10504171Private Sector Security
Course Information
Description
This course is a comprehensive examination of the relationship of the criminal justice system to business and industrial security. It also provides an overview of the administrative, personnel, and physical aspects of the private security field.
Total Credits
3
Course Competencies
-
Explain the history and professionalization of private securityAssessment StrategiesQuiz, DiscussionCriteriaExamine private security as a disciplineReview the relatively recent movement to achieve professionalism in the private security industryExplore college programs in private securityRecognize current ethical standards in the private security industry
-
Identify employment opportunities, employers, and specialties in the private sector security marketAssessment StrategiesCritical thinking writing assignmentCriteriaReview the private security industry in the United States and how it differs from public policingDescribe the size and scope of the private security industry todayAnalyze traditional problems in the private security industry in terms of licensing, regulating, hiring, and training standardsExplore the current licensing, regulating, hiring, and training standards in the private security industryExamine the recent movement for reform in private security standards
-
Report on private security concepts, tools, and systems integration or convergenceAssessment StrategiesQuiz, DiscussionCriteriaArticulate the major concepts the private security industry uses to organize and run its operationsDescribe the tools used by the private security industry to achieve its missionDiscuss the latest uses of technology in the security industryExplore the effectiveness of the various concepts and tools of the private security industrySummarize the importance of systems convergence or integration in private security
-
Differentiate the standards and limitations of laws that impact private securityAssessment StrategiesQuiz, Discussion PostCriteriaDescribe the history and types of law in society, as well as the U. S. legal systemCharacterize what many refer to as the private justice system in the United StatesExplore the legal powers of private security officers in arrest, search- and- seizure, and use-of-forceReview the differences between the police and private security personnel in relation to restrictions imposed by the U. S. ConstitutionExamine the civil and criminal liability problems faced by the private security industryArticulate the court testimony process for private security officers
-
Conduct a premise/business security auditAssessment StrategiesWritten Product, Discussion PostCriteriaDiscuss the premises crime situation in the United StatesDescribe the types of premises protected by the private security industryExamine the security problems that may exist in various premisesExplore the methods used by private security to protect various types of premisesAnalyze how the police and private security agencies work together to protect premisesYou cite at least one academic study regarding the effectiveness of a security method for premises
-
Compare and contrast methods of retail security and loss preventionAssessment StrategiesDiscussion Post, ExamCriteriaOutline the business crime situation in the United StatesReview the types of businesses protected by the private security industryIdentify the methods used by private security to protect various types of businessesCompare how the police and private security agencies work together to protect businessesCite at least one academic study regarding the effectiveness of a security method for businesses
-
Analyze strategies used for information and cyber securityAssessment StrategiesQuiz, Discussion, ExamCriteriaDescribe security problems associated with the use of computers in business and at homeDescribe forms of cybercrime and cyberproblems, including fraud, identity theft, cyberterrorism, Web attacks, computer hacking, cyberstalking, computer use by pedophiles, computer viruses, spam, spyware, software piracy, and data securityArticulate at least two methods used by organizations today to control and regulate computer use and maintain securityList the steps in the process of how investigators investigate computer crimeIdentify at least one method used to maintain the security and integrity of computer use
-
Prepare a field application for undercover or covert security operationAssessment StrategiesQuiz, DiscussionCriteriaDescribe the three major forms of private-sector investigationsDescribe the major types of investigations conducted by private-sector investigatorsCategorize noncriminal investigations and services conducted by the private sectorEvaluate types of criminal investigations conducted by private-sector investigatorsIncorporate information sources for private-sector investigators
-
Evaluate public-private partnerships in security applicationsAssessment StrategiesWritten Product - Research PaperCriteriaIncludes a title pageIncludes an indexIncludes an abstract with stated hypothesisBody of work contains clear conclusion relating back to the hypothesisPaper is 10 pages minimum, double spaced, 12 point Times Roman fontPaper uses APA styleIncludes a reference pageSummarize the concept of surveillance and its importance in private securityList the preparations and techniques necessary to conduct an effective surveillanceDescribe how undercover operations fit into the general role of private securityReview the many purposes, techniques, and types of undercover operationsExplore the many job opportunities available in undercover operations
-
Demonstrate methods of private sector security in Homeland security and terrorism protectionAssessment StrategiesDiscussion, ExamCriteriaExamine the need for cooperation between the police and the private security industryDefine the concept of privatization of government servicesArticulate private and public partnerships developed to deal with the crime and security problem in the United States, including terrorismDescribe the practice of moonlighting by police officers in the private security industry and of private security officers working for government agenciesExplain the practices of community crime-prevention programs, including self-policing, citizen patrols, neighborhood watch, crime stoppers, and citizen volunteers