Skip to main content

Home/ Hospitality Technology/ Group items tagged methods

Rss Feed Group items tagged

Ruoxi Wang

[Update] Global Hospitality Accounting System Project - HFTP Connect - 0 views

  • ecognizing that operating hotels is a global industry, HFTP determined that there is not a globally accepted method that financial professionals, ownership structures, investors and benchmarking information services can use to support efficient operations. There is also not a globally accepted method to monitor investment performance from region to region without significant assumptions and data mining.
  • Currently, research is being conducted into current practices. This research will identify who is doing what in different parts of the world, with a view to establishing best practice and providing practical guidance for students, practitioners and professionals involved in the industry.
  • In order to create a global resource for the hospitality finance industry, Hospitality Financial and Technology Professionals (HFTP®) began development on a global hospitality accounting system users guide this past March. Recognizing that operating hotels is a global industry, HFTP determined that there is not a globally accepted method that financial professionals, ownership structures, investors and benchmarking information services can use to support efficient operations. There is also not a globally accepted method to monitor investment performance from region to region without significant assumptions and data mining. HFTP’s Global Hospitality Accounting System Users Guide (GHASUG) will address this need. Where does the project stand right now? Currently, research is being conducted into current practices. This research will identify who is doing what in different parts of the world, with a view to establishing best practice and providing practical guidance for students, practitioners and professionals involved in the industry. The guidance will be formulated by industry experts, based on the research findings. To date HFTP has commitments from major information benchmarking companies, hotel corporations, hospitality associations and globally recognized hospitality schools around the world. Once completed, HFTP will make the outcome accessible online, together with analytical tools. It will be available at a minimal cost and users will have the capability to print versions if they desire. The hotel sector currently enjoys the benefits of an accounting structure developed in the USA specifically for the industry.  The Uniform System of Accounts for the Lodging Industry has been widely adopted, principally by US based operating companies, and linked to management contract terms.  HFTP has been involved in this project for many years and will continue to sponsor the 11th edition in support and via a monetary contribution.
  • ...1 more annotation...
  • The Global Hospitality Accounting System Users Guide will provide for a wider community of information users, and demonstrate approaches to the production of alternative analysis of data for hotel performance measurement.
  •  
    In 01 Mar 12 someone share a article about the global hospitality accounting system. That article talks about how the Hospitality Financial and Technology Professionals (HFTP) are in the process of making a user guide for the global hospitality accounting system. This article is an update that publish recently. It shows where does the project stand right now and what is next for the project. However, the first part of phase one- covering the UK and continental Europe- is now well in progress.
  • ...2 more comments...
  •  
    It has been found by the Hospitality Financial and Technology Professionals that a global hospitality system needs to be developed. They recognized that there is no globally accepted method that can be used to support an efficient operation. "There is also not a globally accepted method to monitor investment performance from region to region without significant assumptions and data mining." The hotel sector in the USA currently has in place an accounting structure, but based on this research that is going on comparison will be made of what is happening globally and they will devise some best practices for persons involved in the industry.
  •  
    Hospitality Financial and Technology Professionals began to create a global hospitality accounting system for the hospitality finance industry. Currently, the research is being conducted into current practices. This will give a view to establishing best practice and providing practical guidance for students, practitioners and professionals involved in the industry. Once it is completed, it will provide for a wider community of information users, and demonstrate approaches to the production of alternative analysis of data for hotel performance measurement. Now, the first part is in well progress covering the UK and continental Europe. And the project will still take a further 12 months to complete.
  •  
    HFTP's Global Hospitality Accounting System Users Guide will set a global method for hospitality industry.   Recently, research is being conducted into current practices. This research will identify who is doing what in different parts of the world, with a view to establishing best practice and providing practical guidance for students, practitioners and professionals involved in the industry.
  •  
    Hospitality Financial and technology professionals was developing a global hospitality accounting system in the past year. Their fist step is to cover the UK and continental Europe. The second step is to do search about South and central America and cover them. The third step will begin for China and India, and the last two segments will be Russia and North America. This is quite a large program. If the program was completed, a globally accepted method that financial professional, ownership structure, investors and benchmarking information services can use to support  efficient operations will be formed, and a globally accepted method to monitor investment performance from region to region will also be formed.
marble_bird

The Concept of Comprehensive Tracking Software to Support Sustainable Tourism in Protec... - 0 views

shared by marble_bird on 25 May 20 - No Cached
  • Visitor management of protected areas [1–3] is supposed to keep the tourism intensity below the area limits while respecting the needs of the local economy and community as a multi-faceted goal of participative management [4]. It requires reliable, comprehensive, and detailed data about tourism intensity, including its impacts and practical methods and tools to exploit the data for the purpose of visitor management
  • Visitor management of protected areas [1–3] is supposed to keep the tourism intensity below the area limits while respecting the needs of the local economy and community as a multi-faceted goal of participative management [4]. It requires reliable, comprehensive, and detailed data about tourism intensity, including its impacts and practical methods and tools to exploit the data for the purpose of visitor management
  • At first, a literature review (Section 2) is conducted in the areas of tourism impacts, tourism sustainability , visitor management, tourism modelling and simulations, visitor monitoring and tracking, and the utilization of data about visitors. Specific attention is paid to the promising method of individual tracking, its variants, and the challenges related to its deployment.
  • ...30 more annotations...
  • The LAC method [12,13], the carrying capacity [2,4,8,10,14–18], tourism sustainability indicators [8,10,19], or visitor management models [2,4,11] are some of the theoretical concepts and methods which the protected area visitor management may use to assess the effects of tourism and tourism infrastructure construction and maintenance.
  • isitor counts can be used to form a model reflecting the dynamics of the destination system, allowing visitor flow simulations
  • However, the quality of such models is critically dependent on the extent, quality, and readiness of the entry data [21]. The use of real-time data in models of destination systems is not common
  • Individual tracking methods are based on satellite positioning (e.g., The Global Positioning System known as GPS, or Galileo), active mobile positioning, Bluetooth positioning, Wi-Fi positioning, or indirect monitoring based on geocoded social media, or photo databases
  • Visitor management of a protected area requires tourism impact estimates depending on its intensity (step 1). Estimates of proportions of various visitor categories depending on days of the week, holidays, weather, or season, or other factors together with expert estimates of specific impacts of these categories of visitors are available
  • The use of visitor monitoring methods is a common part of visitor management practice, however, monitoring is often not implemented
  • systematically enough and data is often available with a significant delay (for example, from oine people counters installed in the terrain or when using data from mobile operators), making the assessment of the destination system state in real-time impossible
  • Correct and ecient data integration requires a systematic and consistent approach. However, a relevant methodology for the utilization of heterogeneous data is not available, which may be one of the reasons why comprehensive visitor monitoring is so rare.
  • the universally applicable concept of an intelligent tour guide for visitor tracking and for visitor characteristics acquisition are introduced in the results section of the manuscript. The ongoing experimental implementation of the proposed concept is mentioned, and relevant challenges are discussed at the end.
  • Gradually, five representatives and experts from protected area management, six destination organization experts, and four geopark experts were involved. None of the protected area experts involved in the research had any previous experience with systematic visitor data integration or with using the concept of the intelligent software tour guide.
  • The brainstorming and focus group were used to raise new ideas, and the Delphi method was used to reach a consensus when needed.
  • The knowledge gathered from experts served as an input for systems analysis, leading to the design of a computer program—an intelligent tour guide for each involved protected area. Namely, use cases, functional requirements, and other characteristics of the software were identified and discussed.
  • Because meaningful visitor flow and visitor impact modelling require suciently comprehensive and accurate data [21], systematic exploitation of all available relevant heterogeneous data about visitors (collected by a variety of methods, each with its specific limitations, e.g., visitor profiles, numbers of sold tickets, counts from sensors, space-time curves of individual visitors) is a recommended [36] and cost-e ective approach.
  • Thus, attention should be paid to the categorization of visitors, including their needs, motivations, limitations, and the resulting patterns of behavior. Such analysis may help to reveal which categories of visitors are desired, e.g., because of their positive impact on the local economy, and which should rather be discouraged from coming
  • The concept is meant to be generic enough to fit a variety of geographic areas (size, protected features of the local nature, local community , tourism intensity , division of roles in participative management between organizations, etc.)
  • The intelligent tour guide has to be:
  • Reliable, accessible, compatible.
  • Personalized.
  • Location-sensitive.
  • Destination-system-aware.
  • Interactive and collaborative.
  • Dialogue-wise.
  • Decently gamified.
  • Regarding human factors, the potential of individual visitor tracking to provide rich and valuable data may be hindered by the low motivation to participate [21,50,51]. Low participation may limit the usability of the resulting data and negatively a ect the e ects of possible attempts to influence the flow of visitors.
  • From the technical side, active mobile positioning provides spatially accurate data collected with a sucient sampling rate, for example, compared to passive localization data automatically recorded by mobile operators. However, still, the low satellite signal in rocks or under the canopy of a dense forest in combination with less-sensitive mobile devices may a ect the quality of the data and even the function of the tour guide.
  • Regarding the interpretation of the resulting data, the bias caused by the selection of participants and the willingness and fitness of members of di erent visitor groups has to be considered. Also, individual tracking may have an unintended influence on visitors’ movement and behavior [49], though the impact and resulting bias is usually acceptably low
  • Ethically and legally acceptable data collection may require the acquisition of informed consent from each participant.
  • An inadequate budget can lead to compromises, e.g., in the project management, analysis, or implementation, a ecting the compatibility, reliability, or usability of the program, or the quality and extent of the underlying model and the set of descriptive data.
  • Experimental verification of the individual tracking method, supplemented by visitors’ feelings and experiences by means of an intelligent tour guide operated in the context of a complex destination application, currently takes place in all involved areas. The application is being carefully designed in harmony with all recommended principles. Namely, a clear distinction is being made between the universal part of the application and area-specific models, configurations, deployment choices, or custom pieces of code.
  • The research team is looking for other possibilities of verifying the concept presented elsewhere in the Czech Republic and the world. Further research will reveal if the concept is truly generally applicable, as hypothesized, or not.
  •  
    This article covers the research behind and design of software implemented in the Czech Republic to monitor visitor activity in protected areas. The software is designed to act as a "tour guide" and keeps track of visitors through satellite positioning. The article discusses the process by which this software would be developed, rationale for its implementation, and consumer data that may be collected through this process that would benefit National Parks and other protected areas. Theoretical questions in regard to human interaction, privacy concerns, and effectiveness of the application in low-service areas are discussed. Though the application requires more research and strict attention to variables, its implementation worldwide could change how sustainable tourism is managed and would provide important information on consumer habits in protected areas.
danakissane01

Simpler E-Waste Recycling Method Might Be Greener, Too | Inside Science - 0 views

  • Simpler E-Waste Recycling Method Might Be Greener, Too
  • The new approach can separate different metals in electronic waste using only air and high temperatures.
  • It's estimated that more than 50% of critical materials in electronics -- such as gold or rare earth metals -- end up in landfills.
  • ...3 more annotations...
  • In a paper published in the journal Materials Horizons in March, materials scientist Martin Thuo and his collaborators at Iowa State University demonstrated a new method of extracting valuable metals from recycled electronics: one that requires only air and relatively low temperatures of 500-700 degrees Fahrenheit (260-370 degrees Celsius). 
  • A strength of this new method is its tunability, allowing different metals to be extracted from a sample one by one. The balance of air and temperature controls which component in the waste reacts fastest. Once the most reactive component is entirely oxidized, it is separated from the rest of the sample, and the process continues with the next reactive component.
  • The tunability of the process also means that the waste must be "profiled" first, to determine the quantity of each component and design the air and temperature changes accordingly. Thuo said fine-tuning these profiles, as well as characterizing the method's environmental friendliness and cost, will be a priority as his team begins to commercialize the technology. 
  •  
    A new method that might help E-waste recycling become more green and safe for the environment.
Irine Wallace

Opera Property Management System - 0 views

  • Reservations ― features are integrated with other functionality such as profiles, cashiering and deposits. This property management software module provides a complete set of features for creating and updating individual, group and business block reservations, including deposit handling, cancellations, confirmations, wait listing, room blocking and sharing.
  • Reservations ― features are integrated with other functionality such as profiles, cashiering and deposits. This property management software module provides a complete set of features for creating and updating individual, group and business block reservations, including deposit handling, cancellations, confirmations, wait listing, room blocking and sharing.
  • Reservations ― features are integrated with other functionality such as profiles, cashiering and deposits. This property management software module provides a complete set of features for creating and updating individual, group and business block reservations, including deposit handling, cancellations, confirmations, wait listing, room blocking and sharing.
  • ...11 more annotations...
  • Reservations ― features are integrated with other functionality such as profiles, cashiering and deposits. This property management software module provides a complete set of features for creating and updating individual, group and business block reservations, including deposit handling, cancellations, confirmations, wait listing, room blocking and sharing.
  • Profiles ― complete demographic records for guests, business accounts, contacts, groups, agents and sources. Profiles include addresses, phone numbers, membership enrollments, stay and revenue details, guest preferences and additional data that make reservations handling and many other activities faster and more accurate.
  • Back Office Interface ― revenue transfers, market statistics transfers, daily statistics transfers, and city ledger transfers can be easily made from OPERA Property Management System to a back office system.
  • Rooms Management ― handles all facets of room supervision including availability, housekeeping, maintenance and facility management. The Queue Rooms feature of the property management software coordinates Front Office and Housekeeping efforts when guests are waiting for rooms which are not immediately available for assignment.
  • Cashiering ― posting guest and passer-by charges (including taxes and other generates), making posting adjustments, managing advance deposits, settlements, checkout and folio printing are a few of the many activities handled by OPERA Cashiering. Cashiering accommodates multiple payment methods per reservation including cash, check, credit cards and direct bill. In multi-property environments, guest charges can be cross-posted from any property in the hotel complex
  • Cashiering ― posting guest and passer-by charges (including taxes and other generates), making posting adjustments, managing advance deposits, settlements, checkout and folio printing are a few of the many activities handled by OPERA Cashiering. Cashiering accommodates multiple payment methods per reservation including cash, check, credit cards and direct bill. In multi-property environments, guest charges can be cross-posted from any property in the hotel complex
  • Cashiering ― posting guest and passer-by charges (including taxes and other generates), making posting adjustments, managing advance deposits, settlements, checkout and folio printing are a few of the many activities handled by OPERA Cashiering. Cashiering accommodates multiple payment methods per reservation including cash, check, credit cards and direct bill. In multi-property environments, guest charges can be cross-posted from any property in the hotel complex
  • Cashiering ― posting guest and passer-by charges (including taxes and other generates), making posting adjustments, managing advance deposits, settlements, checkout and folio printing are a few of the many activities handled by OPERA Cashiering. Cashiering accommodates multiple payment methods per reservation including cash, check, credit cards and direct bill. In multi-property environments, guest charges can be cross-posted from any property in the hotel complex
  • Cashiering ― posting guest and passer-by charges (including taxes and other generates), making posting adjustments, managing advance deposits, settlements, checkout and folio printing are a few of the many activities handled by OPERA Cashiering. Cashiering accommodates multiple payment methods per reservation including cash, check, credit cards and direct bill. In multi-property environments, guest charges can be cross-posted from any property in the hotel complex
  • Cashiering ― posting guest and passer-by charges (including taxes and other generates), making posting adjustments, managing advance deposits, settlements, checkout and folio printing are a few of the many activities handled by OPERA Cashiering. Cashiering accommodates multiple payment methods per reservation including cash, check, credit cards and direct bill. In multi-property environments, guest charges can be cross-posted from any property in the hotel complex
  • Your front desk often makes the difference between ‘never agains’ and ‘long-term relationships.’ At the core of the OPERA Enterprise Solution is our premier property management software, the OPERA Property Management System (PMS). Designed to meet the varied requirements of any size hotel or hotel chain, OPERA PMS provides all the tools a hotel staff needs for doing their day-to-day jobs – handling reservations, checking guests in and out, assigning rooms and managing room inventory, accommodating the needs of in-house guests, and handling accounting and billing. The property management software is configurable to each property’s specific requirements and operates in either single-property or multi-property mode, with all properties in an enterprise sharing a single database
  •  
    SUMMARY OPERA Property Management System is fully integrated with all the OPERA modules and offers the most extensive list of certified interfaces in the industry. FEATURES: Reservation, rate management, profiles, front desk management, back office interface, room management, cashiering, account receivables, commissions, reporting, fully configurable, global perspective, hospitality system interface, opera express, tailored to fit hotel's operational business needs, scalable to suit the size of the hotel, helps operators to become more productive, profitable and professional, and delivers fast, accurate and online information on property
  •  
    A lot of hotels use OPERA as their property management system. I have never personally worked in a hotel so I am not familiar with PMS's but from everything that I have read and heard from people is that OPERA is very efficient with everything. This system seems as though it can do everything for your property just the way that you would like it to. OPERA is customizable to your company's needs which seems great. This is a great website that you posted as it informs all of us exactly what this PMS is capable of.
Xu Wang

Emerald | Have human resource information systems evolved into internal e-commerce? - 0 views

  • Human resources (HR) have been a well-established function in organizations for decades,
  • the department was typically perceived by many organizations as a “necessary evil,” that is to say, as an essential but in no way profitable or advantageous element,
  • even at the current time HRIS is not limited to technological elements alone, such as computer hardware and software applications, but also includes the people, policies, procedures, and data required to manage the HR function.
  • ...55 more annotations...
  • Nevertheless, these well-accepted attributes of HR have been challenged in the past few years, as several indicators reflect fundamental changes within the HR function,
  • although little has changed in this function over the past decades, there are growing expectations that HR will improve corporate competitive advantages by adding real measurable value to the organization.
  • The apparent difficulties in upgrading HR to a strategic position in organizations result in missed opportunities especially in hospitality and tourism, where the human capital has substantive potential to improve the competitive advantage of enterprises, particularly due to the growing competitiveness of the industry, as well as the centrality of the human element in the delivery of hospitality products and services
  • The second change in contemporary HR which, interestingly, is closely related to the previous one, is the growing trend of incorporating advanced information technology (IT) in HR practices.
  • There is extensive evidence to the growing transfer of HR functions to digital formats, as can be seen in the growing popularity of human resource information systems (HRIS) among organizations. HRIS is currently perceived as one of the important factors influencing the role of the HR function, as well as the workplace as a whole. Although in many aspects, technology remains under-utilized in HR functions (Jones and Hoell, 2005), recently its effects have begun to be evident in many organizational aspects,
  • Furthermore, it is widely argued that the adoption of HRIS is likely to promote HR to the awaited position of strategic partner in the organization. The main reason for this is that by using HRIS, HR professionals can improve their performance by gaining better knowledge of the organization and its employees, thus facilitate participation in strategic planning and implementation. In addition, by improving the efficiency and effectiveness of the HR day-to-day administrative tasks, HRIS allows the HR staff to dedicate more time to strategic decision making and planning, which consequently provides more value to the organization to enhance its position within it
  • modern HRIS make optimal use of internet and web capabilities for performing their tasks
  • successful HRIS support the planning and implementation of managerial key processes in the organization, such as executive decision making, technology selection, interdepartmental integration, and organizational reporting structures.
  • Intranet-based employee self-service (ESS) provides employees direct access, mainly through a web browser but also through a centralized kiosk, to personal HR-related information. Thus, the employees can individually handle transactions that used to be carried out by HR personnel,
  • Both MSS and ESS create a trend of delegation of responsibilities and activities that were once considered to be the domain of HR professionals and administrative personnel, directly to employees and managers
  • HRIS was seen mostly as a special form of office automation systems, the emphasis being on reducing costs and staff while making the standard HR tasks more efficient
  • In addition, in today's workplace the HR tasks have become more complex, along with organizational trends such as globalization, consolidations, strategic partnerships, and greater than ever governmental and regulatory reporting requirements for employees.
  • Therefore, from the administrative perspective, by providing powerful computing capabilities, HRIS are changing and improving procedures and processes that were carried out less efficiently before,
  • the automation of routine transactions provides HR professionals with time to perform strategic functions related to the human capital
  • HRIS allow the firm to be proactive in HR planning, by giving managers a constant flow of employee information
  • since HRIS can significantly improve the way employees and managers communicate with each other through various communication channels, this improves the flow of information and expertise throughout the organization, thereby enhancing the firms' strategic capabilities
  • Another prominent perceived characteristic of the HR function has been its reliance on relatively low-tech methods in implementing its tasks
  • Although HRIS can provide both administrative and strategic advantages, it should be noted from the onset that they are usually expensive systems to purchase and implement. Designing and implementing customized HRIS, adapted to the specific needs of the organization, will significantly enhance its functionality, but will result in increased software and hardware costs, as well as time-to-deployment
  • the initial costs of developing such HRIS are high,
  • In order to reduce the costs of HRIS, an organization can purchase off-the-shelf applications composed of HR database programs, aimed at meeting the general needs of HR functions
  • These findings point to the vital need of the HR function to provide evidence of the effectiveness of HRIS, for the purpose of attaining the executive management support for the change.
  • for a successful implementation of HRIS, it is no less important to obtain the support of managers and employees in the organization. Although modern HRIS offer clear advantages to managers, through the use of MSS, for better management of their staff, the implementation of such systems is likely to be followed by a certain level of resentment on the part of the managers. Since MSS transfer the responsibility of performing employee HR-related transactions from the HR staff to the direct managers, many of them are frustrated since they feel that additional administrative tasks are being imposed on them
  • Another relatively common problem, concerning both the implementation and the flowing management of HRIS, is the question of who is in charge of the system. Since the successful development of HRIS requires the input of both the IT and the HR departments, it is not uncommon for disputes over areas of responsibility to break out between these departments.
  • Other territorial conflicts around HRIS may arise when departments feel that the system expropriates some of its authorities; for example, the payroll department might resist HRIS that combines payroll functions. A possible solution to such a problem can be the establishment of cross-functional teams that run HRIS projects
  • the implementation of HRIS raises both ethical and legal issues that need to be addressed by the organization. First, the use of relational database technology provides access to more detailed employee information than ever before.
  • Second, HRIS usually contain private information on the employees, while the access to this information is often allowed to employees outside HR, as well. As a result, some employees feel that their private lives are not protected adequately.
  • The hospitality industry is characterized by a higher turnover rate than other sectors of the economy
  • Traditionally, HR in organizations has utilized low-tech methods in recruitment.
  • Internet recruiting benefits both the organization and the job seeker's perspectives (Pearce and Tuten, 2001; Singh and Finn, 2003). The benefits to the recruiters include: Cost savings, as it is significantly cheaper to advertise on the internet than in a newspaper. Compared to the use of professional search firms (also known as headhunters) the amounts saved are even higher. Recruiters generally receive more applications, which results in a greater pool of candidates from which to choose. Recruiters may receive applications faster, often even on the same day a position is announced. Improved ability to target a specific audience, thereby decreasing future turnover. Time saving, as more unqualified or unfit applicants can be eliminated, through online contact, in the initial phases of the recruitment process.
  • On the other hand, internet recruitment is not without limitations.
  • Once the recruitment process has ensured a large pool of applicants to choose from, the next phase is to select the most suitable candidates.
  • Traditionally, these selection methods involve the visit of the candidate to the organization or, to a lesser degree, to an assessment center, for interviewing, pen-and-paper testing, or situational testing, including group dynamics.
  • The use of advanced technology allows the selection process to complete the widespread online recruitment methods.
  • Nevertheless, the main impact of technology in selection procedures is in relation to employee interviewing and testing.
  • Anderson (2003) broadly described the prominent technology-based selection procedures, along with an assessment of their acceptance and effectiveness.
  • Adequate training is essential in providing quality services, yet traditionally hospitality organizations have not invested adequate resources in training their employees (Conrade et al., 1994). Most of the knowledge and skills of hospitality employees is transferred through on-the-job training,
  • However, as noted by Collins (2004), delivery of organized and structured training programs in the hospitality industry is a constant challenge, mainly because of the size and geographical dispersion of the workforce, as well as the extensive resources – financial, work, and time – needed to establish in-house training programs.
  • Although technology-based training methods have been available for a long time, the hospitality industry has usually lagged behind other sectors in adopting them.
  • Web-based training (WBT) can deliver courses nationwide or worldwide at all time zones to any connected computer, and is easy to update and monitor.
  • Effective performance evaluation plays a critical role in the successful implementation of organizational strategy and in gaining a competitive advantage. Therefore, in addition to important HR decisions that greatly rely on performance evaluation, such as promotions, outplacements, dismissals, many organizations link performance to compensations and rewards. As noted by Bowley and Link (2005), a performance-based compensation plan, often known as “pay-per-performance,” should reflect the organization's goals.
  • the traditional methods, based on a disconnected blend of discrete applications, spreadsheet programs and paper-based systems, to communicate goals, track employee performance and manage compensation, are insufficient in the contemporary challenges of linking performance evaluation to organizational strategy (Bowley and Link, 2005). Yet, although sophisticated HRIS were developed to meet these contemporary challenges, Ensher et al. (2002) found little effect of HRIS on the process of performance management among HR executives, who still rely on paper-and-pencil administration and hard copy documentation of employee evaluation.
  • Nevertheless, CPM has drawbacks that are highly relevant to a service industry such as the hospitality industry (Miller, 2003). The main concern that CPM raises is that reliance only on quantitative criteria is likely to lead to the neglect of more qualitative aspects of performance.
  • Consequently, an effective CPM must be followed by the establishment of an employee development plan, designed in collaboration with his/her supervisor. The second application of technology in appraisal management is online evaluation and appraisal software (Miller, 2003). In contrast to the aforementioned CPM, in these cases technology facilitates delivering performance feedback, rather than generating the actual evaluation outcome.
  • 360° feedback,
  • In addition, evaluation software packages can be used as stand-alone applications or as an integral part of the organization's HRIS, which offers computerized standard evaluation forms. The use of user-friendly software in evaluating employees allows managers to focus more on the contents of the evaluation, rather than on the forms.
  • Therefore, the use of computer software programs allows better coping with these challenges, while saving time and money.
  • While the organization enjoys the reduced need for complex bureaucracy, the employees enjoy better control and enhanced anonymity, as there is no need for dealing directly with HR staff on personal financial matters.
  • The use of HRIS has significant impact on the current affairs between the management and the employees, as well as the characteristics and the environment of the contemporary workplace. From the administrative perspective, through the HRIS the managers and the employees have access to relevant information on employee work rules, policies, and regulations on issues like privacy, illegal discrimination, and work diversity. In addition, the HRIS can assist discharged or displaced employees in finding alternative employment, by providing links to career counselors, training programs, and information, all of which are required for a successful and effective job search
  • technology has changed the nature of the workplace and employer-employee relations more fundamentally than just providing more accessible information.
  • Traditional e-commerce technology provides product/service, promotion, placement, and pricing strategic initiatives to external constituents through the use of extranet platforms merged with intranets (for instance, customer relationship management). HRIS technology provides the same initiatives through the use of intranets merged with extranet platforms (for example, recruitment). Thus, HRIS technology may be considered to represent internal e-commerce systems, which are crucial to the alignment of HR functions within strategic initiatives aimed at sustainable competitive advantages.
  • The evolution of HRIS platforms provides a range of tools for use by enhancing employee-employer relationships. The full service range of HRIS functions brings human capital closer to the strategic direction of the organization.
  • However, the technology is merely a tool that may enhance strategic alignment.
  • There is also evidence from the literature that a disengagement of the HR function from strategic initiatives exist in many hospitality enterprises.
  • It is common knowledge that the hospitality industry is labor intensive with many points of intimate service interactions of long duration. HR will produce sustainable competitive advantages for those firms that include the HR function in a united strategic direction.
  • The literature identifies the advantages of aligned human capital as a means to accomplishing sustainable competitive advantage for enterprises.
  •  
    This article is a research paper did by Amir and Beer-Sheva. The purpose of this paper is to discuss the impact of technology on the human resources function in organizations, in general, and in hospitality firms, in particular. At the beginning, it introduced the role of human resources department in organizations for decades. And the trend or changes in contemporary human resources. Then it came out that we cannot skipped the effect of technology on the HR function, especially in tourism and hospitality industry. So, next it gave the definitions of HRIS by introducing technology. And list some advantages and challenges of using HRIS. In the end, it listed how technology put infusion across HR function, including recruitment, selection, training, performance evaluation and compensation, payroll, benefits and pension administration, labor relations and outplacement.
Adam Herrmann

4 Ways E-Commerce Can Drive Customers to Green Initatives - 1 views

http://www.mediapost.com/publications/article/192278/4-ways-e-commerce-can-drive-conversions-from-green.html#axzz2JlabBTzo

Long Jin

Keep your data safe when connecting to public wireless hotspots | Gadling.com - 0 views

  • Any time you connect to a public Wi-Fi hotspot, almost every single piece of data you transmit can be picked up by anyone within range of the same network.
  • Don't share files on your computer
  • Create your own secure connection with a VPN
  • ...1 more annotation...
  • Firewall your computer
  •  
    Like the tittle said, this article introduced some basic methods to keep data safe when connecting to public wireless hotspots. The author pointed out that whenever we connect to public Wi-Fi hotspots, most single piece of data can be picked up by anyone within range of the same network. It is very important to keep our data safety especially in the public place. The author introduced ten methods to protect data safety. It included turn off "auto connect", don't share files on computer, get a 3G or 4G adapter, create your own secure connection with a VPN, connect securely to your home PC, then connect to sites you need, firewall your computer and so on. During introducing the methods to protect the data, the author also told basic knowledge about how the data will be picked up by others.  In the part of don't share files on computer, the author pointed out that many people choose home network when they are connecting into public Wi-Fi which can let other people stole the sharing files. Also the firewall for the computer is really necessary to protect the data in the computer. Finally, the author told an easiest implementation which is restrict what you do on Wi-Fi. People should not do anything on Wi-Fi that you wouldn't want to share with anyone else like bill payments. It can let other people know your account and password when you make payments through public Wi-Fi.
mtedd003

UN report: Time to seize opportunity, tackle challenge of e-waste | UNEP - UN Environme... - 0 views

  • The world produces as much as 50 million tonnes of electronic and electrical waste (e-waste) a year, weighing more than all of the commercial airliners ever made. Only 20% of this is formally recycled.
  • worth over $62.5 billion
  • Global e-waste production is on track to reach 120 million tonnes per year by 2050 if current trends continue,
  • ...8 more annotations...
  • $62.5 billion, more than the GDP of most countries.
  • Less than 20% of e-waste is formally recycled, with 80% either ending up in landfill or being informally recycled – much of it by hand in developing countries, exposing workers to hazardous and carcinogenic substances such as mercury, lead and cadmium.
  • improper management of e-waste is resulting in a significant loss of scarce and valuable raw materials, such as gold, platinum, cobalt and rare earth elements.
    • mtedd003
       
      The resources not consumed but still existing in landfills.
  • circular economy in which resources are not extracted, used and discarded, but valued and reused
  • Nigerian Government, the Global Environment Facility and UN Environment announced a $2-million investment to kick off the formal e-waste recycling industry in Nigeria.
  • 100,000 people work in the informal e-waste sector in Nigeria.
  • PACE is a public-private collaboration mechanism and project accelerator dedicated to bringing about the circular economy at speed and scale.
  • The UN E-waste coalition is a group of seven UN agencies who have come together to increase collaboration, build partnerships and more efficiently provide support to Member States to address the e-waste challenge.
  •  
    The Platform for Accelerating the Circular Economy (PACE) is a public-private group consisting of more than 50 heads from various internal and external organizations. The group intends to fight the route cause of e-waste by repairing the method for which technology is recycled. The plan of action is to establish a circular economy. Materials are consumed, trashed, and eventually sent to landfills or sent for workers in toxic unsafe conditions to extract the precious materials. The world produces 50 million tons of e-waste annually, accumulating a worth of almost $62 billion. 80% of e-waste is improperly recycled in dangerous polluted conditions, creating an environmental hazard and unethical work conditions. Valuable resources such as gold, are also lost due to this poor method of recycling.Nigeria is one of the many countries that has exploited thousands of workers in the recycling of e-waste. In an effort to reform this issue, the Nigerian government has invested $15 million to employ PACE's circular economy. The design of a circular economy allows for products to be either made for longer use or recycled in a sustainable way. The circular economy will allow for a more efficient and environmentally friendly method of harvesting these resources while providing sustainable job opportunities.
emilywest5

Social media and tourism: creating a social media marketing plan | WAM - 0 views

  • Digital marketing in tourism has always been an important factor, just like in hospitality, and is positioned in the epicenter of the user’s tourism experience. Both small and large companies in tourist destinations have to be aware of this and take advantage of the new opportunities that arise in the sector. Tourism and technology go hand-in-hand and we can’t understand one without the other.
  • Trends on social media set the path and companies are required to revise their marketing strategies so that they are present on Instagram, Facebook, and LinkedIn. The numbers don’t lie; there are 4.2 billion social media users around the world and they don’t use social media for just news, laughing at memes, or following celebrities. They are using social media to share opinions, choose travel destinations, and learn about brands. Social media tourism has an audience.
  • Social media allows us to connect with our audience on a much deeper level. You create not just brand awareness with your audience, but also an awareness and a real empathy between the user and the product: a strong bond that brings us loyal clients and creates new business opportunities thanks to mouth-to-mouth, which adds a great value.
  • ...10 more annotations...
  • At the intersection between social media marketing and tourism, it’s very important to plan. Creating strategies, structuring your actions, and linking each new campaign to a concrete goal is key.
  • Your digital marketing plan for tourism can be the key that opens doors to a multitude of new clients, if you know how to do it:
  • Strategy 
  • Tactics
  • Action 
  • Control 
  • Research and contextualize potential clients, analyze and evaluate the shopping behaviors of your clients and their consumption habits, and create a profile with highlighted data
  • We have to know what is happening on each social network, what content is the most successful, which function is the worst, as well as their reach and the engagement that we have within the community.
  • The plan is equal to Visibility + Proactivity + Reputation (P = V + P + R).
  • How do we obtain visibility?
  •  
    This article explains social media in hospitality and tourism. I really loved the explanation of the SOSTAC method which stands for S-Situation analysis/ Who are we? O-Objectives/ Where do you need to go? S-Strategy/ How you'll meet the objectives T-Tactics/ Details of strategy A-Action/Do your thing C-Control/ How did you do. This method was created by PR. Smith in 1990. It was created for digital strategy, and we still use this method nowadays. This technology helps us define our goals and KPI's as well as understand the buying process, what audience we need to cater to to have a successful following and monetary outcome as well as how to keep that momentum.
cmogu001

How POS systems are transforming the hospitality industry | By Joshua Smith - 1 views

  • technological advances are changing the way we live our lives – and for the hospitality industry, the most dramatic developments are taking place thanks to the latest, highly sophisticated POS systems
  • Gain a competitive edge with speedy payment systems
  • Today's hospitality outlets are utilising new payment functionalities that remove the traditional, time-consuming ritual for customers of waiting for service staff to bring them the bill.
  • ...6 more annotations...
  • Three new ways for customers to pay
  • contactless payment has become a mainstream way to pay, and the results for business are beginning to show.
  • contactless methods of payment are having an especially beneficial effect, allowing lines to move faster as transactions are processed more efficiently
  • A fantastic time-saver for takeaway outlets in particular, pre-payment systems work by allowing the customer to place their order and pay online.
  • customers can simply pick up their order and walk away, saving precious minutes out of their lunch hour, while the restaurant can serve a greater number of people in the same amount of time.
  • Taking the pre-pay concept one step further, mobile ordering allows customers already in your bar or restaurant to place their order at their seat, using their smartphone.
  •  
    This article expounds how technological advances in POS systems are changing the way different organizations in the hospitality industry do business. The article explains how each business can gain a competitive edge with speedy POS payment systems as well. According to the article, there are three new ways for customers to pay that includes contactless methods of payment , prepay, and mobile ordering. All of these new features are having an especially beneficial effect, allowing lines to move faster as transactions are processed more efficiently. The article further explains how future POS trends goes beyond faster payments and quicker queues. Modern POS systems offer the unprecedented access to detailed customer data that focuses on individual customers' patterns and preferences. In conclusion, with all the benefits that the latest technology offers, it stands to reason that he latest POS systems hold the key to the future of hospitality.
  •  
    This article was really interesting. I liked the different methods it referenced with regards to how customers can pay, as I know those methods are really becoming integral to the industry. I also like how it talked about how businesses can use data mining to find out exactly how fruitful these innovations will be or how they are helping the businesses that have already installed them. I'm interested in seeing what new technological innovations occur in the future, especially with regards to how people pay for their meals.
bnort002

What Restaurants Need To Know About Pay-At-The-Table | News | Hospitality Magazine (HT) - 1 views

  • The payment method can’t come to the POS – customers aren’t going to turn over their PIN or smartphone – so the POS has to come to the customer.
  • Higher table turns
  • Less waiting for customers, higher tips for servers
  • ...9 more annotations...
  • Best practices for rolling out pay-at-the-table  
  • Reductions in identity theft
  • 8 Best practices for rolling out pay-at-the-table
  • Reduced chargebacks
  • Train servers not only to use the pay-at-the-table technology, but also to inform customers why it’s being implemented – chiefly, to keep their card data secure.
  • Determine whether you should use Bluetooth or Wi-F
  • Larger establishments typically opt for Wi-Fi terminals which can support their larger footprint by roaming across multiple access points and leveraging reliable, wireless LAN networks already in place
  • The terminal can simplify tipping by offering suggested tip amounts or percentages.
  • Most restaurants report that pay-at-the-table systems pay for themselves within a year, due to benefits such as increased table turns.
  •  
    This article talks about the importance of the pay at the table technology due to cardholder data and new methods of payment such as Apple Pay where you pay via your smartphone. This article also addresses the positives of having an at the table pay system. Some of the benefits are higher table turnover and higher customer satisfaction. I like how the article mentions that the servers need to be trained to use the system but also inform the customers as to why this method of payment is being used- to keep their data secure.
krehman

Three Ways to Overcome Hotel Accounting Challenges - 0 views

  • Managing payroll is a constant challenge, so it’s critical for hoteliers to have a way to monitor daily labor costs, manage overtime, oversee daily payroll transactions, and have access to simple reporting functions.
  • Adopting a cloud-based reporting system can offer seamless labor monitoring and management from clock-in to paycheck while giving hoteliers on-demand management of earnings to manage transactions in real time.
  • Hoteliers may have a difficult time deciphering what story the data is telling and which levers to pull to remedy an issue or to replicate success. Business intelligence and analytics tool can point to where efficiencies can be improved and how to best reduce expenses.
  • ...7 more annotations...
  • Adopting an operations management platform that allows hoteliers to import data into one centralized dashboard combines critical accounting and performance data to aid hoteliers in identifying trends and making more informed decisions.
  • Hoteliers must expect the best but prepare for the worst and have a back-up accounting team in place ready to resume operations in the event of a disaster.
  • While increased corporate travel demand and a healthy economy paint a rosy picture for the hotel industry, the report also warns that the lodging ecosystem is vulnerable to threats from multiple fronts.
  • These unique challenges require hotels to be nimble, educated, and equipped with the latest technology to streamline processes and drive financial performance.
  • Hotels live or die on the ebb and flow of fluctuations in their business.
  • hotel-specific accountants can scale on demand to offer the needed expertise and ramp up quickly.
  • Because the hotel industry has a very specific set of needs, it is imperative for hoteliers have the right tools to navigate today’s challenges. The global travel industry shows no signs of slowing down any time soon, so hotels must incorporate cutting-edge technology to streamline operations, optimize labor management, and access critical data while preparing for the next unexpected event.
  •  
    This particular article on hospitality and tourism accounting states that the global travel industry is expanding at an accelerated rate. Although there are high demands in corporate travel and high level of satisfaction in the economy, the ever growing industry is vulnerable to many risks given by its consumers. Just as much as the guests utilizing these hospitality services are becoming more pressing towards great prices and expressing concern in the quality of service they receive, hotel businesses are adamant about increasing awareness in cost and profit. To balance all these exclusive challenges, hotels are insisting on being educated and equipped with the most up-to-date technological advances to keep up with the ever demanding industry. With this in mind, the article states three methods to conquer the challenges faced today. The first method is to utilize a cloud based system to keep track of all the innumerous activities present to keep the business running. Due to the fact that a hotel is run by an overflowing amount of employees, all with different jobs and tasks, all using different systems respective to their departments, and require several types of pay (part-time, full-time, tipped employees) methods, it is a challenge to keep things efficient without a proper system. This is the reason why the article recommends using a cloud based system to keep track of the daily labor costs, overtime management, daily payroll transactions, and incorporate easy accessibility to reporting functions. The cloud based system will be beneficial in keeping everything in record beginning from the moment an employees clocks in to the end where they receive their paycheck, as well as, the ability to manage transactions. The second method is to centralize all the various sources of data. Hotels have a countless amount of data being stored. That can range from guest satisfaction satisfaction survey and comment reports, PMS data, to financial reports. With all these busy ac
  • ...3 more comments...
  •  
    The hospitality industry today is said to be one of the fastest growing sectors in the world, as demands for travel accompanied by a healthy economy has pushed a flourishing industry. As the industry grows, businesses are having to become more cost/profit-conscious while maintaining an increased importance on price, quality, and level of service, all the while sustaining a profitable organization. The article states that business owners are relying more on financial data to ensure maximum efficiency and profitability out of each and every contract. The article goes on to discuss three new smart-technology accounting solutions for various industry challenges. Cloud-based reporting systems are beneficial as the hospitality industry has many different waged employees that make payroll challenging; cloud-based systems make monitoring and managing staff significantly easier. With all of the varying data that the hospitality industry finds necessary, it is often easy to be overwhelmed with data/numbers. Data from one source may indicate trends in one direction while data from another source may contradict. Operations management platforms can be put into play that can decipher through the data and find out the important details like what efficiencies can be improved and how to best reduce expenses. These platforms combine critical accounting and performance data to benefit business owners by identifying trends and aiding better informed decisions. Lastly, the article finishes with how the hospitality industry can be unpredictable and that back-up accounting teams may be necessary in times of distress.
  •  
    This article mentions way to overcome hotel accounting challenges. The article mentioned that technology has been helping the industry increase revenue, minimize cost, and maximize profit without affecting the quality of the service. One of the ways the author mentioned was to use cloud-based reporting for labor. Hotels have many employees working at all different times of the day and their pay rate varies, therefore it is much easier to monitor labor cost, have employees clock in electronically, and complete payroll having an electronic accounting system. Another way is to centralize multiple data sources. "Hoteliers may have a difficult time deciphering what story the data is telling and which levers to pull to remedy an issue or to replicate success. Business intelligence and analytics tool can point to where efficiencies can be improved and how to best reduce expenses." As a manager, its easier to monitor all your reports on one page making it easier to point out the areas that need improvement. Lately, having back-up accounting teams is a smart idea. Hotels are 24/7 hour establishments that host rooms for the needs of many people. In case of a natural disaster, the hotel must have a team ready to tackle the challenges on making room for those guests in need. "The global travel industry shows no signs of slowing down any time soon, so hotels must incorporate cutting-edge technology to streamline operations, optimize labor management, and access critical data while preparing for the next unexpected event."
  •  
    MOD 9: This article is about how hotels are able to overcome accounting challenges within their industry. According to the article, the travel industry on a global scale is one of the fastest growing industries. While this is great news for the hospitality industry, the lodging sector is prone to vulnerability from trying to stay competitive while being cost and profit conscious and providing customized service. With these challenges, this article discloses three ways hotels can attempt to overcome them and they include cloud-based reporting for labor, centralize multiple data sources, and back-up accounting teams. When managing hotel staff, there are some challenges in overseeing that employees are compliant to their schedule, managing payroll and monitoring labor costs for each department. Implementing a cloud-based labor reporting system could help alleviate those challenges. A similar example would be like ADP, my own property uses this system to monitor labor costs as well as manage payroll and scheduling issues. With implementing multiple centralized data sources, it helps hoteliers to easily identify trends and help make more informed decisions based on the data shown from their data sources. With any property, it is always in their best interest to prepare for worst case scenarios which could be a natural disaster as an example. By establishing a back-up accounting team, hoteliers will be able to make more informative decisions with their back-up accounting team to match the changes of the industry after events like a natural disaster.
  •  
    The article discusses how hotels can overcome accounting obstacles. Firstly managing payroll is cumbersome, so a cloud-based reporting system can provide an easy way to monitor labour and manage overtime, and daily payroll transactions. Secondly, hotels have a difficult time to read data as data can come from a huge variety of sources: STR reports, PMS data, satisfaction surveys, comments. Hotels need a centralized dashboard which combines all critical accounting and performance data to assist hotels in making better decisions. Lastly, the article talks about hotels needing a back-up accounting team in case of disasters. In-house accounting teams may not be able to tackle on one-time event disasters and there must be a back-up team in place in times of urgency. The author, Scott Watson, executive vice president of sales and marketing at a cloud-based financial platform, sees that hotels are becoming more "cost and profit conscious" and I agree with him. Technology solutions are what hotels are craving right now to increase revenue, minimize costs, and maximize profits without sacrificing service quality.
  •  
    This article helps guides hotels in how to overcome challenges when it comes to the accounting department in any situation that deals with staff tracking, how to decipher intricate data, and what to do in emergencies. The article details the usefulness of the Cloud and keeping track of staff members that are FOH and BOH that are both hourly and salary. That the accounting department could simply look them up in the cloud rather than searching through paperwork to understand exactly what their role is in the hotel and pay them accordingly. The article also goes over how having multiple centralized data sources can help accountants understand information from reports, guest satisfaction questionnaires, and other forms of reporting to pinpoint exactly what needs to be changed to become more efficient in the company. Lastly, the article covers how having back up accounting teams could be a definite positive just in case of emergencies (i.e. weather) so accounting can still be in progress no matter what situation occurs and the hotel can run smoothly.
csendra004

Why travel brands need to be preparing for a new payments landscape - 2 views

Module 3: This article discusses the potential future of various payment methods and the recent innovations for companies obtaining payment. Within the hospitality business there are numerous ways ...

jorgeegutivav

Meeting the Threat in 2019: Cybersecurity for the Hospitality Sector | Modern Restauran... - 0 views

  • With a reputation as less well guarded than similar institutions, hospitality companies are a popular target for cyberattacks.
  • Experts warn other hackers, like those working for a nation-state, could exploit hospitality breaches like Marriott’s to acquire details on the travel and spending habits of espionage targets, like CEOs and diplomats.
  • permeable security in the hospitality sector threatens consumer privacy, shareholder value, and national security.
  • ...15 more annotations...
  • many hospitality companies are reconsidering their cybersecurity infrastructure. However, industry specific challenges like high employee turnover continue to expose the sector.[6]Additionally, even by adopting cutting-edge cybersecurity technologies, the important question of strategic implementation remains.
  • Are newly introduced technologies simply bolstering traditional methods of cybersecurity, or are they being used for methods of cybersecurity that are new and innovative, instead of simply faster or more efficient versions of the same product?
  • Traditional cybersecurity approaches are focused on reporting about intrusions after the fact, in what is known as an “incident response.”
  • Regardless of how they gain access, once an attacker is discovered, the forensics about the attack, including basic information known as Indicators of Compromise (IOCs) like IP addresses, domain names, or malware hashes, are shared across the cybersecurity community. These IOCs are then used broadly to thwart future attacks. 
  • The problems with this approach are twofold:
  • someone has to be a victim first so that IOCs can be derived and shared with others; additionally, blocking IOCs has a very short half-life.
  • All an adversary has to do is come from a new IP address or recompile their malware so that it has a new hash value (both of which are extremely trivial) and their attacks will sail through defenses that depend on IOCs.
  • As hackers repeatedly gain access to valuable systems and data using the same methods, cybersecurity teams continue to chase after them to secure compromised systems.
  • Very little cybersecurity effort is put towards addressing the methods used by adversaries; instead, security teams are locked in a pattern of waiting for inevitable attacks, trying to minimize the damage they cause, ensuring that remediation occurs as quickly as possible, and blocking only exactly identical attacks.
  • Incident response only helps prevent attacks that exactly replicate past ones.
  • a more proactive, sophisticated approach is needed. It will need to be designed to successfully recognize adversary methodology (and all the manners in which an adversary attempts to obfuscate their methodology) before attacks occur and at a meaningful scale.
  • Instead of seeking discrete, static IoCs based solely on what has already occurred, proactive cybersecurity analysts can instead use the intelligence they have derived about adversaries’ methodologies – commonly referred to as tactics, techniques, and procedures (TTP). 
  • From these TTPs, analysts can identify the general form and components of an adversary campaign. In addition, they can determine abstract indicators like how the adversary is attempting to hide his actions. 
  •  A proactive cybersecurity tool would be able to recognize possible adversary TTPs and indicators that describe a threat (or threatening behavior) in general terms. The system would then act on any traffic which met this pattern before it reaches inside a network, as the attack occurs, and do so in a way invisible to adversaries.
  • Using this basic model, a cybersecurity tool could truly prevent common exploits before they were executed, and could even predict and protect against future, not yet seen exploits.
  •  
    In the wake of the Marriott International cyberattack, the article presents the issues with the current issues in the methodology of cybersecurity; first explaining the data of how popular they are in the hospitality industry, and what it means for the industry, before going into the process of how a cyberattack happens and the measures taken to prevent it. Traditional cybersecurity is one of an "incident response" which can only be implemented once a cyberattack occurs and can only prevent it temporarily as a hacker can do similar tasks with different IP addresses and new malware. In order to circumvent this failure of cybersecurity, the article offers a new method in which TTPs (tactics, techniques, and procedures), are used to identify certain components of a hacker and identify how they would carry out an attack, before acting on it before the attack would "reach the network".
  •  
    This article discusses one of the largest fears of most hospitality firms, and that is keeping their client's personal information private. Most large companies in this industry have become giant data centers for the personal information of millions of people. Breaches of this type of information place the lives of many people at stake. For example, Marriott International had a security breach of over half a billion of its clients which began in 2014 and was not detected until September of this year. Keeping an individual's information away from malignant forces is just plain business sense and any more attacks of this manner will severely hurt the reputation of the business experiencing it.
anonymous

Restaurant Theft: The 5 Most Common Methods - 0 views

  • Fraudulent Tip Adjustment
  • The Wagon-Wheel Method
  • Providing Free or Overpoured Drinks
  • ...2 more annotations...
  • Voiding or Comping Items and Pocketing the Cash Difference
  • Unreported Food Waste and Eating Without Paying
  •  
    This article introduces the 5 common ways in which dishonest employees steal from restaurant owners and customers. Fraudulent Tip Adjustment, The Wagon-Wheel Method, Providing Free or Overpoured Drinks, Voiding or Comping Items and Pocketing the Cash Difference,Unreported Food Waste and Eating Without Paying. And to remind the restaurant management attention, and make targeted measures.
Mingxue Jia

Stop, look and listen before investing in hotel tech - 1 views

  •  
    Interesting article! The author appeals hotel managers to stop, look and listen before investe hotel teches. He point that in-room technology makes provide a good experience for the guests however the hotel owner have to pay much and the ROI decreased. In addition the writer notice that the manager should understand the real demands of travelers instead of installing high-end devices in the guest room.
  •  
    No matter in what kind of biz, before we make a decision to adopt new technology, it's better to do a SWOT analysis at first. In the hospitality industry, everything related to the relationship with people. What kind of service will accept by customers and what's the best method to provide are the basic questions need to be answered before take a new investment approach. In this artical, it piont out to be wait and see before tacking a new investment. There are some benifits to do this. 1, save money. 2, get the experience from others. 3, lower risk. No matter what kind of method you take, the basic rule is making decision from customer perspective.
Ashley Mullins

Automated testing of complex Web 2.0 applications prevents security vulnerabilities - 0 views

  • So far there are no methods to test complex web 2.0 applications systematically
  • developed a software system for checking complex web applications autonomously.
  • He says that the methods that web developers and responsible project leaders rely on to try to find programming errors and security holes in web applications have been too ineffective and inefficient.
  • ...1 more annotation...
  • developed the software system "Webmate", which determines automatically why Web 2.0 applications fail.
  •  
    There is internet fraud everywhere and the most common one these days is web application fraud. Saarland University have developed a software system that checks web applications autonomously which is convenient t for application users. Most methods fail but with Webmate we are able to figure out why it did so. Webmate is able to detect how the applications work and what virus are trying to interact with the application.
rebecca Bonet

Keeping hotel locks safe | Hotel Management - 1 views

  • Our Classic magstripe locks do not store critical security information within individual locks, such as master key information, and any service device must authenticate itself through diversified encryption methods to gain access to the lock software
  • VingCard Elsafe’s locks can also detect tampering and work to alert hotel security staff using the company’s VISIONLINE system. “[The VISIONLINE system] incudes alarms to alert the hotel front desk if someone attempts to tamper with a door lock as well as providing real time alerts to the hotel’s security staff when activity is detected that a card is being misused,”
  • Other alarms include detecting that a door is forced open, left open, or ‘mule tool’ intrusions when a door is opened from the inside handle without an occupant in the room.”
  • ...18 more annotations...
  • VingCard Elsafe provides comprehensive training on the technology for the hotel staff and encourages everyone who will have interaction with the locks to participate
    • TIANJIAN ZHANG
       
      Nowadays, locks security is an essential issue in hospitality industry. Actually, most hotels upgrate their locks systems with advanced technology. The role of technology in the security sector is fundamental, but despite the rapid technological progress, one thing has remained constant: the importance of trust. Whether hoteliers wising up to the fact that they've bought what could be called a flawed security system will be willing to trust the supplier of said equipment for a fix.
  • After installation, hotels must work to keep their staff trained and their system upgraded to keep pace with the latest security issues. 
  • As hotel locks become increasingly automated, preventing them from becoming vulnerable to security concerns has become a top priority for hoteliers.
  • As hotel locks become increasingly automated, preventing them from becoming vulnerable to security concerns has become a top priority for hoteliers.
  • When VingCard Elsafe moved the industry towards RFID technology, security was one key driver, and our primary focus was to add additional security to the RFID card to prevent cloning. To that end, VingCard Elsafe hotel locking systems do not work with cards that have no anti-cloning capability.”
  • As hotel locks become increasingly automated, preventing them from becoming vulnerable to security concerns has become a top priority for hoteliers
  • , preventing
  • As hotel locks become increasingly automated, preventing them from becoming vulnerable to security concerns has become a top priority for hoteliers
  • As hotel locks become increasingly automated, preventing them from becoming vulnerable to security
  • “  Our Classic magstripe locks do not store critical security information within individual locks, such as master key information, and any service device must authenticate itself through diversified encryption methods to gain access to the lock software ,” Shea said. “  When VingCard Elsafe moved the industry towards RFID technology, security was one key driver, and our primary focus was to add additional security to the RFID card to prevent cloning. To that end, VingCard Elsafe hotel locking systems do not work with cards that have no anti-cloning capability.”
  • VingCard Elsafe’s locks can also detect tampering and work to alert hotel security staff using the company’s VISIONLINE system. “[The VISIONLINE system] incudes alarms to alert the hotel front desk if someone attempts to tamper with a door lock as well as providing real time alerts to the hotel’s security staff
  • VingCard Elsafe’s locks can also detect tampering and work to alert hotel security staff using the company’s VISIONLINE system. “[The VISIONLINE system] incudes alarms to alert the hotel front desk if someone attempts to tamper with a door lock as well as providing real time alerts to the hotel’s security staff when activity is detected that a card is being misused,”
  • For instance, a ‘wandering intruder alert’ warns hotel security personnel when a card is presented to a number of different doors.  Other alarms include detecting that a door is forced open, left open, or ‘mule tool’ intrusions when a door is opened from the inside handle without an occupant in the room.”
  • After installation, hotels must work to keep their staff trained and their system upgraded to keep pace with the latest security issues.  
  • VingCard Elsafe provides comprehensive training on the technology for the hotel staff and encourages everyone who will have interaction with the locks to participate ,”
  • As with any hotel upgrade, hoteliers understand that renovation and upgrades are a regular part of running their business
  • Looking past RFID solutions for instance, VingCard Elsafe has made our RFID locks compatible with next generation technologies, like Near Field Communications (NFC), providing our customers with an easy upgrade path at reasonable cost.”  
  •  
    This article discusses the security issues with room keys. These hotel locks will not open with cards that are read as duplicates or duplicatable. The locking mechanism has been specifically designed to alert the front desk and secuirty departments in the event these locks are tampered with. I'm sure at one point or another we have all experimented with our room key and tried to open other doors. A system like this will prevent activity like that.
  • ...2 more comments...
  •  
    VingCard Elsafe, the global leader in hospitality security and part of the ASSA ABLOY Group, announces that it has phased out the use of brass metal plating and painting in the manufacture of its locking systems, opting instead to use a more eco-friendly process to color stainless steel. VingCard Elsafe has adopted a new method of metal coloration called physical vapor deposition, or PVD, an environmentally friendly process that involves vaporizing an alloy onto stainless steel within a heated vacuum. PVD requires no chemicals and produces no waste or hazardous materials of any kind, resulting in no environmental impact whatsoever. The PVD process has other added benefits, as well. PVD-treated surfaces have high wear resistance for discoloration, and the stainless steel adds enhanced anti-corrosion properties. Besides eliminating the negative environmental effects of the brass plating process, the move by VingCard Elsafe to simplify its lock manufacturing process has had other related green benefits. By doing away with the need for secondary surface treatments of the locks, new product components are now supplied directly from metal stamping to the point of use in the assembly line. This means less shipping and transportation is required for product manufacture, resulting in a diminished carbon footprint.
  •  
    VingCard Elsafe is a new kind of lock system, which contains RFID technology and is compatible with the Near Field Communications. It has several advantages compared to traditional magstripe locks. First of all, it can add security to the RFID card and prevent cloning, which is much safer than the traditional key card. Another is that it can detect tampering and know when and where staffs use the lock. It can send alert to the front desk. Moreover, the front desk can know when the door is forced open. However, before using the lock system, training program should be provided. So this new kind of lock system brings safety to the guests and to the hotels.
  •  
    This article talk about the issue that hotel are having with their security system lock for guest room. These cards are easy to duplicate. The new system will alert front desk or security if the lock has been tampered with. Other alarms include detecting that a door is forced open 'mule tool' instruction when a door is open from the inside handle without an occupant in the room.
  •  
    This article discusses the current state of hotel lock safety. Monitoring safety has changed as these locks become more automated. The article states that, "Hotel Management corresponded with Tim Shea, president of ASSA ABLOY Hospitality, for ways in which vendors are keeping hotel locks secure." Through VingCard Elsafe's locks, hotel security and safety has increased. VingCard says, "Our Classic magstripe locks do not store critical security information within individual locks, such as master key information, and any service device must authenticate itself through diversified encryption methods to gain access to the lock software." This is just one of the ways the locks increase security. The article also states that the system is cost-effective for hoteliers.
Gian Altamirano

Social media for hotels: What's the problem? - 0 views

  • In today’s marketplace, hotels cannot afford to ignore social media;
  • Some hotels don’t do social media at all, or make only a token effort (i.e., they set up the accounts … and then let them sit). These hotels are missing a powerful opportunity for: - Branding - Building and managing online reputation - Serving customers better - And last but not least, cultivating a new sales channel for direct online bookings
  • “Social Media for Hotels” is an 8-page white paper that breaks down social media for hotels into six basic steps or phases
  • ...2 more annotations...
  • make the strategy actually doable
  • Establish goals - Customize your social media site - Create unique content - Optimize content for your goals - Follow Through Online and Off - Track Data and Use the Results
  •  
    This article speaks about the possibilities in social media marketing for hospitality outlets as well as the method in which to effectively use these outlets without wasted efforts. Some of the things that this article suggests is simplicity. Once the social media use becomes too complex then employees won't continue to update it and therefore the marketing aspect dies. The article goes on to list several other methods of ensuring that the social media marketing will be effective. For reference and further information the article suggests a paperback by the name of "Social Media Strategy for Hotels". Overall this article is very effective at showing the capabilities and positives of social media marketing.
diana morales

Teachers, college students lead a Second Life - USATODAY.com - 0 views

  • "I build environments where students can really explore the literature," says Ritter-Guth, of DeSales University in Center Valley, Pa., and Lehigh Carbon Community College in Schnecksville, Pa. "It's the novel in 3-D."
  • "This is a new way to interact with me and each other," he says. "I can show them molecules in three dimensions. We can walk around the molecule and discuss it."
  • Bradley says only about 10 of his 200 organic chemistry students used Second Life more than once last spring. But those who did found it an effective way to study.
  • ...2 more annotations...
  • "Kids who used Second Life put more time into the class," says chemistry major Tim Bohinski
  • After the Virginia Tech shootings, he took his students to a memorial that had been built in Second Life. When they arrived, conversations became hushed, he says. "They felt like they were in a sacred place."
  •  
    this article was interesting to me in learning more about what we discussed in class regarding to second life. I believe that not only adults in universities but kids can become more in volved and learn faster using the second life method. Alot of people already seem to have fun using this method. I found it interesting when they brought up that a teacher took his students to a sanctuary place related to the Virginia Tech shootings in Second Life. I thought that the idea to create a sanctuary place on second life for students to grieve on unfortunate circumstances was a great way to put to use second life. It makes everything more interesting in my opinion.
1 - 20 of 388 Next › Last »
Showing 20 items per page