Skip to main content

Home/ Hospitality Technology/ Group items tagged compliance

Rss Feed Group items tagged

cvera019

Tourism attracts new cyber security firm to Savannah | SavannahNow - 0 views

  • Johnson pointed to Savannah’s steady economic and employment growth, particularly in the hospitality/tourism, manufacturing, shipping and logistics, and business service sectors.
  • “Hotels and restaurants must protect their visiting customers’ data and maintain PCI-DSS compliance,” Johnson said. “You don’t want visitors to come and have their ID stolen.”
  • Threats to business data are constant, Johnson said. “Criminals are sophisticated,” Johnson said. “There is no way a company without dedicated resources can keep up.”
  • ...4 more annotations...
  • Johnson said his company has pulled logs that showed a system had been in breach for three years before the ransom demand.
  • All devices that use wifi are vulnerable to hacks.
  • Johnson said when most people think of data hacks or breaches, they think Equifax and Yahoo. “There are many more (you don’t hear about), ” Johnson said. “You know a hack can ruin a small business.”
  • “We have to be right 100 percent of the time,” Johnson said. “Hackers only have to be right once.”
  •  
    The EDTS company believes Savannah's economic and employement growth could attract hackers from obtaining personal information of tourists and visiting customers. Charles Johnson, the CEO of the company believes it is a duty for hotels/restaurants to provide data security for its customers. He believes that not only big companies such as Equifax and Yahoo are vulnerable to hacks, but also small businesses. He adds that when small businesses are hacked, they can be ruined. He stresses all kinds of outlets to protect their data before they have a major breach.
da7327

Article: HRIS trends for 2017 - People Matters - 0 views

  •  HRIS technology trends are changing and challenging vendors to come up with next-generation solutions for employers. Valued at over $15 billion globally, the human resources technology market is one of the fastest growing segments in business IT — and it shows no signs of slowing down. With an HRIS, companies can align HR strategy with business objectives to get the most out of their workforces and adapt quickly to market changes.
  • There are a number of solutions offered by HRIS. Some of these include solutions in training, payroll, HR, compliance, succession planning, attendance tracking, risk management, recruiting, etc. The majority of quality HRIS systems include flexible designs that feature databases that are integrated with a wide range of features available. Ideally, they will also include the ability to create reports and analyze information quickly and accurately, in order to make the workforce easier to manage. It allows employees to exchange information with greater ease and without the need for paper through the provision of a single location for announcements, external web links, and company policies. This location is designed to be centralized and accessed easily from anywhere within the company, which also serves to reduce redundancy within the organization.
  • Software as a Service Explosion
  • ...6 more annotations...
  • Establishment of Comprehensive Performance Management:
  • Widespread Use of Mobile HR Apps:
  • Increased focus on Employees:
  • Optimized Analytics and Data Use:
  • The Cloud remains in the forecast:
  • A company that takes the time to invest in a HRIS that fits their goals, objectives, mission, and values, is a company that is investing in its future and in its success. It will be necessary to customize any HRIS to the unique needs of a company so the system will remain flexible and relevant throughout the life of the company or enterprise.
  •  
    The article introduces the trend of HRIS system in 2017. As information technology have considerably improved, its functions have heavily impacted on human resources management. Especially, it is said that the human resources technology market is one of the fastest growing segments in business IT and with an HRIS, companies can align HR strategy with business objectives to maintain the workforces and adapt the changes quickly. HRIS is integrated with training, payroll, HR, success planning, recruiting etc. and centralized, which encourages staff to access easily from anywhere within the company and reduce work redundancy. This article emphasizes that as one of the 2017 trends, mobile HR Apps will be spread out, so employees can expect to see the update via their smartphone. As the functions are centralized in one place, the data will be managed easily and it can increase focus on employees. Also, the cloud system can be applied in the HRIS, which means increased flexibility, faster updates, and decreased costs. As the HRIS features are getting various, a company should investigate an HRIS that fits their goals, objectives, mission, and values and choose the best options.
emmajeenie

Social Media Marketing to Have Strong Impact on Event Promoter Businesses | Discover Co... - 0 views

  • Facebook events, Twitter, hashtags, email, and other digital tools are being used to popularize events and generate ticket sales. This trend is expected to have a strong influence on event promoters, especially in North America, Europe, and Asia-Pacific.
  • In addition to the impact of emerging trends on businesses, BizVibe company profiles contain numerous high-quality insights to help users discover, track, compare, and evaluate suppliers or sales prospects:
  • Industry challenges with their relevance and influence segmented by geographyRisk of doing business score segmented by operational, financial, compliance, and country riskTop company competitors at the global, regional, and national levels
  • ...2 more annotations...
  • The event promoters industry group features 3,000+ company profiles categorized into multiple product and service categories. Each category contains detailed insights dedicated to helping procurement and sales teams find trusted suppliers and target sales prospects.
  • The event promoter service categories include:Event Production ServicesCorporate Entertainment ServicesParty Entertainment ServicesSports Event Planning Services
  •  
    BizVibe has identified an increasing focus on social media marketing as a major trend for the event promoters industry. Event promoters are turning to social media to create buzz around events
brenda981005

Managing Guest Relations and Upholding Corporate Digital Responsibility In The Hospital... - 0 views

  •  
    With the increasing popularity of digital technology and related data, people will naturally have ethical questions about the use of these technologies, especially when private information of ordinary citizens is involved. In order to provide a personalized experience, hotel organizations will have to collect and store a large amount of personal visitor information, which is a factor subject to strict supervision. In order to balance the conflicting demands of compliance and individualization, the best way for hotel organizations is to maintain clarity and transparency in their data collection. In view of the rise of modern regulations and privacy issues, hotel organizations must consider new technologies, threats and regulations to formulate their CDRs. Establishing a robust system that can support the organization's CDR will not only maintain the reputation of the hotel organization, but also help establish a healthy digital corporate culture throughout the industry.
npate083

What you need to consider when choosing a new property management system - 0 views

  • An intuitive interface, as well as an easy-to-read dashboard, go a long way in encouraging employee adoption, reducing training time, and generally improving the working lives of yourself and your team
    • npate083
       
      PMS should be user-friendly so employees can adapt to it faster, reducing training time. It will also make the work easier for your team.
  • A great PMS is one that your team will want to use. Since “good” design is in the eye the beholder, search for a System that balances functionality with an interface that makes sense to you.  
  • GDPR-compliant personal data storage PCI-DSS-compliant processing and card storage Geographic diversity of servers to reduce downtime risk Bank-level encryption of all data Controlled access to the physical area for any on-premise PMS servers
  • ...5 more annotations...
  • robust user access controls
    • npate083
       
      A good PMS system should also have systems in place to maintain guest privacy and payment security.
  • PMS that molds itself to your business,
  • The right PMS is the one that plays well with your existing tech stack. Without the necessary integrations, a PMS cannot perform its functions correctly.
  • One of the reasons why integrations are so important is that a poorly integrated PMS impedes proper reporting
  • All budget certainly matters, it shouldn't be the first criteria. I
  •  
    The article overall discussed the the most necessary things one must observe when choosing a new PMS system. A PMS system must first of foremost be budget friendly. PMS system is the main software for a hotel so the cost is valued highly. Most companies would prefer a pms system that is cost efficient. A PMS system also needs to be easy to use, it must be able to be handle by employees and easy to read and maneuver. The PMS system must also be secure and have controlled access. It also needs to be able to mold to the hotels system.
  •  
    The article overall discussed the the most necessary things one must observe when choosing a new PMS system. A PMS system must first of foremost be budget friendly. PMS system is the main software for a hotel so the cost is valued highly. Most companies would prefer a pms system that is cost efficient. A PMS system also needs to be easy to use, it must be able to be handle by employees and easy to read and maneuver. The PMS system must also be secure and have controlled access. It also needs to be able to mold to the hotels system.
leahesper

What Exactly is an HRIS? The Complete Breakdown - BambooHR Blog - 0 views

  • an HRIS system is the integration of HR activities and information technology.
  • It enables data entry, tracking and management for human resources, payroll and accounting.
  • most HR teams use an HRIS to help them improve their processes and stay organized
  • ...8 more annotations...
  • it’s good for everyone who works with HR to be familiar with a few HRIS basics like the variations and definition of HRIS, what an HRIS does, which organizations need HRIS, and how to best use an HRIS.
  • With an HRIS, you’ll never have to comb through filing cabinets or search through different versions of spreadsheets ever again. Every piece of information you need can be easily collected, tracked, updated, and searched in seconds.  
  • Many tedious HR processes are made quick and simple with an HRIS.
  • A good HRIS vendor will stay on top of regulations impacting HR and adapt their software to make it easy for organizations to meet compliance requirements.
  • When HR has fewer operational tasks to manage, they can spend their valuable skills and time on strategic HR initiatives that improve business outcomes
  • Improving retention, increasing productivity, and monitoring the company culture are just a few ways HR can spend their time when they have an HRIS.
  • Top-notch employees like top-notch employers. A good HRIS can help improve employees’ perceptions of their organizations.
  • Many of our clients say their HRIS helps them look like HR rockstars because of its convenience and ease of use.
  •  
    This blog tells you everything you need to know about an HRIS. What the benefits are, why you should get one and when you should get one.
  •  
    This article answers the question "What is an HRIS?" It is the integration of HR activities and information technology. This article talks about what it does, reasons to use HRIS, when you should get an HRIS for your business and how many employees an HRIS can handle. It also talks about some of the common features and even how to use it.
clonyr

Expedia Being Investigated for Conspiring With Hotels to Suppress Competition – S... - 0 views

  • Expedia Group Inc. is under investigation by the Utah attorney general for allegedly conspiring with the biggest U.S. hotel chains to suppress competition in online travel booking.
  • Beginning in 2014, the hotel companies agreed to stop bidding on one another’s brand names in Google searches in order to avoid price competition.
  • TravelPass claims searches for hotels used to generate an open bidding process where companies could bid on keywords that included their own brand, as well as those of their competitors.
  • ...1 more annotation...
  • “The conspiracy has left in its wake an online travel booking marketplace characterized by deliberately limited information and high transaction costs.”
  •  
    TravelPass Group LLC raised a lawsuit with the Utah attorney general to investigate Expedia conspiring with Marriott, Hilton and other hotel companies to manipulate search advertising on Google. Under federal law it is illegal for companies to work together to harm competition. In 2014, hotel companies agreed to stop bidding but Expedia continued to coordinate and act as a go between for the companies and providing reports on compliance with the agreement.
khadija2050

MGM Resorts falls victim to data breach | PhocusWire - 1 views

  • MGM Resorts International is the latest travel brand to suffer a security attack involving customer details, in an incident that took place last summer.
  • Details of the incident were uncovered last week by ZDNet, which says the personal details of more than 10 million customers were shared on a hacking forum.
  • “unauthorized access to a cloud server.”
  • ...6 more annotations...
  • He adds that companies should also monitor for leaks of the data.
  • a dark web monitoring specialist, says this kind of incident can be avoided by regularly checking who has access to cloud-based servers:
  • “confident that no financial, payment card or password data was involved in this matter."
  • “This incident also highlights the importance of speed when mitigating digital risk; watermarking data with unique synthetic identities can enable organizations to detect these threats immediately and be the first to find out if their data is available online, before someone else does. Setting up email listeners for these watermark identities can detect a breach before the data is shared online, if the hacker is testing for valid addresses.”
  • advises that the same security levels for data on premise need to be in place for what is stored in the cloud.
  • It’s a near-universal challenge for enterprises: the move to hybrid environments and more complex, fragmented networks makes it even harder to keep control. Without consistent policies you can pretty soon have a tangle of security gaps and compliance violation
  •  
    MGM Resorts falls victim to data breach last summer, more than 10 million customers' information were leaked out. It was took place through "unauthorized access to a cloud server." However, specialist said this breach can be avoided by regularly checking and monitoring. Also, specialist advised that MGM also need to take same security levels for data on premise in their could.
  •  
    It was reported that MGM Resorts fell victim to a data breach on a cloud server but not much critical guest information was leaked out. Experts said that this kind of breach can be avoided by checking who was able to access the server regularly. Also, the company needs to monitor data to find out the leakage earlier than anyone else. Monitoring the data stored on the cloud should also be as important as those stored on-site.
  •  
    the article gives details about a data security breach that the company was a victim of and how information of 10 million customers were shared .
mtedd003

Meet the Soaring Demand for Unattended POS in the Restaurant and Retail Verticals - Dat... - 0 views

  • One of the latest trends that have made it necessary for solutions providers businesses to adapt is the booming unattended POS trend. The global interactive kiosk market saw record growth in 2018, reaching $9.22 billion and a 17.6 percent growth rate — which exceeded the growth rate in 2017.
  • Last year, McDonald’s announced a plan to install self-service kiosks in 1,000 of its stores per quarter.  Taco Bell planned kiosk installations in more than 6,000 locations, and Subway included self-service kiosks in its “Fresh Forward” initiative to transform customer experiences.
  • Furthermore, 60 percent say they’d visit restaurants more often if they had self-service kiosks.
  • ...8 more annotations...
  • Erba Collective, a Los Angeles cannabis dispensary, installed self-service kiosks that accepted cashless payments to reduce wait times and increase customer turnover.
  • It’s the right solution for today’s consumers: Consumers value their time, and waiting in line can destroy an otherwise great customer experience.
  • It’s the right solution for today’s businesses: Merchants are facing mounting challenges ranging from rising labor costs to new competition. Self-service kiosks can help businesses do more with the same staff, minimizing the labor required for order taking or checkout.
  • o provide unattended POS solutions, you will need to speak with your vendors or find new partners that offer the types of hardware you need. It’s also vital that you work with a payments partner with expertise in managing unattended POS transactions.
  • EMV chip technology will help prevent card fraud.
  • part of their omnichannel strategies
  • If your goal is to be a total solutions provider and meet all of your customers’ needs
  • one-stop shop.”
  •  
    Unattended POS is growing global trend which industry leaders will soon have to adapt in their business place. Quick service restaurants are quickly adapting to this change as it reduces wait time and increase in customer return rate. Other key benefits for businesses are the decrease in labor costs & minimal errors when processing guests' request. Ideally, merchants must speak with vendors to customize the self-service kiosk and to ensure they are in compliance. In the end this will expand revenue and efficiency.
  •  
    Unattended POS machines hit a global growth of $9.22 billion in 2018 from 2017, and is still climbing. The unattended POS machine has shown to be particular popular in the quick service restaurant sector. McDonald's has announced a plan to put 1,000 self-service kiosks in their stores per quarter. Taco bell and Subway have also announced they will be adding the kiosks in their stores as an initiative to offer a heightened customer experience. The machines have come with the benefits of reduced wait time and faster customer turnover. POS growth is attributed to aligning with today's consumers' expectations. Customers value their time and rising labor costs can be eased with the machine as it expedites transactions and covers tasks not relied on by human interaction.
khadija2050

50 Facilities Management Tips and Best Practices - Camcode - 0 views

  • Cut night site lighting. “Depending upon how your site lighting is operated and circuited, you can create an ‘economize mode’ for overnight when the site is at its lowest occupancy. Keep perimeter site lighting on around your property and all entrances and main drives lit.
  •  Replace older lighting with LEDs. “Memorial Sloan-Kettering Cancer Center chose LEDs to replace existing lighting in a parking garage open 24/7, halving the garage’s power consumption. Meanwhile, Mediapolis Community Schools in Mediapolis, IA, also embarked on a retrofit of LED exterior lighting.
  • Implement a sustainable facility design plan. “Sustainable design is more attainable and affordable than it’s ever been, especially when you think in terms of years instead of days and weeks. It’s also worth noting that sustainable design is very well favored among the public, which is an extra incentive for companies interested in reinforcing their reputation as socially responsible and environmentally concerned
  • ...47 more annotations...
  • Know the total cost of all facility work done both directly and indirectly. “To the untrained eye, the facilities maintenance arm of a business appears to be a black hole of cost. The costs of these FM services add up, and unless discrepancies arise, that is where most of the business analysis ends. However, facilities maintenance managers, who are privy to all of the nuances that make up eac
  • h work order, understand the complexities and overhead involved in this sector of business.
  • Consider less obvious improvements that impact facility energy use. “Some energy-related projects will be more or less hidden from the users and primarily pursued to reduce energy demand, such as chiller and fan-unit upgrades. Such projects may end up providing the building users with better temperature control, but this is not the primary goal of the upgrade
  • Operational changes such as reducing the hours of HVAC and lighting operation, and changing setback temperatures, which require very little expenditure (if any at all) do not directly affect user experience, but can produce large reductions in electricity loads. In general, working with the building operations team to reduce energy use can produce impressive reductions in loa
  • his allows building and facility management professionals to determine whether the cost to improve a particular element of a building or a system in it against the cost savings over the same period. If the cost of an upgrade over its lifetime offers an advantage over the building operational costs it will save, then it’s generally considered a good investmen
  • “Finding the right suppliers to maintain your facilities can be difficult and time-consuming. From janitorial services, to groundskeeping and maintenance supplies, ensuring suppliers are providing apples-to-apples quotes, developing contracts with clear service levels, and validating that supplier quality
  • “Boilers today can reach efficiencies of up to 96 percent using condensing technology; however, a typical building, including new buildings, uses atmospheric type boilers which, for all intents and purposes, are only slightly more advanced than a science lab Bunsen burner. This technology is reliable and it works, but it is expensive to operate
  • An energy audit systematically identifies and develops opportunities to help reduce energy use in an institutional or commercial facility and, as a result, decrease building operating costs. Focusing the audit is imperative for maintenance and engineering managers.
  • “Commercial kitchens are high energy users, consuming roughly 2.5 times more energy per square foot than any other commercial space, according to the US Environmental Protection Agency (EPA).  Of that, as little as 40% is used in the preparation and storage of food, says the UK’s Carbon Trust; much of the wasted energy is dispersed into the kitchen.
  • All commercial buildings are insulated; building codes make it mandatory to insulate up to  a certain level. Unfortunately, because most buildings are put up under strict guidance to budgets, they are usually put up with only the minimal amount of insulation
  • Develop performance measures for your PM process with an emphasis on measuring the amount of PM that is work completed compared to all other work. Total PM hours should be the highest percentage of all the department’s maintenance work. This goal might seem impossible, but over time, it is very achievable
  • “Preventative maintenance is all about planning, plain and simple. Every piece of equipment or machinery at your disposal or under your care should have a schedule of what type of maintenance it requires and when it requires that check-up.
  • “Failure modes are defined as “how something fails.” Let’s use a flat/membrane roof to show an example of what a failure mode is. On a flat/membrane roof, one failure mode may be “penetration of roof membrane,” and the causes of this failure mode could be many. Knowing the failure mode(s) of a specific maintainable item such as a membrane roof and its causes can be key to early detection of roof failure (not meeting the intent of the end user) so the repair can be made before it affects an operatio
  • “Catch small problems now before they become big ones. Addressing small details can add up to huge improvements in appearance and functionality. Ask your facilities services provider, janitorial company
  • You may schedule preventive maintenance based on meter readings on an equipment. However, equipment meters usually do not differentiate between work time and idle time
  • Greasing the rack and pinion of a beam saw, for instance, can cause grease and saw dust to solidify inside the gears over time, eventually preventing them from moving. If you’re unsure which tasks are beneficial to each piece of equipment, ask your equipment representative.”
  • Having spare parts and supplies around the time of a major preventive maintenance schedule is absolutely critical. Asset management software allows you to check the availability of the spare parts for dates when the work orders are due. This report can help you identify parts that are insufficient for the required work orders in the future. If you know which parts you are falling short on, you can order them in advance from suppliers rather than waiting till re-order limits are reached
  • “Appropriate repetition and reinforcement are necessary. The average person is bombarded with more than 300 messages while at work, and multiples of that outside of work, Finney says. Getting a message to land with an audience might take as many as 12 repetitions, in some cases, he says
  • Let’s get together: when you’re designing your facilities, design social spaces for your employees. These might be lunch or break rooms, games rooms, gyms, or even community gardens.
  • While other managers may work to manage clients or staff, your job is to manage facilities and all that occurs in them. Your corporation’s physical assets are just as important as your human resources, and you are the expert in this field. Whether it’s collating data or contributing to the organization’s bottom line, your input is a valuable part of corporate decision-making
  •  “Workplace inclusion has to be clearly defined before any initiatives can be pushed forward. One useful definition of an inclusive office is a workplace in which all staff are treated with respect and have equal access to resources and opportunities. Facility managers should build on this high-level description to create an idea of what concepts like equal access, diversity and fairness look like in their own facilities
  • Space costs money. Knowing that we are moving towards a working environment consisting of virtual or mobile workers, investing time in developing new workplace designs that can suit these new ways of working while increasing space utilization rates can result in impressive cost savings
  • Performing facility maintenance and engineering tasks is like sailing among icebergs. What technicians can’t see will sink them — or their facilities. Thermal imaging technology gives technicians the ability to see the unseen, making it easier to spot failing motors and electrical components,
  • This concept is broadly used to describe our attempt to formally identify in-house talent in many of our labor shops. We identify talent through a competitive selection process based on potential vs. skills and promote our selected personnel to the worker and helper level while training them to achieve appropriate full mechanic level with associated certifications/licenses
  • This directly leads to the client receiving a more fit-for-purpose solution and ultimately receiving greater value which grows a greater relationship.
  • In other words, there has to be a compelling reason based on our mission for why we would submit budgets for anything.” By presenting specific information on how and why you’ve chosen your budget numbers, you can help the C-suite see that your budget is well within reason
  • When you automate the work order process, you remove human error associated with it. Essentially, you’re taking the people out of the process and ensuring nothing gets missed or overlooked
  • “There are many different software options out there than can aid FMs in organizing and streamlining their everyday tasks. This ranges from software designed to help manage all maintenance activities to logging and tracking facility visitors for security purposes. 
  • uch smart sensors, operating costs are dramatically reduced, productivity is enhanced, and occupants’ comfort is improved.
  • “One of the most exciting features of Facilities Management software is the ability to manage heating and cooling remotely, or set a programmable thermostat to move set temperatures up or down throughout the day. Facilities planners love the ability to analyze and explore energy use from heating and cooling systems
  • “Maintenance and facilities administration systems must frequently abide by national and global regulatory requirements. All maintenance administrators face occasional random or audits inspections by regulatory authorities. Maintenance software enables you to prove regulatory conformity and decrease the amount of paperwork and preparation that is needed for an audit.
  • KPIs allude to opportunities and errors in your company. Paired with the Internet of Things (IoT) and energy management systems, KPIs can be used to highlight missed maintenance tasks, greater traffic area of your business or problems with machinery
  • “Closely monitoring energy and water use to reduce building-operating costs is another benefit. By allowing owners to monitor and analyze the performance of multiple systems—air-conditioning levels, lights on automatic dimmers, water usage
  • “A feature that’s gaining a lot of ground is using facial recognition technology to let people in and out of the building. It’s more secure than key fobs or cards, and unlike cards and fobs, you can’t forget your face at home. It’s like batting a triple, or killing three birds with one stone
  • You cannot do your job properly without the correct information. If you don’t have proper records on the state of your facilities, you can’t do your job as a facilities manager.
  • “A surprising number of facilities managers have no true system in place for managing their space.  More than a quarter of everyone interviewed – 28 percent –
  • . It may help significantly with compliance with various industry standards, such as HIPAA in the healthcare industry and Sarbanes-Oxley in the financial field. It can help to document best practices for avoiding accidents, or in the worst case scenario,
  • This method identifies how critical a piece of equipment or maintenance task is to your business and will ultimately show you where it should land in your prioritization process
  • Smartsheet is a spreadsheet that you share with your co-workers, but its features go far beyond Excel. This tool combines the traditional spreadsheet with project management tools, templates, and forms and allows you and your colleagues to access spreadsheets on mobile devices and work on them collaboratively
  • The business world is increasingly embracing a larger remote workforce. Offices are used as areas to collaborate, develop, and design new ideas. The day-to-day work can be, and often is, done from home
  • “Another possibility for cutting costs, say experts, is not just moving staff around, but moving work around also. This means carefully examining all outsourcing contracts to see if they can be scaled back and the work completed by in-house staff
  • “Verify assets from a minimum of two data points, such as the barcode and the item’s serial number.
  • After collecting data and developing a maintenance schedule for your assets, you need to plan for the long-term maintenance of your asset inventory
  • However good asset management and maintenance planning is, there comes a time when an asset reaches the end of its useful life and should be disposed of.
  • “If you’re trying to get a handle of your documents, the first thing you should do is an asset assessment. Detail the condition of all the main equipment and systems, and document those conditions
  • Strategic asset management integrates key relationships between planning and delivery activities.
  • Maximize your use of vertical cubic footage by placing seasonal products or those that move less frequently in harder-to-reach vertical storage areas
  •  
    the article highlights how companies can benefit from sustainable design and gives tips on preventive maintenance
jackyreis

The Role of Green Technology in the Sustainability of Hotels Essay - Free Argumentative... - 2 views

  • Throughout the life of hotels— from building construction, operation, maintenance and evolution—the environmental issue is the wasteful consumption of vast amount of resources such as water and energy and accumulation of air, soil and water pollution in a built environment. The unique service function and operations of hotel result to a stronger ecological impact when compared to other buildings used for commercial purposes. (Bohdanowicz, Simanic & Martinac, 2004)
  • It is imperative for hotels to construct buildings, design their facilities, operate, and refurbish structures in a way that causes the least possible harm to the environment. (Straus & Gale, 2006)
  • Protection of the environment through eco-friendly practices by hotels involves a radical change in operations and a long-term impact, which makes this a sustainability-driven strategy
  • ...41 more annotations...
  • The growing concern over sustainability in the business sector led to developments in innovative environment friendly processes and tools collectively called green technology
  • Green technology enables the eco-friendly practices of business firms.
  • The concept of sustainability emerged in the field of natural sciences in recognition of the scarcity of natural resources and the need to rationalize usage to secure sufficient resources for future generations (Kirk, 1995).
  • The concern of sustainability is ensuring the continuation of the well-being of people and protection of the environment from wasteful use or destructive activities.
  • The implementation of sustainability plans involves innovative methods and tools accessible to hotels and responsive to the multi-dimensional issues including impact of operations on the environment experienced by hotels. Green technology understood as eco-friendly tools and processes or environment friendly products support the successful implementation of sustainability plans in the hospitality industry.
  • 1.      Minimized pollution and rational energy and water consumption. 2.      Respect for culture and tradition. 3.      Community involvement in the hospitality economy. 4.     Consideration of quality instead of quantity in terms of the visitors to tourist destinations. 5.      Economic benefits redound to the community. (Robertson, 2007)
  • In relation to environmental sustainability, there are also considerations for inclusion into the sustainability plan of hotels to ensure that they meet environmental compliance (Butler, 2008)
  • However, even if sustainability planning is a tedious task, the expected outcomes are long-term and compelling because this determines the continuity or viability of hotels, firms whose future survival depends on sustainability (Butler, 2008).
  • 1.      Scale and distribution of operations in a given area. 2.      Hotel demand and means of alleviating the negative effects. 3.      Protection of key assets historic buildings, townscape or coastline. 4.     Contribution to other related areas such as economic development and cultural preservation. (Sharma, 2004)
  • Since the sustainability of hotels spans multidimensional aspects, the contribution of hotels to other areas such as employment or job creation also supports its sustainability.
  • Green technology received recognition as an aspect of human society and therefore part of sustainability. In a sustainability panel of representatives from the hospitality industry, sustainability as a strategy meant addressing today’s needs without adversely affecting tomorrow’s needs (Knowles, 2008).
  • Examples of product enhancement are energy saving appliances and fixtures such as fluorescent instead of incandescent lights or intelligent air conditioning systems that regulate room temperature depending on the presence of its occupant
  • The extent of reduction of waste varies since this could range from minimal to significant decrease in the volume of waste generated, capacity of landfills, and transportation needs. By benefiting the environment, economic benefits also accrue. (Billatos & Basaly, 1997)
  • dopting waste management processes and tools accrues financial, economic, and environmental benefits for hotels.
  • Key to these activities is the ability to harness the full functional value of materials and product components at the least possible additional processing cost for recovery and reuse. (Billatos & Basaly, 1997)
  • First is design of recycling or the cost-effective manner of recovering and reusing materials. The design provides support during the disposal stage to ensure low added cost for recovery. Second is design for disassembly encompassing the methods enabling the minimization of cost in segregating reusable materials. This leads to savings that accumulate when design interventions are made during the stages of material selection and assembly that already separates reusable materials
  • Third is toxics management comprised of the activities of controlling and eliminating toxic materials that are innate components of products such as cadmium or lead. Excessive levels of these toxic materials are hazards to health and the environment. (Billatos & Basaly, 1997)
  • Environmental benefits include reduced accumulation of waste and lesser risk of soil, water and air contamination of toxic production. (Billatos & Basaly, 1997)
  • Pollution prevention involves the elimination of processes in manufacturing that cause pollution. This requires change by redesigning the production process in a manner that prevents the accumulation of harmful by-products or the redesign of the finished products so there would be no use for processes that result in hazardous by-products. The prevention of pollution in production design exacts capital investments but the cost of redesign is deemed less when compared to the cumulative cost of controlling pollution, which would likely increase with new regulations imposing more active methods of pollution control. (Billatos & Basaly, 1997)
  • Green technology as a process and a collection of tools addresses four objectives, which are a) waste reduction, b) materials management, c) pollution prevention, and d) product enhancement (Billatos & Basaly, 1997). There are processes and tools specifically targeting any one, some or all of these objectives so that the appropriate choice depends on the priority of hotels.
  • The technological development of product enhancement innovations is escalating and promise greater functions for business establishments. (Billatos & Basaly, 1997)
  • Utilizing product enhancement technologies influence the sustainability of hotels in terms of savings on operating cost, lesser pollution and waste in the built environment, and value creation for environmental conscious customers (Yaw, 2005).
  • Overall, green technology supports the sustainability of hotels by decreasing a wide range of economic and non-economic costs to support the financial viability of hotels in the long-term and conserving the natural environment on which the hospitality industry depends for the continuity of business. By adopting green technology, hotels gain processes and tools it can use to secure its sustainability.
  • A range of energy saving technologies is available to the hotel industry. These technologies could make hotels green buildings by targeting various areas for energy saving.
  • One is electric heating pumps as alternatives to conventional electric boilers or condensing/non-condensing boilers requiring gas to run. The use of this green technology by a hotel in Hong Kong with a rooftop swimming pool showed a reduction in energy consumption by 26.5-32.5 MWh and a reduction in greenhouse gas emissions by 12,000 kg. When computed over a ten-year period, using this technology would save the hotel HK$226,400 in energy cost savings. The hotel can earn back the cost of adopting this technology in two years. (Chan & Lam, 2003)
  • Building designs able to harness alternative sources of energy comprise green technologies that support the sustainability of hotels. Solar panels continue to gain function in energy saving for hotels (“Building in a green edge,” 2008) although the payback period is longer than expected, the energy saving potential extends to the long-term. The use of building designs that harness natural light such as skylight atriums that do not use artificial lighting during the day are also green alternatives for hotels (Kirby, 2009).
  • Another direction of green technology for the kitchen is the reuse of exhaust heat from the kitchen by harnessing the heat from the exhaust or condensing hot air to produce steam for use in cooking. This is a means of recycling energy. However, this involves the integration of the design in the structure of the kitchen or the building itself, which means greater investment. (Higgins, 2008) Nevertheless, further innovations in this technology could enhance practical value for hotels.
  • In other areas of hotels such as rooms and bathrooms, e-sensor systems and LED lights comprise green technology options. E-sensor systems apply to different systems such as lighting and air conditioning. The e-sensors have the capability to change automatically the lighting or air conditioning settings depending on the area of the room where there are people or temperature changes in the room. LED lights offer greater energy savings than fluorescent lights so this represents the third generation in lighting technology. (Kirby, 2008) Systems thinking in energy management comprise a promising green technology in saving on energy costs (Sobieski, 2008).These technologies are widely available and accessible to different hotels. The energy saving is experienced in the short term and the payback period is shorted. The problem with this is hotel guests tampering with the system leading to added cost for repairs. This means that awareness and information dissemination are important for the effectiveness of these technologies.
  • Another green technology for rooms is the biodegradable key cards. These have the same life span as the conventional key cards except that these are biodegradable or recyclable. (Gale, 2009) These require little cost with high environmental impact.
  • This involves the placement of water treatment plants that recycle water used in baths for flushing in toilets. (Edwards, 2004) These comprise viable and accessible water conservation practices that would contribute savings on the cost of water to rationalize the consumption of water as a scarce resource.
  • One is the conscious involvement of hotels in the protection of the environment since the nature of the business of the hospitality industry and the closely connected industries such as tourism heavily rely on the soundness of the natural and socio-cultural environment for business
  • The other is the investment in environment protection in a manner that secures economic and financial as well as a range of non-monetary benefits for hotels in the long-term (Vermillion, 2008).
  • Energy consumption is also a benchmark of the eco-friendliness of hotels
  • The water conserving technologies provide the process and tools for hotels to achieve this benchmark.
  • Waste and pollution management are also benchmarks of the ecological involvement of hotels.
  • Green technology takes the role as an enabling process and tool for hotels to become sustainable.
  • With hotels competing to maintain its customer base and pull customers to shift to the hotel’s services, green technology could become an enabler for hotels to become competitive.
  • Investing in green technology enables hotels to significantly cutback on operating cost. This enables hotels a wider profitability margin and room to offer promotional prices to attract more customers (Jones, 2002).
  • Green technology has taken a central role in the sustainability of hotels. The concept of sustainability of hotels involves the aspects of environmental protection and business viability.
  • The use of green technology also contributes to the viability of business firms in terms of financial standing and non-financial competencies in the long-term. Going green attracts the niche market of environment enthusiasts that contribute to sales. Using the range of green technologies available would also result in savings from operating costs in the long-term, which increases the profit of hotels and gives them flexibility to invest in marketing activities.
  • It is a sound strategy for hotels to consider green technology as a process and a collection of tools in support of sustainability goals.
Panpan Xie

How IT Can Go Green | Top Stories | | Hospitality Magazine (HT) - 2 views

  • In the world of information technology (IT), the green movement is taking shape. There are numerous opportunities for IT professionals to take leadership roles in helping their organizations to adopt sustainable practices. Technology is a tool to provide solutions, but regrettably, technology can also be a source of the problem due to factors like energy consumption and the environmental impacts when disposing of obsolete or broken technology (i.e., e-waste). Therefore, we will need to look at situations and technology usage via multiple lenses to try to assess the net impact to determine if the outcomes are truly desirable and positive versus negative. This often requires asking tough questions and looking for possible unintended consequences before decisions are being made
  • Like any business initiative, green IT projects will require strong commitment from an organization’s top management and investment in time and resources at all levels.
  • In order for tourism to prosper, we cannot afford to let our environment erode.
  •  
    Green information technology(IT), referred to as green computing, is a term used to describe the application of automated resources in an efficient manner. Green IT originates with system manufacturers producing environmentally friendly products and encouraging users to adopt eco-friendly practices such as reducing paper usage through minimal printing, operating more efficiently with power management,and exercising proper recycling habits.As global information technology environmental standards continue to expand, it is highly likely that guidelines governing product life span, power consumption and recyclable resources will be in the forefront.
  • ...2 more comments...
  •  
    This article shares how IT is going green in several areas including hospitality. It speaks to digital marketing, e-waste, and appealing to employees to aid in using technology responsibly. The use of energy saving techniques and energy star products.
  •  
    As our natural resources are being depleted rapidly and technology is changing faster than ever resulting in mountains of "e-waste", I believe the IT industry should focus a vast amount of their efforts in the area of sustainability or going green. In the hospitality and tourism industry maintaining natural resources and cutting down on the consumption of water, energy and paper is an IT issues that we can all support. The focus of this article was about revealing opportunities where IT can go green. Sustainability is good for the environment, the viability of the hospitality industry, the guests, and the bottom line. According to the article, IT leadership needs to take "a leadership role in helping their organization to adopt sustainable practices". Some of the areas where IT can look at going green are as follows (information taken directly from the article): * Using IT responsibly and effectively to reduce energy, water and paper consumption * Deploying effective technology practices such as Energy Star compliance to power down computers automatically after periods of inactivity and server virtualization * Tackling e-waste and deploying recycling technologies to reduce environmental waste and impacts * Digital marketing practices * Marketing strategies to report and promote green practices A commitment of time, money, and resources will be required from all levels of leadership in order for green IT projects to work. Companies have to educate their employees and guests to create awareness, implement practices such as energy audits, device shut downs to force people to use media, and give rewards to get the buy in. Even though the payback of green initiatives may take a long time, the upside is that you are being environmentally conscious and doing the right thing.
  •  
    I highlighted in blue the sections I was most interested in, I found the passage about reducing faxing and photocopying to be most interesting. There is no reason to be so reliant upon these when you can send attachments through your smart phone. Hotels and other properties can unplug these machines to save money on the electric bill. There are otherways to be paperless, for example.The article I spoke of was about how hotels can limit the need to priint itemized bills and reciepts, all charges can be posted right to the mobile app on the smart phone. The mobile app on the smart phone will even unlock and lock your room doors and allow enterance to the spa and fitness center. There won't be a need for plastic room keys anymore either.
  •  
    In hospitality industry, IT technology brings many benefits to us, but it is also a source of pollution when disposing of broken technology. There are many advantages of green IT movement such as reducing energy, water, paper, environmental waste and impacts, etc. Although it has many benefits, green IT projects need support from company's top leaders in both time and resources. The ROI of green IT is a little bit longer than other types of projects, but it has upside potential and intangible benefits. Green IT practices are not contrary with making money, so hoteliers should take measures to lead the organization on its journey to green action.
marble_bird

Hotel_ITSec.pdf - 0 views

shared by marble_bird on 15 Jul 20 - No Cached
  • During the past decade, information technology (IT) has significantly changed the way the hotel industry controls and manages operations. While many technologies have been utilized, some newer technologies have emerged in the literature and in practice, and many of them impact the hotel’s security.
  • Among the results, this study identified a gap between hoteliers’ understanding of IT budget adequacy and the adequacy of installed IT security systems.
  • Advancements in technology are increasing at a remarkable rate. As technology becomes more important, organizations that do not keep up with these advancements could lose business opportunities to other competitors that do
  • ...53 more annotations...
  • The four leading technologies which have showed a high adoption rate from the industry and have received attention from academia are: self-service, wireless, green, and security technologies. The advantages of these technologies for hoteliers include enhanced customer services and operational efficiency (Doyle, 2007), decreased guest wait times, more efficient methods to settle bills (Singh & Kasavana, 2005), reduction of energy costs (Meeroff & Scarlatos, 2007), and protection of sensitive customer data and credit card numbers
  • In addition, exploring the influential factors of security system usage will provide greater depth of knowledge with respect to why some hotels have adopted more security systems than others.
  • there is still a lack of understanding of the nature of risk associated with inadequate IT security, especially among operators of hotels that do not have their own IT departments.
  • Self-service technologies are commonly defined as devices or applications which permit users to produce a service independent from the direct involvement of the service provider (Meuter, Ostrom, Roundtree, & Bitner, 2000). The use of self-service technologies in the hotel industry has grown considerably, especially in the areas of self check-in, in-room check-out, and foodservice kiosks
  • IT systems refer to general support systems such as mainframe computer, mid-range computer, and local area network.
  • Some of the most significant wireless technology applications involve the use of mobile handheld devices, such as personal digital assistants (PDA), tablet PCs, and cellular phones, or RFID (radio frequency identification). RFID utilizes computer chips and antennas, allowing the chips to wirelessly communicate with a receiver.
  • While the major usage of RFID in the hotel industry was for inventory control purposes, it also has the potential to be utilized in ways that can provide more conveniences for the guests.
  • Other possible uses include placing RFID tags on items of high value as a means of theft prevention or integrating tags into guest loyalty cards for easy identification
  • IT investment that lowers environmental impact and IT that manages the environmental impact of other systems are commonly referred to as “green technology”
  • Many hoteliers might think becoming more environmentally friendly will cost more for their hotels. However, it has been demonstrated that “going green” is not only the right thing to do for the environment but also provides tangible bottom-line benefits for hotels by reducing consumption of energy and water, as well as other related costs.
  • Some of the risk factors involved include reliability, security, and privacy issues
  • A hotel with more technologies being utilized will install more security systems than those with fewer technologies.
  • Many of these attacks involve attempts by thieves to gain access to customer credit card data, and these attempts constitute a major portion of the risk inherent in IT security
  • if a system is breached and the merchant is not PCI compliant, the merchant then is responsible for all costs associated with improperly used credit card information taken from that system (Kress, 2008). These losses could bankrupt a business if the security breach goes undetected for even a short time.
  • IT security systems are those measures taken to protect the confidentiality and integrity of proprietary data.
  • two main paradigms of adoption are believed to occur: bottom-up adoption and top-down adoption.
  • Thus, it is reasonable to assume that organizational factors (e.g., financial factor, human resource) will influence the implementation stage of security systems at a hotel.
  • A hotel with sufficient IT budget will install more security systems than those with insufficient IT budget.
  • That is, if a hotel does not have its own IT department, it will have a negative influence on successfully installing or maintaining necessary security systems.
  • A hotel with its own IT department will install more security systems than those without.
  • Overall, the state of IT spending on security continues undiminished because managed security services are required for almost every application (Communications News, 2007).
  • risk associated with a breach of IT systems security (e.g., network break-ins) is very high. Consequently, no sector of the business community is exempt from attacks on their IT systems, with an attack being defined as a technique used to exploit a system’s vulnerabilities.
  • Given the importance of security and privacy at a luxury hotel, this study expects luxury properties to have installed more security systems than other segments
  • Most hotel employees use their property management systems for hotel operations and should be able to check their e-mails.
  • To justify the low response rate, previous studies which have compared response rates of mail and e-mail for surveys were reviewed.
  • the large majority of respondent properties do not have their own IT departments. Second, the people making IT decisions generally do not have IT backgrounds or training. Third, the large majority of respondent properties have little more than firewalls or antivirus software to protect their proprietary data, and these systems alone are not adequate to meet PCI standards, as they do not take steps to encrypt and protect cardholder data, maintain a vulnerability management program, implement strong access control measures, regularly monitor and test their networks, and maintain an information security policy as required by the Security Standards Council.
  • The respondents were asked to select from a total of fourteen securities related systems
  • The profile of the respondents revealed that they were experienced hoteliers with more than ten years experience in the industry
  • Fifty-three percent of the respondents reported that they were with chain hotels that would be considered mid-range properties with an average of 175 rooms (median of 107). Over 80% of the respondents reported working in operations, while fewer than 4% reported working in either IT or engineering (Table 1).
  • Nearly 70% of the respondents’ properties did not have their own IT department (69.2% did not have, and 30.8% had their own IT departments, n = 234, missing data = 10).
  • Fifty-three percent of them (n = 244) thought the most important goal for hotel technology would be enhancing the customer’s experience.
  • second identified goal was utilizing technology to help generate revenue (41%)
  • differentiate properties from their competition (20%), to lower expenses (16%), and to increase security (6%).
  • Internet kiosks in the lobby represented the most frequently used self-service technology (36.5%, n = 244), followed by kiosks for airline check-in/board pass
  • With respect to security systems currently in use, antivirus security systems represented the most frequently used security system (92.2%), followed by hardware firewalls, software firewalls, physical security, and encrypted login security systems.
  • intrusion detection was the most frequently identified system (15.6%), followed by vulnerability assessment scanning (13.5%), Internet scanning (13.1%), antivirus (11.5%), digital ID server (11.5%), and nonreusable passwords (9.8%; Table 2).
  • Thus, the hypothesis was supported that there was a linear relationship between the three factors and the adequacy of security systems.
  • The positive standardized coefficient (β) of .389 indicates that there was a statistically significant (p < .001) linear relationship between IT usage (the number of wireless, self-service, and green technologies a hotel was using) and the adequacy of security systems
  • The study revealed certain things of interest, the most significant of which is the need for greater emphasis on IT security among hoteliers.
  • only about 30% of all respondents reported having their own IT departments. Since budget hotel properties are extremely unlikely to have an IT department, it is highly likely that the very large majority of IT decisions throughout the industry are being made by hotel operators for whom IT is not their primary area of concern.
  • Furthermore, the focus of hoteliers for future IT implementations is enhancing the guest experience (53%) and generating revenue (41%). Very few respondents (6%) identified increasing security as a 5-year IT goal.
  • While almost all respondents use information systems as part of their jobs, very few are trained in the development, maintenance, and secure use of these systems.
  • no correlation was found between the respondents’ perceived adequacy of their IT budgets and the adequacy of installed security systems, as adequacy of IT budget did not appear as a significant term in the regression analysis.
  • Nearly 10% of respondents do not have so much as anti-virus protection for their systems, and nearly half do not even take simple physical precautions to protect their IT systems.
  • we note that no correlation exists between the respondents’ perceived adequacy of their IT budgets and the number of installed IT security systems, as the number of installed systems was not a significant factor in the regression analysis.
  • The sample obtained in this study represented the targeted sample: over 80% of the respondents were working in hotel operations. Furthermore, the purpose of this study was to explore hotel operators’ insight of technology usage, IT budget, and security measures rather than to confirm existing theories or to generalize the results.
  • it is reasonable to conclude that the respondents did not have an adequate understanding of the nature of the IT security hazards facing them for the average property does not have installed systems adequate to meet PCI standards, yet they reported having adequate budgets.
  • In order to adequately protect proprietary data, one must have an understanding of network security, which is an understanding apart from software functionality.
  • Properties with their own IT departments, however, reported that they had a higher number of installed IS security systems than did those properties without their own IT departments.
  • roperties without their own IT departments, in particular, have a less adequate understanding of their IT security needs than may be necessary.
  • This study found hoteliers’ lack of attention to security provision, training in IT, and PCI compliance can place hoteliers at great risk. For example, the cost of a single incident at a noncompliant property could result in the loss of the entire business.
  • It will be useful to examine the reasons why luxury properties are more likely to employ adequate security measures to determine whether this greater use is attributable to better understanding of security issues or some other factor.
  • The study was limited by the nature of online surveys; the response rate was quite low. Future studies could test the proposed research model via paper-based mail surveys to increase a response rate.
  •  
    This article covers a study performed on various hotels to determine management's level of IT knowledge and security implementations in relation to the hotel's IT security budget. The article discusses four types of technology impacting the hotel industry and how management responses to trending technology can affect a business, particularly in terms of a data breach and overall security. The study finds that an alarming percentage of hotel managers are not adequately informed on the risks and procedures of IT management and security, and many do not have proper IT security measures in place despite having an appropriate budget.
rhoff019

Council Post: Cybersecurity As We Know It Is About To Change - 0 views

  • the global cybersecurity market is set to increase to $270 billion by 2026. This signals the priority boardrooms have placed on cyber risk management even as digital transformation takes place en masse.
  • COVID-19 has become the catalyst to trigger change in the ways we manage and operate technology.
  • Virtual desktops emulate a computer system so that IT can control access as such adding input/output devices as well as software and applications. This could become an important control point when remote workers are operating outside the safety of a corporate network.
  • ...15 more annotations...
  • Telecommuting Is The Only Way Of Working For Many
  • With swift digitalization, security controls will shift to data sources, similar to the trend witnessed in IoT.
  • With millions of employees working from home, hackers’ focus has shifted from enterprise to remote working individuals. To handle the menace that exists in cyberspace, decentralized cybersecurity will rise where greater emphasis will be placed on data sources such as actual remote employees themselves.
  • User access controls have largely revolved around single or two-factor authentication. These methods rely on “something you know (username)” and “something you have (password).”
  • This means identity protection will be a top priority, and the best defense should involve building authentication systems that focus on “who you are.” This would require advanced biometric solutions such as fingerprint/thumbprint/handprint, retina, iris, voice and other facial recognition technologies.
  • The current state of privacy regulations is designed around the enterprise network and building the proverbial wall to keep sensitive data out of prying eyes.
  • With the remote working concept taking center stage, re-evaluation of these policies is needed to address the new cyberthreats.
  • From a risk management perspective, global privacy policies will need to encapsulate standard operating procedures regarding BYOD, GDPR compliance and state privacy laws.
  • The shift to cloud services offers employees, customers, suppliers and everyone else across the ecosystem a seamless and frictionless way to access data and applications. Remote access by various users would compound security challenges and present many new potential attack vectors. In the post-pandemic world, IT resources could shift toward data, particularly keeping data secure across cloud platforms.
  • This will facilitate cybersecurity teams to apply varied access controls and demarcate data storage to minimize the risk of cyber intrusion and data breach.
  • Innovative technologies such as ML/AI and AR/VR will see greater adoption. As we have already witnessed, video conferencing applications will continue to rise as non-contact interactions surge.
  • Sectors such as retail, hospitality and manufacturing will layer their adoption of robotics with added AR/VR capabilities.
  • Cybersecurity teams that are saddled with an events-based approach will be overly burdened with triages when a cyber breach occurs. By embracing an intelligence-driven approach, businesses can digitalize confidently with external threat intelligence as the guiding beacon.
  • Social engineering techniques to trick untrained and unsuspecting employees, third parties and contractors into releasing confidential information or letting an intruder into a corporate network will also intensify accordingly.
  • Cybersecurity awareness training for people across the entire supply chain and ecosystem will prevail.
  •  
    By 2026, the investment in cybersecurity will increase to $270 billion globally. After the COVID-19 pandemic companies will need to reevaluate their cybersecurity systems to adapt to telecommuting as many companies will have some of their employees working from home. Biometric security such as a fingerprint or iris scan will become more common as the typical password will no longer be as secure as it once was.
mannypjr

5 Best POS Systems for Hotels | Book Guests With Ease - 0 views

  • It works with a variety of amenities such as restaurants, travel desks, spas, minibars and much more. It comes with unlimited built-in POS System terminals.
  • Hotelogix lets you settle payments through different modes. It accepts multiple currencies, processes credit cards or generates bills directly to the company.
  • Allowing management to gain greater control of all departments by merging operations together, like Housekeeping POS, Front Desk POS, etc.
  • ...29 more annotations...
  • Making packages and inclusions will help up-sell services.
  • The main focus is to make lasting connections that enhance guest satisfaction, boast an efficiency of staff and operational workers and grow revenue opportunities with automated engagement.
  • Restrictions can be set up to restrict users to perform critical actions like night audit.
  • On-premise or installed deployment feature is not available in the POS System.
  • You can easily promote your hotel through various channels with a variety of inclusive packages and rates.
  • This avoids the need to print multiple receipts and cause inconvenience to the guest.
  • This POS system caters to scheduling activities, food and beverage and more.
  • It also expedites the traditional check-in and out experience which mostly causes dissatisfaction.
  • It protects the guest’s payment data and reduces the risks, costs, and compliance by tokenizing each transaction with point-to-point encryption (P2PE).
  • The customer service staff is not always able to solve your issue at once, but their team can submit a ticket and get any errors fixed within a reasonable timeframe.
  • Allow customers to pay their entire bill and room costs at checkoutVerify that the billing is accurate by putting all charges on one billCombine bar, restaurant, and room service charges for any roomMatch specific menus to any display device to any area in your hotel
  • You can connect and share data in real-time with this POS system.
  • Assign special permissions to managers or cashiers, giving them the ability to view sales numbers or simply manage inventory.
  • The interface also allows for seamless billing for any and all room service requests.
  • You can track products easily and see if they are near the minimum or maximum level.
  • If you own multiple businesses, you can use Bepoz to keep track of all of your businesses.
  • Bepoz does not provide installation or an on-premise option.
  • LS Retail provides a holistic solution to all your worries by giving you a transparent and enhanced view of your hotel’s entire business operations.
  • With LS intelligent analytics tools, businesses can track and study their customer’s past interactions and preferences to make their guest profiles more meaningful.
  • LS Central for hotels gives an option where it can be deployed solely in the cloud, on the hotel premises, or both at the same time – whichever way suits your business profile in the best way.
  • It gives a complete overview of your hotel’s current occupancy, its housekeeping, along with all the extensive analysis required by the management to make necessary decisions.
  • It is a single platform that minimizes costs because it reduces the number of vendors and other systems that are otherwise needed for resolving all hotel-related business issues.
  • There is nothing more important than booking guests. Using a hotel POS system can help this process become quick and easy.
  • The average consumer is more likely to go for a package deal, given that they are getting good value for their money.
  • If the client makes an online reservation, the information will be distributed in real-time.
  • You can print these reports and give a detailed review such as payment balancing totals, customers served, average customer and much more.
  • Rewards deals can often increase sales.
  • Our recommendation is to consider Hotelogix or Agilysys, as they are user-friendly and have effective loyalty and sales tools.
  • The features are very comprehensive and fit for both large and small hotels.
  •  
    This article looks at the 5 best POS systems for hotels including Hotelogix, Agilysys, Lightspeed Retail, Bepoz, and LS Retail. It breaks down what makes each system different and the pros/cons associated to each of them.
shanegmark

Do job seekers' social media profiles affect hospitality managers' hiring decisions? A ... - 0 views

  • Social media plays an ever-increasing role in recruitment and selection
  • Likewise, many hospitality businesses are now using social media as a powerful recruitment tool, which is believed to be cost-effective and can quickly generate candidates for vacancies
  • Although SMPs could provide additional valuable information to hiring managers, they found that Facebook ratings actually did not do a better job in predicting job candidates' future performance, such as supervisor ratings of job performance, turnover intentions, and their actual turnover than the more traditional predictors, including personality, cognitive ability, and self-efficacy.
  • ...7 more annotations...
  • Moreover, they disclosed that recruiters using Facebook ratings tended to favour female and white applications, raising cautions of whether organizations can legally justify using SMPs in screening candidates.
  • According to their findings, job candidates' SMPs can also reveal personal information prohibited by the U.S. employment law.
  • Contradicting other studies that suggest social media has been widely used in employee screening (e.g., Kluemper et al., 2012; Sameen & Cornelius, 2015), the informants in this study hold reservations of such practices due to privacy concerns
  • LinkedIn was used by 45% of the informants (M2, M3, M5, M6, & M9) in screening candidates, but nearly all (10 out of 11) of the informants said they did not screen candidates' profiles on other social media networks than LinkedIn.
  • While most informants did not admit they screen candidates based on their SMPs, they showed favour to the following posts shared by the candidates: pictures about food, catering, and events (M1, M2, M3, M9, & M11), news articles (M4, M6, M7, & M10), organizational social activities (M3, M6, M7, M8).
  • Specifically, the informants looked for extroversion (M1, M3, M6, & M10), professionalism (M2, M5, & M6), good match (M6, M8, & M10), conscientiousness (M5 & M7), and agreeableness (M1 & M8), supporting the hospitality literature about the Big Five personality traits
  • Contrary to the business reports that suggests social media plays an increasingly important role in recruitment and selection (e.g., Becton et al., 2019; Evuleocha & Ugbah, 2018; Kwok, 2011; Ladkin & Buhalis, 2016), our findings suggest that hiring managers in the hospitality industry are screening candidates' SMPs with caution primarily due to the concerns of legal compliance.
  •  
    This research article looks at how social media has been used in recruitment for the hospitality industry. It highlights that while it has become common practice, there are many layers of concerns including it violating certain legal rights of potential employees, generating biased decisions based on gender and race, and the practice not producing demonstrably better results than hirings done without reviewing potential employee Social Media Profiles (SMPs).
irinadolgopolova

How to Prevent Malware Attacks and Promote Cybersecurity at Your Hotel - 0 views

  • Each time a hotel’s guest records get breached, the property is burdened with financial strain and faces broken trust with guests. As a hotelier, you don’t need to be an expert in cybersecurity, but you absolutely need to understand the basics to protect your business and your guests.
  • hotels process lots of transactions and store tons of guest data. A hacker can simultaneously target a property’s point-of-sale and property management system to capture payment card information as well as personal data, like passport numbers and email addresses.
  • Research from Symantec, a cybersecurity firm, found that more than 65% of hotels are routinely leaking booking reference codes through third-party sites. Why is this important? Because the information shared through these codes would allow a bad actor to login to a reservation, view personal details, and even cancel a booking altogether. When this happens, your guest information is vulnerable and you risk destroying the guest relationship.
  • ...3 more annotations...
  • Compliance with the Payment Card Industry Data Security Standard (PCI-DSS) not only helps to ensure that data security software, hardware, and practices are safer, but also helps to protect against fines and penalties when a breach occurs,
  • The right technology is only half the equation; over the years, security experts have also identified employees as part of the problem. Hotels must train their staff to handle personal information security, comply with privacy policies, and change user access credentials regularly.
  • Even with a great PMS/POS system and the right training, it’s important to perform routine penetration testing and risk assessments. There’s no straightforward answer as to how often you should pen test your network, but experts warn once a year probably isn’t frequently enough
  •  
    The article is about the reasons why the hotels are attractive for hackers, the author also explains the key concepts in the cyber security. Then, the biggest cyber attacks in hotel industry are described in the article. At the end, the author tells us how hoteliers can improve the security measures.
jackyreis

The Cybersecurity 202: Facebook disclosed a major hack very quickly. But the alert was ... - 0 views

  • The Cybersecurity 202: Facebook disclosed a major hack very quickly. But the alert was short on details.
  • It took just three days for Facebook to notify authorities and the public that  hackers had compromised as many as 50 million user accounts on the social media platform.
  • Facebook leaders did not have enough information to paint a clear picture of the hack and the risk to its users during the announcement.
  • ...12 more annotations...
  • Europe’s new privacy law, the General Data Protection Regulation, imposes massive fines on companies if they don’t notify privacy regulators about a data breach within 72 hours. The rule took effect in May and applies to any company with E.U. customers. U.S. lawmakers have proposed similar a 72-hour rule to replace the patchwork of state data breach laws that exist here
  • The company said Friday it had notified European data privacy regulators of the breach, in accordance with GDPR. Shortly after doing so, Ireland’s Data Protection Commission, the watchdog that monitors Facebook’s GDPR compliance, said Facebook’s disclosure “lacks detail” and criticized the company for being “unable to clarify the nature of the breach and the risk for users at this point.”
  •  Equifax waited six weeks to reveal that the Social Security numbers and other sensitive information on 143 million Americans had been exposed in a data breach. Uber waited a year to reveal a hack affecting tens of millions of drivers — and just last week paid a $148 million settlement in connection with the incident. Yahoo also paid a fine earlier this year for waiting two years to tell investors that Russian hackers stole information on 500 million users. 
  • Wray stressed that cyberattacks and theft of intellectual property can inflict long-term damage on American companies,
  • No country poses a broader, more severe intelligence collection threat than China.
  • The Energy Department on Monday announced awards of up to $28 million to help fund 11 cybersecurity research projects to strengthen the defenses of America's critical energy infrastructure,
  • Karen Evans, the assistant secretary for the department's Office of Cybersecurity, Energy Security, and Emergency Response, said “energy cybersecurity and resilience” is one of the “most important security challenges” that the United States faces.
  • “The frequency, scale, and sophistication of cyber threats have increased and attacks can be much easier to launch,”
  • “Cyber incidents have the potential to interrupt energy services, damage highly specialized equipment and threaten human health and safety.”
  • The Senate Commerce Committee should hear from consumer privacy experts as lawmakers consider whether to develop data privacy legislation, a coalition of consumer and privacy groups said Monday
  • And while civilian agencies generally face the most lopsided age disparities, the importance departments place on building a long-term talent pipeline varies greatly
  • That means federal technologists at or approaching retirement age outnumbered their 20-something counterparts roughly 4.6 to 1.”
  •  
    This article highlights the importance of announcing a security breach quickly, and explains the argument on whether it needs to be carefully analyzed before releasing the breach. It explains the importance of releasing the understanding of a hack as quickly as possible to maintain people's information (i.e. bank information) safe.
mmilian

What Have Hotels Done on Cybersecurity Since the Marriott Hack? - Skift - 0 views

  • Faced with the possibility of such intrusions, hotels are now turning to outside companies to protect their customers’ data
  • Hilton in 2017 had to pay $700,000 to New York and Vermont to resolve two data breaches that resulted in more than 363,000 credit card numbers being compromised.
  • California law that is intended to protect consumers from having their data sold without their consent or knowledge. The law was passed in 2018 after Cambridge Analytica got access to private information from Facebook. The California Consumer Privacy Act goes into effect Jan. 1.
  • ...3 more annotations...
  • “Companies are still struggling somewhat in finding a budget for this effort,” she said. “It’s not something that many businesses want to spend money on. Compliance is pretty thankless.”
  • Hyatt Hotels earlier this year launched a “public bug bounty” program with cybersecurity company HackerOne that allows ethical hackers to test its websites and mobile apps for vulnerabilities.
  • Joe Saracino, CEO of Cino, said that the hotel industry is starting to be more proactive to prevent more breaches.
  •  
    This article talks about Marriott's data breach. It talks about what other companies that have also been affected are doing. California has passed an act that protects guest information. The new law is a bit challenging for smaller businesses that dont typically have any IT onsite.
cleon087

How technology is transforming hotel point-of-sale systems | Hotel Management - 3 views

  • Technology has transformed point of sale into point of experience
  • elf-ordering via their smartphone by the pool or wherever they happen to be and increased guest satisfaction with guest payment
  • Because the staff members have appropriate intelligence readily in their hands, personalization can happen
  • ...21 more annotations...
  • easy to summon service in “non-F&B” areas
  • The card data is processed only by the payment gateway to/from the acquiring bank and only the final transaction approval code is passed to the POS, without the card data
  • The hotel F&B space continues to show growth, with overall consumer spending increasing 4.9 percent in 2017 and showing a robust 5.5-percent annual growth since 2011
  • associated mobile apps have the potential to increase top-line [food-and-beverage] sales in hotels by 5 [percent] to 10 percent without significant costs
  • hotel food-and-beverage revenue per occupied room increased 1.6 percent during 2017. F&B RevPOR reached $105.56, up from $103.93 in 2016, according to STR.
  • POS vendors have moved away from storing card data on their application and network. Many vendors no longer pass through or process any card data on their POS systems. Rather, they link and integrate to certified payment gateways. Payment devices are encrypted and secured, and client card data is always encrypted and totally separated from the POS terminal.
  • Technology is allowing for an extreme and pronounced change in point-of-sale systems
  • Mobile POS provides several benefits for hotels and guests alike. With mobile POS, the speed of service is dramatically increased because the staff can bring mobile ordering directly to guests, anywhere on property
  • POS technology has been a great partner in these efforts by making POS systems easier than ever to use, and mobility plays a role in impacting the increase in consumer spending, Wisell said
  • Call-for-service technology, deployed tableside and in under-serviced areas such as lobbies, coupled with mobile ordering apps, offer hotels an opportunity to increase sales
  • Mobile POS also lays the groundwork for future integration with artificial intelligence or customer-relationship-management systems.
  • “Hotels can spend millions of dollars on a remodel but if they don’t have the right point of experience, it can still result in a one- or two-star rating,” he said.
    • cleon087
       
      This shows that importance of POS, and how it can transform a business for the good or bad.
  • Mobile is now
    • cleon087
       
      People are starting to expect this, they even want more of a variety of different ways to pay that can be determining if you get business or not.
  • Hinojosa said
    • cleon087
       
      Were always looking for a way to make the experience more personalized and this is one way.
  • with
    • cleon087
       
      When guest get their food quicker and accurately this helps the experience and revenue.
  • they are the face of the property
  • u recognize them and are honored they are here with you again.”
  • “Whenever a guest is seated in the lobby and wants a take-away coffee, they can order one and not only when a staff member notices the guest in a restaurant,
    • cleon087
       
      This is really good because it is hard as a front desk agent to give attention to the guest since the moment they step in but with this they can request their snack or drink that they want.
  • While there is interest in the potential of AI and chatbots for roomservice and self-service ordering, these are not yet ready for a widespread rollout at this time, Wisell said.  
  • “Data scientists can be used in the back of the house on the kitchen side, too—optimizing the production line,” he said. “Looking at the analytics behind the performance will reduce the wait times in the front of the house.”
    • cleon087
       
      This will optimize performance
  • hotels don’t want to cross the line into creepy.
  •  
    Mobile POS has boosted F&B growth due to the ability to complete sales much faster and from non-F&B serviced areas of the property. The mobility contributes greatly to the increase in customer spending. With this mobility, companies must ensure compliance with PCI standards, and ensure that no credit card information is stored directly on the POS terminal. The article also touches on the subject of tokenization, and the usage of technology to secure a "token" rather than actual card data aids in reducing security risks.
  • ...4 more comments...
  •  
    This article was about how technology has had a great influence on point of sale systems within the hospitality industry. According to a senior director of product manager at Agilysys, Mike Hinojosa, he states that technology has transformed point of sale into point of experience. I personally agree with this because lately I expect hotels to have the latest in technology when it comes to POS and when I encounter a poor POS I automatically think they lack in providing the best for their guests. This article talks a lot about how mobile POS provide benefits for both parties and how it has increased guest satisfaction. "With mobile POS, the speed of service is dramatically increased because the staff can bring mobile ordering directly to guests, anywhere on property." According to this article, POS systems help boost F&B spending growth and they have become more secure throughout the years. "The hotel F&B space continues to show growth, with overall consumer spending increasing 4.9 percent in 2017 and showing a robust 5.5-percent annual growth since 2011, according to Technomic". It's said that mobile POS has helped F&B growth because it gives users the ability to into quicker sales and in different areas throughout the properties. For example, a waiter walking around a pool taking orders instead of having the guests walk to the poolside bar to place an order. Collecting payment has also become safer and easier with POS systems because of the PCI standards.
  •  
    Technology is allowing for an extreme and pronounced change in point-of-sale systems. The speed of service for the guest in a hotel has dramatically went up because of point of scale systems. It is more convenient and quicker for guests to get things or to order things.
  •  
    This article is about the employment of technology in the hospitality industry.
  •  
    This article is about how technology is transforming the POS experience by providing a more advanced security solution and a mobile platform. The article highlights how this new technology supports both the client and staff experience. The technology also provides a financial benefit in increasing sales by 5% and reducing cost by 10%.
  •  
    POS Technology has developed majorly over the past years. Growing developing offering mobile devices that can help workers pace themselves and generate more sales. These programs also offer extra data security to protect the clients information against fraud. This device is perfect for sport arenas, bar, golf course and more open outdoor and large venues that cater to voluminous crowds.
  •  
    This article is about the benefits of technology in POS systems. It shows how the technology can personalize the experience of the guest by having them be able to order from the moment they step into the lobby. The article also discusses how all the technology is good but in the hospitality we are walking on a fine line that we don't want to cross to creepy with biometrics. Technology offers efficiency in speed and will give a better experience. Not only this but it talks about how POS is becoming more secure, and how people want to pay in different ways.
« First ‹ Previous 121 - 140 of 159 Next ›
Showing 20 items per page