Degree | Type | Year |
---|---|---|
Prevention and Integral Safety and Security | OB | 1 |
You can view this information at the end of this document.
This subject doesn´t have any pre-requierments.
Differentiate and define security systems, such as electronic, physical and human elements, in the latter with special attention to learning men and women with respect and equality without prejudice to gender, installed and deployed in a facility to protect people and property before the different risks that can affect them.
Knowing the regulatory framework that regulates security technologies, and their relationship with the sectors of public security and private security.
Know the different electronic security devices that are marketed, installed, and maintained for the design of comprehensive security plans.
On the other hand, to know the existing physical security systems and how they are combined with electronic security systems to minimize the different risks to which the installation we wish to protect may be exposed.
Title | Hours | ECTS | Learning Outcomes |
---|---|---|---|
Type: Directed | |||
Classes with TIC support | 12 | 0.48 | |
Evaluation | 4 | 0.16 | |
Type: Supervised | |||
Work planning Readings, reflection on the subjects. Preparation of individual works. Continuous tests, and final test. | 24 | 0.96 | |
Type: Autonomous | |||
Individual and group work (search for material, discussion, preparation and presentation). | 110 | 4.4 |
• Classes with TIC support. Resolution of doubts and questions. Job tracking
• Resolution of exercises and practices: individual realization of works and practical cases, with ICT support.
• Personal study: Consolidation of theoretical and practical knowledge.
• The tutorials with the faculty will be arranged by email.
The language in which classes are taught is: Spanish.
Annotation: Within the schedule set by the centre or degree programme, 15 minutes of one class will be reserved for students to evaluate their lecturers and their courses or modules through questionnaires.
Title | Weighting | Hours | ECTS | Learning Outcomes |
---|---|---|---|---|
Final exam. | 50% | 0 | 0 | 6, 3, 1, 4, 21, 10, 5, 7, 15, 8, 2, 11, 9, 12, 13, 14, 20, 19, 18, 16, 17, 24, 23, 22 |
PEC 1 | 12.5% | 0 | 0 | 6, 3, 1, 4, 21, 10, 5, 7, 15, 8, 2, 11, 9, 12, 13, 14, 20, 19, 18, 16, 17, 24, 23, 22 |
PEC 2 | 12.5% | 0 | 0 | 6, 3, 1, 4, 21, 10, 5, 7, 15, 8, 2, 11, 9, 12, 13, 14, 20, 19, 18, 16, 17, 24, 23, 22 |
PEC 3 | 12.5% | 0 | 0 | 6, 3, 1, 4, 21, 10, 5, 7, 15, 8, 2, 11, 9, 12, 13, 14, 20, 19, 18, 16, 17, 24, 23, 22 |
PEC 4 | 12.5% | 0 | 0 | 6, 3, 1, 4, 21, 10, 5, 7, 15, 8, 2, 11, 9, 12, 13, 14, 20, 19, 18, 16, 17, 24, 23, 22 |
The evaluation will be based on continuous assessment criteria, which makes attendance mandatory and allows us to measure the level of specific competencies from the program that the student has acquired.
The value of each evaluation item is indicated in the following table. All items must be passed with a minimum grade of 3.5 in order to be counted towards the final evaluation.
To be eligible for continuous assessment, students must take all evaluable tests (PECs, Midterm Exam, Final Exam), and must score at least 3.5 on each of them for their grades to count toward the final evaluation. If a student does not complete all the assessment activities or does not score at least 3.5 on each one, they will go directly to the recovery exam.
PECs and assignments must follow the appropriate citation guidelines. No work will be accepted without correct citation. Citation Guide
If the student does not pass the course according to the continuous assessment criteria, they may take a Recovery Exam on the date specified in the schedule. This exam will cover a summary of the entire course content.
To be eligible for the recovery exam, the student must have been assessed in a set of activities representing at least two-thirds of the total grade. However, the maximum final grade that can be recorded in the student’s transcript after the recovery exam is 5 - Pass.
Students needing to reschedule an evaluation must complete the request form available in the EPSI Tutoring Moodle space.
Without prejudice to other appropriate disciplinary measures and in accordance with current academic regulations:
“If a student commits any irregularity that could significantly alter the grade of an assessment activity, that activity will be graded with a 0, regardless of any disciplinary process that may be initiated. If multiple irregularities occur in the same course, the final grade for the course will be 0.”
Tests and exams may be written and/or oral, at the discretion of the instructor.
PLAGIARISM
If there is any indication that an activity or assignment has been completed using AI-assisted responses, the instructor may require a follow-up interview to confirm authorship.
Single Evaluation
Students opting for single evaluation will complete a final synthesis test covering the entire course content (50%) and will submit the course assignment (50%).
The date for both the test and the assignment submission will be the same as that scheduled for the final continuous assessment exam.
The same recovery system as for continuous assessment will apply.
Evaluation for students retaking the course
Students retaking the course must complete all scheduled tests and exams and submit all assignments on the dates indicated in the Moodle classroom.
Not Evaluable
If the student has not been assessed in two-thirds of the evaluation activities (due to not attending the exams or submitting the assignments), they will receive a grade of “Not Evaluable” as per EPSI’s Evaluation Regulations. This means the student will not be eligible for the final recovery exam.
Recovery Exam
Students who do not pass the course (i.e., do not reach a total of 5 out of 10) according to the established criteria may take a final recovery exam, provided they have been assessed in activities worth at least two-thirds of the course grade. If the student has not been evaluated for these two-thirds (e.g., by missing exams), they will receive a grade of “Not Presented” and will not be allowed to take the recovery exam.
This exam will again cover all course content. If the student passes, the maximum grade they can receive for the course is 5 - Pass, regardless of the exam score.
Change of Date for an Assessment or Exam
Students who need to change the date of an evaluation must fill out the form available in the EPSI Tutoring Moodle space. Once completed, the form must be sent to the course instructor and the Degree Coordinator.
Review
To request a review of any evaluative activity, students must send an email to the instructor, who will then explain the review procedure.
The same process applies for students in the single evaluation track.
USE OF AI
In this course, the use of Artificial Intelligence (AI) tools is allowed as an integral part of the development of the assignment, provided that the final results reflect a significant contribution from the student in terms of personal analysis and reflection on the topics covered. The student must identify which parts of the work have been completed using AI and which have not, as well as the name of the AI tool used. Lack of transparency in the use of AI is considered a breach of academic integrity and may result in a penalty in the activity grade, or more serious sanctions in severe cases.
Aguado, V. (2007). Derecho de la Seguridad Pública y Privada. Navarra: Editorial Aranzadi.
Arzoz, X. (2010) Videovigilancia, seguridad ciudadana y derechos fundamentales. Navarra: Editorial Thomson Reuters.
Bentham, J. (1989). El Panóptico. Madrid: Editorial Endymion.
Bübl, M. (2017) La ciencia secreta de la cerrajería. Austria: Bübl.
Calero, L.M. (2005). La seguridad privada en España: actores, especificaciones y su planificación. Madrid: Editorial Universitas Internacional. S.L.
Desdentado, A., Muñoz, B. (2012). Control informático, videovigilancia y protección de datos en el trabajo. Valladolid: Editorial Lex Nova.
Díaz, F. (2013). Diccionario LID. Inteligencia y Seguridad. Madrid: Editorial Empresarial.
Ferro, J.M. (2015). Manual operativo del director y jefe de seguridad. Madrid: Editorial Auto-Editor.
Foucault, M. (2012). Vigilar y Castigar. Madrid: Editorial Biblioteca Nueva, S.L.
Freedman, L. (2019). La Guerra del Futuro. Barcelona: Editorial Crítica.
Gómez, R. (2014). Diccionario terminológico para la seguridad privada. Madrid: Editorial Tecnos.
Gómez, R. (2014). Diccionario terminológico de la seguridad privada. Madrid: Editorial Tecnos. S.L.
González, J. (2012) Inteligencia. Valencia: Tirant lo Blanch
González, M. (2011). Guía visual para falsear cerraduras (3.ed.). Illinois: Standard Publicaciones, Inc.
Innerarity, D., Solana, J. (2011). La humanidad amenazada: gobernar los riesgos globales. Barcelona: Editorial Paidós.
Lamas, L. (2019) Apertura de puertas, técnicas y trucos. (4.ed.). Madrid: Nivel Medio.
Lyon, D. (1995). El ojo electrónico. El auge de la sociedad de vigilancia. Madrid: Editorial Alianza.
Macías Fernández. D. (2014). David contra Goliat. Guerra y Asimetría en la edad contemporánea. Madrid. Editorial Instituto Universitario Gutiérrez Mellado.
Martínez, R. (2002). Armas: ¿Libertad americana o prevención europea? Barcelona: Editorial Ariel.
Martínez, R., Rodríguez, J. (2018). Inteligencia artificial y armas letales autónomas. Gijón: Ediciones Trea.
Martínez. E. (2008). Los soldados del Rey. Madrid. Editorial Andújar.
McLaughlin, E., Muncie, J. (2014). Diccionario de criminología. Barcelona: Editorial Gedisa, S.A.
Miró, F. (2012). El Cibercrimen. Fenomenología y criminología de la delincuencia en el ciberespacio. Barcelona: Editorial Marcial Pons.
Montoya, R. (2014). Drones. La muerte por control remoto. Madrid: Editorial Akal.
Muñoz Bolaños. R. (2001). La campaña de 1909. Las campañas de Marruecos, 1909-1927. Madrid.
Perales, T. (2014). Instalaciones de sonido, imagen y seguridad electrónica. Madrid: Editorial Marcombo.
Poveda, M.A., Torres, B. (2015). Dirección y gestión de la seguridad privada. Madrid: Editorial Fragua.
Puell de la Villa. F. (2007). La guerra con armas de fuego. M. Artola (ed.). Historia de Europa. Madrid. Editorial Espasa Calpe. Vol. II.
Quedada. F. (2007). La Guerra con arma blanca. M. Artola (ed.) Historia de Europa. Madrid. Editorial. Espasa Calpe. Vol. I.
Ridaura, M.ª J. (2015). Seguridad Privada y Derechos Fundamentales (La nueva Ley 5/2014, de abril, de Seguridad Privada). Valencia: Editorial Tirant lo Blanch.
Rodríguez, A (2005). 250 modelos de cerrajería. Barcelona: Ediciones CEAC.
Rodríguez, F. (2018). Circuito cerrado de televisión y seguridad electrónica. (ed.2) Madrid. Editorial Paraninfos.
Somoza, O. (2004). La muerte violenta. Inspección ocular y cuerpo del delito. Madrid: Editorial la Ley.
Teijeiro de la Rosa. JM. (2016). Dinero y ejércitos en España. De la Antigüedad al siglo XXI. Madrid.
Torrente, D. (2015). Análisis de la seguridad privada. Barcelona: Editorial UOC.
This subject will use the basic software of the office 365 package.
Please note that this information is provisional until 30 November 2025. You can check it through this link. To consult the language you will need to enter the CODE of the subject.
Name | Group | Language | Semester | Turn |
---|---|---|---|---|
(TE) Theory | 1 | Spanish | second semester | afternoon |