skip to main content
10.1145/1940941.1940957acmotherconferencesArticle/Chapter ViewAbstractPublication PagesinfoseccdConference Proceedingsconference-collections
research-article

Designing a graduate Capstone course for an online information assurance program

Published:01 October 2010Publication History

ABSTRACT

Many of the Information Assurance programs are looking for ways to improve their programs and incorporate assessment into the program. One way to do this is to add a capstone course at the end of the program. A well designed capstone course can allow your students to demonstrate their mastery of the program knowledge and skills.

Walsh College offers a Master of Science in Information Assurance (MSIA) degree program that includes a capstone course. The capstone course is modeled after the Master of Science in Business Information Technology (MSBIT) capstone course originally developed by Dr. W. Don Gottwald. The capstone course was designed to meet the school's goals and objectives, be integrative, span the program curriculum, and be rigorous for the students. To complete the capstone course, every student needs to demonstrate a mastery of the skills taught across the twelve courses in the IA program which is exclusively offered online.

This project attempts to identify the design issues that a school should address before launching a capstone course. A well designed capstone course will help the school, faculty, and students succeed with the program.

References

  1. Jervis, K., & Hartley, C. (2005). Learning to design and teach an accounting capstone. Issues in Accounting Education. 20(4), 311--339.Google ScholarGoogle ScholarCross RefCross Ref
  2. Nguyen, T., McIntyre, C., & Diab, M. (2006). Assessing learning and teaching performance of a construction capstone course. International Journal of Construction Education and Research. 151--166.Google ScholarGoogle Scholar
  3. Ford, J. & Teare, S. (2006). The right answer is communication when capstone engineering courses drive the questions. Journal of STEM Education. 7(3&4), 5--12.Google ScholarGoogle Scholar
  4. Kerrigan, S. (2007). Assessing general education capstone courses: An in-depth look at a nationally recognized capstone assessment model. Peer Review. 9(2), 13--16.Google ScholarGoogle Scholar
  5. Matos, V., & Grasser, R. (2007) Using reengineering as an integrating capstone experience. Journal of Information Systems Education. 18(1), 85--101.Google ScholarGoogle Scholar
  6. Wei, K., Siow, J., & Burley, D. (2007) Implementing service-learning to the information systems and technology management program: A study of an undergraduate capstone course. Journal of Information Systems Education. 18(1), 125--136.Google ScholarGoogle Scholar
  7. Conger, S., Blanke, S., Poulios, N, & Livermore, J. (2009). Two different approaches to successful capstones. Proceedings of the 2009 International Conference on Informatics Education Research. Phoenix, AZ.Google ScholarGoogle Scholar
  8. Rosenberry, J., & Vicker, L. (2006). Capstone course in mass communications programs. Journalism & Mass Communications Educator. 61(3), 267--283.Google ScholarGoogle ScholarCross RefCross Ref
  9. Fernandez, N. (2006). Assessment matters: Integration, reflection, interpretation: Realizing the goals of a general education capstone course. About Campus. 30(3), 431--454.Google ScholarGoogle Scholar
  10. McGrew, R. (2010). Capture the flag! The Use of Competition in Information Assurance Education. Tutorial presented at the Fourteenth Colloquium for Information Systems Security Education, Baltimore, MD.Google ScholarGoogle Scholar
  11. Anonymous. (2010, May 11). Jenzabar and Wimba partner to provide campus-wide, Enterprise collaboration. Business Wire.Google ScholarGoogle Scholar
  12. Flatley, M. (2007). Teaching the virtual presentation. Business Communication Quarterly. 70(3).Google ScholarGoogle Scholar

Index Terms

  1. Designing a graduate Capstone course for an online information assurance program

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Other conferences
        InfoSecCD '10: 2010 Information Security Curriculum Development Conference
        October 2010
        187 pages
        ISBN:9781450302029
        DOI:10.1145/1940941

        Copyright © 2010 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 1 October 2010

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

        Acceptance Rates

        Overall Acceptance Rate18of23submissions,78%

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader