Implications and Impacts of Terrorism on Sporting Events: Is the Hospitality Industry Prepared and Equipped to Host Mega Events?

Implications and Impacts of Terrorism on Sporting Events: Is the Hospitality Industry Prepared and Equipped to Host Mega Events?

Implications and impacts of terrorism on sporting events: Is the hospitality industry prepared and equipped to host mega events? A thesis submitted to: Auckland University of Technology in partial fulfilment of the requirements for the degree of Masters in International Hospitality Management Cyril Ravindran Peter 2011 Primary Supervisor: Dr Jill Poulston Secondary Supervisor: Erwin Losekoot Table of Contents Attestation of Authorship ..................................................................................... vi Acknowledgement................................................................................................ vii Confidential material ........................................................................................... viii Abstract .................................................................................................................. ix 1. Chapter One: Introduction ............................................................................... 1 1.1. Terrorism ..................................................................................................... 1 1.2. Research topic ............................................................................................. 2 1.3. Purpose and parameters of the research..................................................... 2 1.4. Rugby World Cup (RWC)............................................................................. 3 1.5. Overview of the thesis ................................................................................. 4 2. Chapter Two: Literature Review ...................................................................... 6 2.1. Introduction .................................................................................................. 6 2.2. Overview ...................................................................................................... 7 2.3. Hospitality and terrorism .............................................................................. 8 2.3.1. Discussion ........................................................................................ 13 2.4. Sport and sporting events .......................................................................... 18 2.4.1. Benefits of sporting events ............................................................... 19 2.4.2. Sporting events, politics and terrorism .............................................. 21 2.4.3. Discussion ........................................................................................ 22 2.5. Modes of attacks ........................................................................................ 23 2.5.1. Suicide bombing ............................................................................... 25 2.5.2. Kidnappings and hostage takings ..................................................... 27 2.5.3. Food terrorism .................................................................................. 28 2.5.4. Discussion ........................................................................................ 29 2.6. Safety and security concerns ..................................................................... 29 2.6.1. Participants ....................................................................................... 31 2.6.2. Spectators ........................................................................................ 32 2.6.3. Discussion ........................................................................................ 33 2.7. Rugby World Cup (RWC) security ............................................................. 34 2.7.1. Discussion ........................................................................................ 35 2.8. Political ideology ........................................................................................ 36 2.8.1. Discussion ........................................................................................ 37 2.9. Risk sensitivity ........................................................................................... 37 2.9.1. Discussion ........................................................................................ 40 2.10. Conclusion ................................................................................................. 41 3. Chapter Three: Methodology ......................................................................... 44 3.1. Introduction ................................................................................................ 44 ii 3.2. Qualitative research method ...................................................................... 45 3.3. Interpretivism ............................................................................................. 47 3.4. Research question ..................................................................................... 48 3.5. Participant selection and recruitment ......................................................... 49 3.6. Three different interview methods .............................................................. 50 3.6.1. Structured interviews ........................................................................ 50 3.6.2. Unstructured interviews .................................................................... 50 3.6.3. Semi-structured interviews ............................................................... 51 3.7. Ethics approval .......................................................................................... 51 3.7.1. Purpose ............................................................................................ 52 3.7.2. Process............................................................................................. 52 3.8. Data collection, analysis, management and storage .................................. 53 3.8.1. Data collection .................................................................................. 53 3.8.2. Data analysis .................................................................................... 55 3.8.3. Data Management ............................................................................ 56 3.8.4. Data storage ..................................................................................... 56 3.9. Conclusion ................................................................................................. 57 4. Chapter Four: Findings .................................................................................. 58 4.1. Introduction ................................................................................................ 58 4.2. Data collection process .............................................................................. 59 4.3. Limitations .................................................................................................. 59 4.4. Significant observations ............................................................................. 60 4.5. Research data ........................................................................................... 60 4.6. Themes ...................................................................................................... 79 4.6.1. Political ideology and awareness of international politics ................. 80 4.6.2. ‘She’ll be right’ attitude. .................................................................... 80 4.6.3. Vetting of staff and suppliers ............................................................ 82 4.6.4. Ministry of Agriculture and Forestry (MAF) food guidelines .............. 82 4.6.5. Who is responsible for security? ....................................................... 83 4.7. Conclusion ................................................................................................. 83 5. Chapter Five: Discussion ............................................................................... 85 5.1. Introduction ................................................................................................ 85 5.2. Political ideology and awareness of international politics .......................... 86 5.3. ‘She’ll be right’ attitude. .............................................................................. 88 5.4. Vetting of staff and suppliers ...................................................................... 93 5.5. Ministry of Agriculture and Forestry (MAF) food guidelines ....................... 96 5.6. Who is responsible for security? .............................................................. 100 5.7. Conclusion ............................................................................................... 103 iii 5.7.1. Key theme – laissez-faire ............................................................... 104 6. Chapter Six: Conclusion and Recommendation ........................................ 106 6.1. Terrorism ................................................................................................. 106 6.2. State of preparedness ............................................................................. 106 6.2.1. Security vetting process ................................................................. 106 6.2.2. Laissez-faire attitude towards security ............................................ 107 6.3. Important lessons .................................................................................... 107 6.3.1. Management implications ............................................................... 108 6.4. Recommendation ..................................................................................... 108 References .........................................................................................................

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    152 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us