SlideShare a Scribd company logo
1 of 35
Leveraging Social Media to Protect
Your Intellectual Property
Jamie Mulkey, Ed.D.
Jen Baldwin
May 21, 2014
Caveon Webinar Series
The Social Media Party
www.caveon.com 2
Today We’ll Talk About…
• Structure of information dissemination (front
office / back office)
• How people gain access to stolen test content
and spread this information quickly
• What to do to pre-empt this activity to reduce
item exposure and prevent cheaters from
gaining an unfair advantage
www.caveon.com 3
www.caveon.com
Headline News
4
How Big is the Problem?
www.caveon.com
Facebook – 900,000,000
Twitter – 310,000,000
LinkedIn – 255,000,000
Pinterest – 250,000,000
Google+ - 120,000,000
Tumblr – 110,000,000
Instagram – 100,000,000
VK – 80,000,000
Flickr – 65,000,000
MySpace – 42,000,000
5
Why is this Happening?
www.caveon.com 6
Back Office Buzz
www.caveon.com 8
Front Office Buzz
www.caveon.com 9
Social Media as an Advertising
Vehicle
www.caveon.com 10
Social Media as an Advertising
Vehicle
www.caveon.com 11
Socializing Cheating
“Passed Exam
on 10th Feb in
Mumbai, this
dumps are very
much valid.”
www.caveon.com 12
Popular Networks Get Popped
www.caveon.com 13
Lights, Camera, Cheating!
www.caveon.com 14
A Picture is Worth a Thousand
Words…
www.caveon.com 15
Image Searching Tips
www.caveon.com
• Google search by Image
• Image Recognition
• Reverse Image Search
• TinEye.com
16
Masking Exam Names
www.caveon.com 17
What We Have To Do…
www.caveon.com 18
Me, Me… It’s All About ME!
Name:
Maleficent
Twitter handle:
blaque-queen
Email:
evilmistress@darkforest.com
www.caveon.com 19
Building Relationships
www.caveon.com 20
Developing a Dialogue
www.caveon.com 21
Keep It Cordial
www.caveon.com 22
We’re Watching You…
www.caveon.com 23
Dump on the Dumps
www.caveon.com
Drowning sites with DMCA letters
24
DMCA Requirements
www.caveon.com
• Must be signed (electronic signature is acceptable)
• Identification of the copyrighted work
• Identify the material that is claimed to be infringing
• Must include contact information
• A statement that your complaint is being made in “good
faith”
• Must also state, that “under penalty of perjury, that the
information contained in the notification is accurate”
Have your DMCAs and Takedown
Notifications reviewed by your legal team.
25
Payment Providers
www.caveon.com 26
Payment Providers
• The web address where infringing material is
being sold.
• The location of the offending material on that
site.
• Specificity is important; especially if the
website is also hosting non-infringing material.
• Evidence that the processor's services are
being used by the infringers (a screenshot
featuring the processor's logo will do).
www.caveon.com 27
Analyze Your Test Results/Scores
www.caveon.com 28
What To Look For
www.caveon.com
- Similar response patterns between
test takers
- Unusually high pass rates
- Tests being taken at odd hours
- Individuals who test outside of their
home country
29
Exam Inoculation?
www.caveon.com
- Create replaceable test forms
- Hold a bank in reserve
- Create Trojan Horse items
- Use Embedded Verification Test (EVT) items
- Discrete Option Multiple Choice (DOMC)
30
Winning the Battle Over Braindumps
“Dear Valued Customer,
We are so sorry as we can't 100%
guarantee you can pass the exam with our
product.
Test company changed their exam
questions too frequently.
This is special price so if you fail your
exam, we will not refund.
Sincerely hope you can
understand.”
www.caveon.com 31
www.caveon.com 32
Putting The Pieces Together
www.caveon.com 33
Be Social, Analytical, and Persistent
www.caveon.com 34
www.caveon.com 35
THANK YOU!
Jamie Mulkey, Ed.D.
Vice President, Client Services
Caveon Test Security
jamie.mulkey@caveon.com
- LinkedIn Group – Test Security
- Follow Caveon on twitter @caveon
- Check out our blog…www.caveon.com/blog/
- LinkedIn Group – Caveon Test Security
Jen Baldwin
Sr Web Patrol Security Analyst
Caveon Test Security
jen.baldwin@caveon.com
www.caveon.com 36

More Related Content

Viewers also liked

Ethics in advertising1
Ethics in advertising1Ethics in advertising1
Ethics in advertising1
amar
 
Intellectual Property Rights
Intellectual Property RightsIntellectual Property Rights
Intellectual Property Rights
harshhanu
 

Viewers also liked (14)

Intellectual Property + Social Media: Internet & the IP law lag
Intellectual Property + Social Media: Internet & the IP law lagIntellectual Property + Social Media: Internet & the IP law lag
Intellectual Property + Social Media: Internet & the IP law lag
 
Social Media and Intellectual Property
Social Media and Intellectual PropertySocial Media and Intellectual Property
Social Media and Intellectual Property
 
Social Media & Intellectual Property
Social Media & Intellectual PropertySocial Media & Intellectual Property
Social Media & Intellectual Property
 
U.S. Federal Privacy Protection: An Overview (Concepts and History of the Fed...
U.S. Federal Privacy Protection: An Overview (Concepts and History of the Fed...U.S. Federal Privacy Protection: An Overview (Concepts and History of the Fed...
U.S. Federal Privacy Protection: An Overview (Concepts and History of the Fed...
 
Intellectual Property
Intellectual PropertyIntellectual Property
Intellectual Property
 
Os Fenícios (6º Ano - 2016)
Os Fenícios (6º Ano - 2016)Os Fenícios (6º Ano - 2016)
Os Fenícios (6º Ano - 2016)
 
Sixth sense technology
Sixth sense technologySixth sense technology
Sixth sense technology
 
Social Media: Implications for Intellectual Property Law
Social Media: Implications for Intellectual Property LawSocial Media: Implications for Intellectual Property Law
Social Media: Implications for Intellectual Property Law
 
Legal Implications Of Social Media
Legal Implications Of Social MediaLegal Implications Of Social Media
Legal Implications Of Social Media
 
Ethics in advertising1
Ethics in advertising1Ethics in advertising1
Ethics in advertising1
 
Intellectual Property Rights (IPR)
Intellectual Property Rights (IPR)Intellectual Property Rights (IPR)
Intellectual Property Rights (IPR)
 
Media and Information Literacy (MIL) - Intellectual Property, Fair Use, and C...
Media and Information Literacy (MIL) - Intellectual Property, Fair Use, and C...Media and Information Literacy (MIL) - Intellectual Property, Fair Use, and C...
Media and Information Literacy (MIL) - Intellectual Property, Fair Use, and C...
 
Data and Ethics: Why Data Science Needs One
Data and Ethics: Why Data Science Needs OneData and Ethics: Why Data Science Needs One
Data and Ethics: Why Data Science Needs One
 
Intellectual Property Rights
Intellectual Property RightsIntellectual Property Rights
Intellectual Property Rights
 

Similar to Leveraging Social Media to Protect Your Intellectual Property

Viral Advertising Presentation - Keter
Viral Advertising Presentation - KeterViral Advertising Presentation - Keter
Viral Advertising Presentation - Keter
ketaketa
 

Similar to Leveraging Social Media to Protect Your Intellectual Property (20)

Caveon Webinar Series - Will the Real Cloned Item Please Stand Up? final
Caveon Webinar Series -  Will the Real Cloned Item Please Stand Up? finalCaveon Webinar Series -  Will the Real Cloned Item Please Stand Up? final
Caveon Webinar Series - Will the Real Cloned Item Please Stand Up? final
 
HI THIS IS URGENT PLZ FIX ASAP: Critical Vunlerabilities and Bug Bounty Programs
HI THIS IS URGENT PLZ FIX ASAP: Critical Vunlerabilities and Bug Bounty ProgramsHI THIS IS URGENT PLZ FIX ASAP: Critical Vunlerabilities and Bug Bounty Programs
HI THIS IS URGENT PLZ FIX ASAP: Critical Vunlerabilities and Bug Bounty Programs
 
iBeacons: Security and Privacy?
iBeacons: Security and Privacy?iBeacons: Security and Privacy?
iBeacons: Security and Privacy?
 
Crowdsourcing PWI Sept-2011
Crowdsourcing PWI Sept-2011Crowdsourcing PWI Sept-2011
Crowdsourcing PWI Sept-2011
 
Success in the Age of Automation
Success in the Age of AutomationSuccess in the Age of Automation
Success in the Age of Automation
 
Crowdsourced Vulnerability Testing
Crowdsourced Vulnerability TestingCrowdsourced Vulnerability Testing
Crowdsourced Vulnerability Testing
 
STC Wikinomics
STC WikinomicsSTC Wikinomics
STC Wikinomics
 
IWMW 2001: Practical Web Strategies: Conflict, Ethics and Your Web Site (5)
IWMW 2001: Practical Web Strategies: Conflict, Ethics and Your Web Site (5)IWMW 2001: Practical Web Strategies: Conflict, Ethics and Your Web Site (5)
IWMW 2001: Practical Web Strategies: Conflict, Ethics and Your Web Site (5)
 
Caveon Webinar Series - Test Cheaters Say the Darnedest Things! - 072016
Caveon Webinar Series -  Test Cheaters Say the Darnedest Things! - 072016Caveon Webinar Series -  Test Cheaters Say the Darnedest Things! - 072016
Caveon Webinar Series - Test Cheaters Say the Darnedest Things! - 072016
 
Bug Bounty Hunting for Companies & Researchers: Bounty Hunting in Sudan and A...
Bug Bounty Hunting for Companies & Researchers: Bounty Hunting in Sudan and A...Bug Bounty Hunting for Companies & Researchers: Bounty Hunting in Sudan and A...
Bug Bounty Hunting for Companies & Researchers: Bounty Hunting in Sudan and A...
 
Sucuri Webinar: Understand and Fix Google Blacklist Warnings
Sucuri Webinar: Understand and Fix Google Blacklist WarningsSucuri Webinar: Understand and Fix Google Blacklist Warnings
Sucuri Webinar: Understand and Fix Google Blacklist Warnings
 
Viral Advertising Presentation - Keter
Viral Advertising Presentation - KeterViral Advertising Presentation - Keter
Viral Advertising Presentation - Keter
 
2016 LatinAmericaStartups.com Winter Digital Accelerator
2016 LatinAmericaStartups.com Winter Digital Accelerator2016 LatinAmericaStartups.com Winter Digital Accelerator
2016 LatinAmericaStartups.com Winter Digital Accelerator
 
Bug bounties - cén scéal?
Bug bounties - cén scéal?Bug bounties - cén scéal?
Bug bounties - cén scéal?
 
IT Security for Nonprofits
IT Security for NonprofitsIT Security for Nonprofits
IT Security for Nonprofits
 
Caveon Webinar Series: Six Security Challenges to Your High Stakes Test Prog...
Caveon Webinar Series:  Six Security Challenges to Your High Stakes Test Prog...Caveon Webinar Series:  Six Security Challenges to Your High Stakes Test Prog...
Caveon Webinar Series: Six Security Challenges to Your High Stakes Test Prog...
 
Implementing Crowdsourced Testing
Implementing Crowdsourced TestingImplementing Crowdsourced Testing
Implementing Crowdsourced Testing
 
T3CON12 Asia – Eric Mousset
T3CON12 Asia – Eric MoussetT3CON12 Asia – Eric Mousset
T3CON12 Asia – Eric Mousset
 
Brand protection on social media: Listen to your consumers, or to your lawyer?
Brand protection on social media: Listen to your consumers, or to your lawyer?Brand protection on social media: Listen to your consumers, or to your lawyer?
Brand protection on social media: Listen to your consumers, or to your lawyer?
 
2016 MiddleEastStartups.com Winter Digital Accelerator
2016 MiddleEastStartups.com Winter Digital Accelerator2016 MiddleEastStartups.com Winter Digital Accelerator
2016 MiddleEastStartups.com Winter Digital Accelerator
 

More from Caveon Test Security

Caveon webinar series - smart items- using innovative item design to make you...
Caveon webinar series - smart items- using innovative item design to make you...Caveon webinar series - smart items- using innovative item design to make you...
Caveon webinar series - smart items- using innovative item design to make you...
Caveon Test Security
 
Caveon webinar series - smart items- using innovative item design to make you...
Caveon webinar series - smart items- using innovative item design to make you...Caveon webinar series - smart items- using innovative item design to make you...
Caveon webinar series - smart items- using innovative item design to make you...
Caveon Test Security
 
Caveon Webinar - Weathering the Perfect Test Security Storm May 2015 edited
Caveon Webinar  - Weathering the Perfect Test Security Storm May 2015 editedCaveon Webinar  - Weathering the Perfect Test Security Storm May 2015 edited
Caveon Webinar - Weathering the Perfect Test Security Storm May 2015 edited
Caveon Test Security
 

More from Caveon Test Security (20)

Unpublished study indicates high chance of fraud in thousands of tests of enem
Unpublished study indicates high chance of fraud in thousands of tests of enemUnpublished study indicates high chance of fraud in thousands of tests of enem
Unpublished study indicates high chance of fraud in thousands of tests of enem
 
Caveon webinar series - smart items- using innovative item design to make you...
Caveon webinar series - smart items- using innovative item design to make you...Caveon webinar series - smart items- using innovative item design to make you...
Caveon webinar series - smart items- using innovative item design to make you...
 
Caveon webinar series - smart items- using innovative item design to make you...
Caveon webinar series - smart items- using innovative item design to make you...Caveon webinar series - smart items- using innovative item design to make you...
Caveon webinar series - smart items- using innovative item design to make you...
 
Caveon Webinar Series - A Guide to Online Protection Strategies - March 28, ...
Caveon Webinar Series -  A Guide to Online Protection Strategies - March 28, ...Caveon Webinar Series -  A Guide to Online Protection Strategies - March 28, ...
Caveon Webinar Series - A Guide to Online Protection Strategies - March 28, ...
 
Caveon Webinar Series - Five Things You Can Do Now to Protect Your Assessment...
Caveon Webinar Series - Five Things You Can Do Now to Protect Your Assessment...Caveon Webinar Series - Five Things You Can Do Now to Protect Your Assessment...
Caveon Webinar Series - Five Things You Can Do Now to Protect Your Assessment...
 
The Do's and Dont's of Administering High Stakes Tests in Schools Final 121217
The Do's and Dont's of Administering High Stakes Tests in Schools Final 121217The Do's and Dont's of Administering High Stakes Tests in Schools Final 121217
The Do's and Dont's of Administering High Stakes Tests in Schools Final 121217
 
Caveon Webinar Series - The Art of Test Security - Know Thy Enemy - November ...
Caveon Webinar Series - The Art of Test Security - Know Thy Enemy - November ...Caveon Webinar Series - The Art of Test Security - Know Thy Enemy - November ...
Caveon Webinar Series - The Art of Test Security - Know Thy Enemy - November ...
 
Caveon Webinar Series - Four Steps to Effective Investigations in School Dis...
Caveon Webinar Series -  Four Steps to Effective Investigations in School Dis...Caveon Webinar Series -  Four Steps to Effective Investigations in School Dis...
Caveon Webinar Series - Four Steps to Effective Investigations in School Dis...
 
Caveon Webinar Series - On-site Monitoring in Districts 0317
Caveon Webinar Series - On-site Monitoring in Districts 0317Caveon Webinar Series - On-site Monitoring in Districts 0317
Caveon Webinar Series - On-site Monitoring in Districts 0317
 
CESP Study Session #1 October 2016
CESP Study Session #1 October 2016CESP Study Session #1 October 2016
CESP Study Session #1 October 2016
 
A Tale of Two Cities - School District Webinar #1 Jan 2017
A Tale of Two Cities - School District Webinar  #1 Jan 2017A Tale of Two Cities - School District Webinar  #1 Jan 2017
A Tale of Two Cities - School District Webinar #1 Jan 2017
 
Caveon Webinar Series - Discrete Option Multiple Choice: A Revolution in Te...
Caveon Webinar Series  - Discrete Option Multiple Choice:  A Revolution in Te...Caveon Webinar Series  - Discrete Option Multiple Choice:  A Revolution in Te...
Caveon Webinar Series - Discrete Option Multiple Choice: A Revolution in Te...
 
Caveon Webinar Series - The Test Security Framework- Why Different Tests Nee...
Caveon Webinar Series -  The Test Security Framework- Why Different Tests Nee...Caveon Webinar Series -  The Test Security Framework- Why Different Tests Nee...
Caveon Webinar Series - The Test Security Framework- Why Different Tests Nee...
 
Caveon Webinar Series - Conducting Test Security Investigations in School Di...
Caveon Webinar Series -  Conducting Test Security Investigations in School Di...Caveon Webinar Series -  Conducting Test Security Investigations in School Di...
Caveon Webinar Series - Conducting Test Security Investigations in School Di...
 
Caveon Webinar Series - Creating Your Test Security Game Plan - March 2016
Caveon Webinar Series -  Creating Your Test Security Game Plan - March 2016Caveon Webinar Series -  Creating Your Test Security Game Plan - March 2016
Caveon Webinar Series - Creating Your Test Security Game Plan - March 2016
 
Caveon Webinar Series - Mastering the US DOE Test Security Requirements Janua...
Caveon Webinar Series - Mastering the US DOE Test Security Requirements Janua...Caveon Webinar Series - Mastering the US DOE Test Security Requirements Janua...
Caveon Webinar Series - Mastering the US DOE Test Security Requirements Janua...
 
Caveon Webinar Series - Lessons Learned at the 2015 National Conference on S...
Caveon Webinar Series -  Lessons Learned at the 2015 National Conference on S...Caveon Webinar Series -  Lessons Learned at the 2015 National Conference on S...
Caveon Webinar Series - Lessons Learned at the 2015 National Conference on S...
 
Caveon Webinar Series - Learning and Teaching Best Practices in Test Security...
Caveon Webinar Series - Learning and Teaching Best Practices in Test Security...Caveon Webinar Series - Learning and Teaching Best Practices in Test Security...
Caveon Webinar Series - Learning and Teaching Best Practices in Test Security...
 
Caveon Webinar - Weathering the Perfect Test Security Storm May 2015 edited
Caveon Webinar  - Weathering the Perfect Test Security Storm May 2015 editedCaveon Webinar  - Weathering the Perfect Test Security Storm May 2015 edited
Caveon Webinar - Weathering the Perfect Test Security Storm May 2015 edited
 
Caveon Webinar Series - Weathering the Perfect Test Security Storm May 2015
Caveon Webinar Series - Weathering the Perfect Test Security Storm May 2015Caveon Webinar Series - Weathering the Perfect Test Security Storm May 2015
Caveon Webinar Series - Weathering the Perfect Test Security Storm May 2015
 

Recently uploaded

The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 

Recently uploaded (20)

The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Plant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxPlant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptx
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
 

Leveraging Social Media to Protect Your Intellectual Property

Editor's Notes

  1. This session will address problematic trends regarding infringing content available online. Attendees will learn about the structure and business models of brain dump and social media sites and the actions to take to mitigate their effectiveness with would-be test cheats. This session will also detail how to spot advertisements for the sale of test content on some of the newer, less obvious social media channels. Content thieves are not always blatantly advertising that they are selling test content. This session will help attendees learn how to make sense of it all and realize that even a small breach of Intellectual property can quickly spiral out of control and become a major compromise to a testing program.
  2. What is the problem? Everyone wants access to instant, small bits of information Everyone wants to be the one to get credit for re-sharing that information Social media sites by nature encourage sharing and re-sharing You get recognition and an ego stroke every time someone “Likes” what you said, or re-shares what you post Cheaters gain huge advantage by scooping up shared info Easy access to stolen content gives an unfair advantage on high stakes exams
  3. Don’t just focus on what’s popular now; stay current with last month’s watering holes
  4. As recently as two weeks ago, a Professional Cheating Service was caught on camera selling term papers to students. These types of Freelance service sites pop up by the dozens every day and more and more test takers are turning to them to complete their coursework and take their exams.
  5. Social Media by nature is designed to share information and find out what is going on right now in the world. People are talking about their lives and sharing photos of their experiences in every moment of every day. This is the Top 10 Most Popular Social Networking Sites as of May 2014 Facebook is estimated to have 900,000,000 unique monthly visitors Twitter has 310,000,000, Even Vkontakte (vCON-tack-chuh), the Facebook of Russia, is in the top 10 at 80 million visitors a month You must do everything you can to make sure your exam content goes no where near this fast moving flood of sharing and re-sharing information
  6. The internet makes it really easy to find test content, there’s money to be made, and the risk of getting caught is low.
  7. It’s important to know there is a front and back room that co-exist. There’s a whole underbelly of the Internet.. A black market, if you will, where stolen test content and solicitation of proxy test taking happen for those desperate souls who need to find a way to gain unfair advantage on a test, at any cost.
  8. Back Office Before your exam makes its public debut on the world wide web, back office horse trading goes on to collect test content. Here are a few ways we know exam exposure begins: Test questions can be leaked way before your launch date SMEs have been caught selling items they’ve written to braindumps Tests can be compromised during test delivery And even more likely test content is leaked right after the test is administered Test Center Scalpers hover outside testing center to question candidates on what they remember about the test Braindumps sites hire “veteran Certified Experts” to create their “Test Training Kits”. These are candidates who have repeatedly taken the test And, as we mentioned before entire test booklets have been stolen
  9. Front Office – The Internet, fueled by Social Media The front office is where the exchange of test content goes viral through test taker communications Once the cheaters have the test content, they immediately spread the seed and the exam is exposed through social media 100’s of times in a matter of minutes, 1,000s of times as each day goes by And, the organized illegal test prep sites are waiting like vultures to cash in
  10. But becoming more social with your test takers is only one part of the equation. The second part is analyzing your test taker data. Look for anomalies such as:
  11. Similar response patterns between test takers Unusually high pass rates Tests being taken at odd hours Individuals who test outside of their home country
  12. What we’re really saying here is: It is inoculating your exam against pirates and cheats. DOMC Do something to add more items to your item banks; Create multiple test forms that get replaced frequently Hold a bank in reserve Create miskeyed items to use a Trojan horse items to detect braindump usage Use new sets of items and embedded verification tests
  13. Here is a great example of how social media climbers want recognition for their conquests: In this particular case, we were able to match the names of the individuals bragging about their passing scores on this braindump site with the names of the test takers. Needless to say, these test takers’ scores were revoked.
  14. By using multiple approaches to combat test theft and cheating, you can triangulate your results and feel confident about imposing punitive measures to those individuals who have tried to gain an unfair advantage.
  15. By learning where the virtual water coolers are, analyzing your test taker data, and being persistent in developing relationships, you can combat theft and fraud of your exams.