Compromised item detection: A Bayesian change-point perspective: A Bayesian change-point perspective

Research output: Contribution to journalArticlepeer-review

Abstract

Psychometric methods for accurate and timely detection of item compromise have been a long-standing topic. While Bayesian methods can incorporate prior knowledge or expert inputs as additional information for item compromise detection, they have not been employed in item compromise detection itself. The current study proposes a two-phase Bayesian change-point framework for both stationary and real-time detection of changes in each item's compromise status. In Phase I, a stationary Bayesian change-point model for compromise detection is fitted to the observed responses over a specified time-frame. The model produces parameter estimates for the change-point of each item from uncompromised to compromised, as well as structural parameters accounting for the post-change response distribution. Using the post-change model identified in Phase I, the Shiryaev procedure for sequential testing is employed in Phase II for real-time monitoring of item compromise. The proposed methods are evaluated in terms of parameter recovery, detection accuracy, and detection efficiency under various simulation conditions and in a real data example. The proposed method also showed superior detection accuracy and efficiency compared to the cumulative sum procedure.

Original languageEnglish (US)
Pages (from-to)131-153
Number of pages23
JournalBritish Journal of Mathematical and Statistical Psychology
Volume76
Issue number1
Early online dateSep 7 2022
DOIs
StatePublished - 2023

Keywords

  • Bayesian change-point detection
  • computerized tests
  • item compromise
  • Shiryaev procedure
  • test security

ASJC Scopus subject areas

  • Statistics and Probability
  • Arts and Humanities (miscellaneous)
  • General Psychology

Fingerprint

Dive into the research topics of 'Compromised item detection: A Bayesian change-point perspective: A Bayesian change-point perspective'. Together they form a unique fingerprint.

Cite this