• Overview of Chinese core journals
  • Chinese Science Citation Database(CSCD)
  • Chinese Scientific and Technological Paper and Citation Database (CSTPCD)
  • China National Knowledge Infrastructure(CNKI)
  • Chinese Science Abstracts Database(CSAD)
  • JST China
  • SCOPUS
SHI Kan1, 2, ZHU Hou-qiang1, GUO Peng-ju2, ZHU Li-xin3, CHEN Xiang-yang4. System Integration Method of Mental Training for Security Mind[J]. Journal of University of Electronic Science and Technology of China(SOCIAL SCIENCES EDITION), 2016, 18(1): 47-53. DOI: 10.14071/j.1008-8105(2016)01-0047-07
Citation: SHI Kan1, 2, ZHU Hou-qiang1, GUO Peng-ju2, ZHU Li-xin3, CHEN Xiang-yang4. System Integration Method of Mental Training for Security Mind[J]. Journal of University of Electronic Science and Technology of China(SOCIAL SCIENCES EDITION), 2016, 18(1): 47-53. DOI: 10.14071/j.1008-8105(2016)01-0047-07

System Integration Method of Mental Training for Security Mind

  • Integrated system of mental training for security mind is an intelligent simulation system formed from organizations' demand toward crisis management. It is divided into two parts, which are demand analysis system and system of mental training for security mind. In the first part, we recognize the sources of risks in producing process, detect the vulnerability factors in production links, overview individuals' basic abilities, personality, mentality, resilience, etc., and accordingly determine the competency requirements of particular positions, then.develop a personalized training program. In the second part, we design a seven-step mental training method for security mind to enrich the training mode. The training mainly includes 7 steps: objective orientation, situational experiencing, psychological enlightening, regulation benchmarking, mental remodeling, field practicing, and evaluation & feedback. During the training, individual differences, which are the basis of designing and implying the personalized training program, are highly concentrated on. Thus it provides comprehensive, scientific theories, and method support toward the enterprise security management.
  • loading

Catalog

    Turn off MathJax
    Article Contents

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return