Terrorism in Hospitality Sector

 Terrorism in Hospitality Sector Essay

" Don't switch the battle with terrorism into the war on tourism” (Zemsky, 2005)

The definition of terrorism has become incredible in its which means since it was initially introduced in 1790s through the violent period following the French Revolution, to what it is now since the acts of physical violence or violence intended to gain political, religious or ideological objective through intimidation and instillation of fear inside the targeted human population (Jenkins, the year 2003; Enders and Sandler, 2002). In hospitality industry, matter regarding terrorism has been noticed since the mid-1980s, as cases of terrorism in tourism related areas increased dramatically from 206 in 1972 to 3, 010 in 1985 (d'Amore and Anunza, 1986). Since that time, security is viewed as crucial (Pizam and Mansfeld, 1996) and is also increasingly increased especially after the tragic events on Sept. 2010 11, 2001 (Cohen, 2002). Terrorism in hospitality sector is consistently happening. Post the 9/11 era, there are many significant terrorism happenings targeting accommodations worldwide (Guardian, 2009). Food leaders need to be able to have proactive activities to minimize occurrence possibilities. Yet , managing protection in hospitality industry is more complex when compared with other companies, and therefore necessary a different procedure. This dissertation aims to seriously analyze the initial challenges faced by hospitality industry in managing their security. 3 main concerns will be mentioned thoroughly and some related good examples will be provided as helping explanations. Then, it will be accompanied by relevant tips regarding actions to be taken by the leaders in the hospitality sector. Complexity of managing secureness in hospitality industry is usually primarily as a result of nature of the industry on its own. Hospitality is actually a business that revolves around offering friendly, inviting, and good treatment to its clients. Hotels specifically, emphasize a " home-from-home” concept that encourages friends to use establishments as if these people were their own help to make them think as welcome, comfortable, practical and calm as possible (Ulph, 1996). It strives in making guests feel like they were in their home on the other hand, while on the other hand should secure this against any kind of possible felony threats. As stated by Jake Brown, the executive overseer of United States Overseas Secureness Advisory Council, hospitality industry faces a contradictory problem in term that " they're inviting persons in and they want to be favorable, but some are usually operating in an environment that is real threatening, especially with terrorism” (Yu, 2008). Although other businesses are able to choose overt reliability practices, rigid security procedures are often deemed unacceptable in hospitality sector as friends wish to experience discreet substantial personalized support (Gill et al., 2002). Several London's top hotels security managers stated that if not really impossible, it is very difficult to ensure maximum reliability in line with retaining high hospitality standards. Its one of a kind context needs a compromise equilibrium so that hospitable image can easily still be portrayed and terrorism threats may be prevented, avoiding damage brought on by either services deterioration or perhaps severe terrorism impacts (Groenenboom and Smith, 2003). Although there is no foreign standard, in many instances except for these located in danger locations including Israel, to be extremely overt by having uniformed security guard each and every door may frighten guests. From the positive side, it does going to boost protection to get the guests, ecuries and homes; however it is additionally going to enhance the feeling as if they were in unsafe environment instead and discourage all of them from attempting to be there. One of international security and policing advisory companies stresses the point that good security practice should not be distressing. Hospitality leaders should be able to give discreet, specialist and powerful security; which can be enough to deter...

Sources: Baxter, L. 2003. " Can Terrorists Achieve CBRN Capability in 2004” in Managing Terrorism Risk. Newark, CA: Risk Management Solutions.

LABELLISE BASSE CONSOMMATION. 2008. Marriott ‘escape' record denied [online]. Offered at:. [Last accessed in 02. 10. 2011].

Brady, S. 2009. Wake-up phone: Lessons discovered from Mumbai [online]. Available at:. [Last seen on 01. 11. 2011].

Capital Eyesight. 2011. Resort Security -- Protecting Everyones Interests [online]. Available at:. [Last accessed upon 30. 15. 2011].

Caterer and Hotelkeeper. 2006. Hotel security: A crucial selling point [online]. Sold at:. [Last accessed upon 02. eleven. 2011].

Cetron, M. M. 2004. " Hospitality Inside the Age Of Terror”, HSMAI Advertising Review.

Cohen, At the. A

Daily Mail. 2002. Twelve quizzed after Kenya hotel great time [online]. Available at:. [Last reached on 02. 11. 2011].

D'Amore, T. J. and Anunza, Capital t. E. 1986. " Worldwide terrorism: implications and problem for global tourism”, Organization Quarterly, pp. 20-29.

Enders, W. and Sandler, Capital t. 2002. " Patterns of transnational terrorism, 1970–1999: Option time-series estimates”, International Research Quarterly. Volume. 46, pp. 145–65.

Gill, M., ainsi que al. 2002 " Secureness management and crime in hotels", Worldwide Journal of recent Hospitality Supervision. Vol. 14 Iss. 2, pp. 58-64.

Goleman, M. 1996. Emotional Intelligence: So why It Can Subject More than IQ. London: Bloomsbury Publishing.

Goslin, C. 2008. White Daily news – Resort Security [online]. Available at:. [Last accessed in 31. 10. 2011].

Groenenboom, K. and Jones, P. 2003. " Issues of security in hotels", Intercontinental Journal of recent Hospitality Supervision. Vol. 12-15 Iss. 1, pp. 14-19.

Guardian. 2009. Timeline: Lodge bomb problems [online]. Available at:. [Last utilized on 40. 10. 2011].

Homeland Secureness. 2004. Characteristics and Prevalent Vulnerabilities Facilities Category: Accommodations [online]. Available at:. [Last reached on 23. 10. 2011].

Jenkins, L. 2003. Images of Fear: What We Can and Can 't Know about Terrorism. New York: Aldine de Gruyter.

Jerard, L., Astuti, Farreneheit and Feisal, M. 2009. " Bombing of JW Marriott and Ritz Carlton Jakarta”, Foreign Centre for Political Assault and Terrorism Research [online]. Available at:. [Last accessed on 01. 10. 2011].

Motorola milestone phone. 2009. The Dorchester Resort delivers prudent, top-class reliability with future-proof Milestone IP video [online]. Offered by:. [Last accessed in 02. 10. 2011].

Mitroff, I. We. 2005. Why some companies emerge more robust and better from a crisis: 7 necessary lessons for surviving devastation. New York: AMACOM.

Pizam, A. 2009. " Hotels since tempting targets for terrorism attacks”, Worldwide Journal of Hospitality Management. Vol. twenty nine No . 1 )

Pizam, A. and Mansfeld, Y. 1996. Tourism, crime and worldwide security problems. Chichester, UK: Willey.

Richter, L. T. and Waugh, W. T. 1986. " Tourism national politics and personal science: An instance of not too benign neglect”, Annals of Tourism Research. Vol. twelve No . several, pp. 313–15.

Ritchie, M. W. 2004. " Chaos, crises and disasters: A strategic approach to catastrophe management in the tourism industry”, Tourism Management. Vol. twenty-five No . 6, pp. 669–83.

Serrat, O. 2009. Understanding and Growing Emotional Brains [online]. Available at:. [Last seen on 02. 11. 2011].

Sonmez, S. F., Apostolopoulos, Y. and Tarlow, S. 1999. " Tourism in crisis: Taking care of the effects of terrorism”, Journal of Travel Analysis. Vol. 37 No . 1, pp. 13–18.

Sonmez, S i9000. and Graefe, A. L. 1998a. " Influence about terrorism risk on overseas tourism decisions”, Annals of Tourism Research. Vol. 25, pp. 112–44.

Stratfor. 2005. The Terrorist Attack Pattern: Selecting the Target [online]. Available at:. [Last seen on 02. 11. 2011].

TNN. 2010. Hotels work with detectives to hold an eye on guests [online]. Available at:. [Last seen on 31. 10. 2011].

Ulph, H. 1996. " Secure reservations", Security Sector, pp. 19-22.

UN. 2005. UN Secretariat Summary of Main Studies and Summary [online]. New York: Reliability in Korea Accountability -panel. Available at:. [Last seen on 02. 11. 2011].

Yu, Ur. 2008. Foreign hotels look for mix among hospitality, secureness [online]. Available at:. [Last reached on 30. 10. 2011].

Zemsky, H. 2005. War on tourism? [online]. Offered by:. [Last accessed on 28. 12. 2011].

TM’s Handicraft Online Buying System Article

News