{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:38:37Z","timestamp":1750307917465,"version":"3.41.0"},"reference-count":3,"publisher":"Association for Computing Machinery (ACM)","issue":"4","license":[{"start":{"date-parts":[[2006,12,1]],"date-time":"2006-12-01T00:00:00Z","timestamp":1164931200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["J. Educ. Resour. Comput."],"published-print":{"date-parts":[[2006,12]]},"abstract":"<jats:p>Information assurance courses delivered in an online environment pose challenges to the development of meaningful hands-on exercises for students. This article presents techniques on furnishing laboratory exercises to online students and presents examples of assignments drawn from the author's experiences in teaching online courses for over three years. These assignments have proven successful in enhancing the learning experiences of undergraduate and graduate computer science students in introductory and advanced courses in the area of information assurance. Typical courses include introduction to computer networks, computer and network security, information assurance, network management, wireless networks and applications, computer forensics, and risk assessment.<\/jats:p>","DOI":"10.1145\/1248453.1248457","type":"journal-article","created":{"date-parts":[[2007,6,6]],"date-time":"2007-06-06T14:37:11Z","timestamp":1181140631000},"page":"4","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Laboratory exercises in online information assurance courses"],"prefix":"10.1145","volume":"6","author":[{"family":"Bhagyavati","sequence":"first","affiliation":[{"name":"Columbus State University, Center Valley, PA"}]}],"member":"320","published-online":{"date-parts":[[2006,12]]},"reference":[{"volume-title":"Proceedings of the 36th SIGCSE Technical Symposium on Computer Science Education (St","year":"1938","author":"Bhagyavati Kurkovsky","key":"e_1_2_1_1_1"},{"volume-title":"Proceedings of the 2nd IEEE International Conference on Information Technology: Research and Education","author":"Kurkovsky S.","key":"e_1_2_1_2_1"},{"volume-title":"Proceedings of the Fall Conference of the Mid-Southeast Chapter of ACM","author":"Summers W.","key":"e_1_2_1_3_1"}],"container-title":["Journal on Educational Resources in Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1248453.1248457","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1248453.1248457","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T14:51:26Z","timestamp":1750258286000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1248453.1248457"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006,12]]},"references-count":3,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2006,12]]}},"alternative-id":["10.1145\/1248453.1248457"],"URL":"https:\/\/doi.org\/10.1145\/1248453.1248457","relation":{},"ISSN":["1531-4278","1531-4278"],"issn-type":[{"type":"print","value":"1531-4278"},{"type":"electronic","value":"1531-4278"}],"subject":[],"published":{"date-parts":[[2006,12]]},"assertion":[{"value":"2006-12-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}