ࡱ> CEBc bjbj B-QbQb lllll8D/06/8/8/8/8/8/8/$03\/lppp\/llq/2!2!2!p^ll6/2!p6/2!2!-h.08K|."//0/.a4Ja4 .a4l.H2!  W\/\/V/ppppa4 B 2:  GROSSMONT COLLEGE Official Course Outline ADMINSTRATION OF JUSTICE 207 - INVESTIGATIVE TECHNIQUES FOR SECURITY MANAGEMENT 1. Course Number Course Title Semester Units Hours AOJ 207 Investigative Techniques 3 3 hours lecture: 48-54 hours for Security Management 96-108 outside-of-class hours 144-162 total hours 2. Prerequisites None. Corequisite None. Recommended Preparation None. 3. Catalog Description An overview of civil as well as criminal investigations in a security management setting. Emphasis is placed upon procedures, legalities, and technical aspects of specialized investigations relating to crime, pre-employment screening, sexual harassment, unlawful employment discrimination, accidents, unexplained losses, and other business activities. Proper documentation of a security investigation is also discussed. 4. Course Objectives The student will: a. List and describe the common elements of the investigative process. b. Locate and develop sources of information. c. Evaluate information gathered from public and private sources. d. Demonstrate appropriate interviewing and interrogation techniques. e. Conduct a basic civil investigation. f. Conduct a basic criminal investigation. g. Document information gathered during an investigation. h. Analyze evidence gathered in a civil or criminal investigation. i. Identify, critically analyze, and develop solutions to problems in security management. j. Demonstrate ability to work collaboratively in a group setting. k. Utilize computer technology and access information via the Internet as appropriate. l. Conduct research appropriate to the discipline. m. Evaluate personal and professional ethic standards. 5. Instructional Facilities Standard classroom. 6. Special Materials Required of Student None ADMINISTRATION OF JUSTICE 207 - INVESTIGATIVE TECHNIQUES FOR SECURITY MANAGEMENT page 2 7. Course Content a. Introduction to investigative techniques. b. Common elements of the investigative process. c. Sources of information. d. General investigative methods. e. Civil investigations. f. Special issues in civil investigations. g. Criminal investigations. h. The investigator as a witness. 8. Method of Instruction a. Lecture, discussion, and audio visual materials as appropriate. b. Qualified guest speakers may be invited to lecture on their respective fields of specialization. c. Field trips to local public safety agencies and security organizations may be arranged. d. Group projects such as case or mock case analysis and planning. 9. Methods of Evaluating Student Performance Participation. Period examinations. Research assignments such as case analysis. Group projects such as case or mock case evaluation and planning. Oral presentations such as case or mock case oral critique and analysis. Written final examination. 10. Outside Class Assignments Reading in required text. Critical-thinking and problem-solving exercises. Research a case or scenario for written analysis. Preparation for oral presentation, individual or within a group on a case or mock case analysis and planning. 11. Texts a. Required Text(s): Nemeth, Charles P. Private Security and the Investigative Process. 3rd ed. Burlington, MA: Elsevier Butterworth-Heinemann, 2010. b. Supplementary texts and workbooks: None. Addendum: Student Learning Outcomes Upon completion of this course, our students will be able to do the following: Explain the common elements of the investigative process. Analyze the skills and techniques of interviewing and apply to various investigative and professional situations. Distinguish between the methods of conducting a criminal versus a civil investigation, and the investigators who conduct them. Date approved by the Governing Board: December 8, 2015   ,/~ 3 4 M N O S ` b h i k v ~  h y | } &(,-.<~"'PR`a׻׻h6OJQJh$c`h$c`OJQJh$c`>*OJQJh$c`OJQJha)OJQJh~OJQJhS>*OJQJhSOJQJJ-./4 |b  ` Ld*$`Lgd~   Ld*$`Lgd~  x Ld*$`Lgd~  `x$Ld*$`Lgd~ 'Ld*$`Lgd~ Ld*$`Lgd~ Ld*$`Lgd~ 4 N O a b i j w x  } $@pLd`Lgd~ @pLd*$^`Lgd~ @pLd*$`Lgd~  `x$Ld*$`Lgd~  `x Ld*$`Lgd~ c d z {  I d \ @pLd*$^`Lgd~ @pLd*$^`Lgd~ @pLd*$`Lgd~'(-.  `x$Ld*$`Lgd~ `'Ld*$`Lgd~ @pd*$^gd~ @pd*$gd6 @pLd*$`Lgd~;U "# @pd*$^gd~ *pd*$^gd~ @pLd*$`Lgd~ pLd*$`Lgd~ pLd*$`Lgd~#QRav-HIghST! & F @p>d*$^`>gd~ @p0d*$`0gd~ & F @p0d*$`0gd~ @pLd*$`Lgd~+HMfQSX](2KM   輮藓 he CJjhe Uhe jhe CJUh*.ha)OJQJ^Jh*.ha)>*OJQJ^Jha)>*OJQJ^Jh6h6H*OJQJh6hS6OJQJhS>*OJQJhSOJQJh6OJQJh$c`OJQJ0T^_u'(LMH & F >1$^`>gd~L`Lgd~ pd*$^gd6 @pd*$`gd~ @pLd*$`Lgd~    @pLd*$`Lgd~d @....()()))()00P8$:p~BP/ =!8"#8$8%88 Dp!s2 0@P`p2( 0@P`p 0@P`p 0@P`p 0@P`p 0@P`p 0@P`p8XV~ 0@ 0@ 0@ 0@ 0@ 0@ 0@ 0@ 0@ 0@ 0@ 0@ 0@ 0@_HmH nH sH tH D`D Normal1$OJQJ_HmH sH tH DA D Default Paragraph FontViV  Table Normal :V 44 la (k (No List 8+8  Endnote TextCJ>* > Endnote ReferenceH*::  Footnote TextCJ@& !@ Footnote ReferenceH*NN TOC 1) $ 0*$]^`0JJ TOC 2% $ 0*$]^`0JJ TOC 3% $ p0*$]^p`0JJ TOC 4% $ @ 0*$]^@ `0JJ TOC 5% $ 0*$]^`0BB TOC 6 $0*$^`0:: TOC 70*$^`0BB TOC 8 $0*$^`0BB TOC 9 $ 0*$^`0N N Index 1% $ `*$]^``N N Index 2% $ 0*$]^`0>.@>  TOA Heading *$ $.". CaptionCJ:/: _Equation CaptionPK![Content_Types].xmlN0EH-J@%ǎǢ|ș$زULTB l,3;rØJB+$G]7O٭Vc:E3v@P~Ds |w< 1,  4 #T 8@0(  B S  ?l =*urn:schemas-microsoft-com:office:smarttags PlaceName u {    !*Pa < J M T u 3333333334M|}(-..  ! " " # # $ ` ` a a + I I  Q S S t t u u ( (      34N|}(-..  ! " " # # ` ` a a + I I  Q S S t t u u (    c$%$jh^`CJOJQJ^Jo(hH.h ^`hH.h pLp^p`LhH.h @ @ ^@ `hH.h ^`hH.h L^`LhH.h ^`hH.h ^`hH.h PLP^P`LhH.h^`CJOJQJ^Jo(hH.h bb^b`hH.h 2 L2 ^2 `LhH.h   ^ `hH.h ^`hH.h L^`LhH.h rr^r`hH.h BB^B`hH.h L^`LhH.h^`CJOJQJ^Jo(hH.h bb^b`hH.h 2 L2 ^2 `LhH.h   ^ `hH.h ^`hH.h L^`LhH.h rr^r`hH.h BB^B`hH.h L^`LhH.h *^*`hH.h ^`hH.h L^`LhH.h  ^ `hH.h j^j`hH.h :L^:`LhH.h  ^ `hH.h ^`hH.h L^`LhH./^`/o(. ^`hH. L^`LhH.   ^ `hH. jj^j`hH. :L:^:`LhH.   ^ `hH. ^`hH. L^`LhH.?@ADRoot Entry FРQF1Table4WordDocumentB-SummaryInformation(2DocumentSummaryInformation8:CompObjr  F Microsoft Word 97-2003 Document MSWordDocWord.Document.89q