Skip to main page content
U.S. flag

An official website of the United States government

Dot gov

The .gov means it’s official.
Federal government websites often end in .gov or .mil. Before sharing sensitive information, make sure you’re on a federal government site.

Https

The site is secure.
The https:// ensures that you are connecting to the official website and that any information you provide is encrypted and transmitted securely.

Access keys NCBI Homepage MyNCBI Homepage Main Content Main Navigation
. 2024 Nov;48(7-8):357-363.
doi: 10.1177/01466216241284410. Epub 2024 Sep 13.

A Mark-Recapture Approach to Estimating Item Pool Compromise

Affiliations

A Mark-Recapture Approach to Estimating Item Pool Compromise

Richard A Feinberg. Appl Psychol Meas. 2024 Nov.

Abstract

Testing organizations routinely investigate if secure exam material has been compromised and is consequently invalid for scoring and inclusion on future assessments. Beyond identifying individual compromised items, knowing the degree to which a form is compromised can inform decisions on whether the form can no longer be administered or when an item pool is compromised to such an extent that serious action on a broad scale must be taken to ensure the validity of score interpretations. Previous research on estimating the population of item compromise is sparse; however, this is a more generally long-studied problem in ecological research. In this note, we exemplify the utility of the mark-recapture technique to estimate the population of compromised items, first through a brief demonstration to introduce the fundamental concepts and then a more realistic scenario to illustrate applicability to large-scale testing programs. An effective use of this technique would be to longitudinally track changes in the estimated population to inform operational test security strategies. Many variations on mark-recapture exist and interpretation of the estimated population depends on several factors. Thus, this note is only meant to introduce the concept of mark-recapture as a useful application to evaluate a testing organization's compromise mitigation procedures.

Keywords: test security, item compromise, mark-recapture.

PubMed Disclaimer

Conflict of interest statement

The author(s) declared no potential conflicts of interest with respect to the research, authorship, and/or publication of this article.

Similar articles

References

    1. Carlson S. R., Coggins L. G., Swanton C. O. (1998). A simple stratified design for mark- recapture estimation of salmon smolt abundance. Alaska Fishery Research Bulletin, 5(1), 88–102.
    1. Chapman D. G. (1951). Some properties of the hypergeometric distribution with applications to zoological censuses. University of California Publications in Statistic, 1(7), 131–160.
    1. Fletcher D., Dawson S., Slooten E. (2002). Designing a mark-recapture study to allow for local emigration. Journal of Agricultural, Biological, and Environmental Statistics, 7(4), 586–593. 10.1198/108571102799 - DOI
    1. Han N., Hambleton R. (2008). Detecting exposed test items in computer-based testing. In Ramaswamy R., Wild C. (Eds.), Improving testing: Process tools and techniques to assure quality (pp. 323–348). Routledge.
    1. Hanson B. A., Harris D. J., Brennan R. L. (1994). A comparison of several statistical methods for examining allegations of copying (ACT Research Report Series No. 87-15). American College Testing.