School: Science
This unit information may be updated and amended immediately prior to semester. To ensure you have the correct outline, please check it again at the beginning of semester.
Unit Title
Security Project 2
Unit Code
SCY3207
Year
2016
Enrolment Period
1
Version
1
Credit Points
15
Full Year Unit
N
Mode of Delivery
On Campus
Online
Description
This unit will provide the participant with the principles which underpin the capacity to conduct independent research in a security work related environment. Participants will plan and undertake an individual project concerned with security science or the application or management of security technology in the work place. The project will require the participant to be involved in the research relevant to the security sector, and the project topic should involve the planning of an actual investigation of the situation.
Prerequisite Rule
Students must pass 1 unit from SCY3215
Equivalent Rule
Unit was previously coded SCY3216
Learning Outcomes
On completion of this unit students should be able to:
- Conduct a literature review of studies relevant to the project.
- Conduct the project according to the Feasibility Report.
- Define a problem to be investigated as a project.
- Prepare the final report of the project.
- Present a seminar on the study.
- Propose a method for the project.
- Review the relevant background and theory for the project.
- Specify aims and objectives of the project.
Unit Content
- A formal final report will be presented for assessment as the output of the research project. Participants will present the Report according the structure discussed in the development of the project. The Final Report represents the communication phase of the research process.
- Conduct the project according to the approved approach stated in the Feasibility Report. Participants will be encouraged to follow the planning of the Feasibility Report and to include best practice in implementing the method of the project.
- Extend the development of the literature review of the study that was commenced in the unit Security Project 1.
- Present a seminar on the investigation of the Security Project.
- Review the Feasibility Report developed in the unit Security Project 1.
Additional Learning Experience Information
Lectures, tutorials, syndicate activities, and independent learning.
Assessment
GS1 GRADING SCHEMA 1 Used for standard coursework units
Students please note: The marks and grades received by students on assessments may be subject to further moderation. All marks and grades are to be considered provisional until endorsed by the relevant Board of Examiners.
ON CAMPUSType | Description | Value |
---|
Presentation | Project Seminar presentation | 30% |
Report | Final Report | 70% |
ONLINEType | Description | Value |
---|
Presentation | Project Seminar presentation | 30% |
Report | Final Report | 70% |
Text References
- Walsh, T.J., & Healy, R.J. (1989). Protection of assets manual, Santa Monica: The Merritt Company.
- Cumming N. (1992). Security: A guide to security system design and equipment selection and installation (2nd ed.). Boston:Butterworth Heinemann.
- Fay, J. (1987). Butterworths security dictionary, Boston: Butterworth Heinemann.
- Fay J.J. (ed) (1993). Encyclopedia of security management: Techniques and technology, Boston: Butterworth-Heinemann.
- Fennelly, L.J. (1997). Effective physical security (2nd ed.). Boston: Butterworth-Heinemann.
- Fischer R.J., & Green G. (1998) . Effective physical security (2nd ed.). Boston: Butterworth-Heinemann.
- Fischer R.J., & Green G. (1998) Introduction to security (6th ed.). Boston: Butterworth-Heinemann.
- Garcia, M.L. (2001). The design and evaluation of physical protection systems. Boston: Butterworth-Heinemann.
- Kruegle, H. (1995). CCTV surveillance video practices and technology. Boston: Butterworth-Heinemann.
- National Crime Prevention Institute (1987). The use of locks in physical crime prevention, Boston:Butterworth-Heinemann.
- Crowe T.D. (1991). Crime prevention through environmental design: Applications of architectural design and space management concepts, Boston:Butterworth.
Journal References
- Intersec
- Malaysian Safety and Security
- Security
- Security and Protection Equipment
- The Security Journal
- Security Gazette
- Security Management
- Security Surveyor
- The British Journal of Criminology
- Security Australia
Disability Standards for Education (Commonwealth 2005)
For the purposes of considering a request for Reasonable Adjustments under the Disability Standards for Education (Commonwealth 2005), inherent requirements for this subject are articulated in the Unit Description, Learning Outcomes and Assessment Requirements of this entry. The University is dedicated to provide support to those with special requirements. Further details on the support for students with disabilities or medical conditions can be found at the Access and Inclusion website.
Academic Misconduct
Edith Cowan University has firm rules governing academic misconduct and there are substantial penalties that can be applied to students who are found in breach of these rules. Academic misconduct includes, but is not limited to:
- plagiarism;
- unauthorised collaboration;
- cheating in examinations;
- theft of other students' work;
Additionally, any material submitted for assessment purposes must be work that has not been submitted previously, by any person, for any other unit at ECU or elsewhere.
The ECU rules and policies governing all academic activities, including misconduct, can be accessed through the ECU website.
SCY3207|1|1
School: Science
This unit information may be updated and amended immediately prior to semester. To ensure you have the correct outline, please check it again at the beginning of semester.
Unit Title
Security Project 2
Unit Code
SCY3207
Year
2016
Enrolment Period
2
Version
1
Credit Points
15
Full Year Unit
N
Mode of Delivery
On Campus
Online
Description
This unit will provide the participant with the principles which underpin the capacity to conduct independent research in a security work related environment. Participants will plan and undertake an individual project concerned with security science or the application or management of security technology in the work place. The project will require the participant to be involved in the research relevant to the security sector, and the project topic should involve the planning of an actual investigation of the situation.
Prerequisite Rule
Students must pass 1 unit from SCY3215
Equivalent Rule
Unit was previously coded SCY3216
Learning Outcomes
On completion of this unit students should be able to:
- Conduct a literature review of studies relevant to the project.
- Conduct the project according to the Feasibility Report.
- Define a problem to be investigated as a project.
- Prepare the final report of the project.
- Present a seminar on the study.
- Propose a method for the project.
- Review the relevant background and theory for the project.
- Specify aims and objectives of the project.
Unit Content
- A formal final report will be presented for assessment as the output of the research project. Participants will present the Report according the structure discussed in the development of the project. The Final Report represents the communication phase of the research process.
- Conduct the project according to the approved approach stated in the Feasibility Report. Participants will be encouraged to follow the planning of the Feasibility Report and to include best practice in implementing the method of the project.
- Extend the development of the literature review of the study that was commenced in the unit Security Project 1.
- Present a seminar on the investigation of the Security Project.
- Review the Feasibility Report developed in the unit Security Project 1.
Additional Learning Experience Information
Lectures, tutorials, syndicate activities, and independent learning.
Assessment
GS1 GRADING SCHEMA 1 Used for standard coursework units
Students please note: The marks and grades received by students on assessments may be subject to further moderation. All marks and grades are to be considered provisional until endorsed by the relevant Board of Examiners.
ON CAMPUSType | Description | Value |
---|
Presentation | Project Seminar presentation | 30% |
Report | Final Report | 70% |
ONLINEType | Description | Value |
---|
Presentation | Project Seminar presentation | 30% |
Report | Final Report | 70% |
Text References
- Walsh, T.J., & Healy, R.J. (1989). Protection of assets manual, Santa Monica: The Merritt Company.
- Cumming N. (1992). Security: A guide to security system design and equipment selection and installation (2nd ed.). Boston:Butterworth Heinemann.
- Fay, J. (1987). Butterworths security dictionary, Boston: Butterworth Heinemann.
- Fay J.J. (ed) (1993). Encyclopedia of security management: Techniques and technology, Boston: Butterworth-Heinemann.
- Fennelly, L.J. (1997). Effective physical security (2nd ed.). Boston: Butterworth-Heinemann.
- Fischer R.J., & Green G. (1998) . Effective physical security (2nd ed.). Boston: Butterworth-Heinemann.
- Fischer R.J., & Green G. (1998) Introduction to security (6th ed.). Boston: Butterworth-Heinemann.
- Garcia, M.L. (2001). The design and evaluation of physical protection systems. Boston: Butterworth-Heinemann.
- Kruegle, H. (1995). CCTV surveillance video practices and technology. Boston: Butterworth-Heinemann.
- National Crime Prevention Institute (1987). The use of locks in physical crime prevention, Boston:Butterworth-Heinemann.
- Crowe T.D. (1991). Crime prevention through environmental design: Applications of architectural design and space management concepts, Boston:Butterworth.
Journal References
- Intersec
- Malaysian Safety and Security
- Security
- Security and Protection Equipment
- The Security Journal
- Security Gazette
- Security Management
- Security Surveyor
- The British Journal of Criminology
- Security Australia
Disability Standards for Education (Commonwealth 2005)
For the purposes of considering a request for Reasonable Adjustments under the Disability Standards for Education (Commonwealth 2005), inherent requirements for this subject are articulated in the Unit Description, Learning Outcomes and Assessment Requirements of this entry. The University is dedicated to provide support to those with special requirements. Further details on the support for students with disabilities or medical conditions can be found at the Access and Inclusion website.
Academic Misconduct
Edith Cowan University has firm rules governing academic misconduct and there are substantial penalties that can be applied to students who are found in breach of these rules. Academic misconduct includes, but is not limited to:
- plagiarism;
- unauthorised collaboration;
- cheating in examinations;
- theft of other students' work;
Additionally, any material submitted for assessment purposes must be work that has not been submitted previously, by any person, for any other unit at ECU or elsewhere.
The ECU rules and policies governing all academic activities, including misconduct, can be accessed through the ECU website.
SCY3207|1|2