Verified Document

Thematic Analysis Of Security Issues Dissertation

Security Study Travel and tourism are major industries in European countries such as Greece. The hotel industry is dedicated to making the accommodations for their patrons as enjoyable as possible. This means ensuring that hotel guests, visitors, and staff have a safe and secure environment. It is for this reason that many of the larger hotel chains have their own private security personnel who are entrusted to maintain the safety of the hotel grounds and immediate area surrounding hotel. There a delicate balance between maintain hotel security for tourists, having the daily operations of the hotel run smoothly, and keeping security services in the background but ye at the same time effective and visible. Maintaining this balance between effectiveness and suitableness is not easy. The current study interviewed Greek15 hotel employees, either hotel security personnel or hotel managers, regarding their opinions on major issues related to the security of their hotel as well as to security issues in the hotel industry in general. The data was subjected to thematic analysis and 11 major themes in the data were identified. These themes are discussed in their relation to current and future security issues in the hotel industry.

Introduction

Background

Safety is a basic human need and having a safe and secure environment is a top priority in nearly every model/theory of human needs or human motivation (e.g., Maslow 1943). This need for a safe environment is so basic that it is a major consideration even for tourists on holiday trying to escape the pressures of their everyday existence (Boakye 2010). Thus, vacationers away from home will typically want to stay in an environment that provides them with similar feelings of security that they experience when they are at home, otherwise they will not be willing to spend their hard-earned money on a hotel or on other tourist accommodations (Boakye 2010).

The success and reputation of a hotel or a hotel chain is highly dependent on its ability to produce a safe and secure environment for its guests, visitors, and employees (Santana 2012). One of the top priorities associated with providing a safe and secure environment is that the hotel must properly provide for the protection and maintenance of the assets of its guests, visitors, employees and yet not appear to be a military installation. Having a secure environment for tourists would include such things as providing the perception that there is a secure milieu associated with the hotel grounds; the actual ability to protect the physical assets of the guests, employees, and visitors; and the notion that other assets such as the intangible assets that the guests bring with them or acquire during their stay such as new relationships, their reputations, a sense of relaxation, and so forth are also secure (Santana 2012). Thus, any hotel's reputation as well as its standard conduct of business is dependent on the protection that the hotel affords to its guests, visitors, employees, contractors, the actual physical structure of the hotel premises, and all that is contained within the grounds of the hotel and surrounding area and everything pertinent to the hotel property (Boakye 2010; Santana 2012).

Hotel security systems and personnel must deploy numerous assets resources and invest significant energy in order to diminish the large number of potential security risks that hotels face (Clifton 2012). These risks include a number of different potential threats such as criminal activities that affect the guests, employees, or visitors of a hotel; sabotage; potential terrorism; potential injuries that can occur to individuals on the grounds; the threat of fire; and the threat of other potential natural or man -- made disasters (Clifton 2012). As travel and tourism increases and more and more people spend their time away from home there are simply more opportunities for criminals and other potential threats to hotel security to occur. While such things as theft and attacks on hotel guests represent extreme circumstances when one looks at the overall statistics, they also represent the vulnerability that many hotel guests face and the challenges to hotel security personnel to maintain a secure environment.

Some of the more common vulnerabilities that occur to guests and employees of hotels include physical attacks, theft of personal possessions, identity theft, or the theft of other possessions (Ho, Zhao, and Brown 2009), injuries to guests and hotel personnel, and the potential for the devastating effects from fire or other types of disasters (Boakye 2010). All of these risks cannot be avoided; however, the risks of these events occurring in the hotel can be mitigated through basic and enhanced security techniques and methods. Certainly the costs of the systems and manpower needed...

It is also noted by many researchers in tourism that it is a requirement for a hotel to provide a safe and secure environment in that hotel patrons, employees, visitors, and others have a legal right for this type of protection and security (e.g., Boakye 2010; Clifton 2012). As such, hotels can take basic steps towards creating a more secure environment and can utilize many different types of security techniques to decrease risk.
The basic steps are relatively inexpensive and the decision to employ more complex security techniques/systems depends on the budgets and financial ability of the hotel system (Clifton 2012). The empirical literature indicates that certain types of techniques/security systems are more cost-effective than others and it is a requirement of a hotel to at least provide minimal, affective, security measures for their guests, employees, and visitors (Clifton 2012). Thus, any of the financial situations of the hotel or hotel chain the decision-makers decide on the basic framework for the expenditures regarding security purposes and the security officers and management did their best implement them (Boakye 2010).

The current study investigates the factors that hotel security personal and hotel managers who are affiliated with one of three luxury hotels in Greece view as being important to provide for the safety of their guests. The hotel personal completed a questionnaire that asked them their opinions on various security-rated issues at the hotel in which they were employed and concerning their perceptions of security-related issues in the hotel industry in general.

Aims and Objectives

The objective of this dissertation is to capture the subjective opinions regarding hotel security of individuals who actual make a living in the hotel industry. The participants of this study are asked to give their opinions on important issues regarding hotel security as it relates to their actual experience in the field as well as their personal opinions on the hotel industry in general.

It is important to try and understand the perceptions of security personal as they are the individuals who actually get the first-hand experience in the day-to-day operations of keeping hotel patrons safe and secure (Clifton 2012). But just investigating the perspectives of hotel security personal would only result in uncovering a piece of the overall issues in hotel security. Security personal are only a part of a larger team. Also attempting to understand the viewpoints of hotel management personal regarding how security issues fit into the overall operation of the hotel is important because these individuals must balance the needs of security issues with other day-to-day issues involving other hotel employees, hotel patrons, and visitors in order to keep the facility running smoothly and efficiently. Their viewpoint tends to include a more integrated view of how security issues fit into the overall daily operations and routines of a larger system. Thus, the objective of this dissertation is to understand how the perspectives of both hotel security personal and hotel managers can help both guide researches and hotel personal to create a safer, more secure, and more efficiently-operating hotel environment.

Structure of This Dissertation

The dissertation begins with an extensive literature review that covers security factors in the hotel industry in Europe. Issues regarding both the practical and psychological ramifications of hotel security in the European tourist industry are discussed. Following the literature review is a comprehensive section of the methodology of the quantitative study that investigated the opinions of 15 hotel managers and security personal working in luxury tourist hotels in Greece. The section on data chapters reports the analysis of the data collected in the study and develops the major themes extracted from the responses to the questionnaire they were administered. The discussion section presents a comprehensive interpretation of the research findings based on the literature review as well as discussing how these findings can be used to guide future research as well as their practical applications in light of the study's strengths and weaknesses. Finally the bibliography and appendices sections present the references for citations and the materials used in the study.

Literature Review

Tourism is a significant contributor to the economies of European Union (EU) member states (European Commission 2013). The tourism industry directly generates more than 5% of the GDP of the EU with approximately 5.2% of the total labor force, which is roughly around 9.7 million jobs of…

Sources used in this document:
Bibliography

Abdullah, A.A. And Mohad, H.H., 2012. 'Internal Success factors of Hotel occupancy rate.' International Journal of Business and Social Science, vol. 3, no. 22, pp. 199-218.

Assaf, A.G., Josiassen, A., and Agbola, F.W., 2015. 'Attracting international hotels: Locational factors that matter most.' Tourism Management, vol. 47, pp. 329-340.

Banergee, P., 2013. 'Hotels and security', in R.C. Wood, (ed.)., Key Concepts in Hospitality Management. Sage: New York, pp. 77-81.

Bazeley, P., 2009. 'Analysing qualitative data: More than 'identifying themes'. Malaysian Journal of Qualitative Research, vol. 2, no. 2, pp. 6-22.
European Commission, 2013. 'Enhancing the competitiveness of tourism in the EU -- An evaluation of 20 cases of innovation and good practice.' Retrieved on January 5, 2015 from http://ec.europa.eu/enterprise/newsroom/cf/itemdetail.cfm?item_id=6983.
Global Sustainable Tourism Council, 2013. Global Sustainable Tourism Council criteria for destinations, retrieved from http://www.gstcouncil.org/sustainable-tourism-gstc-criteria/criteria-for-destinations.html.
Piazzo, J., 2014, July 22. 'Israel's tourism takes a hard hit during the Middle East chaos.' Yahoo Travel. Retrieved from https://www.yahoo.com/travel/israel-tourism-takes-a-hit-amidst-conflict-92563870177.html.
Cite this Document:
Copy Bibliography Citation

Related Documents

Security Issues of Online Communities
Words: 15576 Length: 60 Document Type: Term Paper

This researcher rejects the existence of online communities because computer mediated group discussions cannot possibly meet this definition. Weinreich's view is that anyone with even a basic knowledge of sociology understands that information exchange in no way constitutes a community. For a cyber-place with an associated computer mediated group to be labeled as a virtual settlement it is necessary for it to meet a minimum set of conditions. These are:

Security Management at Aviation and Healthcare Sectors
Words: 2154 Length: 8 Document Type: Essay

Security Management at Aviation and Healthcare Sectors Security Management Essay This paper discusses the concept of aviation security management and security management at healthcare settings. In addition to that, this paper also lists down and describes the important factors that can have an influential impact on the functions of aviation and a healthcare security manager. Security Management at Aviation and Healthcare Sectors Aviation Security The general aviation security confronts a number of security challenges. The

Research Approaches in Maritime Security
Words: 6550 Length: 2 Document Type: Essay

International Ship and Port Security (ISPS) Code on Maritime Security The study will be based on the question that "What is the impact of the International Ship and Port Security (ISPS) Code on Maritime Security." Answers will be sought to have this question addressed adequately. The study feels that the ISPS Code has some impacts upon the Maritime Security in the world. Thus, the study seeks to uncover the various impacts

Soviet-Afgan War Conflict Analysis Focus
Words: 5116 Length: 18 Document Type: Thesis

(Harvey, 2003) the suspicion of the United States of the "Soviet Expansionist tendencies" had increased by the 1970s and Harvey states as well that "The pervasive mentality of Washington officials during these years was dominated by the communist domino theory which led many Washington politicians to believe that the Soviet Union sought to take over the entire world." (2003) the United States had always received a safeguard provided by

How Public Health Issues Affect the African Community
Words: 1458 Length: 5 Document Type: Essay

IntroductionThe Center for Promoting Health and Health Equity-Racial and Ethnic Approaches to Community Health (CPHHE-REACH) Initiative was created to reduce cardiovascular health disparities and risk factors among African Americans in Omaha, Nebraska. This initiative aimed to improve healthier lifestyle choices that reduce or alleviate chronic diseases through policy, systems, and environmental improvements. One of the main objectives of this initiative was to evaluate the impact of safety and security factors

Transcript Analysis Phenomenology Approach Phenomenological
Words: 1991 Length: 7 Document Type: Research Paper

Questions and answers coding also enhances the ability of the researcher to debrief the interview process effectively and efficiently thus the opportunity to facilitate data collection process (Compton, 2009). Categories There are several categories in the execution of interviews in the process of collecting data. This interview falls under the category of individual interview. This is because of its nature and coding method thus a reflection of face-to-face encounter between the

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now