Available online at www.sciencedirect.com IERI Procedia 2 (2012 ) 868 872 2012 International Conference on Future Computer Supported Education Discussion on Outstanding Engineers Training Program for Information Security Major in China Huan Chen a, Zhenhua Tan a, *, Guangming Yang a a Software College of Northeastern University, Shenyang, China, 110819 Abstract This paper discusses the deployment method of Chinese outstanding engineers training plan for information security major. The plan needs two parts of training including school stage and enterprise stage and this paper proposes a training schema for the latter stage. Through professional knowledge learning, career planning, engineering practice and graduation design in enterprise, the students study and practice time in enterprise is at least a year. In the education and practice stage in enterprise, taking university-enterprise cooperation guide way, we establish the university-enterprise cooperation training mechanism and formulate professional training scheme and training programs in enterprise. 2012 Published by by Elsevier B.V. B.V. Open access under CC BY-NC-ND license. Selection and peer review under responsibility of of Information Engineering Research Institute Keywords: information security major; outstanding engineers plan; education program 1. Introduction Information security is related to the country s political security, military security, economic security, technological security and social security. It plays an important role in the success or failure of the opening up reform and socialism modernization. The government has put information security on the strategic position in the deployment of information technology in the country [1-8]. Recently three years, the Chinese Education * Corresponding author. Tel.: +86-24-8368 3990; fax: +86-24-8368 0522. E-mail address: tanzh@mail.neu.edu.cn 2212-6678 2012 Published by Elsevier B.V. Selection and peer review under responsibility of Information Engineering Research Institute Open access under CC BY-NC-ND license. doi:10.1016/j.ieri.2012.06.184
Huan Chen et al. / IERI Procedia 2 ( 2012 ) 868 872 869 Department proposes a quite new plan called "Outstanding Engineers" for university talents training. The program for training outstanding engineers of information security needs two parts, the school stage and the education and practice stage in enterprise. The practice stage based on the school stage combines the social requirements and nurtures students professional knowledge, engineering practice, humanistic quality. Through professional knowledge learning, career planning, engineering practice and graduation design in enterprise, the students study and practice time in enterprise is at least a year. In the education and practice stage in enterprise, taking university-enterprise cooperation guide way, we establish the university-enterprise cooperation training mechanism and formulate professional training scheme and training programs in enterprise. The following sections will introduce our training objectives and methods. 2. Training Objectives Through the education in enterprise, it cultivates a talent who owns development experience in mediumsized software project and has solid knowledge, high quality, strong analytical and problem solving ability and practical ability. Applied outstanding engineers should have the necessary basic development, debugging and deployment ability in software project and could solve the basic problems meeting in project development; they should be with good learning ability, communication ability, environmental adaptability and teamwork skills; they should have good professional ethics and strong sense of social responsibility. The plan makes the students engineering practice ability, innovation and entrepreneurial ability as the core, the engineering practice and research training as the main line. Through the education and practice stage in enterprise, students could master the basic and theoretical knowledge in the field of information security, could increase the engineering practice ability, innovation and entrepreneurial ability, research ability in the practical project. Besides, the plan fully trains the students ability in teamwork, management, marketing, communication and service, expects to cultivate applied, research and design type, high quality talents who own international competitiveness. 3. Training Standard Through the training outstanding engineers plan, training student will be done as the following several aspects. 3.1. Professional Ethics. To form a good professional ethics should be familiar with polices, laws and regulations related with the information security industry. Understand the relevant enterprise culture, core values and be equipped with the good professional ethics, political literacy and legal consciousness. Abide by the regulations, technical standards and professional norms of the information security industry. Have better scientific thinking research methods and realistic and innovative consciousness. 3.2. Specialized Knowledge and Technology Students should master general and specialized knowledge and technology of the information security and have preliminary related skills. (1) To master basic engineering knowledge and the preliminary ability of solving the problems in information security project development. Understand the principle and method of the program design. Understand the basic process, content, method and characteristics of the project development.
870 Huan Chen et al. / IERI Procedia 2 ( 2012 ) 868 872 (2) To master the software project development ability of program design. Expertly master one programming language, familiar with related development platform and development tools and have the good program development ability. 3.3. Project Skills Students should master the basic technology of project development and management. (1) To understand the technical standards of the information security professional field, and grasp the solid basic knowledge of the engineering and have opening skills to solving the engineering technical problems. (2) To comprehensively use of the knowledge and methods related with economy, management, to organize information security project and manage the engineering. Have effective communication and communication skills, team cooperation ability and leadership skills. (3) To master the search knowledge, literature reviews and induction ability from engineering practice. Have the ability of engineering reasoning and solve engineering problems. (4) To have a strong innovation consciousness, creative thinking and the ability of dealing with the information security emergencies. 3.4. Communication Skills We also hope students could be trained in communication skills, including: (1) To have effective communication skills. (2) To have communication and expression ability of using software engineering technology language in a cross-cultural environment. (3) To have strong adaptability, confidently and flexibly deal with new and changing interpersonal environment and working environment. (4) To have the ability of collecting, analyzing, judging and choosing the software industry at home and abroad. (5) To have teamwork spirit and the preliminary ability of coordinating, managing, competing and cooperating. (6) To have a good command of English, Japanese and Korean. (7) To have good professional ethics, reflecting on responsibility for profession, society and environment. (8) To have the consciousness of Abiding by the professional ethics and practicing the code of conduct of occupations system. (9) To have good consciousness of quality, safety, service and the environmental protection, and actively undertake the responsibility of health, safety and welfare and so on. (10) To have the consciousness and ability of reflecting, learning, accumulating knowledge and improving the skills, to preserve and enhance the professional accomplishment. 4. Appraisal System in Enterprise In the program of training professional excellent engineer, the phase of the examination can be divided into two parts, the engineering practice assessment and the assessment of graduation design. The enterprise engineering practice assessment can be divided into three parts, corporate assessment, evaluation of project reports and comprehensive assessment. The assessment is divided into three parts, graduate design thesis assessment, business assessment, and comprehensive assessment. The comprehensive assessment determines
Huan Chen et al. / IERI Procedia 2 ( 2012 ) 868 872 871 student's final examination results based on the paper assessment, business assessment and the assessment of the project report. 4.1. Appraisal System for Enterprise Engineering The practical assessment standards of the student projects are developed by the enterprise and school according to the quality, competence and performance which is based on the actual operation of the staff appraisal system. The quality of students mainly refers to the recognition of the distribution of work, having a certain career accomplishment; the ability of the thinking and business levels including the potential ability which is used to complete the work. The results are mainly refers to the amount of the work completed by the students during the project practices which including corporate allocation of various types of tasks. The Corporate mentors give an assessment to the students as the performance of the students. (1) Project assessment The project report is a summary of the project and the work which reflects the students' grasp of the overall project objectives, the known of the content of the project and the harvest from their work in the project. We can also examine the ability of the students professional knowledge about information security, the practical ability and the professionalism required in the future. The assessment result of the student project is given by the processional teacher and the corporate mentor. (2) Comprehensive assessment We elect some information security technology experts from business units, the business executives and the information security professional teachers from school make up a coalition anonymous panel of judges, assessed by the scene respondent of the student, including the corporate assessment and the project report as a preliminary basis, combining with the student's project reports and statements of the respondent as a comprehensive assessment which is the final test results. 4.2. Graduation design appraisal mechanism Paper assessment: Bachelor s degree paper should be advanced, innovative and workload. And it can reflect the ability of students to apply scientific theories, methods and techniques to solve practical problems. The paper could take different forms, for instance it can be research reports, project work, product development, case studies, project management and so on. The supervisors in school give an assessment result to students' papers. (1) Corporate assessment It is proceed from the three aspects of quality, competence, performance, and based on the actual operation of the staff appraisal system in corporation and in accordance with the practical assessment standards developed jointly by school. The quality mainly refers to the students' recognition of the distribution of work, and the certain career accomplishment. The competence mainly means students have the thinking and business ability to complete the work including document capabilities, project organization and management capabilities. The performance mainly refers to the amount of work which completed by the students during the project practice, including various types of tasks allocated by corporation. Supervisors in the corporation which the students take part in give an assessment result of the performance of students in the corporation. (2) Comprehensive Assessment Comprehensive assessment will elect a number of technical experts in the field of information security from the Joint Corporation, and people in charge of the corporation and the information security professional teachers to form a coalition anonymous panel of judges, and assessed by the respondent of the students' reply in site, and joint the thesis and the enterprise assessment with the statement of the work in paper, enterprises
872 Huan Chen et al. / IERI Procedia 2 ( 2012 ) 868 872 and other factors as the comprehensive assessment. And the comprehensive assessment will be the final results. Acknowledgements This work is supported by the Doctor Program Foundation of Education Ministry of China (No. 20110042120027), the Fundamental Research Funds for the Central Universities of China (No. N110417006, N110204003). References [1] China Ministry of Education Class Information Security Steering Committee for Professional Teaching. http://www.sec-edu.cn/index.html. [2] Rauh Jonathan. Online education as a toll good: An examination of the South Carolina virtual school program [J].Computers and Education, 2011, 57(2):1583-1594. [3] Wang Y H, Liu, G Y.China accounting education change in the knowledge society: The constructivism education[c]//2nd International Workshop on Education Technology and Computer Science, ETCS 2010, v 3, p 542-545, 2010. [4] Garrido J M, Bandyopadhyay T. Simulation model development in information security education[c]//proceedings of the 2009 Information Security Curriculum Development Annual Conference, InfoSecCD'09, p 21-26, 2009. [5] Al-Hamdani W A, Dixie W D. Information security policy in small education organization[c]//proceedings of the 2009 Information Security Curriculum Development Annual Conference, InfoSecCD'09, p 72-76, 2009. [6] Wu C Y. Analysis on the information security education for the public security active forces academy[c]//2010 International Forum on Information Technology and Applications, IFITA 2010, v 3, p 355-357, 2010. [7] Marks A, Rezgui Y. A comparative study of information security awareness in higher education based on the concept of design theorizing[c]//international Conference on Management and Service Science, MASS 2009, 2009. [8] Aboutabl M. The CyberDefense laboratory: A framework for information security education[c]//proceedings of the 2006 IEEE Workshop on Information Assurance, v 2006, p 55-60, 2006.