When people want to take action but have difficulty following through, behavioral design tools called “nudges” can help. Learn how you can use nudges in assessment to support examinees, subject-matter experts and other stakeholders in taking actions they already want to do.
When was the last time you checked in on the security of your organization’s exams? As technology evolves, so do tactics of those trying to thwart efforts to keep tests and intellectual property as secure as possible.
Setting up a new high-quality certification program takes time, resources and a considerable amount of planning. This article will provide a roadmap of recommended steps organizations may wish to consider during strategic planning of a new certification program.
Data forensics can be a valuable tool to help identify test security breaches and irregular testing behavior, and it can be used to trigger a test-security investigation. In this article, we look at a few methods that can be used to help detect such instances of cheating.
The popularity of stackable credentials offer promise toward closing the skills gap that many U.S. companies seem to face. However, there are differing definitions of what stackable credentials are. This article attempts to clarify and dispel some of the myths according to widely-recognized sources.