Table of Contents

Size: px
Start display at page:

Download "Table of Contents"

Transcription

1 School: School of Public Service and Health Program Name: Security Management Course Number: SCMT395 Course Bane: Walmart / Sam s Asset Protection Managers Integration Course Credit Hours: Special Course Length of Course: 16 Weeks Prerequisites: Instructor Information Instructor: Course Description (Catalog) This course is open only to Walmart or Sam's Club market asset protection managers either currently serving or those having served in the past as validated on the Career Portfolio. This course is designed to integrate theories, best practices, and case studies with practical application in the areas of human relations, public speaking, security issues and administration, physical security, crime analysis, commercial safety, talent management and risk management. Competency based assessment of job learning demonstrates that students taking this course have inherent practical and applied knowledge in all of these areas. The course will provide coverage in gaps in theories and will include specific required readings. On successful completion of this course, students will be awarded transfer credit for the designated courses for their position in the subject areas above. Course Scope This course is designed to provide learners a vehicle to demonstrate experiential learning in 10 specific content areas that include:

2 1. Principles and Theory of Security Management 2. Public Speaking 3. Security Administration 4. Talent Management 5. Management Ethics 6. Risk Management 7. Crime Analysis 8. Human Relations 9. Commercial Safety 10. Physical Security Course Objectives After successfully completing this course, you will be able to Analyze the principles of organizing the security function through physical, personnel, and information security. Demonstrate the importance of public speaking in management through the development and delivery of speeches and presentations. Apply best practices of effective scheduling and daily security operating procedures. Distinguish the principles and techniques for talent identification, employee development and retention, leadership development, and succession planning. Develop managerial moral and ethical responsibilities for proper conduct inside and outside of the business enterprise. Distinguish between risk situations and create management concepts, techniques, and policies for mitigating risk and protecting the company bottom line. Relate the fundamentals of crime analysis and its application to the retail environment.

3 Practice interpersonal skills and specific features of cognition, personality, and intelligence that encompass human behavior in work settings. Identify the commercial safety environment and assess various trends in commercial safety, including characteristics of a safe work environment and mitigation strategies of potential safety risks. Illustrate the effective use of physical security measures including lighting, barriers, containers, and physical design in the retail environment. Course Delivery Method This course delivered via distance learning will enable students to complete academic work in a flexible manner, completely online. Course materials and access to an online learning management system will be made available to each student. Online assignments are due by Sunday evening of the week as noted and include Forum questions (accomplished in groups through a threaded forum), examination, and individual assignments submitted for review by the Faculty Member). Assigned faculty will support the students throughout this eight-week course. Course Resources Required Course Textbook: Fischer, R., Green G. & Halibozek, E. (2008). Introduction to security. Burlington, MA: Butterworth-Heinemann. Required Readings: Located in Resources section of the classroom. Additional Resources Web Sites In addition to the required course texts, the following public domain web sites are useful. Please abide by the university s academic honesty policy when using Internet sources as well. Note web site addresses are subject to change.

4 Site Name APA Style Guide How to Tips on Writing a Good Essay Tips on Grammar, Punctuation, and Style Time Management for College Students Evaluation Procedures Web Site URL/Address Forums: There are sixteen forums each worth 3.13 points for a total possible of 50 points. Portfolio: There are 11 portfolio tasks (also located in forums). The first portfolio is worth 1.92 points while the rest are worth 4.81 points each for a total of 50 points. Exams/Quizzes: Grade Instrument Points Portfolio Forums Total Week Course Outline Week Topic Learning Objectives Readings Assignments Principles and LO1 - Examine the Forum #1

5 1 STUDENT WARNING: This course syllabus is from a previous semester archive and serves only as a preparatory Theory of Security Issues history and development of security in the United States; LO2 - Outline the origins and development of security and define security s role; Fischer, Halibozek, Green, Chapters 1-3 Portfolio #1 LO3 -Relate how homeland security has changed the emphasis on security in the United States; LO4 - Discuss the application of knowledge for the future. Principles and Theory of Security Issues LO1 - Define terrorism and identify the various terrorist threats targeting the United States; Chapters Forum #2 Portfolio #2 2 LO2 - Discuss options for protecting computers and information from fraudulent use and theft; LO3 - Choose the top three security threats of the 21 st Century and discuss the future of the security industry;

6 LO4 - Discuss two ways for applying knowledge learned for the future. Public Speaking LO1 - Identify two concepts associated with public speaking; LO2 - Discuss two personal experiences associated with public speaking; Text Readings: 1) Selling Yourself & Your Forum #3 Portfolio #3 3 LO3 - Give two examples past or present experiences with managerial communications; Ideas to Senior Management: Polish Up Your Public Speaking Skills in Advance. LO4 - Discuss two ways of applying knowledge learned for the future; LO5 - Demonstrate public speaking knowledge in the form of a writing assignment. 2) Sample speech outline (available in Resources under Handouts) Security Administration LO1 - Identify the nine functions of effective security organization; Chapter 4 Forum #4 4 LO2 - Discuss the role of the Chief Security Officer (CSO) in an organization; LO3 - Determine the 1) Crisp Report Organized Retail Crime, Assessing the Risk and Developing Effective

7 problems that organized retail crime presents to retail organizations; LO4 - Present three solutions for preventing organized retail crime. Strategies ASIS Foundation 5 Security Administration LO1 - Discuss three challenges caused by fatigue in 24 hour security operations; LO2 - Provide two countermeasures for combatting fatigue in shift work; LO3 - Examine the role of the budget process in the security organization s mission and operation. 1) Crisp Report Fatigue Effects and Countermeasures in 24/7 Security Operations ASIS Foundation 2) The Heritage Foundation Report The FY 2011 Homeland Security Budget: Spending Doesn t Match the Missions Forum #5 Portfolio #4 6 Talent Management LO1 - Identify key concepts and challenges associated with talent identification; Forum #6 LO2 - Examine the laws 1) Employee Loyalty: An

8 and regulations pertaining to background screening; LO3 - Discuss strategies for employee retention; LO4 - Discuss application of knowledge for the future. exploration of staff commitment levels towards retailing, the retailer and the store. 2) Retaining Talent: Replacing Misconceptions with Evidence-based Strategies 3) Preemployment Background Screening Guideline, ASIS International Talent Management LO1 - Identify key concepts associated with leadership development; Forum #7 Portfolio #5 7 LO2 - Discuss best practices for leading the four generations at work in America today; LO3 - Give examples of successful strategies for succession planning. 1)Leading Multiple Generations by Joel DiGirolamo 2)Leadership The Five Big Ideas by Robert J. Allio 3)Succession Planning An Evolution Into Talent Management by Ren Nardoni

9 Management Ethics LO1 - Analyze key constructs of ethical business decisions; Forum #8 LO2- Determine the relationship between ethics and moral and social responsibility; 1) The Relevance of Responsibility to Ethical 8 Lo3- Discuss application knowledge for the future. Business Decisions by Murphy 2) A Survey of Manager s Perceptions of Corporate Ethics and Social Responsibility and Actions that may Affect Companies Success by Cacioppe, Forster and Fox 9 Management Ethics LO1 - Analyze a business ethics case study; LO2 - Share reactions to the case and identify the ethical issues; LO3 - Discuss the ethical issues involved in the case; LO 4 -Discuss application of 1) The Recalcitrant Director of Byte Electronics, Inc, Case Study 2) Ethical dilemmas in retail merchandising by Forum #9 Portfolio #6

10 knowledge for the future; Paulins and Lombardy 10 Risk Management LO1 - Evaluate key retail merchandizing operations and risk prevention; LO2 - Discuss key terms associated with retail merchandizing operations and risk management; LO3 - Describe experiential knowledge with retail merchandizing ops and risk management; LO4 - Identify the basic fundamentals of supply chain security; Chapter 8 1) Risk Management Why and How by George L. Head, PhD 2) How To Improve Supply Chain Security by Lauren Paul 3) Supply Chain Security: Best Practices Build Success by Peter Cheviot Forum #10 LO5 - Integrate knowledge of retail security for present and future situations. 11 Risk Management LO1 - Evaluate key retail merchandizing operations and risk prevention; LO2 - Discuss key terms associated with retail merchandizing 1)Accenture Risk Management Retail Forum #11 Portfolio #7

11 operations and risk management; Industry Report LO3 - Describe experiential knowledge with retail merchandizing ops and risk management; 2)ASIS General Security Risk Assessment Guideline LO4 - Integrate knowledge of retail for present and future situations. Crime Analysis LO1) Identify the fundamentals of crime pattern analysis; Chapter 16 Forum #12 Portfolio #8 LO2 - Discuss the techniques used by analysts in the investigation process; 1) Identifying Crime Patterns 12 LO3 - Cite the purpose and uses of geographic information systems in crime analysis. 2) Crime Pattern Analysis and the Security Director: A Primer by Steve Ballantyne 3) Geographic Information Systems (GIS) and Crime Analysis in Baltimore County by Philip Canter s.com/articles/identifyingcri mepatterns.pdf 13 Human LO1 - Identify and Forum #13

12 Relations analyze effective interpersonal skills and specific features of cognition, personality and intelligence necessary for understanding human behavior in a work setting; LO2 - Analyze motivational climate in work situations and apply appropriate motivation strategies; LO3 - Evaluate leadership traits and strategies for handling workplace challenges. 1) Personalities at Work: Understanding and Managing Human Nature on the Job by Laurence Miller, PhD 2) Healthy and Happy, A Healthy Workplace Culture by Carol Spiers 3) Thinking Strategically about Workplace Bullying in Organizations by Ruth McKay, Cristina Ciocirlan and Ed Chung Portfolio #9 14 Commercial Safety LO1 - Define and Identify trends in commercial workplace safety; LO2 - Explore approaches to commercial workplace strategies; Chapter 13 1) OSHA Pocket Guide: Worker Safety Series: Warehousing Forum #14 Portfolio #10 LO3 - Define characteristics of a safe work environment; 2) Predicting Safety Related Attitudes in the Workplace: The Influence of Moral Maturity and Emotional Intelligence by Francis L.

13 Jeffries LO4 - Examine the manager s role in driving safety compliance to sustain brand image. 3) Focus on: Risk Management Don t let costly slip and fall injuries trip you up by Vern Putz Anderson and Barbara Mulhern Physical Security LO1 - Demonstrate knowledge of the influence of physical design, risk assessment and management, designing security with architects and via security surveys Chapter 9, 10, 14 Forum #15 15 LO2 - Illustrate the principles of effective CCTV, surveillance and digital recording LO3 - Examine the functions of security containers and storage areas and describe the successful use of security lighting. LO4 - Appraise the basics of successful cargo security. 16 Physical Security LO1 - Analyze efficient use of intrusion detection systems, and entry control; LO2 - Give examples of Chapter 11, 13 Forum #16 Portfolio #11

14 locks used in a physical crime prevention 1) ASIS Facilities Physical environment; LO3 - Compare the different types of alarm systems; LO4 - Identify strategies to manage employee honesty. Security Measures Guidelines Policies Please see the Student Handbook to reference all University policies. Quick links to frequently asked question about policies are listed below. Drop/Withdrawal Policy Plagiarism Policy Extension Process and Policy Disability Accommodations Writing Expectations All written submissions should be submitted in a font and page set-up that is readable and neat. It is recommended that students try to adhere to a consistent format, which is described below. Typewritten in double-spaced format with a readable style and font and submitted inside the electronic classroom (unless classroom access is not possible and other arrangements have been approved by the professor). Arial 11 or 12-point font or Times New Roman styles. Page margins Top, Bottom, Left Side and Right Side = 1 inch, with reasonable accommodation being made for special situations and online submission variances. Citation and Reference Style Attention Please: Students will follow the Publication Manual of the American Psychological Association (6th ed.) as the sole citation and reference style used in written work submitted as part of coursework to the University. Assignments completed in a narrative essay or composition format must follow the citation style cited in the aforementioned.

15 Publication Manual of the American Psychological Association (6 th ed.). (2009). Washington, D.C.: American Psychological Association. Late Assignments Students are expected to submit classroom assignments by the posted due date and to complete the course according to the published class schedule. As adults, students, and working professionals, I understand you must manage competing demands on your time. Should you need additional time to complete an assignment, please contact me before the due date so we can discuss the situation and determine an acceptable resolution. Routine submission of late assignments is unacceptable and may result in points deducted from your final course grade. Netiquette Online universities promote the advancement of knowledge through positive and constructive debate both inside and outside the classroom. Forums on the Internet, however, can occasionally degenerate into needless insults and flaming. Such activity and the loss of good manners are not acceptable in a university setting basic academic rules of good behavior and proper Netiquette must persist. Remember that you are in a place for the rewards and excitement of learning which does not include descent to personal attacks or student attempts to stifle the Forum of others. Technology Limitations: While you should feel free to explore the full-range of creative composition in your formal papers, keep layouts simple. The Sakai classroom may not fully support MIME or HTML encoded messages, which means that bold face, italics, underlining, and a variety of color-coding or other visual effects will not translate in your messages. Humor Note: Despite the best of intentions, jokes and especially satire can easily get lost or taken seriously. If you feel the need for humor, you may wish to add emoticons to help alert your readers: ;-), : ), Disclaimer Statement Course content may vary from the outline to meet the needs of this particular group. Online Library

16 The Online Library is available to enrolled students and faculty from inside the electronic campus. This is your starting point for access to online books, subscription periodicals, and Web resources that are designed to support your classes and generally not available through search engines on the open Web. In addition, the Online Library provides access to special learning resources, which the University has contracted to assist with your studies. Questions can be directed to Charles Town Library and Inter Library Loan: The University maintains a special library with a limited number of supporting volumes, collection of our professors publication, and services to search and borrow research books and articles from other libraries. Electronic Books: You can use the online library to uncover and download over 50,000 titles, which have been scanned and made available in electronic format. Electronic Journals: The University provides access to over 12,000 journals, which are available in electronic form and only through limited subscription services. Tutor.com: AMU and APU Civilian & Coast Guard students are eligible for 10 free hours of tutoring provided by APUS. Tutor.com connects you with a professional tutor online 24/7 to provide help with assignments, studying, test prep, resume writing, and more. Tutor.com is tutoring the way it was meant to be. You get expert tutoring whenever you need help, and you work one-to-one with your tutor in your online classroom on your specific problem until it is done. Request a Library Guide for your course ( The AMU/APU Library Guides provide access to collections of trusted sites on the Open Web and licensed resources on the Deep Web. The following are specially tailored for academic research at APUS: Program Portals contain topical and methodological resources to help launch general research in the degree program. To locate, search by department name, or navigate by school. Course Lib-Guides narrow the focus to relevant resources for the corresponding course. To locate, search by class code (e.g., SOCI111), or class name. If a guide you need is not available yet, please the APUS Library: librarian@apus.edu. Turnitin.com Turnitin.com is a web-based plagiarism prevention application licensed, for campus use, through the APUS Online Library. The quick submit option lets faculty upload and check suspicious papers, without requiring student to create their own Turnitin.com profiles.

17 Turnitin.com analyzes electronic submissions of student writing, compares them to the contents of a huge online database, and generates a customized Originality Report. The database used to produce this analysis contains a massive collection of documents available on the Internet from both free and commercial sources, as well as the full texts of all other papers that have been previously submitted to Turnitin.com. Similarity index is based on the amount of matching text to a submitted paper: Blue = Green = Yellow = Orange = Red = no matching text one word to 24% matching 25-49% matching text 50-74% matching text % matching text Selected Bibliography Web Based Supplemental Resources American Society for Industrial Security Security Focus Corporate Security Resources National Retail Federation Last update 6 December 2012