Degree | Type | Year | Semester |
---|---|---|---|
2502501 Prevention and Integral Safety and Security | OB | 1 | 2 |
This subject doesn´t have any pre-requierments.
Differentiate and define security systems, such as electronic, physical and human elements, in the latter with special attention to learning men and women with respect and equality without prejudice to gender, installed and deployed in a facility to protect people and property before the different risks that can affect them.
Knowing the regulatory framework that regulates security technologies, and their relationship with the sectors of public security and private security.
Know the different electronic security devices that are marketed, installed, and maintained for the design of comprehensive security plans.
On the other hand, to know the existing physical security systems and how they are combined with electronic security systems to minimize the different risks to which the installation we wish to protect may be exposed.
Basic normative framework of Security Technologies.
• Theoretical classes.
• Practical classes and resolution of practical cases.
• Reading and seminars:
• Debates and discussion forums.
• Oral presentation of work in the classroom.
• Completion of works / projects / reports.
• Study for the exam. Final test (one first part type test, and the second one case to be developed).
Title | Hours | ECTS | Learning Outcomes |
---|---|---|---|
Type: Directed | |||
Theoretical and practical classes with the participation of students | 44 | 1.76 | 1, 10, 7, 3, 4, 9, 5, 2, 8, 6, 13, 12, 11 |
Type: Supervised | |||
Work planning Readings, reflection on the subjects. Preparation of individual works. PEC, and final test. | 12 | 0.48 | 1, 10, 7, 3, 4, 9, 5, 2, 8, 6, 12, 11 |
Type: Autonomous | |||
Individual and group work (search for material, discussion, preparation and presentation). | 94 | 3.76 | 1, 10, 7, 3, 4, 9, 5, 2, 8, 6, 13, 12, 11 |
It will be based on the criteria based on the continuous evaluation, which makes the attendance mandatory and that will allow us to measure the degree of specific competences of the program that the student has achieved.
The values of each item for evaluation are listed in the table below, all the items must be exceeded with (5) so that they can be computed in the evaluation.
Written test
A written test will be carried out (short questions).
Final exam
A written test (type test and practical case) will be carried out.
Final Year Project.
The project will consist of designing a combined electronic security / security / private security system. The content of the work will be agreed with the teacher of the subject. The students will have to apply the knowledge acquired in the subject to carry out the security project.
In the defense sessions of the project the students will have 5 to 10 minutes to expose by means of a presentation in * PowerPoint (minimum 5 maximum 10 slides). At the end of each exhibition the teacher will ask questions to the students who defend the project.
The work will have a maximum length of 50 pages, and will be delivered in Word or PDF format along with the PowerPoint presentation.
The works must be cited in accordance with the corresponding regulations. No work will be accepted without a proper citation. https://ddd.uab.cat/pub/recdoc/2016/145881/citrefapa_a2016.pdf
If you do not pass the subject in accordance with the aforementioned criteria (continuous evaluation), you can do a recovery test on the scheduled date in the schedule, which will cover all the contents of the program.
To participate in the recovery students must havebeen previously evaluated in a set of activities, the weight of which is equivalent to a minimum of two thirds of the total grade of the subject. However, the qualification that will appear on the student's file is of a maximum of 5-Approved.
Students who need to change an evaluation date must submit the application by filling in the document that will be found in the EPSI Tutorials moodle.
Without prejudice to other disciplinary measures deemed appropriate, and in accordance with the current academic regulations, "in the event that the student conducts any irregularity that may lead to a significant variation of the rating of an assessment act , this evaluation act will be evaluated with a 0, regardless of the disciplinary process that can be instructed. In the event that there are several irregularities in the evaluation acts of the same subject, the final grade of this subject will be 0 ".
Tests / exams may be written and / or oral at the discretion of the teaching staff.
Title | Weighting | Hours | ECTS | Learning Outcomes |
---|---|---|---|---|
Final Exam | 50% | 0 | 0 | 1, 10, 7, 3, 4, 9, 5, 2, 8, 6, 13, 12, 11 |
Final course work | 30% | 0 | 0 | 1, 10, 7, 3, 4, 9, 5, 2, 8, 6, 13, 12, 11 |
Practical exercise (type test and development) | 20% | 0 | 0 | 1, 10, 7, 3, 4, 9, 5, 2, 8, 6, 13, 12, 11 |
Aguado, V. (2007). Derecho de la Seguridad Pública y Privada. Navarra: Editorial Aranzadi.
Arzoz, X. (2010) Videovigilancia, seguridad ciudadana y derechos fundamentales. Navarra: Editorial Thomson Reuters.
Bentham, J. (1989). El Panóptico. Madrid: Editorial Endymion.
Bübl, M. (2017) La ciencia secreta de la cerrajería. Austria: Bübl.
Calero, L.M. (2005). La seguridad privada en España: actores, especificaciones y su planificación. Madrid: Editorial Universitas Internacional. S.L.
Desdentado, A., Muñoz, B. (2012). Control informático, videovigilancia y protección de datos en el trabajo. Valladolid: Editorial Lex Nova.
Díaz, F. (2013). Diccionario LID. Inteligencia y Seguridad. Madrid: Editorial Empresarial.
Ferro, J.M. (2015). Manual operativo del director y jefe de seguridad. Madrid: Editorial Auto-Editor.
Foucault, M. (2012). Vigilar y Castigar. Madrid: Editorial Biblioteca Nueva, S.L.
Freedman, L. (2019). La Guerra del Futuro. Barcelona: Editorial Crítica.
Gómez, R. (2014). Diccionario terminológico para la seguridad privada. Madrid: Editorial Tecnos.
Gómez, R. (2014). Diccionario terminológico de la seguridad privada. Madrid: Editorial Tecnos. S.L.
González, J. (2012) Inteligencia. Valencia: Tirant lo Blanch
González, M. (2011). Guía visual para falsear cerraduras (3.ed.). Illinois: Standard Publicaciones, Inc.
Innerarity, D., Solana, J. (2011). La humanidad amenazada: gobernar los riesgos globales. Barcelona: Editorial Paidós.
Lamas, L. (2019) Apertura de puertas, técnicas y trucos. (4.ed.). Madrid: Nivel Medio.
Lyon, D. (1995). El ojo electrónico. El auge de la sociedad de vigilancia. Madrid: Editorial Alianza.
Macías Fernández. D. (2014). David contra Goliat. Guerra y Asimetría en la edad contemporánea. Madrid. Editorial Instituto Universitario Gutiérrez Mellado.
Martínez, R. (2002). Armas: ¿Libertad americana o prevención europea? Barcelona: Editorial Ariel.
Martínez, R., Rodríguez, J. (2018). Inteligencia artificial y armas letales autónomas. Gijón: Ediciones Trea.
Martínez. E. (2008). Los soldados del Rey. Madrid. Editorial Andújar.
McLaughlin, E., Muncie, J. (2014). Diccionario de criminología. Barcelona: Editorial Gedisa, S.A.
Miró, F. (2012). El Cibercrimen. Fenomenología y criminología de la delincuencia en el ciberespacio. Barcelona: Editorial Marcial Pons.
Montoya, R. (2014). Drones. La muerte por control remoto. Madrid: Editorial Akal.
Muñoz Bolaños. R. (2001). La campaña de 1909. Las campañas de Marruecos, 1909-1927. Madrid.
Perales, T. (2014). Instalaciones de sonido, imagen y seguridad electrónica. Madrid: Editorial Marcombo.
Poveda, M.A., Torres, B. (2015). Dirección y gestión de la seguridad privada. Madrid: Editorial Fragua.
Puell de la Villa. F. (2007). La guerra con armas de fuego. M. Artola (ed.). Historia de Europa. Madrid. Editorial Espasa Calpe. Vol. II.
Quedada. F. (2007). La Guerra con arma blanca. M. Artola (ed.) Historia de Europa. Madrid. Editorial. Espasa Calpe. Vol. I.
Ridaura, M.ª J. (2015). Seguridad Privada y Derechos Fundamentales (La nueva Ley 5/2014, de abril, de Seguridad Privada). Valencia: Editorial Tirant lo Blanch.
Rodríguez, A (2005). 250 modelos de cerrajería. Barcelona: Ediciones CEAC.
Rodríguez, F. (2018). Circuito cerrado de televisión y seguridad electrónica. (ed.2) Madrid. Editorial Paraninfos.
Somoza, O. (2004). La muerte violenta. Inspección ocular y cuerpo del delito. Madrid: Editorial la Ley.
Teijeiro de la Rosa. JM. (2016). Dinero y ejércitos en España. De la Antigüedad al siglo XXI. Madrid.
Torrente, D. (2015). Análisis de la seguridad privada. Barcelona: Editorial UOC.
RECURSOS TELEMÁTICOS:
Agencia Española de Protección deDatos. (2020). Legislación. Recuperado 02 de julio 2020, desde https://www.aepd.es/es/informes-y-resoluciones/normativa-y-circulares
Climablock. (2019). Muros perimetrales resistentes a explosivos. Recuperado 02 julio 2020, desde
Departament d´Inteiror. (2020). Plans d´autoprotecció i register electronic HERMES. Recuperado el 02 de julio del 2020, desde http://interior.gencat.cat/ca/arees_dactuacio/proteccio_civil/paus_hermes/
http://www.climablock.com/Seguridad%20Estructural-01-Muros-de-seguridad.htm
Instituto Nacional de Seguridad e Higiene en el Trabajo. (2020). Normativa. Recuperado 02 julio 2020, desde https://www.insst.es/normativa
Instituto Nacional de Seguridad e Higiene en el Trabajo. (2020). Guías técnicas INSHT. Recuperado el 02 de julio 2020, desde https://www.insst.es/guias-tecnicas-transversales
Ministerio de Defensa. (2020). Los Sistemas de Protección Balísticos Personales. Recuperado 02 de junio del 2020 desde http://www.ejercito.mde.es/publicaciones/index.html
Ministerio del Interior. (2020). Autoprotección. Recuperado 02 de julio 2020, desde http://www.proteccioncivil.es/autoproteccion/presentacion
Ministerio del Interior. (2020). Normativa Básica Reguladora. Recuperado 02 de julio 2020, desde http://www.interior.gob.es/web/servicios-al-ciudadano/personal-de-seguridad-privada/normativa-basica-reguladora