{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:25:42Z","timestamp":1750307142293,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":6,"publisher":"ACM","license":[{"start":{"date-parts":[[2011,10,20]],"date-time":"2011-10-20T00:00:00Z","timestamp":1319068800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2011,10,20]]},"DOI":"10.1145\/2047594.2047631","type":"proceedings-article","created":{"date-parts":[[2011,10,25]],"date-time":"2011-10-25T12:23:06Z","timestamp":1319545386000},"page":"129-132","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["A competency based approach to developing articulation agreements in computing"],"prefix":"10.1145","author":[{"given":"Sandra","family":"Gorka","sequence":"first","affiliation":[{"name":"Pennsylvania College of Technology, Williamsport, PA, USA"}]},{"given":"Jacob R.","family":"Miller","sequence":"additional","affiliation":[{"name":"Pennsylvania College of Technology, Williamsport, PA, USA"}]},{"given":"Daniel W.","family":"Yoas","sequence":"additional","affiliation":[{"name":"Pennsylvania College of Technology, Williamsport, PA, USA"}]}],"member":"320","published-online":{"date-parts":[[2011,10,20]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1631728.1631798"},{"key":"e_1_3_2_1_2_1","unstructured":"ABET. Download ABET Accreditation Criteria and Forms: Computing Programs. Available from: http:\/\/www.abet.org\/forms.shtml.  ABET. Download ABET Accreditation Criteria and Forms: Computing Programs. Available from: http:\/\/www.abet.org\/forms.shtml."},{"key":"e_1_3_2_1_3_1","unstructured":"NSTISSI National Training Standard for Information Systems Security (INFOSEC) Professionals DOD Editor. June 1994.  NSTISSI National Training Standard for Information Systems Security (INFOSEC) Professionals DOD Editor. June 1994."},{"key":"e_1_3_2_1_4_1","unstructured":"CNSSI National Information Assurance Training Standard for System Administrators (SA) DOD Editor. March 2004.  CNSSI National Information Assurance Training Standard for System Administrators (SA) DOD Editor. March 2004."},{"key":"e_1_3_2_1_5_1","unstructured":"CNSSI National Information Assurance Training Standard For Risk Analysts DOD Editor. November 2005.  CNSSI National Information Assurance Training Standard For Risk Analysts DOD Editor. November 2005."},{"key":"e_1_3_2_1_6_1","unstructured":"Lunt B.M. J.J. Ekstrom S. Gorka G. Hislop R. Kamali E. Lawson R. LeBlanc J. Miller and H. Reichgelt. Information Technology 2008: Curriculum Guidelines for Undergraduate Degree Programs in Information Technology. 2008; Available from: http:\/\/www.acm.org\/\/education\/curricula\/IT2008%20Curriculum.pdf.  Lunt B.M. J.J. Ekstrom S. Gorka G. Hislop R. Kamali E. Lawson R. LeBlanc J. Miller and H. Reichgelt. Information Technology 2008: Curriculum Guidelines for Undergraduate Degree Programs in Information Technology. 2008; Available from: http:\/\/www.acm.org\/\/education\/curricula\/IT2008%20Curriculum.pdf."}],"event":{"name":"SIGITE' 11: ACM Special Interest Group for Information Technology Education Conference","sponsor":["SIGITE ACM Special Interest Group on Information Technology Education"],"location":"West Point New York USA","acronym":"SIGITE' 11"},"container-title":["Proceedings of the 2011 conference on Information technology education"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2047594.2047631","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2047594.2047631","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T09:48:55Z","timestamp":1750240135000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2047594.2047631"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,10,20]]},"references-count":6,"alternative-id":["10.1145\/2047594.2047631","10.1145\/2047594"],"URL":"https:\/\/doi.org\/10.1145\/2047594.2047631","relation":{},"subject":[],"published":{"date-parts":[[2011,10,20]]},"assertion":[{"value":"2011-10-20","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}