Course Details
Course Code: SCMT392 Course ID: 2566 Credit Hours: 3 Level: Undergraduate
Industrial espionage results in millions of dollars in lost revenue each year. This course provides a brief history of espionage and examines the World Wide Web as an enabler of espionage, the role of governments in industrial espionage, the rise of the competitive intelligence professional, tensions between openness and security, and the Economic Espionage Act of 1996.
Course Schedule
Registration Dates | Course Dates | Start Month | Session | Weeks |
---|---|---|---|---|
03/29/2022 - 09/02/2022 | 09/05/2022 - 10/30/2022 | September | Summer 2022 Session D | 8 Week session |
05/21/2022 - 11/04/2022 | 11/07/2022 - 01/01/2023 | November | Fall 2022 Session I | 8 Week session |
07/25/2022 - 12/30/2022 | 01/02/2023 - 02/26/2023 | January | Winter 2023 Session B | 8 Week session |
Current Syllabi
After successfully completing this course, you will be able to:
CO-1: Analyze the global threat to information, counterintelligence and counterintelligence.
CO-2: Evaluate the Economic Espionage Act of 1996 and associated problems that impact businesses and government.
CO-3: Assess conclusions regarding economic and military espionage, competitive intelligence; and operational security, and risk management techniques to mitigate the Netspionage threat.
CO-4: Compare and contrast methods and procedures for protecting proprietary and confidential information.
CO-5: Interpret the fundamental changes to the business environment which facilitate the acts of espionage.
CO-6: Analyze the tradecrafts of spies and effective countermeasures to thwart the threat.
Forum Discussions
Each week, a discussion question is provided and posts should reflect an assimilation of the readings. Students are required to provide a substantive initial post by Thursday at 11:55 pm ET and respond to 2 or more classmates by Sunday 11:55 pm ET. Forum posts are graded on timeliness, relevance, knowledge of the weekly readings, and the quality of original ideas. Your initial post should contain at least 350 word (minus referencing) and each peer response (2) should contain at least 150 words.
Midterm Assignment and Final Assignment
Both will consist of essay questions.
Term Paper Proposal & Outline and Final Term Paper
Each student is required to submit a research paper (minimum of 7-10 pages NOT including the title, reference, or other non-text pages, diagrams, etc.) on a topic related to the scope of the course and approved by the instructor.
Name | Grade % |
---|---|
Final Research Paper | 25.00 % |
Final Research Paper | 25.00 % |
Paper Proposal & Outline | 5.00 % |
Paper Proposal & Outline | 5.00 % |
Discussions | 25.00 % |
Week 1: Risk and Risk Assessment | 3.13 % |
Week 2: Business Spy Characteristics MICE CRIME and Espionage Cases | 3.13 % |
Week 3: Electronic Espionage Social Engineering and Identifying Vulnerabilities | 3.13 % |
Week 4: Business Espionage by Physical Theft or Other Appropriation Modus Operandi of Espionage and Insider Threats | 3.13 % |
Week 5: Espionage Risk Assessments Prevention Operations Security and Counterespionage | 3.13 % |
Week 6: Protecting Your People with Electronic and Computer Countermeasures | 3.13 % |
Week 7: How Security Elements Work Together | 3.13 % |
Week 8: Course Review and Case Study | 3.13 % |
Midterm Assignment | 25.00 % |
Midterm Assignment | 25.00 % |
Final Assignment | 20.00 % |
Final Assignment | 20.00 % |
After successfully completing this course, you will be able to:
CO-1: Analyze the global threat to information, counterintelligence and counterintelligence.
CO-2: Evaluate the Economic Espionage Act of 1996 and associated problems that impact businesses and government.
CO-3: Assess conclusions regarding economic and military espionage, competitive intelligence; and operational security, and risk management techniques to mitigate the Netspionage threat.
CO-4: Compare and contrast methods and procedures for protecting proprietary and confidential information.
CO-5: Interpret the fundamental changes to the business environment which facilitate the acts of espionage.
CO-6: Analyze the tradecrafts of spies and effective countermeasures to thwart the threat.
Book Title: | To find the library e-book(s) req'd for your course, please visit http://apus.libguides.com/er.php to locate the eReserve by course #. |
Author: | No Author Specified |
Book Title: | Business Espionage: Risks, Threats, and Countermeasures - e-book available in the APUS Online Library |
ISBN: | 9780124200548 |
Publication Info: | Elsevier Lib |
Author: | Wimmer, Bruce |
Unit Cost: | $56.31 |