{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:28:12Z","timestamp":1750307292178,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":24,"publisher":"ACM","license":[{"start":{"date-parts":[[2010,10,1]],"date-time":"2010-10-01T00:00:00Z","timestamp":1285891200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000138","name":"U.S. Department of Education","doi-asserted-by":"publisher","award":["P120A080094"],"award-info":[{"award-number":["P120A080094"]}],"id":[{"id":"10.13039\/100000138","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["939138"],"award-info":[{"award-number":["939138"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2010,10]]},"DOI":"10.1145\/1940941.1940943","type":"proceedings-article","created":{"date-parts":[[2011,2,8]],"date-time":"2011-02-08T13:21:09Z","timestamp":1297171269000},"page":"1-7","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Active learning approaches to teaching information assurance"],"prefix":"10.1145","author":[{"given":"Christy","family":"Chatmon","sequence":"first","affiliation":[{"name":"Florida A&amp;M University, Tallahassee, FL"}]},{"given":"Hongmei","family":"Chi","sequence":"additional","affiliation":[{"name":"Florida A&amp;M University, Tallahassee, FL"}]},{"given":"Will","family":"Davis","sequence":"additional","affiliation":[{"name":"Florida A&amp;M University, Tallahassee, FL"}]}],"member":"320","published-online":{"date-parts":[[2010,10]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Academic Technology Center: Teaching with Technology Collaboratory Benefits of Using Discussion Boards in Your Classes http:\/\/www.wpi.edu\/Academics\/ATC\/Collaboratory\/Idea\/boardbenefits.html accessed 07\/15\/10.  Academic Technology Center: Teaching with Technology Collaboratory Benefits of Using Discussion Boards in Your Classes http:\/\/www.wpi.edu\/Academics\/ATC\/Collaboratory\/Idea\/boardbenefits.html accessed 07\/15\/10."},{"key":"e_1_3_2_1_2_1","volume-title":"What's the point in discussion? Portland","author":"Bligh D.","year":"2000","unstructured":"Bligh , D. ( 2000 ). What's the point in discussion? Portland , Oregon : Intellect Books . Bligh, D. (2000). What's the point in discussion? Portland, Oregon: Intellect Books."},{"key":"e_1_3_2_1_3_1","article-title":"Virtual Computing Laboratories: A Case Study With Comparisons To Physical Computing Laboratories","volume":"8","author":"Burd","year":"2009","unstructured":"Burd , Stephen &amp; Conway, Christopher &amp; Seazzu, Alessandro . ( 2009 ). Virtual Computing Laboratories: A Case Study With Comparisons To Physical Computing Laboratories . Journal of Information Technology Education. Volume 8 . Burd, Stephen &amp; Conway, Christopher &amp; Seazzu, Alessandro. (2009). Virtual Computing Laboratories: A Case Study With Comparisons To Physical Computing Laboratories. Journal of Information Technology Education. Volume 8.","journal-title":"Journal of Information Technology Education."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1124706.1121375"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2006.110"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevSTPER.1.010103"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1023\/B:JOST.0000019641.93420.6f"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1539024.1508897"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","DOI":"10.5117\/9789085550914","volume-title":"Research and Practice of Active Learning in Engineering Education","author":"Graaff E.","year":"2005","unstructured":"Graaff , E. de, G. N. Saunders-Smits &amp; M. R. Nieweg . (eds.) ( 2005 ). Research and Practice of Active Learning in Engineering Education . Amsterdam : Pallas Publications . Graaff, E. de, G. N. Saunders-Smits &amp; M. R. Nieweg. (eds.) (2005). Research and Practice of Active Learning in Engineering Education. Amsterdam: Pallas Publications."},{"key":"e_1_3_2_1_10_1","volume-title":"Active Learning: Cooperation in the College Classroom","author":"Johnson D.","year":"1998","unstructured":"Johnson , D. , Johnson , R. , and Smith , K . ( 1998 ). Active Learning: Cooperation in the College Classroom , 2 nd ed., Interaction Book Co. , Edina, MN . Johnson, D., Johnson, R., and Smith, K. (1998). Active Learning: Cooperation in the College Classroom, 2nd ed., Interaction Book Co., Edina, MN.","edition":"2"},{"key":"e_1_3_2_1_11_1","volume-title":"Transferring your passion for teaching to the online environment: A five step instructional development model. EJournal of Instructional Science and Technology, 4(1)","author":"McConnell S.","year":"2001","unstructured":"McConnell , S. &amp; SchoenfeldTachner , R. ( 2001 ). Transferring your passion for teaching to the online environment: A five step instructional development model. EJournal of Instructional Science and Technology, 4(1) . McConnell, S. &amp; SchoenfeldTachner, R. (2001). Transferring your passion for teaching to the online environment: A five step instructional development model. EJournal of Instructional Science and Technology, 4(1)."},{"key":"e_1_3_2_1_12_1","volume-title":"McKeachie's teaching tips: Strategies, Research, and Theory for College and University Teachers","author":"McKeachie W. J.","year":"2006","unstructured":"McKeachie , W. J. , &amp; Svinicki , M. ( 2006 ). McKeachie's teaching tips: Strategies, Research, and Theory for College and University Teachers ( 12 th ed.). Boston, MA : Houghton Mifflin . McKeachie, W. J., &amp; Svinicki, M. (2006). McKeachie's teaching tips: Strategies, Research, and Theory for College and University Teachers (12th ed.). Boston, MA: Houghton Mifflin.","edition":"12"},{"issue":"2","key":"e_1_3_2_1_13_1","first-page":"12","article-title":"Is \"as good as facetoface\" as good as it gets","volume":"2","author":"McDonald J.","year":"2002","unstructured":"McDonald , J. ( 2002 ). Is \"as good as facetoface\" as good as it gets ? Journal of Asynchronous Learning , 2 ( 2 ), 12 -- 23 . McDonald, J. (2002). Is \"as good as facetoface\" as good as it gets? Journal of Asynchronous Learning, 2(2), 12--23.","journal-title":"Journal of Asynchronous Learning"},{"key":"e_1_3_2_1_14_1","volume-title":"The Art of Deception: Controlling the Human Element of Security","author":"Mitnick K.","year":"2002","unstructured":"Mitnick , K. and Simon , W . ( 2002 ). The Art of Deception: Controlling the Human Element of Security . Indianapolis, IN : Wiley Publishing , Inc. Mitnick, K. and Simon, W. (2002). The Art of Deception: Controlling the Human Element of Security. Indianapolis, IN: Wiley Publishing, Inc."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1037\/0022-0663.91.2.358"},{"key":"e_1_3_2_1_16_1","unstructured":"National Security Agency Central Security Service. IA Courseware Evaluation Program. http:\/\/www.nsa.gov\/ia\/academic_outreach\/iace_program\/index.shtml accessed 07\/14\/2010.  National Security Agency Central Security Service. IA Courseware Evaluation Program . http:\/\/www.nsa.gov\/ia\/academic_outreach\/iace_program\/index.shtml accessed 07\/14\/2010."},{"key":"e_1_3_2_1_17_1","unstructured":"Online Collaborative Learning in Higher Education http:\/\/clp.cqu.edu.au\/glossory.htm accessed 07\/15\/2010.  Online Collaborative Learning in Higher Education http:\/\/clp.cqu.edu.au\/glossory.htm accessed 07\/15\/2010."},{"key":"e_1_3_2_1_18_1","volume-title":"the Proceedings of the 2002 IEEE Workshop on Information Assurance, United States Military Academy","author":"Padman V.","year":"2002","unstructured":"Padman , V. and Memon , N . ( 2002 ). Design of a Virtual Laboratory for Information Assurance Education and Research . In the Proceedings of the 2002 IEEE Workshop on Information Assurance, United States Military Academy , West Point, NY, 17--19. Padman, V. and Memon, N. (2002). Design of a Virtual Laboratory for Information Assurance Education and Research. In the Proceedings of the 2002 IEEE Workshop on Information Assurance, United States Military Academy, West Point, NY, 17--19."},{"key":"e_1_3_2_1_19_1","unstructured":"Paulson D. and Faust J. Active Learning for the College Classroom http:\/\/www.calstatela.edu\/dept\/chem\/chem2\/Active\/ accessed 07\/10\/2010.  Paulson D. and Faust J. Active Learning for the College Classroom http:\/\/www.calstatela.edu\/dept\/chem\/chem2\/Active\/ accessed 07\/10\/2010."},{"issue":"4","key":"e_1_3_2_1_20_1","first-page":"30","article-title":"Hands on, minds on: Activities to engage our students","volume":"21","author":"Pheeney P.","year":"1997","unstructured":"Pheeney , P. ( 1997 ). Hands on, minds on: Activities to engage our students . Science Scope , 21 ( 4 ), 30 -- 33 . Pheeney, P. (1997). Hands on, minds on: Activities to engage our students. Science Scope, 21(4), 30--33.","journal-title":"Science Scope"},{"key":"e_1_3_2_1_21_1","volume-title":"Speaking mathematically: Communication in mathematics classrooms","author":"Pimm D.","year":"1987","unstructured":"Pimm , D. ( 1987 ). Speaking mathematically: Communication in mathematics classrooms . New York . Routledge & amp; Kegan Paul. Pimm, D. (1987). Speaking mathematically: Communication in mathematics classrooms. New York. Routledge &amp; Kegan Paul."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1002\/j.2168-9830.2004.tb00809.x"},{"key":"e_1_3_2_1_23_1","unstructured":"Study Guides and Strategies. http:\/\/www.studygs.net\/pbl.htm accessed 07\/10\/2010.  Study Guides and Strategies. http:\/\/www.studygs.net\/pbl.htm accessed 07\/10\/2010."},{"key":"e_1_3_2_1_24_1","volume-title":"Readings and Cases in Information Security Law and Ethics. Course Technology Cengage Learning","author":"Whitman M.","year":"2011","unstructured":"Whitman , M. and Mattord , H . ( 2011 ). Readings and Cases in Information Security Law and Ethics. Course Technology Cengage Learning . Whitman, M. and Mattord, H. (2011). Readings and Cases in Information Security Law and Ethics. Course Technology Cengage Learning."}],"event":{"name":"InfoSecCD '10: 2010 Information Security Curriculum Development Conference","sponsor":["KSU - CISE KSU Center for InfoSec Education","ISSA The Metro Atlanta Information Systems Security Association","SIGMIS ACM Special Interest Group on Management Information Systems"],"location":"Kennesaw Georgia","acronym":"InfoSecCD '10"},"container-title":["2010 Information Security Curriculum Development Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1940941.1940943","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1940941.1940943","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T10:59:43Z","timestamp":1750244383000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1940941.1940943"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,10]]},"references-count":24,"alternative-id":["10.1145\/1940941.1940943","10.1145\/1940941"],"URL":"https:\/\/doi.org\/10.1145\/1940941.1940943","relation":{},"subject":[],"published":{"date-parts":[[2010,10]]},"assertion":[{"value":"2010-10-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}