B.S. in Accounting
"I commend Dr. Akande and all of my professors for the wonderful preparation and inspiration to start the next chapter of my life! "
The complexities of modern society have combined to generate a variety of threats to business organizations, information networks, military installations, government operations, and individuals. The curriculum of the program is based primarily on the social sciences. The program is designed to give maximum exposure to security management skills and to provide flexibility for the specific needs of the individual student.
The content of the business and organizational security management program complements and assists the student in preparation for the Certified Protection Professional Program.
The 36 credit hours required for the master of arts (M.A.) or the 51 credit hours required for the master of business administration (M.B.A.) with an emphasis in business and organizational security management must include the following courses:
This course is an overview of principles and issues in business and organizational security management. Students examine the challenges embodied in various aspects of security such as personnel, facility, and information. Principles of loss prevention and the protection of assets are examined. Students employ the use of situational analyses, case studies, and other research-oriented approaches.
This course is an overview of important legal and ethical issues with which the business and organizational security management professional must deal. Students examine such issues as personnel law and obligations; negotiations; contract management; constitutional rights of individuals; legal liability of security professionals and organizations; legal compliance; and ethical standards.
Students apply principles of management to security administration. Topics include personnel management, security planning, organizational leadership and communication, and recruitment and training.
Students examine the application of security knowledge and techniques to the protection of business assets. The security planning process is examined by the study of risk analysis, security surveys, and financial planning and decision making for development of security programs and countermeasures.
Students discuss the role of the security manager in the identification, analysis, and response to a variety of human and natural crises. They examine threats resulting from riots, demonstrations, product tampering, work stoppage activities, terrorism, and natural disasters.
Students examine the management of information security and data-processing facilities, including thefts of data, unauthorized uses of information technology, computer viruses, and methods of protecting information, with an emphasis on networked computers. The course covers information technology laws, issues of privacy, and security planning.
This course focuses on historical and contemporary perspectives of human behavior. Theories of behavior in the context of threat-producing activities are discussed. Contemporary issues such as substance abuse, violence, ideologies, and similar themes are examined. SECR 5110 Government Security Management
The student is expected to synthesize and integrate the learning experiences acquired in security management and to evaluate the research and current topics relative to this major. Techniques used to accomplish those goals may vary. Prerequisite: completion of all other required courses in this major.
In addition, the student chooses elective courses offered in this major and/or from the program curricula of other School of Business and Technology majors.
If the requisite course is waived, the student must choose an elective course from this major or from the program curriculum of another School of Business and Technology major. Students pursuing dual majors who have the requisite course(s) waived will complete only the remaining required courses for the dual majors.
Program requirements may differ based upon the enrollment year. Please speak with an academic advisor for specific requirements.