Cargando…

Compromised item detection: A Bayesian change‐point perspective

Psychometric methods for accurate and timely detection of item compromise have been a long‐standing topic. While Bayesian methods can incorporate prior knowledge or expert inputs as additional information for item compromise detection, they have not been employed in item compromise detection itself....

Descripción completa

Detalles Bibliográficos
Autores principales: Du, Yang, Zhang, Susu, Chang, Hua‐Hua
Formato: Online Artículo Texto
Lenguaje:English
Publicado: John Wiley and Sons Inc. 2022
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10086862/
https://www.ncbi.nlm.nih.gov/pubmed/36069306
http://dx.doi.org/10.1111/bmsp.12286
_version_ 1785022235386314752
author Du, Yang
Zhang, Susu
Chang, Hua‐Hua
author_facet Du, Yang
Zhang, Susu
Chang, Hua‐Hua
author_sort Du, Yang
collection PubMed
description Psychometric methods for accurate and timely detection of item compromise have been a long‐standing topic. While Bayesian methods can incorporate prior knowledge or expert inputs as additional information for item compromise detection, they have not been employed in item compromise detection itself. The current study proposes a two‐phase Bayesian change‐point framework for both stationary and real‐time detection of changes in each item's compromise status. In Phase I, a stationary Bayesian change‐point model for compromise detection is fitted to the observed responses over a specified time‐frame. The model produces parameter estimates for the change‐point of each item from uncompromised to compromised, as well as structural parameters accounting for the post‐change response distribution. Using the post‐change model identified in Phase I, the Shiryaev procedure for sequential testing is employed in Phase II for real‐time monitoring of item compromise. The proposed methods are evaluated in terms of parameter recovery, detection accuracy, and detection efficiency under various simulation conditions and in a real data example. The proposed method also showed superior detection accuracy and efficiency compared to the cumulative sum procedure.
format Online
Article
Text
id pubmed-10086862
institution National Center for Biotechnology Information
language English
publishDate 2022
publisher John Wiley and Sons Inc.
record_format MEDLINE/PubMed
spelling pubmed-100868622023-04-12 Compromised item detection: A Bayesian change‐point perspective Du, Yang Zhang, Susu Chang, Hua‐Hua Br J Math Stat Psychol Articles Psychometric methods for accurate and timely detection of item compromise have been a long‐standing topic. While Bayesian methods can incorporate prior knowledge or expert inputs as additional information for item compromise detection, they have not been employed in item compromise detection itself. The current study proposes a two‐phase Bayesian change‐point framework for both stationary and real‐time detection of changes in each item's compromise status. In Phase I, a stationary Bayesian change‐point model for compromise detection is fitted to the observed responses over a specified time‐frame. The model produces parameter estimates for the change‐point of each item from uncompromised to compromised, as well as structural parameters accounting for the post‐change response distribution. Using the post‐change model identified in Phase I, the Shiryaev procedure for sequential testing is employed in Phase II for real‐time monitoring of item compromise. The proposed methods are evaluated in terms of parameter recovery, detection accuracy, and detection efficiency under various simulation conditions and in a real data example. The proposed method also showed superior detection accuracy and efficiency compared to the cumulative sum procedure. John Wiley and Sons Inc. 2022-09-07 2023-02 /pmc/articles/PMC10086862/ /pubmed/36069306 http://dx.doi.org/10.1111/bmsp.12286 Text en © 2022 The Authors. British Journal of Mathematical and Statistical Psychology published by John Wiley & Sons Ltd on behalf of British Psychological Society. https://creativecommons.org/licenses/by-nc-nd/4.0/This is an open access article under the terms of the http://creativecommons.org/licenses/by-nc-nd/4.0/ (https://creativecommons.org/licenses/by-nc-nd/4.0/) License, which permits use and distribution in any medium, provided the original work is properly cited, the use is non‐commercial and no modifications or adaptations are made.
spellingShingle Articles
Du, Yang
Zhang, Susu
Chang, Hua‐Hua
Compromised item detection: A Bayesian change‐point perspective
title Compromised item detection: A Bayesian change‐point perspective
title_full Compromised item detection: A Bayesian change‐point perspective
title_fullStr Compromised item detection: A Bayesian change‐point perspective
title_full_unstemmed Compromised item detection: A Bayesian change‐point perspective
title_short Compromised item detection: A Bayesian change‐point perspective
title_sort compromised item detection: a bayesian change‐point perspective
topic Articles
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10086862/
https://www.ncbi.nlm.nih.gov/pubmed/36069306
http://dx.doi.org/10.1111/bmsp.12286
work_keys_str_mv AT duyang compromiseditemdetectionabayesianchangepointperspective
AT zhangsusu compromiseditemdetectionabayesianchangepointperspective
AT changhuahua compromiseditemdetectionabayesianchangepointperspective