EPN-V2

ACIT4100 Understanding and Communicating Research Course description

Course name in Norwegian
Understanding and Communicating Research
Study programme
Master's Programme in Applied Computer and Information Technology
Weight
10.0 ECTS
Year of study
2025/2026
Curriculum
FALL 2025
Schedule
Course history

Introduction

This course offers an introduction to the practice of writing and reading academic literature. Communicating properly, both in written and oral form, is a cornerstone of research. This course therefore also contains an element of rhetoric and writing techniques. The course will cover common concepts from research methods, such as qualitative and quantitative methods. A brief introduction of the philosophy of science helps us put the vast variations of research in context. Finally, the course introduces research and professional ethics.

Required preliminary courses

No formal requirements over and above the admission requirements.

Learning outcomes

A student who has completed this course should have the following learning outcomes defined in terms of knowledge, skills and general competence:

Knowledge

On successful completion of this course the student:

  • has thorough knowledge of writing in research processes
  • has advanced knowledge of forums and channels in which research results are published
  • has an introductory knowledge of the philosophy of science related to falsificationism, paradigms and research programs
  • has thorough knowledge of the ethical basis for professional codes of conduct
  • has advanced knowledge of writing styles related to research
  • has thorough knowledge of structural templates for essay texts
  • has thorough knowledge of the Toulmin model and its applications

Skills

On successful completion of this course the student:

  • can find research literature in literature databases
  • can analyse and critically evaluate various information sources
  • can write summaries using his/her own words
  • can use electronic reference tools
  • can identify the research method used in a scientific text
  • can explain the application of a research method in a research project
  • can organize research literature in such a way as to identify patterns and commonalities
  • can communicate a research-related topic using digital media
  • can write texts using classic style

General competence

On successful completion of this course the student:

  • can reflect and discuss plagiarism
  • has a thorough knowledge of responsibility for author and co-authorship in accordance with the Vancouver Convention

Content

The student should have the following outcomes upon completing the course:

Knowledge

Upon successful completion of the course, the student has:

  • thorough knowledge of cyber security
  • advanced knowledge of mechanisms for cyber defense, and how they are used in practice
  • a thorough understanding of societal aspects of cyber security
  • a thorough understanding of the relation between security and privacy

Skills:

Upon successful completion of the course, the student can:

  • describe the main aspects of the relation between security and privacy
  • describe central problems related to cyber security governance
  • plan and describe the structure of cyber defense for an organization

General com​petence:

Upon successful completion of the course, the student:

  • understands the role of, and mechanisms that are used in penetration testing
  • understands the role of, and mechanisms that are used for cyber defence
  • can explain and discuss security challenges related to cyber security to experts and non-experts alike
  • can explain and discuss societal aspects of cyber security with experts and non-experts alike.

Teaching and learning methods

All modules will be taught as lectures / seminars with assignments for students. Throughout the course, students will work on an individual essay from their own specialization topic. The essay will contain:

  • a literature survey
  • a discussion on the methods applied by the researchers in the material reviewed in their survey
  • a discussion on the ethical challenges related their topic both with regard to the research applied and relative to uses in society

The essay will give the opportunity for the student to tie together all modules in this course into a cohesive document.

Course requirements

The following required coursework must be approved before the student can take the exam:

Two mandatory assignments:

  • One recorded presentation of between 5 and 10 minutes.
  • A spreadsheet containing results of a research survey including columns for relevant meta-information with at least 7 relevant research papers

Assessment

Written individual essay of between 5500 and 6500 words.

The exam can be appealed.

New/postponed exam

In case of failed exam or legal absence, the student may apply for a new or postponed exam. New or postponed exams are offered within a reasonable time span following the regular exam. The student is responsible for registering for a new/postponed exam within the time limits set by OsloMet. The Regulations for new or postponed examinations are available in Regulations relating to studies and examinations at OsloMet.

Permitted exam materials and equipment

All aids are permitted, provided the rules for plagiarism and source referencing are complied with.

Grading scale

Grade scale A-F.

Examiners

The aim of this course is to build further on the grounding of principles in the earlier security courses, covering both practical and theoretical aspects of cyber security. The course will give an in-depth insight into societal aspects of computer and network security, practical experience in penetration testing, and insights into relevant mechanisms of cyber defense. Real-life cases of security incidents will be discussed and then analyzed in depth by the students.

Course contact person

Associate Professor Kyrre Begnum