Degree | Type | Year | Semester |
---|---|---|---|
2500257 Criminology | OT | 4 | 1 |
It is advisable that students have passed the course "Police and Security"
General:
1. Acquisition of management skills in the field of private security
2. Awareness of security protocols in private areas.
3. Ability to plan private security operations.
4. Promote gender equality in research and in management of private security.
5. Promote multidisciplinary work teams without gender discrimination.
Specific:
1. Management of private security tasks in different situations.
2. Perform protocols of private security
3. Evaluation and preparation of private safety plans.
4. Work with respect to the principle of gender equality
A) Management block
1. Management and direction of private security
2. Functioning of the departments of security, human resources management and management of material resources
3. Protection of personal data and professional ethics
4. Prevention of occupational hazards 5. Methodology analysis of public and private space Vs. security.
B. Operating block
5. Fire safety and civil protection
6. Security in credit institutions and property security.
7. Report on the implementation of activities in public space (suitability) Vs. security
Note: Before the start of the course, students will have a schedule of activities and a syllabus available in the classroom.
1.-Methods
Problem-Based Learning (PBL), cooperative learning and case method.
2.-Classes
Lectures and seminars
Lectures will be provided with the help of audio-visual resources.
Seminars will be based on presenting real crime cases and discussing its ways of prevention. In order to do the required exercises students will be provided with a practical guide.
Moreover in the seminars, students will made presentations of their group work
Annotation: Within the schedule set by the centre or degree programme, 15 minutes of one class will be reserved for students to evaluate their lecturers and their courses or modules through questionnaires.
Title | Hours | ECTS | Learning Outcomes |
---|---|---|---|
Type: Directed | |||
Lectures (review of cases) | 18 | 0.72 | 2, 4, 3, 19, 15, 7, 6, 12, 11, 14, 9, 23, 16, 21 |
Seminars | 18 | 0.72 | 4, 8, 5, 10, 1, 22, 23, 24, 20 |
Type: Autonomous | |||
Readings, preparation of dssiers and group work | 109 | 4.36 | 15, 7, 13, 10, 18, 23, 24, 21 |
Attendance
- Attendance is mandatory and will be supervised. Absences can only be justified for reasons of illness, for reasons of force majeure and for academic reasons previously authorized by the professor.
- If a student does not attend a minimum of 80% of the teaching activities, he / she will not be able to be evaluated.
- Excused absences do no count negatively. The professor should enable the student to present the work done in class in the event of excused absence. Only documented absences can be justifiable. Only absences due to force majeure such as illness or similar situations that prevent attending classes can be justified. Other formative activities of the degree can be considered a justified absence, provided it is accepted in advance by the professor.
- Classes begin and end on time, and except in cases of force majeure, entry is not allowed once the class has begun or before it has ended.
Evaluation model
Continuous assessment, which requires class attendance with a minimum of 80%. Participation in classes and and the ability to relate the conceptual contents with the procedural ones, all framed by the deontological values of the profession, will be assessed.
Evaluation criteria
There are 3 evaluation activities. All of them must be passed (5) to pass the assessment
a. Online preparation of a dossier (portfolio). It will include all the content worked on in the subject through the teacher's explanation, visualization of graphic documents, readings, conclusions of the group work, etc. which must be supplemented with the obligatory bibliographical references. 30% of the grade. References and citations to the recommended bibliography aremandatory in the exercises presented.
b. Individual work PEC 1 . 30% of the grade.
c. PEC 2 group work. 30% of the grade.
d. Attendance and participation in class. 10% of thegrade
30%+30%+30%+10% = 100%
Conditions to be evaluated
Participate actively in classes and do individual and group work
Resit
If a student does not pass any of the activities, they will have a chance to resit. The teacher will indicate to the students the requirements to be able to resit the parts not passed.
Copy in exams and plagiarism
A student who copies or attempts to copy an exam will have a 0 in the subject and will lose the right to re-assessment. A student who submits a practice in which there is evidence of plagiarism or who cannot justify the arguments of his practice will get a 0 and will receive a warning. In case of repetition of the behavior, the student will suspend the subject (0) and will lose the right to resit
Title | Weighting | Hours | ECTS | Learning Outcomes |
---|---|---|---|---|
Assistence and participation | 10% | 0 | 0 | 22 |
Dossier | 30% | 0 | 0 | 3, 19, 15, 7, 6, 12, 8, 5, 13, 9, 10, 17, 18, 1, 23, 16, 20, 21 |
Individual projects | 30% | 2.5 | 0.1 | 2, 3, 7, 6, 12, 11, 14, 9, 10, 1, 24, 16 |
Practical Group project | 30% | 2.5 | 0.1 | 4, 3, 12, 1, 22, 23, 24, 16 |
Note: There is no mandatory bibliography
Basic bibliography (Should be used to expand individual and group work)
Anitua, A. (2006). Manual de Protección Civil. Dirección de Atención de Emergencias. Gobierno Vasco.
Dirección general de protección civil y emergencias. (2008). Guía para voluntarios de protección civil. Ministerio del Interior.
García, C.; Matías E. (2009). Manual de Rescate en Inundaciones, Riadas y Ríos. Dirección de Atención de Emergencias. Gobierno Vasco.
Gómez, E. (2009). Manual para la Formación en Prevención de Riesgos Laborales. Especialidad de Higiene industrial. Ciss.
Mata, Y.; Martín, R. M. (2007). Estafa convencional, estafa informática y robo en el ámbito de los medios electrónicos de pago El uso fraudulento de tarjetas y otros instrumentos de pago. Aranzadi.
Menéndez, D. (2008). Formación Superior en Prevención de Riesgos Laborales. Parte Obligatoria y Común. Lex Nova.
Rebollo, D. (2004). Derechos fundamentales y protección de datos. Dykinson.
Romeo, C. (2006). El Cibercrimen, Nuevos retos jurídico-penales, nuevas respuestas político-criminales. Comares.
Ruiz, A. (2005). Manual práctico de protección de datos. Bosch.
Complementary references
Ferro, J, M . (2014). Manual operativo del director y jefe de seguridad. Fragua.
Poeda, M. A.; Torrente. B. (2015). Dirección y gestión de la seguridad privada. Fragua.
Sanchez, O. (2017). Protocolo de comunicación y seguridad en eventos: Situaciones Críticas. Editorial Icono 14.
Medina-Reyes, J. L. (2018). Protección de personalidades e instalaciones físicas. Fragua.
Bibliography with gender perspective
Alonso-Olea, A.; Casas, M. E (2010). Derecho del trabajo. Cívitas.
Vara, M. J. (2006). Estudios sobre género y economía (Vol. 15). Akal.
Torrente, D. ( 2015). Análisis de la seguridad privada. UOC