Main Content

Syllabus

CRIMJ 304 Security Administration 

(3 credits): Interdisciplinary analysis of security and loss prevention; its administration, role in crime control and prevention, and relationship to criminal justice.
The information contained on this page is designed to give students a representative example of material covered in the course. Any information related to course assignments, dates, or course materials is illustrative only. For a definitive list of materials, please check the online catalog 3-4 weeks before the course start date.

Overview

This course will entail an interdisciplinary analysis of the philosophies and principles related to security and loss prevention within the private and public sectors. A historical analysis of the security function and how it has evolved into the various private and public security agencies and/or organizational sub-units will be presented. A comprehensive survey of traditional and contemporary operations and organizational structures used by industrial, commercial, retail, campus, governmental and private security agencies will also be presented. Other topics covered in the course include: security vs. law enforcement, basic security law, internal and external theft, protection and surveillance systems, insurance, occupational health and safety, workplace violence, computer security, executive protection, and security issues pertaining to terrorism.


Objectives

The course will introduce students to the wide purview of security administration. It aims to illustrate that security has been, and continues to be, a major societal concern. As such, over time, private citizens, corporate entities, and governmental institutions have taken actions to enhance either individual or collective security. Of particular emphasis will be the ways in which security is enhanced. For example, the use of crime prevention through environmental design (CPTED), target hardening, situational crime prevention, and the use of risk assessment will be examined through readings and class exercises.

After completion of this course, students should be able to:

  • explain the origins of security administration;
  • differentiate and identify the challenges faced by the assorted areas of security administration;
  • articulate the similarities and differences between public and private security administration;
  • discuss and critique the diverse crime prevention approaches used in security administration;
  • analyze the unique legal aspects of the security administration; and
  • locate the vast array of employment opportunities in security administration.

Materials

Most World Campus courses require that students purchase materials (e.g., textbooks, specific software, etc.). To learn about how to order materials, please see the Course Materials page. You should check LionPATH approximately 3–4 weeks before the course begins for a list of required materials.

E-Reserves

You may access readings via 'Library Resources' in the Canvas Course Navigation

  • This course also requires that you access peer reviewed journal articles accessible through PSU Library E-Reserves.


Library Resources

Many of the University Libraries resources can be utilized from a distance. Through the Libraries website, you can

  • access magazine, journal, and newspaper articles online using library databases;
  • borrow materials and have them delivered to your doorstep—or even your desktop;
  • get research help via email, chat, or phone using the Ask a Librarian service; and
  • much more.

You can view the Online Students' Library Guide for more information.

You must have an active Penn State Access Account to take full advantage of the Libraries' resources and services. Once you have a Penn State account, you will automatically be registered with the library within 24–48 hours. If you would like to determine whether your registration has been completed, visit the Libraries home page and select  My Account.

 

Technical Specifications

Technical Requirements
Operating System

Canvas, Penn State's Learning Management System (LMS), supports most recent versions of Microsoft Windows and Apple Mac operating systems. 

To determine if your operating system is supported, please review Canvas' computer specifications.

Browser

Canvas supports the last two versions of every major browser release. It is highly recommended that you update to the newest version of whatever browser you are using.

Please note that Canvas does not support the use of Internet Explorer. Students and instructors should choose a different browser to use.   

To determine if your browser is supported, please review the list of Canvas Supported Browsers.


Note: Cookies must be enabled, and pop-up blockers should be configured to permit new windows from Penn State websites.
Additional Canvas Requirements For a list of software, hardware, and computer settings specifically required by the Canvas LMS, please review Canvas' computer specifications.
Additional Software

All Penn State students have access to Microsoft Office 365, including Microsoft Office applications such as Word, Excel, and PowerPoint.

Students will need a PDF reader, such as Adobe Reader.

Hardware

Monitor: Monitor capable of at least 1024 x 768 resolution
Audio: Microphone, Speakers
Camera (optional, recommended): Standard webcam - many courses may require a webcam for assignments or exam proctoring software.

Mobile Device (optional) The Canvas mobile app is available for versions of iOS and Android. To determine if your device is capable of using the Canvas Mobile App, please review the Canvas Mobile App Requirements.


Student Education Experience Questionnaire (SEEQ)

During the semester you will receive information for completing the Student Education Experience Questionnaire (SEEQ). Your participation is an opportunity to provide anonymous feedback on your learning experience. Your feedback is important because it allows us to understand your experience in this course and make changes to improve the learning experiences of future students. Please monitor email and course communications for links and availability dates.


If you need technical assistance at any point during the course, please contact the Service Desk.

For registration, advising, disability services, help with materials, exams, general problem solving, visit World Campus Student Services!


Course Requirements and Grading

Each student’s final letter grade will be based on the following guidelines:

 

Letter Grade

Percentage

A

94-100

A-

90-93.9

B+

87-89.9

B

84-86.9

B-

80-83.9

C+

76-79.9

C

70-75.9

D

60-69.9

F

0-59.9

 

The World Campus follows the same grading system as the Penn State resident program. The grades of A, B, C, D, and F indicate the following qualities of academic performance:

A = (Excellent) Indicates exceptional achievement
B = (Good) Indicates extensive achievement
C = (Satisfactory) Indicates acceptable achievement
D = (Poor) Indicates only minimal achievement
F = (Failure) Indicates inadequate achievement necessitating a repetition of the course in order to secure credit

Rubrics

Exam 1 150 pts.
Exam 2 150 pts.
Exam 3 150 pts.
Discussion Forum Participation 100 pts.
Security Management Article Review 200 pts.
Security Survey 250 pts.
Total Possible Points: 1,000 pts.

 

  1. Exams: There will be three non-cumulative examinations. Each exam will consist of objective (multiple choice) questions. Make-up exams will only be given in the case of a documented emergency. In all instances, make-up exams must be taken before the exam is returned to the class.
  1. Discussion Forum Participation: I expect you will post in a thoughtful and pertinent manner at least twice each week to the threaded discussions. Not only should you respond to the assigned readings, but you should also respond to the ideas put forth by your fellow classmates.

NOTE: Please be aware that there is a two-week window to post comments. Late comments will not recieve participation points.

  1. Security Management Article Review:

1). Selection of appropriate article (10%);
2). Brief summary of article (20%);
3). Implications of the article for security field (30%);
4). Discussion of how material relates to course (30%); and
5). Your general thoughts on the article (10%)

  1. Security Survey:

1). Securing permission to conduct the security survey on an approved site (10%);
2). Nature and extent of crime where the business or institution is located (10%);
3). exterior vulnerabilities (20%);
4). interior vulnerabilities (20%);
5). procedural concerns (20%); and
6). recommended improvements for the facility (20%).

Please refer to the University Grading Policy for Undergraduate Courses for additional information about University grading policies.

If, for reasons beyond the student's control, a student is prevented from completing a course within the prescribed time, the grade in that course may be deferred with the concurrence of the instructor. The symbol DF appears on the student's transcript until the course has been completed. Non-emergency permission for filing a deferred grade must be requested by the student before the beginning of the final examination period. In an emergency situation, an instructor can approve a deferred grade after the final exam period has started. Under emergency conditions during which the instructor is unavailable, authorization is required from one of the following: the dean of the college in which the candidate is enrolled; the executive director of the Division of Undergraduate Studies if the student is enrolled in that division or is a provisional student; or the campus chancellor of the student's associated Penn State campus.

For additional information please refer to the Deferring a Grade page.


Course Schedule

Note: All due dates reflect North American eastern time (ET).

Course Schedule
Lesson 00: Getting Started & Lesson 1: The History and Development of Security Administration
Readings/Videos:
  • Chapter 1: Dempsey
  • PPT slides for Chapter 1.
Assignments:
  • Finish Lesson 00: Getting Started to get yourself familiar with the course tools.
  • Thought-provoking discussion.
Lesson 2: The Business of the Private Security Industry
Readings/Videos:
  • Chapter 2: Dempsey
  • PPT slides for Chapter 2.
  • High School Private Security Programs: The Wave of the Future? (Library electronic reserves).
  • Watch two video clips.
Assignments:
  • Thought-provoking discussion.
Lesson 3: The Rudimentary Aspects of Private Security
Readings/Videos:
  • Chapter 3: Dempsey
  • PPT slides for Chapter 3.
Assignments:
  • Watch the movie Paul Blart Mall Cop, and post to the discussion forum.
  • Start to plan on the Security Survey assignment that is due in Lesson 10. Make sure you have enough time to secure permission from the establishment to conduct the survey.  You will need to submit your site location for approval during Lesson 5.
Lesson 4: Private Security and the Law
Readings/Videos:
  • Chapter 4: Dempsey
  • Patrick & Gabbidon. (2004). What's True about False Arrests? Security Management. 48(10): 48-56 (Library electronic reserves);
  • Beasley. (2005). Truth in the Courtroom. Authors respond. Security Management. January: 8, 10 (Library electronic reserves);
  • Sennewald (2005). Shoplifters' rights. Security Management. March: 8, 10 (Library electronic reserves).
  • PPT slides for Chapter 4.
Assignments:
  • Security Management Article Review - Article Sign Up starts this week.
  • Read the Library e-reserves and post your reflection to the discussion forum.
  • Case Analysis Exercises, 1-4
Exam 1.
Assignments:
  • Take Exam 1
Lesson 5: Premise Security
Readings/Videos:
  • Chapter 5: Dempsey
  • The X-rated X-ray: Reconciling fairness, privacy, and security. Criminal Justice Studies, 20(2): 149-159. (Library electronic reserves).
  • PPT slides for Chapter 5.
Assignments:
  • Read the Library e-reserve and post to the discussion forum.
  • Submit your Security Survey Site location for approval in the discussion forum.
  • Thought-provoking discussion.
Lesson 6: Retail Security and Loss Prevention
Readings/Videos:
Assignments:
  • Watch streaming video Under Suspicion. Post your thoughts to the discussion forum.
Lesson 7: Personal Security and Executive Protection
Readings/Videos:
Assignments:
  • Security Management article review exercise.
  • Read the Library e-reserve and post your reflection to the discussion forum. 
Lesson 8: Employment-Related Security
Readings/Videos:
  • Chapter 9: Dempsey
  • PPT slides for Chapter 9.
  • Proposed policy: drug testing Hawaii’s public school teachers. The Clearing House 80(6): 283-285. (Library electronic reserves).
Assignments:
  • Read the Library e-reserves and post your reflection to the discussion forum.
Exam 2
Assignments:
  • Take Exam 2
Lesson 9: Information and Computer Security
Readings/Videos:
  • Chapter 10: Dempsey
  • PPT slides for Chapter 10.
Assignments:
  • Watch the movie The Net (1995). Post your thoughts on the discussion forum.
Lesson 10: Investigative Security
Readings/Videos:
  • Chapter 11 and 12: Dempsey
  • PPT slides for Chapter 11 and 12.
Assignments:
  • Security Survey.
Lesson 11: Private and Public Partnerships for Security
Readings/Videos:
Assignments:
  • Read the Library e-reserves and post your reflection to the discussion forum.
  • Watch the Hollywood movie Domino and post to discussion forum.
  • Reminder: The End-of-Course Survey will be available two weeks before the official end date of the course and will close two days after the course end date
Lesson 12: Homeland Security
Readings/Videos:
Assignments:
  • Read the Library e-reserves and post your reflection to the discussion forum.
Exam 3
Assignments:
  • Take Exam 3


Academic Integrity

According to Penn State policy G-9: Academic Integrity , an academic integrity violation is “an intentional, unintentional, or attempted violation of course or assessment policies to gain an academic advantage or to advantage or disadvantage another student academically.” Unless your instructor tells you otherwise, you must complete all course work entirely on your own, using only sources that have been permitted by your instructor, and you may not assist other students with papers, quizzes, exams, or other assessments. If your instructor allows you to use ideas, images, or word phrases created by another person (e.g., from Course Hero or Chegg) or by generative technology, such as ChatGPT, you must identify their source. You may not submit false or fabricated information, use the same academic work for credit in multiple courses, or share instructional content. Students with questions about academic integrity should ask their instructor before submitting work.

Students facing allegations of academic misconduct may not drop/withdraw from the affected course unless they are cleared of wrongdoing (see G-9: Academic Integrity ). Attempted drops will be prevented or reversed, and students will be expected to complete course work and meet course deadlines. Students who are found responsible for academic integrity violations face academic outcomes, which can be severe, and put themselves at jeopardy for other outcomes which may include ineligibility for Dean’s List, pass/fail elections, and grade forgiveness. Students may also face consequences from their home/major program and/or The Schreyer Honors College.

How Academic Integrity Violations Are Handled
World Campus students are expected to act with civility and personal integrity; respect other students' dignity, rights, and property; and help create and maintain an environment in which all can succeed through the fruits of their own efforts. An environment of academic integrity is requisite to respect for oneself and others, as well as a civil community.

In cases where academic integrity is questioned, the Policy on Academic Integrity indicates that procedure requires an instructor to inform the student of the allegation. Procedures allow a student to accept or contest a charge. If a student chooses to contest a charge, the case will then be managed by the respective college or campus Academic Integrity Committee. If that committee recommends an administrative sanction (Formal Warning, Conduct Probation, Suspension, Expulsion), the claim will be referred to the Office of Student Accountability and Conflict Response.

All Penn State colleges abide by this Penn State policy, but review procedures may vary by college when academic dishonesty is suspected. Information about Penn State's academic integrity policy and college review procedures is included in the information that students receive upon enrolling in a course. To obtain that information in advance of enrolling in a course, please contact us by going to the Contacts & Help page .


Accommodating Disabilities

Penn State welcomes students with disabilities into the University's educational programs. Every Penn State campus has resources for students with disabilities. The Student Disability Resources (SDR) website provides contacts for disability services at every Penn State campus. For further information, please visit the SDR website.

In order to apply for reasonable accommodations, you must contact the appropriate disability resources office at the campus where you are officially enrolled, participate in an intake interview, and provide documentation based on the documentation guidelines. If the documentation supports your request for reasonable accommodations, your campus's disability resources office will provide you with an accommodation letter. Please share this letter with your instructors and discuss the accommodations with them as early in your courses as possible. You must follow this process for every semester that you request accommodations.


Additional Policies

For information about additional policies regarding Penn State Access Accounts; credit by examination; course tuition, fees, and refund schedules; and drops and withdrawals, please see the World Campus Student Center website.

If you have a crisis or safety concern, mental health services are available to you as a Penn State student. Crisis and emergency contacts are available, no matter where you are located:

Veterans and currently serving military personnel and/or dependents with unique circumstances (e.g., upcoming deployments, drill/duty requirements, VA appointments, etc.) are welcome and encouraged to communicate these, in advance if possible, to the instructor in the case that special arrangements need to be made.

In order to protect your privacy, course access is limited to those individuals who have direct responsibility for the quality of your educational experience. In addition to the instructor, a teaching assistant or college administrator may be provided access in order to ensure optimal faculty availability and access. World Campus technical staff may also be given access in order to resolve technical support issues.
  1. Students are responsible for online course content, taking notes, obtaining other materials provided by the instructor, taking tests (if applicable), and completing assignments as scheduled by the instructor.  As a general rule, students should plan on logging into the course at least three times per week and spending at least three hours per course credit per week on the course, e.g., if the course is three credits, the student should plan on spending at least 9-12 hours per week on the course, just as they would in a residence course.
  2. Students are responsible for keeping track of changes in the course syllabus made by the instructor throughout the semester.
  3. Students are responsible for monitoring their grades.
  4. Students must contact their instructor (and teammates when working on any collaborative learning assignments) as soon as possible if they anticipate missing long periods of online time due to events such as chronic illnesses, death in the family, business travel, or other appropriate events. The instructor will determine the minimal log on time and participation required in order to meet course responsibilities. In the event of other unforeseen conflicts, the instructor and student will arrive at a solution together.
    1. Requests for taking exams or submitting assignments after the due dates require documentation of events such as illness, family emergency, or a business-sanctioned activity.
    2. Conflicts with dates on which examinations or assignments are scheduled must be discussed with the instructor or TA prior to the date of the examination or assignment.
  5. Students are responsible for following appropriate netiquette (network etiquette) when communicating with their instructor and classmates. For reference, see the Academic Success Kit.
  6. Behaviors that disrupt other students’ learning are not acceptable and will be addressed by the instructor.
  7. For severe and chronic problems with student disruptive behavior, the following will be applied for resolution:
    1. Senate Committee on Student Life policy on managing classroom disruptions: Office of Student Accountability and Conflict Response.
    2. Penn State Principles

Penn State takes great pride to foster a diverse and inclusive environment for students, faculty, and staff. Acts of intolerance, discrimination, or harassment due to age, ancestry, color, disability, gender, gender identity, national origin, race, religious belief, sexual orientation, or veteran status are not tolerated and can be reported through Educational Equity via the Report Bias webpage.


Disclaimer: Please note that the specifics of this Course Syllabus are subject to change, and you will be responsible for abiding by any such changes. Your instructor will notify you of any changes.



Top of page