The purpose of this study is to examine the nature and content of the rapidly evolving undergraduate Principles of Information/Cybersecurity course which has been attracting an ever-growing attention in the computing ...The purpose of this study is to examine the nature and content of the rapidly evolving undergraduate Principles of Information/Cybersecurity course which has been attracting an ever-growing attention in the computing discipline, for the past decade. More specifically, it is to provide an impetus for the design of standardized principles of Information/Cybersecurity course. To achieve this, a survey of colleges and universities that offer the course was conducted. Several schools of engineering and business, in universities and colleges across several countries were surveyed to generate necessary data. Effort was made to direct the questionnaire only to Computer Information System (CIS), Computer Science (CS), Management Information System (MIS), Information System (IS) and other computer-related departments. The study instrument consisted of two main parts: one part addressed the institutional demographic information, while the other focused on the relevant elements of the course. There are sixty-two (62) questionnaire items covering areas such as demographics, perception of the course, course content and coverage, teaching preferences, method of delivery and course technology deployed, assigned textbooks and associated resources, learner support, course assessments, as well as the licensure-based certifications. Several themes emerged from the data analysis: (a) the principles course is an integral part of most cybersecurity programs;(b) majority of the courses examined, stress both strong technical and hands-on skills;(c) encourage vendor-neutral certifications as a course exit characteristic;and (d) an end-of-course class project, remains a standard requirement for successful course completion. Overall, the study makes it clear that cybersecurity is a multilateral discipline, and refuses to be confined by context and content. It is envisaged that the results of this study would turn out to be instructive for all practical purposes. We expect it to be one of the most definitive descriptive models of such a cardinal course, and help to guide and actually, shape the decisions of universities and academic programs focusing on information/cyber security in the updating and upgrading their curricula, most especially, the foundational principles course in light of new findings that are herein articulated.展开更多
Behaviour of scalar and vector characteristics of steady-state acoustical field is modeled based on analytical-numerical approach. This field is radiated by low-frequency monochromatic point-like source in the determi...Behaviour of scalar and vector characteristics of steady-state acoustical field is modeled based on analytical-numerical approach. This field is radiated by low-frequency monochromatic point-like source in the deterministic layered shallow sea, which has various hydrologic and bottom conditions. Approach being developed is free of any mathematical approximations and without the difficulties it enables to calculate sound field vector characteristics for various展开更多
The limited area 5-level primitive equation model,as the first operational precipitation forecast model in China,has been run at Beijing (National) Meteorological Center (BMC) for more than four years.The opera- tiona...The limited area 5-level primitive equation model,as the first operational precipitation forecast model in China,has been run at Beijing (National) Meteorological Center (BMC) for more than four years.The opera- tional results show that this model gives continuous services,and the forecast skill is satisfied for the forecast of some weather situations,such as extratropical cyclone,front and the precipitation associated with them. The forecast guides are widely used at the local weather services now.展开更多
A feasible hierarchical structure of MG is introduced and an XML format to describe manufacturing resource, an embedded NC system is illustrated. An example of encapsulated resource sharing is given to demonstrate the...A feasible hierarchical structure of MG is introduced and an XML format to describe manufacturing resource, an embedded NC system is illustrated. An example of encapsulated resource sharing is given to demonstrate the processes involved in realizing a user's request for a CAD resource service through parallel design and computing.展开更多
The paper starts from a discussion of the concepts of knowledge management versus technology management, and the emergence of knowledge sciences. This is followed be a summary of recent results in the theory of knowle...The paper starts from a discussion of the concepts of knowledge management versus technology management, and the emergence of knowledge sciences. This is followed be a summary of recent results in the theory of knowledge creation. Most of them concern diverse spirals of creative interplay between rational (explicit) and intuitive or emotional (tacit) aspects of knowledge. Some of them concentrate on organizational (market or purpose-oriented) knowledge creation, other describe academic (research-oriented) knowledge creation. The problem addressed in this paper is how to integrate diverse spirals of knowledge creation into a prescriptive or exemplar model that would help to overcome the differences between organizational (market-oriented) and normal academic knowledge creation. As such prescriptive approach, the JAIST Nanatsudaki Model of knowledge creation is proposed. It consists of seven spirals, known from other studies, but integrated in a sequence resulting from the experience of authors in practical management of research activities. Not all of these spirals have to be fully utilized, depending on a particular application, but all of them relate to some essential aspects of either academic or organizational knowledge creation. The paper presents Nanatsudaki Model in detail with comments on consecutive spirals. The results of a survey of opinions about creativity conditions at JAIST indicate the importance of many spirals constituting the Nanatsudaki Model. Directions of further testing the Nanatsudaki Model are indicated.展开更多
文摘The purpose of this study is to examine the nature and content of the rapidly evolving undergraduate Principles of Information/Cybersecurity course which has been attracting an ever-growing attention in the computing discipline, for the past decade. More specifically, it is to provide an impetus for the design of standardized principles of Information/Cybersecurity course. To achieve this, a survey of colleges and universities that offer the course was conducted. Several schools of engineering and business, in universities and colleges across several countries were surveyed to generate necessary data. Effort was made to direct the questionnaire only to Computer Information System (CIS), Computer Science (CS), Management Information System (MIS), Information System (IS) and other computer-related departments. The study instrument consisted of two main parts: one part addressed the institutional demographic information, while the other focused on the relevant elements of the course. There are sixty-two (62) questionnaire items covering areas such as demographics, perception of the course, course content and coverage, teaching preferences, method of delivery and course technology deployed, assigned textbooks and associated resources, learner support, course assessments, as well as the licensure-based certifications. Several themes emerged from the data analysis: (a) the principles course is an integral part of most cybersecurity programs;(b) majority of the courses examined, stress both strong technical and hands-on skills;(c) encourage vendor-neutral certifications as a course exit characteristic;and (d) an end-of-course class project, remains a standard requirement for successful course completion. Overall, the study makes it clear that cybersecurity is a multilateral discipline, and refuses to be confined by context and content. It is envisaged that the results of this study would turn out to be instructive for all practical purposes. We expect it to be one of the most definitive descriptive models of such a cardinal course, and help to guide and actually, shape the decisions of universities and academic programs focusing on information/cyber security in the updating and upgrading their curricula, most especially, the foundational principles course in light of new findings that are herein articulated.
基金This work was supported by the Foundation for University Key Teacher by the Ministry of Education of China.
文摘Behaviour of scalar and vector characteristics of steady-state acoustical field is modeled based on analytical-numerical approach. This field is radiated by low-frequency monochromatic point-like source in the deterministic layered shallow sea, which has various hydrologic and bottom conditions. Approach being developed is free of any mathematical approximations and without the difficulties it enables to calculate sound field vector characteristics for various
文摘The limited area 5-level primitive equation model,as the first operational precipitation forecast model in China,has been run at Beijing (National) Meteorological Center (BMC) for more than four years.The opera- tional results show that this model gives continuous services,and the forecast skill is satisfied for the forecast of some weather situations,such as extratropical cyclone,front and the precipitation associated with them. The forecast guides are widely used at the local weather services now.
基金Supported by the Natural Science Foundation of China (500335020)
文摘A feasible hierarchical structure of MG is introduced and an XML format to describe manufacturing resource, an embedded NC system is illustrated. An example of encapsulated resource sharing is given to demonstrate the processes involved in realizing a user's request for a CAD resource service through parallel design and computing.
文摘The paper starts from a discussion of the concepts of knowledge management versus technology management, and the emergence of knowledge sciences. This is followed be a summary of recent results in the theory of knowledge creation. Most of them concern diverse spirals of creative interplay between rational (explicit) and intuitive or emotional (tacit) aspects of knowledge. Some of them concentrate on organizational (market or purpose-oriented) knowledge creation, other describe academic (research-oriented) knowledge creation. The problem addressed in this paper is how to integrate diverse spirals of knowledge creation into a prescriptive or exemplar model that would help to overcome the differences between organizational (market-oriented) and normal academic knowledge creation. As such prescriptive approach, the JAIST Nanatsudaki Model of knowledge creation is proposed. It consists of seven spirals, known from other studies, but integrated in a sequence resulting from the experience of authors in practical management of research activities. Not all of these spirals have to be fully utilized, depending on a particular application, but all of them relate to some essential aspects of either academic or organizational knowledge creation. The paper presents Nanatsudaki Model in detail with comments on consecutive spirals. The results of a survey of opinions about creativity conditions at JAIST indicate the importance of many spirals constituting the Nanatsudaki Model. Directions of further testing the Nanatsudaki Model are indicated.