Syllabus Entrance
Printer Friendly
Email Syllabus

CJ 332 Institutional, Industrial andCommercial Security
Angelo, Joseph Medio


Mission Statement: Park University provides access to a quality higher education experience that prepares a diverse community of learners to think critically, communicate effectively, demonstrate a global perspective and engage in lifelong learning and service to others.

Vision Statement: Park University, a pioneering institution of higher learning since 1875, will provide leadership in quality, innovative education for a diversity of learners who will excel in their professional and personal service to the global community.

Course

CJ 332 Institutional, Industrial andCommercial Security

Semester

F2T 2012 DL

Faculty

Angelo, Joseph Medio

Title

Adjunct Faculty/Criminal Justice Administration

Degrees/Certificates

AA/Liberal Arts
BS/Criminal Justice
MA/Business & Organizational Security Management

Office Location

Online

Office Hours

Anytime Online or Email For Appointment

Daytime Phone

330-921-5070

E-Mail

joseph.angelo@park.edu

Semester Dates

Monday, October 22, 2012 to Sunday, December 16, 2012

Class Days

TBA

Class Time

TBA

Credit Hours

3


Textbook:

Title: “Rethinking Corporate Security in the Post 9/11 Era.”

Author: Dennis R. Dalton
ISBN:
978-0-7506-7614-4
Publisher:
Elsevier
Website: http://www.elsevier.com/wps/find/bookdescription.cws_home/678045/description#description

Textbooks can be purchased through the MBS bookstore

Textbooks can be purchased through the Parkville Bookstore

Additional Resources:

McAfee Memorial Library - Online information, links, electronic databases and the Online catalog. Contact the library for further assistance via email or at 800-270-4347.
Career Counseling - The Career Development Center (CDC) provides services for all stages of career development.  The mission of the CDC is to provide the career planning tools to ensure a lifetime of career success.
Park Helpdesk - If you have forgotten your OPEN ID or Password, or need assistance with your PirateMail account, please email helpdesk@park.edu or call 800-927-3024
Resources for Current Students - A great place to look for all kinds of information http://www.park.edu/Current/.
Advising - Park University would like to assist you in achieving your educational goals. Please contact your Campus Center for advising or enrollment adjustment information.
Online Classroom Technical Support - For technical assistance with the Online classroom, email helpdesk@parkonline.org or call the helpdesk at 866-301-PARK (7275). To see the technical requirements for Online courses, please visit the http://parkonline.org website, and click on the "Technical Requirements" link, and click on "BROWSER Test" to see if your system is ready.
FAQ's for Online Students - You might find the answer to your questions here.


Course Description:
CJ332 Institutional, Industrial and Commercial Security: This intermediate course examines the principles, methods, requirements, and standards for institutional, industrial and commercial security systems. Emphasizes prevention of security problems and the promotion and observance of effective security measures to protect lives, property and proprietary information. Applies basis security principles to diverse sectors such as retail transportation, cargo, utilities and technology. Focuses on contemporary security issues such as terrorism, school and workplace violence and information security. 3:0:3

Educational Philosophy:
I will use brevity to describe my philosophy for this particular course.  I feel learning should be enjoyable/fun and possess certain ingredients, which will challenge students each week.  We will accomplish this through the following methods: Weekly threaded discussions will serve as our means to discuss issues and interact with each other.  I believe that a healthy level of weekly discussion will make the course enjoyable and provide valuable insight to one another.  Homework will serve as the weekly measurement to keep everyone current and up-to-date with the course.  The final exam will evaluate your understanding of the material and provide a logical conclusion for the course.  I expect everyone to therefore enjoy the next eight weeks and leave the course feeling challenged with a significant grasp of Institutional, Industrial and Commercial Security.

Learning Outcomes:
  Core Learning Outcomes

  1. Specify the terminology, facts, concepts, principles, and theories associated with institutional, industrial, and commercial security.
  2. Identify reasons for strategic planning, approaches to strategic planning, and the four step strategic management model process.
  3. Explain the need for continuous security education and system upgrades in changing organizational environments.
  4. Identify the unique security requirements in distinct target environments, including retail, transportation, cargo, utilities, and technology.
  5. Differentiate approaches to mitigating security threats, including general crime, terrorism, school and workplace violence, and information security.
  6. Formulate plans and strategies for special security situations such as bomb threats, strikes, natural and manmade disasters.
  7. Explain the existing gap between physical and information security in a strategic security setting.


Core Assessment:
For CJ 332, the student will assume the role of a recently hired program analyst for a security consultant company. The company directs you to prepare an information paper for potential clients that will provide information in regards to the many services your company offers. You can utilize slides or other forms of media to support your information paper however this is not required. The total length of the paper must be at least 8 pages, typed, double spaced (i.e., approximately 1,750 to 2,000 words) and be written in APA Style. You must use 8 or more course-external sources and address the following in your paper:  

1. Your company understands and provides solutions for Institutional, Industrial, and Commercial locations.  

2. The strategy your company utilizes to perform initial assessments for risk.  

3. Your company’s ability to provide education and the importance education and system upgrades has on the total organizational environment.  

4. A brief snapshot of how security is employed at retail locations, transportation locations, cargo storage locations, utility locations, and technology locations (e.g., major server locations or offsite electronic storage locations).  

5. A brief snapshot on how your company mitigates security threats, general crime, terrorism concerns, school and workplace violence, and information security threats.  

6. A brief snapshot on how your company develops plans for bomb threats, strikes, natural disasters, and manmade disasters.  

7. The ability of your company to address Total Asset Protection and assess the roles of physical security and Information Technology (IT) security to determine if there are existing gaps and how to bridge those gaps.  

8. Conclusion that briefly summarizes your company’s ability to deliver solutions and offer insight into security related issues.

Link to Class Rubric

Class Assessment:

Each student is responsible for:


Completing all weekly reading assignments

 

Completing weekly discussion questions and Logging onto the course each week.


Completing four writing assignments referred to as homework or weekly assignments and placing them in the appropriate dropbox week.


Completing the Core Assessment, which is a written homework assignment due in week 7, and placing this in the appropriate dropbox week.


Completing a proctored final examination.

Grading:

The grading scale is as follows:

A = 90-100

B = 80-89

C = 70-79

D = 60-69

F = 0-59.

Grades will be based on a one thousand (1000) point system.

A= 900-1000

B= 800-899

C= 700-799

D= 600-699

F= 599 and Below.

 

Overall Point Breakdown

Core Assessment: 200 Points. This is a written assignment and due by the completion of week 7.


Weekly Participation and Discussion Question: 400 Points. Each week is worth 50 Points.


Homework Assignments: 300 Points. Four Assignments; Two assignments worth 50 points each (100 total) and two assignments worth 100 points each (200 total).


Final Examination: 100 Points

Late Submission of Course Materials:
Material submitted after the submission deadline will be subject to a 10% reduction of possible grade for each week submitted late unless arrangements are made with the instructor prior to the deadline.

Classroom Rules of Conduct:

This course is offered on-line, over the Internet, using the eCollege course delivery system. Students are expected to devote a minimum of four hours per class week logged on to the computer conferencing system-the same amount of time you'd spend in the physical classroom. A class week is defined as the period of time between Monday and Sunday. The first week begins the first day of the semester and ends midnight the following Sunday. Assignments scheduled for completion during a class week should be completed by Sunday of the week assigned. Written papers should be completed and successfully submitted so that they are in my hands on the due date.  If you ever have problems transmitting your assignments to me, telephone me immediately, and we'll get the problem solved. Students are responsible for clicking on the link below and thoroughly reading each Online course policy.  If you have questions about any of these policies, please contact your instructor for clarification.

Please post any questions or comments concerning the course or course content into the Office (see button on left side of home page).  I'll visit my office each day to read your comments and questions and to post responses.  I'll try to get back to you within 24 hours. Please DO NOT post papers in this section.  Please place your papers in the dropbox for the appropriate week.

Course Topic/Dates/Assignments:

Week 1 (22-28 OCT, 2012)

Our Current Security Posture

During your first week we will focus on defining the course and how this intermediate course will expound upon the introductory topics received in the Introduction to Security course. You are responsible for reading all items under the Course Home Content Tab and Posting an introductory message.

In addition, we will explore our feelings about current security awareness and the effectiveness of existing measures to determine the existing threat levels compared to the threat levels prior to 9/11.

Core Learning Objectives: The following core learning objectives will be reflected during Week 1:

CLO 1. Specify the terminology, facts, concepts, principles, and theories associated with institutional, industrial, and commercial security.

Required Reading:

Course Text: Foreword, Preface, Introduction, and Chapter 1.

Discussion Question:

Do you feel security awareness and effectiveness has increased, decreased, or remained the same since the events of 9/11? Support your response with appropriate reference(s) as necessary.

Please provide your initial response to the weekly discussion question by midnight (MST) on THR and a minimum of two responses to two other student's initial posts by Saturday at midnight (MST).

Homework:

Using the internet, library, or other external resource prepare a one page paper on the definition of institutional security, industrial security, and commercial security. Provide two examples of each and list reference your source.

Introduction:

Ensure you post your introduction to the Introduction Section located under the Course Home Tab.

Week 2 (29 OCT - 4 NOV, 2012)

Barriers, Understanding the Role of Security and Challenges Security Faces

During week 2 we will examine the various roles of security and the challenges the security professionals face every day. You will prepare a ready reference guide during week 2 that is designed to provide you the tools to learn how to access resources on the internet and locate relevant information related to disaster planning, security education, retail security, transportation security, workplace violence, bomb threats, fire response, and executive protection. In addition, we will explore our thoughts in regards to the authors comment that the events of 9/11 have not benefited private security. This is a fairly bold statement on the part of the author and at face value many might disagree however through our examination we will utilize insightful discussion to draw our own relevant conclusion.

Core Learning Objectives: The following core learning objectives will be reflected during Week 2:

CLO 4. Identify the unique security requirements in distinct target environments, including retail, transportation, cargo, utilities, and technology.

CLO 5. Differentiate approaches to mitigating security threats, including general crime, terrorism, school and workplace violence, and information security.

CLO 6. Formulate plans and strategies for special security situations such as bomb threats, strikes, natural and manmade disasters.

Required Reading:

Course Text: Chapters 2 and 3

Discussion Question:

The author’s opening of Part I of our text discusses how the events of 9/11 have not benefited private security. Do you agree or disagree with this assertion and why or why not?

Please provide your initial response to the weekly discussion question by midnight (MST) on THR and a minimum of two responses to two other student's initial posts by Saturday at midnight (MST).

Week 3 (5-11 NOV, 2012)

Planning, Understanding the Strategic Planning Process

During week 3 we will examine the various methods of strategic planning including the nine step model, five step model, and the four step model, which is supported by the author. As we examine each model we will make a determination if by reducing the number of steps we maintain the integrity of the strategic planning process. Since this is a very intense week for reading and understanding strategic planning, there will be no formal homework however I would recommend getting a head start for Week 4 by reading chapter 5 where we will review the Metrics Based Approach.

Core Learning Objectives: The following core learning objectives will be reflected during Week 3:

CLO 2. Identify reasons for strategic planning, approaches to strategic planning, and the four step strategic management model process.

Required Reading:

Course Text: Chapter 4

Discussion Question:

Examine the authors four step strategic management process located on page 102. Do you feel reducing the approach to four steps from five or nine steps simplifies and clarifies the process to improve execution or generalizes the process to stagnate execution?

Please provide your initial response to the weekly discussion question by midnight (MST) on THR and a minimum of two responses to two other student's initial posts by Saturday at midnight (MST).

Homework:

No Homework for Week 3

Week 4  (12-18 NOV, 2012)

Asset Protection, Understanding the Metrics Based Approach to Total Asset Protection

During week 4 we will gain an awareness of utilizing metrics to approaching the task of Total Asset Protection. Metrics is not new rather it is a method in which to objectify subjective values hence providing a mathematical estimate for assessing risk and developing methods to mitigate risk. We will perform a lively discussion on our thoughts concerning what the leading threats are for institutional, industrial, and commercial locations. We will also determine if these identified threats are the same or different for each of the three domains. You will capture your understanding of the Metrics Based Approach in a short paper.

Core Learning Objectives: The following core learning objectives will be reflected during Week 4:

CLO 2. Identify reasons for strategic planning, approaches to strategic planning, and the four step strategic management model process.

CLO 4. Identify the unique security requirements in distinct target environments, including retail, transportation, cargo, utilities, and technology.

Required Reading:

Course Text: Chapter 5

Discussion Question:

What do you feel are the leading threats to a institutional, industrial, and commercial location within the boundaries of the United States in terms of security?

Please provide your initial response to the weekly discussion question by midnight (MST) on THR and a minimum of two responses to two other student's initial posts by Saturday at midnight (MST).

Homework:

After reviewing chapter 5 articulate your understanding of the metrics based approach to total asset protection. To complete the assignment you will need to briefly define the metrics based approach and synthesize your thoughts to briefly convey your understanding of this approach. Your paper should be approximately 2 pages, double spaced.

Week 5 (19-25 NOV, 2012)

Preparing for Disaster

During week 5 we will begin to dig deep into planning and preparing for disasters using multiple situations. Using our text we will examine the movement towards a term known as Total Asset Protection. This form of thinking has led many security professional to collaborate and attempt to evolve. This evolution sprouted terms like Enterprise Security Management, which you readily find multiple definitions. The term Chief Security Officer is also a relatively young term, which hatched a few years following the birth of the term CIO. From the required reading, this week’s discussion question, and the homework assignment you will readily note there is not just one standard rather multiple standards often convoluted, complex, and non-coordinated. Why is this important to know? Simply so that you can prepare for the challenges we will continue to face as security evolves along with maintaining pace with changing technology and society.

Core Learning Objectives: The following core learning objectives will be reflected during Week 5:

CLO 3. Explain the need for continuous security education and system upgrades in changing organizational environments.

CLO 5. Differentiate approaches to mitigating security threats, including general crime, terrorism, school and workplace violence, and information security.

CLO 6. Formulate plans and strategies for special security situations such as bomb threats, strikes, natural and manmade disasters.

Required Reading:

Course Text: Chapter 6 and Virginia Union University Emergency Preparedness Plan, Attachment 7 Hostile Intruder(s) Emergency Action Plan.

Discussion Question:

After reading Attachment 7 of the VUU Emergency Preparedness Plan offer your thoughts on the effectiveness of the guidance summarized in this attachment. Although one can never foresee all given possibilities we can exam the past to make educated decisions about our future.

Please provide your initial response to the weekly discussion question by midnight (MST) on THR and a minimum of two responses to two other student's initial posts by Saturday at midnight (MST).

Week 6 (26 NOV - 2 DEC, 2012)

Understanding the Gap between Physical and Information Technology Security

During week 6 we will explore the existing dichotomy between physical security and information technology security. You will find this a very interesting week as we discuss this issue, which although some will not admit, reduces the total asset protection when the two are not synchronized.

You will notice an external link in the required reading, which will provide a great deal of insight into the gap between physical and IT security. This is a very passionate topic in all three domains we are focused on (institutional, industrial, and commercial) and you will most likely encounter this topic in all forms of security employment.

Core Learning Objectives: The following core learning objectives will be reflected during Week 6:

CLO 7. Explain the existing gap between physical and information security in a strategic security setting.

Required Reading:

Course Text: Chapter 7

Article Titled “Some enterprises benefiting from the convergence of physical and information security assets” by Ericka Chickowski located at: http://www.scmagazineus.com/Cover-story-Some-enterprises-benefiting-from-the-convergence-of-physical-and-information-security-assets/article/34865

Discussion Question:

After reading the required article reading discuss what you feel are common boundaries between IT and physical security and what factors appear to maintain a gap between the two entities.

Please provide your initial response to the weekly discussion question by midnight (MST) on THR and a minimum of two responses to two other student's initial posts by Saturday at midnight (MST).

Homework:

None

Week 7 (3-9 DEC, 2012)

Management, Leadership, or a Combination

During week 7 we will delve into the debate between management and leadership. To those with very little formal leadership training they might view management as synonymous with leadership. Management is very different from leadership as you will discover. Leadership is a debate in itself as some believe there are those born to be leaders and those who believe leaders are made. We will address this during our weekly discussion question This week is extremely important as it contains your core assessment assignment, which will encompass multiple CLOs and utilize the knowledge that you have gained throughout the course. I am certain you will find this final assignment challenging and very rewarding. I am also certain you will discover this is a very intuitive assignment unlike many you will find elsewhere.

Core Learning Objectives: The following core learning objectives will be reflected during Week 7:

CLO 1. Specify the terminology, facts, concepts, principles, and theories associated with institutional, industrial, and commercial security.

CLO 2. Identify reasons for strategic planning, approaches to strategic planning, and the four step strategic management model process.

CLO 3. Explain the need for continuous security education and system upgrades in changing organizational environments.

CLO 4. Identify the unique security requirements in distinct target environments, including retail, transportation, cargo, utilities, and technology.

CLO 5. Differentiate approaches to mitigating security threats, including general crime, terrorism, school and workplace violence, and information security.

CLO 6. Formulate plans and strategies for special security situations such as bomb threats, strikes, natural and manmade disasters.

CLO 7. Explain the existing gap between physical and information security in a strategic security setting.

Required Reading:

Course Text: Chapter 8

Article Titled “Some enterprises benefiting from the convergence of physical and information security assets” by Ericka Chickowski located at: http://www.scmagazineus.com/Cover-story-Some-enterprises-benefiting-from-the-convergence-of-physical-and-information-security-assets/article/34865

Discussion Question:

What requirements do you see necessary for a good security manager, director, or chief security officer?

Please provide your initial response to the weekly discussion question by midnight (MST) on THR and a minimum of two responses to two other student's initial posts by Saturday at midnight (MST).

Homework: CORE ASSESSMENT. You were recently hired as a program analyst for a security consultant company. The company directs you to prepare an information paper for potential clients that will provide information in regards to the many services your company offers. You can utilize slides or other forms of media to support your information paper however this is not required. Total length of the paper will be at least 8 pages, double spaced at 12 pitch New Times Roman or Ariel font. You must address the following in your paper:

1. Your company understands and provides solutions for Institutional, Industrial, and Commercial locations. (1 Slide with notes or ½ page)

2. The strategy your company utilizes to perform initial assessments for risk (1 Slide with notes or ½ page).

3. Your company’s ability to provide education and the importance education and system upgrades has on the total organizational environment. (1 Slide with notes or ½ page)

4. A brief snapshot of how security is employed at retail locations, transportation locations, cargo storage locations, utility locations, and technology locations (e.g., major server locations or offsite electronic storage locations). (5 Slides with notes or 2 pages)

5. A brief snapshot on how your company mitigates security threats, general crime, terrorism concerns, school and workplace violence, and information security threats. (5 Slides with notes or 2 pages)

6. A brief snapshot on how your company develops plans for bomb threats, strikes, natural disasters, and manmade disasters. (4 Slides with notes or 2 pages)

7. The ability of your company to address Total Asset Protection and assess the roles of physical security and IT security to determine if there are existing gaps and if there are how to bridge those gaps. (1 Slide with notes or 1 page).

8. Conclusion that briefly summarizes your company’s ability to deliver solutions and offer insight into security related issues. (1 Slide with notes or ½ page).

Week 8 (10-16 DEC, 2012)

During week 8 you will be exposed to the author’s depiction of various methods of office management. You will be exposed to many time tested axioms along with modern day themes to achieve success. Many of the words will be common to each of you as they are common buzz words and for the most part common sense. What is not readily apparent is the right combination or mixture to achieve effective management.

One fact holds true over time and that is continuous education is necessary to grow. We will focus our final week on strategies for security education, both for employees and security practitioners, along with understanding how the organizational environment must continually evolve to maintain pace with changing technology.

Core Learning Objectives: The following core learning objectives will be reflected during Week 8:

CLO 3. Explain the need for continuous security education and system upgrades in changing organizational environments.

Required Reading:

Course Text: Chapter 9

ASIS Web Site: www.asisonline.org

Discussion Question:

What type of formal training or education would you desire within a security department and why? This is also very dependent on the industry however there are many aspects which apply to any industry. For example having someone on staff that is trained in physical security standards is very important in order to ensure the company is in compliance with the physical security standards (e.g., barriers, locks, lighting, cameras, etc).

Please provide your initial response to the weekly discussion question by midnight (MST) on THR and a minimum of two responses to two other student's initial posts by Saturday at midnight (MST).

Homework:.

None

Final Examination:

All students must complete a final proctored examination during Week 8

Academic Honesty:
Academic integrity is the foundation of the academic community. Because each student has the primary responsibility for being academically honest, students are advised to read and understand all sections of this policy relating to standards of conduct and academic life. Park University students and faculty members are encouraged to take advantage of the University resources available for learning about academic honesty (www.park.edu/current or http://www.park.edu/faculty/).from Park University 2011-2012 Undergraduate Catalog Page 95-96

Plagiarism:
Plagiarism involves the use of quotations without quotation marks, the use of quotations without indication of the source, the use of another's idea without acknowledging the source, the submission of a paper, laboratory report, project, or class assignment (any portion of such) prepared by another person, or incorrect paraphrasing. from Park University 2011-2012 Undergraduate Catalog Page 95

Attendance Policy:
Instructors are required to maintain attendance records and to report absences via the online attendance reporting system.

  1. The instructor may excuse absences for valid reasons, but missed work must be made up within the semester/term of enrollment.
  2. Work missed through unexcused absences must also be made up within the semester/term of enrollment, but unexcused absences may carry further penalties.
  3. In the event of two consecutive weeks of unexcused absences in a semester/term of enrollment, the student will be administratively withdrawn, resulting in a grade of "F".
  4. A "Contract for Incomplete" will not be issued to a student who has unexcused or excessive absences recorded for a course.
  5. Students receiving Military Tuition Assistance or Veterans Administration educational benefits must not exceed three unexcused absences in the semester/term of enrollment. Excessive absences will be reported to the appropriate agency and may result in a monetary penalty to the student.
  6. Report of a "F" grade (attendance or academic) resulting from excessive absence for those students who are receiving financial assistance from agencies not mentioned in item 5 above will be reported to the appropriate agency.
ONLINE NOTE: Students must participate in an academically related activity on a weekly basis in order to be marked present in an online class. Examples of academically-related activities include but are not limited to: contributing to an online discussion, completing a quiz or exam, completing an assignment, initiating contact with a faculty member to ask a course related question, or using any of the learning management system tools.

Park University 2011-2012 Undergraduate Catalog Page 98

Disability Guidelines:
Park University is committed to meeting the needs of all students that meet the criteria for special assistance. These guidelines are designed to supply directions to students concerning the information necessary to accomplish this goal. It is Park University's policy to comply fully with federal and state law, including Section 504 of the Rehabilitation Act of 1973 and the Americans with Disabilities Act of 1990, regarding students with disabilities. In the case of any inconsistency between these guidelines and federal and/or state law, the provisions of the law will apply. Additional information concerning Park University's policies and procedures related to disability can be found on the Park University web page: http://www.park.edu/disability .



Rubric

CompetencyExceeds Expectation (3)Meets Expectation (2)Does Not Meet Expectation (1)No Evidence (0)
Evaluation                                                                                                                                                                                                                                                 
Outcomes
1-7                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  
The report demonstrates a thorough appraisal of the researched information. The essay is presented as a congruous and thoughtful exposition of ideas. The report demonstrates a satisfactory appraisal of the researched information. The report is presented as a thoughtful exposition of ideas. The report demonstrates a minimal appraisal of the researched information. The report is presented as a disparate exposition of ideas. The report demonstrates no appraisal of the researched information. The report is presented as an incongruous exposition of ideas. 
Synthesis                                                                                                                                                                                                                                                  
Outcomes
1-7                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  
The report is a consolidated integration of the fundamental principles of security administration. Extends research well beyond minimum requirements. The report presents a basic compilation of fundamental principles of security administration, but integration of research themes is weak. The report responds to some individual issues of security administration, but with insufficient consolidation of ideas. No evidence of combining researched material into a consistent whole. 
Analysis                                                                                                                                                                                                                                                   
Outcomes
1-7                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  
Report completely examines the fundamental principles of security administration. It analyzes key elements using 8 or more course-external sources. Report examines the fundamental principles of security administration, but may miss a few points. It analyzes key elements using 6-7 course-external sources. Report fails to satisfactorily examine the fundamental principles of security administration. It analyzes key elements using 1-5 course-external sources. Report fails to examine the fundamental principles of security administration. It uses no course-external sources. 
Application                                                                                                                                                                                                                                                
Outcomes
1-7                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  
The report shows multiple instances and exceptional understanding of terminology and concepts specific to the course core learning outcomes throughout. The report shows sufficient and satisfactory use of terminology and concepts specific to the course core learning outcomes throughout. The report shows minimal use of terminology and concepts specific to the course core learning outcomes throughout. The report fails to demonstrate an understanding of terminology and concepts specific to the course core learning outcomes. 

Copyright:

This material is protected by copyright
                               and can not be reused without author permission.

Last Updated:9/24/2012 9:27:50 PM