Exploration and Practice of Civic Teaching in Cybersecurity Technology Specialized Courses under the Background of Big Data
Affiliation:
1. School of Computer Engineering, Jingchu University of Technology , Jingmen , Hubei, , China . 2. Jingmen Cryptometry Application Technology Research Center , Jingmen , Hubei, , China . 3. Big Data Research Center, Jingchu University of Technology , Jingmen , Hubei, , China .
Abstract
Abstract
In recent years, curriculum Civics has begun to be widely used in higher education programs, providing new ideas and inspiration for the development and reform of higher education. The study integrates Civic Politics elements into the professional course of network security technology to teach Civic Politics in the curriculum. The improved TOPSIS method is used to construct a teaching evaluation model for the Civic Politics of Network Security Technology course, build an evaluation index system for the Civic Politics teaching effect of the Network Security Technology course, and determine the weights of the indexes at all levels. Factor analysis, difference analysis, and correlation analysis are carried out to analyze the situation of the network security technology course Civics. And explore the teaching effects of the network security technology course Civics. The highest score among the 15 factors of cyber course civics is cyber cultivation (8.89), while the lowest score is tenacity (7.77). There are significant differences in the factors of cultural confidence, dialectical thinking, aesthetic awareness, security awareness, and fairness and justice among students of different grades, and the factors of aesthetic awareness and fairness and justice among students of different disciplines become significantly different. There is a significant positive correlation between all the factors, among which the dialectical thinking factor has the strongest correlation with the total score of cybersecurity technology course civics. The total score of the teaching effect of the Civics of Cybersecurity Technology Course is 0.85, which is good.
Publisher
Walter de Gruyter GmbH
Reference27 articles.
1. Wolf, W., White, G. B., Fisch, E. A., Crago, S. P., Pooch, U. W., McMahon, J. O., ... & Lebak, J. M. (2017). Computer system and network security. CRC press. 2. Zeng, H., Liu, Z., & Cai, H. (2020, October). Research on the application of deep learning in computer network information security. In Journal of Physics: Conference Series (Vol. 1650, No. 3, p. 032117). IOP Publishing. 3. Lu, Z., Qu, G., & Liu, Z. (2018). A survey on recent advances in vehicular network security, trust, and privacy. IEEE Transactions on Intelligent Transportation Systems, 20(2), 760-776. 4. Ahmad, R., Wazirali, R., & Abu-Ain, T. (2022). Machine learning for wireless sensor networks security: An overview of challenges and issues. Sensors, 22(13), 4730. 5. Lin, H., Yan, Z., Chen, Y., & Zhang, L. (2018). A survey on network security-related data collection technologies. IEEE Access, 6, 18345-18365.
|
|