| Literature DB >> 31105612 |
Cheng Liu1,2,3, Kyung T Han4, Jun Li1.
Abstract
Item leakage has been a serious issue in continuous, computer-based testing, especially computerized adaptive testing (CAT), as compromised items jeopardize the fairness and validity of the test. Strategies to detect and address the problem of compromised items have been proposed and investigated, but many solutions are computationally intensive and thus difficult to apply in real-time monitoring. Recently, researchers have proposed several sequential methods aimed at fast detection of compromised items, but applications of these methods have not considered various scenarios of item leakage. In this paper, we introduce a model with a leakage parameter to better characterize the item leaking process and develop a more generalized detection method on its basis. The new model achieves a high level of detection accuracy while maintaining the type-I error at the nominal level, for both fast and slow leakage scenarios. The proposed model also estimates the time point at which an item becomes compromised, thus providing additional useful information for testing practitioners.Entities:
Keywords: CAT; compromised item detection; computerized adaptive testing; generalized linear model; test security
Year: 2019 PMID: 31105612 PMCID: PMC6499181 DOI: 10.3389/fpsyg.2019.00829
Source DB: PubMed Journal: Front Psychol ISSN: 1664-1078
Figure 1Representative Curves for Different Scenarios. (A) Item without any leakage; (B) Item with slow leakage; (C) Item with fast leakage; (D) Item with leakage that goes back thereafter.
Figure 2Comparison of link functions with logit and cloglog transformations.
Detection accuracy and Type-I error for organized item theft (standard error is given in parenthesis).
| 0.05 | 93.70 (0.54) | 4.49 (0.37) |
| 0.10 | 99.86 (0.09) | 6.56 (0.56) |
| 0.30 | 99.93 (0.06) | 7.67 (0.70) |
| 0.50 | 99.43 (0.27) | 4.09 (0.76) |
| 0.70 | 99.61 (0.13) | 4.89 (0.74) |
| 1.00 | 99.04 (0.16) | 4.99 (0.34) |
| 1.50 | 98.85 (0.26) | 4.32 (0.83) |
Figure 3Distribution of the detection day for organized item theft.
Detection lag and estimation lag for organized item theft (standard error is given in parenthesis).
| 0.05 | 17.47 (0.16) | 0.61 (0.19) | 0.58 |
| 0.10 | 10.61 (0.11) | –0.46 (0.11) | 0.65 |
| 0.30 | 4.69 (0.06) | –0.95 (0.04) | 0.76 |
| 0.50 | 3.47 (0.05) | –1.07 (0.03) | 0.82 |
| 0.70 | 3.03 (0.05) | –1.13 (0.02) | 0.88 |
| 1.00 | 3.11 (0.08) | –1.07 (0.02) | 0.96 |
| 1.50 | 4.96 (0.14) | –1.00 (0.01) | 1.00 |
Figure 4Item distribution of Type-I error items for organized item theft.
Figure 5Ability Estimation with/without Suspicious Items for Organized Item Theft. (A) correlation of estimated with true θ; (B) RMSE of estimated ; (C) effective number of items after removing suspicious items. (X axis is log scale).
Detection accuracy and Type-I error for random item leakage (standard error is given in parenthesis).
| 0.05 | 67.63 (2.61) | 2.02 (0.44) |
| 0.10 | 87.00 (1.98) | 4.54 (0.43) |
| 0.30 | 96.64 (1.03) | 5.14 (0.92) |
| 0.50 | 98.80 (0.33) | 4.67 (1.27) |
| 0.70 | 99.13 (0.50) | 4.85 (0.50) |
| 1.00 | 99.79 (0.10) | 5.22 (0.90) |
| 1.50 | 99.74 (0.14) | 4.01 (0.83) |
Figure 6Distribution of the detection day for random item leakage.
Detection lag and estimation lag for random item leakage (standard error is given in parenthesis).
| 0.05 | 12.42 (0.15) | 0.66 (0.16) | 0.46 |
| 0.10 | 7.76 (0.08) | 0.18 (0.08) | 0.54 |
| 0.30 | 3.88 (0.05) | –0.90 (0.05) | 0.69 |
| 0.50 | 3.00 (0.04) | –1.00 (0.04) | 0.78 |
| 0.70 | 2.66 (0.04) | –1.16 (0.04) | 0.84 |
| 1.00 | 2.38 (0.04) | –1.14 (0.03) | 0.91 |
| 1.50 | 2.64 (0.07) | –1.17 (0.03) | 0.98 |
Figure 7Item distribution of Type-I error items for random item leakage.
Figure 8Ability Estimation with/without Suspicious Items for Random Item Leakage. (A) correlation of estimated with true θ; (B) RMSE of estimated ; (C) effective number of items after removing suspicious items. (X axis is log scale).
Application of Zhang's sequential method to random leakage scenario.
| 0.05 | 99.68 | 89.87 | 94.50 | 48.36 | 73.95 | 8.90 | 37.44 | 1.58 |
| 0.1 | 99.87 | 84.29 | 98.08 | 42.37 | 91.78 | 9.75 | 71.31 | 2.95 |
| 0.3 | 99.40 | 77.97 | 99.31 | 39.00 | 97.18 | 9.30 | 90.51 | 2.98 |
| 0.5 | 99.93 | 77.89 | 99.74 | 37.83 | 98.01 | 8.56 | 92.05 | 2.75 |
| 0.7 | 99.94 | 74.96 | 99.68 | 32.80 | 97.78 | 6.79 | 93.06 | 2.46 |
| 1.0 | 100.00 | 76.40 | 99.41 | 35.60 | 96.81 | 8.11 | 91.46 | 2.46 |
| 1.5 | 99.93 | 74.40 | 99.01 | 32.38 | 95.74 | 7.47 | 91.36 | 1.98 |
Application of Zhang's sequential method to organized theft scenario.
| 0.05 | 100.00 | 81.81 | 99.81 | 36.89 | 91.75 | 9.04 | 44.80 | 2.63 |
| 0.1 | 99.93 | 72.07 | 98.86 | 36.41 | 95.32 | 9.66 | 56.41 | 3.89 |
| 0.3 | 99.93 | 75.37 | 99.93 | 40.17 | 92.22 | 11.56 | 64.05 | 4.51 |
| 0.5 | 99.93 | 76.72 | 99.63 | 41.27 | 90.39 | 11.92 | 61.03 | 3.10 |
| 0.7 | 99.68 | 79.17 | 99.65 | 42.74 | 83.88 | 10.96 | 60.33 | 2.80 |
| 1.0 | 99.54 | 76.60 | 96.63 | 40.86 | 80.73 | 9.96 | 61.54 | 2.56 |
| 1.5 | 99.19 | 77.48 | 93.23 | 43.83 | 74.96 | 10.34 | 56.59 | 1.88 |
Figure 9Number of items that are flagged as compromised with different α for two models.