Syllabus Entrance
Printer Friendly
Email Syllabus

CJ 333 Security Administration
DeAngelis, George A.


Mission Statement: The mission of Park University, an entrepreneurial institution of learning, is to provide access to academic excellence, which will prepare learners to think critically, communicate effectively and engage in lifelong learning while serving a global community.

Vision Statement: Park University will be a renowned international leader in providing innovative educational opportunities for learners within the global society.

Course

CJ 333 Security Administration

Semester

S2B 2011 BLA

Faculty

DeAngelis, George A.

Title

Senior Instructor/Adjunct Faculty

Degrees/Certificates

Bachelor of Science Criminal Justice Administration
Master of Science Administration of Justice and Security
Master of Arts Management

Office Location

george.deangelis@park.edu

Office Hours

contact 915-252-3323

Daytime Phone

915.252.3323

E-Mail

george.deangelis@park.edu

deangelis.george@yahoo.com

Web Page

http://www.parkonline.org

Semester Dates

21 March-May 15, 2011

Class Days

--T-R--

Class Time

9:00 - 11:30 AM

Credit Hours

3


Textbook:
Effective Security Management by Sennewald, Charles, 4th Edition, (2003)
Butterworth Heinemann Publishers
ISBN-10: 0750674547
ISBN-13: 9780750674546

Additional Resources:

McAfee Memorial Library - Online information, links, electronic databases and the Online catalog. Contact the library for further assistance via email or at 800-270-4347.
Career Counseling - The Career Development Center (CDC) provides services for all stages of career development.  The mission of the CDC is to provide the career planning tools to ensure a lifetime of career success.
Park Helpdesk - If you have forgotten your OPEN ID or Password, or need assistance with your PirateMail account, please email helpdesk@park.edu or call 800-927-3024
Resources for Current Students - A great place to look for all kinds of information http://www.park.edu/Current/.

http://www.parkonline.org
http://www.apastyle.org
http://www.plagiarismchecker.com
http://www.citationmachine.net
http://www.asisonline.org

Course Description:
CJ 333 Security Administration: This intermediate course examines the selection, and organization and administration of contemporary security programs in business, government and industry. Emphasizes both private and government protection of assets, personnel and facilities. Focuses on best practices that security managers can put to immediate use. Provides strategic planning guidance for risk assessment and management, and the coordination of security planning with institutional stakeholders. Prerequisite CJ 233 3:0:3

Educational Philosophy:

Your instructor's educational philosophy is based upon lectures, examinations, research from the Internet, writings from professional periodicals and dialog with students. Assignments are intended to encourage thoughtful exploration of ideas and application of information provided during the course. Contradictory thoughts are encouraged as part of the learning process. Students are expected to ask questions about something they do not know.

Learning Outcomes:
  Core Learning Outcomes

  1. Specify the terminology, facts, concepts, principles, and theories associated with security administration.
  2. Recognize the managerial acts and functions required for asset, personnel, and facility protection.
  3. Interpret institutional stakeholder needs to coordinate appropriate security planning.
  4. Apply creative security solutions to practical organizational problems using frameworks, procedures, and methods from the security discipline.
  5. Formulate strategic plans for conducting security risk assessments, audits, and developing security plans.
  6. Evaluate the effectiveness of security plans using theory-based criteria and performance standards.


  Instructor Learning Outcomes
  1. Understand the important role ethics plays in the security profession
Core Assessment:

For CJ 333, the student will research and report on a contemporary security program in business, government, or industry that emphasizes the protection of assets, personnel, and/or facilities. The purpose of this research is to identify best practices in security administration.

To complete this project, students must: 

  1. Identify an actual organizational security program.
  2. Conduct research about the organization and the security program.
  3. Discuss the managerial acts and functions required for asset, personnel, and/or facility protection.
  4. Identify and discuss the role(s) of relevant institutional stakeholders in security planning.
  5. Identify how the organization has applied security solutions to problems using methods from the security discipline.
  6. Critique the organization’s strategic planning and risk assessment practices.
  7. Evaluate the effectiveness of organizational security planning and administration.
  8. Make conclusions and recommendations concerning best practices in security administration. 

The report will provide an integrated and equitable treatment of all issues and contain the following technical components:

  1. A cover or title page
  2. A body of text, 7-8 typed, double-spaced pages (1,750 to 2,000 words) in length
  3. A reference page containing a minimum of 8 course-external resources
  4. Written in APA Style

Link to Class Rubric

Class Assessment:

There will be four quizzes collectively valued at 20% of the total grade. In addition, there will be a mid-term and final examination valued at 25% each. Additionally, each student will be required to complete a research paper valued at 20%. Detail information concerning the paper will be discussed in class. Participation will factor 10% of the total grade. Additional class work may also be assigned during the term as per the discretion of the facilitator

(Note: attendance is a component of participation)

Grading:

The grading scale is as follows: A=90-100; B=80-89; C=70-79; D=60-69; F=0-59.

Mid Term Exam 25%

Final Exam  25%

Research Paper (core assessment) 20%

Four Quizzes 20% (5% each)

Participation (with attendance) 10%

Total: 100%

Each student is responsible for:

Completing weekly reading assignments

Completing research paper

Completing 4 quizzes

Completing a proctored mid-term and final examination

Attending class on time & remaining for the entire period

Late Submission of Course Materials:

Makeup work for absence must be submitted via drop-box by the next class no later than 11:59 pm MST. It will not be accepted after that unless the student and the instructor have made prior arrangements. There is a two point deduction for each incident makeup work is not satisfactorily completed.

Research papers will be penalized five points for each class it is late unless the student and instructor have made an advance agreement. Papers are late if not posted via drop-box by 11:59 pm MST. Papers that are late two class dates will not be accepted.

Examination missed as a result of excused absence can be rescheduled within one week after the regularly scheduled exam date

Examination missed as a result of unexcused absence will be recorded as an "F"
There will be no examination retakes

Classroom Rules of Conduct:

First and foremost, this is not an on-line class. Therefore, students who cannot commit to attending this class as scheduled should not enroll. Students are expected to attend class on time and to remain for the entire period. Continuous tardiness will impact attendance grade. Leaving class must be approved by the facilitator in order to receive attendance credit. Students must realize that due to the compressed schedule, class time is critical. Continued tardiness of 30 minutes or more will be cause for marking the student absent for that class period. Students missing class must personally notify the instructor via phone or email as soon as possible (do not text message). Asking a student to relay messages will not be considered proper notification. Determination of what is an excused or unexcused absence remains with the discretion of the facilitator as per Park University policies. (See below) Students who miss the first day of class will miss important information about the class format, syllabus, text, exams, and core assessment assignment. This information will not be repeated due to limited class time. However, it will be your responsibility to become familiar with this information. Students who are disruptive, abusive, rude, or unruly towards any student, guest, or faculty will be removed from the class. Rude conducts towards the instructor includes disruptive chattering, doing homework, reading a book (other than the text) or newspaper, sleeping, or continuously leaving class to answer cell phone. Prohibited conduct is also cause for dismissal from the class. Such conduct includes plagiarism and dishonesty (in any manner or degree). Both will not be tolerated. Submitting the same work (presumably your work) for two different assignments is not plagiarism but it is considered unethical, even if the two assignments were completed for different classes. If it is discovered that a paper or other assignment was previously prepared for another course, or learning institution, it is an academic impropriety and will result in a "0" grade. Coursework must uphold the high standards of academic integrity. Nonacademic information resources, such as Wikipedia.org, Ask.com, Encarta.msn.com, Infoplease.com, etc are not allowed because they are not credible, accurate, or peer reviewed. Computer technologies make writing and revising easier. However, students must recognize that technology can also cause problems.  Problems can occur such as printers running out of ink and hard drives crashing.  Nevertheless students must be responsible for planning ahead and meeting deadlines in spite of these issues.  Be sure to save copies of your work to a disk, a hard drive, and print out paper copies for backup purposes. Assignments will be delivered via E-companion drop-box in a compatible file. Technological difficulties are not an acceptable excuse for turning in work late.

Course Topic/Dates/Assignments:
March 22          Course Orientation and Chapter 1 General Principles of Organization
March 24          Chapter 2 Organizational Structure and Chapter 3 Security's Role in the Organization
March 29          Chapter 4 The Director's Role, Chapter 5 The Security Supervisor's Role
March 31          Chapter 6 The Individual Security Employee, Chapter 7 Hiring Security Personnel
April 05            Chapter 8 Job Descriptions, Chapter 9 Training
April 07            Chapter 10 Discipline, Chapter 10 Motivation & Morale
April 12            Chapter 12 Promotions Review for Mid-Term Exam
April 14            Mid-Term Exam Chapters 1-12
April 19            Chapter 13 Communication, Chapter 14 Career vs. Noncareer Personnel
April 21            Chapter 15 Planning & Budgeting, Chapter 16 Program Management
April 26            Chapter 17 Risk, Chapter 18 The Security Survey
April 28            Chapter 20 Written Policies & Procedures, Chapter 22 Statistics as a Security
                        Management Tool
May 03            Chapter 23 Selling Security within the Organization Research Papers Due
May 05            Chapter 24 Relationship with LE
May 10            Chapter 25 Jackass Management, Review for Final Exam
May 12            Final Class & Final Exam Chapters 13-18 & 20, 22-25

Academic Honesty:
Academic integrity is the foundation of the academic community. Because each student has the primary responsibility for being academically honest, students are advised to read and understand all sections of this policy relating to standards of conduct and academic life. Park University students and faculty members are encouraged to take advantage of the University resources available for learning about academic honesty (www.park.edu/current or http://www.park.edu/faculty/).from Park University 2010-2011 Undergraduate Catalog Page 92

Plagiarism:
Plagiarism involves the use of quotations without quotation marks, the use of quotations without indication of the source, the use of another's idea without acknowledging the source, the submission of a paper, laboratory report, project, or class assignment (any portion of such) prepared by another person, or incorrect paraphrasing. from Park University 2010-2011 Undergraduate Catalog Page 92-93

Attendance Policy:
Instructors are required to maintain attendance records and to report absences via the online attendance reporting system.

  1. The instructor may excuse absences for valid reasons, but missed work must be made up within the semester/term of enrollment.
  2. Work missed through unexcused absences must also be made up within the semester/term of enrollment, but unexcused absences may carry further penalties.
  3. In the event of two consecutive weeks of unexcused absences in a semester/term of enrollment, the student will be administratively withdrawn, resulting in a grade of "F".
  4. A "Contract for Incomplete" will not be issued to a student who has unexcused or excessive absences recorded for a course.
  5. Students receiving Military Tuition Assistance or Veterans Administration educational benefits must not exceed three unexcused absences in the semester/term of enrollment. Excessive absences will be reported to the appropriate agency and may result in a monetary penalty to the student.
  6. Report of a "F" grade (attendance or academic) resulting from excessive absence for those students who are receiving financial assistance from agencies not mentioned in item 5 above will be reported to the appropriate agency.

Park University 2010-2011 Undergraduate Catalog Page 95-96

Disability Guidelines:
Park University is committed to meeting the needs of all students that meet the criteria for special assistance. These guidelines are designed to supply directions to students concerning the information necessary to accomplish this goal. It is Park University's policy to comply fully with federal and state law, including Section 504 of the Rehabilitation Act of 1973 and the Americans with Disabilities Act of 1990, regarding students with disabilities. In the case of any inconsistency between these guidelines and federal and/or state law, the provisions of the law will apply. Additional information concerning Park University's policies and procedures related to disability can be found on the Park University web page: http://www.park.edu/disability .



Rubric

CompetencyExceeds Expectation (3)Meets Expectation (2)Does Not Meet Expectation (1)No Evidence (0)
Evaluation                                                                                                                                                                                                                                                 
Outcomes
1-6                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  
The report demonstrates a thorough appraisal of the researched information.  The essay is presented as a congruous and thoughtful exposition of ideas. The report demonstrates a satisfactory appraisal of the researched information.  The report is presented as a thoughtful exposition of ideas. The report demonstrates a minimal appraisal of the researched information.  The report is presented as a disparate exposition of ideas. The report demonstrates no appraisal of the researched information.  The report is presented as an incongruous exposition of ideas. 
Synthesis                                                                                                                                                                                                                                                  
Outcomes
1-6                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  
The report is a consolidated integration of the fundamental principles of security administration. Extends research well beyond minimum requirements. The report presents a basic compilation of fundamental principles of security administration, but integration of research themes is weak. The report responds to some individual issues of security administration, but with insufficient consolidation of ideas. No evidence of combining researched material into a consistent whole. 
Analysis                                                                                                                                                                                                                                                   
Outcomes
1-6                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  
Report completely examines the fundamental principles of security administration.  It analyzes key elements using 8 or more course-external sources. Report examines the fundamental principles of security administration, but may miss a few points.  It analyzes key elements using 6-7 course-external sources. Report fails to satisfactorily examine the fundamental principles of security administration. It analyzes key elements using 1-5 course-external sources. Report fails to examine the fundamental principles of security administration. It uses no course-external sources. 
Application                                                                                                                                                                                                                                                
Outcomes
1-6                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  
The report shows multiple instances and exceptional understanding of terminology and concepts specific to the course core learning outcomes throughout. The report shows sufficient and satisfactory use of terminology and concepts specific to the course core learning outcomes throughout. The report shows minimal use of terminology and concepts specific to the course core learning outcomes throughout. The report fails to demonstrate an understanding of terminology and concepts specific to the course core learning outcomes. 
Content of Communication                                                                                                                                                                                                                                   
Outcomes
1-6                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  
Report conveys complete and exceptional information on the fundamental principles of security administration. Report conveys sufficient information on the fundamental principles of security administration. Report conveys minimal information on the fundamental principles of security administration. Report conveys no information on the fundamental principles of security administration. 
Technical Skill in Communicating                                                                                                                                                                                                                           
Outcomes
1-6                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  
Report contains all required technical components: 1,750-2000 words in length (excluding required cover and reference pages), typed, double-spaced.   Written in APA Style.  Contains fewer than five grammatical or spelling errors. Report contains most required technical components.  Contains more than five grammatical or spelling errors but errors do not detract from understanding. Written in APA or MLA Style, but may have a few formatting errors. Report contains few required technical components.  Contains more than five grammatical or spelling errors that detract from understanding. APA or MLA Style usage is barely evident. Report contains no required technical components. There are so many errors in the APA or MLA writing convention, in the paper presentation, or in grammar and/or spelling that it is difficult to read. 

Copyright:

This material is protected by copyright
                               and can not be reused without author permission.

Last Updated:2/16/2011 8:49:14 AM