{"id":7855,"date":"2017-08-30T13:01:53","date_gmt":"2017-08-30T11:01:53","guid":{"rendered":"http:\/\/newinsights.oeb.global\/?p=7855"},"modified":"2017-08-31T00:00:03","modified_gmt":"2017-08-30T22:00:03","slug":"taking-assessment-security-to-the-test-how-secure-is-the-digital-assessment-process-in-your-institution","status":"publish","type":"post","link":"https:\/\/oeb.global\/oeb-insights\/taking-assessment-security-to-the-test-how-secure-is-the-digital-assessment-process-in-your-institution\/","title":{"rendered":"Taking assessment security to the test: How secure is the digital assessment process in your institution?"},"content":{"rendered":"<p><strong>The strength of a chain depends on its weakest link. When it comes to assessment, how strong is the weakest link within your institution? Do lecturers send exam questions back and forth via e-mail? Is the item bank secured with two-factor authentication? Are you sure no one has left a copy of an exam in the printer? SURF, the collaborative ICT organisation for Dutch education and research, has developed a <a href=\"https:\/\/www.surf.nl\/binaries\/content\/assets\/surf\/en\/knowledgebase\/2017\/secure-assessment-workbook-surfnet.pdf\" target=\"_blank\" rel=\"noopener\">workbook<\/a> to help security officers and employees involved to securely organise the entire assessment process.<\/strong><\/p>\n<p>&nbsp;<\/p>\n<p>More and more educational institutions are discovering the merits of digital testing and assessment, which makes digital assessment the logical next step. Moreover, digital testing and assessment offers advantages in terms of improving the efficiency and quality of testing and delivering tests in a more authentic way. However, with the increasing popularity of this digitisation in Dutch higher education institutions, concerns about the security of the process have grown concomitantly.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Risks in the various stages of the assessment cycle<\/strong><\/p>\n<p>&nbsp;<\/p>\n<p>Institutions tend to focus on securing test administration as being the key moment where fraud might occur. However, other steps in the assessment life cycle also bear significant fraud and security risks. To help explain this, the various steps in the assessment life cycle and the possible risks involved are illustrated\u00a0 below.<\/p>\n<p><a href=\"https:\/\/oeb.global\/oeb-insights\/wp-content\/uploads\/2017\/08\/Peet-3.png\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-7869 size-full aligncenter\" src=\"https:\/\/oeb.global\/oeb-insights\/wp-content\/uploads\/2017\/08\/Peet-3.png\" alt=\"\" width=\"638\" height=\"638\" srcset=\"https:\/\/oeb.global\/oeb-insights\/wp-content\/uploads\/2017\/08\/Peet-3.png 638w, https:\/\/oeb.global\/oeb-insights\/wp-content\/uploads\/2017\/08\/Peet-3-300x300.png 300w, https:\/\/oeb.global\/oeb-insights\/wp-content\/uploads\/2017\/08\/Peet-3-150x150.png 150w, https:\/\/oeb.global\/oeb-insights\/wp-content\/uploads\/2017\/08\/Peet-3-125x125.png 125w\" sizes=\"auto, (max-width: 638px) 100vw, 638px\" \/><\/a>The<em> planning<\/em> stage of the process does not involve many critical security elements. The assessment matrix is usually not secret, making security threats small. In <em>the construction <\/em>stage, risks are much higher. Lecturers usually construct questions on their PCs (laptop, tablet), after which they store drafts \u2018somewhere\u2019 (local hard drive, unsecured network drive, in the cloud, USB stick, etc.) and e-mail them to colleagues for review. None of this is very secure at all unless measures are taken. If examination material is leaked ahead of time, the damage can be significant.<\/p>\n<p>&nbsp;<\/p>\n<p>While the<em> examination<\/em> is underway, many things can go wrong: cheating, unauthorised tampering with digital assessments, losing or deleting results, etc. During the<em> scoring<\/em> process, it is conceivable that there could be (digital) tampering with the results or that assessments could go missing or otherwise become corrupted. During <em>analysis<\/em>, the risk primarily comes from tampering with results and the pass mark (standardised set).<em> Reviewing<\/em>, especially on paper, is a step that is especially susceptible to fraud. This includes things like tampering with the replies or unauthorised copying of assessment questions. In addition, the reported results are confidential. <em>Evaluation<\/em> involves all of the exam programs, assessment materials and test results. Although integrity and confidentiality are important elements, they are implemented after a delay and are not traceable to an individual. Given that a period of revision and potential recovery is available between evaluation and reuse, risk is low during the evaluation stage.<\/p>\n<p>&nbsp;<\/p>\n<p>Finally, in the <em>management<\/em> stage, risks include unauthorised tampering during the storage of assessment questions; tampering with examination scripts or assessment results; and potential negative impact on the assessment\u2019s demonstrability and legitimacy if materials get lost.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Five steps toward secure assessment<\/strong><\/p>\n<p>&nbsp;<\/p>\n<p>Securing the assessment process is complex; within the various stages of the cycle, a number of stakeholders and systems are involved. Also, the need for security goes beyond digital assessment alone, if only because when lecturers prepare paper-based tests, they generally make use of IT as well.<\/p>\n<p>&nbsp;<\/p>\n<p>Unfortunately, there are no comprehensive measures that can solve all these problems in one go. In order to support institutions in making the assessment process secure, SURF has been working with experts from various higher education institutions to develop a workbook that helps to improve security along five steps:<\/p>\n<p><a href=\"https:\/\/oeb.global\/oeb-insights\/wp-content\/uploads\/2017\/08\/Peet-2.png\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-7860 size-full aligncenter\" src=\"https:\/\/oeb.global\/oeb-insights\/wp-content\/uploads\/2017\/08\/Peet-2.png\" alt=\"\" width=\"733\" height=\"338\" srcset=\"https:\/\/oeb.global\/oeb-insights\/wp-content\/uploads\/2017\/08\/Peet-2.png 733w, https:\/\/oeb.global\/oeb-insights\/wp-content\/uploads\/2017\/08\/Peet-2-300x138.png 300w\" sizes=\"auto, (max-width: 733px) 100vw, 733px\" \/><\/a>To achieve a secure assessment process, the workbook consists of tools to map out the institution\u2019s procedures in writing, to work out roles and responsibilities for all those involved, and to set up a list of measures that contribute to security during the entire endeavour.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Want to secure your own institution\u2019s assessment process?<\/strong><\/p>\n<p>&nbsp;<\/p>\n<p>At OEB 2017, on December 6th, SURF is organising a preconference workshop on secure assessment. The event will give participants insight into how to use the workbook (available in English: <a href=\"http:\/\/www.surf.nl\/secure-assessment-workbook\" target=\"_blank\" rel=\"noopener\">www.surf.nl\/secure-assessment-workbook<\/a>) and provide examples of practice in Dutch higher education.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The strength of a chain depends on its weakest link. When it comes to assessment, how strong is the weakest link within your institution? Do lecturers send exam questions back and forth via e-mail? Is the item bank secured with two-factor authentication? Are you sure no one has left a copy of an exam in [&hellip;]<\/p>\n<div class='heateorSssClear'><\/div><div  class='heateor_sss_sharing_container heateor_sss_horizontal_sharing' data-heateor-sss-href='https:\/\/oeb.global\/oeb-insights\/taking-assessment-security-to-the-test-how-secure-is-the-digital-assessment-process-in-your-institution\/' data-heateor-sss-no-counts=\"1\"><div class='heateor_sss_sharing_title' style=\"font-weight:bold\" ><\/div><div class=\"heateor_sss_sharing_ul\"><a aria-label=\"Linkedin\" class=\"heateor_sss_button_linkedin\" href=\"https:\/\/www.linkedin.com\/sharing\/share-offsite\/?url=https%3A%2F%2Foeb.global%2Foeb-insights%2Ftaking-assessment-security-to-the-test-how-secure-is-the-digital-assessment-process-in-your-institution%2F\" title=\"Linkedin\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg heateor_sss_s__default heateor_sss_s_linkedin\" style=\"background-color:#0077b5;width:20px;height:20px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"0 0 32 32\"><path d=\"M6.227 12.61h4.19v13.48h-4.19V12.61zm2.095-6.7a2.43 2.43 0 0 1 0 4.86c-1.344 0-2.428-1.09-2.428-2.43s1.084-2.43 2.428-2.43m4.72 6.7h4.02v1.84h.058c.56-1.058 1.927-2.176 3.965-2.176 4.238 0 5.02 2.792 5.02 6.42v7.395h-4.183v-6.56c0-1.564-.03-3.574-2.178-3.574-2.18 0-2.514 1.7-2.514 3.46v6.668h-4.187V12.61z\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><a aria-label=\"Bluesky\" class=\"heateor_sss_button_bluesky\" href=\"https:\/\/bsky.app\/intent\/compose?text=Taking%20assessment%20security%20to%20the%20test%3A%20How%20secure%20is%20the%20digital%20assessment%20process%20in%20your%20institution%3F%20https%3A%2F%2Foeb.global%2Foeb-insights%2Ftaking-assessment-security-to-the-test-how-secure-is-the-digital-assessment-process-in-your-institution%2F\" title=\"Bluesky\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg heateor_sss_s__default heateor_sss_s_bluesky\" style=\"background-color:#0085ff;width:20px;height:20px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg width=\"100%\" height=\"100%\" style=\"display:block;\" focusable=\"false\" aria-hidden=\"true\" viewBox=\"-3 -3 38 38\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M16 14.903c-.996-1.928-3.709-5.521-6.231-7.293C7.353 5.912 6.43 6.206 5.827 6.478 5.127 6.793 5 7.861 5 8.49s.346 5.155.572 5.91c.747 2.496 3.404 3.34 5.851 3.07.125-.02.252-.036.38-.052-.126.02-.253.037-.38.051-3.586.529-6.771 1.83-2.594 6.457 4.595 4.735 6.297-1.015 7.171-3.93.874 2.915 1.88 8.458 7.089 3.93 3.911-3.93 1.074-5.928-2.512-6.457a8.122 8.122 0 0 1-.38-.051c.128.016.255.033.38.051 2.447.271 5.104-.573 5.85-3.069.227-.755.573-5.281.573-5.91 0-.629-.127-1.697-.827-2.012-.604-.271-1.526-.566-3.942 1.132-2.522 1.772-5.235 5.365-6.231 7.293Z\" fill=\"#fff\"\/><\/svg><\/span><\/a><a aria-label=\"Facebook\" class=\"heateor_sss_facebook\" href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https%3A%2F%2Foeb.global%2Foeb-insights%2Ftaking-assessment-security-to-the-test-how-secure-is-the-digital-assessment-process-in-your-institution%2F\" title=\"Facebook\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg\" style=\"background-color:#0765FE;width:20px;height:20px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"0 0 32 32\"><path fill=\"#fff\" d=\"M28 16c0-6.627-5.373-12-12-12S4 9.373 4 16c0 5.628 3.875 10.35 9.101 11.647v-7.98h-2.474V16H13.1v-1.58c0-4.085 1.849-5.978 5.859-5.978.76 0 2.072.15 2.608.298v3.325c-.283-.03-.775-.045-1.386-.045-1.967 0-2.728.745-2.728 2.683V16h3.92l-.673 3.667h-3.247v8.245C23.395 27.195 28 22.135 28 16Z\"><\/path><\/svg><\/span><\/a><a aria-label=\"Email\" class=\"heateor_sss_email\" href=\"https:\/\/oeb.global\/oeb-insights\/taking-assessment-security-to-the-test-how-secure-is-the-digital-assessment-process-in-your-institution\/\" onclick=\"event.preventDefault();window.open('mailto:?subject=' + decodeURIComponent('Taking%20assessment%20security%20to%20the%20test%3A%20How%20secure%20is%20the%20digital%20assessment%20process%20in%20your%20institution%3F').replace('&', '%26') + '&body=https%3A%2F%2Foeb.global%2Foeb-insights%2Ftaking-assessment-security-to-the-test-how-secure-is-the-digital-assessment-process-in-your-institution%2F', '_blank')\" title=\"Email\" rel=\"noopener\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg\" style=\"background-color:#649a3f;width:20px;height:20px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"-.75 -.5 36 36\"><path d=\"M 5.5 11 h 23 v 1 l -11 6 l -11 -6 v -1 m 0 2 l 11 6 l 11 -6 v 11 h -22 v -11\" stroke-width=\"1\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><a aria-label=\"Teams\" class=\"heateor_sss_button_teams\" href=\"https:\/\/teams.microsoft.com\/share?href=https%3A%2F%2Foeb.global%2Foeb-insights%2Ftaking-assessment-security-to-the-test-how-secure-is-the-digital-assessment-process-in-your-institution%2F&msgText=Taking%20assessment%20security%20to%20the%20test%3A%20How%20secure%20is%20the%20digital%20assessment%20process%20in%20your%20institution%3F\" title=\"Teams\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg heateor_sss_s__default heateor_sss_s_teams\" style=\"background-color:#5059c9;width:20px;height:20px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg width=\"100%\" height=\"100%\" style=\"display:block;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 32 32\"><path fill=\"#fff\" d=\"M24.63 12.14a2.63 2.63 0 1 0 0-5.26 2.63 2.63 0 0 0 0 5.26Zm2.25.74h-3.29c.18.34.32.72.32 1.12v7.13c0 .74-.11 1.47-.34 2.14 2.01.36 3.94-.93 4.34-2.93.04-.25.09-.52.09-.76V14c0-.63-.52-1.12-1.12-1.12ZM16.75 4.87a3.515 3.515 0 0 0-3.49 3.87h1.73c1.19 0 2.14.97 2.14 2.14v.97c1.75-.2 3.1-1.69 3.1-3.49a3.48 3.48 0 0 0-3.49-3.49h.01Zm4.86 8.01h-4.48v8.01c0 1.19-.97 2.14-2.14 2.14h-3.94c.04.11.07.25.11.36.11.26.22.52.38.74a6.004 6.004 0 0 0 5.2 2.99c3.31 0 5.98-2.68 5.98-6.01v-7.14c0-.61-.49-1.09-1.12-1.09h.01Z\"><\/path><path fill=\"#fff\" d=\"M15 9.86H4.99c-.56 0-.99.45-.99.99v10.02c0 .56.45.99.99.99h10.02c.56 0 .99-.45.99-.99v-9.99c-.01-.56-.44-1.02-1-1.02Zm-2.02 3.74h-2.23v6.01H9.28V13.6H7.03v-1.49h5.96v1.49h-.02.01Z\"><\/path><\/svg><\/span><\/a><a aria-label=\"X\" class=\"heateor_sss_button_x\" href=\"https:\/\/twitter.com\/intent\/tweet?text=Taking%20assessment%20security%20to%20the%20test%3A%20How%20secure%20is%20the%20digital%20assessment%20process%20in%20your%20institution%3F&url=https%3A%2F%2Foeb.global%2Foeb-insights%2Ftaking-assessment-security-to-the-test-how-secure-is-the-digital-assessment-process-in-your-institution%2F\" title=\"X\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg heateor_sss_s__default heateor_sss_s_x\" style=\"background-color:#2a2a2a;width:20px;height:20px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg width=\"100%\" height=\"100%\" style=\"display:block;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 32 32\"><path fill=\"#fff\" d=\"M21.751 7h3.067l-6.7 7.658L26 25.078h-6.172l-4.833-6.32-5.531 6.32h-3.07l7.167-8.19L6 7h6.328l4.37 5.777L21.75 7Zm-1.076 16.242h1.7L11.404 8.74H9.58l11.094 14.503Z\"><\/path><\/svg><\/span><\/a><\/div><div class=\"heateorSssClear\"><\/div><\/div><div class='heateorSssClear'><\/div>","protected":false},"author":26,"featured_media":7869,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","_links_to":"","_links_to_target":""},"categories":[209],"tags":[],"class_list":["post-7855","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news"],"_links":{"self":[{"href":"https:\/\/oeb.global\/oeb-insights\/wp-json\/wp\/v2\/posts\/7855","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/oeb.global\/oeb-insights\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/oeb.global\/oeb-insights\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/oeb.global\/oeb-insights\/wp-json\/wp\/v2\/users\/26"}],"replies":[{"embeddable":true,"href":"https:\/\/oeb.global\/oeb-insights\/wp-json\/wp\/v2\/comments?post=7855"}],"version-history":[{"count":11,"href":"https:\/\/oeb.global\/oeb-insights\/wp-json\/wp\/v2\/posts\/7855\/revisions"}],"predecessor-version":[{"id":7876,"href":"https:\/\/oeb.global\/oeb-insights\/wp-json\/wp\/v2\/posts\/7855\/revisions\/7876"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/oeb.global\/oeb-insights\/wp-json\/wp\/v2\/media\/7869"}],"wp:attachment":[{"href":"https:\/\/oeb.global\/oeb-insights\/wp-json\/wp\/v2\/media?parent=7855"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/oeb.global\/oeb-insights\/wp-json\/wp\/v2\/categories?post=7855"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/oeb.global\/oeb-insights\/wp-json\/wp\/v2\/tags?post=7855"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}