Prof. Fabio de Gaspari
email: degaspari@di.uniroma1.it
FAQ Answers to frequently asked questions can be found here.
Next deadline to submit the report: 8 September 2024, 11:59 PM AoE.
Final Report's Submission
Students must upload their final report on the antiplagiarism platform Turnitin. Make sure to choose the "Single File Upload" option and not the "Cut & Paste Upload" on the submission page. If students are working as part of a group, it is sufficient for one group member to submit the report for it to be considered for review.
Course Description
This is not a traditional course but a subsidiary formative activity (AAF - 6 CFU). In Italy, within the master's degree course, students are expected to attend one AAF in addition to traditional classes. This AAF elaborates on what was previously learned in the master's degree in Cybersecurity through guest lectures. In particular, it comments on the threats, vulnerabilities, and cyber risks that emerge from the latest attacks reported and illustrates success stories to protect data and prevent network or computer systems violations. Some of the seminars will explicitly cover the content of professional ethics.
The course aims to enable students to apply the topics covered in the seminars to real-world scenarios. They will be tasked with utilising their knowledge to envision a company that sells an innovative product or service aligned with the class discussions.
Course attendance
As per the post-covid official Sapienza rules, courses are now held strictly in person. Remote access will be made available only in specific cases when allowed by the speaker and only for working students or those studying abroad. If you need to access seminars online due to specific circumstances, please contact us in advance.
Exam
The exam consists of attending the seminars and preparing a written report (in groups of 2 to 3 students maximum) related to one of the topics presented in the seminars. More precisely:
1. Each group of students is asked to submit a written report describing the Business Model of an imaginary company selling an innovative product or service linked to one of the topics presented in class. The end deliverable will have the following structure:
⦁ Cover Page:
⦁ Introduction (free format and content)
⦁ Customer segments and early adopters (1,000 characters, no space):
⦁ Problem statement (2,000 characters with no space for groups of two students, 3,000 for groups of three):
⦁ Existing alternatives (3,000 characters with no space for groups of two students, 4,000 for groups of three):
Students are not expected to perform a complete market analysis. They should only list the alternatives customers have when wanting to solve the problem listed in part 2 of the report. In case students are interested in seeing what a complete market analysis looks like, they can refer to this market analysis from the European Commission on Cybersecurity from 2019 (sections 7 and 8 in particular).
⦁ Solution (2,000 characters with no space for groups of two students, 3,000 for groups of three):
⦁ Unfair advantage (1,000 characters, no space):
⦁ Unique Value proposition (1,000 characters, no space):
⦁ High-Level Concept (1,000 characters, no space):
⦁ Key Metrics (1,000 characters, no space):
⦁ Cost Structure (1,000 characters, no space):
⦁ Revenue Streams (1,000 characters, no space):
⦁ Conclusion (1,000 characters, no space):
Imagine becoming an entrepreneur and starting this company today.
⦁ Sources, eventual additional references, and appendices. Please note that sources must be included for both technical and business-related claims.
⦁ Each student must attach the following self-declaration to the report: self-declaration.
2. Students are expected to:
⦁ understand in detail the topic of their choice and its market;
⦁ explain the innovation of the proposed product or service with respect to state of the art;
⦁ apply the course's concepts to their idea.
3. The final report will be evaluated on the following criteria:
⦁ the originality of the idea: 20%;
⦁ the understanding of the course concepts: 40%;
⦁ the application of the course concepts to the idea: 40%.
Please note that
1. Attendance of students at seminars is mandatory for students enrolled in the second year of the master's degree in Cybersecurity;
2. Plagiarism in the exam will not be accepted and is considered an offence and a breach of academic integrity. If part of a paper is copied in any of the forms described in the link below, the student must attend the course and submit a new essay the following year. Students must give credit to the creators of ideas, inventions, work, texts, etc., present in their report. In particular, we recommend reading the following document: https://www.ox.ac.uk/students/academic/guidance/skills/plagiarism?wssl=1 See also Section 1.5 in https://www.acm.org/code-of-ethics
Students can use the following tools to self-check for plagiarism: https://www.websiteplanet.com/blog/best-plagiarism-checking-tools/
3. Students are expected to write the report in a structured and understandable way. When in doubt regarding how to structure the written report, please refer to the following guidelines from Trident University.
For upcoming seminars, see https://cybersecurity.uniroma1.it/seminars.