CJ 332 Industrial Security
S1T 2007 DL
Angelo, Joseph M.
Adjunct Faculty/Criminal Justice Administration
AA/Liberal ArtsBS/Criminal JusticeMA/Business & Organizational Security Management
Anytime Online or Email For Appointment
October 23, 2006 - December 17, 2006
Textbook: Industrial Security, 2nd Edition David L. Berger Butterworth-Heinemann, 1999 ISBN: 0-7506-7139-4 Doing Honest Work in College Charles Lipson University of Chicago Press, 2004 ISBN: 0-226-48473-4
Textbooks can be purchased through the MBS bookstore
Textbooks can be purchased through the Parkville Bookstore
McAfee Memorial Library - Online information, links, electronic databases and the Online catalog. Contact the library for further assistance via email or at 800-270-4347.Career Counseling - The Career Development Center (CDC) provides services for all stages of career development. The mission of the CDC is to provide the career planning tools to ensure a lifetime of career success.Park Helpdesk - If you have forgotten your OPEN ID or Password, or need assistance with your PirateMail account, please email firstname.lastname@example.org or call 800-927-3024Resources for Current Students - A great place to look for all kinds of information http://www.park.edu/Current/.Advising - Park University would like to assist you in achieving your educational goals. Please contact your Campus Center for advising or enrollment adjustment information.Online Classroom Technical Support - For technical assistance with the Online classroom, email email@example.com or call the helpdesk at 866-301-PARK (7275). To see the technical requirements for Online courses, please visit the http://parkonline.org website, and click on the "Technical Requirements" link, and click on "BROWSER Test" to see if your system is ready.FAQ's for Online Students - You might find the answer to your questions here.
Educational Philosophy: I will use brevity to describe my philosophy for this particular course. I feel learning should be enjoyable/fun and possess certain ingredients, which will challenge students each week. We will accomplish this through the following methods: Weekly threaded discussions will serve as our means to discuss issues and interact with each other. I believe that a healthy level of weekly discussion will make the course enjoyable and provide valuable insight to one another. Homework will serve as the weekly measurement to keep everyone current and up-to-date with the course. The final exam will evaluate your understanding of the material and provide a logical conclusion for the course. I expect everyone to therefore enjoy the next eight weeks and leave the course feeling challenged with a significant grasp of Industrial Security.
Learning Outcomes: Core Learning Outcomes
Each student is responsible for: Completing weekly reading assignments. Completing weekly discussion questions. Completing six writing assignments referred to as papers. Completing a proctored final exam. Be sure to check each week to make sure that you participated in all of the threaded discussion questions. There are multiple questions for each week.
When submitting papers please be sure to submit them via the dropbox each week.
The grading scale is as follows: A = 90-100; B = 80-89; C = 70-79; D = 60-69; F = 0-59.
Grades will be based on a one thousand (1000) point system. A= 900-1000 B= 800-899 C= 700-799 D= 600-699 F= 599 and Below. Final Exam (20% of Overall Grade) = 200 Points 6 Homework Papers Weeks 1 through 6 (60% of Overall Grade)= 600 Points; Each Paper is worth 100 points. To receive an A, a paper must address the topic, be free of spelling and grammar errors, be a minimum of 2-3 pages, and be properly cited. Weekly Participation Weeks 1 through 8 (20% of Overall Grade) = 200 Points; each weekly participation is worth 25 points Weekly Discussion Note: You are required to respond to each posted question by each Thursday. You are required to provide a minimum of two replies to other student's responses. Responses should not be short one liners, however offer insightful feedback based upon logic. Remember to always be respectful of one another keeping in mind that we do not necessarily must possess the same thought on discussion matters. Course Submission of Late Work: Work should be submitted to the instructor by the last day of each assigned week. Students experiencing a problem should contact the instructor to advise the reason work may be submitted late. Unless authorized, late work will be subject to a penalty of 10% reduction for each week late. Proctored final examination/Project A final proctored examination will be taken in a proctored testing environment during the 8th week at one of the Park University sites around the country or at an alternative location. For proctored examinations, photo identification is required at the time of the test. Guidelines for selecting an acceptable proctor can be found on the Park University Website. Other Information on proctored exams: It will be the responsibility of the student to arrange for a proctor, by the 6th week of the term, who is accepted and approved by the course instructor. Approval of proctors is the discretion of the Online instructor. A proctor request form will be made available to you during the first week of class so that you can send your requested proctor to your instructor for approval. Failure to take a final proctored exam (or submit your final project for some online graduate courses) will result in an automatic "F" grade.
Late Submission of Course Materials: Material submitted after the submission deadline will be subject to a 10% reduction of possible grade for each week submitted late unless arrangements are made with the instructor prior to the deadline.
Classroom Rules of Conduct:
This course is offered on-line, over the Internet, using the eCollege course delivery system. Students are expected to devote a minimum of four hours per class week logged on to the computer conferencing system-the same amount of time you'd spend in the physical classroom. A class week is defined as the period of time between Monday and Sunday. The first week begins the first day of the semester and ends midnight the following Sunday. Assignments scheduled for completion during a class week should be completed by Sunday of the week assigned. Written papers should be completed and successfully submitted so that they are in my hands on the due date. If you ever have problems transmitting your assignments to me, telephone me immediately, and we'll get the problem solved. Students are responsible for clicking on the link below and thoroughly reading each Online course policy. If you have questions about any of these policies, please contact your instructor for clarification.
Please post any questions or comments concerning the course or course content into the Office (see button on left side of home page). I'll visit my office each day to read your comments and questions and to post responses. I'll try to get back to you within 24 hours. Please DO NOT post papers in this section. Please place your papers in the dropbox for the appropriate week.
Week 1: In-House Security Readings: Text: Chapters 1, 2 Lipson: pages 1-85, 107-121, 171-181. http://www.securitymanagement.com http://www.securityonline.com/home.html http://www.asisonline.org Class Activities: Introduction to online learning. Introduction & discussion of syllabus/assignment schedule and course overview. Introduction to the fictitious corporation that we will use throughout the course as a basis for our discussions and activities. Overview of history of security, and proprietary security systems. On-line Assignment: These chapters deal with the early years in the security industry. They also deal with the establishment of in-house security. This week we will discuss the history of security. We will also discuss the development of a proprietary security system. Weekly Discussion Questions: How is security different today compared with 25 years ago, and where do you see security going in the next 25 years? What is the difference between a private detective agency and a security agency? What do you see as the advantages and the disadvantages of a proprietary security department? Week 2: Organizing Security Readings: Chapters 3, 4, 6 http://www.securitymagazine.com Class Activities: Learn how to organize and staff a security department. Discuss the duties and responsibilities of a security department. Learn how to select and organize security facilities. On-line Assignment: We will discuss the various positions within a security department. We will discuss the value of a manual of procedures and the associated forms necessary to run an efficient, professional security department. Finally we will discuss the importance of good office facilities to carry out the security function. Weekly Discussion Questions: Discuss the typical duties for a variety of security positions. Describe what you believe to be an adequate training program for a proprietary security department. Discuss the considerations necessary for a proper security office. Paper: Write a proposal to establish a proprietary security department for the ABC Corporation. This proposal will be presented to the CEO of the corporation. Week 3, Relationships and the Authority To carry them out. Readings: Chapter 5, 7, 22 Class Activities: We will discuss security uses of photography, security relationships and security authority. On-line Assignment: We will study the use of photography in security. We will examine the different types of cameras and the need for photographic documentation. We will also study the relationships between security and law enforcement, unions, and management. Finally we will discuss the authority that security has to make arrests and carry out other functions that are traditionally law enforcement. Weekly Discussion Topics/Question: Discuss the various types of cameras available today. If your department had a limited budget, how would you prioritize your camera purchases and why? Discuss how you can best elicit cooperation between your security department and the local law enforcement agency. What are the pros and cons of a private security department having arrest powers? Paper: You have received a memo from the CEO wanting to know if she should pursue obtaining permission to arm your officers. She also wants to know your thoughts on arrest powers for your staff. Reply to the CEO in your paper. Week 4: Internal Controls at the industrial site Readings: Chapter 8, 9, 10, 17 http://www.parkut.com Class Activities: We will discuss various means of access controls such as locks, keys and guard stations. We will also discuss background checks in the employment process. We will discuss document control including safes, files and other methods. Finally we will discuss specific crimes including external threats, narcotics, alcohol, gambling and sabotage. On-line Assignment: We are going to discuss the various kinds of lock and key systems. We will also discuss the latest technology regarding access control and identification systems. We will explore the various types of personnel clearance methods including employment applications, background checks, and investigation procedures. We will also examine the use of various methods to safeguard documents and other proprietary information. Specific types of crimes will be a topic of exploration in this week's work. Weekly Discussion Topics/Questions: There are numerous types of locks and access systems. Many of these systems are designed for specific applications. Name several of them and describe where they could best be used. Also decide which one you think is best and explain why. Access to information in background checks varies from state-to-state. Determine what is legal and available in your state and report it in the appropriate conference thread. Paper: The CEO of your corporation has asked you to prepare a report on the types of crime that the company is likely to experience. She has also asked you to propose some measures to prevent these crimes from occurring. Present the CEO with an executive summary of your findings and proposal. Week 5: Fires and Disaster Control Readings: Chapter 11, 12 and pages 270-272 along with attached lecture material. http://www.interfire.com http://fire.nist.gov Class Activities: Check FEMA web page http://www.fema.gov for information on disasters. Also check http://www.nfpa.org/ NFPA web page. for information on fire prevention in the industrial setting. On-line Assignment: We will discuss the forming of an industrial fire brigade. We will also discuss fire safety inspection procedures. We will also discuss the use of various types of fire suppression agents as well as fire alarm systems. We will discuss the creation of a disaster plan and a recovery from disaster plan. Weekly Discussion Topics/Questions: Fires can be devastating to a company. Discuss what you see as security's role in the prevention of fires. Using the part of the country you are currently residing in, discuss what you think is the biggest natural disaster threat to a company. Also discuss what you think is the most likely man-made disaster the company will face. Paper: The CEO of your corporation has asked you to present a proposal for an in-house fire prevention program. Write a proposal to present to the CEO Week 6: External Threats Readings: Chapter 13, 15, 16 Class Activities: We will discuss various theft and pilferage control methods. We will learn about perimeter and exterior protection methods. We will examine terrorism and executive protection. On-line Assignment: We will look at theft within the corporation and determine the best approach to prevent this crime from happening. We will also examine perimeter and exterior protection including but not limited to fences, lighting, closed circuit television and guards. Finally, we will discuss terrorism and the threat that it poses to executives worldwide. Weekly Discussion Topics/Questions: Theft in the corporate setting is becoming more common. Discuss ways to detect theft within the corporate setting and then discuss ways to prevent the theft from occurring. Name a number of perimeter protection methods. Which one do you believe is the best and why? What factors would you take into consideration when trying to determine the level of risk for your corporate executives? Paper: The CEO of the corporation has asked you to develop a plan to protect her and other corporate executives as they travel. She is planning on contacting foreign markets to develop new business for the corporation. This will, of course, require them to travel out of the U.S. quite often. Present your plan to the CEO for executive protection. Week 7: Electronic Security Measures Readings: Chapters 18, 19, 20, 21, 23 http://cctv.panasonic.com http://www.stancom.trident.org/index.html Class Activities: On-line Assignment: We will discuss the application of closed-circuit television systems. We will discuss the proper use of two-way radio communication. We will also look at the proper radios to use for security. We will examine the various types of alarm systems on the market today. We will also examine various types of electronic access control devices. Finally we will think about what the future holds for industrial security. Weekly Discussion Topics/Questions: With the seemingly endless variety of electronic security devices on the market today, do you think that security departments tend to engage in "overkill" when it comes to installing these devices in the industrial setting? Why? Of all of the electronic devices that we have looked at, prioritize which devices that you would select to use in an industrial setting. Defend your priorities. Week 8, Violence in the Workplace: Readings: Chapter 24, 25 Class Activities: On-line Assignments: We will discuss at length the topic of workplace violence. We will also discuss high-technology crimes and how they affect security. Weekly Discussion Topics/Questions: Research has shown that the number one security threat today is workplace violence. Why do you think that there is so much violence in the workplace? What do you think can be done to change the pattern of workplace violence that we are seeing? How is high-tech computer crime effecting industry? How can security departments "gear up" to deal with this problem? Paper: The CEO of your corporation would like some recommendations to reduce the threat of workplace violence. Present her with a proposal to reduce the threat of workplace violence in your corporation.
Academic Honesty:Academic integrity is the foundation of the academic community. Because each student has the primary responsibility for being academically honest, students are advised to read and understand all sections of this policy relating to standards of conduct and academic life. Park University 2006-2007 Undergraduate Catalog Page 87-89
Plagiarism:Plagiarism involves the use of quotations without quotation marks, the use of quotations without indication of the source, the use of another's idea without acknowledging the source, the submission of a paper, laboratory report, project, or class assignment (any portion of such) prepared by another person, or incorrect paraphrasing. Park University 2006-2007 Undergraduate Catalog Page 87
Attendance Policy:Instructors are required to maintain attendance records and to report absences via the online attendance reporting system.
Park University 2006-2007 Undergraduate Catalog Page 89-90
Disability Guidelines:Park University is committed to meeting the needs of all students that meet the criteria for special assistance. These guidelines are designed to supply directions to students concerning the information necessary to accomplish this goal. It is Park University's policy to comply fully with federal and state law, including Section 504 of the Rehabilitation Act of 1973 and the Americans with Disabilities Act of 1990, regarding students with disabilities. In the case of any inconsistency between these guidelines and federal and/or state law, the provisions of the law will apply. Additional information concerning Park University's policies and procedures related to disability can be found on the Park University web page: http://www.park.edu/disability .
Last Updated:12/14/2006 10:49:02 PM