Submission Guidelines Are Posted to the GCC Web Site s1

Submission guidelines are posted to the GCC Web site: http://www.ecu.edu/cs-acad/gcc/index.cfm

1.  Course prefix and number: 2. Date:

1. 

2. 

3.  Requested action:

x / New Course
Revision of Active Course
Revision & Unbanking of a Banked Course
Renumbering of an Existing Course from
from / # / to / #
Required / x / Elective

4.  Method(s) of delivery (check all boxes that apply for both current/proposed and expected future delivery methods within the next three years):

Current or Expected

Proposed Delivery Future Delivery

Method(s): Method(s):

On-campus (face to face)
Distance Course (face to face off campus)
x / Online (delivery of 50% or more of the instruction is offered online) / x

5.  Justification (must cite accreditation and/or assessment by the graduate faculty) for new course or course revision or course renumbering:

The Graduate Faculty of the Department of Political Science have assessed the curriculum for the MS in Security Studies and approved the addition of this course. It fills a hole in the substantive offerings of the program.

6.  Course description exactly as it should appear in the next catalog:

SECS 6199. Independent Research (3) P: Consent of instructor. Individualized instruction.

7.  If this is a course revision, briefly describe the requested change:

N/A

8.  Course credit:

Lecture Hours / Weekly / OR / Per Term / Credit Hours / s.h.
Lab / Weekly / OR / Per Term / Credit Hours / s.h.
Studio / Weekly / OR / Per Term / Credit Hours / s.h.
Practicum / Weekly / OR / Per Term / Credit Hours / s.h.
Internship / Weekly / OR / Per Term / Credit Hours / s.h.
Other (e.g., independent study) Please explain. Independent Study / 3 / s.h.
Total Credit Hours / 3 / s.h.
4

9.  Anticipated annual student enrollment:

10.  Changes in degree hours of your programs:

Degree(s)/Program(s) / Changes in Degree Hours
MS in Security Studies / 0

11.  Affected degrees or academic programs, other than your programs:

Degree(s)/Program(s) / Changes in Degree Hours
MS in Security Studies / 0

12.  Overlapping or duplication with affected units or programs:

x / Not applicable
Documentation of notification to the affected academic degree programs is attached.

13.  Council for Teacher Education (CTE) approval (for courses affecting teacher education):

x / Not applicable
Applicable and CTE has given their approval.

14.  University Service-Learning Committee (USLC) approval:

x / Not applicable
Applicable and USLC has given their approval.

15.  Statements of support:

a. Staff

x / Current staff is adequate
Additional staff is needed (describe needs in the box below):

b. Facilities

x / Current facilities are adequate
Additional facilities are needed (describe needs in the box below):

c. Library

x / Initial library resources are adequate
Initial resources are needed (in the box below, give a brief explanation and an estimate for the cost of acquisition of required initial resources):

d. Unit computer resources

x / Unit computer resources are adequate
Additional unit computer resources are needed (in the box below, give a brief explanation and an estimate for the cost of acquisition):

e. ITCS resources

x / ITCS resources are not needed
The following ITCS resources are needed (put a check beside each need):
Mainframe computer system
Statistical services
Network connections
Computer lab for students
Software
Approval from the Director of ITCS attached

16.  Course information (see: Graduate Curriculum and Program Development Manual for instructions):

a. Textbook(s) and/or readings: author(s), name, publication date, publisher, and city/state/country. Include ISBN (when applicable).

Note: This is an independent study course. Student readings will be determined based on the content materials covered by the students at the instructor’s recommendation. The information provided here is an illustrative example of what might be required for a specific issue area: Intelligence and Terrorism.
Johnson, Loch and James J. Wirtz. 2010. Intelligence; the Secret World of Spies: An Anthology. New York: Oxford University Press, 3rd ed.
George, Roger Z. 2005. Intelligence & the National Security Strategist: Enduring Issues and Challenges. New York: Rowman and Littlefield Publishers, Inc.
Online Intel Resources: http://intellit.muskingum.edu/index.html

b. Course objectives for the course (student – centered, behavioral focus)

Upon completion of this course, students will be able to:
·  Evaluate the organizational dynamics and the functions of the U.S. Intelligence Community
·  Assess interaction patterns between various national security policymakers and their institutions
·  Using historical examples, interpret contrasting intelligence information collected around the world
·  Compare and contrast the American intelligence system with the secret agencies of other nations. Appraise the challenges in the future of Intelligence community in 21st century and beyond.

c. Course topic outline

1.  An Introduction to Intelligence in the United States
2.  Resources and Techniques of Intelligence Collection,
3.  Policy Makers Approach and Challenges of Intelligence Analysis; (Iraq: a case study)
4.  Homeland Defense: Security Strategies and Policies
5.  Covert Actions in theory and practice.
6.  Counterintelligence in the era of Jihad and Al-Qaeda.
7.  Military Intelligence and Counterinsurgency in Practice (case Studies).
8.  Accountability and Civil Liberties
9.  Judicial Accountability and Congressional Supervision of U.S. Secret Agencies.
10.  Intelligence Activities post 9/11
11.  Intelligence and the question of Weapons of Mass Destruction. (cases studies: Iran and Iraq)
12.  World players and Intelligence (The Soviet Intelligence, Are the Russians any Different? Intelligence in UK and other major European States).
13.  The Future of Intelligence in a Changing International Environment

d. List of course assignments, weighting of each assignment, and grading/evaluation system for determining a grade

Student will be required to complete two 25 page papers. One on international intelligence and a second on the US intelligence community structures, policies and practices. Each paper will be worth half of the student’s grade.
GRADING SCALE: 90-100% = A; 80-89% = B; 70-79% = C; BELOW 70% = F

1

Revised 04-06-11 and posted fall of 2011