Syllabus Entrance
Printer Friendly
Email Syllabus

CJ 332 Industrial Security
Sturner, Peter C.


Mission Statement: The mission of Park University, an entrepreneurial institution of learning, is to provide access to academic excellence, which will prepare learners to think critically, communicate effectively and engage in lifelong learning while serving a global community.

Vision Statement: Park University will be a renowned international leader in providing innovative educational opportunities for learners within the global society.

Course

CJ 332 Industrial Security

Semester

U1T 2006 DL

Faculty

Sturner, Peter C., M.P.A.

Title

Senior Instructor of Criminal Justice

Degrees/Certificates

BA Sociology
M.P.A. (Master's of Public Affairs
Fire Service Instructor IV (State of Missouri)

Office Location

Thompson Center, Parkville Campus

Office Hours

By Appointment

Daytime Phone

816-584-6444

Other Phone

816-588-6915

E-Mail

pete.sturner@park.edu

Class Days

TBA

Class Time

TBA

Prerequisites

CJ 233

Credit Hours

3


Textbook:
Industrial Security, 2nd Edition

David L. Berger

Butterworth-Heinemann, 1999

ISBN: 0-7506-7139-4



Doing Honest Work in College

Charles Lipson

University of Chicago Press, 2004

ISBN: 0-226-48473-4

Textbooks can be purchased though the MBS bookstore

Textbooks can be purchased though the Parkville Bookstore


Course Description:
This intermediate course examines the principles, methods, requirements,  and standards for industrial security systems. Prerequisites: CJ233. 3:0:3

Educational Philosophy:
Professor Sturner's educational philosophy recognizes the different learning styles of adult learners.  Therefore the class material will be delivered in a variety of different ways including: lectures, readings, class discussions, written papers,and Internet research.  Students will be required to analyze and think critically about the material learned.  Students will also be encouraged to give and defend their own opinions regarding the course material.

Learning Outcomes:
  Core Learning Outcomes

  1. Distinguish executive and terrorism protection
  2. Develop a proprietary security program
  3. Differentiate approaches to fire prevention and control of fires, theft and pilferage control, perimeter and exterior protection
  4. Assess the possible future  of security
  5. Critique a security organization including the staffing of the organization, the relationship between management and personnel


  Instructor Learning Outcomes
  1. Develop a program to deal with workplace violence.
  2. Assess disaster recovery programs.
Core Assessment:

Class Assessment:
Each student is responsible for:

Completing weekly reading assignments.
Completing weekly discussion questions.
Completing six writing assignments referred to as papers.
Completing a proctored final exam.
Be sure to check each week to make sure that you participated in all of the threaded discussion questions. There are multiple questions for each week. I will deduct 10 points for each thread that you do not participate in.
When submitting papers please be sure to submit them via the dropbox each week.

Grading:
GRADING RUBRIC:
I have assigned a total of 1000 points for this course.
Each threaded discussion will be worth 10 points. If you enter the discussion and participate by answering each question and then responding to at least two other responses by your classmates you will receive the 10 points.
Papers are worth 100 points each. To receive an A, a paper must address the topic, be free of spelling and grammar errors, be a minimum of 2-3 pages, and be properly cited.

--------------------------------------------------------------------------------

Course Grading Scale


Assignment
% of Grade
Due Date

Paper # 1
10
Week 2

Paper # 2
10
Week 3

Paper # 3
10
Week 4

Paper # 4
10
Week 5

Paper # 5
10
Week 6

Paper # 6
10
Week 7

Class Participation
20
Continually

Final Examination
20
Week 8

Total
100%


Late Submission of Course Materials:
Submission of Late Work: I will accept late papers however, there will be a 1/2 letter grade deduction for every 24 hours that the paper is late unless I approve your late submission in advance. Papers that are plagiarized, whether intentional or unintentional, will receive an F

.

Classroom Rules of Conduct:
Course-Specific Policies:

This Course is offered on-line, over the Internet. Students are expected to devote a minimum of five to six hours per class week logged on to the course-the same amount of time that you would spend in the physical classroom. See "Ground Rules for On-Line Participation" for additional information.

A class week is defined as the period of time between Monday and Sunday. The first week begins the first day of the term and ends at midnight the following Sunday. Assignments scheduled for completion during a class week should be completed by Sunday of the week assigned. Writing assignments and formal papers should be completed and successfully submitted via the dropbox each week so that they are in my hands on the due date. NOTE: Because this is an online course designed to get feedback on assignments directly to you via the Internet, you must make prior arrangements with me before submitting a paper via fax.  If you ever have problems transmitting your assignments to me, telephone me immediately and we will get the problem solved.

 Please post any questions or comments concerning the course or course content into the Office (see button on left side of home page).  I'll visit my office weekday mornings to read your comments and questions and to post responses.  I'll try to get back to you within 24 hours. Please DO NOT post papers in this section.  Please place your papers in the dropbox for the appropriate week.

Ground Rules for Online Participation

1. Students should use e-mail for private messages to the instructor and other students. The threaded discussion area is for public messages.

2. Students are expected to complete five hours per week of discussions or other appropriate online activities, including sending/receiving e -mail, and navigating and conducting research over the World Wide Web.

3. All students will participate in discussions. Conventions of "on-line etiquette", which includes courtesy to all users, will be observed.

4. Students may get assistance with computer-related problems through the instructor.

5. Assigned papers must be submitted in the dropbox for the week that they are assigned.


Students are responsible for clicking on the link below and thoroughly reading each Online course policy. If you have questions about any of these policies, please contact your instructor for clarification.

Online Course Policies

Course Topic/Dates/Assignments:
Week 1: In-House Security

Readings: Text: Chapters 1, 2

              Lipson: pages 1-85, 107-121, 171-181.

http://www.securitymanagement.com

http://www.securityonline.com/home.html

http://www.asisonline.org

Class Activities: Introduction to online learning. Introduction & discussion of syllabus/assignment schedule and course overview. Introduction to the fictitious corporation that we will use throughout the course as a basis for our discussions and activities. Overview of history of security, and proprietary security systems.
On-line Assignment: These chapters deal with the early years in the security industry. They also deal with the establishment of in-house security. This week we will discuss the history of security. We will also discuss the development of a proprietary security system.
Weekly Discussion Questions:
How is security different today compared with 25 years ago, and where do you see security going in the next 25 years?
What is the difference between a private detective agency and a security agency?
What do you see as the advantages and the disadvantages of a proprietary security department?
Week 2: Organizing Security

Readings: Chapters 3, 4, 6

http://www.securitymagazine.com

Class Activities: Learn how to organize and staff a security department. Discuss the duties and responsibilities of a security department. Learn how to select and organize security facilities.
On-line Assignment: We will discuss the various positions within a security department. We will discuss the value of a manual of procedures and the associated forms necessary to run an efficient, professional security department. Finally we will discuss the importance of good office facilities to carry out the security function.
Weekly Discussion Questions:
Discuss the typical duties for a variety of security positions.
Describe what you believe to be an adequate training program for a proprietary security department.
Discuss the considerations necessary for a proper security office.
Paper:
Write a proposal to establish a proprietary security department for the ABC Corporation. This proposal will be presented to the CEO of the corporation.

Week 3, Relationships and the Authority To carry them out.

Readings: Chapter 5, 7, 22

Class Activities: We will discuss security uses of photography, security relationships and security authority.
On-line Assignment: We will study the use of photography in security. We will examine the different types of cameras and the need for photographic documentation. We will also study the relationships between security and law enforcement, unions, and management. Finally we will discuss the authority that security has to make arrests and carry out other functions that are traditionally law enforcement.
Weekly Discussion Topics/Question:
Discuss the various types of cameras available today. If your department had a limited budget, how would you prioritize your camera purchases and why?
Discuss how you can best elicit cooperation between your security department and the local law enforcement agency.
What are the pros and cons of a private security department having arrest powers?
Paper: You have received a memo from the CEO wanting to know if she should pursue obtaining permission to arm your officers. She also wants to know your thoughts on arrest powers for your staff. Reply to the CEO in your paper.

Week 4: Internal Controls at the industrial site

Readings: Chapter 8, 9, 10, 17

http://www.parkut.com

Class Activities: We will discuss various means of access controls such as locks, keys and guard stations. We will also discuss background checks in the employment process. We will discuss document control including safes, files and other methods. Finally we will discuss specific crimes including external threats, narcotics, alcohol, gambling and sabotage.
On-line  Assignment: We are going to discuss the various kinds of lock and key systems. We will also discuss the latest technology regarding access control and identification systems. We will explore the various types of personnel clearance methods including employment applications, background checks, and investigation procedures. We will also examine the use of various methods to safeguard documents and other proprietary information. Specific types of crimes will be a topic of exploration in this week's work.
Weekly Discussion Topics/Questions:
There are numerous types of locks and access systems. Many of these systems are designed for specific applications. Name several of them and describe where they could best be used. Also decide which one you think is best and explain why.
Access to information in background checks varies from state-to-state. Determine what is legal and available in your state and report it in the appropriate conference thread.
Paper:
The CEO of your corporation has asked you to prepare a report on the types of crime that the company is likely to experience. She has also asked you to propose some measures to prevent these crimes from occurring. Present the CEO with an executive summary of your findings and proposal.

Week 5:   Fires and Disaster Control

Readings: Chapter 11, 12 and pages 270-272 along with attached lecture material.

http://www.interfire.com

http://fire.nist.gov

Class Activities: Check FEMA web page http://www.fema.gov   for information on disasters. Also check http://www.nfpa.org/ NFPA web page.  for information on fire prevention in the industrial setting.

On-line  Assignment:  We will discuss the forming of an industrial fire brigade. We will also discuss fire safety inspection procedures. We will also discuss the use of various types of fire suppression agents as well as fire alarm systems. We will discuss the creation of a disaster plan and a recovery from disaster plan.

Weekly Discussion Topics/Questions:

Fires can be devastating to a company. Discuss what you see as security's role in the prevention of fires.
Using the part of the country you are currently residing in, discuss what you think is the biggest natural disaster threat to a company. Also discuss what you think is the most likely man-made disaster the company will face.
Paper:

The CEO of your corporation has asked you to present a proposal for an in-house fire prevention program. Write a proposal to present to the CEO

Week 6: External Threats

Readings: Chapter 13, 15, 16

Class Activities: We will discuss various theft and pilferage control methods. We will learn about perimeter and exterior protection methods. We will examine terrorism and executive protection.

On-line  Assignment: We will look at theft within the corporation and determine the best approach to prevent this crime from happening. We will also examine perimeter and exterior protection including but not limited to fences, lighting, closed circuit television and guards. Finally, we will discuss terrorism and the threat that it poses to executives worldwide.

Weekly Discussion Topics/Questions:

Theft in the corporate setting is becoming more common. Discuss ways to detect theft within the corporate setting and then discuss ways to prevent the theft from occurring.
Name a number of perimeter protection methods. Which one do you believe is the best and why?
What factors would you take into consideration when trying to determine the level of risk for your corporate executives?
Paper:

The CEO of the corporation has asked you to develop a plan to protect her and other corporate executives as they travel. She is planning on contacting foreign markets to develop new business for the corporation. This will, of course, require them to travel out of the U.S. quite often. Present your plan to the CEO for executive protection.
Week 7: Electronic Security Measures

Readings: Chapters 18, 19, 20, 21, 23

http://cctv.panasonic.com

http://www.stancom.trident.org/index.html

Class Activities:

On-line Assignment: We will discuss the application of closed-circuit television systems. We will discuss the proper use of two-way radio communication. We will also look at the proper radios to use for security. We will examine the various types of alarm systems on the market today. We will also examine various types of electronic access control devices. Finally we will think about what the future holds for industrial security.

Weekly Discussion Topics/Questions:

With the seemingly endless variety of electronic security devices on the market today, do you think that security departments tend to engage in "overkill" when it comes to installing these devices in the industrial setting? Why?
Of all of the electronic devices that we have looked at, prioritize which devices that you would select to use in an industrial setting. Defend your priorities.

Week 8, Violence in the Workplace:

Readings: Chapter 24, 25

Class Activities:

On-line Assignments: We will discuss at length the topic of workplace violence. We will also discuss high-technology crimes and how they affect security.

Weekly Discussion Topics/Questions:

Research has shown that the number one security threat today is workplace violence. Why do you think that there is so much violence in the workplace? What do you think can be done to change the pattern of workplace violence that we are seeing?
How is high-tech computer crime effecting industry? How can security departments "gear up" to deal with this problem?
Paper:

The CEO of your corporation would like some recommendations to reduce the threat of workplace violence. Present her with a proposal to reduce the threat of workplace violence in your corporation.



Academic Honesty:
Academic integrity is the foundation of the academic community. Because each student has the primary responsibility for being academically honest, students are advised to read and understand all sections of this policy relating to standards of conduct and academic life.   Park University 2005-2006 Undergraduate Catalog Page 85-87

Plagiarism:
Plagiarism involves the use of quotations without quotation marks, the use of quotations without indication of the source, the use of another's idea without acknowledging the source, the submission of a paper, laboratory report, project, or class assignment (any portion of such) prepared by another person, or incorrect paraphrasing. Park University 2005-2006 Undergraduate Catalog Page 85-87

Attendance Policy:
Instructors are required to maintain attendance records and to report absences via the online attendance reporting system.

  1. The instructor may excuse absences for valid reasons, but missed work must be made up within the semester/term of enrollment.
  2. Work missed through unexcused absences must also be made up within the semester/term of enrollment, but unexcused absences may carry further penalties.
  3. In the event of two consecutive weeks of unexcused absences in a semester/term of enrollment, the student will be administratively withdrawn, resulting in a grade of "WH".
  4. A "Contract for Incomplete" will not be issued to a student who has unexcused or excessive absences recorded for a course.
  5. Students receiving Military Tuition Assistance or Veterans Administration educational benefits must not exceed three unexcused absences in the semester/term of enrollment. Excessive absences will be reported to the appropriate agency and may result in a monetary penalty to the student.
  6. Report of a "F" grade (attendance or academic) resulting from excessive absence for those students who are receiving financial assistance from agencies not mentioned in item 5 above will be reported to the appropriate agency.
ONLINE NOTE: An attendance report of "P" (present) will be recorded for students who have logged in to the Online classroom at least once during each week of the term. Recording of attendance is not equivalent to participation. Participation grades will be assigned by each instructor according to the criteria in the Grading Policy section of the syllabus.

Park University 2005-2006 Undergraduate Catalog Page 89

Disability Guidelines:
Park University is committed to meeting the needs of all students that meet the criteria for special assistance. These guidelines are designed to supply directions to students concerning the information necessary to accomplish this goal. It is Park University's policy to comply fully with federal and state law, including Section 504 of the Rehabilitation Act of 1973 and the Americans with Disabilities Act of 1990, regarding students with disabilities. In the case of any inconsistency between these guidelines and federal and/or state law, the provisions of the law will apply. Additional information concerning Park University's policies and procedures related to disability can be found on the Park University web page: http://www.park.edu/disability .

Copyright:

This material is protected by copyright and can not be reused without author permission.

Last Updated:6/18/2006 10:24:08 PM