100% found this document useful (4 votes)
916 views2 pages

Criminology Course Overview and Outcomes

The course will discuss fingerprints as a means of personal identification and the use of ink to obtain fingerprints. It will examine the outcome of personal identification techniques. The course design lists the desired learning outcomes, learning content, teaching methods, assessment, and timetable. The course aims to teach students about personal identification through fingerprints and its importance.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
100% found this document useful (4 votes)
916 views2 pages

Criminology Course Overview and Outcomes

The course will discuss fingerprints as a means of personal identification and the use of ink to obtain fingerprints. It will examine the outcome of personal identification techniques. The course design lists the desired learning outcomes, learning content, teaching methods, assessment, and timetable. The course aims to teach students about personal identification through fingerprints and its importance.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
  • Learning Outcomes
  • Course Design

I. COLAND SYSTEM TECHNOLOGYS, INC.

II. BACHELOR OF SCIENCE IN CRIMINOLOGY


III. PERSONAL IDENTIFICATION
The course will discussed fingerprints as a means of personal identification, and the used of printers ink as a method of obtaining such fingerprint. He is also
credited with the first fingerprint identification of a greasy fingerprint left on an alcohol bottle.
IV. Outcome of the PERSONAL IDENTIFICATION
V. 3 Units
VI. COURSE DESIGN
Desired Learning
Outcomes
(DLO)
Learning Content/Subject
Matter
Textbook/References Teaching
Delivery
(OBTL)
Assessment
(Achieved
Learning)
Resource
Materials
Time table
At the end of the course the students must be able to:
1. [Link] the
importance of
CJS in the
Philippines;
2. [Link] the
terms used in the
study CJS; and
3. [Link] the five
pillars of the CJS.
1. Identify the
terminologies used
under the community
pillar;
2. [Link] the
different factors that
affects the rehabilitation
of the ex-convict
Manwong,RK and Foronda, M.
(2009), Criminal Justice System.
Wisemans Book Trading Inc.,
Quezon City,
Philippines. Tradio (1999),
Introduction to
[Link], RK
(2010), Introduction to
Criminology. Wisemans Book
Trading Inc., Quezon City,
Philippines.
Lecture,
Library
Research
Oral, Written
Test and
Case Studies
Handouts 3
hours/Week
(1-4)


Prelim Exam Prelim Exam Prelim Exam Prelim
Exam
Prelim Exam Prelim
Exam
Prelim Exam
The Five Pillars of CJS
[Link] Enforcement
2. Pr os ec ut i on
3 . C o u r t
4 . C o r r e c t i o n
5 . C o mmu n i t y




1. IT crimes, misused
of IT Technology
2. IT issues
Do





Do





Do





Do





3
hours/Week
(5-8)









Prepared By:

DATULNA B. MAMALUBA, JR.,RCrim.
Criminology Instructor


1. Applicable
Philippine Laws
that penalize
cybercrime

1. Intellectual Property
Right, E-Commerce
Law, Optical Law,
Civil Code, Internet
Pornography
Do Do Do Do 3
hours/Week
(9-11)

Midterm Exam Midterm Exam Midterm Exam Midterm
Exam
Midterm
Exam
Midterm
Exam
Midterm
Exam
1. Government
Agencies
Responsible in the
Implementation of
the Philippine
criminal law.
Programs
2. Ive got the eye of
the tiger, dancing
through the fire
1. National Bureau of
Investigation,
Department of
Justice
2. Proper used of
Technology



Do Do Do Do 3
hours/Week
(12-15)

Final Exam Final Exam Final Exam Final
Exam
Final Exam Final
Exam
Final Exam

You might also like