This version of the course guide is provisional until the period for editing the new course guides ends.

Logo UAB

Private Security in Specific Contexts

Code: 103954 ECTS Credits: 6
2024/2025
Degree Type Year
2500257 Criminology OT 4

Contact

Name:
Carlos Botia Villarreal
Email:
carlos.botia@uab.cat

Teaching groups languages

You can view this information at the end of this document.


Prerequisites

 

It is highly recommended to have passed the subject of "Police and Security"

The teaching of the subject will be taught taking into account the perspective of the Sustainable Development Goals.

The theory and seminar will be taught in Catalan


Objectives and Contextualisation

General:

1. Acquisition of management skills in the field of private security

2. Awareness of security protocols in private areas.

3. Ability to plan private security operations.

4. Promote gender equality in research  and in management of private security.

5. Promote multidisciplinary work teams without gender discrimination.

Specific:

1. Management of private security tasks in different  situations.

2. Perform protocols of private security

3. Evaluation and preparation of private safety plans.

4. Work with respect to the principle of gender equality


Competences

  • Ability to analyse and summarise.
  • Accessing and interpreting sources of crime data.
  • Applying a crime prevention program at a community level.
  • Applying an intervention proposal about a person serving a sentence.
  • Carrying out the criminological intervention on the basis of the values of pacification, social integration and prevention of further conflicts.
  • Demonstrating a comprehension of the victim's needs on the basis of the knowledge of victimological theories.
  • Designing a crime prevention program.
  • Drawing up an academic text.
  • Identifying existing social resources to intervene in the conflict and criminality.
  • Students must demonstrate a comprehension of the best crime prevention and intervention models for each specific problem.
  • Students must demonstrate they know a variety of criminal policies in order to face criminality and its different foundations.
  • Students must demonstrate they know the legal framework and operating model of the crime control agents.
  • Using research methods in social sciences in order to diagnose criminality problems.
  • Verbally transmitting ideas to an audience.
  • Working autonomously.
  • Working in teams and networking.

Learning Outcomes

  1. Ability to analyse and summarise.
  2. Acting in a professional way in the criminological field for pacifying, social integration and delinquency-prevention purposes.
  3. Applying a prevention program for crime control agents.
  4. Appropriately applying social resources to criminality.
  5. Appropriately managing a security or prevention team.
  6. Correctly describing in the criminological field the legal-penal framework and crime control agents.
  7. Demonstrating they know the means and scientific procedures of crime prevention.
  8. Developing a security plan in the private field.
  9. Drawing up a delinquency prevention program.
  10. Drawing up an academic text.
  11. Effectively and individually implementing a criminological intervention.
  12. Effectively developing a delinquency prevention program in the community area.
  13. Interpreting crime-related police reports.
  14. Intervening in the criminological field for pacifying, conciliatory and crime-prevention purposes.
  15. Knowing the structural prevention strategy of delinquency.
  16. Properly using the criminological prevention and intervention programs.
  17. Students must be capable of carrying out a security audit in the private field.
  18. Students must be capable of carrying out a security audit in the public field.
  19. Understanding and summarising the basic ideas of the technical-police inspection reports.
  20. Using risk analysis methods in the field of safety.
  21. Using the police analysis methodologies of crime investigation.
  22. Verbally transmitting ideas to an audience.
  23. Working autonomously.
  24. Working in teams and networking.

Content

A) Management block

1. Management and direction of private security

2. Functioning of the departments of security, human resources management and management of material resources

3. Protection of personal data and professional ethics

4. Prevention of occupational hazards 5. Methodology analysis of public and private space Vs. security.

B. Operating block

5. Fire safety and civil protection

6. Security in credit institutions and property security.

7. Report on the implementation of activities in public space (suitability) vs. security

Note: Before the start of the course, students will have a schedule of activities and a syllabus available in the classroom.


Activities and Methodology

Title Hours ECTS Learning Outcomes
Type: Directed      
Seminars 19.5 0.78 4, 8, 5, 10, 1, 22, 23, 24, 20
Theory (review of cases) 19.5 0.78 2, 4, 3, 19, 15, 7, 6, 12, 11, 14, 9, 23, 16, 21
Type: Autonomous      
Readings, preparation of dssiers and group work 106 4.24 15, 7, 13, 10, 18, 23, 24, 21

1.-Teaching system

Cooperative learning and the case method. Classes

2.-Theoretical classes and seminars:

  The theoretical classes will be accompanied by audiovisual means.

  The seminars will be based on the presentation of real cases and discussion of their ways of prevention. In order for students to be able to carry out the required exercises, a practical guide will be provided.

In addition, in the seminars, students make presentations of group work.

 3.-Presence hours

The course will have 13 weeks, 39 hours of teaching capacity, (19.5 hours of theory and 19.5 hours of seminar) The rest of the hours (111), up to 150, will be distributed between hours of evaluation and hours of external work.

Annotation: Within the schedule set by the centre or degree programme, 15 minutes of one class will be reserved for students to evaluate their lecturers and their courses or modules through questionnaires.


Assessment

Continous Assessment Activities

Title Weighting Hours ECTS Learning Outcomes
Assistence and participation 10% 0 0 22
Dossier ( Directed ) 30% 0 0 3, 19, 15, 7, 6, 12, 8, 5, 13, 9, 10, 17, 18, 1, 23, 16, 20, 21
Individual projects ( Autonomus) 30% 2.5 0.1 2, 3, 7, 6, 12, 11, 14, 9, 10, 1, 24, 16
Practical Group project ( supervised) 30% 2.5 0.1 4, 3, 12, 1, 22, 23, 24, 16

Assistance Attendance is mandatory.

The teaching staff will calculate justified and unjustified absences in each session. Absences can only be justified for reasons of illness, other reasons of force majeure and for academic reasons previously authorised by the teaching staff.

If a student does not attend a minimum of 80% of the teaching activities, they wll not be able to the subject.

Students will be evaluated as long as they have carried out a set of activities whose weight is equivalent to a minimum of 2/3 of the total grade of the subject. If the value of the activities carried out does not reach this threshold, the lecturer of the subject may consider the student as non-assessable"

Justified absences cannot be counted negatively. The teacher must make it possible for the student to recover the work done in class in the event of a justified absence. For an absence to be justified, it must be documented. Justified absences can only be those derived from force majeure, such as illness or similar situations that prevent attendance at teaching activities.

The realization of other training activities of the degree may be considered justified absence if the professor responsible for the subject accepts it in advance.

Classes start and end punctually, and that, except in cases of force majeure, entry is not allowed once the class has started or before it ends.

Evaluation model:

A) Continuous Assessment System: Attendance at Theory and Seminars is mandatory, which requires class attendance with a minimum of 80%, otherwise, the subject will not be approved.  General criteria such as the student's level of participation and the ability to relate conceptual and procedural content will be assessed, all framed by the deontological values of the profession.

Classes start and end punctually, and that, except in justified cases, entry is not allowed once the class has started or before it ends.

Absences: They can only be justified for reasons of illness or other reasons of force majeure and for academic reasons previously authorized by the teaching staff.

Students can resit both the continuous assessment activities and, where appropriate, the final exam. Under no circumstances may the revision lead to a reduction in the grade

The student will be evaluated as long as he or she has carried out a set of activities whose weight is equivalent to a minimum of 2/3 of the total grade of the subject. If the value of the activities carried out does not reach this threshold, the lecturer of the subject may consider the student as non-assessable".


Bibliography

Note: The following references should be used in individual and group essays.

Basic bibliography

Domínguez León, J. (2018). Problemas emergentes en seguridad. Cisde

Martinez Quirante, R. (2002). Armas: ¿Libertad americana o prevencióneuropea?. Ariel Derecho

Schopenhauer, A. (2002). El arte de tener razón en 38 estratagemas. Nueva Biblioteca Edaf

Anitua, A. (2006). Manual de protección civil. Dirección de Atención de Emergencias. Gobierno Vasco.

Mata Martín, R. M. (2007). Estafa convencional, estafa informática y robo en el ámbito de los medios electrónicos de pago el uso fraudulento de tarjetas y otros instrumentos de pago. Aranzadi.

Menéndez, D. (2008).  Formación superior en prevención de riesgos laboralesParte obligatoria y común. Lex Nova.

Rebollo, D. (2004). Derechos fundamentales y protección de datos. Dykinson.

Romeo, C. (2006). El cibercrimen, nuevos retos jurídico-penales, nuevas respuestas político-criminales. Comares.

Ruiz, A. (2005). Manual práctico de protección de datosBosch.

Complementary references

Punset, E. (2012). Excusas para no pensar. Destino

Ferro, J. M. (2014). Manual operativo del director y jefe de seguridad. Fragua.

Poeda, M. A. & Torrente. B. (2015). Dirección y gestión de la seguridad privada. Fragua.

Medina-Reyes, J. L. (2018). Protección de personalidades e instalaciones físicas. Fragua.

References with gender perspective

Alonso-Olea, A. y Casas, M. E. (2010). Derecho del Trabajo. Cívitas.

Vara, M. J. (2006).  Estudios sobre género y economía (Vol. 15). Akal.

Torrente, D. (2015). Análisis de la seguridad privada. UOC.

Mandatory readings

Sánchez, O. (2016). Protocolo de comunicación y seguridad en eventos: posibles amenazas.  Editorial Icono 14, pp. 11-36, 135-159 i 161-187.


Software

The course does not use any specific computer software


Language list

Name Group Language Semester Turn
(TE) Theory 1 Catalan first semester afternoon