Recent Blog Posts
March 16, 2016 | By David Cox |
|
In his 1966 book “The Psychology of Science” Abraham Maslow quoted “If your only tool is a hammer then every... View Article
|
March 10, 2016 | By Joy Matthews-López, Ph.D. |
|
Simply put, validity refers to the degree to which evidence supports the inferences we make from test scores. Such inferences... View Article
|
March 3, 2016 | By Cynthia D. Woodley, Ed.D. |
|
This month’s Issue of CLEAR’s Journal addresses how licensing boards can rely on accredited certification programs By Cynthia D. Woodley, Ed.... View Article
|
February 25, 2016 | By Christine Niero, Ph.D. |
|
Here is some good news. Recently the American National Standards Institute (ANSI) announced its approval of four Better Buildings Workforce... View Article
|
February 19, 2016 | By Natalie Judd |
|
In today’s multi-channel world, we often refer to marketing value in overly narrow and simplistic views. When one calculates their... View Article
|
February 10, 2016 | By Cynthia D. Woodley, Ed.D. |
|
Professional certification bodies can do more than demonstrate conformity to international standards for the certification of persons. They can get... View Article
|
February 4, 2016 | By Christine Niero, Ph.D. |
|
“Many people take offense when the narratives they believe to be true are called myths,” Wikipedia explains. “This usage is... View Article
|
January 27, 2016 | By Cynthia G. Parshall, Ph.D. |
|
Overview In a Hotspot (HS) item the examinee responds to the question by clicking directly on an image. This is often a... View Article
|
January 20, 2016 | By Joy Matthews-López, Ph.D. |
|
A test security plan is a comprehensive collection of policies, procedures, and documents that outline and guide actions related to test security. From the development of an exam’s blueprint to the reporting of scores, test security touches nearly every aspect of test development and the testing process. Trust is a prerequisite to interpreting scores, and without evidence to support the integrity and veracity of scores, trust is compromised. Without trust, credibility is compromised.
|
January 14, 2016 | By Adrienne Cadle, Ph.D. |
|
The first step in developing a credentialing exam is to conduct a job/task analysis (JTA). A job/task analysis refers to the... View Article
|
|
|
|