{"id":707,"date":"2012-09-10T20:03:53","date_gmt":"2012-09-10T20:03:53","guid":{"rendered":"http:\/\/catalogs.wcsu.edu\/grad1213\/asb\/courses\/justice-and-law-administration\/"},"modified":"2022-06-21T15:02:25","modified_gmt":"2022-06-21T19:02:25","slug":"justice-and-law-administration","status":"publish","type":"page","link":"https:\/\/catalogs.wcsu.edu\/grad\/asb\/courses\/justice-and-law-administration\/","title":{"rendered":"Justice And Law Administration"},"content":{"rendered":"<table style=\"width: 51.1476%;height: 26px\" border=\"0\">\n<tbody>\n<tr>\n<td style=\"width: 87.7506%\"><span style=\"font-family: times new roman,times;font-size: 12pt\"><strong>JLA 505 Homeland Security: Organization &amp; Policy<\/strong><\/span><\/td>\n<td style=\"width: 12.2494%\"><span style=\"font-family: times new roman,times;font-size: 12pt\"><strong>\u00a0\u00a0 3 SH<\/strong><\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><span style=\"font-size: 12pt;font-family: 'times new roman', times, serif\">This course will be an in-depth examination and evidence-based approach to the complex and critical role of how the Department of Homeland Security (DHS) operates in and partners with contemporary criminal justice and emergency management organizations. It will examine Homeland Security&#8217;s comprehensive influence on federal, state, and local criminal justice organizations since 9\/11. Following the events of 9\/11 through the present day, Homeland Security&#8217;s role continues to evolve, which requires continuous understanding and adaptation to threat and hazard paradigms that become prevalent in rapidly changing times. Critical mission areas such as leadership and management, counterterrorism, intelligence analysis, emergency management and response, technology, and critical infrastructure protection are the primary roles affected in the perpetual changing threat and hazard milieu in the United States. They will continue to be at the forefront of DHS&#8217;s strategy.<\/span><\/p>\n<p><span style=\"font-size: 12pt;font-family: 'times new roman', times, serif\">The use of real-world cases and scenarios will be used to guide student learning by providing an opportunity to perform critical analysis in determining effective changes and outcomes in policies or practices and identifying gaps in the decision-making processes. Students will engage in multiple evidence-based case studies to produce well-developed critical analysis. Ultimately, the student will turn analysis into action by developing a written and visual presentation of their research and findings into recommendations and suggestive best practices.<\/span><\/p>\n<table style=\"width: 65.3011%;height: 25px\" border=\"0\">\n<tbody>\n<tr>\n<td style=\"width: 74.171%\"><span style=\"font-family: times new roman,times;font-size: 12pt\"><strong><strong>JLA 510 Geopolitics &amp; Homeland Security Strategy<\/strong><\/strong><\/span><\/td>\n<td style=\"width: 25.6545%\"><span style=\"font-family: times new roman,times;font-size: 12pt\"><strong>3 SH<\/strong><\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><span style=\"font-family: times new roman,times;font-size: 12pt\">This graduate-level course will provide an advanced level of examination of the cultural, geographical, and historical analysis of the regions like South America, the Middle East, and far-eastern Asia. Countries of Mexico, Ecuador, Brazil, Venezuela, Cuba, Guatemala, El Salvador, Colombia, Arab states, Turkey, Iran, Russia, China, North Korea,\u00a0 Pakistan and India, will be primarily placed under the scope of this course. Concepts like War on terror, drugs, and cartels, post-cold war theories like <em>Clash of Civilizations<\/em>, and finally, environmental geopolitics\u00a0will be discussed<\/span><\/p>\n<table style=\"width: 71.2173%;height: 26px\" border=\"0\">\n<tbody>\n<tr>\n<td style=\"width: 90.674%\"><span style=\"font-family: times new roman,times;font-size: 12pt\"><strong>JLA 525 Data Analytics and GIS for Homeland Security Professionals<br \/>\n<\/strong><\/span><\/td>\n<td style=\"width: 33.2852%\"><span style=\"font-family: times new roman,times;font-size: 12pt\"><strong>3 SH<\/strong><\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><span style=\"font-size: 12pt;font-family: 'times new roman', times, serif\">This course introduces the theories and practices of data analytics and geographic information systems (GIS) and how they are used to develop solutions to real problems within the homeland security field. Students will be introduced to the concepts, techniques, and tools needed to conduct a meaningful analysis of data and GIS products.\u00a0 The focus will be on integrating these techniques and their application to understanding how the interpretation of information informs policy decisions in homeland security. This course requires a basic level of computer proficiency and skill.<\/span><\/p>\n<table style=\"width: 57.546%;height: 26px\" border=\"0\">\n<tbody>\n<tr>\n<td style=\"width: 91.7808%\"><span style=\"font-family: times new roman,times;font-size: 12pt\"><strong>JLA 530 Terrorism: Intelligence Analysis and Critical Thinking<\/strong><\/span><\/td>\n<td style=\"width: 8.02348%\"><span style=\"font-family: times new roman,times;font-size: 12pt\"><strong>3 SH<\/strong><\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><span style=\"font-size: 12pt;font-family: 'times new roman', times, serif\">This course provides a critical introduction to the topic of terrorism, including definitional and conceptual problems; domestic and international terrorism; key terrorist groups, motivations, and methods; terror finance; and increasing overlap between terrorism and organized crime. It also discusses the key terror related events and groups, and current and future security challenges.\u00a0\u00a0<\/span><\/p>\n<table style=\"width: 638px;height: 26px\" border=\"0\">\n<tbody>\n<tr>\n<td style=\"width: 481px\"><span style=\"font-family: times new roman,times;font-size: 12pt\"><strong>JLA 545 Strategic Planning and Budgeting for Homeland Security<\/strong><\/span><\/td>\n<td style=\"width: 155px\"><span style=\"font-family: times new roman,times;font-size: 12pt\"><strong>3 SH<\/strong><\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><span style=\"font-size: 12pt;font-family: 'times new roman', times, serif\">This course serves both the continuance and the advanced level of the beginning level course of\u00a0<em>&#8220;Homeland Security Organization and Policy&#8221; in\u00a0<\/em>this graduate program. Students will delve into the management theory subject matter in this particular course as a concept and structure. This course will discuss Organizational Theory and Homeland Security strategies. Although organizations share similar elements and features, this course provides a comprehensive overview of organization theory, particularly related to homeland security. This course is also a complete guide for writing and implementing a strategic plan for your organization. Lessons delve into why a plan is needed and explains the difference between a business plan, long-term planning, and a strategic plan. Students will learn how to make managerial decisions on budget and allocate the resources between and within the federal, state, local, and tribal agencies.<\/span><\/p>\n<table style=\"width: 405px;height: 26px\" border=\"0\">\n<tbody>\n<tr>\n<td style=\"width: 309.75px\"><span style=\"font-family: times new roman,times;font-size: 12pt\"><strong>JLA 555 Cyber Security of the Homeland<\/strong><\/span><\/td>\n<td style=\"width: 99.25px\"><span style=\"font-family: times new roman,times;font-size: 12pt\"><strong>3 SH<\/strong><\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><span style=\"font-size: 12pt;font-family: 'times new roman', times, serif\">This course examines the Internet in its broader social and policy context, focusing on cyber threats. The course will introduce the concept and principles of network security. It will provide a conceptual construct of how to think about securing networks and critical infrastructures in the U.S. The course examines the relevant questions of public policy, national security, U.S. law, and international norms. This course will also discuss how information superiority and information dominance influence operations associated with establishing and maintaining cybersecurity. It also introduces students to how internet technologies currently under development may affect homeland security in the future.<\/span><\/p>\n<p><span style=\"font-family: times new roman,times;font-size: 12pt\"><strong>JLA 600 Transportation and Border Security 3 SH<\/strong><\/span><\/p>\n<p><span style=\"font-size: 12pt;font-family: 'times new roman', times, serif\">This course on transportation and border security will examine the potential threats to critical infrastructure, transportation networks, and border security due to terror and transnational crime threats.\u00a0 The course will specifically commence with an examination of the history of terrorism as it relates to these significant vulnerabilities, particularly since the start of the new millennium and from a global perspective.\u00a0 The course will continue with a comprehensive analysis of the following key factors: critical and metropolitan infrastructure; bridges and tunnels; commuter roadways; commuter transit; passenger air travel; commercial railways; commercial shipping; the trucking industry; passenger cruise lines; national railways and busses; border and airport security; transnational human and contraband smuggling; and corruption within border and customs enforcement organizations.\u00a0<\/span><\/p>\n<p><span style=\"font-family: times new roman,times;font-size: 12pt\"><strong>JLA 610 Public Health Disaster Science and Crises Management\u00a0 3 SH<\/strong><\/span><\/p>\n<p><span style=\"font-size: 12pt;font-family: 'times new roman', times, serif\">This course introduces different types of public health and environmental health disasters, their consequences, and the role of homeland security agencies and health practitioners in preparedness, response, and recovery during a health crisis. Through course lectures and readings, case studies, discussion, and debate, students will learn and understand the foundational concepts of the public and environmental health community&#8217;s role in preparing for, responding to, and recovering from disasters. More specifically, students will learn more about the Centers for Disease Control and Prevention (CDC)&#8217;s work, the nation&#8217;s health protection agency, and how it protects our country against dangerous health threats and responds when these arise. The course is also designed to develop proficiency in analyzing and evaluating the public health response to disasters and identifying solutions and methods for improvement.\u00a0 Certain case studies will also be examined around the world.<\/span><\/p>\n<p><span style=\"font-family: times new roman,times;font-size: 12pt\"><strong>JLA 620 Security Threat Analysis on Critical Infrastructure and WMD \u00a03 SH<\/strong><\/span><\/p>\n<p><span style=\"font-size: 12pt;font-family: 'times new roman', times, serif\">This course examines the Critical Infrastructure of the United States. It provides an in-depth analysis of its vulnerabilities to secure the effective protection of people, physical entities, and critical information and support systems in the event of natural disasters and accidental or intentional man-made incidents of significant destruction. The course will guide students in the theories and practice of threat analysis, physical protection, conducting vulnerability studies, and risk assessments of Critical Infrastructure Networks and their elements. We will examine the Critical Infrastructures identified by the United States Department of Homeland Security and how disruption of these sectors could affect the public and private aspects of Homeland Security.\u00a0 The culminating project for the course will be creating a comprehensive threat analysis of one aspect of the Critical Infrastructure, including an in-class presentation.<\/span><\/p>\n<p><span style=\"font-family: times new roman,times;font-size: 12pt\"><strong>JLA 630 Advanced Legal Issues in Homeland Security \u00a03 SH<\/strong><\/span><\/p>\n<p><span style=\"font-size: 12pt;font-family: 'times new roman', times, serif\">This course will be a survey of the legal history of homeland security measures undertaken by the U.S. government since its founding as applied within the framework of the U.S. Constitution, U.S. Supreme Court decisions and international law. Additionally, the post-9\/11 environment of homeland security and the legal authority and consequence of U.S. actions within the United States and extra-territorially will be explored and discussed in class.<\/span><\/p>\n<p><span style=\"font-family: times new roman,times;font-size: 12pt\"><strong>JLA 640 Contemporary Issues in Homeland Security \u00a03 SH<\/strong><\/span><\/p>\n<p><span style=\"font-size: 12pt;font-family: 'times new roman', times, serif\">The effects of contemporary trends on the homeland security agencies are studied. Emphasis is on understanding these emerging threats and public safety issues and emergency management and response. Topics include natural disasters, foreign influence activity, cyberattacks, illegal immigration, border wall, rising domestic violent extremism, and COVID-19.<\/span><\/p>\n<p><span style=\"font-family: times new roman,times;font-size: 12pt\"><strong>JLA 650 Seminar in Homeland Security \u00a03 SH<\/strong><\/span><\/p>\n<p><span style=\"font-size: 12pt;font-family: 'times new roman', times, serif\">This course is focused on the development of the final project and all students who will graduate are required to enroll. In their last semester, students must develop a project that should demonstrate &#8220;a question of practical importance&#8221; within the homeland security field, such as creating an effective communication method during a crisis, evaluating an intervention or protocol within a first responder agency, or practice setting. Students will demonstrate achievement of the program learning outcomes by linking together the major concepts, skills, and examples of ethical leadership that were included in the entire program curriculum. Students will develop a plan to research, collect, and revise course artifacts that comprise the final project. The format will be proposed by the student and approved by the instructor. The creative project must demonstrate originality and follow the department&#8217;s style requirements &#8211; currently the American Psychological Association (APA) Publication Manual. A capstone is often multifaceted, meaning there\u2019s a presentation or performance, a paper, and research that all come together to complete the project.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>JLA 505 Homeland Security: Organization &amp; Policy \u00a0\u00a0 3 SH This course will be an in-depth examination and evidence-based approach to the complex and critical role of how the Department of Homeland Security (DHS) operates in and partners with contemporary &hellip;<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":704,"menu_order":0,"comment_status":"open","ping_status":"open","template":"","meta":{"footnotes":""},"class_list":["post-707","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/catalogs.wcsu.edu\/grad\/wp-json\/wp\/v2\/pages\/707","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/catalogs.wcsu.edu\/grad\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/catalogs.wcsu.edu\/grad\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/catalogs.wcsu.edu\/grad\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/catalogs.wcsu.edu\/grad\/wp-json\/wp\/v2\/comments?post=707"}],"version-history":[{"count":0,"href":"https:\/\/catalogs.wcsu.edu\/grad\/wp-json\/wp\/v2\/pages\/707\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/catalogs.wcsu.edu\/grad\/wp-json\/wp\/v2\/pages\/704"}],"wp:attachment":[{"href":"https:\/\/catalogs.wcsu.edu\/grad\/wp-json\/wp\/v2\/media?parent=707"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}