Admission requirements
Admission only after intake, see website of the Cyber Security Academy.
Description
Participants in the master’s Cyber Security should not only acquire relevant knowledge but should also acquire certain academic skills.
Therefore, the programme is designed to enable students to demonstrate their ability to analyse complex cyber security problems and link them to relevant theories, concepts and methods from different disciplines.
The thesis concerns a scientific study of 15 EC. It is the capstone of the specialised and multidisciplinary knowledge and approaches to research, previously acquired in the programme. Knowledge and research skills are applied to a practical cyber security related case. The thesis’ study may also focus on a sub-problem where a more mono-disciplinary approach is more appropriate. In the latter case, the thesis should pay attention to the way(s) the results of the study contribute to solving the broader cyber security problem.
The case of the thesis can originate from the participants’ own professional practice, from the network of core and guest instructors from the programme, or from elsewhere in the cyber security professional field. Based on a clear motivation and identification of a concrete knowledge gap, a scientific key question and goal is being defined. Using a clear, motivated methodological approach, the answer to the research question is formulated. The distilled solution strategies are discussed from different disciplinary perspectives.
For a design science type of problem, such an approach often includes a conceptualisation step, an analysis step, a design step and a validation step based on which conclusions can be drawn. The distilled solution is discussed and reflected upon using a multidisciplinary perspective
Course objectives
After successfully completing this course students are able to:
analyse complex cyber security problems and link them to relevant theories, concepts and methods from different disciplines
formulate a scientific based policy, strategy or research plan (including motivation(s), objective(s) and question(s)/goal(s)) in combination with an appropriate research design for professional tasks/scientific aims and integrate these into a full research proposal
construct and articulate scientific arguments (in oral and written modes) on cyber security challenges in professional and academic settings
write a scientific report or an accessible, scientific publication on cyber security
translate technical understanding of cyber security into a multidisciplinary oriented policy or strategy
translate legal, administrative and managerial understanding of cyber security into a multidisciplinary oriented policy or strategy
In order to reach these main objectives, after successfully completing this course students:
are skilled in literature research
can read, evaluate and review scientific articles critically and constructively
have developed an own perspective on the literature
can identify relevant knowledge gaps and formulate research(able) objectives and questions
are able to define their own contribution to science and practice
are able to design a research that fits the research objective and questions
can draft a feasible research plan including a conscious and justifiable choice of research methods/approaches and an accompanying time schedule
are able to write a consistent, well-structured scientific thesis in English
are able to present the results of the thesis to a scientific and non-scientific audience
Timetable
Specific Fridays from September until December 2019 to be announced; further guidance on appointment.
Mode of instruction
Individual guidance, exercises, class discussion, self study
Lecturers: Dr. Els De Busser and others
Course Load
15 EC
Assessment method
Thesis (90%)
Defence (10%)
The resit will take the same form.
Blackboard
Yes, for posting announcements, slides of lectures, relevant literature.
Uploading a digital version of your thesis via Turnitin is compulsory.
Reading list
Compulsory literature and literature for further consultation will be announced via Blackboard.
Registration
No registration is required for lectures and exams.
Contact
Dr. Els de Busser Chantal de Groot, study coordinator
Remarks
For more information see the website of the Cyber Security Academy.