Go to Main Content

 

 

HELP | EXIT

Common Course Numbering System

 

Your current Institution is CCCS
Transparent Image

 Searching Current Courses For Fall 2016

  Course: PSM 102
  Title:Crime Prevention/Technologies
  Long Title:Crime Prevention & Technologies
  Course Description:Explores the contemporary security management and loss prevention issues that require expertise in specialized investigative methods. Computer-related investigations, such as child abduction, fraud, and identification theft, will be covered with a focus on how the Internet can be used as an investigative tool. A historical perspective of terrorism as well as special investigative techniques associated with the investigation of terrorist activity will be presented. Additional analyses and discussions will center on forensic advances as they relate to suspect identification and loss prevention analysis.
  Min Credit:3
  Max Credit:

  Origin Notes: CCD

 STANDARD COMPETENCIES:
 
 I.      To describe methods in which computers are used as an investigative tool in investigations
 II.     To examine and explain how computers can be strategic tools in the forensic examination of evidence during proactive investigations
 III.    To explore the technologies of surveillance and biometrics and explain how they may be used for proactive loss prevention
 IV.     To demonstrate how to conduct searches for locations of persons, background information on individuals and background information on enterprises using the Internet
 V.      To develop a data base system for logging and retrieving information relevant to an incident investigation
 VI.     To report statistics on the rising problem of computer related fraud and identify methods of fraud commonly used on the World Wide Web
 VII.    To describe how white-collar crime, specifically, fraud, has increased through mobile computing networks
 VIII.   To explain how tracing fraud through the Internet and financial documents is accomplished to aid in resolving investigations.
 IX.     To outline the history of international terrorism give a briefing on a currently active terrorist organization
 X       To describe how businesses, governments and other entities are threatened by ¿Global Informational Warfare¿
 XI.     To explain how to safeguard computer systems
 XII.    To outline the history of domestic terrorism
 XIII.   To work in teams to give a briefing on a currently active terrorist organization.
 XIV.    To identify at least two examples of the social affects of terrorism on the United States and selected foreign countries
 XV.     To debate the potential for the suspension of constitutional guarantees given increased terrorist activities within the United States
 XVI.    To outline the elements of the crime of identity theft
 XVII.   To present a case study on the impact on the victim of identity theft and the investigative tactics used
 XVIII.  To predict what forensic applications might be like ten years in the future


 TOPICAL OUTLINE:
 
 I.      Overview of crime prevention and related technologies
 II.     Methods used in computer related investigations
 III.    Conducting Internet searches with a limited amount of information.
 IV.     Computer related fraud crime
 V.      History international and national terrorism.
 VI.     Current era of international and national terrorism
 VII.    Social affects of terrorism on the United States and selected foreign countries
 VIII.   Specialized investigation requirements relating terrorist acts to other criminal investigations
 IX.     Recent forensic advances and their specific impact on investigative methods and procedures
 X       Identity theft
 XI.     Other topics as time permits



 Course Offered At:

  Community College of Aurora CCA
Transparent Image
Skip to top of page

Skip CCNS Pub Presentation Links

[ CCNS Main Menu ]

Release: 8.5.3