Faculty of Health, Engineering and Science

School: Computer and Security Science

This unit information may be updated and amended immediately prior to semester. To ensure you have the correct outline, please check it again at the beginning of semester.

  • Unit Title

    Industrial Security Procedures
  • Unit Code

    SCY2402
  • Year

    2015
  • Enrolment Period

    1
  • Version

    1
  • Credit Points

    15
  • Full Year Unit

    N
  • Mode of Delivery


Description

This unit will develop an understanding for the application of security technology, practice and management to securing specific industries. General security issues which will be examined include fraud, workplace violence, substance abuse, legal issues and industrial intelligence/espionage. The unit will consider the security of strategic installation and airports. Other industries which may be discussed include hotels and resorts, banking and finance, transport, retail, entertainment, mining, the petrochemical industry and campus security.

Prerequisite Rule

Students must pass 1 unit from SCY1101

Equivalent Rule

Unit was previously coded SCY4402

Learning Outcomes

On completion of this unit students should be able to:

  1. Apply problem solving techniques in establishing security strategies for the protection of an organisation's assets as part of the security plan.
  2. Define fraud.
  3. Demonstrate an awareness of security issues across a number of industries.
  4. Discuss the implications of substance abuse on an organisation.
  5. Display an interest in the extension of knowledge to improve the quality of security planning.
  6. Explain the difference between industrial intelligence and industrial espionage and be able to discuss the strategies for to secure an organisation against these threats.
  7. Explain the impact of workplace violence on an organisation.
  8. Understand the legal implications of security operations.

Unit Content

  1. Applying Risk management strategies to multiple security operations.
  2. Industrial intelligence and espionage: Definitions combined with measures to counter each of these.
  3. Industry Security Issues: A sample of industries and the security issues which impact on them shall be considered including: hotels and resorts, banking and finance, transport, retail, entertainment, resources, the petrochemical industry and generaal security.
  4. Industry security: Conducting security and risk assessments.
  5. Legal Considerations: Particular legal aspects for security in the community and industry. This will include such things as Investigations, litigation, arrest, imprisonment, privacy issues and human rights
  6. Operational security: Managing and running a mjor security operation.
  7. Strategic Installations: Examine the application of security strategies to a strategic installation. Private and Government sites will be considered. Such sites may include, dams, power stations, research facilities, communications facilities, ports and other sites defined as being of strategic significance to Australia.

Additional Learning Experience Information

Lectures, tutorials, syndicate activities.

Assessment

GS1 GRADING SCHEMA 1 Used for standard coursework units

Students please note: The marks and grades received by students on assessments may be subject to further moderation. All marks and grades are to be considered provisional until endorsed by the relevant Board of Examiners.

ON CAMPUS
TypeDescriptionValue
EssaySecurity assessments20%
AssignmentAssignment30%
ExaminationEnd of semester examination50%

Text References

  • Fay J.J. (ed) (1993). Encyclopedia of security management: Techniques and technology, Boston:Butterworth-Heinemann.
  • Tyska, L.A. & Fennelly, L.J. (1983). Controlling cargo theft: A handbook of transportation security. Boston:Butterworths.
  • St John, P. (1991). Air piracy, air port security and international terrorsim. New Yrok:Quorum Books.
  • Smith, H. (1993). Hotel security. Springfield, Ill.:Charles C Thomas Publications.
  • Sells, D.H. (1993). A practical guide to retail security. New York:Delmar Publishers.
  • Oliver, E. & Wilson, J. (1988). Practical security in commerce and Industry (5th ed.). Hants UK:Gower Press.
  • O'Block, R.L., Donnermeyer, J.F. and Doeren, S.E. (1991). Security and crime prevention (2nd ed.). Boston:Butterworth Heinemann.
  • Purpura, P.P. (1993). Retail security and shrinkage Protection, Boston:Butterworth Heinemann.
  • Pizer, H. &Sloan, S. (1992). Corporate aviation security, Norman, USA:University of Oklahoma Press.
  • Burstein, H. (1985). Hotel security management (2nd ed.). New York:Praeger
  • Colling, R.L. (1982). Hospital security (2nd ed.). Boston:Butterworths.
  • Coster, A.F. (1988). Security in commerce and industry: Controlling loss profit. London:Butterworths.
  • Fennelly, L.J. (ed) (1989). Handbook of loss prevention, Boston:Butterworth Heinemann.
  • Fay, J. (1987). Butterworths security dictionary, Boston:Butterworth Heinemann.
  • Walsh, T.J. & Healy, R.J. (1989). Protection of assets manual. Santa Monica: The Merritt Company
  • Fischer R.J. & Green G. (1992). Introduction to security (5th ed.). Boston:Butterworth Heinemann.
  • Hayes, R. (1991). Retail security and loss prevention, Boston:Butterworth Heinemann.
  • Jones, L.S. (1983). Cargo security: A nuts and bolts approach, Boston:Butterworths.
  • Jones, P.H. (1990). Retail loss control, London:Butterworths.
  • Kecheisen, G.L. (1993). Retail security versus the shoplifter, Springfield, Ill.:Charles C Thomas Publications.

Journal References

  • Malaysian Safety and Security
  • Security
  • Security and Protection Equipment
  • Security Australia
  • The British Journal of Criminology
  • Security management
  • Security Surveyor
  • The Security Journal
  • Security Gazette

Disability Standards for Education (Commonwealth 2005)

For the purposes of considering a request for Reasonable Adjustments under the Disability Standards for Education (Commonwealth 2005), inherent requirements for this subject are articulated in the Unit Description, Learning Outcomes and Assessment Requirements of this entry. The University is dedicated to provide support to those with special requirements. Further details on the support for students with disabilities or medical conditions can be found at the Access and Inclusion website.

Academic Misconduct

Edith Cowan University has firm rules governing academic misconduct and there are substantial penalties that can be applied to students who are found in breach of these rules. Academic misconduct includes, but is not limited to:

  • plagiarism;
  • unauthorised collaboration;
  • cheating in examinations;
  • theft of other students' work;

Additionally, any material submitted for assessment purposes must be work that has not been submitted previously, by any person, for any other unit at ECU or elsewhere.

The ECU rules and policies governing all academic activities, including misconduct, can be accessed through the ECU website.

SCY2402|1|1

Faculty of Health, Engineering and Science

School: Computer and Security Science

This unit information may be updated and amended immediately prior to semester. To ensure you have the correct outline, please check it again at the beginning of semester.

  • Unit Title

    Industrial Security Procedures
  • Unit Code

    SCY2402
  • Year

    2015
  • Enrolment Period

    2
  • Version

    1
  • Credit Points

    15
  • Full Year Unit

    N
  • Mode of Delivery


Description

This unit will develop an understanding for the application of security technology, practice and management to securing specific industries. General security issues which will be examined include fraud, workplace violence, substance abuse, legal issues and industrial intelligence/espionage. The unit will consider the security of strategic installation and airports. Other industries which may be discussed include hotels and resorts, banking and finance, transport, retail, entertainment, mining, the petrochemical industry and campus security.

Prerequisite Rule

Students must pass 1 unit from SCY1101

Equivalent Rule

Unit was previously coded SCY4402

Learning Outcomes

On completion of this unit students should be able to:

  1. Apply problem solving techniques in establishing security strategies for the protection of an organisation's assets as part of the security plan.
  2. Define fraud.
  3. Demonstrate an awareness of security issues across a number of industries.
  4. Discuss the implications of substance abuse on an organisation.
  5. Display an interest in the extension of knowledge to improve the quality of security planning.
  6. Explain the difference between industrial intelligence and industrial espionage and be able to discuss the strategies for to secure an organisation against these threats.
  7. Explain the impact of workplace violence on an organisation.
  8. Understand the legal implications of security operations.

Unit Content

  1. Applying Risk management strategies to multiple security operations.
  2. Industrial intelligence and espionage: Definitions combined with measures to counter each of these.
  3. Industry Security Issues: A sample of industries and the security issues which impact on them shall be considered including: hotels and resorts, banking and finance, transport, retail, entertainment, resources, the petrochemical industry and generaal security.
  4. Industry security: Conducting security and risk assessments.
  5. Legal Considerations: Particular legal aspects for security in the community and industry. This will include such things as Investigations, litigation, arrest, imprisonment, privacy issues and human rights
  6. Operational security: Managing and running a mjor security operation.
  7. Strategic Installations: Examine the application of security strategies to a strategic installation. Private and Government sites will be considered. Such sites may include, dams, power stations, research facilities, communications facilities, ports and other sites defined as being of strategic significance to Australia.

Additional Learning Experience Information

Lectures, tutorials, syndicate activities.

Assessment

GS1 GRADING SCHEMA 1 Used for standard coursework units

Students please note: The marks and grades received by students on assessments may be subject to further moderation. All marks and grades are to be considered provisional until endorsed by the relevant Board of Examiners.

ON CAMPUS
TypeDescriptionValue
EssaySecurity assessments20%
AssignmentAssignment30%
ExaminationEnd of semester examination50%

Text References

  • St John, P. (1991). Air piracy, air port security and international terrorsim. New Yrok:Quorum Books.
  • Smith, H. (1993). Hotel security. Springfield, Ill.:Charles C Thomas Publications.
  • Walsh, T.J. & Healy, R.J. (1989). Protection of assets manual. Santa Monica: The Merritt Company
  • Tyska, L.A. & Fennelly, L.J. (1983). Controlling cargo theft: A handbook of transportation security. Boston:Butterworths.
  • Sells, D.H. (1993). A practical guide to retail security. New York:Delmar Publishers.
  • Oliver, E. & Wilson, J. (1988). Practical security in commerce and Industry (5th ed.). Hants UK:Gower Press.
  • O'Block, R.L., Donnermeyer, J.F. and Doeren, S.E. (1991). Security and crime prevention (2nd ed.). Boston:Butterworth Heinemann.
  • Purpura, P.P. (1993). Retail security and shrinkage Protection, Boston:Butterworth Heinemann.
  • Pizer, H. &Sloan, S. (1992). Corporate aviation security, Norman, USA:University of Oklahoma Press.
  • Kecheisen, G.L. (1993). Retail security versus the shoplifter, Springfield, Ill.:Charles C Thomas Publications.
  • Jones, P.H. (1990). Retail loss control, London:Butterworths.
  • Jones, L.S. (1983). Cargo security: A nuts and bolts approach, Boston:Butterworths.
  • Burstein, H. (1985). Hotel security management (2nd ed.). New York:Praeger
  • Colling, R.L. (1982). Hospital security (2nd ed.). Boston:Butterworths.
  • Coster, A.F. (1988). Security in commerce and industry: Controlling loss profit. London:Butterworths.
  • Fennelly, L.J. (ed) (1989). Handbook of loss prevention, Boston:Butterworth Heinemann.
  • Fay, J. (1987). Butterworths security dictionary, Boston:Butterworth Heinemann.
  • Fay J.J. (ed) (1993). Encyclopedia of security management: Techniques and technology, Boston:Butterworth-Heinemann.
  • Fischer R.J. & Green G. (1992). Introduction to security (5th ed.). Boston:Butterworth Heinemann.
  • Hayes, R. (1991). Retail security and loss prevention, Boston:Butterworth Heinemann.

Journal References

  • Malaysian Safety and Security
  • Security
  • Security and Protection Equipment
  • Security Australia
  • The Security Journal
  • Security management
  • Security Surveyor
  • The British Journal of Criminology
  • Security Gazette

Disability Standards for Education (Commonwealth 2005)

For the purposes of considering a request for Reasonable Adjustments under the Disability Standards for Education (Commonwealth 2005), inherent requirements for this subject are articulated in the Unit Description, Learning Outcomes and Assessment Requirements of this entry. The University is dedicated to provide support to those with special requirements. Further details on the support for students with disabilities or medical conditions can be found at the Access and Inclusion website.

Academic Misconduct

Edith Cowan University has firm rules governing academic misconduct and there are substantial penalties that can be applied to students who are found in breach of these rules. Academic misconduct includes, but is not limited to:

  • plagiarism;
  • unauthorised collaboration;
  • cheating in examinations;
  • theft of other students' work;

Additionally, any material submitted for assessment purposes must be work that has not been submitted previously, by any person, for any other unit at ECU or elsewhere.

The ECU rules and policies governing all academic activities, including misconduct, can be accessed through the ECU website.

SCY2402|1|2