Degree | Type | Year |
---|---|---|
Criminology | OT | 4 |
You can view this information at the end of this document.
It is highly recommended to have passed the subject of "Police and Security"
The teaching of the subject will be taught taking into account the perspective of the Sustainable Development Goals.
The theory and seminar will be taught in Catalan
General:
1. Acquisition of management skills in the field of private security
2. Awareness of security protocols in private areas.
3. Ability to plan private security operations.
4. Promote gender equality in research and in management of private security.
5. Promote multidisciplinary work teams without gender discrimination.
Specific:
1. Management of private security tasks in different situations.
2. Perform protocols of private security
3. Evaluation and preparation of private safety plans.
4. Work with respect to the principle of gender equality
A) Management block
1. Management and direction of private security
2. Functioning of the departments of security, human resources management and management of material resources
3. Protection of personal data and professional ethics
4. Prevention of occupational hazards 5. Methodology analysis of public and private space Vs. security.
B. Operating block
5. Fire safety and civil protection
6. Security in credit institutions and property security.
7. Report on the implementation of activities in public space (suitability) vs. security
Note: Before the start of the course, students will have a schedule of activities and a syllabus available in the classroom.
Title | Hours | ECTS | Learning Outcomes |
---|---|---|---|
Type: Directed | |||
Seminars | 19.5 | 0.78 | 4, 8, 5, 10, 1, 22, 23, 24, 20 |
Theory (review of cases) | 19.5 | 0.78 | 2, 4, 3, 19, 15, 7, 6, 12, 11, 14, 9, 23, 16, 21 |
Type: Autonomous | |||
Readings, preparation of dssiers and group work | 106 | 4.24 | 15, 7, 13, 10, 18, 23, 24, 21 |
Note: Before the start of the course, students will have a schedule of activities and subject syllabus available in the virtual classroom.
1.-Teaching system
Cooperative learning and the case method. Classes
2.-Theoretical classes and seminars:
The theoretical classes will be accompanied by audiovisual means.
The seminars will be based on the presentation of real cases and discussion of their ways of prevention. In order for students to be able to carry out the required exercises, a practical guide will be provided.
In addition, in the seminars, students make presentations of group work.
3.-Presence hours
The course will have 13 weeks, 39 hours of teaching in lectures and seminars (19.5 hours of theory and 19.5 hours of seminar) The rest of the hours (111), up to 150, will be distributed between hours of evaluation and hours of homework.
Annotation: Within the schedule set by the centre or degree programme, 15 minutes of one class will be reserved for students to evaluate their lecturers and their courses or modules through questionnaires.
Title | Weighting | Hours | ECTS | Learning Outcomes |
---|---|---|---|---|
Assistence and participation | 10% | 0 | 0 | 22 |
Dossier ( Directed ) | 30% | 0 | 0 | 3, 19, 15, 7, 6, 12, 8, 5, 13, 9, 10, 17, 18, 1, 23, 16, 20, 21 |
Individual projects ( Autonomus) | 30% | 2.5 | 0.1 | 2, 3, 7, 6, 12, 11, 14, 9, 10, 1, 24, 16 |
Practical Group project ( supervised) | 30% | 2.5 | 0.1 | 4, 3, 12, 1, 22, 23, 24, 16 |
Evaluation model:
A) Continuous assessment system:
Attendance is mandatory. The teaching staff will count the justified and unjustified absences in each session. If a student does not attend a minimum of 80% of the teaching activities, he/she will not be able to pass the work. Excused absences cannot be counted negatively. The teacher must allow the student to make up the work done in class in case of justified absence. For an absence to be excused, it must be documented. Only those derived from force majeure such as illness or similar situations that prevent attendance at teaching activities may be justified absences.
Students will be valued as long as they have completed a set of activities whose weight is equivalent to a minimum of 2/3 of the total grade of the subject. If the value of the activities carried out does not reach this threshold, the teacher of the subject may consider the student as not evaluated.
General criteria such as the level of student participation and the ability to relate conceptual content to procedural content will be assessed, all framed by the deontological values of the profession.
Classes start and end punctually, and that, except in cases of force majeure, entry is not allowed once the class has started or before it ends.
There are 4 evaluation activities. All must be passed (5) to pass the assessment.
• Telematic preparation of a dossier (portfolio). All the contents worked on in the subject will be collected through the teacher's explanation, visualization of graphic documents, readings, conclusions of group work, among other activities. 30% grade finish. References are mandatory in the exercises presented and the recommended bibliography is cited.
• Individual work PAC 1 .30% final grade.
• PAC2 group work. 30% grade finish.
• Attendance and participation in class. 10%
Other conditions to pass the subject
Actively participate in classes and carry out individual and group work.
Students have the opportunity to resit both the continuous assessment activities and, where appropriate, the final exam. In no case may the revision imply a reduction in the grade.
B) Single evaluation model:
In this case, students will be evaluated based on a final test, in which the student must demonstrate that they have acquired the set of competencies of the subject.
Description of each assessment activity:
The final exam of the subject will be a multiple-choice test + 2 exercises to be developed by the student + reading of the subject syllabus, necessary to carry out the exercises and answer the exam questions.
Specification of the content (Duration for completion 2h).
15 multiple-choice questions with a value of 0.4 points for each correct answer (6 points). For every two incorrect answers, one correct answer will be subtracted. Not answering a multiple-choice question does not penalize.
Exercise 1: evaluation of the practical case: if it is correct, 2 points, it is mandatory to do so, or the test will be considered not passed.
Exercise 2 Commentary on the bibliographic text Assessment if it is correct 2 points, it is mandatory to take it or the test will be considered not passed The maximum grade in the recovery will be a 5
Evaluation criteria:
If the exam obtains a score of less than 5 points, the student must take the exam with an evaluation model similar to that of the exam, but with different questions and topics.
Basic bibliography for the exam:
Syllabus of the subject (available in moodle from the beginning of the subject)
Domínguez León, J. (2018). New security issues. Cisde.
Resit
Students have the opportunity to recover both the continuous assessment activities and, where appropriate, the final exam. In no case may the revision implya reduction in the grade.
Copying in exams and plagiarism:
A student who copies or attempts to copy an exam will have a 0 in the subject and will lose the right to reassessment. A student who presents a practice in which there are indications of plagiarism or who cannot justify the arguments of his practice, will obtain a 0 and will receive a warning. In case of repetition of the conduct, the student will fail the subject (0) and will lose the right to resit.
Note: The following references should be used in individual and group essays.
Basic bibliography
Domínguez León, J. (2018). Problemas emergentes en seguridad. Cisde
Martinez Quirante, R. (2002). Armas: ¿Libertad americana o prevencióneuropea?. Ariel Derecho
Schopenhauer, A. (2002). El arte de tener razón en 38 estratagemas. Nueva Biblioteca Edaf
Anitua, A. (2006). Manual de protección civil. Dirección de Atención de Emergencias. Gobierno Vasco.
Mata Martín, R. M. (2007). Estafa convencional, estafa informática y robo en el ámbito de los medios electrónicos de pago el uso fraudulento de tarjetas y otros instrumentos de pago. Aranzadi.
Menéndez, D. (2008). Formación superior en prevención de riesgos laborales. Parte obligatoria y común. Lex Nova.
Rebollo, D. (2004). Derechos fundamentales y protección de datos. Dykinson.
Romeo, C. (2006). El cibercrimen, nuevos retos jurídico-penales, nuevas respuestas político-criminales. Comares.
Ruiz, A. (2005). Manual práctico de protección de datos. Bosch.
Complementary references
Punset, E. (2012). Excusas para no pensar. Destino
Ferro, J. M. (2014). Manual operativo del director y jefe de seguridad. Fragua.
Poeda, M. A. & Torrente. B. (2015). Dirección y gestión de la seguridad privada. Fragua.
Medina-Reyes, J. L. (2018). Protección de personalidades e instalaciones físicas. Fragua.
References with gender perspective
Alonso-Olea, A. y Casas, M. E. (2010). Derecho del Trabajo. Cívitas.
Vara, M. J. (2006). Estudios sobre género y economía (Vol. 15). Akal.
Torrente, D. (2015). Análisis de la seguridad privada. UOC.
Mandatory readings
Sánchez, O. (2016). Protocolo de comunicación y seguridad en eventos: posibles amenazas. Editorial Icono 14, pp. 11-36, 135-159 i 161-187.
Please note that this information is provisional until 30 November 2025. You can check it through this link. To consult the language you will need to enter the CODE of the subject.
Name | Group | Language | Semester | Turn |
---|---|---|---|---|
(SEM30) Seminaris (30 estudiants per grup) | 11 | Catalan | first semester | afternoon |
(TE) Theory | 1 | Catalan | first semester | afternoon |