Information on individual educational components (ECTS-Course descriptions) per semester

Degree programme: Master Sustainable Energy Systems
Type of degree: FH Master´s Degree Programme
Winter Semester 2022

Course unit title Research Project: Computer Science
Course unit code 800101023000
Language of instruction German / English
Type of course unit (compulsory, optional) Elective
Semester when the course unit is delivered Winter Semester 2022
Teaching hours per week 4
Year of study 2022
Number of ECTS credits allocated Second Cycle (Master)
Number of ECTS credits allocated 6
Name of lecturer(s) Martin DOBLER

Prerequisites and co-requisites

The participating students are expected to have scientific interest, as well as the impulse and the ability to work independently and to ask questions. The selection is therefore based on an application letter and a selection interview.

A prerequisite for the assignment of this course is the willingness to continue the started project at the following semester in the 6 ECTS-comprehensive course "Computer Science 2 Research Project".

In the first 6 weeks of the semester, the future research question is developed through independent literature research and presented to the supervisor at the end of the 6 weeks. If there is no sufficient foundation for a one-year research work, it makes sense to withdraw from the research project. It is then possible to continue the Contextual Studies outside of the "Research Project: Computer Science".

A continuation of the research project within the scope of a master thesis is strived for.

Due to the required prerequisites, there is no entitlement for students to enroll in the module.

Course content

Scientific-theoretical positions, qualitative and quantitative research methods, research design and research planning in the field of current activities and fields of application in the area of information security and / or IT security (especially in the area of digitization).

Since the detailed topic is defined together with the student, the contents of the course can not be specified in detail. Instead, different topic fields are specified. The student must select only one of these topics (several topics may be combined).

  1. IT security in the smart industry 4.0
  2. Security in the Industrial Internet of Things (IIOT)
  3. Data anonymisation, especially for big data application
  4. Trusted computing (e.g., TPM or Trust Zone)
  5. Blockchain and innovative applications
  6. Cryptological protocols for e-mail communication and instant messaging.
  7. Secure data models
  8. Automated, cryptologically secured, agent-related data exchange
  9. Establishment of secure (ad-hoc) networks in the area of IoT
  10. Methods for estimating the Technology Readiness Level (TRL)
  11. Secure IT methods for SMEs
  12. Information Security Management Systems
  13. BSI Basic Protection (Grundschutz)
  14. ISO 2700x

Learning outcomes

Within the framework of their work, the students develop a scientific work in which they independently work on and answer a research question defined in the current research environment of the FH Vorarlberg. Through these projects, they acquire (1) an overview of research questions and current activities and fields of application in the area of information security and / or IT security, (2) deepened methodological knowledge, which is not standard in core curricula, and (3) For later scientific activities (eg dissertation).

As an additional learning outcome, the creation of awareness for reasoning and consistency. In their research, the students question the premises of their hypotheses and their actions as well as the validity and the effects of their findings. The students gain self-experience and professional experience through practice in free ideas, in interaction with others, in self-organization and in the implementation of ideas and applications.

Planned learning activities and teaching methods

Activation: The students take responsibility for the research and learning process by introducing their own perspectives in the jointly discussed research map (context) and raising questions. They should be able to incorporate their own ideas into the research question.

Action orientation: In the introduction to the topic, the students recognize the discrepancy between their current knowledge and the target state. At the same time, the focus is on the methods and skills necessary for dealing with the question, so that a targeted acquisition of the necessary procedures can be carried out by the students.

Will-based implementation: Agreement of framework conditions and practices that make the company possible and promising. These include common rules and expectations, milestones, dealing with failure and a new beginning, the agreement, for which the students assume responsibility and when they give account when.

Embedding: Identify contact persons and achievements in the research team and, in particular, mentor mentors on the part of the university. Conditions under which a sufficient contact with the students is ensured during the work process, and which enable exchanges to be maintained and to provide ongoing feedback. In particular, students who have not performed the self-study performance should have the opportunity to recognize that they are threatening to lose their connection.

Accompanied by researchers at the University of Applied Sciences FH Vorarlberg is provided by coaching, instruction, participation in discussions and seminars, as well as by accompanying self-study.

Assessment methods and criteria

Degree of achievement beforehand in the discussion of defined learning and work objectives with reference to the previous knowledge of the student. Documentation of learning outcomes and project implementation

Public presentation, together with the other students in research projects.


This module constitutes the second cycle of the module "Research Project: Computer Science" which has been started under the same title in the precedent summer term.

The following lecturers are responsible for the respective topics (see "Teaching content"):

  •      Armin Simma: Topics 1-6
  •      Martin Dobler: Topics 7-11
  •      Dietmar Grabher: 12-14

It is also possible to have more than one coach, if the subject is area-transcending.

In addition, there is also the possibility to pursue a scientific publication (conference or journal) in collaboration with the research center within the scope of this research project.

The course is also an introduction to (applied) research and the opportunity for further masters theses or dissertations.

A further special feature is the close contact of the research center PPE with research and industrial partners. As part of the PPE projects, students can make contacts with research partners and companies at events.

Recommended or required reading
  • Claudia Eckert (2006), "IT Security: Concepts - Procedures - Protocols", Oldenbourg
  • Randy J. Boyle (2014), "Corporate Computer Security", Pearson
  • Matt Bishop (2005), "Introduction to Computer Security", Addison-Wesley
  • Matt Bishop (2017), "Computer Security: Art and Science", Addison-Wesley
  • Umesh Hodeghatta Rao (2014) "The InfoSec Handbook: An Introduction to Information Security", Apress

An overview of security books:

Mode of delivery (face-to-face, distance learning)

In research projects, the students deepen themselves to current research questions, which are pursued at FH Vorarlberg in the context of demanding research projects or within the framework of a documented internal competence building. Experiences and insights from the research process are recorded in a logbook.

As learners, they have the time to construct, reconstruct, or deconstruct knowledge (to uncover the limitations of ones own discipline). In the actual research process, they pursue a scientific approach ("craftsmanship quality") in research and observation / survey as well as a constructive approach to active and passive criticism in the discussion.

Accompanied by researchers at the University of Applied Sciences FH Vorarlberg is provided by coaching, instruction, participation in discussions and seminars, as well as by accompanying self-study.