skip to main content
10.1145/1940941.1940957acmotherconferencesArticle/Chapter ViewAbstractPublication PagesinfoseccdConference Proceedingsconference-collections
research-article

Designing a graduate Capstone course for an online information assurance program

Published: 01 October 2010 Publication History

Abstract

Many of the Information Assurance programs are looking for ways to improve their programs and incorporate assessment into the program. One way to do this is to add a capstone course at the end of the program. A well designed capstone course can allow your students to demonstrate their mastery of the program knowledge and skills.
Walsh College offers a Master of Science in Information Assurance (MSIA) degree program that includes a capstone course. The capstone course is modeled after the Master of Science in Business Information Technology (MSBIT) capstone course originally developed by Dr. W. Don Gottwald. The capstone course was designed to meet the school's goals and objectives, be integrative, span the program curriculum, and be rigorous for the students. To complete the capstone course, every student needs to demonstrate a mastery of the skills taught across the twelve courses in the IA program which is exclusively offered online.
This project attempts to identify the design issues that a school should address before launching a capstone course. A well designed capstone course will help the school, faculty, and students succeed with the program.

References

[1]
Jervis, K., & Hartley, C. (2005). Learning to design and teach an accounting capstone. Issues in Accounting Education. 20(4), 311--339.
[2]
Nguyen, T., McIntyre, C., & Diab, M. (2006). Assessing learning and teaching performance of a construction capstone course. International Journal of Construction Education and Research. 151--166.
[3]
Ford, J. & Teare, S. (2006). The right answer is communication when capstone engineering courses drive the questions. Journal of STEM Education. 7(3&4), 5--12.
[4]
Kerrigan, S. (2007). Assessing general education capstone courses: An in-depth look at a nationally recognized capstone assessment model. Peer Review. 9(2), 13--16.
[5]
Matos, V., & Grasser, R. (2007) Using reengineering as an integrating capstone experience. Journal of Information Systems Education. 18(1), 85--101.
[6]
Wei, K., Siow, J., & Burley, D. (2007) Implementing service-learning to the information systems and technology management program: A study of an undergraduate capstone course. Journal of Information Systems Education. 18(1), 125--136.
[7]
Conger, S., Blanke, S., Poulios, N, & Livermore, J. (2009). Two different approaches to successful capstones. Proceedings of the 2009 International Conference on Informatics Education Research. Phoenix, AZ.
[8]
Rosenberry, J., & Vicker, L. (2006). Capstone course in mass communications programs. Journalism & Mass Communications Educator. 61(3), 267--283.
[9]
Fernandez, N. (2006). Assessment matters: Integration, reflection, interpretation: Realizing the goals of a general education capstone course. About Campus. 30(3), 431--454.
[10]
McGrew, R. (2010). Capture the flag! The Use of Competition in Information Assurance Education. Tutorial presented at the Fourteenth Colloquium for Information Systems Security Education, Baltimore, MD.
[11]
Anonymous. (2010, May 11). Jenzabar and Wimba partner to provide campus-wide, Enterprise collaboration. Business Wire.
[12]
Flatley, M. (2007). Teaching the virtual presentation. Business Communication Quarterly. 70(3).

Cited By

View all
  • (2017)Innovative Pedagogical Approaches to a Capstone Laboratory Course in Cyber OperationsProceedings of the 2017 ACM SIGCSE Technical Symposium on Computer Science Education10.1145/3017680.3017720(429-434)Online publication date: 8-Mar-2017

Index Terms

  1. Designing a graduate Capstone course for an online information assurance program

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Other conferences
      InfoSecCD '10: 2010 Information Security Curriculum Development Conference
      October 2010
      187 pages
      ISBN:9781450302029
      DOI:10.1145/1940941
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Sponsors

      • KSU - CISE: KSU Center for InfoSec Education
      • ISSA: The Metro Atlanta Information Systems Security Association

      In-Cooperation

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 01 October 2010

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. Capstone experience
      2. information security education

      Qualifiers

      • Research-article

      Conference

      InfoSecCD '10
      Sponsor:
      • KSU - CISE
      • ISSA

      Acceptance Rates

      Overall Acceptance Rate 18 of 23 submissions, 78%

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)1
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 11 Feb 2025

      Other Metrics

      Citations

      Cited By

      View all
      • (2017)Innovative Pedagogical Approaches to a Capstone Laboratory Course in Cyber OperationsProceedings of the 2017 ACM SIGCSE Technical Symposium on Computer Science Education10.1145/3017680.3017720(429-434)Online publication date: 8-Mar-2017

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Figures

      Tables

      Media

      Share

      Share

      Share this Publication link

      Share on social media