Prospectus

nl en

Thesis

Course
2019-2020

Admission requirements

Admission only after intake, see website of the Cyber Security Academy.

Description

Participants in the master’s Cyber Security should not only acquire relevant knowledge but should also acquire certain academic skills.
Therefore, the programme is designed to enable students to demonstrate their ability to analyse complex cyber security problems and link them to relevant theories, concepts and methods from different disciplines.

The thesis concerns a scientific study of 15 EC. It is the capstone of the specialised and multidisciplinary knowledge and approaches to research, previously acquired in the programme. Knowledge and research skills are applied to a practical cyber security related case. The thesis’ study may also focus on a sub-problem where a more mono-disciplinary approach is more appropriate. In the latter case, the thesis should pay attention to the way(s) the results of the study contribute to solving the broader cyber security problem.

The case of the thesis can originate from the participants’ own professional practice, from the network of core and guest instructors from the programme, or from elsewhere in the cyber security professional field. Based on a clear motivation and identification of a concrete knowledge gap, a scientific key question and goal is being defined. Using a clear, motivated methodological approach, the answer to the research question is formulated. The distilled solution strategies are discussed from different disciplinary perspectives.

For a design science type of problem, such an approach often includes a conceptualisation step, an analysis step, a design step and a validation step based on which conclusions can be drawn. The distilled solution is discussed and reflected upon using a multidisciplinary perspective

Course objectives

After successfully completing this course students are able to:

  • analyse complex cyber security problems and link them to relevant theories, concepts and methods from different disciplines

  • formulate a scientific based policy, strategy or research plan (including motivation(s), objective(s) and question(s)/goal(s)) in combination with an appropriate research design for professional tasks/scientific aims and integrate these into a full research proposal

  • construct and articulate scientific arguments (in oral and written modes) on cyber security challenges in professional and academic settings

  • write a scientific report or an accessible, scientific publication on cyber security

  • translate technical understanding of cyber security into a multidisciplinary oriented policy or strategy

  • translate legal, administrative and managerial understanding of cyber security into a multidisciplinary oriented policy or strategy

In order to reach these main objectives, after successfully completing this course students:

  • are skilled in literature research

  • can read, evaluate and review scientific articles critically and constructively

  • have developed an own perspective on the literature

  • can identify relevant knowledge gaps and formulate research(able) objectives and questions

  • are able to define their own contribution to science and practice

  • are able to design a research that fits the research objective and questions

  • can draft a feasible research plan including a conscious and justifiable choice of research methods/approaches and an accompanying time schedule

  • are able to write a consistent, well-structured scientific thesis in English

  • are able to present the results of the thesis to a scientific and non-scientific audience

Timetable

Specific Fridays from September until December 2019 to be announced; further guidance on appointment.

Mode of instruction

Individual guidance, exercises, class discussion, self study
Lecturers: Dr. Els De Busser and others

Course Load

15 EC

Assessment method

  • Thesis (90%)

  • Defence (10%)

The resit will take the same form.

Blackboard

Yes, for posting announcements, slides of lectures, relevant literature.
Uploading a digital version of your thesis via Turnitin is compulsory.

Reading list

Compulsory literature and literature for further consultation will be announced via Blackboard.

Registration

No registration is required for lectures and exams.

Contact

Dr. Els de Busser Chantal de Groot, study coordinator

Remarks

For more information see the website of the Cyber Security Academy.