| Searching Current Courses For Fall 2016 |
|
Course: |
PSM 102
|
|
Title: | Crime Prevention/Technologies |
|
Long Title: | Crime Prevention & Technologies |
|
Course Description: | Explores the contemporary security management and loss prevention issues that require expertise in specialized investigative methods. Computer-related investigations, such as child abduction, fraud, and identification theft, will be covered with a focus on how the Internet can be used as an investigative tool. A historical perspective of terrorism as well as special investigative techniques associated with the investigation of terrorist activity will be presented. Additional analyses and discussions will center on forensic advances as they relate to suspect identification and loss prevention analysis. |
|
Min Credit: | 3 |
|
Max Credit: | |
STANDARD COMPETENCIES:
I. To describe methods in which computers are used as an investigative tool in investigations
II. To examine and explain how computers can be strategic tools in the forensic examination of evidence during proactive investigations
III. To explore the technologies of surveillance and biometrics and explain how they may be used for proactive loss prevention
IV. To demonstrate how to conduct searches for locations of persons, background information on individuals and background information on enterprises using the Internet
V. To develop a data base system for logging and retrieving information relevant to an incident investigation
VI. To report statistics on the rising problem of computer related fraud and identify methods of fraud commonly used on the World Wide Web
VII. To describe how white-collar crime, specifically, fraud, has increased through mobile computing networks
VIII. To explain how tracing fraud through the Internet and financial documents is accomplished to aid in resolving investigations.
IX. To outline the history of international terrorism give a briefing on a currently active terrorist organization
X To describe how businesses, governments and other entities are threatened by ¿Global Informational Warfare¿
XI. To explain how to safeguard computer systems
XII. To outline the history of domestic terrorism
XIII. To work in teams to give a briefing on a currently active terrorist organization.
XIV. To identify at least two examples of the social affects of terrorism on the United States and selected foreign countries
XV. To debate the potential for the suspension of constitutional guarantees given increased terrorist activities within the United States
XVI. To outline the elements of the crime of identity theft
XVII. To present a case study on the impact on the victim of identity theft and the investigative tactics used
XVIII. To predict what forensic applications might be like ten years in the future
TOPICAL OUTLINE:
I. Overview of crime prevention and related technologies
II. Methods used in computer related investigations
III. Conducting Internet searches with a limited amount of information.
IV. Computer related fraud crime
V. History international and national terrorism.
VI. Current era of international and national terrorism
VII. Social affects of terrorism on the United States and selected foreign countries
VIII. Specialized investigation requirements relating terrorist acts to other criminal investigations
IX. Recent forensic advances and their specific impact on investigative methods and procedures
X Identity theft
XI. Other topics as time permits
|
Community College of Aurora |
CCA |
Skip to top of page