Logo UAB
2021/2022

Private Security in Specific Contexts

Code: 103954 ECTS Credits: 6
Degree Type Year Semester
2500257 Criminology OT 4 0
The proposed teaching and assessment methodology that appear in the guide may be subject to changes as a result of the restrictions to face-to-face class attendance imposed by the health authorities.

Contact

Name:
Carlos Botia Villarreal
Email:
Carlos.Botia@uab.cat

Use of Languages

Principal working language:
catalan (cat)
Some groups entirely in English:
No
Some groups entirely in Catalan:
Yes
Some groups entirely in Spanish:
No

Other comments on languages

In case the course is attended by international students, the language of the course will be Spanish

Prerequisites


It is advisable that students have passed the course "Police and Security"

Objectives and Contextualisation

General:

1. Acquisition of management skills in the field of private security

2. Awareness of security protocols in private areas.

3. Ability to plan private security operations.

4. Promote gender equality in research  and in management of private security.

5. Promote multidisciplinary work teams without gender discrimination.

Specific:

1. Management of private security tasks in different  situations.

2. Perform protocols of private security

3. Evaluation and preparation of private safety plans.

4. Work with respect to the principle of gender equality

Competences

  • Ability to analyse and summarise.
  • Accessing and interpreting sources of crime data.
  • Applying a crime prevention program at a community level.
  • Applying an intervention proposal about a person serving a sentence.
  • Carrying out the criminological intervention on the basis of the values of pacification, social integration and prevention of further conflicts.
  • Demonstrating a comprehension of the victim's needs on the basis of the knowledge of victimological theories.
  • Designing a crime prevention program.
  • Drawing up an academic text.
  • Identifying existing social resources to intervene in the conflict and criminality.
  • Students must demonstrate a comprehension of the best crime prevention and intervention models for each specific problem.
  • Students must demonstrate they know a variety of criminal policies in order to face criminality and its different foundations.
  • Students must demonstrate they know the legal framework and operating model of the crime control agents.
  • Using research methods in social sciences in order to diagnose criminality problems.
  • Verbally transmitting ideas to an audience.
  • Working autonomously.
  • Working in teams and networking.

Learning Outcomes

  1. Ability to analyse and summarise.
  2. Acting in a professional way in the criminological field for pacifying, social integration and delinquency-prevention purposes.
  3. Applying a prevention program for crime control agents.
  4. Appropriately applying social resources to criminality.
  5. Appropriately managing a security or prevention team.
  6. Correctly describing in the criminological field the legal-penal framework and crime control agents.
  7. Demonstrating they know the means and scientific procedures of crime prevention.
  8. Developing a security plan in the private field.
  9. Drawing up a delinquency prevention program.
  10. Drawing up an academic text.
  11. Effectively and individually implementing a criminological intervention.
  12. Effectively developing a delinquency prevention program in the community area.
  13. Interpreting crime-related police reports.
  14. Intervening in the criminological field for pacifying, conciliatory and crime-prevention purposes.
  15. Knowing the structural prevention strategy of delinquency.
  16. Properly using the criminological prevention and intervention programs.
  17. Students must be capable of carrying out a security audit in the private field.
  18. Students must be capable of carrying out a security audit in the public field.
  19. Understanding and summarising the basic ideas of the technical-police inspection reports.
  20. Using risk analysis methods in the field of safety.
  21. Using the police analysis methodologies of crime investigation.
  22. Verbally transmitting ideas to an audience.
  23. Working autonomously.
  24. Working in teams and networking.

Content

A) Management section

1. Management of private security.

2. Security departments, direction of human resources and management of material resources.

3. Protection of personal information and professional deontology.

4. Risk management

B) Operational Section

5. Security against fire and civil protection.

6. Security in financial institutions and security of properties.

Note: Before the start of the course, there will be a schedule of activities on the virtual campus

Methodology

1.-Methods

Problem-Based Learning (PBL), cooperative learning and case method.

2.-Classes

Lectures and seminars

Lectures will be provided with the help of audio-visual resources.

Seminars will be based on presenting real crime cases and discussing its ways of prevention. In order to do the required exercises students will be provided with a practical guide.

Moreover in the seminars, students will made presentations of their group work

Annotation: Within the schedule set by the centre or degree programme, 15 minutes of one class will be reserved for students to evaluate their lecturers and their courses or modules through questionnaires.

Activities

Title Hours ECTS Learning Outcomes
Type: Directed      
Lectures (review of cases) 19.5 0.78 2, 4, 3, 19, 15, 7, 6, 12, 11, 14, 9, 23, 16, 21
Seminars 19.5 0.78 4, 8, 5, 10, 1, 22, 23, 24, 20
Type: Autonomous      
Readings, preparation of dssiers and group work 106 4.24 15, 7, 13, 10, 18, 23, 24, 21

Assessment

1. System of compulsory attendance to classes

a) Attendance is mandatory. Professors will register absences for each session, which can be justified or unjustified. Absences can only be justified for reasons of illness, other important inconveniences and for academic reasons previously authorized by the teaching staff.

b) If a student does not attend at least 80% of classes, he or she cannot be evaluated.

c) Justified absences cannot be counted negatively. The professor must enable the student to recover the work done in class in the case of excused absence. This kind of justified absences must be documented. Justified absences are those resulting from situations which prevent students from attending educational activities, such as unexpected illness or similar situations. Teachers may consider also justified absences the situations in which students have to attend other training activities of the degree.

2.-Evaluation model

Continued assessment. Minimum attendance of 80% is required. Participation in class, and ability to connect theoretical concepts with deontological values of the profession will be considered.

3.-Criteria for evaluation

Five items will be considered for the final mark. Students need to obtain a pass (5) in all of them.

a. Elaboration of a dossier. The dossier should contain everything worked on during the course (lecturer's explanations, graphical documents visualization, readings, conclusions reached in the group text, among others). Students need to expand the dossier with the use of the recommended bibliography. It counts 30% of the final mark.  

b. Group project. The content of the project will be discussed with the professor of the course in due time. It counts 30% of the final mark.

c. Individual essay. Students will elaborate a paper on a topic suggested by the professor. It counts 30% of the final mark.

d. Oral skills.5% of the final mark integrated to the dossier entry

e. Active participation. 5% of the final mark integrated to the dossier entry

4.-Conditions for being assessed

Students must actively participate in class and in-group projects. In addition, they must prepare individual projects.

5.-Resit

Students will have the opportunity to repeat the failed activities. Requirements to pass will be detailed by the professor.

6.-Fraudulent conducts

In case whatsoever during the examination it would be detected that the candidate is copying from another student or using any device to access information during the examination, the student will get a fail mark (0) without any option to retake the exam.

Assessment Activities

Title Weighting Hours ECTS Learning Outcomes
Assistence and participation 10 0 0 22
Dossier 30 0 0 3, 19, 15, 7, 6, 12, 8, 5, 13, 9, 10, 17, 18, 1, 23, 16, 20, 21
Individual projects 30 2.5 0.1 2, 3, 7, 6, 12, 11, 14, 9, 10, 1, 24, 16
Practical Group project 30 2.5 0.1 4, 3, 12, 1, 22, 23, 24, 16

Bibliography

Note: There is no mandatory bibliography

Basic bibliography (Should be used to expand individual and group work)

Albizu, G.; Landeta, R. (2001). Dirección Estratégica de los Recursos Humanos. (Teoría y práctica). Pirámide.

Albizu, G.; Olazarán, M. (2003). Reingeniería y Cambio Organizativo (teoría y práctica). Prentice Hall.

Anitua, A. (2006). Manual de Protección Civil.  Vitoria: Dirección de Atención de Emergencias. Gobierno Vasco.

Armstrong, M. (1996). A handbook of Personnel Management Practice. 6 ed. Kogan Page.

Chiavenato, I. (2002)Gestión del talento humano. El nuevo papel de los recursos humanos en las organizaciones.  McGraw-Hill.

Dirección general de protección civil y emergencias. (2008)Guía para voluntarios de protección civil. Ministerio del Interior.

García, C.; Matías E. (2009). Manual de Rescate en Inundaciones, Riadas y Ríos. Dirección de Atención de Emergencias. Gobierno Vasco.

Goikouria, E. (2002). Desarrollo y Control de Incendios en Interiores. Dirección de Atención de Emergencias. Vitoria:  Gobierno Vasco.

Gómez, E. (2009)Manual para la Formación en Prevención de Riesgos Laborales. Especialidad de Higiene industrial. Ciss.

Mata, Y.; Martín, R. M. (2007). Estafa convencional, estafa informática y robo en el ámbito de los medios electrónicos de pago El uso fraudulento de tarjetas y otros instrumentos de pago. Aranzadi.

Menéndez, D. (2008).  Formación Superior en Prevención de Riesgos Laborales. Parte Obligatoria y Común. Lex Nova.

Menéndez, D. (2009). Higiene Industrial”: Manual para la Formación del Especialista. Lex Nova.

Rebollo, D. (2004). Derechos fundamentales y protección de datos. Dykinson.

Romeo, C. (2006). El Cibercrimen, Nuevos retos jurídico-penales, nuevas respuestas político-criminales. Comares.

Ruiz, A. (2005). Manual práctico de protección de datos. Bosch.

Sánchez, C. (2006). Salud laboral. Seguridad, Higiene, Ergonomía y Psicosociología.  Ideas Propias.

Complementary references

Albert, L.; Michaud, Y.; Piotte, R. (1991). La Dirección de Personal. Herder.

Barranco, F. (1993). Planificación estratégica de recursos humanos. Del marketing interno a la planificación. Pirámide.

Bernardin, H.; Russell, J. (1993). Human Resource Management. Experimental Approach. McGraw-Hill.

Candau, P. (1985). Audit Social Méthodes et techniques pour un management efficace.  Vuibert.

Carrel, M., Elbert, N.; Hatfield, R. (1995). Human Resource Management-Global Strategies for Managing A Diverse Workforce. 5º ed. Prentice Hall.

Ferro, J, M . (2014). Manual operativo del director y jefe de seguridad. Fragua.

Poeda, M. A.; Torrente. B. (2015). Dirección y gestión de la seguridad privada. Fragua.

Sanchez, O. (2017). Protocolo de comunicación y seguridad en eventos: Situaciones Críticas.  Editorial Icono 14.

Medina-Reyes, J. L. (2018). Protección de personalidades e instalaciones físicas. Fragua.

Martínez-Garcia, F. ( 1993). Diccionario Mapfre de la seguridad integral. Mapfre.

Nebreda. M. (2001). Intimidad y seguridad. Instituto de estudios de la gobernabilidad y la seguridad

Bibliography with gender perspective

Alonso-Olea, A.; Casas, M. E (2010). Derecho del trabajo. Cívitas.

Lamas, M. (1986). La antropología feminista y la categoría género.  Pirámide.

Vara, M. J. (2006).  Estudios sobre género y economía (Vol. 15). Akal.

Torrente, D. ( 2015). Análisis de la seguridad privada. UOC

Software

The course does not use any specific computer software