School: Science

This unit information may be updated and amended immediately prior to semester. To ensure you have the correct outline, please check it again at the beginning of semester.

  • Unit Title

    Security and Risk Management
  • Unit Code

    SCY1101
  • Year

    2016
  • Enrolment Period

    1
  • Version

    1
  • Credit Points

    15
  • Full Year Unit

    N
  • Mode of Delivery

    On Campus
    Online

Description

This unit will introduce the student to security and risk management concepts. It will examine the development of security and the application of criminological theory to security. Students will be introduced to risk theory, and the assessment, analysis and management applied to risk. Students will consider the requirements for conducting and documenting security surveys. An introduction to crisis management theory, security planning, policy and procedures will be presented.

Equivalent Rule

Unit was previously coded QST0003, SCY1118

Learning Outcomes

On completion of this unit students should be able to:

  1. Apply problem solving techniques in establishing security strategies for the protection of an organisation's assets as part of the security plan.
  2. Conduct, document, and present a security survey.
  3. Define, assess and manage an organisation's security risk exposure.
  4. Demonstrate an understanding of the social theories underlying risk.
  5. Describe the process for developing and implementing a security education and awareness campaign as part of the security plan.
  6. Describe the relationship between criminology and security.
  7. Describe the use of Australian Standard 4360:1995 Risk Management within a security context.
  8. Develop and implement security policies and procedures as part of an organisation's overall security strategy.
  9. Display an interest in the extension of knowledge to improve the quality of security planning.
  10. Understand the theory that underlies crisis management planning, and design a crisis management plan.

Unit Content

  1. Criminological Crime Prevention Theory: Situational and social crime prevention theory, and motivations for offending.
  2. Crisis Management: Crisis management, forecasting a crisis, developing a crisis management plan, introduction to the management of threat posed by improvised explosive devices, including mail bombs.
  3. Risk: Risk assessment, risk analysis, determining risk exposure, risk management, risk communication, risk management cost savings, AS4360, perception, biases and heuristics, and data evaluation.
  4. Security Policy and Procedures: Introduction to developing security policy and procedures, security awareness, education and marketing, and an introduction to administrative security. Development of plans including SWOT and PEST analysis.
  5. Security Surveys: Conducting a security survey, documenting the results of a security and understanding various approaches to the security survey.

Additional Learning Experience Information

Lectures, tutorials, seminars, activities, field work and external studies.

Assessment

GS1 GRADING SCHEMA 1 Used for standard coursework units

Students please note: The marks and grades received by students on assessments may be subject to further moderation. All marks and grades are to be considered provisional until endorsed by the relevant Board of Examiners.

ON CAMPUS
TypeDescriptionValue
EssayMinor essay20%
EssayMajor essay30%
ExaminationEnd of semester examination50%
ONLINE
TypeDescriptionValue
EssayMinor essay20%
EssayMajor essay30%
ExaminationEnd of semester examination50%

Text References

  • ^ Fischer R.J., Halibozek E. and Green G. (1998) Introduction to Security 8th Boston:Butterworth Heinmann
  • Sperling, A. (1967) Psychology Made Simple, London:Butterworth-Heinemann.
  • Sanderson, J. (1994) Criminology Textbook.(5th ed.), London:HLT Publications.
  • Post R.S. and Schachtsiek D.A. (1986). Security Manager's Desk Reference, Boston:Butterworths.
  • National Research Council (NRC)(ed) (1988) Improving Risk Communication, Washington:National Academy Press
  • Gill, M. (ed) (1994) Crime at Work: Studies in Security and Crime Prevention, Leicester:Perpetuity Press
  • Fink, S. (1986) Crisis Management: Planning for the Inevitable, New York:Amacom
  • Fennelly, L.J. (ed) (1989) Handbook of Loss Prevention and Crime Prevention, Stoneham MA:Butterworth Heinemann.
  • Fennelly L.J. (1992) Effective Physical Security: Design Equipment and Operations, Boston:Butterworth-Heinemann.
  • Fay J.J. (ed) (1993) Encyclopedia of Security Management: Techniques and Technology, Boston:Butterworth-Heinemann
  • Fay J.J. (1987) Butterworths Security Dictionary: Terms and Concepts, Boston:Butterworth-Heinemann
  • Dalton, D.R. (1995) Security Management: Business Strategies for Success, Boston:Butterworth-Heinemann.
  • Cumming N. (1992) Security: A Guide to Security System Design and Equipment Selection and Installation. (2nd.ed), Boston:Butterworth Heinemann.
  • Crowe T.D. (1991) Crime Prevention Through Environmental Design: Applications of Architectural Design and Space Management Concepts, Boston:Butterworth.
  • Cornish, D.B. and Clarke, R.V.G. (1986) The Reasoning Criminal, New York:Springer Verlag.
  • Cooper, M.G.(ed) (1985) Risk: Man-made Hazards to Man, Oxford:Clarendon Press
  • Cohen, A. (1955) Delinquent Boys: The Culture of the Gang, London:Routledge & Keegan Paul.
  • Broder J.F. (1984) Risk Analysis and the Security Survey, Boston:Butterworth Heinnemann.
  • Bennett, T. and Wright, R. (1984) Burglars on Burglary: Prevention and the Offender, Aldershot:Gower
  • Walsh, T.J. and Healy, R.J. (Eds.). (1989). Protection of Assets Manual. Santa Monica CA The Merritt Company.
  • Vold, G.B. and Bernard, J. (1986) Theoretical Criminology, Oxford:Oxford University Press.

Journal References

  • Security Management
  • Security
  • Security Australia
  • Security Gazette

^ Mandatory reference


Disability Standards for Education (Commonwealth 2005)

For the purposes of considering a request for Reasonable Adjustments under the Disability Standards for Education (Commonwealth 2005), inherent requirements for this subject are articulated in the Unit Description, Learning Outcomes and Assessment Requirements of this entry. The University is dedicated to provide support to those with special requirements. Further details on the support for students with disabilities or medical conditions can be found at the Access and Inclusion website.

Academic Misconduct

Edith Cowan University has firm rules governing academic misconduct and there are substantial penalties that can be applied to students who are found in breach of these rules. Academic misconduct includes, but is not limited to:

  • plagiarism;
  • unauthorised collaboration;
  • cheating in examinations;
  • theft of other students' work;

Additionally, any material submitted for assessment purposes must be work that has not been submitted previously, by any person, for any other unit at ECU or elsewhere.

The ECU rules and policies governing all academic activities, including misconduct, can be accessed through the ECU website.

SCY1101|1|1

School: Science

This unit information may be updated and amended immediately prior to semester. To ensure you have the correct outline, please check it again at the beginning of semester.

  • Unit Title

    Security and Risk Management
  • Unit Code

    SCY1101
  • Year

    2016
  • Enrolment Period

    2
  • Version

    1
  • Credit Points

    15
  • Full Year Unit

    N
  • Mode of Delivery

    On Campus
    Online

Description

This unit will introduce the student to security and risk management concepts. It will examine the development of security and the application of criminological theory to security. Students will be introduced to risk theory, and the assessment, analysis and management applied to risk. Students will consider the requirements for conducting and documenting security surveys. An introduction to crisis management theory, security planning, policy and procedures will be presented.

Equivalent Rule

Unit was previously coded QST0003, SCY1118

Learning Outcomes

On completion of this unit students should be able to:

  1. Apply problem solving techniques in establishing security strategies for the protection of an organisation's assets as part of the security plan.
  2. Conduct, document, and present a security survey.
  3. Define, assess and manage an organisation's security risk exposure.
  4. Demonstrate an understanding of the social theories underlying risk.
  5. Describe the process for developing and implementing a security education and awareness campaign as part of the security plan.
  6. Describe the relationship between criminology and security.
  7. Describe the use of Australian Standard 4360:1995 Risk Management within a security context.
  8. Develop and implement security policies and procedures as part of an organisation's overall security strategy.
  9. Display an interest in the extension of knowledge to improve the quality of security planning.
  10. Understand the theory that underlies crisis management planning, and design a crisis management plan.

Unit Content

  1. Criminological Crime Prevention Theory: Situational and social crime prevention theory, and motivations for offending.
  2. Crisis Management: Crisis management, forecasting a crisis, developing a crisis management plan, introduction to the management of threat posed by improvised explosive devices, including mail bombs.
  3. Risk: Risk assessment, risk analysis, determining risk exposure, risk management, risk communication, risk management cost savings, AS4360, perception, biases and heuristics, and data evaluation.
  4. Security Policy and Procedures: Introduction to developing security policy and procedures, security awareness, education and marketing, and an introduction to administrative security. Development of plans including SWOT and PEST analysis.
  5. Security Surveys: Conducting a security survey, documenting the results of a security and understanding various approaches to the security survey.

Additional Learning Experience Information

Lectures, tutorials, seminars, activities, field work and external studies.

Assessment

GS1 GRADING SCHEMA 1 Used for standard coursework units

Students please note: The marks and grades received by students on assessments may be subject to further moderation. All marks and grades are to be considered provisional until endorsed by the relevant Board of Examiners.

ON CAMPUS
TypeDescriptionValue
EssayMinor essay20%
EssayMajor essay30%
ExaminationEnd of semester examination50%
ONLINE
TypeDescriptionValue
EssayMinor essay20%
EssayMajor essay30%
ExaminationEnd of semester examination50%

Text References

  • ^ Fischer R.J., Halibozek E. and Green G. (1998) Introduction to Security 8th Boston:Butterworth Heinmann
  • Sperling, A. (1967) Psychology Made Simple, London:Butterworth-Heinemann.
  • Sanderson, J. (1994) Criminology Textbook.(5th ed.), London:HLT Publications.
  • Post R.S. and Schachtsiek D.A. (1986). Security Manager's Desk Reference, Boston:Butterworths.
  • National Research Council (NRC)(ed) (1988) Improving Risk Communication, Washington:National Academy Press
  • Gill, M. (ed) (1994) Crime at Work: Studies in Security and Crime Prevention, Leicester:Perpetuity Press
  • Fink, S. (1986) Crisis Management: Planning for the Inevitable, New York:Amacom
  • Fennelly, L.J. (ed) (1989) Handbook of Loss Prevention and Crime Prevention, Stoneham MA:Butterworth Heinemann.
  • Fennelly L.J. (1992) Effective Physical Security: Design Equipment and Operations, Boston:Butterworth-Heinemann.
  • Fay J.J. (ed) (1993) Encyclopedia of Security Management: Techniques and Technology, Boston:Butterworth-Heinemann
  • Fay J.J. (1987) Butterworths Security Dictionary: Terms and Concepts, Boston:Butterworth-Heinemann
  • Dalton, D.R. (1995) Security Management: Business Strategies for Success, Boston:Butterworth-Heinemann.
  • Cumming N. (1992) Security: A Guide to Security System Design and Equipment Selection and Installation. (2nd.ed), Boston:Butterworth Heinemann.
  • Crowe T.D. (1991) Crime Prevention Through Environmental Design: Applications of Architectural Design and Space Management Concepts, Boston:Butterworth.
  • Cornish, D.B. and Clarke, R.V.G. (1986) The Reasoning Criminal, New York:Springer Verlag.
  • Cooper, M.G.(ed) (1985) Risk: Man-made Hazards to Man, Oxford:Clarendon Press
  • Cohen, A. (1955) Delinquent Boys: The Culture of the Gang, London:Routledge & Keegan Paul.
  • Broder J.F. (1984) Risk Analysis and the Security Survey, Boston:Butterworth Heinnemann.
  • Bennett, T. and Wright, R. (1984) Burglars on Burglary: Prevention and the Offender, Aldershot:Gower
  • Walsh, T.J. and Healy, R.J. (Eds.). (1989). Protection of Assets Manual. Santa Monica CA The Merritt Company.
  • Vold, G.B. and Bernard, J. (1986) Theoretical Criminology, Oxford:Oxford University Press.

Journal References

  • Security Management
  • Security
  • Security Australia
  • Security Gazette

^ Mandatory reference


Disability Standards for Education (Commonwealth 2005)

For the purposes of considering a request for Reasonable Adjustments under the Disability Standards for Education (Commonwealth 2005), inherent requirements for this subject are articulated in the Unit Description, Learning Outcomes and Assessment Requirements of this entry. The University is dedicated to provide support to those with special requirements. Further details on the support for students with disabilities or medical conditions can be found at the Access and Inclusion website.

Academic Misconduct

Edith Cowan University has firm rules governing academic misconduct and there are substantial penalties that can be applied to students who are found in breach of these rules. Academic misconduct includes, but is not limited to:

  • plagiarism;
  • unauthorised collaboration;
  • cheating in examinations;
  • theft of other students' work;

Additionally, any material submitted for assessment purposes must be work that has not been submitted previously, by any person, for any other unit at ECU or elsewhere.

The ECU rules and policies governing all academic activities, including misconduct, can be accessed through the ECU website.

SCY1101|1|2