-
CiteScore
0.11
Impact Factor
IECE Transactions on Computer Science, 2024, Volume 1, Issue 1: 26-31

Free to Read | Research Article | 23 November 2024
1 College of Information Engineering, Shaanxi Institute of International Trade & Commerce, Xi’an 712046, China
* Corresponding Author: Pengyi Zheng, [email protected]
Received: 27 September 2024, Accepted: 12 November 2024, Published: 23 November 2024  
Abstract
In alignment with the objective of integrating ideological and political education within curricula, this study uses the "Information Security" course as a model to illustrate the approach of embedding core ideologies pertinent to the forefront of international scientific application, national key needs, and the primary battlegrounds of the economy. By weaving frontier science and technology along with national security regulations into the educational practice, this research delves into teaching cases within the information security domain to construct a curriculum system that seamlessly integrates ideological, political, and academic content. The system aims to foster the cultivation and practice of socialist core values, guiding students towards proper personal and professional conduct. This abstract presents a methodology for curriculum reform that not only enriches academic content but also instills ethical and social responsibilities in students, contributing to the holistic development of future professionals.

Graphical Abstract
Reforming Curriculum Ideology and Political Construction: A Case Study of the ’Information Security’ Course

Keywords
curriculum ideological and political education
information safety
curriculum system

Funding
This work was supported by 2019 Shaanxi higher education teaching reform research project "ideological and political research and practice of 'information security' course in the era of big data" of funding agency under Grant 19BY135.

Cite This Article
APA Style
Zheng, P., Wang, X.,& Li, J. (2024). Reforming Curriculum Ideology and Political Construction: A Case Study of the ’Information Security’ Course. IECE Transactions on Computer Science, 1(1), 26–31. https://doi.org/10.62762/TCS.2024.210691

References
  1. Hu Aiqun, Li Guyue, Peng linning, Li Tao. Teaching exploration of Cyberspace Security Frontier Technology integrated with ideological and Political Education [J]. Journal of network and information security, 2019, 5(3):54-66.
    [Google Scholar]
  2. Xu Jianguang. Adhere to the whole curriculum education and deepen the curriculum ideological and political reform [J]. Shanghai Education, 2017 (12):14-14.
    [Google Scholar]
  3. Liu Lei, Liu Li. Connotation and significance of "Three Orientations" science and technology policy [J]. Global science and technology economy outlook, 2018, 33 (11):25-30.
    [Google Scholar]
  4. Si Jin. Exploration and practice of Ideological and political education in professional and technical courses [J]. Computer age, 2020, 332 (02):98-100.
    [Google Scholar]
  5. Ding Zhiguo. Exploration on the teaching reform of science and engineering courses from the perspective of "Curriculum Ideology and politics" – Taking "software quality assurance and testing" as an example [J]. China information technology education, 2020, 334 (10):101-103.
    [Google Scholar]
  6. Feng Jianwen, Miao Liming. Reform and practice of Ideological and political education of software engineering course in Colleges and universities [J]. Education modernization, 2020, 7 (01):29-31.
    [Google Scholar]
  7. Lu Yulin. Thinking on the collaborative education of various courses and ideological and political theory courses [J]. Science and education Wenhui, 2017, 12 (34):32-33.
    [Google Scholar]
  8. Bai Yinhua. Effective ways to enhance the affinity of Ideological and political theory courses in Colleges and Universities under the new situation [J]. Changjiang series, 2017 (28):250.
    [Google Scholar]
  9. Hu Aiqun, Li Guyue, Peng linning, Li Tao. Teaching exploration of Cyberspace Security Frontier Technology integrated with ideological and Political Education [J]. Journal of network and information security, 2019, 5(3):54-66.
    [Google Scholar]
  10. Xu Jing. Teaching reform and practice of Ideological and political education in the course of introduction to information security guided by law-abiding [J]. Education modernization, 201, 6 (59):66-68.
    [Google Scholar]
  11. Wang, Y., Li, H., & Li, X. (2017). A case of on-chip memory subsystem design for low-power CNN accelerators. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 37(10), 1971-1984.
    [Google Scholar]
  12. Liu, C., Chu, C., Xu, D., Wang, Y., Wang, Q., Li, H., ... & Cheng, K. T. (2021). HyCA: A hybrid computing architecture for fault-tolerant deep learning. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 41(10), 3400-3413.
    [Google Scholar]
  13. Xu, D., Chu, C., Wang, Q., Liu, C., Wang, Y., Zhang, L., ... & Cheng, K. T. (2020, October). A hybrid computing architecture for fault-tolerant deep learning accelerators. In 2020 IEEE 38th International Conference on Computer Design (ICCD) (pp. 478-485). IEEE.
    [Google Scholar]
  14. Ma, X., Wang, Y., Wang, Y., Cai, X., & Han, Y. (2022). Survey on chiplets: interface, interconnect and integration methodology. CCF Transactions on High Performance Computing, 4(1), 43-52.
    [Google Scholar]
  15. Wu, B., Wang, C., Wang, Z., Wang, Y., Zhang, D., Liu, D., ... & Hu, X. S. (2020). Field-free 3T2SOT MRAM for non-volatile cache memories. IEEE Transactions on Circuits and Systems I: Regular Papers, 67(12), 4660-4669.
    [Google Scholar]

Article Metrics
Citations:

Crossref

0

Scopus

0

Web of Science

0
Article Access Statistics:
Views: 175
PDF Downloads: 9

Publisher's Note
IECE stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions
Institute of Emerging and Computer Engineers (IECE) or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
IECE Transactions on Computer Science

IECE Transactions on Computer Science

ISSN: request pending (Online)

Email: [email protected]

Portico

Portico

All published articles are preserved here permanently:
https://www.portico.org/publishers/iece/

Copyright © 2024 Institute of Emerging and Computer Engineers Inc.