Title: CJS 250 Successful Learning/cjs250dotcom
1 CJS 250 Successful Learning/cjs250dotcom
2 CJS 250 Successful Learning
- CJS 250 Week 1 Assignment Biography of Allan
Pinkerton
- CJS 250 Week 1 Checkpoint Historical Laws and
Security - CJS 250 Week 1 Assignment Biography of Allan
Pinkerton - CJS 250 Week 2 Checkpoint Threat and Risk
Assessment - CJS 250 Week 2 DQ 1 and DQ 2
- CJS 250 Week 3 Exercise Interview schedule
- CJS 250 Week 3 Assignment Security Objective
Components - CJS 250 Week 3 Checkpoint Risk Managment
- CJS 250 Week 4 Checkpoint Models of Physical
Security (Appendix D) - CJS 250 Week 4 DQ 1 and DQ 2
- CJS 250 Week 5 Checkpoint Evaluating Safe Work
Conditions Appendix E - CJS 250 Week 5 Checkpoint Floor Plan
- Assignment Biography of Allan Pinkerton
-
- No study of the private security industry would
be complete without mention of Allan Pinkerton
and the Pinkerton Detective Agency. Pinkerton
made many contributions both to private security
and to national law enforcement, and the
Pinkerton Detective Agency was the forerunner to
modern private security and detective agencies. -
- Write a 500- to 700-word biography of Allan
Pinkerton focusing on the overlap between private
and public security in the career of Pinkerton
and the development of the Pinkerton Detective
Agency. Include the following -
- o A history of Pinkertons career as a law
enforcement official
3 CJS 250 Successful Learning
- CJS 250 Week 1 Checkpoint Historical Laws and
Security
- CJS 250 Week 2 Checkpoint Threat and Risk
Assessment
- 1. CheckPoint Historical Laws and Security
-
- Write a brief description in your own words of
the following laws, including where and when each
law originated -
- o The Code of Hammurabi
- o Dracos law
- o Law of the Twelve Tables
- o Justinian Code
- CheckPoint Threat and Risk Assessment
-
- Review Ch. 3 of the text.
- Complete Appendix B.
-
4 CJS 250 Successful Learning
- CJS 250 Week 3 Assignment Security Objective
Components
- CJS 250 Week 2 DQ 1 and DQ 2
- Discussion Questions
-
- Consider the definition of security given on
pp. 7172 of the text. Can any target environment
ever be perfectly stable or predictable? Why or
why not? Why does the author stress that security
efforts for any target environment are a
never-ending process and that security
objectives change over time? How can complacency
pose a problem for security professionals? -
- Consider several locationsprivate or public,
residential or commercialyou are currently
familiar with. Do any of these places have what
you would consider obvious vulnerability gaps?
Briefly explain. What steps would you take to
address these vulnerabilities? -
- Assignment Security Objective Components
-
- Read the article on p. 109 and review pp.
113115 of the text. - Address the following points in a 700- to
1,050-word response -
- o What component of the overall security
objective deserves the most attention in the
environments mentioned in the article? What
components would be less pertinent for these
particular environments during a vulnerability
assessment? Why? -
- o Relative to the primary component you chose
above, what are some countermeasures or possible
solutions for the shootings, incidences of arson,
and bombing? -
- o What components of the overall security
objective would be more pertinent had these
events occurred at a mall? Would these components
present alternati
5 CJS 250 Successful Learning
- CJS 250 Week 3 Checkpoint Risk Managment
- CJS 250 Week 3 Exercise Interview schedule
- 1. Exercise Interview Scheduling
-
- Contact a manager or security personnel and
schedule a meeting for an interview to be
completed by Week Five. - Post the name and title of the person you plan
to interview with the date and time of the
interview as a message to your facilitator. -
- CheckPoint Risk Management
-
- Read the Risk Management scenario presented in
Appendix C. - Complete the table in Part I.
- Answer the questions in Part II.
-
6 CJS 250 Successful Learning
- CJS 250 Week 4 Checkpoint Models of Physical
Security (Appendix D)
- CJS 250 Week 4 DQ 1 and DQ 2
- Discussion Questions
-
- What are the most common features of physical
security? What are the least common? How can
extant features of a target environment be
adapted for security purposes (such as for
detection or asset protection)? Provide specific
examples. -
- While it may be ideal for security planners to
utilize or install the latest technology, it may
not always be practical. How can a security
professional balancelimitations such as budget or
space with the need to keep abreast of the latest
industry technology and trends? How much
technological knowledge should security
professionals have? How broad or detailed should
that knowledge be? -
- CheckPoint Models of Physical Security
-
- Complete Appendix D.
7 CJS 250 Successful Learning
- CJS 250 Week 5 Assignment Security Manager
Interview
- CJS 250 Week 5 Checkpoint Evaluating Safe Work
Conditions Appendix E
- CheckPointEvaluating Safe Working Conditions
-
- Read the summaries in Appendix E.
- Answer the questions following each summary in
100 words or more. - Post as an attachment.
-
- Assignment Security Manager Interview
-
- Interview a manager of security personnel.
-
- Use the questionnaire provided in Appendix F to
record responses in detail. Space has been
provided for additional questions, but be sure to
record any additional questions as well as the
responses. -
- Complete Part II once all answers have been
recorded. -
8 CJS 250 Successful Learning
- CJS 250 Week 5 Checkpoint Floor Plan
- CJS 250 Week 6 Checkpoint Security Assessment
- CheckPoint Security Assessment
-
- Choose two of the four settings from Ch. 9 and
carefully review the accompanying summaries,
bullet points, and floor plans. - Complete a security assessment for each setting
using Appendix G. - Provide at least two countermeasures specific
to physical security and one countermeasure
specific to personnel or security management for
each setting.Explain your choices.
- CheckPoint Floor Plan
-
- Create a description of the target environment
to be used for your final project. The
environment can be imaginary or real, but the
description must include the following -
- o The title, purpose, or function of the
environment (Bank, for example, or Convenience
Store) - o A basic floor plan
9 CJS 250 Successful Learning
- CJS 250 Week 6 DQ 1 and DQ 2
- CJS 250 Week 7 Assignment Relationship between
Private and Public Police
- Assignment Relationship Between Private and
Public Police -
- Write a 750- to 1,050-word paper discussing the
relationship between private and public police.
Is this relationship positive or negative?
Provide specific examples to support your
opinion. -
- Discuss how the conflict regarding the
definition of public and private space influences
the relationship between private and public
police. -
- Discussion Questions
-
- Read the section on the Walt Disney
Corporations security operations in Orlando on
pp. 206209 of the text. How arethe Walt Disney
Corporations security operations integrated into
the overall business operations? How are
non-security personnel and environmental features
used for security purposes and how do security
personnel contribute to the overall mission of
the business operations? Why is the integration
of individual security components into the
overall security design and the overall business
mission important?
10 CJS 250 Successful Learning
- CJS 250 Week 8 DQ 1 and DQ 2
- CJS 250 Week 9 Capstone CheckPoint
- Capstone CheckPoint
-
- Each target environment has unique security
needs and offers security professionals distinct
challenges and opportunities. In a 200- to
300-word response, answer the following
questions -
- o Why is it important for a security professional
to know specifics about the particular target
environment to which they are assigned? - o How can experienced security professionals
prepare themselves for challenges and
opportunities they have never encountered before?
- o Is it possible that experience with only one
type of environment can actually be a drawback
for security professionals approaching a new
environment?
- Discussion Questions
-
- Security professionals have similar functions
and duties as the police but do not share the
same level of authority in criminal procedure.
What are the differences between private and
public police in their level of authority? What
are the limitations security professionals must
recognize? -
- What role should non-security personnel play in
an emergency plan and disaster response? Should
these roles be included in a procedures manual?
Why or why not?
11 CJS 250 Successful Learning
- CJS 250 Week 9 Final The Security Plan
- Final Project The Security Plan
-
- Create a 1,400- to 1,750-word comprehensive
security plan for the target environment you
submitted in Week Five. In your plan, include the
following items -
- o The floor plan of the target environment
- o A list of threats
- o A risk assessment for each threat
- o Current vulnerability gaps
12 CJS 250 Successful Learning
- CJS 250 Week 7 Checkpoint Public Relations and
Professionalism
- CJS 250 Week 8 Checkpoint Law and Legal Issues
- CheckPoint Law and Legal Issues
-
- Imagine you are responsible for training
newly-hired security personnel. You must deliver
a presentation to the new recruits on criminal
procedure and legal issues as they pertain to
security professionals. -
- Create a 5- to 7-slide MicrosoftPowerPointpres
entation on law and legal issues as they apply
specifically to private security professionals. - Outline the basic organization of law
- CheckPoint Public Relations and Professionalism
-
- Resource The Private Arm of the Lawarticle
at http//www.washingtonpost.com/wp-dyn/content/ar
ticle/2007/01/01/AR2007010100665.html -
- Write a 250- to 300-word response discussing
the public relations image and professionalism of
the private security industry. What are some
examples from the article concerning the
importance of private security industry
membershaving the same level of professionalism
as public law enforcement officers?
13 CJS 250 Successful Learning