You are on page 1of 46

_____________________ ________________________

10638_____________ 313030503008



*
O
Research on the safety of the
ideology in universities construction under
the era of big data

A Dissertation
Submitted to the Graduate Faculty
In Partial Fulfillment of the Requirement
For the Degree of Master of Law
By
Kang Yan qin
Supervised by
Professor Huang Yuanquan
Major in
Research on Sinicism of Marxism

In
Institute of Marxism

China West Normal University


Nanchong, Sichuan Province, China

May, 2016


>...........................................................................................I
Abstract................................................................................................................................I

..................................................................1

......................................................1

....................................................... 1

....................................................... 1

......................................................3

................................................... 3

................................................... 7

........................................8

................................................. 8

................................................. 8

............................................... 8

....................................10

.................................................10

................................................... 10

............................................... 11

........................................... 11

............................................... 11

................................. 12

.............12

..................................... 13

............................. 13

......................................... 14

............................. 15

........................16
..........................16

............................................................
.......................................................... 16

............................................................ 1
7

......................17

............17

..........................18

......................................... 18

......................................... 18

.....................................19

.....................................19

........................... 21

................................... 21

......................... 21

................. 22

...............................22

.............................23

..........................24

........................... 24

....................... 25

...............................26

.............................27

............................. 29

......................................... 29

................................. 29

............................. 30
...................................31

..................................... 32

...................................32
...............................33

.............................................. 34

.......................................................
34

.......................................................
34

X .................................................................35

A:......................... 38

........................................................................... i

...................................................ii

.................................................... iii

.......................................................... iv
ni

2012

2013

4V VolumeVarit.yVelocityValue

Abstract
In 2012 the tenn big databegan to widely mentioned it was mainly used to
describe in the era of information explosion and it brought the enormous data generated by
the technical innovation as well as to the people livingworking and thinking to bring big
changes. In 2013China formally ushered in the era of big databig data is becoming a
part of the modem social infrastructurelike roads, railways, portswater and electricity
and communication network in the position in our daily life is indispensable. At the same
time, the data of the era of large data reserve and the technical concept, can insight in an
unprecedented fashion trend of the development of things and then influence peoples
value system, ways of thinking.
Ideological work is an extremely important work of the party and the state, colleges
and universities as gathering place of talents and are in the forefront of carrying out
ideological workshoulder the learning research and propaganda of marxism cultivate
and cany forward the socialist core values in order to achieve the great rejuvenation of
the Chinese nation the Chinese dream of an important task of provide talent guarantee and
intellectual support.

Living in the era of information explosion the university ideology security


construction work for a double-edged sword faced with the opportunities brought
about by the big data, both at the same time also faces a challenge. So the university
ideology security construction era of big data is aimed at analyzing the importance of the
construction of big data era college ideological security facing opportunity and
challenge, the present situation and causes, puts forward the countermeasures. The discuss
this subject from five aspects:
The first part: introduction. Mainly includes the research purpose and significance,
research status at home and abroad, research contents and methods, the emphases and
difficulties of the paper and the innovation points.
The second part: the era of big data university ideology security construction research
overview. Mainly includes the connotation and the characteristics of big data eracollege
ideological connotation and characteristics of safety construction, and analyzes the era of
big data necessity and urgency to s eng then the construction of colleges and
universities ideological security. This part is the theory of logic basis points.
The third part: the era of big data university ideology security facing opportunities
and challenges. This part mainly combined with the 4V(Volume Varity, Velocity,
Value) of the era of large data characteristics analysis in the era of big data university
ideology security construction facing the opportunities and challenges.

The fourth part: big data era ideology security problems and the causes of the
construction of the colleges and universities. This part is mainly based on the five colleges
and universities students of Nanchong Sichuan province, through a questionnaire and
sorting summary, analysis in the era of big data university ideology security construction
are faced with the problem and cause. This is the focus of the full text and bright spot.
The fifth part: the countermeasures to strengthen the construction of the college
ideological security in big data era.In the fourth part, on the basis of this section,
respectively from the state, society, government, colleges and universities, and individual
and so on five aspects put forward the corresponding countermeasures. This is a difficulty
and goal of this study.

Key words: big data era ;universities; ideology security construction


(-)












()

1.

2.
(1)

(2)

(3)

(4)

@.[M].:,2001:106.



2016 3 CNKI
301 63
11 12
5 2




1.



.
[D].2008


.[J]. 2010.8

.
[D].2005


n .
[D].,2004

. [J].
2005.8

.
WTO [J].2003.4

.
[J].,2008.12

. [J]. ,20
10.7


2.



, . [J].
2010.5

.
[D].,2009


.
[D ].2013


.
[D].2013


. [J].
2013.2


.
[D].2014


.
2014.1

3.
1



. [J]. ,20
14.1



.[J]. ,2014.6

.
[D].2013


.
[D].2013

. [D].
2007
2



. [D].
2013


.
[D].,2013



.
[J].,2013.2




.[J]. 2012.12



. [J].
,2014.6


.
[D].2013





(.
[D].,2013)


(.
[D]. 2007)

(.
[J]. 2014.12)



(. [J].
,2014.1)

()

*
(Herbert Marcuse) Y (Rodney
Stark)
(LouisAlthusser)
(Hans Barth.)
(king Fescher)
(WilhelmReich)
(IrichFromn)

(1)




2


3


1.

2.

3.

(-)
.-




Gartner
@




IBM 3V
(Volume)(Velocity)(Variety)
(Big Analytic)(Big Bandwidth) (Big Content)

'...[M].:2013:V.
.[J].2008 ( 11): 56 58.
.[M].:2002:36 37.
.[J].,2013 (4) :47-49,

IDC International Data Corporation, 2011


IT




4V
Volowne Vanty
Velocity
Volume

-
..

.









20 90

1
...[M].,:2013:
.






.-

.[M].:,2010:17.

(-)


()

B
...[M].,:2013(01).



20



20041
6
@






..M..,1998.64.
J.,2005-08-20.






..

0

@


.[J].,1991-04-19.
.[J].:1994-10-15.

(-)




2013 6.18 5

1
...[M].,:2013:V.


2015 12 11











2013





..,.M.
.2013: 125.

(-)
10TB (1TB=1O24GB)

PC
@






()





E-mail

. M.,2013 (08) :316, .


( J).2015.

2012 1 Youtube 40 6
0 Facebook Twitter
2012 4
















@




24


.[J].2013-03-08. .
[M].,2015:33.


5
2015 4 100
100 100
100 100 700
700
659
94%, 650
700
33 25
33
1825
700 68. 5%
9% 22%
38% 31%

(-)




2013



38% 39% 16% 7%
41%
20%25%

1
. [EB/OL]. :
http:/Avww.qsdieoiy.cn/zl/ztck/lgwsm/jcmkszy/200906/t20090630 3901 .htm .
14%
52%25%20%3%













650 69% 13%
13%5%
650 41%
31% 18%
10%



201
3 1 21
12 22




@
650 51%
22% 25%
2%
650 74%26%



__
53
1300 1.2 @




.[J].2014::29.
.[M]. 2012::31.
.[M].,2015:17.
. 4 [M].
2013:47.
. -
[N].2012-11-19.



n

650 72%
11. 5% 6. 5%
10%
650 55%
22%15% 8%


30%


(-)

20



20
20



@

.[J].,2006(12):8. .
[M].,2008:159.


21

2015 6 30, 6. 6
8 5. 94 357 4717761MbpsIPV4
3. 36 2231 2014




@
.

.[M].,2015 5 1 27 .
@
3 1979,56.

()
n



1
.[J].:2013 (10) 33.


20 80

@


80
@






@







()

[M].:,2011:176.
.[M].2014 (01) :42,
.[J].,2016 (03).
.--8.19[EN/OL].

05




http://theory.yongzhou.gov.en/2013/l 106/303898.html.

700



(-)

2013 8 19


@


@


:





80%

[EB/OL]. http://news.xinhuaiiet.com/2013-08/20/c_l 170214


64.htm.
.:[N].2015-12-07.
@
[N].
2013-8-21.

.:[J].1997, 6: 36-37.

3 1993 381 . 3 M :
1993:381.


(-)















@
@

.[M],2003:264.
3
.[M].,2015(03):190.
.,[N].2012-11-18.

4V






V

[1] 42 [M].1979.

[2] 1 [M].:1995.

[3] 3 [M].1972.

[4] [M].1993.

[5] .[M].

2013.

[6] .[M].2014.

[7] .[M].1993.

[8] .[M].1993.

[9] .[M].1997.

[10] .[M].1998.

[11] .[M].1999.

[12] .[M].2015.

[13] [].[M].

2013.

[14] .[M].2015.

[15] .[M].2015.

[16] .[M].2015.

[17] .[M].2012.

[18] .[M].2001.

[19] .[M].2002.

[20] .[M].:2002.

[21] .__[M].2003.

[22] [M].2004.

[23] .[M].2005.

[24] .[M].:2005.

[25] []..2005.

[26] . WT0 [M].2005.


[27] .[M].2005.

[28] .[M].2006.

[29] .[M].

2008.

[30] .[M].2009.

[31] .[M].2010.

[32] .[M]2011.

[33] .[M].:2011.

[34] .[M].:2011.

[3.5].[M].2011.

[36] [].B..[M].2012.

[37] .[M].1993.

[38] Jorge Larrain. [M].:

2005.

[39] .[M].2005.


[1] .[D].2005.
[2] .20 90 [D].2007.

[3] .[D].2007.

[4] .[D].2007.

[5] .[D].2007.

[6] .[D].2008.

[7] .[D].2008.

[8] .[D].2008.

[9] .[D].2008.

[10] .[D].2008.

[11] .[D].2010.

[12] .[D].2011.

[13 ].[D ].2 011.


[1] .[J].1991 (04).

[2] .[J].2000.

[3] .[J].2001.
[4] .[J].2001.

[5] .[J].2005.

[6] .[J].().2006(07).

[7] .[J].(

)2007 (9).

[8] .[J].2009.

[9] .[J].2009( 6).

[10] .[J].2010( 15),

[11] .[J].2010.

[12] .[J].201 0.

[13] .[J].2010 (03).

[14] .[J].

2011( 2).

[15] .[J].

2011 (11).

[16] .[J].2011. (12).

[17] .[J].2011 (1).

[18] .[J].2011.

[19] .[J].2012.

[20] .[J].201 2 (0

4).

[21] .[J].2012 (12).

[22] .[J].,2013.

[23] .[J].2013(6).

[24] .[J]. 2

013 (5).

[25] .[J].2013 (01).

[26] . [J]. 20

14 (12).

[27] .[J]. 20

14 (06).

[28] .[J].2014 (03).

[29] .[J].2014(05).
A

1.
2.
3.

:
1 )
A 1823 B2427 C2830 D_

2 ( )
A B C D

3
A B
4

You might also like