The information contained on this page is designed to give students a representative example of material covered in the course. Any information related to course assignments, dates, or course materials is illustrative only. For a definitive list of materials, please check the online catalog 3-4 weeks before the course start date.
CRIMJ 304 Security Administration (3): Interdisciplinary analysis of security and loss prevention; its administration, role in crime control and prevention, and relationship to criminal justice.
Overview
This course will entail an interdisciplinary analysis of the philosophies and principles related to security and loss prevention within the private and public sectors. A historical analysis of the security function and how it has evolved into the various private and public security agencies and/or organizational sub-units will be presented. A comprehensive survey of traditional and contemporary operations and organizational structures used by industrial, commercial, retail, campus, governmental and private security agencies will also be presented. Other topics covered in the course include: security vs. law enforcement, basic security law, internal and external theft, protection and surveillance systems, insurance, occupational health and safety, workplace violence, computer security, executive protection, and security issues pertaining to terrorism.
Course Objectives
The course will introduce students to the wide purview of security administration. It aims to illustrate that security has been, and continues to be, a major societal concern. As such, over time, private citizens, corporate entities, and governmental institutions have taken actions to enhance either individual or collective security. Of particular emphasis will be the ways in which security is enhanced. For example, the use of crime prevention through environmental design (CPTED), target hardening, situational crime prevention, and the use of risk assessment will be examined through readings and class exercises.
Specific course objectives: After taking this course, students should be able to:
- explain the origins of security administration;
- differentiate and identify the challenges faced by the assorted areas of security administration;
- articulate the similarities and differences between public and private security administration;
- discuss and critique the diverse crime prevention approaches used in security administration;
- analyze the unique legal aspects of the security administration; and
- locate the vast array of employment opportunities in security administration.
Required Course Materials
Most World Campus courses require that students purchase materials (e.g., textbooks, specific software, etc.). To learn about how to order materials, please see the Course Materials page. You should check LionPATH approximately 3–4 weeks before the course begins for a list of required materials.
Additional materials:
- Web access to Security Management journal (available online through ProQuest, a database that can be found on PSU Library Web site: www.lias.psu.edu);
- Streaming videos that will be available on certain lesson pages.
Technical Requirements
| Operating System | Windows Vista, Windows 7, Windows 8*; Mac OS X 10.5 or higher *Windows 8 support excludes the tablet only RT version |
|---|---|
| Processor | 2 GHz or higher |
| Memory | 1 GB of RAM |
| Hard Drive Space | 20 GB free disk space |
| Browser | We recommend the latest ANGEL-supported version of Firefox or
Internet Explorer. To determine if your browser fits this criterion,
and for advice on downloading a supported version,
please refer to the following ITS knowledge base article: Supported Browsers and Recommended Computers.
Note: Cookies, Java, and JavaScript must be enabled. Pop-up blockers should be configured to permit new windows from Penn State websites. Due to nonstandard handling of CSS, JavaScript and caching, older versions of Internet Explorer (such as IE 6 or earlier) do not work with our courses. |
| Plug-ins | Adobe Reader [Download from Adobe]
Flash Player (v7.0 or later) [Download from Adobe] |
| Additional Software | Microsoft Office (2007 or later) |
| Internet Connection | Broadband (cable or DSL) connection required |
| Printer | Access to graphics-capable printer |
| DVD-ROM | Required |
| Sound Card, Microphone, and Speakers | Required |
| Monitor | Capable of at least 1024 x 768 resolution |
If you need technical assistance at any point during the course, please contact the Service Desk.
For registration, advising, disability services, help with materials, exams, general problem solving, visit World Campus Student Services!
Course Schedule
Note: If you are planning to graduate this semester, please communicate your intent to graduate to your instructor. This will alert your instructor to the need to submit your final grade in time to meet the published graduation deadlines. For more information about graduation policies and deadlines, please refer to Graduation at the Chaiken Center for Student Success.
| Week 1, Lesson 0: Getting Started/Lesson 1: The History and Development of Security Administration | |
|---|---|
| Readings/Videos: |
|
| Assignments: |
|
| Week 2, Lesson 2: The Business of the Private Security Industry | |
|---|---|
| Readings/Videos: |
|
| Assignments: |
|
| Week 3, Lesson 3: The Rudimentary Aspects of Private Security | |
|---|---|
| Readings: |
|
| Assignments: |
|
| Week 4, Lesson 4: Private Security and the Law | |
|---|---|
| Readings: |
|
| Assignments: |
|
| Week 5, Exam 1 |
|---|
| Week 6, Lesson 5: Premise Security | |
|---|---|
| Readings: |
|
| Assignments: |
|
| Week 7, Lesson 6: Retail Security and Loss Prevention | |
|---|---|
| Readings: |
|
| Assignments: |
|
| Week 8, Lesson 7: Personal Security and Executive Protection | |
|---|---|
| Readings: |
|
| Assignments: |
|
| Week 10, Lesson 8: Employment-Related Security | |
|---|---|
| Readings: |
|
| Assignments: |
|
| Week 11, Exam 2 |
|---|
| Week 12, Lesson 9: Information and Computer Security | |
|---|---|
| Readings: |
|
| Assignments: |
|
| Week 13, Lesson 10: Investigative Security | |
|---|---|
| Readings: |
|
| Assignments: |
|
| Week 14, Lesson 11: Private and Public Partnerships for Security | |
|---|---|
| Readings: |
|
| Assignments: |
|
| Week 15, Lesson 12: Homeland Security | |
|---|---|
| Readings: |
|
| Assignments: |
|
| Week 16, Exam 3 |
|---|
Formal instruction will end on the last day of class. Provided that you have an active Penn State Access Account user ID and password, you will continue to be able to access the course materials for one year, starting from the end date of the academic semester in which the course was offered (with the exception of library reserves and other external resources that may have a shorter archival period). After one year, you might be able to access the course based on the policies of the program or department offering the course material, up to a maximum of three years from the end date of the academic semester in which the course was offered. For more information, please review the University Course Archival Policy.
Grading
Each student's final letter grade will be based on the following guidelines:
Total Points Accumulated |
Course Grade |
951-1000 |
A |
900-950 |
A- |
867-899 |
B+ |
834-866 |
B |
800-833 |
B- |
767-799 |
C+ |
734-766 |
C |
700-733 |
C- |
600-699 |
D |
Below 600 |
F |
Please refer to the University Registrar's information about University grading policies.
Rubrics
| Exam 1 | 150 pts. |
| Exam 2 | 150 pts. |
| Exam 3 | 150 pts. |
| Discussion Forum Participation | 100 pts. |
| Security Management Article Review | 200 pts. |
| Security Survey | 250 pts. |
| Total Possible Points: 1,000 pts. | |
- Exams: There will be three non-cumulative examinations. Each exam will consist of objective (multiple choice) questions. Make-up exams will only be given in the case of a documented emergency. In all instances, make-up exams must be taken before the exam is returned to the class.
- Discussion Forum Participation: I expect you will post in a thoughtful and pertinent manner at least twice each week to the threaded discussions. Not only should you respond to the assigned readings, but you should also respond to the ideas put forth by your fellow classmates.
- Security Management Article Review:
1). Selection of appropriate article (10%);
2). Brief summary of article (20%);
3). Implications of the article for security field (30%);
4). Discussion of how material relates to course (30%); and
5). Your general thoughts on the article (10%)
- Security Survey:
1). Securing permission to conduct the security survey on an approved site (10%);
2). Nature and extent of crime where the business or institution is located (10%);
3). exterior vulnerabilities (20%);
4). interior vulnerabilities (20%);
5). procedural concerns (20%); and
6). recommended improvements for the facility (20%).
Academic Integrity
According to Penn State policy G-9: Academic Integrity (for undergraduate students in undergraduate courses) and policy GCAC-805 Academic Integrity (for graduate students and undergraduate students in graduate courses), an academic integrity violation is “an intentional, unintentional, or attempted violation of course or assessment policies to gain an academic advantage or to advantage or disadvantage another student academically.” Unless your instructor tells you otherwise, you must complete all course work entirely on your own, using only sources that have been permitted by your instructor, and you may not assist other students with papers, quizzes, exams, or other assessments. If your instructor allows you to use ideas, images, or word phrases created by another person (e.g., from Course Hero or Chegg) or by generative technology, such as ChatGPT, you must identify their source. You may not submit false or fabricated information, use the same academic work for credit in multiple courses, or share instructional content. Students with questions about academic integrity should ask their instructor before submitting work.
Students facing allegations of academic misconduct may not drop/withdraw from the affected course unless they are cleared of wrongdoing (see G-9: Academic Integrity or GCAC-805 Academic Integrity as appropriate). Attempted drops will be prevented or reversed, and students will be expected to complete course work and meet course deadlines. Students who are found responsible for academic integrity violations face academic outcomes, which can be severe, and put themselves at jeopardy for other outcomes which may include ineligibility for Dean’s List, pass/fail elections, and grade forgiveness. Students may also face consequences from their home/major program and/or The Schreyer Honors College.
How Academic Integrity Violations Are Handled
World Campus students are expected to act with civility and personal
integrity; respect other students' dignity, rights, and property; and help
create and maintain an environment in which all can succeed through the
fruits of their own efforts. An environment of academic integrity is
requisite to respect for oneself and others, as well as a civil community.
In cases where academic integrity is questioned, procedures allow a student to accept or contest/appeal the allegation. If a student chooses to contest/appeal the allegation, the case will then be managed by the respective school, college or campus Academic Integrity Committee. Review procedures may vary by college, campus, or school, but all follow the aforementioned policies.
All academic integrity violations are referred to the Office of Student Accountability and Conflict Response, which may assign an educational intervention and/or apply a Formal Warning, Conduct Probation, Suspension, or Expulsion.
Information about Penn State's academic integrity policy is included in the information that students receive upon enrolling in a course. To obtain that information in advance of enrolling in a course, please contact us by going to the Contacts & Help page.
University Policies
- Accommodating Disabilities
Penn State welcomes students with disabilities into the University’s educational programs. Every Penn State campus has an office for students with disabilities, including World Campus. The Disabilities and Accommodations section of the Chaiken Center for Student Success website provides World Campus students with information regarding how to request accommodations, documentation guidelines and eligibility, and appeals and complaints. For additional information, please visit the University's Student Disability Resources website.
In order to receive consideration for reasonable accommodations, you must contact the appropriate disability services office at the campus where you are officially enrolled, participate in an intake interview, and provide documentation. If the documentation supports your request for reasonable accommodations, your campus's disability services office will provide you with an accommodation letter. Please share this letter with your instructors and discuss the accommodations with them as early in your courses as possible. You must follow this process for every semester that you request accommodations.
Students with disabilities participating in internship, practicum, student teaching, or other experiential learning opportunities as part of their degree requirements may also be eligible for reasonable accommodations to ensure equal access and opportunity. These accommodations are determined through an interactive process involving the student, their University supervisor, and the site supervisor. Student Disability Resources can assist students with identifying potential barriers, facilitating accommodation requests, and coordinating with University supervisors to promote inclusive learning experiences.
- Additional Course Policies
For information about additional policies regarding Penn State Access Accounts; credit by examination; course tuition, fees, and refund schedules; and drops and withdrawals, please see the World Campus Student Center website.
Disclaimer: Please note that the specifics of this Course Syllabus are subject to change, and you will be responsible for abiding by any such changes. Your instructor will notify you of any changes.
