Security Services
We’ve built on our industry experience to provide comprehensive security solutions that combine our psychometric consulting team’s expertise with CM Connect data management and automation. These solutions directly address feedback from our existing clients as well as the challenges commonly discussed at industry events like conferences and presentations related to the needs of a full-service security solution. Specifically, Alpine offers
- Timely analyses generated as data are imported,
- Consultation with psychometric and security experts to support decision making, and
- Automated follow-up actions to lessen the time needed from program staff.
After setup, these security services can be automated to require minimal management from program staff.
Systematic Security
Prevention
Our comprehensive support begins with consultation from a psychometrician and a security expert to review the program’s current preventive actions. We’ll identify gaps in the current processes and policies that deter potential anomalous testing behavior, such as collusion, item preknowledge and exposure, and proxy test taking. We tailor our support to the program’s needs and specific exams to align with the risk factors, tolerance levels, and programmatic constraints.
Detection
We offer a multitude of data forensics and statistical analyses and flagging capabilities that can be selected, combined, and tailored for each program. Once selected, these means of detection are generated upon data import from delivery partners, meaning that they occur during, rather than after, test administrations. The result is near real-time security analyses for each program.
Mitigation
In addition to supporting follow-up actions with candidates, we also utilize security information to inform the life cycle of exams and programs. Specifically, this relates to the schedule and administration approach of exam forms and needs for ongoing development activities to maintain and support sound, test-based decision making for each program.
Enforcement
Through close collaboration and according to the policies of individual programs, we will generate automated follow-up actions based on the results of security analyses. For example, we can send warning communications to candidates, delay score reporting, alter credential status, and/or identify candidates for further investigation or action.