Faculty of Health, Engineering and Science
School: Computer and Security Science
This unit information may be updated and amended immediately prior to semester. To ensure you have the correct outline, please check it again at the beginning of semester.
Unit Title
Management of the Security Function
Unit Code
SCY3302
Year
2015
Enrolment Period
1
Version
1
Credit Points
15
Full Year Unit
N
Mode of Delivery
Description
This unit will develop an understanding of managing the security function and is a capstone unit for the security major. Legal framework and the security managers role in managing crises will be examined. Security management planning will be discussed and tools such as PEST and SWOT will be covered as part of developing the planning process. Security intelligence will be introduced as a decision making tool and security investigations and their management will be discussed.
Prerequisite Rule
Students must pass 2 units from SCY1101, SCY2302
Equivalent Rule
Unit was previously coded SCY4206
Learning Outcomes
On completion of this unit students should be able to:
- Apply problem solving techniques in establishing security strategies for the protection of an organisation's assets as part of the security plan.
- Design a security organisation and implement appropriate management structures.
- Discuss managing a crisis and the security managers role in managing a crisis.
- Discuss security intelligence and its utility as a decision making tool.
- Display an interest in the extension of knowledge to improve the quality of security planning.
- Understand security investigations and how they should be managed, including personnel security investigations and post incident analysis.
- Understand the implications of litigation and how security policy and procedures can limit an organisation's risk exposure to litigation.
- Understand the role of security in crime scene protection and the protection and gathering of evidence.
Unit Content
- Crisis Management : Introduction to managing a crisis and implementing a crisis management plan, staffing, logistics, critical incident stress management, training, evaluating the plan and the importance of post incident analysis.
- Establishing the security function: Developing a security department, staffing, organisation culture and structure, contract versus proprietary staff and systems.
- Investigations: Security versus criminal investigations, conducting an investigation, interviews, managing investigations, legal issues.
- Law: An examination of law as it impact on the management of the security function. This will include tortious issues, false arrest and imprisonment, litigation, privacy, motions for discovery, subpoena of information and data, and contractual requirements by a third party for security.
- Legal framework: An examination of the different types of law and the court system as it applies to Australia. Differences between criminal and civil law, criminal and civil remedies, including damages and equitable remedies
- Managing security: Discusses issues in security management such as the use of CCTV, advances in risk management, IT support to security managers. and the application of management principles to the security function.
- Security Planning: The role of policy and procedures, education and awareness, the use of planning tools including SWOT and PEST.
- Security intelligence: The intelligence cycle and security intelligence will be defined, the application of security intelligence, and managing security intelligence.
Additional Learning Experience Information
Lectures, tutorials, syndicate activities.
Assessment
GS1 GRADING SCHEMA 1 Used for standard coursework units
Students please note: The marks and grades received by students on assessments may be subject to further moderation. All marks and grades are to be considered provisional until endorsed by the relevant Board of Examiners.
ON CAMPUSType | Description | Value |
---|
Essay | Essay on security management issues | 30% |
Assignment | Critical review of security management | 30% |
Examination | Final Examination | 40% |
ONLINEType | Description | Value |
---|
Essay | Essay on security management issues | 30% |
Assignment | Critical review of security management | 30% |
Examination | Final Examination | 40% |
Text References
- ^ Sennewald, C. (2011). Effective security management. (5th ed). Boston : Butterworth-Heinmann
Journal References
- The Security Journal
- The British Journal of Criminology
- Security Surveyor
- Security Management
- Security Australia
- Security and Protection Equipment
- Security
- Malaysian Safety and Security
- Current Law
- Intersec
- Security Gazette
^ Mandatory reference
Disability Standards for Education (Commonwealth 2005)
For the purposes of considering a request for Reasonable Adjustments under the Disability Standards for Education (Commonwealth 2005), inherent requirements for this subject are articulated in the Unit Description, Learning Outcomes and Assessment Requirements of this entry. The University is dedicated to provide support to those with special requirements. Further details on the support for students with disabilities or medical conditions can be found at the Access and Inclusion website.
Academic Misconduct
Edith Cowan University has firm rules governing academic misconduct and there are substantial penalties that can be applied to students who are found in breach of these rules. Academic misconduct includes, but is not limited to:
- plagiarism;
- unauthorised collaboration;
- cheating in examinations;
- theft of other students' work;
Additionally, any material submitted for assessment purposes must be work that has not been submitted previously, by any person, for any other unit at ECU or elsewhere.
The ECU rules and policies governing all academic activities, including misconduct, can be accessed through the ECU website.
SCY3302|1|1
Faculty of Health, Engineering and Science
School: Computer and Security Science
This unit information may be updated and amended immediately prior to semester. To ensure you have the correct outline, please check it again at the beginning of semester.
Unit Title
Management of the Security Function
Unit Code
SCY3302
Year
2015
Enrolment Period
2
Version
1
Credit Points
15
Full Year Unit
N
Mode of Delivery
Description
This unit will develop an understanding of managing the security function and is a capstone unit for the security major. Legal framework and the security managers role in managing crises will be examined. Security management planning will be discussed and tools such as PEST and SWOT will be covered as part of developing the planning process. Security intelligence will be introduced as a decision making tool and security investigations and their management will be discussed.
Prerequisite Rule
Students must pass 2 units from SCY1101, SCY2302
Equivalent Rule
Unit was previously coded SCY4206
Learning Outcomes
On completion of this unit students should be able to:
- Apply problem solving techniques in establishing security strategies for the protection of an organisation's assets as part of the security plan.
- Design a security organisation and implement appropriate management structures.
- Discuss managing a crisis and the security managers role in managing a crisis.
- Discuss security intelligence and its utility as a decision making tool.
- Display an interest in the extension of knowledge to improve the quality of security planning.
- Understand security investigations and how they should be managed, including personnel security investigations and post incident analysis.
- Understand the implications of litigation and how security policy and procedures can limit an organisation's risk exposure to litigation.
- Understand the role of security in crime scene protection and the protection and gathering of evidence.
Unit Content
- Crisis Management : Introduction to managing a crisis and implementing a crisis management plan, staffing, logistics, critical incident stress management, training, evaluating the plan and the importance of post incident analysis.
- Establishing the security function: Developing a security department, staffing, organisation culture and structure, contract versus proprietary staff and systems.
- Investigations: Security versus criminal investigations, conducting an investigation, interviews, managing investigations, legal issues.
- Law: An examination of law as it impact on the management of the security function. This will include tortious issues, false arrest and imprisonment, litigation, privacy, motions for discovery, subpoena of information and data, and contractual requirements by a third party for security.
- Legal framework: An examination of the different types of law and the court system as it applies to Australia. Differences between criminal and civil law, criminal and civil remedies, including damages and equitable remedies
- Managing security: Discusses issues in security management such as the use of CCTV, advances in risk management, IT support to security managers. and the application of management principles to the security function.
- Security Planning: The role of policy and procedures, education and awareness, the use of planning tools including SWOT and PEST.
- Security intelligence: The intelligence cycle and security intelligence will be defined, the application of security intelligence, and managing security intelligence.
Additional Learning Experience Information
Lectures, tutorials, syndicate activities.
Assessment
GS1 GRADING SCHEMA 1 Used for standard coursework units
Students please note: The marks and grades received by students on assessments may be subject to further moderation. All marks and grades are to be considered provisional until endorsed by the relevant Board of Examiners.
ON CAMPUSType | Description | Value |
---|
Essay | Essay on security management issues | 30% |
Assignment | Critical review of security management | 30% |
Examination | Final Examination | 40% |
ONLINEType | Description | Value |
---|
Essay | Essay on security management issues | 30% |
Assignment | Critical review of security management | 30% |
Examination | Final Examination | 40% |
Text References
- ^ Sennewald, C. (2011). Effective security management. (5th ed). Boston : Butterworth-Heinmann
Journal References
- The Security Journal
- The British Journal of Criminology
- Security Surveyor
- Security Management
- Security Australia
- Security and Protection Equipment
- Security
- Malaysian Safety and Security
- Current Law
- Intersec
- Security Gazette
^ Mandatory reference
Disability Standards for Education (Commonwealth 2005)
For the purposes of considering a request for Reasonable Adjustments under the Disability Standards for Education (Commonwealth 2005), inherent requirements for this subject are articulated in the Unit Description, Learning Outcomes and Assessment Requirements of this entry. The University is dedicated to provide support to those with special requirements. Further details on the support for students with disabilities or medical conditions can be found at the Access and Inclusion website.
Academic Misconduct
Edith Cowan University has firm rules governing academic misconduct and there are substantial penalties that can be applied to students who are found in breach of these rules. Academic misconduct includes, but is not limited to:
- plagiarism;
- unauthorised collaboration;
- cheating in examinations;
- theft of other students' work;
Additionally, any material submitted for assessment purposes must be work that has not been submitted previously, by any person, for any other unit at ECU or elsewhere.
The ECU rules and policies governing all academic activities, including misconduct, can be accessed through the ECU website.
SCY3302|1|2