Degree | Type | Year | Semester |
---|---|---|---|
2500257 Criminology | OT | 4 | 1 |
You can check it through this link. To consult the language you will need to enter the CODE of the subject. Please note that this information is provisional until 30 November 2023.
It is advisable that students have passed the course "Police and Security"
General:
1. Acquisition of management skills in the field of private security
2. Awareness of security protocols in private areas.
3. Ability to plan private security operations.
4. Promote gender equality in research and in management of private security.
5. Promote multidisciplinary work teams without gender discrimination.
Specific:
1. Management of private security tasks in different situations.
2. Perform protocols of private security
3. Evaluation and preparation of private safety plans.
4. Work with respect to the principle of gender equality
A) Management block
1. Management and direction of private security
2. Functioning of the departments of security, human resources management and management of material resources
3. Protection of personal data and professional ethics
4. Prevention of occupational hazards 5. Methodology analysis of public and private space Vs. security.
B. Operating block
5. Fire safety and civil protection
6. Security in credit institutions and property security.
7. Report on the implementation of activities in public space (suitability) vs. security
Note: Before the start of the course, students will have a schedule of activities and a syllabus available in the classroom.
1.-Methods
Problem-Based Learning (PBL), cooperative learning and case method.
2.-Classes
Lectures and seminars
Lectures will be provided with the help of audio-visual resources.
Seminars will be based on presenting real crime cases and discussing its ways of prevention. To do the required exercises students will be provided with a practical guide.
Moreover, in the seminars, students will made presentations of their group work
3.-Schedule
The course will have 12 weeks, 36 hours of class, (18 hours of theory and 18 of seminar) plus 5 hours of assessment.
Annotation: Within the schedule set by the centre or degree programme, 15 minutes of one class will be reserved for students to evaluate their lecturers and their courses or modules through questionnaires.
Title | Hours | ECTS | Learning Outcomes |
---|---|---|---|
Type: Directed | |||
Lectures (review of cases) | 18 | 0.72 | 2, 4, 3, 19, 15, 7, 6, 12, 11, 14, 9, 23, 16, 21 |
Seminars | 18 | 0.72 | 4, 8, 5, 10, 1, 22, 23, 24, 20 |
Type: Autonomous | |||
Readings, preparation of dssiers and group work | 109 | 4.36 | 15, 7, 13, 10, 18, 23, 24, 21 |
Attendance
Attendance is mandatory.
The lecturer will count the justified and unexcused absences in each session. Absences can only be justified for reasons of illness, for other reasons of force majeure and for academic reasons previously authorized by the teaching staff.
If a student does not attend a minimum of 80% of the teaching activities, they will not be able to be evaluated.
Excused absences cannot count negatively. The lecturer must make it possible for the student to do the work done in class in case of justified absence. For an absence to be excused it must be documented. Only those due to force majeure such as illness or similar situations that prevent them from attending teaching activities can be justified absences.
Carrying out other formative activities of the degree may be considered an excused absence if previously accepted by the professor responsible for the subject.
Classes begin and end on time, and that, except in cases of force majeure, entry is not allowed once the class has started or before it ends.
Evaluation model:
A) Single evaluation model
In this case, the students will be evaluated based on a final test, in which the student must demonstrate that they have acquired the set of competencies of the subject.
Description of each evaluation activity:
The final subject exam will be testing type + 2 exercises to be developed by the student + reading of the bibliography proposed by the teacher necessary to carry out the exercises.
Specification of its content (the three parts are mandatory to pass the exam):
For every two wrong answers, one correct one will be subtracted.
Not answering a multiple-choice question does not penalize.
Duration for its realization 2h.
If a score of less than 5 points is obtained on the exam, the student must retake the subject with an assessment model similar to the exam, but with different questions and topics.
The necessary materials for the evaluation are: pen, pencil, rubber, tipex, simple calculation (not scientific, it will be verified by the teacher before the exam), using the mobile phone calculator is not allowed.
Basic Bibliography for the unique evaluation: Dominguez Leon, J.(2018). Problemas Emergentes en Seguridad. Cisde
B) Continuous evaluation system:
It is compulsory, which requires class attendance with a minimum of 80%. General criteria such as the level of student participation and the ability to relate conceptual contents with procedural ones will be valued, all framed by the deontological values of the profession.
There are 4 evaluation activities. All of them must be passed (5) to pass the evaluation.
Conditions to be evaluated:
Actively participate in classes and carry out individual and group work.
Resit
If a student does not pass any of their activities, they will have a chance to resit. The teacher will indicate to the students the requirements to be able to resit. the parts not passed, both those of continuous evaluation and, where appropriate, the final exam. Thegrade in case of resit can not be reduced.
Cheating on exams and plagiarism
A student who cheats or tries to cheat an exam will have a 0 in the subject and will lose the right to reassessment. A student who presents a practice in which there are signs of plagiarism or who cannot justify the arguments of their practice will get a 0 and receive a warning. In case of reiteration of the behaviour, the student will fail the subject (0) and will lose his right to resit.
Title | Weighting | Hours | ECTS | Learning Outcomes |
---|---|---|---|---|
Assistence and participation | 10% | 0 | 0 | 22 |
Dossier | 30% | 0 | 0 | 3, 19, 15, 7, 6, 12, 8, 5, 13, 9, 10, 17, 18, 1, 23, 16, 20, 21 |
Individual projects | 30% | 2.5 | 0.1 | 2, 3, 7, 6, 12, 11, 14, 9, 10, 1, 24, 16 |
Practical Group project | 30% | 2.5 | 0.1 | 4, 3, 12, 1, 22, 23, 24, 16 |
Note: There is not compulsory bibliography. The following references should be used in individual and group essays.
Basic bibliography
Dominguez Leon, J.(2018)Problemas emergentes en seguridad.Cisde
Martinez Quirante, R.(2002) Armas: ¿libertad americana o prevencion Euoropea?. Ariel Derecho
Schopenhauer, A (2002). El arte de tener razón en 38 estratagemas. Nueva Biblioteca Edaf
Anitua, A. (2006). Manual de Protección Civil. Dirección de Atención de Emergencias. Gobierno Vasco.
Mata, Y. & Martín, R. M. (2007). Estafa convencional, estafa informática y robo en el ámbito de los medios electrónicos de pago El uso fraudulento de tarjetas y otros instrumentos de pago. Aranzadi.
Menéndez, D. (2008). Formación Superior en Prevención de Riesgos Laborales. Parte Obligatoria y Común. Lex Nova.
Rebollo, D. (2004). Derechos fundamentales y protección de datos. Dykinson.
Romeo, C. (2006). El Cibercrimen, Nuevos retos jurídico-penales, nuevas respuestas político-criminales. Comares.
Ruiz, A. (2005). Manual práctico de protección de datos. Bosch.
Complementary bibliography
Punset, E. (2012). Excusas para no pensar. Destino
Ferro, J, M. (2014). Manual operativo del director y jefe de seguridad. Fragua.
Poeda, M. A.; Torrente. B. (2015). Dirección y gestión de la seguridad privada. Fragua.
Sanchez, O. (2017). Protocolo de comunicación y seguridad en eventos: Situaciones Críticas. Editorial Icono 14.
Medina-Reyes, J. L. (2018). Protección de personalidades e instalaciones físicas. Fragua.
Bibliography with gender perspective
Alonso-Olea, A. & Casas, M. E (2010). Derechodel trabajo. Cívitas.
Vara, M. J. (2006). Estudios sobre género y economía (Vol. 15). Akal.
Torrente, D. (2015). Análisis de la seguridad privada. UOC