Course Outline

SCTY 485 : Corporate Security

Preview Workflow

Viewing: SCTY 485-WW : Corporate Security

Last approved: Mon, 11 Jan 2016 17:33:43 GMT

Last edit: Mon, 11 Jan 2016 17:33:42 GMT

SCTY 485-WW
Campus
Worldwide
College of Aeronautics (WAERO)
SCTY
485
Corporate Security
3
The student will be exposed to issues in the field of private/corporate security. Private security firms work with public law enforcement strengthening the overall security posture of firms, schools, etc. Beginning with a discussion of the differences between public and private police, students will analyze security needs of business and private establishments, in detail, and the threats that might emanate from tapped phones, bugged offices, stolen papers, covert recording, undercover employees, phony repair people, fax intercepts, etc. The substance of the course will include practical and theoretical elements affecting the field.

This course is required for students pursuing a minor in Security. The student will be able to evaluate specific threats to the security of proprietary information to include disloyal employees, discarded information, unsecured telecommunications and acoustical surveillance. Understanding competitive intelligence is a reality for a security manager in the business world. The course will enhance student proficiency in recognizing that:. information is an asset, and as such requires protection; b. proprietary information must be safeguarded from outside agents in pursuit of illicit competiveness; c. knowledge is no longer just power, it is intellectual property that drives corporate profit; and information is among the most costly and perishable of business resources today. The course will encompass an in-depth discussion through analysis and evaluation of convergence, computer security, cyber-crime, industrial espionage, and telecommunications security. The course emphasizes global, multicultural, and world historical perspectives of both corporate security and public law enforcement to establish a depth of comprehension as students professionally and personally prepare for the challenge of a globalized 21st century.Industrial espionage is not limited to a domestic threat issue; it is a global phenomenon. One of the most expositive cases was conducted by French operatives. French intelligence conducted a full-scale operation against the European offices of IBM and other tech companies. They infiltrated spies in corporate offices, intercepted communications, and used other technical methods to collect information. Consequently, businesses and corporate security managers must face the stark reality that experienced spies are being redirected as resources of various intelligence agencies transition from the political to the corporate espionage arena. The focus of this course is to provide a historical and evolving perspective of corporate security giving the student a better understanding of corporate security practices, principles, legal authority and the effects of security on society in general.

Upon completion of this course, students will be able to:

1. Analyze and explain the evolution of private security including how private security has differed from public law enforcement, what security measures were used in ancient times, what role the railroad police played and what impact the World Wars had on private security.2. Define, apply, and critique the basic objectives of private security and the types of services and personnel that might be used to accomplish those objectives.3. Identify and explain examples of interaction among private security and law enforcement and know how the private policing function differs from that of a public police force. Become completely familiar with the legal authority they have and the restrictions on that authority.4. Discuss the specific goals and responsibilities of a private security professional and understand the civil liability and other restrictions under which they must function.5. Define and discuss basic physical controls and the three basic lines of defense: the perimeter, the building exterior and the interior.6. Analyze and identify the problem of employee shrinkage and two the main causes: employee dishonesty and alcohol/drug abuse in the workplace and how the hiring process can reduce shrinkage.7. Identify the major components of the Occupational Safety and Health Act and describe the elements of appropriate emergency response techniques.8. Discuss the seriousness of criminal actions, reviewing the difference between criminal and civil offenses and identifying those crimes of most concern to private security.9. Review and describe the problem of information security and the specific threats that must be considered, including employees who divulge proprietary information, careless discarding of information and unsecured fax and telephone communications.10. Define public relations and the role of security personnel in public relations efforts.11. Analyze and explain the characteristics of an effective investigator and the responsibilities involved.12. Describe the communication process, including listening and nonverbal communication, followed by an investigation into barriers to communication. .13. Describe the basics of testifying in court.14. Define and describe risk management, and the various factors involved. Describe the skills used in risk analysis and the role of the security survey.15. Describe industrial security responsibilities of risk management and the types of industrial losses.16. Describe shrinkage, retail theft, bad checks and fraudulent credit cards.17. Discuss security systems and challenges facing financial institutions and other commercial businesses.18. Demonstrate appropriate selection and application of a research method and statistical analysis (where required), specific to the course subject matter.

Located on the Daytona Beach Campus, the Jack R. Hunt Library is the primary library for all students of the Worldwide Campus. The Chief Academic Officer strongly recommends that every faculty member, where appropriate, require all students in his or her classes to access the Hunt Library or a comparable college-level local library for research. The results of this research can be used for class projects such as research papers, group discussion, or individual presentations. Students should feel comfortable with using the resources of the library. 


Web & Chat: http://huntlibrary.erau.edu
Email:  library@erau.edu
Text: (386) 968-8843
Library Phone:  (386) 226-7656 or (800) 678-9428
Hourshttp://huntlibrary.erau.edu/about/hours.html
 

N/A
N/A

Written assignments must be formatted in accordance with the current edition of the Publication Manual of the American Psychological Association (APA) unless otherwise instructed in individual assignments.

ActivityPercent of Grade
Input Grading Item100

Undergraduate Grade Scale

90 - 100% A
80 - 89% B
70 - 79% C
60 - 69% D
0 - 60% F

Graduate Grade Scale

90 - 100% A
80 - 89% B
70 - 79% C
0 - 69% F
Chris Metzger - 3/1/2015
cris.metzger@erau.edu
Dr. Daniel J. Benny - 3/1/2015
daniel.benny@erau.edu
Dr. Dennis Vincenzi - 3/1/2015
dennis.vincenzi@erau.edu
Dr. Kenneth Witcher - 3/1/2015
Kennth.Witcher@erau.edu
Key: 83