Degree | Type | Year |
---|---|---|
2502501 Prevention and Integral Safety and Security | OB | 1 |
You can view this information at the end of this document.
This subject doesn´t have any pre-requierments.
Differentiate and define security systems, such as electronic, physical and human elements, in the latter with special attention to learning men and women with respect and equality without prejudice to gender, installed and deployed in a facility to protect people and property before the different risks that can affect them.
Knowing the regulatory framework that regulates security technologies, and their relationship with the sectors of public security and private security.
Know the different electronic security devices that are marketed, installed, and maintained for the design of comprehensive security plans.
On the other hand, to know the existing physical security systems and how they are combined with electronic security systems to minimize the different risks to which the installation we wish to protect may be exposed.
Title | Hours | ECTS | Learning Outcomes |
---|---|---|---|
Type: Directed | |||
Classes with TIC support | 12 | 0.48 | |
Evaluation | 4 | 0.16 | |
Type: Supervised | |||
Work planning Readings, reflection on the subjects. Preparation of individual works. Continuous tests, and final test. | 24 | 0.96 | |
Type: Autonomous | |||
Individual and group work (search for material, discussion, preparation and presentation). | 110 | 4.4 |
• Classes with TIC support. Resolution of doubts and questions. Job tracking
• Resolution of exercises and practices: individual realization of works and practical cases, with ICT support.
• Personal study: Consolidation of theoretical and practical knowledge.
• The tutorials with the faculty will be arranged by email.
The language in which classes are taught is: Spanish.
Annotation: Within the schedule set by the centre or degree programme, 15 minutes of one class will be reserved for students to evaluate their lecturers and their courses or modules through questionnaires.
Title | Weighting | Hours | ECTS | Learning Outcomes |
---|---|---|---|---|
Final exam. | 50% | 0 | 0 | 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24 |
PEC 1 | 12.5% | 0 | 0 | 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24 |
PEC 2 | 12.5% | 0 | 0 | 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24 |
PEC 3 | 12.5% | 0 | 0 | 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24 |
PEC 4 | 12.5% | 0 | 0 | 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24 |
It will start from the criteria based on continuous evaluation, which will allow us to measure the degree of specific competences of the program that the student has achieved.
The values of each item for the evaluation appear in the table below, all the items must be passed with (5) so that they can be computed in the evaluation.
Written test.
The continuous assessment tests will be of a theoretical/practical nature (PEC 1, PEC 2, PEC 3 and PEC-4) and will be carried out individually.
For the continuous assessment to be effective, the student must complete all the PEC. In the case of not submitting any PEC, the continuous evaluation is canceled and the student goes directly to the recovery exam.
The works must be cited in accordance with the corresponding regulations. No work will be accepted without a proper citation. https://ddd.uab.cat/pub/recdoc/2016/145881/citrefapa_a2016.pdf
Copy in exam or plagiarism.
In the event that during an exam the presence of students is detected cheating, they will be automatically suspended without the possibility of access to recovery.
In case of plagiarism in the writing of the works (PEC), each case will be assessed and, in extreme cases, the option of direct failure will be considered without the option of recovery.
In case of not passing the subject in accordance with the aforementioned criteria (continuous evaluation), a make-up test may be taken on the date scheduled in the schedule, and which will deal with all the contents of the program.
To participate in the recovery, students must have been previously evaluated in a set of activities, the weight of which is equivalent to a minimum of two thirds of the total grade for the subject. However, the grade that will appear in the student's file is a maximum of 5-Passed.
Students who need to change an evaluation date must submit the request by filling out the document that they will find in the EPSI Tutoring moodle space.
Withoutprejudice to other disciplinary measures that are deemed appropriate, and in accordance with current academic regulations, "in the event that the student performs any irregularity that may lead to a significant variation in the grade of an evaluation act, it will be graded with a 0 this act of evaluation, regardless of the disciplinary process that may be instructed. In the event that various irregularities occur in the acts of evaluation of the same subject, the final grade for this subject will be 0".
In the event that the student is repeating the subject, they must take all the tests specified in this teaching guide without exception. Works already presented by the student in previous years will not be accepted.
The tests/exams may be written and/or oral at the discretion of the teaching staff.
Plagio:
If during the correction there are indications that an activity or work has been carried out with answers assisted by artificial intelligence, the teacher may complement the activity with a personal interview to corroborate the authorship of the text.
Single Assessment
Students who opt for the single assessment will take a final synthesis test of all the content of the subject (50%) and will deliver the subject work (50%)
The date for this test and the delivery of the course work will be the same scheduled in the schedule for the last continuous assessment exam.
The same recovery system will be applied as for the continuous evaluation.
Recovery exam
The student who does not pass the subject, who does not reach 5 (total) out of 10, in accordance with the criteria established in the two previous sections, may take a final exam provided that the student has been evaluated in a set of activities, the weight of which is equivalent to a minimum of two thirds of the total grade for the subject. If you have not been evaluated by these two third parties because you have not taken the tests, you will get a scoreof Not Taken, without having the possibility of taking the final recovery exam.
In this exam, the set of contents of the subject will be evaluated again.
In the case of passing the final exam, the subject will be approved with a maximum of 5, regardless of the grade obtained in the exam.
Changing the date of a test or exam
Students who need to change an assessment date must submit the request by filling in the document found in the Moodle space for EPSI Tutoring.
Once the document has been completed, it must be sent to the teaching staff of the subject and to the coordination of the Degree.
Revision
To review the evaluation activity, the student must send an email to the teacher, who will indicate the review mechanism.
For single assessment students, the review process will be the same.
If there are unforeseen circumstances that prevent the normal development of the subject, the teaching staff may modify both the methodology and the evaluation of the subject.
Aguado, V. (2007). Derecho de la Seguridad Pública y Privada. Navarra: Editorial Aranzadi.
Arzoz, X. (2010) Videovigilancia, seguridad ciudadana y derechos fundamentales. Navarra: Editorial Thomson Reuters.
Bentham, J. (1989). El Panóptico. Madrid: Editorial Endymion.
Bübl, M. (2017) La ciencia secreta de la cerrajería. Austria: Bübl.
Calero, L.M. (2005). La seguridad privada en España: actores, especificaciones y su planificación. Madrid: Editorial Universitas Internacional. S.L.
Desdentado, A., Muñoz, B. (2012). Control informático, videovigilancia y protección de datos en el trabajo. Valladolid: Editorial Lex Nova.
Díaz, F. (2013). Diccionario LID. Inteligencia y Seguridad. Madrid: Editorial Empresarial.
Ferro, J.M. (2015). Manual operativo del director y jefe de seguridad. Madrid: Editorial Auto-Editor.
Foucault, M. (2012). Vigilar y Castigar. Madrid: Editorial Biblioteca Nueva, S.L.
Freedman, L. (2019). La Guerra del Futuro. Barcelona: Editorial Crítica.
Gómez, R. (2014). Diccionario terminológico para la seguridad privada. Madrid: Editorial Tecnos.
Gómez, R. (2014). Diccionario terminológico de la seguridad privada. Madrid: Editorial Tecnos. S.L.
González, J. (2012) Inteligencia. Valencia: Tirant lo Blanch
González, M. (2011). Guía visual para falsear cerraduras (3.ed.). Illinois: Standard Publicaciones, Inc.
Innerarity, D., Solana, J. (2011). La humanidad amenazada: gobernar los riesgos globales. Barcelona: Editorial Paidós.
Lamas, L. (2019) Apertura de puertas, técnicas y trucos. (4.ed.). Madrid: Nivel Medio.
Lyon, D. (1995). El ojo electrónico. El auge de la sociedad de vigilancia. Madrid: Editorial Alianza.
Macías Fernández. D. (2014). David contra Goliat. Guerra y Asimetría en la edad contemporánea. Madrid. Editorial Instituto Universitario Gutiérrez Mellado.
Martínez, R. (2002). Armas: ¿Libertad americana o prevención europea? Barcelona: Editorial Ariel.
Martínez, R., Rodríguez, J. (2018). Inteligencia artificial y armas letales autónomas. Gijón: Ediciones Trea.
Martínez. E. (2008). Los soldados del Rey. Madrid. Editorial Andújar.
McLaughlin, E., Muncie, J. (2014). Diccionario de criminología. Barcelona: Editorial Gedisa, S.A.
Miró, F. (2012). El Cibercrimen. Fenomenología y criminología de la delincuencia en el ciberespacio. Barcelona: Editorial Marcial Pons.
Montoya, R. (2014). Drones. La muerte por control remoto. Madrid: Editorial Akal.
Muñoz Bolaños. R. (2001). La campaña de 1909. Las campañas de Marruecos, 1909-1927. Madrid.
Perales, T. (2014). Instalaciones de sonido, imagen y seguridad electrónica. Madrid: Editorial Marcombo.
Poveda, M.A., Torres, B. (2015). Dirección y gestión de la seguridad privada. Madrid: Editorial Fragua.
Puell de la Villa. F. (2007). La guerra con armas de fuego. M. Artola (ed.). Historia de Europa. Madrid. Editorial Espasa Calpe. Vol. II.
Quedada. F. (2007). La Guerra con arma blanca. M. Artola (ed.) Historia de Europa. Madrid. Editorial. Espasa Calpe. Vol. I.
Ridaura, M.ª J. (2015). Seguridad Privada y Derechos Fundamentales (La nueva Ley 5/2014, de abril, de Seguridad Privada). Valencia: Editorial Tirant lo Blanch.
Rodríguez, A (2005). 250 modelos de cerrajería. Barcelona: Ediciones CEAC.
Rodríguez, F. (2018). Circuito cerrado de televisión y seguridad electrónica. (ed.2) Madrid. Editorial Paraninfos.
Somoza, O. (2004). La muerte violenta. Inspección ocular y cuerpo del delito. Madrid: Editorial la Ley.
Teijeiro de la Rosa. JM. (2016). Dinero y ejércitos en España. De la Antigüedad al siglo XXI. Madrid.
Torrente, D. (2015). Análisis de la seguridad privada. Barcelona: Editorial UOC.
This subject will use the basic software of the office 365 package.
Name | Group | Language | Semester | Turn |
---|---|---|---|---|
(TE) Theory | 1 | Spanish | second semester | afternoon |