-
CiteScore
-
Impact Factor
IECE Transactions on Computer Science, 2024, Volume 1, Issue 1: 26-31

Free Access | Research Article | 23 November 2024
1 College of Information Engineering, Shaanxi Institute of International Trade & Commerce, Xi’an 712046, China
* Corresponding author: Pengyi Zheng, email: [email protected]
Received: 27 September 2024, Accepted: 12 November 2024, Published: 23 November 2024  

Abstract
In alignment with the objective of integrating ideological and political education within curricula, this study uses the "Information Security" course as a model to illustrate the approach of embedding core ideologies pertinent to the forefront of international scientific application, national key needs, and the primary battlegrounds of the economy. By weaving frontier science and technology along with national security regulations into the educational practice, this research delves into teaching cases within the information security domain to construct a curriculum system that seamlessly integrates ideological, political, and academic content. The system aims to foster the cultivation and practice of socialist core values, guiding students towards proper personal and professional conduct. This abstract presents a methodology for curriculum reform that not only enriches academic content but also instills ethical and social responsibilities in students, contributing to the holistic development of future professionals.

Graphical Abstract
Reforming Curriculum Ideology and Political Construction: A Case Study of the ’Information Security’ Course

Keywords
curriculum ideological and political education
information safety
curriculum system

References

[1] Hu Aiqun, Li Guyue, Peng linning, Li Tao. Teaching exploration of Cyberspace Security Frontier Technology integrated with ideological and Political Education [J]. Journal of network and information security, 2019, 5(3):54-66.

[2] Xu Jianguang. Adhere to the whole curriculum education and deepen the curriculum ideological and political reform [J]. Shanghai Education, 2017 (12):14-14.

[3] Liu Lei, Liu Li. Connotation and significance of "Three Orientations" science and technology policy [J]. Global science and technology economy outlook, 2018, 33 (11):25-30.

[4] Si Jin. Exploration and practice of Ideological and political education in professional and technical courses [J]. Computer age, 2020, 332 (02):98-100.

[5] Ding Zhiguo. Exploration on the teaching reform of science and engineering courses from the perspective of "Curriculum Ideology and politics" – Taking "software quality assurance and testing" as an example [J]. China information technology education, 2020, 334 (10):101-103.

[6] Feng Jianwen, Miao Liming. Reform and practice of Ideological and political education of software engineering course in Colleges and universities [J]. Education modernization, 2020, 7 (01):29-31.

[7] Lu Yulin. Thinking on the collaborative education of various courses and ideological and political theory courses [J]. Science and education Wenhui, 2017, 12 (34):32-33.

[8] Bai Yinhua. Effective ways to enhance the affinity of Ideological and political theory courses in Colleges and Universities under the new situation [J]. Changjiang series, 2017 (28):250.

[9] Hu Aiqun, Li Guyue, Peng linning, Li Tao. Teaching exploration of Cyberspace Security Frontier Technology integrated with ideological and Political Education [J]. Journal of network and information security, 2019, 5(3):54-66.

[10] Xu Jing. Teaching reform and practice of Ideological and political education in the course of introduction to information security guided by law-abiding [J]. Education modernization, 201, 6 (59):66-68.

[11] Wang, Y., Li, H., & Li, X. (2017). A case of on-chip memory subsystem design for low-power CNN accelerators. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 37(10), 1971-1984.

[12] Liu, C., Chu, C., Xu, D., Wang, Y., Wang, Q., Li, H., ... & Cheng, K. T. (2021). HyCA: A hybrid computing architecture for fault-tolerant deep learning. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 41(10), 3400-3413.

[13] Xu, D., Chu, C., Wang, Q., Liu, C., Wang, Y., Zhang, L., ... & Cheng, K. T. (2020, October). A hybrid computing architecture for fault-tolerant deep learning accelerators. In 2020 IEEE 38th International Conference on Computer Design (ICCD) (pp. 478-485). IEEE.

[14] Ma, X., Wang, Y., Wang, Y., Cai, X., & Han, Y. (2022). Survey on chiplets: interface, interconnect and integration methodology. CCF Transactions on High Performance Computing, 4(1), 43-52.

[15] Wu, B., Wang, C., Wang, Z., Wang, Y., Zhang, D., Liu, D., ... & Hu, X. S. (2020). Field-free 3T2SOT MRAM for non-volatile cache memories. IEEE Transactions on Circuits and Systems I: Regular Papers, 67(12), 4660-4669.


Cite This Article
APA Style
Zheng, P., Wang, X.,& Li, J. (2024). Reforming Curriculum Ideology and Political Construction: A Case Study of the ’Information Security’ Course. IECE Transactions on Computer Science, 1(1), 26–31. https://doi.org/10.62762/TCS.2024.210691

Article Metrics
Citations:

Crossref

0

Scopus

0

Web of Science

0
Article Access Statistics:
Views: 24
PDF Downloads: 2

Publisher's Note
IECE stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions
IECE or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
IECE Transactions on Computer Science

IECE Transactions on Computer Science

ISSN: request pending (Online)

Email: [email protected]

Portico

Portico

All published articles are preserved here permanently:
https://www.portico.org/publishers/iece/

Copyright © 2024 Institute of Emerging and Computer Engineers Inc.