Biomedical Engineering Reference
In-Depth Information
9.5.1 Test security
Assessment of training can place trainees under considerable
personal and organizational pressure to succeed. 30 In
addition, valid assessment forms can be quite costly to
develop.
Therefore, attention must be paid to ensuring test security
- that is ensuring that the training event and associated
performance are secure in terms of the fi ve dimensions of the
behavioral objectives listed above. The performance must be
identifi ably that of the individual trainee, under the stipulated
conditions, and demonstrably successful (or not). These
security issues have been highlighted by the increasingly
widespread use of on-line testing and assessment. 31 The
security issues have much longer history, of course, as a
review of test security problems involving home-schooled
children makes clear. 32
There are several approaches to test security for assessment
of training. These include verifying the identity of the
trainees, and monitoring the assessments. These approaches
are familiar to those of us who work in regulated industry,
and should be stipulated in an appropriate training SOP. 33
Verifying the identities of users (trainees) in the case of
on-line testing and assessment means being Part 11
compliant. 34 Monitoring the assessment of training means
having the task defi ned in the Action column, and the
responsibility for that task listed in the Responsibilities
column of the relevant operational SOP. 35
In this section we have commented on several issues
that arise as we incorporate assessments into the training
module. These include the timing of assessments - whether
to conduct assessments before, during, or after the training
event - as well as how to ensure the integrity of the assessment
process.
￿ ￿ ￿ ￿ ￿
Search WWH ::




Custom Search