CSC8208 : Research Methods and Group Project in Security and Resilience
- Offered for Year: 2020/21
- Module Leader(s): Dr Sadegh Soudjani
- Lecturer: Dr Ken Pierce, Dr Nigel Thomas
- Owning School: Computing
- Teaching Location: Newcastle City Campus
|Semester 2 Credit Value:||20|
To prepare for working on individual research projects
To give experience of reading, discussing and interpreting the professional and research literature
To provide an insight into current and future developments in computer systems
To reflect on the experience of applying the techniques taught in preceding modules to the security and resilience analysis and development of a high integrity computing system
To gain experience of working in groups to complete a set of specified tasks in a timely manner which would involve literature review, software design, implementation, presentation of design and demonstration of the implemented system.
This module aims to provide students an opportunity to research the literature on a given security/resilience topic in computing, to collaborate on a literature review and to design, build and analyse a high integrity computing system with security or safety implications. Students will have access to technical guidance from faculty members, but will essentially work as a small independent team under their own initiative. This provides an opportunity to practice the technical skills developed in other modules, to develop new skills of cooperative working and organization, and to develop research skills in preparation for their individual project and dissertation module .
Outline Of Syllabus
The module is structured in several phases:
- Lectures on research methods delivered intensively:
• Introduction to research projects and planning; identifying information need; assessing quality and reliability of sources of information
• Role of peer review in research and system development
• Critical evaluation of published material
• How to present claims with supporting arguments
• Academic report writing; standards in the discipline; use and citation of sources
• Ethical issues
- Research topics are assigned and groups of 5-7 members are allocated by module leaders, mixing backgrounds, abilities and skills. Groups work together, forming reading circles to collaboratively produce a literature review.
- Groups begin work on the software development exercise. Choice of group organisation is left to the group. Development will involve research, requirements elicitation, modelling and security analysis which may involve information flow modelling, protocol design, deductive or inductive fault analysis. Selection of development methods and tools will be done by each group.
- A presentation is given by groups in week 6 together with group and individual report, which should include a risk assessment of the proposed solution.
|Guided Independent Study||Assessment preparation and completion||20||1:00||20:00||Literature review|
|Scheduled Learning And Teaching Activities||Lecture||12||1:00||12:00||Lectures on research methods|
|Guided Independent Study||Project work||60||1:00||60:00||Project coursework|
|Guided Independent Study||Student-led group activity||60||1:00||60:00||Formal/informal meetings|
|Guided Independent Study||Student-led group activity||16||1:00||16:00||Reading circle|
|Guided Independent Study||Independent study||12||1:00||12:00||Lecture follow-up|
|Guided Independent Study||Independent study||20||1:00||20:00||Background reading|
Teaching Rationale And Relationship
Lectures will be used to introduce the learning material and for demonstrating the key concepts by example. Students are expected to follow-up lectures within a few days by re-reading and annotating lecture notes to aid deep learning. Students aiming for 1st class marks are expected to widen their knowledge beyond the content of lecture notes through background reading.
Project meetings both formal and informal, will provide team members with the opportunity to follow progress and address team issues.
Students gain knowledge in research skills from lectures and working together on the literature review and reading circle. Students gain experience in development of a significant software project from the student-led activities and project work.
The format of resits will be determined by the Board of Examiners
|Report||2||M||20||End of week 2, group literature review – max 10 pages|
|Report||2||M||70||End of module, group report – max 30 pages|
|Prof skill assessmnt||2||M||10||Group presentation|
|Report||2||M||Individual report: used to moderate individual share of group report. Max 5 pages|
|Report||2||M||Peer assessment contribution to literature review|
Assessment Rationale And Relationship
The literature review provides an opportunity to assess practical research, communication and collaboration skills in a realistic environment. Students will assess each other's contribution to the literature review (formative assessment).
The group work report in used to award a mark to each group. The individual report is used to moderate individual weightings allocated by the group, to award a final mark to each group member.