1. Research on the effectiveness evaluation of cyber security curriculum construction for combating telecom network fraud
- Author
-
Shengli ZHOU, Keyi JIANG, Bo XU, Rui XU, Xikang ZHANG, Quanzhe ZHAO, and Yangdong XU
- Subjects
telecom network fraud ,cyber security ,effectiveness evaluation ,mathematical analysis ,Telecommunication ,TK5101-6720 ,Technology - Abstract
The governance of telecom network fraud under the new situation puts forward new requirements for developing network security courses of public security colleges.Considering the cyber security curriculums in public security colleges and universities that were not adaptive or practical enough in terms of training objectives, training plans, evaluation systems, etc, the methods such as chi-square test and independent samples t-test were used to analyze the construction status of cyber security curriculums in major public security universities and colleges nationwide, and the quantitative evaluation of course effectiveness was achieved by combining score card mathematical analysis.Based on the data analysis, an optimization path for the construction of cyber security curriculums in major public security universities and colleges was proposed.
- Published
- 2023
- Full Text
- View/download PDF