Exploration and Practice of the 'Majors and Micro-Majors Dual-Track' AI Innovation Talent Cultivation Model: A Case Study of Wuhu University
DOI:
https://doi.org/10.6918/IJOSSER.202602_9(2).0019Keywords:
Talent cultivation model, Micro-major, Confidential computing, AI Innovation ClassAbstract
With the introduction of the “Double Thousand” Plan and the demand for talent in the context of artificial intelligence, the model for cultivating high-level, high-quality talent is undergoing transformation. Micro-majors have gradually extended from online MOOC platforms to university platforms, and as a new mode of education, they have received widespread attention. The AI context also imposes new requirements for talent development. Taking the construction of the Confidential Computing micro-major at Wuhu University as an example, this paper builds an AI innovative talent cultivation model of 'Majors and Micro-Majors Dual-Track'. Through the practice of micro-major development and the AI Innovation Class, it provides a new scheme for talent training. During the implementation of micro-majors and AI Innovation Class, talent is cultivated around the core competencies of micro-credential and AI talent. Owing to their short duration, specialized content, and strong practical orientation, they are widely recognized by students. This study holds certain significance for exploring and practicing pathways for talent cultivation.
Downloads
References
[1] Liu Yuliang, Zhou Wenlong, Lian Xinze, et al. Construction Strategies of Engineering Micro-majors in Local Colleges and Universities: A Case Study of Wenzhou Institute of Technology [J]. Research on Higher Engineering Education, 2024, (04):88-93.
[2] Qin Leiyi, Chen Peng. Conceptual Characteristics, Purpose Value and Development Strategy of Micro-professional Education in Colleges and Universities [J]. Education Academic Monthly, 2023, (12):96-103.
[3] Yuan Jing, Zhai Xuesong, Wu Fei, et al. Construction of artificial intelligence majors (AI+X direction) in colleges and universities based on virtual teaching and research offices: A case study of Zhejiang University [J]. Modern Educational Technology, 2024, 34(05):123-133.
[4] Xia Chunming, Jin Xiaoyi, Wang Xiaojun, et al. Research and exploration of micro-major construction in local colleges and universities under the background of new engineering [J]. Research of Higher Engineering Education, 2023, (02):14-18.
[5] Ge Junyu, Jiang Chao, Wang Yuhong. Micro-professional construction based on "ASciT-ASP" teaching mode: a case study of fine chemical manufacturing and analysis [J]. Higher Engineering Education Research, 2025, (02):55-59.
[6] Diao Limei, Liu Chunqiang. Research on the training path of information security micro-majors based on the integration of industry and education [J]. Home Appliance Maintenance, 2025, (05):46-48.
[7] Feng Dengguo. Information Security Research, 2024, 10(01):2-5
[8] Li He. Protecting the Data Lifecycle through Confidential Computing [J]. Network Security and Informatization, 2022, (07):108-109.
[9] Comprehensive. 2024 Hot Words in the Field of Security and Confidentiality [J]. Confidentiality Work, 2024, (12):21-23.
[10] "Star Bloom" secure and trusted system software stack released for global developers open source [J]. China Information Security, 2024, (11): 85.
[11] National Network Security Standardization Technical Committee. GB/T 45230—2025 Data security technology—General framework standard for confidential computing [S]. 2025.
[12] Su Purui, Feng Dengguo. Review of cyberspace security technology hotspots in 2024 [J]. Science and Technology Review, 2025, 43(01):102-117.
Downloads
Published
Issue
Section
License
Copyright (c) 2026 International Journal of Social Science and Education Research

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.




