Main Content

Syllabus

The information contained on this page is designed to give students a representative example of material covered in the course. Any information related to course assignments, dates, or course materials is illustrative only. For a definitive list of materials, please check the online catalog 3-4 weeks before the course start date.

Homeland Security (HLS) 802 - Multifaceted Approaches to Homeland Security and Defense

Examination of the roles of the public and private sectors and the military in preparing, mitigating, and responding to disasters. Prerequisite: HLS 811 (previously HLS 401)



Overview

This course focuses on the examination of the roles of the public and private sectors and the military in preparing, mitigating, and responding to disasters. It will motivate students to understand how to protect against and respond to the threats of the 21st century.

Preparedness and responsiveness have long been part of the law enforcement and military lexicon; however 9/11 expanded the terms' application and the number of people who held responsibility for their implementation. The result is a growing interest surrounding the nature of the terrorist threat and how intelligence fusion is essential to prevention; the role of the military in civil society; cooperation among federal, state, and local agencies as well as the private sector in response to a catastrophic event; the importance of planning and exercises to improve the mitigation of such events. This course, Multifaceted Approaches to Homeland Security, introduces relevant perspectives and concepts related to these topics and develops a framework that demonstrates their interconnectivity. In addition to providing a conceptual understanding of key ideas, it familiarizes the students with the roles played by various entities (e.g., law enforcement, intelligence organizations, the military, and federal, state, and local agencies) and the and de facto framework in which they exercise their responsibilities. The course introduces students to intelligence and the importance of intelligence fusion as a counter-terrorism force as well as the need for collaboration among all relevant actors and the integration of actions and planning. Finally, it provides an opportunity for students to apply knowledge and methodologies to real-world cases, practically assessing key components in mitigating the impact of future events.


Course Objectives

This is a graduate course designed to encourage the student to:

  • Recognize the inter-connectivity of the issues being addressed and reflect on the pertinent successes, problems, and challenges related to formulating policy around homeland security and defense
  • Explain what the current threat environment is, with a focus on terrorist threats
  • Define the roles and responsibilities of various organizations in dealing with the man-made and natural disasters
  • Explain the role of intelligence in homeland security
  • Discuss the successes and challenges of inter-agency and public-private cooperation
  • Apply the knowledge and methodologies learned to real-world cases and practical challenges in homeland security, with a focus on fostering a resilient nation

Required Course Materials

Most World Campus courses require that students purchase materials (e.g., textbooks, specific software, etc.). To learn about how to order materials, please see the Course Materials page. You should check LionPATH approximately 3–4 weeks before the course begins for a list of required materials.


Library Resources

Many of the University Libraries resources can be utilized from a distance. Through the Libraries website, you can

  • access magazine, journal, and newspaper articles online using library databases;
  • borrow materials and have them delivered to your doorstep—or even your desktop;
  • get research help via email, chat, or phone using the Ask a Librarian service; and
  • much more.

You can view the Online Students' Library Guide for more information.

You must have an active Penn State Access Account to take full advantage of the Libraries' resources and services. Once you have a Penn State account, you will automatically be registered with the library within 24–48 hours. If you would like to determine whether your registration has been completed, visit the Libraries home page and select  My Account.


Technical Specifications

Technical Requirements
Operating System

Canvas, Penn State's Learning Management System (LMS), supports most recent versions of Microsoft Windows and Apple Mac operating systems. 

To determine if your operating system is supported, please review Canvas' computer specifications.

Browser

Canvas supports the last two versions of every major browser release. It is highly recommended that you update to the newest version of whatever browser you are using.

Please note that Canvas does not support the use of Internet Explorer. Students and instructors should choose a different browser to use.   

To determine if your browser is supported, please review the list of Canvas Supported Browsers.


Note: Cookies must be enabled, and pop-up blockers should be configured to permit new windows from Penn State websites.
Additional Canvas Requirements For a list of software, hardware, and computer settings specifically required by the Canvas LMS, please review Canvas' computer specifications.
Additional Software

All Penn State students have access to Microsoft Office 365, including Microsoft Office applications such as Word, Excel, and PowerPoint.

Students will need a PDF reader, such as Adobe Reader.

Hardware

Monitor: Monitor capable of at least 1024 x 768 resolution
Audio: Microphone, Speakers
Camera (optional, recommended): Standard webcam - many courses may require a webcam for assignments or exam proctoring software.

Mobile Device (optional) The Canvas mobile app is available for versions of iOS and Android. To determine if your device is capable of using the Canvas Mobile App, please review the Canvas Mobile App Requirements.


Student Education Experience Questionnaire (SEEQ)

During the semester you will receive information for completing the Student Education Experience Questionnaire (SEEQ). Your participation is an opportunity to provide anonymous feedback on your learning experience. Your feedback is important because it allows us to understand your experience in this course and make changes to improve the learning experiences of future students. Please monitor email and course communications for links and availability dates.


If you need technical assistance at any point during the course, please contact the Service Desk.

For registration, advising, disability services, help with materials, exams, general problem solving, visit World Campus Student Services!


Course Schedule

Note: All due dates reflect North American eastern time (ET).

Course Schedule

HLS 802: Collaboration and Integration: Multifaceted Approaches to Homeland Security

  1. Course Starts:
  2. Course Ends:
  3. Course Length: 15 weeks

Note: All due dates reflect North American Eastern time (ET).

The Getting Started Lesson and Lesson 1 are both due at the end of Week 1.
Getting Started Lesson & Lesson 1: Cross-Disciplinary Perspectives on an Evolving Homeland Security Mission Space
Time frame:Week 1:
Readings:
  1. Cross-disciplinary Perspectives on Homeland and Civil Security, Introduction: "Homeland and Civil Security Research Studies for an Evolving Mission Space: Introduction and Overview of Chapters"
  2. Cross-disciplinary Perspectives on Homeland and Civil Security, Glossary
  3. Department of Homeland Security Missions Website
  4. National Preparedness Goal Mission Areas Website
  5. The 2014 Quadrennial Homeland Security Review (Read Executive Summary)
  6. Kahan, Jerome 2013, "What's in a Name? The Meaning of Homeland Security," Journal of Homeland Security Education 2.
  7. Kiltz, Linda and James D. Ramsay 2012, "Perceptual Framing of Homeland Security.”Homeland Security Affairs 8 Article 16.
  8. Reese, Shawn 2013, Defining Homeland Security: Analysis and Congressional Considerations. Congressional Research Service (CRS) Report R42462, January 8.
  9. Title 22 of the USC (United States Code), definitions of “international terrorism,” “terrorism,” and “terrorist group.”
Assignments:
  • Participate in the Lesson Discussion Forum.
Lesson 2: Key Risk Constellations and Assessing the Strategic Hybrid Threat
Time frame:Week 2:
Readings:
  1. Cross-disciplinary Perspectives on Homeland and Civil Security, Chapter 1: "Examining the Strategic Hybrid Threat: Technology, Terrorism, Transnational Criminal Organizations, and Old Enemies after 2015"
  2. Cross-disciplinary Perspectives on Homeland and Civil Security, Chapter 9: "The Leadership LEAP: A New Approach for Homeland Security"
  3. Cross-disciplinary Perspectives on Homeland and Civil Security, Chapter 13: "The Scientific Status of New Security Studies: A Critical Search for Epistemic Identity of Homeland and Civil Security Research"
  4. Cilluffo, Frank J and Joseph R. Clark 2013, "Thinking About Strategic Hybrid Threats - In Theory and in Practice." PRISM 4, No. 1, pp. 47-63.
  5. Worldwide Threat Assessment of the U.S. Intelligence Community, Statement For The Record, Senate Select Committee on Intelligence, Daniel R. Coats, Director of National Intelligence, February 13, 2018
  6. World Economic Forum: Global Risks 2018. 13th Ed. 
Assignments:
  • Participate in the Lesson Discussion Forum.
Lesson 3: Securing Against the Evolving Terrorist Threat
Time frame:Week 3:
Readings:
  1. Presidential Policy Directive (PPD) 8: National Preparedness (2011)
  2. National Strategy for Counterterrorism (2011)
  3. Strategy for Homeland Defense and Defense Support of Civil Authorities (2013)
  4. The 2014 Quadrennial Homeland Security Review, focus on "Securing Against the Evolving Terrorism Threat" (pp. 33-38) and "Nuclear Terrorism Using an Improvised Nuclear Device" (pp. 62-64)
  5. National Security Strategy (2017)
  6. A Governor’s Guide to Homeland Security, 2010, Chapter 5: "Citizen Preparedness"
  7. Department of Homeland Security, Science and Technology Directorate 2014, Using Social Media for Enhanced Situational Awareness and Decision Support. Virtual Social Media Working Group and DHS First Responders Group.
  8. Helmus, Todd C., Erin York, and Peter Chalk 2013, Promoting Online Voices for Countering Violent Extremism. Research Report, RAND Corporation. 
Assignments:
  • Begin research on Case Study I.
 Case Study I: The Continued Relevance of the Mumbai Attacks
Time frame:Week 4:
Readings:
  • Read the online Case Study I: Mumbai content pages
  • Read "The Lessons of Mumbai" located in the Case Study #1 Folder under the Activities Tab.
Assignments:
  • The assignment instructions are located in the Dropbox - Submit your paper to the Mumbai Case Dropbox.
Lesson 4: Protecting Critical Infrastructure - What is it?
Time frame:Week 5:
Readings, :
  1. Cross-disciplinary Perspectives on Homeland and Civil Security, Chapter 4: "Beyond the Storms: Implementing Smart Resilience in Turbulent Times"
  2. A Governor's Guide to Homeland Security, 2010, Chapter 7: "Critical Infrastructure Protection" 
  3. A Governor's Guide to Homeland Security, 2010, Chapter 8: "Cybersecurity"
  4. Implementing 9-11 Commission Recommendations: Progress Report 2011,  DHS (Available in Library Reserves.)
  5. Presidential Policy Directive (PDD) 21: Critical Infrastructure and Resilience (2013)
  6. Congressional Research Service Report - Critical Infrastructures: Background, Policy, and Implementation (2015)
  7. 2013 National Infrastructure Protection Plan (NIPP): Partnering for Critical Infrastructure Security and Resilience
  8. National Strategy for Global Supply Chain Security (2012) 
Assignments:
  • Participate in the Lesson Discussion Forum.
Lesson 5: Civil-Military Relations: International and Domestic
Time frame:Week 6:
Readings:
  1. Desch, Michael C., Civilian Control of the Military: The Changing Security Environment, John Hopkins Press, Baltimore, MD, 1999. Chapters 1 & 2 
  2. Joint Chiefs of Staff Joint Publication 3-28: Defense Support of Civil Authorities, July 31, 2013
  3. A Governor's Guide to Homeland Security, 2010, Chapter 9: "National Guard and Military Assistance"
  4. Samaan, Jean-Loup and Laurent Verneuil (n.d.), Civil-Military Relations in Hurricane Katrina: A Case Study in Crisis Management in Natural Disaster Response.
  5. FEMA course: The Political and Policy Basis of Emergency Management, Session 12: Civil Military Relations in Emergency Management
  6. TITLE 10 > Subtitle E > PART I I> CHAPTER 1211 > § 12406. National Guard in Federal service
  7. Disaster Assistance: DoD’s support for Hurricanes Andrew and Iniki and Typhoon Omar, US
  8. Review the Preamble & Article II of the U.S. Constitution
  9. Posse Comitatus Act
  10. Insurrection Act
  11. Department of Defense Directive No. 3025.18 (2010): Defense Support of Civil Authorities
Assignments:
  • Participate in the Lesson Discussion Forum.
Lesson 6: Public Health Emergency Preparedness and Agricultural Biosecurity & Case Study II: Operation Jump Start
Time frame:Week 7:
Readings:
  1. A Governor’s Guide to Homeland Security, 2010, Chapter 4: "Public Health Preparedness"
  2. National Response Framework (2019)
  3. National Biodefense Strategy (2018)
  4. CDC’s Office of Public Health Preparedness and Response Website
  5. Congressional Research Service Report - Federal and State Quarantine and Isolation Authority (2014)
  6. Department of Health and Human Services - National Health Security Strategy and Implementation Plan 2015-2018 (Read Introduction and Strategic Objectives
Assignments:
  • Read the documents located in the Case Study #2 Module.
Case Study II : Operation Jump Start
Time frame:Week 8:
Readings:
  1. A Governor's Guide to Homeland Security, 2010, Chapter 9: "National Guard and Military Assistance"
  2. Congressional Research Service Report - Securing America’s Borders: The Role of the Military (2013)
  3. Department of Defense Directive 3025.18 – Defense Support of Civil Authorities (2012)
Assignments:
  • Read the documents located in the Case Study #2 Module.
  • The assignment instructions are located in the Dropbox - Submit your paper to the Operation Jump Start Case Dropbox.
Lesson 7: Introduction to Intelligence
Time frame:Week 9:
Readings:
  1. Cross-disciplinary Perspectives on Homeland and Civil Security, Chapter 5: "The Role of Intelligence in Homeland Security"
  2. Office of the Director of National Intelligence - U.S. National Intelligence: An Overview (2013) (Read Intelligence Overview Section – remainder of the document is an excellent reference for all things Intelligence
  3. Read the Summary of the Intelligence Reform and Terrorism Prevention Act of 2004. The entire act may be found at Intelligence Reform and Terrorism Prevention Act of 2004
  4. Erik Dahl: "Domestic Intelligence Today: More Security but Less Liberty?" Homeland Security Affairs 7, 10 Years After: The 9/11 Essays (September 2011).
  5. National Strategy for Information Sharing and Safeguarding (2012)
Assignments:
  • Participate in the Lesson Discussion Forum.
Lesson 8: The U.S. Intelligence Community
Time frame:Week 10:
Readings:
  1. Cross-disciplinary Perspectives on Homeland and Civil Security, Chapter 6: "Geospatial Intelligence and the Geospatial Revolution"
  2. Congressional Research Service Report - The Department of Homeland Security Intelligence Enterprise: Operational Overview and Oversight Challenges for Congress (2010)
  3. Congressional Research Service Report - Intelligence Community Programs, Management, and Enduring Issues (2016)
  4. National Intelligence Strategy of the United States of America (2019)
Assignments:
  • Participate in the Lesson Discussion Forum.
Lesson 9: Intelligence in Counter-Terrorism and Homeland Security & Case Study III: Intelligence Brief
Time frame:Week 11:
Readings:
  1. Lowenthal, Mark. (2006). Intelligence. Cq Pr., Chapter 12 - The New Intelligence Agenda (Available in Library Reserves. Go to Student Resources in the Left Menu and then click  Library Reserves)
  2. Office of the Director of National Intelligence - Domestic Approach to National Intelligence (2017)
  3. A Governor's Guide to Homeland Security, 2010, Chapter 6: "State Fusion Centers"
  4. The Global Terror Threat and Counterterrorism Challenges Facing the Next Administration, Bruce Hoffman, CTC Sentinel (2016)
Assignments:
  • Prepare for Case Study III.
Case Study III: Intelligence Brief
Time frame:Week 12:
Readings: 
Assignments:
  • Upload your Intelligence Brief to the Intel Brief Dropbox in the Case Study III Module.
 Lesson 10: Examples of Missions, Technologies, and ELSI Challenges 
Time frame:Week 13:
Readings:
  1. Cross-disciplinary Perspectives on Homeland and Civil Security, Chapter 2: "Border Management: International Experiences"
  2. Cross-disciplinary Perspectives on Homeland and Civil Security, "Chapter 7: Use of "Drones" in Homeland Security: A Comparative Perspective on a Security Technology and Its Legal, Political, and Social Aspects"
  3. Cross-disciplinary Perspectives on Homeland and Civil Security, Chapter 10: "Ethical, Legal, and Social Issues (ELSI) in Homeland and Civil Security Research and the European Union Approach"
  4. Chameau, Jean-Lou, William F. Ballhaus, and Herbert S. Lin (eds.), 2014. Emerging and Readily Available Technologies and National Security A Framework for Addressing Ethical, Legal, and Societal Issues. Washington, D.C.: National Academies Press, Chapters 1, 4, 5, and 7
  5. Yakabe, Alison, 2015. "UAS on Main Street: Policy and Enforcement at the Local Level," Homeland Security Affairs
Assignments:
  • Participate in the Lesson Discussion Forum.
Lesson 11: The National Response Framework and the Implementation of Smart Resilience in Turbulent Times & Case Study IV: Final Case Study
Time frame:Week 14:
Readings:
  1. Cross-disciplinary Perspectives on Homeland and Civil Security, Chapter 3: "The Three Mile Island Nuclear Disaster in Emergency Management Perspective," Chapter 4: "Beyond the Storms: Implementing Smart Resilience in Turbulent Times" (re-read from Lesson 4), and Chapter 8, "Risk Management within Tribally Inclusive Geographic Areas: A Primer for All Risk Managers"
  2. Kahan, Jerome 2015, "Resilience redux: Buzzword or basis for Homeland Security." Homeland Security Affairs: The Journal of the NPS Center for Homeland Defense and Security,  vol. 11 (2)
  3. Smith, Adrian 2015, "Understanding the Impact of Web 3.0 on Resilience." ANSER
  4. Visit the U.S. Department of Homeland Security Resilience website 
  5. National Response Framework (2019)
  6. 15 Emergency Support Function Annexes to the NRF
  7. National Incident Management System (NIMS) Doctrine (2017)
Assignments:
  • For the final project, you are to research and write a case study related to a real homeland security-relevant event that applies what you have learned in this course.
  • Submit your Case Study IV to the Final Case Study Dropbox in the Case Study IV Module.
Lesson 12: Public-private Partnership & Applications
Time frame:Week 15:
Readings:
  1. U.S. Department of Homeland Security 2014, The 2014 Quadrennial Homeland Security Review. Washington, D.C., "Strengthening the Execution of Our Missions Through Public-Private Partnerships," pp. 58-61.
  2. Boyer, Eric, Rich Cooper, and Janet Kavinoky 2011, Public-Private Partnerships and Infrastructure Resilience How PPPs Can Influence More Durable Approaches to U.S. Infrastructure.Washington, D.C.: U.S. Chamber of Commerce.
  3. Busch, Nathan E. and Austen D. Givens 2012, "Public-Private Partnerships in Homeland Security: Opportunities and Challenges," in Homeland Security Affairs 8, Article 18. Republished as: Busch, Nathan E. & Austen D. Givens (2014): The Business of Counterterrorism. Public-Private Partnerships in Homeland Security. New York et al.: Peter Lang, Chapter 1: "Public-private partnerships in homeland security: past and present," pp. 9-48.
  4. Neville-Jones, Pauline and Neil Fisher 2006, "Homeland security and the role of business," in: Esther Brimmer (ed.): Transforming Homeland Security: U.S. and European Approaches.Washington, DC: The Johns Hopkins University, The Paul H. Nitze School of Advanced International Studies, Center for Transatlantic Relations, pp. 165-171.
  5. Reiter Neal, Stacy 2008, "Business as usual? Leveraging the private sector to combat terrorism," in: Perspectives on Terrorism, vol. 3, no. 2.>
Assignments:
  • Participate in the Lesson Discussion Forum.

Note: If you are planning to graduate this semester, please communicate your intent to graduate to your instructor. This will alert your instructor to the need to submit your final grade in time to meet the published graduation deadlines. For more information about graduation policies and deadlines, please go to the Graduation Information on the My Penn State Online Student Portal.

Formal instruction will end on the last day of class. Provided that you have an active Penn State Access Account user ID and password, you will continue to be able to access the course materials for one year, starting from the end date of the academic semester in which the course was offered (with the exception of library reserves and other external resources that may have a shorter archival period). After one year, you might be able to access the course based on the policies of the program or department offering the course material, up to a maximum of three years from the end date of the academic semester in which the course was offered. For more information, please review the University Course Archival Policy.


Grading

The World Campus follows the same grading system as the Penn State resident program. The grades of A, B, C, D, and F indicate the following qualities of academic performance:

A = (Excellent) Indicates exceptional achievement
B = (Good) Indicates extensive achievement
C = (Satisfactory) Indicates acceptable achievement
D = (Poor) Indicates only minimal achievement
F = (Failure) Indicates inadequate achievement necessitating a repetition of the course in order to secure credit

Grading Items
  Points Percent of total grade
Weekly Discussion Forums 8 @ 15 points each
120
30%
Module Assignments (2 Case Studies, 1 Intel brief) 3 @ 50 points each
150
38%
Final Case Assignment 1 @ 130 points
130
32%
Total
400
100%
Grading Scale
Grade Percentage
A 100% - 94%
A- < 94% - 90%
B+ < 90% - 87%
B < 87% - 84%
B- < 84% - 80%
C+ < 80% - 77%
C < 77% - 70%
D < 70% - 60%
F < 60%

Please refer to the University Grading Policy for Graduate Courses for additional information about University grading policies.

If, for reasons beyond the student's control, a student is prevented from completing a course within the prescribed time, the grade in that course may be deferred with the concurrence of the instructor. The symbol DF appears on the student's transcript until the course has been completed. Non-emergency permission for filing a deferred grade must be requested by the student before the beginning of the final examination period. In an emergency situation, an instructor can approve a deferred grade after the final exam period has started. Under emergency conditions during which the instructor is unavailable, authorization is required from one of the following: the dean of the college in which the candidate is enrolled; the executive director of the Division of Undergraduate Studies if the student is enrolled in that division or is a provisional student; or the campus chancellor of the student's associated Penn State campus.

For additional information please refer to the Deferring a Grade page.

Assignments

A general note on all assignments:

In the professional world, you usually have very little time to present your thoughts to those in charge. This is why it is essential to be concise in your assignments. Write clearly and be concise.

  • In grading your discussion responses, the instructor should be able to tell your basic point from your subject line. For example, "Inter-agency Communication Requires Trust."
  • The amount of space that you have to write assignments is limited, in order to get you to think about your points and avoid much of extroneous information.

Due Dates: Assignments due dates are posted on the list in the ASSIGNMENTS section of the course.

  1. Weekly Lesson Activities
    1. Good class participation is an important component of this course. At the end of each lesson there is an activity that requires your participation. Good participation includes posting substantive comments on discussion boards, reading and responding to the posts of others, and reflecting upon current events related to the course’s topics. Quality (including reference to the textbook and course lessons) and sensitivity of posted comments on the work of others is also part of the grading for this activity.
  2. Module Assignments

    Your first requirement is to answer the discussion item/question. The objective of the weekly discussion forums is to develop a “discussion thread” that stimulates critical thinking and in-depth dialogue. The second requirement is to reply to at least two other student postings. Again, professionalism and common courtesy are expected during the weekly dialogues.

  3. Final Case Study Assignment
    • At the conclusion of the course, each student is expected to submit a case study related to a real-world situation (which may in include your professional experience as it relates or is applicable to homeland security and defense) or a fictitious situation that applies what was learned in the modules. 
    • Use a case that falls within the area of topics addressed in the textbook for this course, Cross-disciplinary Perspectives on Homeland and Civil Security.
    • It is expected that this case will be 1500 words in length and will address the following:
      • What is the subject?
      • Why is it important?
      • What are the important events and time frame?
      • What were the challenges faced in the case study?
      • How were they addressed?
      • Were they addressed successfully?
    • Cases should deal with a relevant topics but may be from experiences earlier in one's career. They should be:
      • Analytical, rather than informative, and expand upon one or more of the course main topics.
      • Applied what is presented/found in cases to establish common elements that are transferable (e.g., criteria)
    • Topics are highly flexible and should focus on issues that are pertinent to the student and can relate to other subjects in the course and Intercollege Master of Professional Studies in Homeland Security (iMPS-HLS) program generally.
    • Students will use the textbook as a point of departure but to root their case study in the external research that they are expected to accomplish.
    • Students are expected to conduct research rather than providing a “stream of consciousness.”  Thus, citations and a bibliography must be included, and do not count in the total page count.  Wikipedia is not considered a viable source of documentation by itself.  Check the Wikipedia citation, if one does not exist, you need to corroborate your information. 
    • Students are expected to use the "Homeland and Civil Security Research Guide" from the textbook to support their research. 
    • Cases will be assessed on the following criteria:
      • Clarity of subject – what is being examined and why is it significant?
      • Defined structure of case (i.e., see questions above)   
      • Development of points that support questions through the use of research and experience
      • Analytical strength and resourcefulness
      • Professionalism of paper layout and language, including grammar and spelling (shortfalls will be clearly reflected in the assignment grade)
    • Late papers will be marked down 1/2 a grade per day (not class) that they are late. No submissions are accepted after the posted last day of the course ("Course Ends" date on the course schedule). 
    • The instructor will be available to review outlines and help will the selection of topics.

Student Role and Expectations

Students will be expected to assess and discuss with others in the class recent events, case studies, and hypothetical situations.  Seldom is there a defined correct answer, but instead students are expected to assess, analyze, and reflect upon policies, procedures, and past actions to better understand how decisions are made and suggest innovations.  Therefore, communication among individuals will be an essential part of this course. This is potentially a confrontational topic and to be current must deal with information that some may consider offensive. Examples used throughout this course are not chosen to advance a specific political agenda but to challenge students to think and enhance their understanding of these issues and their implications.

  1. Students are responsible for online course content, taking notes, obtaining other materials provided by the instructor, taking tests (if applicable), and completing assignments as scheduled by the instructor.  As a general rule, students should plan on logging into the course at least three times per week and spending at least three hours per course credit per week on the course, e.g., if the course is three credits, the student should plan on spending at least 9-12 hours per week on the course, just as they would in a residence course.
  2. Students are responsible for keeping track of changes in the course syllabus made by the instructor throughout the semester.
  3. Students are responsible for monitoring their grades.
  4. Students must contact their instructor (and teammates when working on any collaborative learning assignments) as soon as possible if they anticipate missing long periods of online time due to events such as chronic illnesses, death in the family, business travel, or other appropriate events. The instructor will determine the minimal log on time and participation required in order to meet course responsibilities. In the event of other unforeseen conflicts, the instructor and student will arrive at a solution together.
    1. Requests for taking exams or submitting assignments after the due dates require documentation of events such as illness, family emergency, or a business-sanctioned activity.
    2. Conflicts with dates on which examinations or assignments are scheduled must be discussed with the instructor or TA prior to the date of the examination or assignment.
  5. Students are responsible for following appropriate netiquette (network etiquette) when communicating with their instructor and classmates. For reference, see the Academic Success Kit.
  6. Behaviors that disrupt other students’ learning are not acceptable and will be addressed by the instructor.
  7. For severe and chronic problems with student disruptive behavior, the following will be applied for resolution:
    1. Senate Committee on Student Life policy on managing classroom disruptions: Office of Student Accountability and Conflict Response.
    2. Penn State Principles


Academic Integrity

Submissions may by checked by Turnitin for originality and for potential academic integrity issues.

According to Penn State policy G-9: Academic Integrity , an academic integrity violation is “an intentional, unintentional, or attempted violation of course or assessment policies to gain an academic advantage or to advantage or disadvantage another student academically.” Unless your instructor tells you otherwise, you must complete all course work entirely on your own, using only sources that have been permitted by your instructor, and you may not assist other students with papers, quizzes, exams, or other assessments. If your instructor allows you to use ideas, images, or word phrases created by another person (e.g., from Course Hero or Chegg) or by generative technology, such as ChatGPT, you must identify their source. You may not submit false or fabricated information, use the same academic work for credit in multiple courses, or share instructional content. Students with questions about academic integrity should ask their instructor before submitting work.

Students facing allegations of academic misconduct may not drop/withdraw from the affected course unless they are cleared of wrongdoing (see G-9: Academic Integrity ). Attempted drops will be prevented or reversed, and students will be expected to complete course work and meet course deadlines. Students who are found responsible for academic integrity violations face academic outcomes, which can be severe, and put themselves at jeopardy for other outcomes which may include ineligibility for Dean’s List, pass/fail elections, and grade forgiveness. Students may also face consequences from their home/major program and/or The Schreyer Honors College.

How Academic Integrity Violations Are Handled
World Campus students are expected to act with civility and personal integrity; respect other students' dignity, rights, and property; and help create and maintain an environment in which all can succeed through the fruits of their own efforts. An environment of academic integrity is requisite to respect for oneself and others, as well as a civil community.

In cases where academic integrity is questioned, the Policy on Academic Integrity indicates that procedure requires an instructor to inform the student of the allegation. Procedures allow a student to accept or contest a charge. If a student chooses to contest a charge, the case will then be managed by the respective college or campus Academic Integrity Committee. If that committee recommends an administrative sanction (Formal Warning, Conduct Probation, Suspension, Expulsion), the claim will be referred to the Office of Student Accountability and Conflict Response.

All Penn State colleges abide by this Penn State policy, but review procedures may vary by college when academic dishonesty is suspected. Information about Penn State's academic integrity policy and college review procedures is included in the information that students receive upon enrolling in a course. To obtain that information in advance of enrolling in a course, please contact us by going to the Contacts & Help page .


Accommodating Disabilities

Penn State welcomes students with disabilities into the University's educational programs. Every Penn State campus has resources for students with disabilities. The Student Disability Resources (SDR) website provides contacts for disability services at every Penn State campus. For further information, please visit the SDR website.

In order to apply for reasonable accommodations, you must contact the appropriate disability resources office at the campus where you are officially enrolled, participate in an intake interview, and provide documentation based on the documentation guidelines. If the documentation supports your request for reasonable accommodations, your campus's disability resources office will provide you with an accommodation letter. Please share this letter with your instructors and discuss the accommodations with them as early in your courses as possible. You must follow this process for every semester that you request accommodations.


Additional Policies

For information about additional policies regarding Penn State Access Accounts; credit by examination; course tuition, fees, and refund schedules; and drops and withdrawals, please see the World Campus Student Center website.

Privacy Notice

In order to protect your privacy, course access is limited to those individuals who have direct responsibility for the quality of your educational experience. In addition to the instructor, a teaching assistant or college administrator may be provided access in order to ensure optimal faculty availability and access. World Campus technical staff may also be given access in order to resolve technical support issues.

Military Students

Veterans and currently serving military personnel and/or dependents with unique circumstances (e.g., upcoming deployments, drill/duty requirements, VA appointments, etc.) are welcome and encouraged to communicate these, in advance if possible, to the instructor in the case that special arrangements need to be made.

Counseling and Psychological Services

If you have a crisis or safety concern, mental health services are available to you as a Penn State student. Crisis and emergency contacts are available, no matter where you are located:

Report Bias

Penn State takes great pride to foster a diverse and inclusive environment for students, faculty, and staff. Acts of intolerance, discrimination, or harassment due to age, ancestry, color, disability, gender, gender identity, national origin, race, religious belief, sexual orientation, or veteran status are not tolerated and can be reported through Educational Equity via the Report Bias webpage.


Disclaimer: Please note that the specifics of this Course Syllabus are subject to change, and you will be responsible for abiding by any such changes. Your instructor will notify you of any changes.


Top of page