CTI教学模式与传统的知识教学相比,更加体现了知识理解与核心素养的结合。更有利于培养学生的数学核心素养。但在现在的数学课程标准中并没有回答如何通过知识的教学来培养学生的核心素养。研究借助访谈法,探索CTI模式在初中数学教学中...CTI教学模式与传统的知识教学相比,更加体现了知识理解与核心素养的结合。更有利于培养学生的数学核心素养。但在现在的数学课程标准中并没有回答如何通过知识的教学来培养学生的核心素养。研究借助访谈法,探索CTI模式在初中数学教学中的实施效果,来体现初中数学教学的基础性价值。文章将在CTI模式的三个环节方面提出相应的策略。Compared with traditional knowledge teaching, the CTI teaching model reflects the combination of knowledge understanding and core literacy. It is more conducive to cultivating students’ core literacy in mathematics. However, the present mathematics curriculum standard does not answer how to cultivate students’ core quality through knowledge teaching. This paper will put forward the corresponding strategies in three aspects of CTI mode.展开更多
There are two broad objectives of the research reported in this paper. First, we assess whether government-provided cyber threat intelligence (CTI) is helpful in preventing, or responding to, cyber-attacks among small...There are two broad objectives of the research reported in this paper. First, we assess whether government-provided cyber threat intelligence (CTI) is helpful in preventing, or responding to, cyber-attacks among small businesses within the U.S. Defense Industrial Base (DIB). Second, we identify ways of improving the effectiveness of government-provided CTI to small businesses within the DIB. Based on a questionnaire-based survey, our findings suggest that government-provided CTI helps businesses within the DIB in preventing, or responding to, cyber-attacks providing a firm is familiar with the CTI. Unfortunately, a large percentage of small firms are not familiar with the government-provided CTI feeds and consequently are not utilizing the CTI. This latter situation is largely due to financial constraints confronting small businesses that prevent firms from having the wherewithal necessary to effectively utilize the government-provided CTI. However, we found a significant positive association between a firm’s familiarity with the government-provided CTI and whether a firm is being periodically reviewed by the Defense Counterintelligence and Security Agency (DCSA) or is compliant with the Cybersecurity Maturity Model Certification (CMMC) program. The findings from our study also show that the participating firms believe that external cyber threats are more likely to be the cause of a future cybersecurity breach than internal cybersecurity threats. Finally, our study found that the portion of the IT budget that small businesses within the DIB spend on cybersecurity-related activities is dependent on the perception that a firm would be the target of an external cyber-attack.展开更多
文摘CTI教学模式与传统的知识教学相比,更加体现了知识理解与核心素养的结合。更有利于培养学生的数学核心素养。但在现在的数学课程标准中并没有回答如何通过知识的教学来培养学生的核心素养。研究借助访谈法,探索CTI模式在初中数学教学中的实施效果,来体现初中数学教学的基础性价值。文章将在CTI模式的三个环节方面提出相应的策略。Compared with traditional knowledge teaching, the CTI teaching model reflects the combination of knowledge understanding and core literacy. It is more conducive to cultivating students’ core literacy in mathematics. However, the present mathematics curriculum standard does not answer how to cultivate students’ core quality through knowledge teaching. This paper will put forward the corresponding strategies in three aspects of CTI mode.
文摘There are two broad objectives of the research reported in this paper. First, we assess whether government-provided cyber threat intelligence (CTI) is helpful in preventing, or responding to, cyber-attacks among small businesses within the U.S. Defense Industrial Base (DIB). Second, we identify ways of improving the effectiveness of government-provided CTI to small businesses within the DIB. Based on a questionnaire-based survey, our findings suggest that government-provided CTI helps businesses within the DIB in preventing, or responding to, cyber-attacks providing a firm is familiar with the CTI. Unfortunately, a large percentage of small firms are not familiar with the government-provided CTI feeds and consequently are not utilizing the CTI. This latter situation is largely due to financial constraints confronting small businesses that prevent firms from having the wherewithal necessary to effectively utilize the government-provided CTI. However, we found a significant positive association between a firm’s familiarity with the government-provided CTI and whether a firm is being periodically reviewed by the Defense Counterintelligence and Security Agency (DCSA) or is compliant with the Cybersecurity Maturity Model Certification (CMMC) program. The findings from our study also show that the participating firms believe that external cyber threats are more likely to be the cause of a future cybersecurity breach than internal cybersecurity threats. Finally, our study found that the portion of the IT budget that small businesses within the DIB spend on cybersecurity-related activities is dependent on the perception that a firm would be the target of an external cyber-attack.