School: Science

This unit information may be updated and amended immediately prior to semester. To ensure you have the correct outline, please check it again at the beginning of semester.

  • Unit Title

    Advances in Security Technology
  • Unit Code

    SCY6115
  • Year

    2016
  • Enrolment Period

    1
  • Version

    1
  • Credit Points

    20
  • Full Year Unit

    N
  • Mode of Delivery

    On Campus
    Online

Description

This unit will examine advances in security technology for the protection of assets for industrial and government facilities. An examination of recent developments in access control, CCTV, perimeter protection and intrusion detection systems will be included. The management of security technology systems and security management systems will be evaluated.

Learning Outcomes

On completion of this unit students should be able to:

  1. Analyse the strengths and weaknesses in security technology systems.
  2. Apply an understanding of the principles of security technology to the design of security systems for asset protection.
  3. Demonstrate an understanding of the principles of operation and function of asset protection technology.
  4. Display evidence of wide and detailed reading on topics studied from references, journals, magazines, and the internet.
  5. Identify the principles underlying the security technology applied to asset protection.

Unit Content

  1. Advances in applications of technology in security.
  2. Camera lens types.
  3. Closed circuit television (CCTV).
  4. Function and application of technology in the protection of assets.
  5. Perimeter and sterile zone intrusion detection technologies.
  6. Recent developments in access control.
  7. Risk management.
  8. The technology and management of access control systems.

Additional Learning Experience Information

Lectures, workshops, seminars, independent learning.

Assessment

GS1 GRADING SCHEMA 1 Used for standard coursework units

Students please note: The marks and grades received by students on assessments may be subject to further moderation. All marks and grades are to be considered provisional until endorsed by the relevant Board of Examiners.

ON CAMPUS
TypeDescriptionValue
Literature ReviewReview of contemporary technologies for use in the protection of assets30%
Research PaperCritical analysis of an emerging technology for the protection of assets30%
Case StudyA case study evaluating the implementation of an advanced technology for the protection of assets40%
ONLINE
TypeDescriptionValue
Literature ReviewReview of contemporary technologies for use in the protection of assets30%
Research PaperCritical analysis of an emerging technology for the protection of assets30%
Case StudyA case study evaluating the implementation of an advanced technology for the protection of assets40%

Text References

  • Proceedings of the International Carnahan Conference on Security Technology, Institute of Electrical and Electronics Engineers.

Journal References

  • Computer Security
  • The Security Journal
  • The British Journal of Criminology
  • Security Surveyor
  • International Journal of Risk, Security and Crime Prevention
  • Security Gazette
  • Security Australia
  • Security and Protection Equipment
  • Malaysian Safety and Security
  • Intersec
  • Computers and Security
  • Security Management

Disability Standards for Education (Commonwealth 2005)

For the purposes of considering a request for Reasonable Adjustments under the Disability Standards for Education (Commonwealth 2005), inherent requirements for this subject are articulated in the Unit Description, Learning Outcomes and Assessment Requirements of this entry. The University is dedicated to provide support to those with special requirements. Further details on the support for students with disabilities or medical conditions can be found at the Access and Inclusion website.

Academic Misconduct

Edith Cowan University has firm rules governing academic misconduct and there are substantial penalties that can be applied to students who are found in breach of these rules. Academic misconduct includes, but is not limited to:

  • plagiarism;
  • unauthorised collaboration;
  • cheating in examinations;
  • theft of other students' work;

Additionally, any material submitted for assessment purposes must be work that has not been submitted previously, by any person, for any other unit at ECU or elsewhere.

The ECU rules and policies governing all academic activities, including misconduct, can be accessed through the ECU website.

SCY6115|1|1

School: Science

This unit information may be updated and amended immediately prior to semester. To ensure you have the correct outline, please check it again at the beginning of semester.

  • Unit Title

    Advances in Security Technology
  • Unit Code

    SCY6115
  • Year

    2016
  • Enrolment Period

    2
  • Version

    1
  • Credit Points

    20
  • Full Year Unit

    N
  • Mode of Delivery

    On Campus
    Online

Description

This unit will examine advances in security technology for the protection of assets for industrial and government facilities. An examination of recent developments in access control, CCTV, perimeter protection and intrusion detection systems will be included. The management of security technology systems and security management systems will be evaluated.

Learning Outcomes

On completion of this unit students should be able to:

  1. Analyse the strengths and weaknesses in security technology systems.
  2. Apply an understanding of the principles of security technology to the design of security systems for asset protection.
  3. Demonstrate an understanding of the principles of operation and function of asset protection technology.
  4. Display evidence of wide and detailed reading on topics studied from references, journals, magazines, and the internet.
  5. Identify the principles underlying the security technology applied to asset protection.

Unit Content

  1. Advances in applications of technology in security.
  2. Camera lens types.
  3. Closed circuit television (CCTV).
  4. Function and application of technology in the protection of assets.
  5. Perimeter and sterile zone intrusion detection technologies.
  6. Recent developments in access control.
  7. Risk management.
  8. The technology and management of access control systems.

Additional Learning Experience Information

Lectures, workshops, seminars, independent learning.

Assessment

GS1 GRADING SCHEMA 1 Used for standard coursework units

Students please note: The marks and grades received by students on assessments may be subject to further moderation. All marks and grades are to be considered provisional until endorsed by the relevant Board of Examiners.

ON CAMPUS
TypeDescriptionValue
Literature ReviewReview of contemporary technologies for use in the protection of assets30%
Research PaperCritical analysis of an emerging technology for the protection of assets30%
Case StudyA case study evaluating the implementation of an advanced technology for the protection of assets40%
ONLINE
TypeDescriptionValue
Literature ReviewReview of contemporary technologies for use in the protection of assets30%
Research PaperCritical analysis of an emerging technology for the protection of assets30%
Case StudyA case study evaluating the implementation of an advanced technology for the protection of assets40%

Text References

  • Proceedings of the International Carnahan Conference on Security Technology, Institute of Electrical and Electronics Engineers.

Journal References

  • Computer Security
  • The Security Journal
  • The British Journal of Criminology
  • Security Surveyor
  • International Journal of Risk, Security and Crime Prevention
  • Security Gazette
  • Security Australia
  • Security and Protection Equipment
  • Malaysian Safety and Security
  • Intersec
  • Computers and Security
  • Security Management

Disability Standards for Education (Commonwealth 2005)

For the purposes of considering a request for Reasonable Adjustments under the Disability Standards for Education (Commonwealth 2005), inherent requirements for this subject are articulated in the Unit Description, Learning Outcomes and Assessment Requirements of this entry. The University is dedicated to provide support to those with special requirements. Further details on the support for students with disabilities or medical conditions can be found at the Access and Inclusion website.

Academic Misconduct

Edith Cowan University has firm rules governing academic misconduct and there are substantial penalties that can be applied to students who are found in breach of these rules. Academic misconduct includes, but is not limited to:

  • plagiarism;
  • unauthorised collaboration;
  • cheating in examinations;
  • theft of other students' work;

Additionally, any material submitted for assessment purposes must be work that has not been submitted previously, by any person, for any other unit at ECU or elsewhere.

The ECU rules and policies governing all academic activities, including misconduct, can be accessed through the ECU website.

SCY6115|1|2