{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:31:43Z","timestamp":1750307503369,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":12,"publisher":"ACM","license":[{"start":{"date-parts":[[2010,10,1]],"date-time":"2010-10-01T00:00:00Z","timestamp":1285891200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2010,10]]},"DOI":"10.1145\/1940941.1940957","type":"proceedings-article","created":{"date-parts":[[2011,2,8]],"date-time":"2011-02-08T13:21:09Z","timestamp":1297171269000},"page":"58-61","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Designing a graduate Capstone course for an online information assurance program"],"prefix":"10.1145","author":[{"given":"Jeffrey A.","family":"Livermore","sequence":"first","affiliation":[{"name":"University of Baltimore, Baltimore, MD"}]}],"member":"320","published-online":{"date-parts":[[2010,10]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.2308\/iace.2005.20.4.311"},{"volume-title":"International Journal of Construction Education and Research. 151--166.","year":"2006","author":"Nguyen T.","key":"e_1_3_2_1_2_1"},{"key":"e_1_3_2_1_3_1","article-title":"The right answer is communication when capstone engineering courses drive the questions","author":"Ford J.","year":"2006","journal-title":"Journal of STEM Education. 7(3&amp;4), 5--12."},{"issue":"2","key":"e_1_3_2_1_4_1","first-page":"13","article-title":"Assessing general education capstone courses: An in-depth look at a nationally recognized capstone assessment model","volume":"9","author":"Kerrigan S.","year":"2007","journal-title":"Peer Review."},{"issue":"1","key":"e_1_3_2_1_5_1","first-page":"85","article-title":"Using reengineering as an integrating capstone experience","volume":"18","author":"Matos V.","year":"2007","journal-title":"Journal of Information Systems Education."},{"issue":"1","key":"e_1_3_2_1_6_1","first-page":"125","article-title":"Implementing service-learning to the information systems and technology management program: A study of an undergraduate capstone course","volume":"18","author":"Wei K.","year":"2007","journal-title":"Journal of Information Systems Education."},{"volume-title":"Proceedings of the 2009 International Conference on Informatics Education Research","year":"2009","author":"Conger S.","key":"e_1_3_2_1_7_1"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1177\/107769580606100305"},{"issue":"3","key":"e_1_3_2_1_9_1","first-page":"431","article-title":"Assessment matters: Integration, reflection, interpretation: Realizing the goals of a general education capstone course","volume":"30","author":"Fernandez N.","year":"2006","journal-title":"About Campus."},{"key":"e_1_3_2_1_10_1","unstructured":"McGrew R. (2010). Capture the flag! The Use of Competition in Information Assurance Education. Tutorial presented at the Fourteenth Colloquium for Information Systems Security Education Baltimore MD.  McGrew R. (2010). Capture the flag! The Use of Competition in Information Assurance Education. Tutorial presented at the Fourteenth Colloquium for Information Systems Security Education Baltimore MD."},{"key":"e_1_3_2_1_11_1","unstructured":"Anonymous. (2010 May 11). Jenzabar and Wimba partner to provide campus-wide Enterprise collaboration. Business Wire.  Anonymous. (2010 May 11). Jenzabar and Wimba partner to provide campus-wide Enterprise collaboration. Business Wire ."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"crossref","unstructured":"Flatley M. (2007). Teaching the virtual presentation. Business Communication Quarterly. 70(3).  Flatley M. (2007). Teaching the virtual presentation. Business Communication Quarterly . 70(3).","DOI":"10.1177\/1080569907305305"}],"event":{"name":"InfoSecCD '10: 2010 Information Security Curriculum Development Conference","sponsor":["KSU - CISE KSU Center for InfoSec Education","ISSA The Metro Atlanta Information Systems Security Association","SIGMIS ACM Special Interest Group on Management Information Systems"],"location":"Kennesaw Georgia","acronym":"InfoSecCD '10"},"container-title":["2010 Information Security Curriculum Development Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1940941.1940957","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1940941.1940957","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T12:17:50Z","timestamp":1750249070000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1940941.1940957"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,10]]},"references-count":12,"alternative-id":["10.1145\/1940941.1940957","10.1145\/1940941"],"URL":"https:\/\/doi.org\/10.1145\/1940941.1940957","relation":{},"subject":[],"published":{"date-parts":[[2010,10]]},"assertion":[{"value":"2010-10-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}