Skip to main content

Home/ Hospitality Technology/ Group items tagged concerns

Rss Feed Group items tagged

Gabriela Moreno

5 pressing hotel security concerns for 2012 - 2 views

  • areas of top concern for 2012, the usual suspects still top the list: information-technology breaches and terrorism, hoteliers said.
  • 1. IT
  • 2. Terrorism
  • ...9 more annotations...
  • 5. Security as taboo
  • 3. Skimmers
  • 4. Liability and insurance fraud
  • A related threat is that of “skimmers,” or devices that catch credit card numbers when consumers use them for payment. The problem primarily is contained to the restaurant industry, but Callaghan is concerned it could spread to hotels.
  • Ironically, one of the main reasons terrorism tops the list is because it has become less of an issue in recent years, sources said.
  • “The greatest business risk, as I see it … is insurance fraud. And it’s the most expensive,” he said.
  • The hot-button issue within the realm of hotel-information technology is mobile and cloud technology.
  • “Liability” as a general label refers to hoteliers being held liable for the acts, which are often criminal, of third parties, the AH&LA’s Callaghan said.
  • “Security” still is something of a taboo in the global hotel industry, said Paul Moxness VP for corporate safety and security at The Rezidor Hotel Group, a Brussels-based hotel management company, with more than 400 hotels and nearly 90,000 rooms in its portfolio.
  •  
    1. IT The hot-button issue within the realm of hotel-information technology is mobile and cloud technology.A company could have tens of thousands of smartphones or laptops in the field at any given point-each a potential gateway to hackers and other criminals. To the problem the core principle is to provide end-to-end data protection with looking at cost and benefit and how it's supports the business. 2. Terrorism Ironically, one of the main reasons terrorism tops the list is because it has become less of an issue in recent years.Hoteliers need to keep their staffs and travelers mindful of possible threats, but they don't want to scare them. 3. Skimmers A related threat is that of "skimmers," or devices that catch credit card numbers when consumers use them for payment.The best prevention measure is to have an investigative team or third party on hand and making that known to employees. 4. Liability and insurance fraud These two related issues can double, triple, quadruple and quintuple corporate insurance premiums in the blink of an eye. The advisement is hoteliers to educate themselves on the issue, consulting with an attorney, if necessary. 5. Security as taboo "Security" still is something of a taboo in the global hotel industry.Hoteliers need to do a better job of "turning on the light" by talking about security openly and regularly at staff and association meetings, and hotel executives should insist their GMs make security a priority
  • ...9 more comments...
  •  
    The first security matter that is brought up in this article is the cloud computing mobile devices on cell phones and laptops. With each device its own danger center of being hacked into a company's systems. The second point is "terrorists." Even though there has not been an issue with terrorists for about 10 years now it is still a big issue. According to the article companies are slacking on being vigilant because of the lack of activity.The third is what are know as skimmers, they are devices that gather information like credit card numbers.The last two issues are liability and security itself. Hotels claim to have security matters under control but when it comes to it, it is for show. Hotels need to buckle down on their security measures.
  •  
    "Terrorism and information technology breaches are familiar areas of concern on hotel security professionals' 2012 to-do lists."
  •  
    This article talked about five important hotel security concerns in 2012. As more and more new technology applied in the hospitality industry, IT professionals now face with challenges and risks associated with the new technology. When asked for the areas of top concern for 2012, hoteliers consider the usual suspects still top the list: information-technology breaches and terrorism. Hoteliers interviewed for this report recommended focusing on t five areas during 2012. The first concern is IT. The hot-button issue within the realm of hotel-information technology is mobile and cloud technology. Hotels have to protect data and information, especially the financial data. The second concern is Terrorism. Hoteliers need to keep their staffs and travelers mindful of possible threats, but they don't want to scare them. Thirdly, a related threat is that of "skimmers," or devices that catch credit card numbers when consumers use them for payment. The problem primarily is contained to the restaurant industry, but it could spread to hotels. The forth is Liability and insurance fraud. These two related issues can double, triple, quadruple and quintuple corporate insurance premiums in the blink of an eye. The fifth concern: Security as taboo. "Security" still is something of a taboo in the global hotel industry. Hoteliers need to do a better job of "turning on the light" by talking about security openly and regularly at staff and association meetings
  •  
    In the top 5 hotel security concerns, number 1 is IT Security. Many businesses now are working off of laptops and smartphones which is making it easier for hackers to get in to and steal information. The same goes for hotels which are becoming more hands-free, eco-friendly which is working off of computers. The hotel industries are spending more and more money on making sure that they are secure from any hackers logging in to their computers to get their guests information.
  •  
    When thinking about hotel security we do not necessarily jump to anything other than terrorism or things like that but in this article it talks about five different things that can be issues in hotel security. IT is a large issue due to mobile and cloud technology. There are so many devices used that it is easy for hackers to get in the system. Terrorism is of course an issue even though it is not so prominent as it has been in the past. Skimmers are becoming more popular in hotels and restaurants having someone working on the inside who swipes the credit card though a machine before processing the payment to take all of the information off of it. Liability and Insurance Fraud can be something as little as stubbing a toe to a large workers comp case. This is the most expensive security issue hotels face. Security is still taboo in hotels because it scares some guests but at the same time once one thing happens all of the bad things will happen. If nothing happens than it will stay like that.
  •  
    This article makes great points that we do not think about as normal people. Before taking this class I would never think of all of these issues that could be happening to me while at a hotel or restaurant but anything is possible.
  •  
    This article really made me think outside the box in order to enhance security, specially when in regards to IT, skimmers and liability/insurance fraud. All too common are people looking for ways to beat the system, we hear about it constantly but don't pay attention. From worker claiming worker's comp, foreign fingers and hazardous items in food, to Publix's ATM being the victims of attached skimmers and hackers attacking sensitive information transmitted by the world wide web. The best solution is to be proactive with training and technology and the benefits of being ahead of the curve.
  •  
    Great Article...hotel security is so important not only for the company but also for its stakeholders and consumers. It is the responsibility of the company to ensure that the correct steps are in placed to ensure guests and company information is secure. At my current job, it is my responsibility to ensure that employees are not utilizing credit card devices to catch customer's credit card information. We also address any possible theft concerns with the employees to ensure these issues are avoided.
  •  
    Great Article- There are so many security issues that we usually don't think about on a daily bases and this article highlights them well. Terrorism is something that has become rather laxed over the the last five years and usually the last security concern in the hospitality industry instead of the first that we process as a true risk. Concerns should also be focus on liability and insurance fraud from both guest as well as employees; a slip and fall and bed bugs can result in costly lawsuits.
  •  
    1. ITAccording to the article, most mobile devices that are used for business are unprotected. Meaning that the devices if the device even have a password and if it does the password is not very complex. There could be thousands of employees accessing company information via the cloud through unprotected smart phones or other mobile devices. This could organizations at risk to hackers and other criminals  2.  TerrorismAlthough terrorist threats are less of a concern nowadays, that does not mean hotel managers should discontinue stressing the importance of security within their establishments. Keeping employees aware and diligent can prove to be a delicate assignment but it is a necessary of part of maintaining a safe work environment in the twenty-first century. 3.  SkimmersSkimmers are devices that steal credit card numbers when consumers use them for payment. Unfortunately, it is most commonly an employee on the inside who is committing the crime.  A third party investigation team will be needed to prove who is stealing from the establishment.  4. Liability and Insurance FraudCombined, these two issues could sky rocket a company's insurance costs through the roof. It is crucial that hoteliers be aware of the legal system and educates themselves on issues concerning liability. Both patrons and employees alike could potentially file claims against an establishment and entitlements can quickly get out of hand.    5.  SecurityDespite the best security measures, there is always the possibility of unforeseen danger. This fear of the unknown is a concern for hotel workers. To confront this fear of the unknown managers must regularly and openly discuss security with employees.  Security should be held as a top priority. 
  •  
    This article discusses five main concerns brought on by the current state of hotel security. I must say that some of this information surprised me. Something that especially surprised me was learning that mobile devices that are used for business hardly use passwords. The article states, "Amplifying the problem is the sheer number of devices, he added. A company could have tens of thousands of smartphones or laptops in the field at any given point-each a potential gateway to hackers and other criminals." This piece of information is very unsettling to me. How could such valuable information not be protected? The article suggests the solution to this problem is PCI DSS. Terrorism as number two on this list also surprised me because that is not something that would first come to mind for me. The article states that it is ironically on the list for becoming less of an issue. I suppose this reminds hoteliers to never let their guard down when it comes to issues of safety and security within the hotel. However, "skimmers" and liability on this list does not really surprise me. The article suggests that hoteliers be educated about these issues to protect the hotel against them.
Katie Gallagher

5 pressing hotel security concerns for 2012 - 0 views

  •  
    This article was all about the hotel security concerns for 2012. The 5 things the article lists as issues are: IT, terrorism, skimmers, liability and insurance fraud, and finally security as taboo. IT in a concern for hotel security because mobile and cloud technology is becoming very popular. Companies that do not protect their information with passwords are even more at risk. Data protection needs to include end to end management so companies are not just patching the security. Terrorism is another issue that was a concern in 2012. Hotels need to keep staff and travelers knowledgeable about possible threats, but in a way that does not scare them. Campaigns were placed in airports to educate travelers about notifying security upon seeing something suspicious. Another thing that hotel security should be concerned about is skimming. Skimming is a device that catches credit card numbers. Usually there is a need for an inside man for this type of threat. These people usually aren't criminals, but opportunists. Prevention of this in your hotel could be to hire an investigative team man making that known to the employees. This will keep honest people honest. Insurance fraud is one of the greatest business risks and it's the most expensive. Claims could be as small as a guest seeking a free room for stubbing his toe to a drawn out worker's compensation case. Liability is the label that hoteliers are held liable for criminal acts of a third party. Hoteliers should properly educate themselves on these issues and consulting an attorney if necessary. The final issue is security as a taboo. Security should become a part of day to day operations and hoteliers will be better able to address it. Hotel executives should insist their GM's make security a priority. This article was written for the year 2012. I still think that all these issues are relevant in 2013.
Krystal Jost

Keycard hacker picks locks, exposes gap in hotel security - Travel Kit on NBCNews.com - 0 views

  • Last week, the self-described hacker/music aficionado demonstrated a homemade gadget that could conceivably unlock millions of hotel-room doors around the world.
  • Brocious followed up his demonstration by publishing a how-to paper that may inspire other hackers to try their hand at entering guests’ rooms without their knowledge or consent.
  • most hotel crimes are crimes of opportunity where crooks take advantage of guests’ inattention.
  •  
    Almost everyone has recently heard of Cody Brocious and his gadget that was implemented and utilized to unlock guest room doors in Onity locking systems. This issue has been recently broadcasted all over the news and has gained the awareness of millions of people, making travelers panic when staying in hotels, and questioning their safety and security. The truth is, behind the issue at hand, travelers have been utilizing hotels and other establishments without being concerned or conscious of their safety, and with some negligence, and lack of attention, they put themselves at risk in numerous different ways. Although Brocious' invention gained the attention of the public, and although he went out of his way to be sure that other hackers out there knew how to replicate the system and how to utilize it to their advantage, enabling hackers to enter guest rooms and steal their personal belongings without their permission, or potentially cause physical harm to a traveler as well. Stated in this article, according to Forbes, the gadget that Brocious invented has proven inconsistent in its effectiveness. That is not to say that it could not eventually be improved, but with the changing in technology, and now the gained awareness, hotels are focusing more intently on ensuring guest security through their technological outlets. Technology affects many aspects of a hotel guest's security - from internet access to credit card information, along with guest room locks and personal identity. The article also suggests numerous ideas for how guests can avoid a lot of problems with their safety in mind, including using secondary security systems on their door, ensuring closure of the room door when leaving he room, as well as never keeping your room number written down with your key. The article also focuses on how utilizing your energy to ensure that your belongings are safe in your room as you would in your own home, is energy more well spent than being concerned about someone
Kevona Richardson

5 pressing hotel security concerns for 2012 - 0 views

  • Anticipating risk in the hotel security field is an imprecise art—one that’s grown increasingly difficult with the introduction of new technologies, regulations and global threats.
  • “In general most mobile devices that are used for business remain unprotected, including lack of any password, let alone a complex password,” said Anthony Roman, founder and CEO of Lynbrook, New York-based hotel security company Roman & Associates.
  • Ironically, one of the main reasons terrorism tops the list is because it has become less of an issue in recent years, sources said.
  • ...2 more annotations...
  • A related threat is that of “skimmers,” or devices that catch credit card numbers when consumers use them for payment. The problem primarily is contained to the restaurant industry, but Callaghan is concerned it could spread to hotels.
  • “Security” still is something of a taboo in the global hotel industry, said Paul Moxness VP for corporate safety and security at The Rezidor Hotel Group, a Brussels-based hotel management company, with more than 400 hotels and nearly 90,000 rooms in its portfolio.
  •  
    The article mainly talks about the security concerns that hotels are facing in the industry today more than ever. The risk in hotel security is increasingly difficult with new technologies, regulations and global threats. I think its important because as some of us being future managers we need tro be aware of the security concerns that we are facing.
LU DENG

Six questions hoteliers should ask providers of cloud-based systems | Tnooz - 0 views

  • Cloud/SaaS can bring many advantages over on-premise solutions for hoteliers. Among them: Conversion of CapEx (capital expenditure) to OpEx (operational expenditure); Access to the latest version without the pain often associated with upgrades; Removal of the burden of application and infrastructure management; and Potential for heightened security beyond internal capabilities.
  • 1. Is it really cloud?
  • In addition, the cloud is being used by the federal government and financial institutions, both of which likely have stricter, more complicated regulatory requirements than most hotels.
  • ...6 more annotations...
  • But in evaluating whether to choose a cloud/SaaS solution over on premise you also need to do an honest evaluation of your own IT organization’s ability to manage your infrastructure. Google’s cloud-based Gmail service offers 99.984% availability, which is 46 times better than the average Microsoft Exchange implementation.
  • 2. Do you have Service Level Agreements on RTO/RPO?
  • 3. What are the availability SLAs?
  • 4. Is there an offline mode?
  • 5. What about integration?
  • 6. How can I get my data back out?
  •  
    Cloud computing is becoming more and more popular in today's business world. What are the main advantages that cloud computing can bring to Hospitality industry? Through the article I found the answer which are also the concerns of hoteliers that are a lower cost and a higher security environment. For instance hotel companies can be access to the latest version of what they are using without paying too much to buy related software. Secondly since the cloud is being used by federal government and financial institution which have higher level of regulatory requirements than most hotels, hotel companies can feel more safety in applying this high-tech in their business. But nothing is perfect. The author mentioned in this article that before we choose cloud service, we should get to know some information about the hospitality software suppliers. As for me I concerned about whether they have an offline mode which can continue the business activities for a while when the internet disconnection happens. For example how could hotels make sure the check-in, check-out, and reservation activities go on successfully when something wrong with the internet. The second concern for me is how could I get my data back if I discontinue my service in certain provider. Hoteliers should have ways to protect their data and other business activities. Cloud computing is developing very quickly and it will benefit us a lot only when we get to know the right way to use it. 
noreen1

Security and technology coming together for locks in 2015 | Hotel Management - 0 views

  • Many electronic lock manufacturers strongly recommend evaluating and focusing more on security if a hotel is making the move to mobile access locks.
  • “Poor implementation can be a risk,”
  • “Whenever a new layer of technology is added, security needs to be increased as well.”
  • ...2 more annotations...
  • The security of a mobile door lock is part of a larger challenge of guest security as hoteliers have access to more guest data.
  • Mrowczynski cautions hoteliers to increase security at the back-end of the hotel—employees can be a threat to security with mobile technology as well. He also said every room lock should be bench-tested. “As long as everything is researched, tested and retested, everyone will be fine,” he said.
  •  
    This article serves as a good reminder that as hotels adopt certain technologies to enhance the guest experience, it is also important to remember to test and retest these new technologies for possible security concerns. The thought of being able to open your hotel room door with your cell phone is appealing and convenient, but also comes with some security concerns that traditional key cards do not. On the other hand, some argue that RFID chips would actually make door locks more secure, and make it easier to track who enters the hotel room and when. Either way, security concerns always have to be considered when adopting new technologies.
ldevaul

How the travel industry can fight back against cyberthreats | SmartBrief - 1 views

  • Travel and hospitality businesses have become lucrative targets in recent years for cybercriminals who have stolen from the industries in attacks that often take more than half a year to identify.
  • In the past three years alone, the hotel industry has faced 13 serious attacks, according to an IntSights study.
  • The travel and leisure sectors suffered a 155.9% year-over-year rise in suspected online fraud attempts worldwide in the second quarter, according to a TransUnion study, compared with a 16.5% increase in overall alleged intrusions.
  • ...21 more annotations...
  • The hotel industry attracts cybercriminals because it handles so many financial transactions in so many countries.
  • The top threat to hotels is phishing, a scam in which hotel guests may receive fake phone calls claiming to be from the front desk. The caller could claim that there is an issue with the credit card on file and that they need to re-verify the payment method. 
  • DarkHotel hacks are another significant threat. These target travelers via hotel Wi-Fi. Digital certificates are sent to guests, like a familiar adobe update, which will retrieve sensitive information. Hotel chains are combating these hacks by suggesting that guests use a virtual private network.
  • Malware (malicious software) is something criminals email employees, under the guise of the attachment or link looking innocent or legitimate. But when the user opens the file or clicks on the link, their system (and more) can be hacked into by the criminal.
  • IT department should routinely update operating systems and back up data and files, and every employee should double-check sources when asked for software administrative permissions. Also, strong firewalls can limit bad traffic and provide security. 
  • Software and hardware can help prevent breaches, but employee training is also an essential part of any hotel’s cybersecurity.
  • In 2018, a Marriott reservation system was hacked. More than 500 million customer records, including credit card information and passport numbers, were stolen. The company said the hack went back four years prior to the discovery and, when it was noticed, the company started using computer and mobile device monitoring software.
  • “Guests can enroll in a service called WebWatcher, which monitors the sites where personal information may be shared and alerts guests if evidence of their personal data is found,”
  • Hotels are not alone in being targeted by cybercriminals: The airline industry has faced serious cyberattacks as well, and many airlines still aren’t equipped to handle them.
  • only around 35% of airlines and 30% of airports are prepared for cyberattacks.
  • "The proliferated effect of the attack on SITA is yet another example of how vulnerable organizations can be solely on the basis of their connections to third-party vendors,"
  • The aviation industry faces dangers such as ransomware and distributed-denial-of-service attacks. Following the SITA attack, HackerOne solutions architect Shlomie Liberow stressed that airlines need to prepare for the worst. 
  • traditional enterprises like airlines have always been an attractive target since few are digital-first businesses, and therefore have relied on legacy software, which is more likely to be out-of-date or have existing vulnerabilities that can be exploited."
  • The airline industry needs to keep third-party vendors in check when it comes to protecting information. Given the high stakes involved, experts suggest that blind trust is not an option. 
  • “You simply cannot know whether your third parties meet your company’s security controls and risk appetite until you’ve completed a full vendor security assessment on them,
  • It’s important to note that the best practice is not a ‘one-and-done’ activity, but through real-time, continuous monitoring.”
  • In 2015, hackers targeted Polish airline LOT’s ground operations system, affecting 1,400 passengers. The hackers made it impossible to create flight plans and flights. It was the first attack of its kind, and it caused concern about cyberattacks one day remotely taking control of planes.
  • To address the threat, the standard advice is to back up and store data in multiple places, including off your physical premises, and have one copy of it be offline
  • Multifactor authentication and long, complicated passwords will take longer to crack. Updating and patching systems regularly helps companies avoid being victimized when a new exploit is discovered.
  • Treating cybersecurity as a companywide concern, not an IT concern, encourages each employee to take ownership of their actions and knowledge and to seek help proactively instead of making an “innocent” mistake that costs the company millions of dollars.
  • Finally, companies should avoid simply throwing money at the problem: Not all cybersecurity solutions work together, which wastes money and increases the risk of a breach.
  •  
    This article discusses ways that the travel industry can combat cyberthreats. The main cyber concern for hotels' is phishing, which is a scam that collects credit card information by pretending to be apart of a hotel's front desk staff. The article mentions that IT departments should do routinely updates to operating systems and back up data and files. Employees should also be trained to help prevent data breaches. The author briefly touched on what to do when your hotel system is hacked and even dives into how the airline industry is still very unequipped to handle cyberattacks and threats. This is a great read to learn how to keep up with best security practices in the hospitality and tourism industry.
Danelkis Serra

Agents fear new GDS flight standard will lead to customer poaching - 0 views

  • fearful that a new industry standard
  • will expose commercially sensitive information
  • New Distribution Capability Standards
  • ...22 more annotations...
  • at least one pilot scheme for the NDC would be up and running later this year
  • NDC is a common standard to enable airlines to provide more detailed information about their flights and ancillary products on global distributions systems and to allow customers to search for flights using a range of criteria, not just price
  • enable third parties to compare fares from all carriers
  • airlines to sell all their ancillary products
  • rovide more information about their customers
  • "pro-competition and pro-consumer"
  • customers
  • more choice
  • lower fares
  • airlines to tailor offers to passengers
  • NDC is not a system but a standard, which will allow airlines to sell via GDS in the same way that they sell on their websites.
  • concerned
  • agents
  • uncomfortable with the idea of a centrally controlled system with information available to all users
  • rival
  • to compete
  • American Society of Travel Agents was opposed to NDC due to a lack of information
  • "Data is the new oil." she said. "You are rich with the data you have.
  • "Agents should not give data away for nothing."
  • representatives from Sabre, Travelport and Amadeus who attended the conference all said they had reservations
  • about NDC and none of them believed it was necessary to develop a common standard.
  • 'understanding the distribution model of the future', it had left him confused."I've got more questions than answers
  •  
    I must admit, I stand along with Alasdair Chalmers MD of DP&L Travel; I am left confused and have more questions than answers. I do not understand the goal and/or reason of the NDS standard.  The article states that it is not a system, but a standard for airlines to provide more detailed information about flights and products on the GDSs.  Benefitting customers with more search options, choices and lower fares.   It raises the controversy of agents being concerned with data availability and feeling uncomfortable with a centrally controlled information....  I think I am missing a big piece because I do not exactly understand what the concern is. I'll need to think about this and reassess....   please share your comments and clarity!   
yiran DING

The Pros and Cons of Cloud Computing for Hotels - 0 views

  • starters, automatic scaling can make people extremely lazy. If you’re not paying attention to your usage, you just might get a huge surprise on your next bill. One thing that’s a rising concern is that hackers can run up their victims’ hosting bills. One method that’s being used by hackers is a simple low-level DDoS (Distributed Denial of Service), which won’t take your site down but will keep your server very busy. Since you pay for usage with cloud hosting, your costs can spin wildly out of control. So if you’re using cloud hosting, make sure to pay daily attention to your usage.
  • Your data might not be cloud-worthy. By all means, don't put an application that provides competitive advantage or contains customer-sensitive information in the public cloud. Your application could be too big to scale. The bigger you are, the bigger your IT resource pool. And the bigger your IT resource pool, the less likely it is you'll see any enormous financial advantage in outsourcing to the cloud.
  • Every cloud computing service provider you come across will promise to deliver your demanded services. However, the reality is they provide different levels of quality and services when it comes to actually installing them. Thus, finding a reliable service provider is a tiring and time-consuming job.
  • ...1 more annotation...
  • The Pros and Cons of Cloud Computing for Hotels
  •  
    This article lists pros and cons of Cloud Computing for Hotels. What is surprising is that Cloud Computing can be costly as opposed to the common belief that Cloud Computing is a great cost saver. According to this article, if your IT resource pool is too big, it is less likely that you'll see any enormous financial advantage in outsourcing to the cloud. In addition, there is a method being used by hackers to increase your Cloud usage significantly and make you end up paying a lot for it. The method is called DDoS(Distributed Denial of Service). Even a low-level of this can keep your server busy and give you an enormous bill. Sure, these problems can be prevented and benefits of Cloud Computing can outweigh them. However, this technology is quite new, you need to think strategically before you pounce on  it.
  •  
    This article introduced the result of a survey for the adaptation of cloud computing global wise. 68% of the global organizations want to adapt this new tech but 51% have concerns that their old system may not be enough for the adaptation.  Then the article describes the pros and cons with cloud computing and solutions for hoteliers.  The pros are : no need to buy many expensive hardware, lower maintenance expense and software installing and updating fee, Cons: security, which is the biggest concern, redundancy, and other things. 
avila031

3 Reasons Why Payment Security Should be the #1 Concern at Your Hotel - 1 views

  • the hospitality industry is the number 1 target for cyber criminals.
  • you are a potential target for hackers.
  • Most breaches in hospitality target the POS (91%), but other targets can include reservations procedures and unsecure integrations between software applications.
  • ...2 more annotations...
  • Experiencing a data breach could cost your hotel an excess of $5 million dollars.
  • These are three simple reasons why payment security should be a top concern at your hotel. There are ways to minimize, or even eliminate, the risk of data breaches. First, make payment security a priority for every department of your hotel, not just the IT department. Ensure that all employees understand the risks involved with improper handling of credit cards through training and education.
  •  
    Although the article title says three reasons why payment security should be the number one concern at your hotel it goes into much more detail than three reasons. It truly explains all of the reasons to take PCI seriously. The hospitality industry is the number one target, it can cost you millions of dollars, most breaches occur in the pos system one of the most common systems in the hospitality industry. It also provides suggested solutions such as making sure not just IT is in charge of security, properly training staff, use encryption software, and staying educated on the subject.
dtrak002

Vegas hotel room checks raise concerns at Def Con, Black Hat | CSO Online - 0 views

  • The October 2017 mass shooting in Las Vegas involving a guest at the Mandalay Bay Resort and Casino led to new policies at Caesars Entertainment hotels, one of which includes disregarding guests' Do Not Disturb signs and checking the room once every 24 hours
  • “The checks involve only a visual review of the bedroom, bathroom and additional sitting area (if any) to ensure there are no issues which require further attention.
  • hotel security officers showed nothing to verify their identify
  • ...2 more annotations...
  • went so far as to confiscate items, and some claim they even riffled through their bags
  • some folks said they aren’t going back to the conferences if they are held in Las Vegas.
  •  
    This article illustrates the various changes in security protocols. Due to the 2017 mass shooting in Las Vegas, hotels such as the Caesars are implementing new policies, including disregarding guests' "Do Not Disturb" signs and checking the rooms once every 24 hours. Despite the policy stating that the hotel will only check visually the bedroom and bathroom, guests have complained that hotel officials have photographed and filmed their rooms and came in when they are dressing. In addition, the most alarming news is the guests complain that the hotel officials that barge in won't provide any identification and the guests have no way to call the front desk to ensure the hotel officials are who they say they are. For men it's a concern for privacy, for women it's a concern for safety. Even more of a concern, Katie Moussouris, CEO of Luta Security, claimed that hotel officials said they will share the photos on their Snapchat. Many guests have stated they will no longer return to Las Vegas for conferences.
tashaemunnings

Why the Adoption of Biometrics Will Rise - TheStreet - 0 views

  • Biometrics allows for automated check-in and re-check-in at any venue
  • The adoption of using consumer fingerprints or their faces instead of tickets comes with its risks.
  • "Biometrics is a double-edged sword when it comes to security," he said. "On the one hand, it’s a better and more reliable way to secure your identity or account, rather than having to remember a password and passwords get hacked all the time. Even two-factor authentication is proving to be much more vulnerable than many people thought."
  • ...7 more annotations...
  • Another concern is that biometrics could also contain information about your health and genetics.
  • "The good news is that biometric data theft still has only a limited real-world potential, since it’s not easy to spoof somebody’s biometrics, although it is possible
  • comes
  • Several hospitality venues have already started using facial recognition, including cruise ships
  • Some cruise ships take a photo of passengers at embarkation and that data is used from contact tracing to selling consumers photos they appear in and ensuring everyone disembarks at the end of the journey.
  • "Hotels likewise have experimented, with Marriott planning to eventually use facial recognition across all their properties."
  • "This is easier and more cost effective than other forms of authentication, it allows for greater efficiencies and it’s better at preventing fraud,
  •  
    Using biometrics to allow people access to events and keep track of their whereabouts is becoming more and more common across several industries including hospitality. Although seemingly helpful and more efficient that regular tickets or keys, there also seem to be concerns about the security. However, many believe that although these concerns exist, the use of biometrics is one of the safest verification routes currently.
emilywest5

Big data and analytics in tourism and hospitality: opportunities and risks - ProQuest - 0 views

  • The purpose of this paper is to examine and provide insights into one of the most influential technologies impacting the tourism and hospitality industry over the next five years, i.e. big data and analytics. It reflects on both opportunities and risks that such technological advances create for both consumers and tourism organisations, highlighting the importance of data governance and processes for effective and ethical data management in both tourism and hospitality
  • This paper identifies and examines key opportunities and risks posed by the rising technological trend of big data and analytics in tourism and hospitality. While big data is generally regarded as beneficial to tourism and hospitality organisations, there are extensively held ethical, privacy and security concerns about it. Therefore, the paper is making the case for more research on data governance and data ethics in tourism and hospitality and posits that to successfully use data for competitive advantage, tourism and hospitality organisations need to solely expand compliance-based data governance frameworks to frameworks that include more effective privacy and ethics data solutions.
  • Technology (and its rapid development) is one of the key megatrends and driving forces that are seen to shape the future of tourism (Yeoman, 2012, 2018; Yeoman and McMahon-Beattie, 2018) via changes that will impact the way tourism and hospitality providers interact with travellers.
  • ...15 more annotations...
  • A recent business report on key megatrends and market disruptors suggests that technology and new ways of engaging and interacting with customers are fuelling the rate of disruption as currently businesses are able to reach new customers in new ways and can reinvent customer engagement around service and convenience (Boumphrey, 2019).
  • One of the most important uses of data is to improve personalisation, travel companies using the information they gather to make specific adjustments to their offerings.
  • Currently, considerable amount of structured and unstructured data are produced globally (Nunan and Di Domenico, 2013; Verdino, 2013), a so-called “digital exhaust” (Wang, 2013; Barocas and Nissenbaum, 2014) that is passively generated by users of products and services using mobile devices (Shilton, 2009), an abundance of publicly available data shared on social networking platforms (Nov et al., 2010) and customer data and information purposely collected by tourism organisations’ booking systems or customer relations management (CRM) systems
  • This abundance of data and the act of processing data on a large scale has led to the concept of “Big Data,” which Mayer-Schönberger and Cukier (2013) define as “things one can do at a large scale that cannot be done at a smaller one, to extract new insights or create new forms of value, in ways that change markets, organisations, the relationship between citizens and governments, and more” (p. 6
  • ndeed, one of the latest Euromonitor International travel industry reports confirms that big data and analytics is expected to be the most influential technology impacting the industry in the next five years (Bremmer, 2019), followed by artificial intelligence and the Internet of Things.
  • The use of data is viewed as a disruptive innovation in the tourism and hospitality industry, although it allows organisations in the industry to facilitate personalisation, offer convenience, save costs and overall gain competitive advantage (Evans, 2020).
  • Not surprisingly, privacy is now the top data issue and concern for organisations
  • In particular, in the tourism and hospitality sector, the effective use of big data is associated with revenue management (e.g. using and combining internal data, such as occupancy rates and current bookings, with external data such as information about local events, school holidays and flight information to forecast demand and maximise revenues); market research and strategic marketing purposes (e.g. identifying customer trends to best cater marketing opportunities); customer experience and reputation management (e.g. social media conversations and online reviews, service usage data and internal feedback via customer surveys). A good example of an organisation that successfully uses big data to gain competitive advantage is AirBnB (Evans, 2020; Guttentag, 2019).
  • These concerns have been intensified by recent global cyber-attacks and more specifically by significant data breaches in a wide range of industries and sectors, including the tourism and hospitality industry (Armerding, 2018; PwC, 2016, 2017). The hospitality industry is now in the media spotlight because of high profile breaches (PwC, 2016, 2017).
  • One of the biggest data breaches of the 21st century has affected one of the largest hospitality companies, Marriott International. Starting in 2014, the data breach occurred on systems supporting Starwood hotel brands, which were acquired by Marriott in 2016 and affected ∼500 million customers worldwide, with the breach only being discovered in September 2018. Data and information on names, contact information, passport numbers, travel information and other personal information were compromised, and information on credit card numbers and expiration dates of more than 100 million customers was stolen (Armerding, 2018).
  • Indeed, the 2018 Global State of Enterprise Analytics survey found that globally 49 per cent of companies surveyed believed that the primary challenges organisations most commonly face are data privacy and security concerns (MicroStrategy, 2018). Similarly, another recent industry report shows that over 40 per cent of tourism industry professionals claimed that data privacy and cybersecurity are one of the most influential factors impacting digital commerce in this sector (Bremmer, 2019).
  • These technological advances provide significant opportunities for businesses to harness the wealth of data to support their activities and gain competitive advantage. The efficient uses of data and analytics drive process and cost efficiencies and strategy and change (MicroStrategy, 2018).
  • When selecting analytics solutions, tourism and hospitality organisations are required to address the growing concerns around privacy and security of customer data by putting in place well-designed data governance frameworks capable of providing quality data and be able to provide effective frameworks of data security and protection for all stakeholders
  • Potential frameworks for ethical data management and digital privacy specific to tourism and hospitality would need to identify, in addition to the protections afforded under the recent General Data Protection Regulation (GDPR) (ICO, 2018), how data is collected, what it is used for and who has access to it and why
  • Big data and analytics are playing a crucial role in digital transformation efforts of organisations in general and in the tourism and hospitality industry, thus driving greater effectiveness and efficiency and the strategy to define new business models and bring about successful change (Evans, 2020; MicroStrategy, 2018)
  •  
    This was about the risks in the hospitality and tourism industry when it comes to big data and analytics. Big data is so important in the hospitality industry because it's how companies know who to cater to and with what and how. In addition to the importance of big data, there are risks that come with it. A few risks are data leaks, hackers, etc. Companies invest money in their systems so these things are avoided.
sosor012

Why we care about location marketing - 0 views

  • tailor marketing messages at the granular level, based on where your consumers are, in real time
  • you could send a discount offer on a product or service by text message when a customer enters a pre-defined location
  • Delivering offers to target customers is the key benefit of location-based marketing.
  • ...11 more annotations...
  • . Advertising on mobile devices captured the largest share of digital advertising in 2022 at $34 billion. (Overall, spend on digital marketing was a staggering $77 billion.)
  • Location-based marketing (or “proximity marketing”) delivers ads and offers to potential buyers based on their location. There are two ways to identify the locations of potential buyers: 
  • three primary methods of location-based marketing
  • Location-based marketing works best for brands or businesses with retail locations
  • location-based marketing lets marketers to deliver highly targeted messages that reach consumers as they go about their daily activities. 
  • Geofencing: Reach them where they are
  • Geotargeting: Reach them where they’ve been
  • Geoconquesting: Get them to go somewhere else
  • increase foot traffic and improve customer experience,
  • boost customer retention and loyalty.
  • Privacy is also a concern.
  •  
    The article "Why we care about location marketing" discusses the pros and cons of location based marketing. Location based marketing delivers ads and offers to audiences based on their location by using 3 primary methods: geofencing, geotargeting, and geoconquesting. This in turn increases foot traffic, helps boost customer loyalty, and gives insight into what a customer wants; however there are certain concerns such as privacy concerns. All in all, in 2022 advertising via mobile devices captured the largest share of digital advertising at $34 billion.
Tracy Kohn

Property Management Goes Mobile - 1 views

  •  
    In this article it begins to explain property management systems PMS going mobile in the hotel industry and how beneficial it is for hotel corporations and for customers. The author explained that the most in-demand PMS function for hotels is the ability to have a real time data of room availability, access to guest information such as comments and special request, room/ work order status, and up-to-date pricing. For customers facing mobile apps they would enjoy the guest self-service of booking, self check-in/out, service request, and messaging to staff. However even though mobile devices makes such functionality seem easier mobile-enabling a PMS is not easy at all in fact, making functions available via a browser would be a huge transition for a business.
  • ...1 more comment...
  •  
    In this article it begins to explain property management systems PMS going mobile in the hotel industry and how beneficial it is for hotel corporations and for customers. The author explained that the most in-demand PMS function for hotels is the ability to have a real time data of room availability, access to guest information such as comments and special request, room/ work order status, and up-to-date pricing. For customers facing mobile apps they would enjoy the guest self-service of booking, self check-in/out, service request, and messaging to staff. However even though mobile devices makes such functionality seem easier mobile-enabling a PMS is not easy at all in fact, making functions available via a browser would be a huge transition for a business.
  •  
    More and more are properties interested in having a PMS device that they can be accessed at anytime and anywhere. The answer to this challenge is to have PMS functions accessible via mobile devices which can be challenging for some of the systems, especially those that do not reside in cloud. For some smaller properties, the goal is to have no front desk at all and some have been quite successful in making this a reality. As stated in the Property Management Goes Mobile article, the ski resort Tremblant Elysium has been successful with using the cloud-based FrontDesk Anywhere. The guests receive a letter a week prior to check in containing a door code and 30 minutes after their arrival concierge comes to their room to complete their check in and sign the registration card. The CEO of Tremblant Elysium stated: "Guests love it because it is simple and easy and we do not have staff waiting around for people to check in." As stated in the article, guest require for Mobile PMS to include access to room availability and full front desk access including guest profiles and preferences, room/work order status, up-to-date pricing and housekeeping access for rooms statutes. Mobile-enabling PMS can be quite challenging to design, as it can bring difficulties with screen size, performance or choosing which device to use as the code must be re-written for each one. Another major concern for this type of PMS is the synchronization with other system with which PMS is integrated. As hotelier consider implementing mobile-enabling PMS device for their property, there are concerns about security as far as data storage or mobile check-in or the issuing of keys for guests. In my opinion mobile-enabling PMS is the future for smaller properties. Why would a hotel need to have a stand-alone front desk when we can use mobile phones to do the work for us as we are on the go? Eventually, we can have our staff cross trained in smaller properties all equipped with phones, all available to ch
  •  
    This article discusses the wish-list for hoteliers when they are considering cloud-based systems.Tthe most in-demand mobile PMS functions include GM access to KPIs, CRM and room availability, and front desk staff access to guest information such as comments and special requests, room/work order status and consolidated messaging among staff. It would seem that with all of these personal apps that are appearing on the market, that mobilizing a PMS would be easy, but that is not the case. The code is not universal; i.e. code must be re-written for each one, although there are tools like service-oriented architecture and html5 to help. There will naturally be concerns when considering adopting a mobile PMS across properties. Before investing in a roll-out of new technology, decision-makers must ask the right questions dealing with security, data storage, and functionality.
Mingxue Jia

Airport Security Solution: Should the TSA Profile Travelers to Prevent Terrorist Attack... - 1 views

shared by Mingxue Jia on 23 Mar 13 - No Cached
  •  
    The best way to protect airplanes isn't through improved technology such as full-body scanners but through profiling and questioning of passengers, some aviation security experts say. But such a move is an extremely controversial one that opponents say would violate travelers' privacy and could unfairly target some passengers for more-intense screenings.
  •  
    This artical piont out the best way for airport security is profiling travelers. Considering privacy concerns, in my opinion, not all consumers will accept this non-technical. Maybe for frequent fliers, they like this non-technical approach. Because that this approach provides conveniences to them and helps them save time. Frequent fliers do not need to line in a long queue, and then take off clothes, and shoes, as well as opening their luggage for check. However, as for normal fliers, considering privacy concerns, they may mind providing background information to airlines, since they don't know if it is safe.
rebecca Bonet

Keeping hotel locks safe | Hotel Management - 1 views

  • Our Classic magstripe locks do not store critical security information within individual locks, such as master key information, and any service device must authenticate itself through diversified encryption methods to gain access to the lock software
  • VingCard Elsafe’s locks can also detect tampering and work to alert hotel security staff using the company’s VISIONLINE system. “[The VISIONLINE system] incudes alarms to alert the hotel front desk if someone attempts to tamper with a door lock as well as providing real time alerts to the hotel’s security staff when activity is detected that a card is being misused,”
  • Other alarms include detecting that a door is forced open, left open, or ‘mule tool’ intrusions when a door is opened from the inside handle without an occupant in the room.”
  • ...18 more annotations...
  • VingCard Elsafe provides comprehensive training on the technology for the hotel staff and encourages everyone who will have interaction with the locks to participate
    • TIANJIAN ZHANG
       
      Nowadays, locks security is an essential issue in hospitality industry. Actually, most hotels upgrate their locks systems with advanced technology. The role of technology in the security sector is fundamental, but despite the rapid technological progress, one thing has remained constant: the importance of trust. Whether hoteliers wising up to the fact that they've bought what could be called a flawed security system will be willing to trust the supplier of said equipment for a fix.
  • After installation, hotels must work to keep their staff trained and their system upgraded to keep pace with the latest security issues. 
  • As hotel locks become increasingly automated, preventing them from becoming vulnerable to security concerns has become a top priority for hoteliers.
  • As hotel locks become increasingly automated, preventing them from becoming vulnerable to security concerns has become a top priority for hoteliers.
  • When VingCard Elsafe moved the industry towards RFID technology, security was one key driver, and our primary focus was to add additional security to the RFID card to prevent cloning. To that end, VingCard Elsafe hotel locking systems do not work with cards that have no anti-cloning capability.”
  • As hotel locks become increasingly automated, preventing them from becoming vulnerable to security concerns has become a top priority for hoteliers
  • , preventing
  • As hotel locks become increasingly automated, preventing them from becoming vulnerable to security concerns has become a top priority for hoteliers
  • As hotel locks become increasingly automated, preventing them from becoming vulnerable to security
  • “  Our Classic magstripe locks do not store critical security information within individual locks, such as master key information, and any service device must authenticate itself through diversified encryption methods to gain access to the lock software ,” Shea said. “  When VingCard Elsafe moved the industry towards RFID technology, security was one key driver, and our primary focus was to add additional security to the RFID card to prevent cloning. To that end, VingCard Elsafe hotel locking systems do not work with cards that have no anti-cloning capability.”
  • VingCard Elsafe’s locks can also detect tampering and work to alert hotel security staff using the company’s VISIONLINE system. “[The VISIONLINE system] incudes alarms to alert the hotel front desk if someone attempts to tamper with a door lock as well as providing real time alerts to the hotel’s security staff
  • VingCard Elsafe’s locks can also detect tampering and work to alert hotel security staff using the company’s VISIONLINE system. “[The VISIONLINE system] incudes alarms to alert the hotel front desk if someone attempts to tamper with a door lock as well as providing real time alerts to the hotel’s security staff when activity is detected that a card is being misused,”
  • For instance, a ‘wandering intruder alert’ warns hotel security personnel when a card is presented to a number of different doors.  Other alarms include detecting that a door is forced open, left open, or ‘mule tool’ intrusions when a door is opened from the inside handle without an occupant in the room.”
  • After installation, hotels must work to keep their staff trained and their system upgraded to keep pace with the latest security issues.  
  • VingCard Elsafe provides comprehensive training on the technology for the hotel staff and encourages everyone who will have interaction with the locks to participate ,”
  • As with any hotel upgrade, hoteliers understand that renovation and upgrades are a regular part of running their business
  • Looking past RFID solutions for instance, VingCard Elsafe has made our RFID locks compatible with next generation technologies, like Near Field Communications (NFC), providing our customers with an easy upgrade path at reasonable cost.”  
  •  
    This article discusses the security issues with room keys. These hotel locks will not open with cards that are read as duplicates or duplicatable. The locking mechanism has been specifically designed to alert the front desk and secuirty departments in the event these locks are tampered with. I'm sure at one point or another we have all experimented with our room key and tried to open other doors. A system like this will prevent activity like that.
  • ...2 more comments...
  •  
    VingCard Elsafe, the global leader in hospitality security and part of the ASSA ABLOY Group, announces that it has phased out the use of brass metal plating and painting in the manufacture of its locking systems, opting instead to use a more eco-friendly process to color stainless steel. VingCard Elsafe has adopted a new method of metal coloration called physical vapor deposition, or PVD, an environmentally friendly process that involves vaporizing an alloy onto stainless steel within a heated vacuum. PVD requires no chemicals and produces no waste or hazardous materials of any kind, resulting in no environmental impact whatsoever. The PVD process has other added benefits, as well. PVD-treated surfaces have high wear resistance for discoloration, and the stainless steel adds enhanced anti-corrosion properties. Besides eliminating the negative environmental effects of the brass plating process, the move by VingCard Elsafe to simplify its lock manufacturing process has had other related green benefits. By doing away with the need for secondary surface treatments of the locks, new product components are now supplied directly from metal stamping to the point of use in the assembly line. This means less shipping and transportation is required for product manufacture, resulting in a diminished carbon footprint.
  •  
    VingCard Elsafe is a new kind of lock system, which contains RFID technology and is compatible with the Near Field Communications. It has several advantages compared to traditional magstripe locks. First of all, it can add security to the RFID card and prevent cloning, which is much safer than the traditional key card. Another is that it can detect tampering and know when and where staffs use the lock. It can send alert to the front desk. Moreover, the front desk can know when the door is forced open. However, before using the lock system, training program should be provided. So this new kind of lock system brings safety to the guests and to the hotels.
  •  
    This article talk about the issue that hotel are having with their security system lock for guest room. These cards are easy to duplicate. The new system will alert front desk or security if the lock has been tampered with. Other alarms include detecting that a door is forced open 'mule tool' instruction when a door is open from the inside handle without an occupant in the room.
  •  
    This article discusses the current state of hotel lock safety. Monitoring safety has changed as these locks become more automated. The article states that, "Hotel Management corresponded with Tim Shea, president of ASSA ABLOY Hospitality, for ways in which vendors are keeping hotel locks secure." Through VingCard Elsafe's locks, hotel security and safety has increased. VingCard says, "Our Classic magstripe locks do not store critical security information within individual locks, such as master key information, and any service device must authenticate itself through diversified encryption methods to gain access to the lock software." This is just one of the ways the locks increase security. The article also states that the system is cost-effective for hoteliers.
ahand019

Hospitality in the Cloud, by Bernard Ellis - 0 views

  •  
    SUMMARY: This article by Bernard Ellis talks about the benefits of cloud computing and how it is being used in the hospitality industry. Hotels were previously wary about using cloud computing, but are slowly realizing that this technology has the ability to improve not only their operations, but also customer service and revenue. Ellis believes that limited-service brands, like a Courtyard by Marriott are part of the reason why hotels started looking into cloud computing. Brands like Courtyards do not have the means to spend significant amounts of money on technology, unlike their full-service counterparts. This sometimes means these hotels are at risk for not receiving necessary updates. Cloud computing enables hotel chains to offer access to systems, not previously made available to limited-service brands and also franchisees, both of which are crucial to the hotel chain's success. Hotels were previously concerned about their ability to maintain security and safety of systems within cloud computing. Now the concern has turned to change management. Changes and updates happen faster through the cloud platform and hotels have to figure out the best way to ensure staff is on top of all changes that take place. According to Ellis, the answer to this problem is learning management platforms, which are technology-based and more cost-efficient. Having technology-based learning platforms makes training easier and gives hotels the ability to update the training regularly based on any changes that take place. By utilizing cloud computing and learning management platforms, hotels will be able to improve operations, improve customer service, and streamline revenue.
Panpan Xie

PMS in the Cloud | Top Stories | | Hospitality Magazine (HT) - 2 views

  • I think people are reluctant of new technology and with cloud computing the issues are usually control, security and connectivity,”
  • When data is in the cloud, it no longer exists on the property, which means a huge decrease in risk for the operator.
  • Lower cost of ownership, quicker training, faster company-wide updates and a quick return-on-investment are just some of the paybacks that operators report after moving to the cloud computing model.
  •  
    Running a hotel in the cloud is a very new technology and most of the hotels are still in the trying process. There are pros and cons of running a hotel in the cloud, the atticle has solved most of our concerns about the problems that be occured when running a hotel in the cloud. However the temptation of the cost will be the most competive advantages of the cloud based PMS system.
  •  
    The article clearly cleared up some of the myths in terms of internet connectivity which is a major concern. It is clear that if cloud computing is used as the option then internet redundancy should be utilized as well. It was interesting to note that a major corporation like Hyatt as moved its micros Pos and accounting systems to cloud. This will certainly encourage other hotels to get on board. On the matter of security especially for credit cards, it is good to know that PCI compliance is a must when utilizing cloud computing. Great article.
  •  
    Nowadays, there are many concerns for hoteliers to adopt the cloud computing PMS system. People are reluctant to use the new technology because of the issues of control, security and connectivity. Hyatt and some benchmark hotels put most of their systems into cloud. Actually, when using the cloud PMS, data is not in the property which decrease the risk of operator. Also, as backups, network disconnection is rarely found. There are many benefits of the cloud, such as low cost, easy to upgrade software. Besides, it also has financial benefits. Many servers replaced the cloud PMS saw ROI within a year.
Wei Ding

TripAdvisor CEO discusses fake reviews, Google#.Txg1IKe1ZQ8.diigo - 0 views

  •  
    Nowadays, TripAdvisor play an important role in tourism industry. Most of people will review TripAdvisor ranking and then make their own holiday arrangements. On-line user review rankings are important in contemporary society. As the TripAdvisor president said, trip advisor is a honest person's opinion. TripAdvisor website plays the role of trusted intermediary for the independent traveler. However, some hoteliers concern about their personal reputation. I read another article that hotel owner Duncan Bannatyne complains the consumer resource is bad for business. For example, if a hotel was reported for bad bug exist, this definitely is a fatal effect on hotel reputation even this hotel already take proper action to kill all bad bugs. On the other hand, as TripAdvisor CEO stated, "Ninety-eight percent of our audience when we surveyed 'Do you trust the reviews,' the answer was 'yes' because they read the reviews, they go and they stay and it matched expectations. The system works." TripAdvisor also take '"most of hoteliers" concern into their consideration, they have a decade of expertise at catching people who are try to spam their system.
  •  
    From my experience in the industry. I know how much people really depend on trip advisory to help them decide on where to stay when they choose the destination they will be traveling. But I have heard stories on how the Owner of the hotel I used to work for would write on trip advisor amazing comments of the hotel to bring more crowd in and then he would invite his friends to write in trip advisor as well. This makes me question how real are all these comments posted in trip advisor. If you think about it, anyone can make up a profile and fill out a comment about a specific hotel. What makes us so sure about this website overall?
1 - 20 of 452 Next › Last »
Showing 20 items per page