Preview

Terrorism in Hospitality Industry

Best Essays
Open Document
Open Document
2790 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Terrorism in Hospitality Industry
“Don’t turn the war on terrorism into the war on tourism”
(Zemsky, 2005)

The term terrorism has evolved in its meaning since it was first introduced in 1790s during the violent period following the French Revolution, to what it is now as the acts of violence or brutality intended to gain political, religious or ideological objective through intimidation and instillation of fear in the targeted population (Jenkins, 2003; Enders and Sandler, 2002).
In hospitality industry, concern regarding terrorism has been noticed since the mid-1980s, as cases of terrorism in tourism related sectors increased dramatically from 206 in 1972 to 3,010 in 1985 (d’Amore and Anunza, 1986). Since then, security is seen as crucial (Pizam and Mansfeld, 1996) and is increasingly intensified especially after the tragic events on September 11, 2001 (Cohen, 2002).
Terrorism in hospitality industry is continuously happening. Post the 9/11 era, there have been many significant terrorism incidents targeting hotels worldwide (Guardian, 2009). Hospitality leaders need to be able to take proactive actions to minimize occurrence possibilities. However, managing security in hospitality industry is a little more complex when compared with other industries, and therefore required a different approach. This essay aims to critically analyze the unique challenges faced by hospitality industry in managing its security. Three main issues will be discussed thoroughly and some related examples will be presented as supporting explanations. Then, it will be followed by relevant recommendations regarding actions to be taken by the leaders in the hospitality industry.
Complexity of managing security in hospitality industry is primarily due to the nature of the industry itself. Hospitality is a business that revolves around offering friendly, welcoming, and generous treatment to its customers. Hotels in particular, emphasize a “home-from-home” concept that encourages guests to use facilities as if they were



References: Baxter, P. 2003. “Can Terrorists Achieve CBRN Capability in 2004” in Managing Terrorism Risk. Newark, CA: Risk Management Solutions. BBC. 2008. Marriott ‘escape’ report denied [online]. Available at: . [Last accessed on 02.11.2011]. Brady, S. 2009. Wake-up call: Lessons learned from Mumbai [online]. Available at: . [Last accessed on 01.11.2011]. Capital Eye. 2011. Hotel Security - Protecting Everybody’s Interests [online]. Available at: . [Last accessed on 30.10.2011]. Caterer and Hotelkeeper. 2006. Hotel security: An important selling point [online]. Available at: . [Last accessed on 02.11.2011]. Cetron, M.J. 2004. “Hospitality In The Age Of Terror”, HSMAI Marketing Review. Cohen, E.A Daily Mail. 2002. Twelve quizzed after Kenya hotel blast [online]. Available at: . [Last accessed on 02.11.2011]. D’Amore, L.J. and Anunza, T.E. 1986. “International terrorism: implications and challenge for global tourism”, Business Quarterly, pp. 20-29. Enders, W. and Sandler, T. 2002. “Patterns of transnational terrorism, 1970–1999: Alternative time-series estimates”, International Studies Quarterly. Vol. 46, pp. 145–65. Gill, M., et al. 2002 "Security management and crime in hotels", International Journal of Contemporary Hospitality Management. Vol. 14 Iss. 2, pp. 58-64. Goleman, D. 1996. Emotional Intelligence: Why It Can Matter More than IQ. London: Bloomsbury Publishing. Goslin, C. 2008. White Paper – Hotel Security [online]. Available at: . [Last accessed on 31.10.2011]. Groenenboom, K. and Jones, P. 2003. "Issues of security in hotels", International Journal of Contemporary Hospitality Management. Vol. 15 Iss. 1, pp. 14-19. Guardian. 2009. Timeline: Hotel bomb attacks [online]. Available at: . [Last accessed on 30.10.2011]. Homeland Security. 2004. Characteristics and Common Vulnerabilities Infrastructure Category: Hotels [online]. Available at: . [Last accessed on 31.10.2011]. Jenkins, P. 2003. Images of Terror: What We Can and Can 't Know about Terrorism. New York: Aldine de Gruyter. Jerard, J., Astuti, F and Feisal, M. 2009. “Bombing of JW Marriott and Ritz Carlton Jakarta”, International Centre for Political Violence and Terrorism Research [online]. Available at: . [Last accessed on 01.11.2011]. Milestone. 2009. The Dorchester Hotel delivers discreet, top-class security with future-proof Milestone IP video [online]. Available at: . [Last accessed on 02.11.2011]. Mitroff, I.I. 2005. Why some companies emerge stronger and better from a crisis: 7 essential lessons for surviving disaster. New York: AMACOM. Pizam, A. 2009. “Hotels as tempting targets for terrorism attacks”, International Journal of Hospitality Management. Vol. 29 No. 1. Pizam, A. and Mansfeld, Y. 1996. Tourism, crime and international security issues. Chichester,UK: Willey. Richter, L.K. and Waugh, W.L. 1986. “Tourism politics and political science: A case of not so benign neglect”, Annals of Tourism Research. Vol. 10 No. 3, pp. 313–15. Ritchie, B.W. 2004. “Chaos, crises and disasters: A strategic approach to crisis management in the tourism industry”, Tourism Management. Vol. 25 No. 6, pp. 669–83. Serrat, O. 2009. Understanding and Developing Emotional Intelligence [online]. Available at: . [Last accessed on 02.11.2011]. Sonmez, S. F., Apostolopoulos, Y. and Tarlow, P. 1999. “Tourism in crisis: Managing the effects of terrorism”, Journal of Travel Research. Vol. 38 No. 1, pp. 13–18. Sonmez, S. and Graefe, A.R. 1998a. “Influence on terrorism risk on foreign tourism decisions”, Annals of Tourism Research. Vol. 25, pp. 112–44. Stratfor. 2005. The Terrorist Attack Cycle: Selecting the Target [online]. Available at: . [Last accessed on 02.11.2011]. TNN. 2010. Hotels hire detectives to keep an eye on guests [online]. Available at: . [Last accessed on 30.10.2011]. Ulph, S. 1996. "Secure reservations", Security Industry, pp. 19-22. UN. 2004. UN Secretariat Summary of Main Findings and Conclusion [online]. New York: Security in Iraq Accountability Panel. Available at: . [Last accessed on 02.11.2011]. Yu, R. 2008. International hotels seek mix between hospitality, security [online]. Available at: . [Last accessed on 30.10.2011]. Zemsky, H. 2005. War on tourism? [online]. Available at: . [Last accessed on 28.10.2011].

You May Also Find These Documents Helpful