CRIMJ 304

Course Syllabus
Course Syllabus

The information contained on this page is designed to give students a representative example of material covered in the course. Any information related to course assignments, dates, or course materials is illustrative only. For a definitive list of materials, please check the online catalog 3-4 weeks before the course start date.

CRIMJ 304 Security Administration (3): Interdisciplinary analysis of security and loss prevention; its administration, role in crime control and prevention, and relationship to criminal justice.



Overview

This course will entail an interdisciplinary analysis of the philosophies and principles related to security and loss prevention within the private and public sectors. A historical analysis of the security function and how it has evolved into the various private and public security agencies and/or organizational sub-units will be presented. A comprehensive survey of traditional and contemporary operations and organizational structures used by industrial, commercial, retail, campus, governmental and private security agencies will also be presented. Other topics covered in the course include: security vs. law enforcement, basic security law, internal and external theft, protection and surveillance systems, insurance, occupational health and safety, workplace violence, computer security, executive protection, and security issues pertaining to terrorism.


Course Objectives

The course will introduce students to the wide purview of security administration. It aims to illustrate that security has been, and continues to be, a major societal concern. As such, over time, private citizens, corporate entities, and governmental institutions have taken actions to enhance either individual or collective security. Of particular emphasis will be the ways in which security is enhanced. For example, the use of crime prevention through environmental design (CPTED), target hardening, situational crime prevention, and the use of risk assessment will be examined through readings and class exercises.

Specific course objectives: After taking this course, students should be able to:

  • explain the origins of security administration;
  • differentiate and identify the challenges faced by the assorted areas of security administration;
  • articulate the similarities and differences between public and private security administration;
  • discuss and critique the diverse crime prevention approaches used in security administration;
  • analyze the unique legal aspects of the security administration; and
  • locate the vast array of employment opportunities in security administration.

Required Course Materials

Most World Campus courses require that students purchase materials (e.g., textbooks, specific software, etc.). To learn about how to order materials, please see the Course Materials page. You should check LionPATH approximately 3–4 weeks before the course begins for a list of required materials.

Additional materials:


Technical Requirements

Technical Requirements
Operating System Windows Vista, Windows 7, Windows 8*; Mac OS X 10.5 or higher
*Windows 8 support excludes the tablet only RT version
Processor 2 GHz or higher
Memory 1 GB of RAM
Hard Drive Space 20 GB free disk space
Browser We recommend the latest ANGEL-supported version of Firefox or Internet Explorer. To determine if your browser fits this criterion, and for advice on downloading a supported version, please refer to the following ITS knowledge base article: Supported Browsers and Recommended Computers.
Note: Cookies, Java, and JavaScript must be enabled. Pop-up blockers should be configured to permit new windows
from Penn State websites.

Due to nonstandard handling of CSS, JavaScript and caching,
older versions of Internet Explorer (such as IE 6 or earlier) do not work with our courses.
Plug-ins Adobe Reader [Download from Adobe]
Flash Player (v7.0 or later) [Download from Adobe]
Additional Software Microsoft Office (2007 or later)
Internet Connection Broadband (cable or DSL) connection required
Printer Access to graphics-capable printer
DVD-ROM Required
Sound Card, Microphone, and Speakers Required
Monitor Capable of at least 1024 x 768 resolution

If you need technical assistance at any point during the course, please contact the Service Desk.

For registration, advising, disability services, help with materials, exams, general problem solving, visit World Campus Student Services!


Course Schedule

Note: If you are planning to graduate this semester, please communicate your intent to graduate to your instructor. This will alert your instructor to the need to submit your final grade in time to meet the published graduation deadlines. For more information about graduation policies and deadlines, please refer to Graduation at the Chaiken Center for Student Success.

Week 1, Lesson 0: Getting Started/Lesson 1: The History and Development of Security Administration
Readings/Videos:
  • Chapter 1: Dempsey
  • PPT slides for Chapter 1
  • View the streaming video: Allan Pinkerton: the original private eye.
Assignments:
  • Finish Lesson 0: Getting Started to get yourself familiar with the course tools.
  • Thought-provoking discussion.

Week 2, Lesson 2: The Business of the Private Security Industry
Readings/Videos:
  • Chapter 2: Dempsey
  • PPT slides for Chapter 2.
  • High School Private Security Programs: The Wave of the Future? (Library electronic reserves).
  • Watch two video clips.
Assignments:
  • Thought-provoking discussion.

Week 3, Lesson 3: The Rudimentary Aspects of Private Security
Readings:
  • Chapter 3: Dempsey
  • PPT slides for Chapter 3.
  • What do murderers think about the effectiveness of CCTV? (2006) Journal of Security Education, 2(1): 11-17. (Library electronic reserves).
Assignments:
  • Watch the movie National Security (2003), and post to the discussion forum.
  • Start to plan on the Security Survey assignment that is due in Lesson 10. Make sure you have enough time to secure permission from the establishment to conduct the survey.

Week 4, Lesson 4: Private Security and the Law
Readings:
  • Chapter 4: Dempsey
  • Patrick & Gabbidon. (2004). What's True about False Arrests? Security Management. 48(10): 48-56 (Library electronic reserves);
  • Beasley. (2005). Truth in the Courtroom. Authors respond. Security Management. January: 8, 10 (Library electronic reserves);
  • Sennewald (2005). Shoplifters' rights. Security Management. March: 8, 10 (Library electronic reserves).
  • PPT slides for Chapter 4.
Assignments:
  • Security Management Article Review - Article Sign Up starts this week.
  • Read the Library e-reserves and post your reflection to the discussion forum.
  • Case Analysis Exercise.

Week 5, Exam 1

Week 6, Lesson 5: Premise Security
Readings:
  • Chapter 5: Dempsey
  • The X-rated X-ray: Reconciling fairness, privacy, and security. Criminal Justice Studies, 20(2): 149-159. (Library electronic reserves).
  • PPT slides for Chapter 5.
Assignments:
  • Read the Library e-reserve and post to the discussion forum.
  • Thought-provoking discussion.

Week 7, Lesson 6: Retail Security and Loss Prevention
Readings:
  • Chapter 6: Dempsey
  • Consumer racial profiling and perceived victimization: A phone survey of Philadelphia area residents. American Journal of Criminal Justice (Library electronic reserves).
  • Bowden v. Caldor: A case study of the intersection of racial animus and private security misconduct. Journal of Ethnicity in Criminal Justice, 4(4): 51-64 (Library electronic reserves).
  • PPT slides for Chapter 6.
Assignments:
  • Read the Library e-reserves and post your reflection to the discussion forum.
  • Watch streaming video Under Suspicion. Post your thoughts on the drop box.

Week 8, Lesson 7: Personal Security and Executive Protection
Readings:
  • Chapter 7: Dempsey
  • Combating terrorism on the corporate level: The emergence of executive protection specialists in private security. Journal of Contemporary Criminal Justice 4: 241-251. (Library electronic reserves).
  • PPT slides for Chapter 7.
Assignments:
  • Security Management article review exercise
  • Read the Library e-reserve and post your reflection to the drop box.

Week 10, Lesson 8: Employment-Related Security
Readings:
  • Chapter 8: Dempsey
  • PPT slides for Chapter 8.
  • Proposed policy: drug testing Hawaii’s public school teachers. The Clearing House 80(6): 283-285. (Library electronic reserves).
Assignments:
  • Read the Library e-reserves and post your reflection to the drop box.

Week 11, Exam 2

Week 12, Lesson 9: Information and Computer Security
Readings:
  • Chapter 9: Dempsey
  • PPT slides for Chapter 9.
Assignments:
  • Watch one of the three movies: The Net (1995); Hackers (1995); or Untraceable (2008). Post your thoughts on the discussion forum.

Week 13, Lesson 10: Investigative Security
Readings:
  • Chapter 10 and 11: Dempsey
  • PPT slides for Chapter 10 and 11.
Assignments:
  • Security Survey

Week 14, Lesson 11: Private and Public Partnerships for Security
Readings:
  • Chapter 12: Dempsey
  • PPT slides for Chapter 12.
Assignments:
  • Read the Library e-reserves and post your reflection to the discussion forum.
  • Watch the Hollywood movie Domino and post to discussion forum.

Week 15, Lesson 12: Homeland Security
Readings:
  • Chapter 13: Dempsey
  • PPT slides for Chapter 13.
Assignments:
  • Read the Library e-reserves and post your reflection to the discussion forum.

Week 16, Exam 3


Formal instruction will end on the last day of class. Provided that you have an active Penn State Access Account user ID and password, you will continue to be able to access the course materials for one year, starting from the end date of the academic semester in which the course was offered (with the exception of library reserves and other external resources that may have a shorter archival period). After one year, you might be able to access the course based on the policies of the program or department offering the course material, up to a maximum of three years from the end date of the academic semester in which the course was offered. For more information, please review the University Course Archival Policy.


Grading

Each student's final letter grade will be based on the following guidelines:

Total Points Accumulated 
Course Grade
951-1000 
A
900-950 
A-
867-899
B+
834-866
B
800-833 
B-
767-799
C+
734-766 
C
700-733
C-
600-699
D
Below 600  
F

Please refer to the University Registrar's information about University grading policies.


Rubrics

Exam 1 150 pts.
Exam 2 150 pts.
Exam 3 150 pts.
Discussion Forum Participation 100 pts.
Security Management Article Review 200 pts.
Security Survey 250 pts.
Total Possible Points: 1,000 pts.
  1. Exams: There will be three non-cumulative examinations. Each exam will consist of objective (multiple choice) questions. Make-up exams will only be given in the case of a documented emergency. In all instances, make-up exams must be taken before the exam is returned to the class.
  1. Discussion Forum Participation: I expect you will post in a thoughtful and pertinent manner at least twice each week to the threaded discussions. Not only should you respond to the assigned readings, but you should also respond to the ideas put forth by your fellow classmates.
  1. Security Management Article Review:

1). Selection of appropriate article (10%);
2). Brief summary of article (20%);
3). Implications of the article for security field (30%);
4). Discussion of how material relates to course (30%); and
5). Your general thoughts on the article (10%)

  1. Security Survey:

1). Securing permission to conduct the security survey on an approved site (10%);
2). Nature and extent of crime where the business or institution is located (10%);
3). exterior vulnerabilities (20%);
4). interior vulnerabilities (20%);
5). procedural concerns (20%); and
6). recommended improvements for the facility (20%).


Academic Integrity

According to Penn State policy G-9: Academic Integrity (for undergraduate students in undergraduate courses) and policy GCAC-805 Academic Integrity (for graduate students and undergraduate students in graduate courses), an academic integrity violation is “an intentional, unintentional, or attempted violation of course or assessment policies to gain an academic advantage or to advantage or disadvantage another student academically.” Unless your instructor tells you otherwise, you must complete all course work entirely on your own, using only sources that have been permitted by your instructor, and you may not assist other students with papers, quizzes, exams, or other assessments. If your instructor allows you to use ideas, images, or word phrases created by another person (e.g., from Course Hero or Chegg) or by generative technology, such as ChatGPT, you must identify their source. You may not submit false or fabricated information, use the same academic work for credit in multiple courses, or share instructional content. Students with questions about academic integrity should ask their instructor before submitting work.

Students facing allegations of academic misconduct may not drop/withdraw from the affected course unless they are cleared of wrongdoing (see G-9: Academic Integrity or GCAC-805 Academic Integrity as appropriate). Attempted drops will be prevented or reversed, and students will be expected to complete course work and meet course deadlines. Students who are found responsible for academic integrity violations face academic outcomes, which can be severe, and put themselves at jeopardy for other outcomes which may include ineligibility for Dean’s List, pass/fail elections, and grade forgiveness. Students may also face consequences from their home/major program and/or The Schreyer Honors College.

How Academic Integrity Violations Are Handled
World Campus students are expected to act with civility and personal integrity; respect other students' dignity, rights, and property; and help create and maintain an environment in which all can succeed through the fruits of their own efforts. An environment of academic integrity is requisite to respect for oneself and others, as well as a civil community.

In cases where academic integrity is questioned, procedures allow a student to accept or contest/appeal the allegation. If a student chooses to contest/appeal the allegation, the case will then be managed by the respective school, college or campus Academic Integrity Committee. Review procedures may vary by college, campus, or school, but all follow the aforementioned policies.

All academic integrity violations are referred to the Office of Student Accountability and Conflict Response, which may assign an educational intervention and/or apply a Formal Warning, Conduct Probation, Suspension, or Expulsion.

Information about Penn State's academic integrity policy is included in the information that students receive upon enrolling in a course. To obtain that information in advance of enrolling in a course, please contact us by going to the Contacts & Help page.


University Policies


Disclaimer: Please note that the specifics of this Course Syllabus are subject to change, and you will be responsible for abiding by any such changes. Your instructor will notify you of any changes.


© 2008 The Pennsylvania State University