首页 | 本学科首页   官方微博 | 高级检索  
     检索      


Threats to the Valid Use of Assessments
Authors:Terry J Crooks  Michael T Kane  Allan S Cohen
Institution:1. Educational Assessment Research Unit , University of Otago , Box 56, Dunedin , New Zealand;2. University of Wisconsin‐Madison, Department of Kinesiology , 2000 Observatory Drive, Madison , WI 53706 , USA;3. Testing and Evaluation Services , University of Wisconsin‐Madison , 1025 West Johnson Street, Madison , WI 53706 , USA
Abstract:Validity is the most important quality of an assessment, but its evaluation is often neglected. The step‐by‐step approach suggested here provides structured guidance to validators of educational assessments. Assessment is depicted as a chain of eight linked stages: administration, scoring, aggregation, generalization, extrapolation, evaluation, decision and impact. Evaluating validity requires careful consideration of threats to validity associated with each link. Several threats are described and exemplified for each link. These sets of threats are intended to be illustrative rather than comprehensive. The chain model suggests that validity is limited by the weakest link, and that efforts to make other links particularly strong may be wasteful or even harmful. The chain model and list of threats is also shown to be valuable when planning assessments.
Keywords:
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号