ࡱ> CEBa \bjbj <9AbAbL: : 846D!%fzzzzzUUU$$$$$$$$&=)$UU$zz$ jzz$ $ ,#x#z0x|D#$$0!%L#,))x#)x#U0" UUU$$DUUU!%)UUUUUUUUU: B |:  GROSSMONT COLLEGE Official Course Outline ADMINISTRATION OF JUSTICE 111 INTRODUCTION TO SECURITY MANAGEMENT 1. Course Number Course Title Semester Units Semester Hours AOJ 111 Introduction to 3 3 hours lecture: 54 hours Security Management 108 outside-of-class hours 162 total hours 2. Course Prerequisites None. Corequisite None Recommended Preparation None 3. Catalog Description An introduction to private as well as public security management. The historical, philosophical and legal bases for security services are examined. Emphasis is placed on: the role of the security organization and security personnel in modern society; concepts of professionalism and ethics; types and functions of security operations; counterterrorism; and career pathways in security management. 4. Course Objectives The student will: a. Describe the historical, philosophical, and legal basis for security services. b. Describe the importance of security in a modern society, as well as its role in domestic and international business enterprises, public safety, and counterterrorism activities. c. Analyze common elements of loss prevention as applied to general and specific safety and security problems. d. Compare and contrast the variety of management issues and challenges which face the modern security management executive. e. Identify and investigate career streams and opportunities in security management. f. Articulate the nature and breadth of the field of security management as evidenced by an analysis of samples of the fields relevant literature. g. Explain the concept of professionalism and the role of ethics in the security profession. h. Conduct a basic security survey/risk analysis. i. Prepare a loss prevention/security program plan based on the results of a basic security survey/risk analysis. j. Evaluate the contribution effective security management makes to the goals of an organization. k. Identify, critically analyze, and develop solutions to problems in security management. l. Demonstrate ability to work collaboratively in a group setting. m. Utilize computer technology and access information via the Internet as appropriate. n. Conduct research appropriate to the discipline. o. Evaluate personal and professional ethical standards. ADMINISTRATION OF JUSTICE 111 INTRODUCTION TO SECURITY MANAGEMENT page 2 5. Instructional Facilities Standard classroom 6. Special Materials Required of Student None. 7. Course Content a. Introduction to security management. b. Securitys role in government and industry. c. Regulation of the security industry. d. Professional certification and education programs. e. Types of security organizations. f. Functional components of security. g. Threats of safety and security. h. Legal aspects of security management. i. Risk assessment, planning, and program administration. j. Physical, personnel, and information security. k. Investigations, intelligence operations, and reporting. l. Specific security applications. 8. Method of Instruction a. Lecture, discussion, and audio visual materials as appropriate. b. Group projects such as case or mock case analysis and planning. c. Qualified guest speakers may be invited to lecture on their respective fields of specialization. d. Field trips to local public safety agencies and security organizations may be arranged. 9. Methods of Evaluating Student Performance a. Participation b. Periodic examinations c. Research and written assignments such as case analysis papers. d. Group projects such as case and mock case evaluation and planning. e. Oral presentations such as case or mock case oral critique and analysis. f. Written final examination. 10. Outside Class Assignments a. Reading in required text. b. Critical-thinking and problem-solving exercise with research paper. c. Preparation of group projects and oral presentations. 11. Texts a. Required Text(s): (1) Ortmeier, P.J. Security Management: An Introduction, 4th ed. Upper Saddle River, NY: Pearson Prentice Hall, 2013. b. Supplementary texts and workbooks: None. ADMINISTRATION OF JUSTICE 111 INTRODUCTION TO SECURITY MANAGEMENT page 3 Addendum: Student Learning Outcomes Upon completion of this course, our students will be able to do the following: Analyze common elements of loss prevention as applied to general and specific safety and security problems. Conduct a basic security survey/risk analysis. Differentiate between externally motivated crime prevention techniques and internal-theft crime prevention techniques. Date approved by the Governing Board: December 8, 2015   ,./rsx  ! / 5 6 : N P ɹ}rg[hh5OJQJhhOJQJh@lhooOJQJh@lhH4OJQJh@lh*9 OJQJh@lhOJQJh@lhABOJQJhABOJQJhM1OJQJhh*9 6CJOJQJaJhOJQJh;>*OJQJhM1>*OJQJh*9 >*OJQJhM1hM1>*OJQJh*9 OJQJ#-./st! 6 O P V W c d  d*$^ d*$  `$d*$  `x$d*$ 'd*$ d*$ d*$P U V W b j   2 8 I b T[\]`x{zrrh;OJQJh'o/OJQJh;}kh;}kOJQJh;}khOJQJh;h;OJQJh. >*OJQJhEOJQJhABhABOJQJh*9 >*OJQJh;h;OJQJh;>*OJQJh;h;>*OJQJh;OJQJh*9 OJQJhABOJQJ,d i j 2 4 J K ^ f T ? T|d*$^`| Dd*$^`D d*$^gdAB d*$ d*$^?CF  \]yz TDd*$^`Dgd;}k 'd*$gd; *T*d*$^*` T|d*$^`|/X)dW T|d*$^`| TDd*$^`Dgd;}kprVWXY[\a ACEGXݭݭǏǚǚǚh;}kha(OJQJh;}khuOJQJha(OJQJh?5OJQJh*9 >*OJQJh*9 OJQJh;}khD1OJQJh;}khjOJQJh;}kh?OJQJh?OJQJh;OJQJhD1OJQJ5W\]B4no TDd*$^`DgdD1 T|d*$^`|X45lmnosxǿǶϮǶvk`T`IhMUIhD1OJQJhMUIh<H*OJQJhMUIh<OJQJh2yh<OJQJh2yhD16OJQJh2yh2yOJQJhMUIh*9 OJQJhMUIh2yOJQJhMUIhjOJQJhjOJQJh*9 >*OJQJhcOJQJh*9 OJQJhD1OJQJha(OJQJh;}khuOJQJh;}kha(OJQJh;}kh]OJQJoyz 2:;<=> 'd*$gdMUI`gd\ 'd*$gd\ Td*$^`gd!I T|d*$^`| T|d*$^`|gd\   :;>;KLMǿreXPHǣ>jhSHCJUh!IOJQJh\OJQJhZeh\OJQJ^JhZeh!OJQJ^Jh*.h\OJQJ^Jh*.h\>*OJQJ^Jh\>*OJQJ^Jh;hMUIOJQJhMUIOJQJhMUI>*OJQJhMUI>*OJQJ^Jh;OJQJh*9 OJQJhMUIh*9 OJQJhMUIhD1OJQJhMUIh<OJQJh<OJQJhD1OJQJkLNOQRSTVWYd T|d*$^`|gdoo Td*$gd3 Td*$gd\ & F >1$^`>gd\`gd\MOPRSTUWX[\h*9 OJQJ hSHCJjhSHUhSH YZ[\ T|d*$^`|gdoo:....()()))()00P8$BP/ =!8"8#8$%88 Dp"s2 0@P`p2( 0@P`p 0@P`p 0@P`p 0@P`p 0@P`p 0@P`p8XV~ 0@ 0@ 0@ 0@ 0@ 0@ 0@ 0@ 0@ 0@ 0@ 0@ 0@ 0@_HmH nH sH tH D`D Normal1$OJQJ_HmH sH tH DA D Default Paragraph FontViV  Table Normal :V 44 la (k (No List 8+8  Endnote TextCJ>* > Endnote ReferenceH*::  Footnote TextCJ@& !@ Footnote ReferenceH*NN TOC 1) $ 0*$]^`0JJ TOC 2% $ 0*$]^`0JJ TOC 3% $ p0*$]^p`0JJ TOC 4% $ @ 0*$]^@ `0JJ TOC 5% $ 0*$]^`0BB TOC 6 $0*$^`0:: TOC 70*$^`0BB TOC 8 $0*$^`0BB TOC 9 $ 0*$^`0N N Index 1% $ `*$]^``N N Index 2% $ 0*$]^`0>.>  TOA Heading *$ $.". CaptionCJ:/: _Equation CaptionHH D1 Balloon Text!CJOJQJ^JaJPK![Content_Types].xmlN0EH-J@%ǎǢ|ș$زULTB l,3;rØJB+$G]7O٭Vc:E3v@P~Ds |w< \8 P XM\d ?WoY\8@0(  B S  ?TTT ] ]9*urn:schemas-microsoft-com:office:smarttagsplace=*urn:schemas-microsoft-com:office:smarttags PlaceName=*urn:schemas-microsoft-com:office:smarttags PlaceType Wb* + LNOQRSTVWY]&))5KN$0 < K Z L]3333333335  { p , , V   ACEGGX4noo;;KLLNOOQRSTUVWXY]5  { p , , V   ACEGGX4noo;;KLLNOOQRSTVWY]d> 8^8`hH. ^`hH.  L^ `LhH.  ^ `hH. x^x`hH. HL^H`LhH. ^`hH. ^`hH. L^`LhH.d         ?>V. *9 j?~eP"!+'i,)'o/M1H4s;=SHMUIjM6O)bT<[v[|]heEizj;}k@ljnooYq2yhl u/<;@ /sx-\; v/E32O]cZe!Ia(y;ABD1!LN@VVVV\@UnknownG.[x Times New Roman5Symbol3. .Cx Arial71 Courier5.*!TahomaA$BCambria Math"9)FV zG9g ! !!)P4CC2q)PHP?V2!xx !A Course Outline Template [blank]GCCCDBarbara Prilaman Oh+'0 ( H T ` lx$A Course Outline Template [blank]GCCCD Normal.dotmBarbara Prilaman5Microsoft Office Word@Ik@T151@N@$$x ՜.+,0  hp  GCCCD! C "A Course Outline Template [blank] Title  !"#$%&'()*+,-./013456789;<=>?@ADRoot Entry F#xF1Table)WordDocument<9SummaryInformation(2DocumentSummaryInformation8:CompObjr  F Microsoft Word 97-2003 Document MSWordDocWord.Document.89q