Professional Documents
Culture Documents
Chang
Chang
Size
(No. of Rooms) Medium Medium Medium Small
(380 rooms) (350 rooms) (260 rooms) (180 rooms)
No. of years
in current post 2 years 6 years 2.5 years 5 years
Major concerns of • To protect lives • Safety of the guests • Guests’ loss • Protection of guests’
security in the hotel and properties • Intrusion by outside • Life Safety systems safety and their
• To project a safe & elements (criminals • Staff control property
secure environment in hotels) • Protection of the
• To enhance the • An outbreak of fire hotel’s property
integrity and • Ensure hotel’s
credibility of the operations are in
establishment order with no
disruptions
* Dept: Department
** N.A. : The hotel did not answer this question in the questionnaire.
within hotels are regarded as guestrooms, and the installation considered when designing a new
sensitive and confidential of surveillance equipment. hotel or renovating existing ones.
matters. Table 2 presents the
profiles of the said participating Hotel planning and design Access systems to guestrooms
hotels.
The physical systems to ensure Restricting access to guest rooms
The hotels are all under the four- security in a hotel include the is the key element in ensuring
star category and range from planning and design of the hotel security in hotels. The types of
small (180 rooms) to medium property, access systems to access systems to guest rooms
(260 to 380 rooms) sized guestrooms, and the installation which hotels use range from lock
properties in Singapore. As the of surveillance equipment. The and key to online key cards. In
hotels did not wish for their design of the hotel including its Singapore the only hotels that
names to be disclosed they will be lighting and fixtures has much are still using the manual lock
referred to as Hotel A (380 impact on the design of its and key are the small hotels.
rooms), Hotel B (350 rooms), security system. The design of The electronic access system is
Hotel C (260 rooms) and Hotel D the hotel can cause limitations to card based, i.e. instead of using
(180 rooms). The relevant the efficient use of certain an ordinary key, a guest now
managers of the hotels were security equipment. For example, uses a plastic card to unlock a
interviewed to determine if any of it is difficult to position the CCTV door. The most frequent type of
the measures proposed in the if the building is circular in its key card used in the hotel
framework are actually in design. Such opinions should not industry in Singapor e is the
practice or in use. The following be limited to where in the magnetic stripe card. Key cards,
paragraphs summarise what was building to locate the security just like metal keys, have
established from the interviews. equipment and the command different levels of usage. For
centre and should include, for example, the chambermaids
Security systems example, how certain aspects of usually use the floor master key,
the design of the building may which is used to access the rooms
Physical systems provide security risks and how for cleaning in a specific floor
this may be rectified. Therefore it only. The main advantage of the
The physical systems to ensure is recommended that the opinions electronic system is that each
security in a hotel include the of the security department or entry to a room is read and
planning and design of the hotel security consultant and not just recorded. This means that with
property, access systems to that of the architect be the key c ard systems, it is
possible for an hotel to trace the limited number of cameras, their carried out in the situation that it
specific time a person enters the CCTV cameras are only placed at is the hotel staff who loses the
room on a particular day. This the lobby, corridors and the key card. As a punishment, Hotel
therefore serves as a deterrent to security checkpoint. All the A even imposes disciplinary
attempts of unauthorised entry. CCTV systems used by the four actions on those employees who
Hotels have round the clock have negligently lost the key
Security equipment recording using time lapse cards.
recorders (Table 4).
In ensuring the safety of their Procedures for handling thefts
hotel gue sts, all the hotels Policies and procedures
surveyed installed various types Except for Hotel C which
of security equipment on their Handling of lost keys decline d to respond, the
premises. These include CCTV procedures taken by the other
system, safe deposit boxes, fire Loss of keys or key cards are three hotels for cases of theft are
alarm system, burglary alarm dealt with seriously by the similar. Usually they take the
system, and panic bolt crash-bar Hotels. The procedures carried following actions:
(Table 3). The CCTV systems are out by the Hotels are similar.
normally attached to automatic The hotel which uses the key-lock • A guest’s complaint of theft
recorders which can reproduce system handles loss of keys by will be first referred to the
any frames or pictures of the changing the lock and key of that duty manager who, together
events recorded. The system acts particular room door. This is the with a security officer (usually
not only as a deterrent against most sensible and efficient a senior officer), would check to
crime, but also produces recorded method of preventing any un- ensure that the complaint is
evidence. Unlike the other hotels authorised access and protecting valid;
that have mini safes in their the guests. According to the
guestrooms, Hotel D has safe Hotels, if a guest loses his/her • The security department will
deposit boxes located at the key card, the hotel would first carry out an internal
cashier’s office only. verify the identity of the guest to investigation if it is confirmed
confirm that he/she is a genuine that there has been a theft;
According to the Hotels, their guest before they override the
CCTV cameras are usually previous card and issue the guest • A senior officer will
located at the following places: with a new one. Hotel A goes simultaneously accompany the
lobby, corridors, lifts, staircase, further to record the loss of the guest to make a police report;
swimming pool, restaurants, key card in their system and
cashier’s office, front desk, club, notifies the security department • If a suspect is caught, he/she
perimeter, and security check of the loss. The same procedures will be handed over to the
point. Because of Hotel D’s of overriding the lost cards are police;
Nature of training
conducted On-the-job, classroom training & SHA courses
Training manual
followed during Yes
conducting of
training (Yes/No)
Person-in-charge
of drawing training Director of Security Manager Security Manager Security Manager
program Security
Hotel
SHA
Prostitution
Rapes
POLICE Related Crimes
Security Hardwarein
Security Hardware Security
SecurityProcedures
Procedures SecurityPersonnel
Security Personnel
Hotel
in Hotel in
in Hotel
Hotel in
in Hotel
Hotel
hotelier must provide for a safe hardware, procedures and depend on the job of the employee
and crime free enviro nment personnel. All of them are of and the frequency of training
within its premises. Security equal importance and the differs according to the size of the
plays a vital role in ensuring the security system will not be hotel and the availability of
future viability of hotels. To plan effective if one of them should manpower. The security depart-
and design an effective safety and break down. For instance, no ment in a hotel is responsible for
security system for an individual matter how sophisticated the improving the security system in
hotel is very important but even equipment, they are useless if the the hotel which involves auditing
that is not enough. The hotel personnel are incompetent or the and reviewing the existing
industry which provides accom- procedures are not being followed. security equipment and policies.
modation in a tourist destination, A hotel is frequently subjected to The frequency of audit varies
constitutes one of the essential threats and risks that will according to the size of the hotels.
segments for a successful tourist endanger its guests. In combating All the employees working in the
destination. Systems theory tells such threats, hotels seek the hotel, whether security or non-
us that the activity of any cooperation of the industry which security staffs are trained to
segment of an organisation is represented by the national carry out security and safety
affects, in varying degrees, the hotel association, and at the policies and procedures in their
activity of every other segment. national level, the police force for work.
This paper outlines some of the security. Figure 1 depicts the
preventive measures that can be triple-tier safety and security The Singapore Hotel Association
usefully employed in a hotel, as systems in hotels to protect hotel and the Police Department
well as the hotel industry as a guests from potential risks and conduct various security courses
whole, at a tourist destination. threats. or seminars for all hotel
This has been applied using employees concerned. The
systems theory which provides an The security manager is security managers maintain a
integrated conceptual approach, responsible for the various on- very close working relationship
modified with a triple-tier the-job training conducted for the with the police. They meet
systems framework. employees. The security manager regularly to exchange ideas on
The entire security system at the usually follows a training manual crime trends, crime statistics or
hotel property level is made up of when carrying out his training. situations that are affecting the
three components: security The nature of training will hotel industry. The police would
References
Bertalanffy, L., Hempel, C.G., Bass, R.E., & Jonas, H., (1951).
General System Theory: A new approach to unity of science.
Human Biology, I-VI, 23(4), 302-361.
Boulding, K.E., (1956). General Systems Theory – The skeleton of
science. Management Science, 2(3), 197-208.
Chon, K.S. & Sparrowe, R.T. (1995). Welcome to hospitality: An
introduction. South-Western Publishing Co.
Cooper C., Fletcher, J., Gilbert, D., & Wanhill, S. et al. (1998).
Tourism principles & practice (2nd ed.). Longman Publishing.
Dale, E. (1967). Organization. American Management Association,
New York, 114-120.
Ellis, R.C. Jr., & the Security Committee of AH & MA (1986). Security
and loss prevention management. The Educational Institute of
the American Hotel & Model Association.
Olsen, M.D., & Cassee, E. (1996). Into the New Millennium - White
Pape r on the Global Hospitality Industry. S i n g a p o r e :
International Hotel Association.
Power, T., & Barrows, C.W. (1999). Introduction to management in
the hospitality industry (6th ed.). John Wiley & Sons Inc.
Republic of Singapore (1985). The Innkeepers’ Act. Singapore: The
Government Printer.
Republic of Singapore Police Force (1994). Prevention measures
against crimes in hotels. Singapore: Public Affairs Department
and National Crime Prevention Council.
Rushmore S., & Malone C. (1998). Keys and hotel security. Cornell
Hotel and Restaurant Administration Quarterly, December, 91-
95.
Singapore Hotel Association (SHA) (1994). Hotel Security Manual.
Singapore: Singapore Hotel Association.
Singapore Hotel Association (SHA) (1997). Annual Report, 1997.
Singapore: Singapore Hotel Association.
Singapore Tourist Promotion Board (1993). Strategic Plan for
Growth, 1993 - 1995. Singapore: Singapore Tourist Promotion
Board.
World Tourism Organization (1997). Tourist safety and security:
Practical measures for destinations (2nd ed.). Madrid, Spain:
The World Tourism Organization.