Faculty of Health, Engineering and Science
School: Computer and Security Science
This unit information may be updated and amended immediately prior to semester. To ensure you have the correct outline, please check it again at the beginning of semester.
Unit Title
Security and Risk Management
Unit Code
SCY1101
Year
2015
Enrolment Period
1
Version
1
Credit Points
15
Full Year Unit
N
Mode of Delivery
On Campus
Online
Description
This unit will introduce the student to security and risk management concepts. It will examine the development of security and the application of criminological theory to security. Students will be introduced to risk theory, and the assessment, analysis and management applied to risk. Students will consider the requirements for conducting and documenting security surveys. An introduction to crisis management theory, security planning, policy and procedures will be presented.
Equivalent Rule
Unit was previously coded QST0003, SCY1118
Learning Outcomes
On completion of this unit students should be able to:
- Apply problem solving techniques in establishing security strategies for the protection of an organisation's assets as part of the security plan.
- Conduct, document, and present a security survey.
- Define, assess and manage an organisation's security risk exposure.
- Demonstrate an understanding of the social theories underlying risk.
- Describe the process for developing and implementing a security education and awareness campaign as part of the security plan.
- Describe the relationship between criminology and security.
- Describe the use of Australian Standard 4360:1995 Risk Management within a security context.
- Develop and implement security policies and procedures as part of an organisation's overall security strategy.
- Display an interest in the extension of knowledge to improve the quality of security planning.
- Understand the theory that underlies crisis management planning, and design a crisis management plan.
Unit Content
- Criminological Crime Prevention Theory: Situational and social crime prevention theory, and motivations for offending.
- Crisis Management: Crisis management, forecasting a crisis, developing a crisis management plan, introduction to the management of threat posed by improvised explosive devices, including mail bombs.
- Risk: Risk assessment, risk analysis, determining risk exposure, risk management, risk communication, risk management cost savings, AS4360, perception, biases and heuristics, and data evaluation.
- Security Policy and Procedures: Introduction to developing security policy and procedures, security awareness, education and marketing, and an introduction to administrative security. Development of plans including SWOT and PEST analysis.
- Security Surveys: Conducting a security survey, documenting the results of a security and understanding various approaches to the security survey.
Additional Learning Experience Information
Lectures, tutorials, seminars, activities, field work and external studies.
Assessment
GS1 GRADING SCHEMA 1 Used for standard coursework units
Students please note: The marks and grades received by students on assessments may be subject to further moderation. All marks and grades are to be considered provisional until endorsed by the relevant Board of Examiners.
ON CAMPUSType | Description | Value |
---|
Essay | Minor essay | 20% |
Essay | Major essay | 30% |
Examination | End of semester examination | 50% |
ONLINEType | Description | Value |
---|
Essay | Minor essay | 20% |
Essay | Major essay | 30% |
Examination | End of semester examination | 50% |
Text References
- ^ Fischer R.J., Halibozek E. and Green G. (1998) Introduction to Security 8th Boston:Butterworth Heinmann
- Dalton, D.R. (1995) Security Management: Business Strategies for Success, Boston:Butterworth-Heinemann.
- Vold, G.B. and Bernard, J. (1986) Theoretical Criminology, Oxford:Oxford University Press.
- Sperling, A. (1967) Psychology Made Simple, London:Butterworth-Heinemann.
- Sanderson, J. (1994) Criminology Textbook.(5th ed.), London:HLT Publications.
- Bennett, T. and Wright, R. (1984) Burglars on Burglary: Prevention and the Offender, Aldershot:Gower
- Broder J.F. (1984) Risk Analysis and the Security Survey, Boston:Butterworth Heinnemann.
- Cohen, A. (1955) Delinquent Boys: The Culture of the Gang, London:Routledge & Keegan Paul.
- Cooper, M.G.(ed) (1985) Risk: Man-made Hazards to Man, Oxford:Clarendon Press
- Cornish, D.B. and Clarke, R.V.G. (1986) The Reasoning Criminal, New York:Springer Verlag.
- Crowe T.D. (1991) Crime Prevention Through Environmental Design: Applications of Architectural Design and Space Management Concepts, Boston:Butterworth.
- Cumming N. (1992) Security: A Guide to Security System Design and Equipment Selection and Installation. (2nd.ed), Boston:Butterworth Heinemann.
- Walsh, T.J. and Healy, R.J. (Eds.). (1989). Protection of Assets Manual. Santa Monica CA The Merritt Company.
- Fay J.J. (1987) Butterworths Security Dictionary: Terms and Concepts, Boston:Butterworth-Heinemann
- Fay J.J. (ed) (1993) Encyclopedia of Security Management: Techniques and Technology, Boston:Butterworth-Heinemann
- Fennelly L.J. (1992) Effective Physical Security: Design Equipment and Operations, Boston:Butterworth-Heinemann.
- Fennelly, L.J. (ed) (1989) Handbook of Loss Prevention and Crime Prevention, Stoneham MA:Butterworth Heinemann.
- Fink, S. (1986) Crisis Management: Planning for the Inevitable, New York:Amacom
- Gill, M. (ed) (1994) Crime at Work: Studies in Security and Crime Prevention, Leicester:Perpetuity Press
- National Research Council (NRC)(ed) (1988) Improving Risk Communication, Washington:National Academy Press
- Post R.S. and Schachtsiek D.A. (1986). Security Manager's Desk Reference, Boston:Butterworths.
Journal References
- Security Gazette
- Security Management
- Security
- Security Australia
^ Mandatory reference
Disability Standards for Education (Commonwealth 2005)
For the purposes of considering a request for Reasonable Adjustments under the Disability Standards for Education (Commonwealth 2005), inherent requirements for this subject are articulated in the Unit Description, Learning Outcomes and Assessment Requirements of this entry. The University is dedicated to provide support to those with special requirements. Further details on the support for students with disabilities or medical conditions can be found at the Access and Inclusion website.
Academic Misconduct
Edith Cowan University has firm rules governing academic misconduct and there are substantial penalties that can be applied to students who are found in breach of these rules. Academic misconduct includes, but is not limited to:
- plagiarism;
- unauthorised collaboration;
- cheating in examinations;
- theft of other students' work;
Additionally, any material submitted for assessment purposes must be work that has not been submitted previously, by any person, for any other unit at ECU or elsewhere.
The ECU rules and policies governing all academic activities, including misconduct, can be accessed through the ECU website.
SCY1101|1|1
Faculty of Health, Engineering and Science
School: Computer and Security Science
This unit information may be updated and amended immediately prior to semester. To ensure you have the correct outline, please check it again at the beginning of semester.
Unit Title
Security and Risk Management
Unit Code
SCY1101
Year
2015
Enrolment Period
2
Version
1
Credit Points
15
Full Year Unit
N
Mode of Delivery
On Campus
Online
Description
This unit will introduce the student to security and risk management concepts. It will examine the development of security and the application of criminological theory to security. Students will be introduced to risk theory, and the assessment, analysis and management applied to risk. Students will consider the requirements for conducting and documenting security surveys. An introduction to crisis management theory, security planning, policy and procedures will be presented.
Equivalent Rule
Unit was previously coded QST0003, SCY1118
Learning Outcomes
On completion of this unit students should be able to:
- Apply problem solving techniques in establishing security strategies for the protection of an organisation's assets as part of the security plan.
- Conduct, document, and present a security survey.
- Define, assess and manage an organisation's security risk exposure.
- Demonstrate an understanding of the social theories underlying risk.
- Describe the process for developing and implementing a security education and awareness campaign as part of the security plan.
- Describe the relationship between criminology and security.
- Describe the use of Australian Standard 4360:1995 Risk Management within a security context.
- Develop and implement security policies and procedures as part of an organisation's overall security strategy.
- Display an interest in the extension of knowledge to improve the quality of security planning.
- Understand the theory that underlies crisis management planning, and design a crisis management plan.
Unit Content
- Criminological Crime Prevention Theory: Situational and social crime prevention theory, and motivations for offending.
- Crisis Management: Crisis management, forecasting a crisis, developing a crisis management plan, introduction to the management of threat posed by improvised explosive devices, including mail bombs.
- Risk: Risk assessment, risk analysis, determining risk exposure, risk management, risk communication, risk management cost savings, AS4360, perception, biases and heuristics, and data evaluation.
- Security Policy and Procedures: Introduction to developing security policy and procedures, security awareness, education and marketing, and an introduction to administrative security. Development of plans including SWOT and PEST analysis.
- Security Surveys: Conducting a security survey, documenting the results of a security and understanding various approaches to the security survey.
Additional Learning Experience Information
Lectures, tutorials, seminars, activities, field work and external studies.
Assessment
GS1 GRADING SCHEMA 1 Used for standard coursework units
Students please note: The marks and grades received by students on assessments may be subject to further moderation. All marks and grades are to be considered provisional until endorsed by the relevant Board of Examiners.
ON CAMPUSType | Description | Value |
---|
Essay | Minor essay | 20% |
Essay | Major essay | 30% |
Examination | End of semester examination | 50% |
ONLINEType | Description | Value |
---|
Essay | Minor essay | 20% |
Essay | Major essay | 30% |
Examination | End of semester examination | 50% |
Text References
- ^ Fischer R.J., Halibozek E. and Green G. (1998) Introduction to Security 8th Boston:Butterworth Heinmann
- Post R.S. and Schachtsiek D.A. (1986). Security Manager's Desk Reference, Boston:Butterworths.
- Sperling, A. (1967) Psychology Made Simple, London:Butterworth-Heinemann.
- Vold, G.B. and Bernard, J. (1986) Theoretical Criminology, Oxford:Oxford University Press.
- Walsh, T.J. and Healy, R.J. (Eds.). (1989). Protection of Assets Manual. Santa Monica CA The Merritt Company.
- Crowe T.D. (1991) Crime Prevention Through Environmental Design: Applications of Architectural Design and Space Management Concepts, Boston:Butterworth.
- Sanderson, J. (1994) Criminology Textbook.(5th ed.), London:HLT Publications.
- National Research Council (NRC)(ed) (1988) Improving Risk Communication, Washington:National Academy Press
- Gill, M. (ed) (1994) Crime at Work: Studies in Security and Crime Prevention, Leicester:Perpetuity Press
- Fink, S. (1986) Crisis Management: Planning for the Inevitable, New York:Amacom
- Bennett, T. and Wright, R. (1984) Burglars on Burglary: Prevention and the Offender, Aldershot:Gower
- Broder J.F. (1984) Risk Analysis and the Security Survey, Boston:Butterworth Heinnemann.
- Cohen, A. (1955) Delinquent Boys: The Culture of the Gang, London:Routledge & Keegan Paul.
- Cooper, M.G.(ed) (1985) Risk: Man-made Hazards to Man, Oxford:Clarendon Press
- Cornish, D.B. and Clarke, R.V.G. (1986) The Reasoning Criminal, New York:Springer Verlag.
- Cumming N. (1992) Security: A Guide to Security System Design and Equipment Selection and Installation. (2nd.ed), Boston:Butterworth Heinemann.
- Dalton, D.R. (1995) Security Management: Business Strategies for Success, Boston:Butterworth-Heinemann.
- Fay J.J. (1987) Butterworths Security Dictionary: Terms and Concepts, Boston:Butterworth-Heinemann
- Fay J.J. (ed) (1993) Encyclopedia of Security Management: Techniques and Technology, Boston:Butterworth-Heinemann
- Fennelly L.J. (1992) Effective Physical Security: Design Equipment and Operations, Boston:Butterworth-Heinemann.
- Fennelly, L.J. (ed) (1989) Handbook of Loss Prevention and Crime Prevention, Stoneham MA:Butterworth Heinemann.
Journal References
- Security Gazette
- Security Management
- Security
- Security Australia
^ Mandatory reference
Disability Standards for Education (Commonwealth 2005)
For the purposes of considering a request for Reasonable Adjustments under the Disability Standards for Education (Commonwealth 2005), inherent requirements for this subject are articulated in the Unit Description, Learning Outcomes and Assessment Requirements of this entry. The University is dedicated to provide support to those with special requirements. Further details on the support for students with disabilities or medical conditions can be found at the Access and Inclusion website.
Academic Misconduct
Edith Cowan University has firm rules governing academic misconduct and there are substantial penalties that can be applied to students who are found in breach of these rules. Academic misconduct includes, but is not limited to:
- plagiarism;
- unauthorised collaboration;
- cheating in examinations;
- theft of other students' work;
Additionally, any material submitted for assessment purposes must be work that has not been submitted previously, by any person, for any other unit at ECU or elsewhere.
The ECU rules and policies governing all academic activities, including misconduct, can be accessed through the ECU website.
SCY1101|1|2