Cargando…
Compromised item detection: A Bayesian change‐point perspective
Psychometric methods for accurate and timely detection of item compromise have been a long‐standing topic. While Bayesian methods can incorporate prior knowledge or expert inputs as additional information for item compromise detection, they have not been employed in item compromise detection itself....
Autores principales: | , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
John Wiley and Sons Inc.
2022
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10086862/ https://www.ncbi.nlm.nih.gov/pubmed/36069306 http://dx.doi.org/10.1111/bmsp.12286 |
_version_ | 1785022235386314752 |
---|---|
author | Du, Yang Zhang, Susu Chang, Hua‐Hua |
author_facet | Du, Yang Zhang, Susu Chang, Hua‐Hua |
author_sort | Du, Yang |
collection | PubMed |
description | Psychometric methods for accurate and timely detection of item compromise have been a long‐standing topic. While Bayesian methods can incorporate prior knowledge or expert inputs as additional information for item compromise detection, they have not been employed in item compromise detection itself. The current study proposes a two‐phase Bayesian change‐point framework for both stationary and real‐time detection of changes in each item's compromise status. In Phase I, a stationary Bayesian change‐point model for compromise detection is fitted to the observed responses over a specified time‐frame. The model produces parameter estimates for the change‐point of each item from uncompromised to compromised, as well as structural parameters accounting for the post‐change response distribution. Using the post‐change model identified in Phase I, the Shiryaev procedure for sequential testing is employed in Phase II for real‐time monitoring of item compromise. The proposed methods are evaluated in terms of parameter recovery, detection accuracy, and detection efficiency under various simulation conditions and in a real data example. The proposed method also showed superior detection accuracy and efficiency compared to the cumulative sum procedure. |
format | Online Article Text |
id | pubmed-10086862 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2022 |
publisher | John Wiley and Sons Inc. |
record_format | MEDLINE/PubMed |
spelling | pubmed-100868622023-04-12 Compromised item detection: A Bayesian change‐point perspective Du, Yang Zhang, Susu Chang, Hua‐Hua Br J Math Stat Psychol Articles Psychometric methods for accurate and timely detection of item compromise have been a long‐standing topic. While Bayesian methods can incorporate prior knowledge or expert inputs as additional information for item compromise detection, they have not been employed in item compromise detection itself. The current study proposes a two‐phase Bayesian change‐point framework for both stationary and real‐time detection of changes in each item's compromise status. In Phase I, a stationary Bayesian change‐point model for compromise detection is fitted to the observed responses over a specified time‐frame. The model produces parameter estimates for the change‐point of each item from uncompromised to compromised, as well as structural parameters accounting for the post‐change response distribution. Using the post‐change model identified in Phase I, the Shiryaev procedure for sequential testing is employed in Phase II for real‐time monitoring of item compromise. The proposed methods are evaluated in terms of parameter recovery, detection accuracy, and detection efficiency under various simulation conditions and in a real data example. The proposed method also showed superior detection accuracy and efficiency compared to the cumulative sum procedure. John Wiley and Sons Inc. 2022-09-07 2023-02 /pmc/articles/PMC10086862/ /pubmed/36069306 http://dx.doi.org/10.1111/bmsp.12286 Text en © 2022 The Authors. British Journal of Mathematical and Statistical Psychology published by John Wiley & Sons Ltd on behalf of British Psychological Society. https://creativecommons.org/licenses/by-nc-nd/4.0/This is an open access article under the terms of the http://creativecommons.org/licenses/by-nc-nd/4.0/ (https://creativecommons.org/licenses/by-nc-nd/4.0/) License, which permits use and distribution in any medium, provided the original work is properly cited, the use is non‐commercial and no modifications or adaptations are made. |
spellingShingle | Articles Du, Yang Zhang, Susu Chang, Hua‐Hua Compromised item detection: A Bayesian change‐point perspective |
title | Compromised item detection: A Bayesian change‐point perspective |
title_full | Compromised item detection: A Bayesian change‐point perspective |
title_fullStr | Compromised item detection: A Bayesian change‐point perspective |
title_full_unstemmed | Compromised item detection: A Bayesian change‐point perspective |
title_short | Compromised item detection: A Bayesian change‐point perspective |
title_sort | compromised item detection: a bayesian change‐point perspective |
topic | Articles |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10086862/ https://www.ncbi.nlm.nih.gov/pubmed/36069306 http://dx.doi.org/10.1111/bmsp.12286 |
work_keys_str_mv | AT duyang compromiseditemdetectionabayesianchangepointperspective AT zhangsusu compromiseditemdetectionabayesianchangepointperspective AT changhuahua compromiseditemdetectionabayesianchangepointperspective |