skip to main content
column

Associate-degree IT2014: a call for course examples and curriculum champions

Published:01 June 2014Publication History
First page image

References

  1. BET. (2014). 2014-2015 Criteria for Accrediting Computing Programs. http://www.abet.org/caccriteria-2014-2015/. Accessed 2014 March 1.Google ScholarGoogle Scholar
  2. ACM & IEEE. (December 2013). Computer Science Curricula 2013: Curriculum Guidelines for Undergraduate Degree Programs in Computer Science. DOI: 10.1145/2534860. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. ACM & IEEE. (2008). Information Technology: Curriculum Guidelines for Undergraduate Degree Programs in Information Technology. http://www.acm.org/education/curricula/IT2008Curriculum.pdf. Accessed 2014 March 1.Google ScholarGoogle Scholar
  4. ACM. (2012). ACM Computing Classification System. https://www.acm.org/about/class/2012/. Accessed 2014 March 1.Google ScholarGoogle Scholar
  5. CAP Space. http:/www.capspace.org. Accessed 2014 April 15.Google ScholarGoogle Scholar
  6. CAP Space Assessment. http:/www.capspace.org/assessment/ITcore/. Accessed 2014 April 15.Google ScholarGoogle Scholar
  7. CAP Space Contact. http:/www.capspace.org/contactus/. Accessed 2014 April 15.Google ScholarGoogle Scholar
  8. CAP Space Correlation. http:/www.capspace.org/correlation/. Accessed 3014 April 15.Google ScholarGoogle Scholar
  9. CAP Space IT Core. http:/www.capspace.org/ITcore/. Accessed 2014 April 15.Google ScholarGoogle Scholar
  10. CAP Space Mappings. http:/www.capspace.org/mappings/ITcore/. Accessed 2014 April 15.Google ScholarGoogle Scholar
  11. Common Criteria for Information Technology Security Evaluation. http://www.commoncriteriaportal.org/. Accessed 2014 March 1.Google ScholarGoogle Scholar
  12. Computer Science Teachers Association. http://csta.acm.org/. Accessed 2014 March 1.Google ScholarGoogle Scholar
  13. European e-Competence Framework. http://www.ecompetences.eu/. Accessed 2014 March 1.Google ScholarGoogle Scholar
  14. Hawthorne, E.K. (March 2012). "Associate-degree curricular guidance for information technology." ACM Inroads, 3(1), 28--29. DOI: 10.1145/2077808.2077817. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Hawthorne, E.K. (December 2012). "CS2013: a call for community college exemplars." ACM Inroads, 3(4), 24--25. DOI: 10.1145/2381083.2381094. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Hawthorne, E.K. (December 2013). "Curricular guidance for IT associate-degree programs." ACM Inroads, 4(4), 26--27. DOI: 10.1145/2537753.2537764. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Hawthorne, E.K. (March 2014). "CS2013 exemplar spotlight on two-year colleges." ACM Inroads, 5(1), 31--34. DOI: 10.1145/2568195.2568206. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. National Initiative for Cybersecurity Education. (2013). National Cybersecurity Workforce Framework. http://csrc.nist.gov/nice/framework/. Accessed 2014 March 1.Google ScholarGoogle Scholar
  19. U.S. Department of Labor. (2012). Information Technology Competency Model. http://www.careeronestop.org/COMPETENCYMODEL/competency-models/information-technology.aspx. Accessed 2014 March 1.Google ScholarGoogle Scholar

Index Terms

  1. Associate-degree IT2014: a call for course examples and curriculum champions

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in

      Full Access

      • Published in

        cover image ACM Inroads
        ACM Inroads  Volume 5, Issue 2
        June 2014
        50 pages
        ISSN:2153-2184
        EISSN:2153-2192
        DOI:10.1145/2614512
        Issue’s Table of Contents

        Copyright © 2014 Copyright is held by the owner/author(s)

        Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 1 June 2014

        Check for updates

        Qualifiers

        • column
        • Popular
        • Un-reviewed
      • Article Metrics

        • Downloads (Last 12 months)0
        • Downloads (Last 6 weeks)0

        Other Metrics

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      HTML Format

      View this article in HTML Format .

      View HTML Format