Information on individual educational components (ECTS-Course descriptions) per semester | |
Degree programme: | Contextual Studies |
Type of degree: | Intern |
Special-Time | |
Summer Semester 2026 | |
Course unit title | Research Project: Computer Science |
Course unit code | 800101013000 |
Language of instruction | German / English |
Type of course unit (compulsory, optional) | Elective |
Semester when the course unit is delivered | Summer Semester 2026 |
Teaching hours per week | 4 |
Year of study | 2026 |
Level of course unit (e.g. first, second or third cycle) | First Cycle (Bachelor) |
Number of ECTS credits allocated | 6 |
Name of lecturer(s) | Armin SIMMA |
Prerequisites and co-requisites |
Participating students are required to have an academic interest and the ability to work independently and ask questions. Selection is therefore based on a letter of application and an associated selection interview. Application deadline: September to 31.10.2025. Send the written expression of interest (content: Who am I? Why am I interested in research in this area?) to armin.simma@fhv.at or martin.dobler@fhv.at. Students will be selected for the research project on the basis of a personal interview. Acceptance or rejection must be made by 15.11.2025 at the latest. If you are accepted, the research project will be listed together with the other courses on your A5 portal under "Grades" from December. With 12 ECTS, the entire Contextual Studies are thus defined and booked. In the event of rejection, other courses for the summer semester 2026 with 3 or 6 ECTS in the compulsory elective area are available for selection on the A5 portal until 25 November 2025. Scheduling takes place with those responsible for the research project. Course cost: For any intended visits to scientific conferences, the travelling expenses or participation fees incurred will be borne by the students. Nachhaltigkeit: SDG 9 - resilient infrastructure FHV Future Skills: Appropriate Application, Foster Critical Thinking, Create Environmental & Sustainable Awareness The prerequisite for attending this course is the willingness to carry out the project started in the summer semester over two semesters with 6 ECTS credits each and to continue it in the following winter semester. If the student is unsuccessful, the Contextual Studies will be continued in the winter semester outside the course. The continuation of the research project as part of a Master's thesis is strived. The aim is to publish the research results in the form of a publication, a research report, a conference paper, a video or similar. Due to the required prerequisites, students are not entitled to admission to the course. In the first 6 weeks of the semester, the future research question is developed through independent literature research and presented to the supervisor at the end of the 6 weeks. If there is no sufficient foundation for a one-year research work, it makes sense to withdraw from the research project. It is then possible to continue the Contextual Studies outside of the "Research Project: Computer Science".
|
Course content |
Scientific theoretical positions, qualitative and quantitative research methods, research design and research planning in the field of current activities and areas of application in the field of information security or IT security (especially in the field of digitalisation).
|
Learning outcomes |
General learning outcomes of research projects:
Students familiarise themselves with aspects of current research projects in the field of Computer Science and the Business Informatics Research Centre. The detailed, scientific learning outcomes are agreed and documented individually with the students before the start of the course as part of the formulation of their research questions. Content Learning Outcomes: Important note: Students choose the topic, therefore not all learning objectives mentioned below are relevant but only one or more (chosen) objectives. Students understand that security is an essential aspect in digitalisation (digital transformation/Internet of Things). They know and understand the three pillars for implementing security: technology, people, process. Depending on their choice of topics, they can implement detailed measures in a company or organisation regarding one of these pillars. Technology: students can implement one or more technological measures (e.g., cryptologic techniques, trusted computing technology, security protocol, authentication technology) to achieve a defined security goal. Human: Students understand that security measures are only successful if the user is willing and able to use the measure. They can prepare the measure to be user-friendly. Process: Students understand information security management as a holistic process. They know and understand the necessary processes of an information security management system (ISMS). They know how to design and organise an (ISMS). They can implement individual of the activities. |
Planned learning activities and teaching methods |
Activation: The students take responsibility for the research and learning process by introducing their own perspectives in the jointly discussed research map (context) and raising questions. They should be able to incorporate their own ideas into the research question. Embedding: Contact persons in the research team, including their availability, and especially mentors are named. Conditions under which a sufficient contact with the students is ensured during the work process, and which enable exchanges to be maintained and to provide ongoing feedback. Supervision is provided by researchers from the FHV in the form of coaching, guidance, participation in discussions and seminars, and guided self-study. |
Assessment methods and criteria |
Degree of achievement beforehand in the discussion of defined learning and work objectives with reference to the previous knowledge of the student. Documentation of learning outcomes and project implementation |
Comment |
The course "Research Project: Computer Science" will be continued under the same name in the coming winter semester. It is also possible to have more than one coach, if the subject is area-transcending. |
Recommended or required reading |
Topic Trusted Computing:
Topic Blockchain:
Further project-related literature: Special literature will be agreed upon separately for each project, depending on the situation and the specific problem. |
Mode of delivery (face-to-face, distance learning) |
In research projects, students delve into current research questions that are pursued at the FHV in the environment of challenging research projects or in the context of documented internal competence building. Experiences and insights from the research process are recorded in a logbook. As learners, they are given the time to construct, reconstruct (re-sift and reassemble existing knowledge) or deconstruct (uncover the limitations of their own discipline) knowledge. In the concrete research process, they practice a scientific approach ("craftsmanship") in research and observation/survey as well as a constructive approach to active and passive criticism in discussion. Supervision by researchers of the FHV takes place through coaching, instruction, participation in discussions and seminars as well as accompanied self-study.
|
Summer Semester 2026 | go Top |