, by changing the amount and order of the content presented, the test taking experience varies by test taker, thereby introducing potential fairness issues. In this paper we…
Descriptors: Culture Fair Tests, Multiple Choice Tests, Testing, Test Items
Sharma, Vipin K.; Holbah, Wael A. – Arab World English Journal, 2022
The study investigates teachers' perceptions of the use of online language assessment (OLA) using technology and examines the scope of using online applications to validate the mode of assessment. It looks for EFL teachers' opinions of OLA to comprehend the many worries associated with the issues and improve the online assessment tools. The…
Descriptors: Language Teachers, Teacher Attitudes, English (Second Language), Second Language Learning
Goertler, Senta; Gacs, Adam – Unterrichtspraxis/Teaching German, 2018
As online educational programs and courses increase (Allen & Seaman, [Allen, I. E., 2014]), it is important to understand the benefits and limitations of this delivery format when assessing students and when comparing learning outcomes. This article addresses the following two questions: (1) What are some of the best practices in assessing…
Descriptors: Online Courses, Second Language Instruction, Second Language Learning, German
Post, Gerald V.; Hargis, Jace – Decision Sciences Journal of Innovative Education, 2012
Online education and computer-assisted instruction (CAI) have existed for years, but few general tools exist to help instructors create and evaluate lessons. Are these tools sufficient? Specifically, what elements do instructors want to see in online testing tools? This study asked instructors from various disciplines to identify and evaluate the…
Descriptors: Computer Assisted Testing, Computer Software, Test Construction, Design Preferences
Chen, Yong; He, Wu – International Review of Research in Open and Distance Learning, 2013
This paper describes a survey of online learning which attempts to determine online learning providers' awareness of potential security risks and the protection measures that will diminish them. The authors use a combination of two methods: blog mining and a traditional literature search. The findings indicate that, while scholars have…
Descriptors: Computer Security, Risk, Online Courses, Electronic Publishing
Levy, Yair; Ramim, Michelle M.; Furnell, Steven M.; Clarke, Nathan L. – Campus-Wide Information Systems, 2011
Purpose: Concerns for information security in e-learning systems have been raised previously. In the pursuit for better authentication approaches, few schools have implemented students' authentication during online exams beyond passwords. This paper aims to assess e-learners' intention to provide multibiometric data and use of multibiometrics…
Descriptors: Computer Assisted Testing, Computer Security, Human Body, Identification
Yi, Qing; Zhang, Jinming; Chang, Hua-Hua – ETS Research Report Series, 2006
Chang and Zhang (2002, 2003) proposed several baseline criteria for assessing the severity of possible test security violations for computerized tests with high-stakes outcomes. However, these criteria were obtained from theoretical derivations that assumed uniformly randomized item selection. The current study investigated potential damage caused…
Descriptors: Computer Assisted Testing, Adaptive Testing, Test Items, Computer Security
Davis, Laurie Laughlin – Applied Psychological Measurement, 2004
Choosing a strategy for controlling item exposure has become an integral part of test development for computerized adaptive testing (CAT). This study investigated the performance of six procedures for controlling item exposure in a series of simulated CATs under the generalized partial credit model. In addition to a no-exposure control baseline…
Descriptors: Adaptive Testing, Computer Assisted Testing, Test Items, Achievement Tests