Security Study
Travel and tourism are major industries in European countries such as Greece. The hotel industry is dedicated to making the accommodations for their patrons as enjoyable as possible. This means ensuring that hotel guests, visitors, and staff have a safe and secure environment. It is for this reason that many of the larger hotel chains have their own private security personnel who are entrusted to maintain the safety of the hotel grounds and immediate area surrounding hotel. There a delicate balance between maintain hotel security for tourists, having the daily operations of the hotel run smoothly, and keeping security services in the background but ye at the same time effective and visible. Maintaining this balance between effectiveness and suitableness is not easy. The current study interviewed Greek15 hotel employees, either hotel security personnel or hotel managers, regarding their opinions on major issues related to the security of their hotel as well as to security issues in the hotel industry in general. The data was subjected to thematic analysis and 11 major themes in the data were identified. These themes are discussed in their relation to current and future security issues in the hotel industry.
Introduction
Background
Safety is a basic human need and having a safe and secure environment is a top priority in nearly every model/theory of human needs or human motivation (e.g., Maslow 1943). This need for a safe environment is so basic that it is a major consideration even for tourists on holiday trying to escape the pressures of their everyday existence (Boakye 2010). Thus, vacationers away from home will typically want to stay in an environment that provides them with similar feelings of security that they experience when they are at home, otherwise they will not be willing to spend their hard-earned money on a hotel or on other tourist accommodations (Boakye 2010).
The success and reputation of a hotel or a hotel chain is highly dependent on its ability to produce a safe and secure environment for its guests, visitors, and employees (Santana 2012). One of the top priorities associated with providing a safe and secure environment is that the hotel must properly provide for the protection and maintenance of the assets of its guests, visitors, employees and yet not appear to be a military installation. Having a secure environment for tourists would include such things as providing the perception that there is a secure milieu associated with the hotel grounds; the actual ability to protect the physical assets of the guests, employees, and visitors; and the notion that other assets such as the intangible assets that the guests bring with them or acquire during their stay such as new relationships, their reputations, a sense of relaxation, and so forth are also secure (Santana 2012). Thus, any hotel's reputation as well as its standard conduct of business is dependent on the protection that the hotel affords to its guests, visitors, employees, contractors, the actual physical structure of the hotel premises, and all that is contained within the grounds of the hotel and surrounding area and everything pertinent to the hotel property (Boakye 2010; Santana 2012).
Hotel security systems and personnel must deploy numerous assets resources and invest significant energy in order to diminish the large number of potential security risks that hotels face (Clifton 2012). These risks include a number of different potential threats such as criminal activities that affect the guests, employees, or visitors of a hotel; sabotage; potential terrorism; potential injuries that can occur to individuals on the grounds; the threat of fire; and the threat of other potential natural or man -- made disasters (Clifton 2012). As travel and tourism increases and more and more people spend their time away from home there are simply more opportunities for criminals and other potential threats to hotel security to occur. While such things as theft and attacks on hotel guests represent extreme circumstances when one looks at the overall statistics, they also represent the vulnerability that many hotel guests face and the challenges to hotel security personnel to maintain a secure environment.
Some of the more common vulnerabilities that occur to guests and employees of hotels include physical attacks, theft of personal possessions, identity theft, or the theft of other possessions (Ho, Zhao, and Brown 2009), injuries to guests and hotel personnel, and the potential for the devastating effects from fire or other types of disasters (Boakye 2010). All of these risks cannot be avoided; however, the risks of these events occurring in the hotel can be mitigated through basic and enhanced security techniques and methods. Certainly the costs of the systems and manpower needed...
This researcher rejects the existence of online communities because computer mediated group discussions cannot possibly meet this definition. Weinreich's view is that anyone with even a basic knowledge of sociology understands that information exchange in no way constitutes a community. For a cyber-place with an associated computer mediated group to be labeled as a virtual settlement it is necessary for it to meet a minimum set of conditions. These are:
Security Management at Aviation and Healthcare Sectors Security Management Essay This paper discusses the concept of aviation security management and security management at healthcare settings. In addition to that, this paper also lists down and describes the important factors that can have an influential impact on the functions of aviation and a healthcare security manager. Security Management at Aviation and Healthcare Sectors Aviation Security The general aviation security confronts a number of security challenges. The
International Ship and Port Security (ISPS) Code on Maritime Security The study will be based on the question that "What is the impact of the International Ship and Port Security (ISPS) Code on Maritime Security." Answers will be sought to have this question addressed adequately. The study feels that the ISPS Code has some impacts upon the Maritime Security in the world. Thus, the study seeks to uncover the various impacts
(Harvey, 2003) the suspicion of the United States of the "Soviet Expansionist tendencies" had increased by the 1970s and Harvey states as well that "The pervasive mentality of Washington officials during these years was dominated by the communist domino theory which led many Washington politicians to believe that the Soviet Union sought to take over the entire world." (2003) the United States had always received a safeguard provided by
IntroductionThe Center for Promoting Health and Health Equity-Racial and Ethnic Approaches to Community Health (CPHHE-REACH) Initiative was created to reduce cardiovascular health disparities and risk factors among African Americans in Omaha, Nebraska. This initiative aimed to improve healthier lifestyle choices that reduce or alleviate chronic diseases through policy, systems, and environmental improvements. One of the main objectives of this initiative was to evaluate the impact of safety and security factors
Questions and answers coding also enhances the ability of the researcher to debrief the interview process effectively and efficiently thus the opportunity to facilitate data collection process (Compton, 2009). Categories There are several categories in the execution of interviews in the process of collecting data. This interview falls under the category of individual interview. This is because of its nature and coding method thus a reflection of face-to-face encounter between the
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now