How can I better Horeshoe Casino Security to make it more effective?
STATEMENT
I, ., declare that this dissertation: How can I better Horeshoe Casino Security to make it more effective?, is my work and that all the sources that I have used or quoted have been indicated and acknowledged using complete references.
SIGNATURE:. DATE:..
Abstract
Most casinos do not want to take risks when it comes to the integrity of their gaming operations and the security of their facilities. This research paper is a proposal that looks at how the security and integrity of gaming operations at the Horseshoe Casino can be improved by investigating (1) How traditional casino security practices, procedures, and equipment can be updated? (2) What can modern security mitigation systems be used in casinos? And (3) The best security measures for improving security cost-effectively? This proposal will utilize a qualitative case study methodology for the research, and the data collection will be via document analysis. The case study methodology's focus will be on the security measures enacted by the case study casino, which will be chosen via purposive sampling. The data gathered will be investigated via thematic analysis. The results are expected to provide security measures and new and more improved strategies compared to those currently being used at Horseshoe Casino.
Table of Contents
Abstract 2
1. INTRODUCTION 3
1.1. Background 4
1.2. Theoretical Framework 5
1.2.1. The Criminal Event Perspective (CEP) 5
1.2.2. Rational choice theory 5
1.2.3. Situational crime prevention 5
1.2.4. Crime Prevention Through Environmental Design (CPTED) 6
1.2.5. Defensible Space Theory 6
1.2.6. Broken-Windows theory 6
1.3. Statement of the Problem 6
1.4. Research Questions 7
1.5. Rationale (purpose) for the Study 7
1.6. Significance 7
1.7. Definition of Terms 8
1.8. Limitations of the Study 8
2. REVIEW OF RELATED LITERATURE 8
2.1. Security and Surveillance Officers 9
2.2. Accidents 10
2.3. Fires 10
2.4. Criminal activity 11
2.5. CCTV Cameras 12
3. METHODOLOGY 13
3.1. Design 13
3.2. Setting and Participants 13
3.3. Data Collection 14
3.4. Treatment of the Data 14
3.5. Implications for Future Research 15
4. REFERENCES 16
1. INTRODUCTION
Most casinos do not want to take risks when it comes to the integrity of their gaming operations and the security of their facilities. In most states, laws and regulations require slot machines and tables to be under constant surveillance. Moreover, most modern casinos, as massive complexes, have multiple risks that need to be considered. Security is a massive issue for casinos of all sizes plus other types of gaming complexes. This is primarily because most money changes hands every night and day in most casinos. It is also because gamblers have to feel safe to play, and because gaming generally has to be secure for it to be done right (Lee, 2011). Normally, casinos have an internal security department that takes care of all matters relating to security. The department usually has a workforce made up of security men trained to monitor and manage security events and situations within and on the perimeter of gaming floors. They usually also have a surveillance team to monitor patrons and security cameras. In most casinos, security cameras play an important role in ensuring casino security. Modern cameras backed by modern technologies mean assaults, arguments, bribing, cheating, and similar unwanted events that can be noted quickly and acted upon fast without inconveniencing other patrons. Security professionals not only secure the gaming floor and its perimeter, but they also play a role in keeping away suspicious persons, preventing assault, kidnapping, and theft.
The legislation that regulates how gaming establishments need to protect money is different in different states. For instance, in the state of Nevada, the Nevada Gaming Commission is mandated to regulate how casinos and gaming establishments manage money on the gaming floor. The Commission requires casinos…
How can I better Horeshoe Casino Security to make it more effective?
STATEMENT
I, ., declare that this dissertation: How can I better Horeshoe Casino Security to make it more effective?, is my work and that all the sources that I have used or quoted have been indicated and acknowledged using complete references.
SIGNATURE:. DATE:..
Abstract
Most casinos do not want to take risks when it comes to the integrity of their gaming operations and the security of their facilities. This research paper is a proposal that looks at how the security and integrity of gaming operations at the Horseshoe Casino can be improved by investigating (1) How traditional casino security practices, procedures, and equipment can be updated? (2) What can modern security mitigation systems be used in casinos? And (3) The best security measures for improving security cost-effectively? This proposal will utilize a qualitative case study methodology for the research, and the data collection will be via document analysis. The case study methodology's focus will be on the security measures enacted by the case study casino, which will be chosen via purposive sampling. The data gathered will be investigated via thematic analysis. The results are expected to provide security measures and new and more improved strategies compared to those currently being used at Horseshoe Casino.
Table of Contents
Abstract 2
1. INTRODUCTION 3
1.1. Background 4
1.2. Theoretical Framework 5
1.2.1. The Criminal Event Perspective (CEP) 5
1.2.2. Rational choice theory 5
1.2.3. Situational crime prevention 5
1.2.4. Crime Prevention Through Environmental Design (CPTED) 6
1.2.5. Defensible Space Theory 6
1.2.6. Broken-Windows theory 6
1.3. Statement of the Problem 6
1.4. Research Questions 7
1.5. Rationale (purpose) for the Study 7
1.6. Significance 7
1.7. Definition of Terms 8
1.8. Limitations of the Study 8
2. REVIEW OF RELATED LITERATURE 8
2.1. Security and Surveillance Officers 9
2.2. Accidents 10
2.3. Fires 10
2.4. Criminal activity 11
2.5. CCTV Cameras 12
3. METHODOLOGY 13
3.1. Design 13
3.2. Setting and Participants…
How can I better Horeshoe Casino Security to make it more effective?
STATEMENT
I, ., declare that this dissertation: How can I better Horeshoe Casino Security to make it more effective?, is my work and that all the sources that I have used or quoted have been indicated and acknowledged using complete references.
SIGNATURE:. DATE:..
Abstract
Most casinos do not want to take risks when it comes to the integrity of their gaming operations and the security of their facilities. This research paper is a proposal that looks at how the security and integrity of gaming operations at the Horseshoe Casino can be improved by investigating (1) How traditional casino security practices, procedures, and equipment can be updated? (2) What can modern security mitigation systems be used in casinos? And (3) The best security measures for improving security cost-effectively? This proposal will utilize a qualitative case study methodology for the research, and the data collection will be via document analysis. The case study methodology's focus will be on the security measures enacted by the case study casino, which will be chosen via purposive sampling. The data gathered will be investigated via thematic analysis. The results are expected to provide security measures and new and more improved strategies compared to those currently being used at Horseshoe Casino.
Table of Contents
Abstract 2
1. INTRODUCTION 3
1.1. Background 4
1.2. Theoretical Framework 5
1.2.1. The Criminal Event Perspective (CEP) 5
1.2.2. Rational choice theory 5
1.2.3. Situational crime prevention 5
1.2.4. Crime Prevention Through Environmental Design (CPTED) 6
1.2.5. Defensible Space Theory 6
1.2.6. Broken-Windows theory 6
1.3. Statement of the Problem 6
1.4. Research Questions 7
1.5. Rationale (purpose) for the Study 7
1.6. Significance 7
1.7. Definition of Terms 8
1.8. Limitations of the Study 8
2. REVIEW OF RELATED LITERATURE 8
2.1. Security and Surveillance Officers 9
2.2. Accidents 10
2.3. Fires 10
2.4. Criminal activity 11
2.5. CCTV Cameras 12
3. METHODOLOGY 13
3.1. Design 13
3.2. Setting and Participants 13
3.3. Data Collection 14
3.4. Treatment of the Data 14
3.5. Implications for Future Research 15
4. REFERENCES 16
1. INTRODUCTION
Most casinos do not want to take risks when it comes to the integrity of their gaming operations and the security of their facilities. In most states, laws and regulations require slot machines and table.......ple risks that need to be considered. Security is a massive issue for casinos of all sizes plus other types of gaming complexes. This is primarily because most money changes hands every night and day in most casinos. It is also because gamblers have to feel safe to play, and because gaming generally has to be secure for it to be done right (Lee, 2011). Normally, casinos have an internal security department that takes care of all matters relating to security. The department usually has a workforce made up of security men trained to monitor and manage security events and situations within and on the perimeter of gaming floors. They usually also have a surveillance team to monitor patrons and security cameras. In most casinos, security cameras play an important role in ensuring casino security. Modern cameras backed by modern technologies mean assaults, arguments, bribing, cheating, and similar unwanted events that can be noted quickly and acted upon fast without inconveniencing other patrons. Security professionals not only secure the gaming floor and its perimeter, but they also play a role in keeping away suspicious persons, preventing assault, kidnapping, and theft.
The legislation that regulates how gaming establishments need to protect money is different in different states. For instance, in the state of Nevada, the Nevada Gaming Commission is mandated to regulate how casinos and gaming establishments manage money on the gaming floor. The Commission requires casinos and gaming establishments to have sufficient money to cover all chips in play on the floor (Lee, 2011). Because the chips and the number of chips in play vary, the amount of money required changes today. The cash reserves held by casinos are typically stored in casino vaults. Casinos typically do not announce how much they have in cash reserves and the location of their vaults to protect them from criminals;
1.1. Background
Traditionally, casinos only hired individuals to act as security for the monies that changed hands on their floors. Nowadays, security personnel plays several roles in casinos. Without them, gaming operations cannot be secured, and neither can the integrity of some operations. For this reason, casinos are usually very keen when hiring casino security to ensure they end up with intelligent and physically strong individuals. To attract smart individuals, they usually offer good salaries and benefits (Staub, 2006). Modern casino security personnel usually have to main jobs in most casinos to protect the guests and protect casino property. However, while security personnel protects casino clients, their priority is to protect casino property. And this sometimes means keeping an eye on clients who are out to steal or cheat casinos.
In recent times, events such as mass shootings in entertainment venues have forced casinos and gaming establishments to re-evaluate their security measures and plans. The plans are geared to protect casino property and casino patrons. Patrons need to feel safe to play more and spend more (Lee, 2011). Many casinos have uniformed security officials and metal detectors around the perimeter of casino floors and other parts of casino complexes to make them feel safe. In some cases, casinos know metal detectors and uniformed personnel make patrons feel uneasy and, therefore, they use other more subtle ways to protect casino floors and clients. As is evident above, casino security is a complex matter.
1.2. Theoretical Framework
Many theories have been proposed to explain and help with the management of security on casino floors. Some of the theories explain crimes as well as criminality. They include the broken windows theory, crime prevention through environmental design theory, the defensible space theory, the situational crime prevention theory, the rational choice theory, and the criminal event perspective theory. The theories will be discussed in this section, plus their applicability at gaming establishments and casinos. The theories are all ecological theories of crime, and they address physical and environmental features and locations, which can be considered to help stop or minimize crime (Purpura, 2011:131).
1.2.1. The Criminal Event Perspective (CEP)
This theory focuses on crime as a singular event (Sacco, Sacco & Kennedy, 2002). While the event is singular, several factors are usually contributed, such as the offender's motivation and the proximity of the target or victim. The target or victim must be close to the offender for crime to occur and in the immediate aftermath of the crime (Sacco et al., 2002). While this theory looks at crime as a singular event, it is important to note that crime does not happen in a vacuum or isolation. Multiple factors affect how a criminal event occurs, including the proximity between target/ victim and offender.
1.2.2. Rational choice theory
This theory argues that it is mainly up to an individual or a criminal to decide whether to commit a crime. In other words, the thinking of an individual determines what he will do. Normal or conventional thinking usually leads to normal behavior, and criminal thinking leads to criminal behavior and offending (Lilly, Cullen & Ball, 2002:218). According to the proponents of this theory, one's propensity to commit a crime is not influenced by their body type, genetics, or even sociological factors. It is strictly influenced by criminal thinking. The proponents of the rational choice theory argue that criminal thinking has an unknown origin. This is why it can
REFERENCES
Bai, B., Brewer, K. P., Sammons, G., & Swerdlow, S. (2006). Job satisfaction, organizational commitment, and internal service quality: a case study of Las Vegas hotel/casino industry. Journal of Human Resources in Hospitality & Tourism, 5(2), 37-54.
Bowen, G. A. (2009). Document analysis as a qualitative research method. Qualitative Research Journal, 9(2), 27-40.
Braun, V., & Clarke, V. (2012). "Thematic analysis." In H. Cooper, P. M. Camic, D. L. Long, A. T. Panter, D. Rindskopf, & K. J. Sher (Eds.), APA handbooks in psychology®. APA handbook of research methods in psychology, Vol. 2. Research designs: Quantitative, qualitative, neuropsychological, and biological (p. 57–71). American Psychological Association.
Bunn, M. G., & Glynn, K. M. (2013). Preventing insider theft: Lessons from the casino and pharmaceutical industries. Journal of Nuclear Materials Management 41(3): 4-16.
Cebekhulu, N. P. (2016). Assessing security measures at hotels: a case study from Gauteng (Doctoral dissertation).
De Vos, A. S., Strydom, H., Fouché, C. B., & Delport, C. S. L. (2002). Research at grassroots: For the social sciences and human services. Pretoria: Van Schaik.
Denscombe, M. (2010). The Good Research Guide – for small-scale research projects. 2nd edition. Studentlitteratur; Lund.
Eck, J. E., & Clarke, R. V. (2019). Situational Crime Prevention: Theory, Practice, and Evidence. In Handbook on Crime and Deviance (pp. 355-376). Springer, Cham.
Etikan, I., Musa, S. A., & Alkassim, R. S. (2016). Comparison of convenience sampling and purposive sampling. American journal of theoretical and applied statistics, 5(1), 1-4.
Fennelly, L. J. (2012). Effective Physical Security. 4th ed. Boston: Elsevier.
Field, S. (2000). Career opportunities in casinos and casino hotels. New York: Checkmark Books.
Florence, D.L. (2002). Facing facts: crooks can't bet on anonymity. Security Management,46, 101-106. Floyd, W. R. (2008). Security Surveys. Alexandria: ASIS International.
Hayes, D. K., & Ninemeir, J. D. (2006). Foundation of Lodging Management, Upper Saddle River. New Jersey.
International Foundation for Protection Officers (2003). Protection Officer Training Manual, 7th ed. Naples, FL. IFPO.
Kirch, J.F. (1998). You bet your life. Security Management, 49, 121-125.
Lam, D. (2019). Casino management in integrated resorts. Routledge.
Lee, T. J. (2011). Casino security risks and outsourcing criteria. Tourism Analysis, 16(6), 701-707.
Lilly, J. R., Cullen, F. T., & Ball, R. A. (2002). Criminological theory: Context and consequences. Sage publications.
Manley, A. D. (2009). Security manager's guide to disasters: managing through emergencies, violence, and other workplace threats. CRC Press.
O'Leary, Z. (2014). The essential guide to doing your research project (2nd ed.). Thousand Oaks, CA: SAGE Publications, Inc.
Provost, G. (2017). High Stakes: Inside the New Las Vegas. Crossroad Press.
Purpura, P. P. (2011). Security: An Introduction. CRC Press.
Roper, C. (1999). Risk management for security professionals. Butterworth-Heinemann.
Sacco, V., Sacco, V. F., & Kennedy, L. W. (2002). The criminal event: Perspectives in space and time. Wadsworth Publishing Company.
Schneider, S. (2014). Crime prevention: Theory and practice. CRC Press.
Scott, J. (1990). A Matter of Record, Documentary Sources in Social Research. Cambridge: Polity Press.
Snyder, L. (2014). Make security planning a priority during building design. Facilitiesnet. Retrieved from https://www.facilitiesnet.com/security/article.aspx?id=15234
Staub, T. (2006). The Contemporary Casino: Evolution and Protection. IFPO (International Foundation for Protection Officers), 1-13.
Strickhouser, A. (May 14, 2004). The unique challenges of casino security. International Foundation for Protection Officers. Retrieved from https://www.ifpo.org/resource-links/articles-and-reports/protection-of-specific-environments/the-unique-challenges-of-casino-security/ Wood, R. C. (Ed.). (2013). Key concepts in hospitality management. Sage.
Worrall, J. (2006). Crime control in America: An assessment of the evidence. New York: Pearson.
Zalud, B. (1998). Safe stay basic; access CCTV play roles. Security, 35, 22-24.
Security Management Strategies for Increasing Security Employee Retention Design Effective Job Characteristic Model Skill Variety Task Identity and Task Significance Autonomy and Feedback Meeting Expectations Market Competitive Package Strategies for Increasing Security Employee Retention Security employees constitute the most important component of organizational workforce. It is because; they ensure the core survival of organization and its assets. However, the ironic fact is the security employees are considered blue collar workers and their compensation packages are low (Hodson & Sullivan,
Securities Regulation SECURITIES REGULARIZATIONS IN NON-PROFIT ORGANIZATIONS The ensuring of the fact that an organization is working as per regulations and is following the code of conduct, while keeping the interest of the public first, are matters which are becoming more and more complicated with the passage of time. Therefore, it can be said with some emphasis, that today one of the most basic issues of many organizations is the issue of
Security for Networks With Internet Access The continual process of enterprise risk management (ERM) has become an integral component of successful organizational assessment, because the process of accurately identifying various risk factors, and interpreting their potential advantages and disadvantages, ensures that a business remains capable of anticipating and addressing internal and external contingencies. The following ERM implementation plan for the security of internet-accessible networks is intended to provide a navigable framework
Security in Cloud Computing Security issues associated with the cloud Cloud Security Controls Deterrent Controls Preventative Controls Corrective Controls Detective Controls Dimensions of cloud security Security and privacy Compliance Business continuity and data recovery Logs and audit trails Legal and contractual issues Public records The identified shortcomings in the cloud computing services and established opportunities for growth regarding security aspects are discussed in the current research. The security of services is regarded as the first obstacle. The opportunity for growth is provided as combination
Security management is "described in some quarters as a function of risk management," (Bulletin 2, Part 2). Although there is some crossover with public sector security functions, such as policing, security management is generally considered a private sector domain. "Whilst private security has a predominantly commercial basis, it should not be forgotten that it does interact with the public to a considerable degree," (Bulletin 2, Part 2). Security management is
Security Management The role of a security manager varies widely according to the particular organization and its needs, but despite this variety, there remain certain best practices and policies that can help maintain security and stability. This is nowhere more true than in the case of organizational loss, because while loss can mean widely different things depending on the field, the underlying theoretical concepts which inform attempts to minimize loss are
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now