Wollack (1997) adapted the standardized collusion index of Frary, Tidemann, and Watts (1977) g2 to item response theory (IRT) and produced the Wollack Omega (ω) index. It is clear that the graphics in the original article by Frary et al. (1977) were crude classical approximations of an item response function, so Wollack replaced the probability calculations from the classical approximations with those from IRT. The probabilities could be calculated with any IRT model. Wollack suggested Bock’s Nominal Response Model since it is appropriate for multiple choice data, but that model is rarely used in practice and very few IRT software packages support it. SIFT instead supports the use of dichotomous models: 1-parameter, 2-parameter, 3-parameter, and Rasch.
Because of the use of IRT, implementation of ω requires additional input. You must include the IRT item parameters in the control tab as well as examinee theta values in the examinee tab. If any of that input is missing, the omega output will not be produced.
The ω index is defined as
Where P is the probability of an examinee with θa selecting the response that examinee b selected, and cab is the RIC. That is, the probability that the copier, with θa, would select the responses that the source did; when summed, this can be interpreted as the expected RIC. Note that this uses all responses, not just errors.
How to interpret? The value will be higher when the copier had more responses in common with the source than we’d expect from a person of that (probably lower) ability. This index is standardized onto a z-metric, and therefore can easily be converted to the probability you wish to use. A standardized value of of 3.09 is default for g2, ω, and Zjk because this translates to a probability of 0.001. A value beyond 3.09 then represents an event that is expected to be very rare under the assumption of no collusion.
Interested in applying the Wollack Omega index to your data? Download the SIFT software for free.
Latest posts by nthompson (see all)
- Tips to Improve Assessment Security During COVID-19 - September 4, 2020
- Responses in Common (RIC) - August 22, 2020
- Exact Errors in Common (EEIC) – Collusion Detection - August 22, 2020