There are ten study units in this course.
The study units examine key issues, explain the relevant concepts and examples, and comment on related readings. Each unit contains activities to help reinforce your learning of the issues under discussion. Moreover, the assignments provide you with feedback and help you achieve the learning outcomes of the course.
The course is structured so that each unit builds on previous ones. Each unit contains a variety of techniques to help you study. The following points will help you get the most out of the units:
- Read each study unit carefully. This is like paying attention throughout a whole lecture.
- Use the unit guide to help direct you on what to read in the readings and when to read them.
- Test your comprehension and analytical skills by working through the activities. Don't skip ahead to find the answers — you will learn better by doing the thinking yourself.
- Complete the assignments on time.
- Check out the other suggested readings referred to in the unit. The other sources might include Internet websites, videos, and so on.
Don't panic if you haven't received all ten units in the first mailing from HKMU. It is normal to receive your study units in a number of separate packages.
Study units
Unit 1 Introduction to security management in the Hong Kong context introduces you to the concept of security management by discussing contemporary security management issues in relation to societal and organizational needs. It also gives you an overview of private security in Hong Kong.
Unit 2 Criminology for the security manager introduces you to the main schools of thought within the broad discipline of theoretical criminology. It starts with the classical perspective and works through various sociological, psychological and biological theories of criminality, before focusing on theories of crime as an event, which are particularly relevant to the work of the security manager.
Unit 3 Legal issues in private security covers the general legal context in which legal issues relevant to private security arise. More specifically, it seeks to describe and analyse the sources of powers, obligations and liabilities of private security personnel, and theproblems (with possible solutions) they face in carrying out their work. You look at relevant areas of substantive and procedural law and, when appropriate, human rights law.
Unit 4 Employee crime and investigative services discusses the issue of internal theft and its prevention, detection and investigation, and covers fraud, white-collar crime and related issues. You learn how to conduct an investigative interview, which is a major component of investigation, and examine the requirements of good report writing.
Unit 5 Risk and risk management introduces the basic concepts of risk and crisis management, including the methodologies and processes of risk analysis, threat assessments, and the security survey. In the field of security management, risk is becoming increasingly important. In this unit, you examine the requirements of a risk analysis and find out how to adapt a survey for specific workplaces (such as your own).
Unit 6 Physical security provides the basic principles of physical security and explains different types of physical protective system. You pay particular attention to perimeter security, access control, security lighting, camera system and intrusion alarm systems, and consider emergency planning in case of fire, chemical spills and bomb threats.
Unit 7 Corporate security deals with various aspects of corporate security. First, you look at the protection and classification of information, including threats to proprietary information from commercial espionage. The fundamentals of personnel security are also covered, including pre-employment and post-employment screening and its importance in security. Finally, workplace violence is discussed, with a view to prevent financial loss and other damages.
Unit 8 Cybersecurity examines both internal and external threats to organizational and private computer systems. You also consider computer and network abuses, cyber crime, the traditional data security model versus the current information security framework, risk assessment, baseline security assessment, effective security tactics and controls, and strategic information security management.
Unit 9 Retail security examines internal and external theft through shop theft, employee theft, burglary, robbery, and credit fraud. You also look at loss prevention strategies and security awareness programmes.
Unit 10 Security management: a profession? asks you to think about the question of whether or not security is a profession. The unit explores the origins and progress of security management, and examines the importance of integrity and ethics. You also look at the development and importance of education and training. The unit introduces you to the existing professional security associations and the benefits of professional affiliation.
Text readings and supplementary readings
The ten study units draw on a series of selected articles and chapters from books that make a significant contribution to the understanding of the issues in security practice and management. These readings are provided in your course package. In addition, suggestions for further reading are made at the end of these units. You should be able to obtain these readings from the reserve section in the HKMU Library.
Recommended equipment
All students and tutors are encouraged to have access to a PC with an Internet connection. You may also use the HKMU lab PCs, many of which have access to the Internet.
The following PC specifications are stated here only as minimum requirements, recognizing that you may be able to access much more powerful equipment:
- 486 processor running at 33Mhz
- Windows 95 or Windows 3.1 or higher
- Minimum 8MB of RAM
- 256 colour display running at 640x480 pixels
- double-speed CD-ROM drive
- Sound card.
Internet
Internet sites concerning security practice and management issues around the world are noted in the text of the course. Access to the Internet is not required, but it will benefit your studies.
Key sites
Information security magazine archived articles: http://searchsecurity.techtarget.com/
Intelligence-Based Threat Assessments for Information Networks and Infrastructures: A White Paper: http://all.net/books/iw/iwarstuff/www.aracnet.com/_kea/Papers/threat_white_paper.shtml
Security policy:
https://www.sans.org/information-security-policy/
Security management:
https://www.sans.org/information-security-policy/
HKCERT:
https://www.hkcert.org/