Skip to main content

Home/ Hospitality Technology/ Group items tagged monitor

Rss Feed Group items tagged

npate083

5 Ways POS Is Changing (And Why It Matters) - 0 views

  • Businesses have moved from traditional cash registers and stationary credit card readers to iPads and even mobile- or cloud-based POS systems.
  • Breadcrumb, a restaurant cloud-based POS system
  • Square allows businesses to transform iPads and smartphones into a POS system
  • ...22 more annotations...
  • One e-commerce solution is Shopify's POS system
  • the Shopify POS synchronizes and streamlines your financial and product information in a centralized dashboard.
    • npate083
       
      Shared commerce streamlines financial and product information in a centralized dashboard. It provides the user with real-time data and customer insight without having to run reports on multiple systems.
  • real-time data and customer insights
  • without the hassle of running reports on multiple systems.
  • Businesses should consider allowing mobile payments, as customers are shifting away from cash. 
  • businesses don't need any heavy equipment overhauls
  • Mobile credit card processing services (Square, PayPal Here, Flagship ROAMpay) simply require a credit card reader attached to a smartphone or tablet with the necessary mobile app, while mobile wallet providers (Google Wallet, Visa Checkout, Apple Pay) and loyalty mobile apps (Starbucks, Daily Deals) allow customers to pay directly from their smartphones or by using a POS scanner to read barcodes or QR codes on their screens.
    • npate083
       
      Mostly everyone is switching to mobile payment. It is much easier and convenient. As a business, it is vital to have mobile POS system so customers can pay directly from their phone.
  • New POS systems integrate real-time transactions with CRM solutions to help businesses increase sales and boost revenue
  • POS integration lets businesses create client records, CRM tasks and email marketing lists
  • ability to extract valuable information from POS transactions to help business owners make smarter business decisions.
  • to improve customer experience and acquisition
  • enable businesses to collect all types of customer data from POS transactions,
  • POS software tool
  • data-gathering and reporting features
  • Detailed reports include inventory and volume analysis, top-selling items, revenue and profit margin optimization, and staffing needs
  • Toast is a POS system
  • "restaurant operations by combining POS, front of house, back of house, and guest-facing technology on a single platform"
  • "monitor restaurant sales, labor costs, food costs, and more in real time, at home, and on the go with powerful reporting capabilities."
  • , POS systems need more security as the technology advances.
  • (IoT) – the interconnectivity and communication of devices, networks and physical objects over the internet
  • POS systems are more vulnerable than ever to hacks and data breaches
  • US-CERT recommends protecting POS systems by using strong passwords, ensuring you have the latest POS software updates, installing a firewall, using antivirus programs, restricting unauthorized internet access (such as for purposes other than POS transactions) and disabling remote access to POS systems.
  •  
    This article sums up the ways in which POS is currently changing. These ways include by using shared commerce POS systems, mobile POS systems such as Square and PayPal, integrated real-time transactions with CRM solutions, and POS security. 
  •  
    This article sums up the ways in which POS is currently changing. These ways include by using shared commerce POS systems, mobile POS systems such as Square and PayPal, integrated real-time transactions with CRM solutions, and POS security. 
leahesper

What Exactly is an HRIS? The Complete Breakdown - BambooHR Blog - 0 views

  • an HRIS system is the integration of HR activities and information technology.
  • It enables data entry, tracking and management for human resources, payroll and accounting.
  • most HR teams use an HRIS to help them improve their processes and stay organized
  • ...8 more annotations...
  • it’s good for everyone who works with HR to be familiar with a few HRIS basics like the variations and definition of HRIS, what an HRIS does, which organizations need HRIS, and how to best use an HRIS.
  • With an HRIS, you’ll never have to comb through filing cabinets or search through different versions of spreadsheets ever again. Every piece of information you need can be easily collected, tracked, updated, and searched in seconds.  
  • Many tedious HR processes are made quick and simple with an HRIS.
  • A good HRIS vendor will stay on top of regulations impacting HR and adapt their software to make it easy for organizations to meet compliance requirements.
  • When HR has fewer operational tasks to manage, they can spend their valuable skills and time on strategic HR initiatives that improve business outcomes
  • Improving retention, increasing productivity, and monitoring the company culture are just a few ways HR can spend their time when they have an HRIS.
  • Top-notch employees like top-notch employers. A good HRIS can help improve employees’ perceptions of their organizations.
  • Many of our clients say their HRIS helps them look like HR rockstars because of its convenience and ease of use.
  •  
    This blog tells you everything you need to know about an HRIS. What the benefits are, why you should get one and when you should get one.
  •  
    This article answers the question "What is an HRIS?" It is the integration of HR activities and information technology. This article talks about what it does, reasons to use HRIS, when you should get an HRIS for your business and how many employees an HRIS can handle. It also talks about some of the common features and even how to use it.
edagt001

10 Hospitality and Travel Marketing Trends You Need to Know | Campaign Monitor - 0 views

  • recent research from the Tippie School of Management shows that the majority of travel and hospitality bookings are moving from offline sources to online avenues. In fact, 53% of all travel is now booked online.
  • The best part is email personalization pays off with a 2.5x higher click-through rate and 6x more sales.
  • Customers expect personalization
  • ...9 more annotations...
  • Use information you know about a customer (booking date, check-in information, preferences, etc.) to create a customized onsite experience.
  • Fifty-two percent of marketers say video is effective for brand awareness (WowMakers). Fifty-two percent of marketing professionals worldwide say video has the best ROI (Syndacast).
  • Twenty-three percent of digital marketing budgets are now set aside for moment marketing. And did you know that travel and transport is the best-performing sector for moment marketing
  • hen it comes to mobile travel and hospitality bookings, growth rates between the years 2011 and 2015 reported an increase of 1700%, accounting for 18% of online revenues.
  • It’s no secret that one of the biggest challenges in the travel and hospitality industry is driving more direct bookings. In the hotel industry, reports show numbers of up to 81% of booking abandonments.
  • ocus on booking retargeting.
  • Yes, an important and current hospitality trend is that millennials are much more prone to travel than Gen Xers and Baby Boomers—for both business and pleasure.
  • According to research, more than 50% of millennials trust earned media more than they do owned media.
  • One of the fastest growing trends, as far as searching for answers on the internet, is voice search
  •  
    This article highlights some of the recommended techniques that companies in hospitality should follow in light of changing trends in hospitality. This includes personalized, social media marketing, mobile, dynamic and real-time marketing.
  •  
    This article talks about 10 ways for a hospititality based establishment to be in know of what is trending in market for them to be in touch with today's world.
allisonweets

Why is Computer Networking Important? | Digital Divide Council - 1 views

  • Information is the building block for effective communication.
  • This mainstream technology has proven to be an effective means to enhance proficient, flexible and streamlined communication while maximizing on productivity and resources.
  • Computer networking is a pool of integrated computers configured to one another.
  • ...18 more annotations...
  • Computer networking enhances seamless communication, cohesive functioning, and resource sharing.
  • Personal Area Networks are interconnected technology devices that serve a single individual within one facility.
  • LANs are limited to a single building like an official establishment.
  • MAN covers a distinctly larger are than LAN. MAN consists of configured computers covering a town, city or campus.
  • WAN covers a larger geographical area than MAN. The network connects a country or even continents.
  • HAN is a computer network limited to a defined boundary like a house or home office.
  • Computer networks reduce your hardware costs significantly.
  • Small equipment such as modern routers is expensive. The networks also need regular monitoring and maintenance.
  • This eliminates the need to buy single IT assets for each employee.
  • With a central server, you lower the number of storage servers needed. And you increase the efficiency of operations.
  • You can access your data from any device. This enhances free movement while accessing your data wherever you may be.
  • Computer networking is a massive boon to the communication landscape. Networking allows you to send and receive text messages and files in real time.
  • Employees can download and exchange corrupt files which expose your server to viruses and malware. Shared resources open doors of opportunities for security breaches.
  • resource pooling is efficient.
  • Computer networks are flexible, but employee productivity is a concern.
  • Quality technological solutions are a significant determinant of the success of any business.
  • Computer networking offers immense technological solutions to businesses and institutions in various formats.
  • “To win in the marketplace, you must first win in the workplace”- Doug Conant.
  •  
    Computer networking is essential within organizations to build effective communication and allows sharing of resources. Various forms of computer networks each serve a specific purpose based on the size of area being served. Computer networking has many advantages but also has drawbacks that must be considered. Networks have the ability to reduce costs, increase storage, enhance flexibility, and provide easy access to information. Despite this, computer networks are subject to the threat of security breaches and can be very costly for an organization. Employees may also find themselves being distracted by the vastness of information made available by the Internet. In all, computer networks can offer countless solutions to technological problems within organizations.
anonymous

Rakuten's CEO on Humanizing E-Commerce: Discovery Service for FIU Libraries. - 3 views

  • Amazon and many other companies. I think of those competitors as vending machines: They are hyper-efficient supermarkets with standardized offerings
  • If you go to a supermarket or a McDonald's in Japan, you'll find an extremely high level of hospitality and customer service -- in contrast to the atmosphere in most Western markets, where customers are much more focused on speed and convenience.
  • Today Rakuten is the world's third-largest marketplace for e-commerce, behind Amazon and eBay.
  • ...6 more annotations...
  • I'd learned that it doesn't matter how big your employer is -- what matters is how much value you yourself create. This view is the opposite of how success is seen in Japan, and my family was shocked when I said I was leaving my job in banking.
  • Rakuten merchants sell more than 10% of all the wine sold in Japan. They sell cars. They sell a lot of art. Recently they've started selling houses. Food is a really big category, even though nobody believed when we launched that food would become a mail-order business. Expensive chocolates are a very large category on Rakuten, and so is clothing -- 70% to 80% of what I wear most days was bought on the site.
  • When people talk about "social shopping" or "social commerce," they're referring to the fact that people like to connect with others for advice about purchases.
  • One potential downside of offering a decentralized marketplace with goods from thousands of merchants is that quality or service problems may occur. But Rakuten has found ways to avoid this. We have a tight screening process for people who want to open a store on our site. We monitor transactions. We have a survey program that allows customers to give feedback on shops, and if a shop consistently receives poor ratings and cannot improve, we'll kick it out. If goods don't arrive, we offer a refund.
  • ravel websites in Japan are quite different. They're set up so that hotels can edit their pages themselves and tell their own stories. That allows the hotels to make a connection with customers.
  • Mikitani believes that human beings need communication and connection. So instead of emphasizing efficiency and convenience, Rakuten tries to create a personalized, bazaarlike shopping experience.
  •  
    The article discusses how a service-based approach to e-commerce has tremendous value. The article focus on how Rakuten choose to infuse hospitality services, normally reserved for brick & mortar establishments on internet based business. Affording them the opportunity to generate profits by having access to this type of infrastructure at a fraction of the cost than if delivered in a traditional format.
  •  
    I enjoyed reading this article and learning more about Rakuten. Their business approach seems valuable particularly for the culture it serves. Being that he is familiar with Japanese culture and their preference for an interpersonal approach, Hiroshi Mikitani the CEO of Rakuten was able to veer from the norm of a standardized and process-oriented approach and build a successful business. Rakuten platform allows allows hotels to set up so they can edit their pages themselves and tell their own stories, which allows the hotels to make a connection with customers.
bhern082

11 new ways technology is transforming cruise ships - 6 views

  • from passport credentials to food preferences, and
  • you will be sent your wearable Ocean Medallion (the size of a coin, this can be worn as a bracelet or necklace) in advance.
  • . But some cruise lines have put millions into developing multi-faceted wearable technology that solves the problem entirely.
  • ...12 more annotations...
  • Royal Caribbean’s WOWbands ($4.99/£3.70 or free depending on ship and class of travel) look like watch straps, but use radio frequency technology to open your cabin door. You can use Carnival Corporation’s wearable Ocean Medallion (free to all guests) with the Ocean Compass app to order food, drink and retail items on demand. It also unlocks your cabin door as you approach
  • Interactive maps are becoming far easier to use than expected thanks to the digital way-finder on the MSC for Me app. Just indicate where you want to go, and a map will demonstrate how to get there from your current location.
  • A rather futuristic option is available on some AIDA Cruises and Costa Cruises ships in the form of a robot called Pepper, which provides guests with information, including how to ge
  • t from A to B
  • on board.
  • MSC Meraviglia has 114 interactive screens that allow you to book dinner as well as other activities, such as the theatre or spa, with few clicks and a swipe of your wearable bracelet
  • Carnival is launching MedallionNet soon (prices currently unavailable), which it says will be the fastest internet connection at sea and will provide pervasive cabin coverage. 
  • With MSC Cruises’ wearable bracelet, however, you can monitor your children in real-time and know where they are at any moment. T
  • With MSC’s interactive bracelet (or the Cruise Card) you can pay for everything, from your shopping session at the 100-metre high street to your evening meals. The wearable technology means staff quickly know who you are and your first language, which adds a sparkle to the customer service.
  • Personalised recommendations (such as which bottle of wine to try) will be offered on MSC Meraviglia in the not-too-distant future as part of the digital concierge service.
  • A modern take on arts and crafts can be enjoyed with the HP Sprout, scanner and 3D printer. Here children (around 7-12 years old) can design their own creations in the computer and then print 3D versions to take home
  • The days of cruise passengers feeling disconnected from the rest of the world while at sea are gone, which is good news for first-timers who may not have got their sea legs yet. 
  •  
    This article features 11 new tech features that cruise ships have implemented.Technology is transforming these floating hotels into smart cities. From remote check-in, wearable technology, to geo-locating your children aboard. These tech gadgets are helping cruisers enjoy their time aboard as stress free as possible. As stated by the author "Once on board, it didn't take too long to figure out how the MSC for Me app, public interactive screens, cabin TV and wearable bracelet, available for the first time on Meraviglia, all worked together to streamline and enhance life on board."
  • ...2 more comments...
  •  
    This is great technology and can most certainly be studied while in use to better assist guests in having that "stress free" vacation. The technology is personalized and almost seamless in using since they have made it into something of "jewelry" to help avoid it being an irritating app. I see this being developed in many more places other than just cruise ships and Disney. It is very convenient for the guests.
  •  
    I agree that this technology is very useful for guests. Personally, it would make me feel less like I was in a floating hotel and more like a floating city. I would enjoy the possibility of finding a solution to a problem that I was having without having to wait in line at guest services, which would potentially save me time and give me the ability to return to whatever onboard activity I was engaged in.
  •  
    I agree. I think this technology will be very beneficial for not just guests but also for the cruise lines. This helps collect data and help personalize the guest experience. This will have guests coming back time and time again. This also provides an incredible guest experience since they won't have to wait in long stressful lines. I think this technology is very beneficial for both the guests and employees.
  •  
    Cruise ships have really stepped up their game when it comes to technology. I wrote a paper last semester about Princess Cruise Line's latest technology, the OceanMedallion. This little wearable device allows guests to unlock a whole new level of different features such as room key, tracking system, and a bunch of different amenities. It will be interesting to see what other cruise lines come up with to compete with this.
brianamfernandez10

Cutting Through Environmental Issues: Technology as a double-edged sword - 0 views

  • Between 1870 and 1910, per capita income in the United States rose almost 40 percent, and the value of manufacturing output increased sevenfold.
  • It took nearly three generations before the first concerted efforts were made to bring pollution under control, but once begun, progress has been real. The air quality index for the United States now shows a 42 percent improvement since 1980.
  • Technology, in other words, is a double-edged sword-one capable both of doing and undoing damage to environmental quality.
  • ...11 more annotations...
  • All the world’s economies continue to face big challenges in using energy-the lifeblood of the industrial age-while maintaining environmental quality.
  • Reductions in both by 70-80 percent since 1977 would not have been possible without substantial innovations in, most notably, electronics.
  • In the United States, the energy sector accounts for more than 85 percent of total greenhouse gas emissions, with energy-related carbon dioxide alone responsible for about 80 percent.
  • Local generation by smaller plants can not only reduce transmission losses, but also improve air quality since they can be fueled by hydrogen and natural gas-much cleaner than coal on a per kilowatt hour basis
  • Industrial and vehicular emissions, particularly of nitrogen oxides, are also detrimental to water quality.
  • Technology and policy are now beginning to address runoff pollution, but it is hard to measure, much less control, because it stems from widely scattered, “nonpoint” sources.
  • the tools of geographic information systems (GIS) using remotely sensed data have offered new ways to identify and observe these sources
  • The technologies raise some privacy concerns, for instance, that could lead polluters to cloak or hide their polluting activities, further inhibiting pollution monitoring and cleanup
  • Bioremediation treats about 5-10 percent of all toxic chemicals and other hazardous waste; has successfully treated oil, gasoline, toluene, naphthalene, pentachlorophenol (a fungicide and wood preservative), and agricultural waste; and is being used at more than 30 munitions test areas across the United States.
  • These benefits must be balanced against what some critics view as potentially large drawbacks. One concern is that bioremediation may largely immobilize rather than fully remediate contamination. Another is that instead of reverting to its original state, the site will be transformed in some unexpected way. A third concern is that the potential risks of adding genetically altered organisms to the environment, or even redistributing naturally occurring ones, may not be fully understood. The Information Revolution
  • The Information Revolution
  •  
    This article goes into depth explaining how technology affects the world that surrounds us. Although technology brings so many good things to our lives, and allows the world to constantly evolve, there are of course harmful things that come along with it. It can affect air quality, the quality of water, land, etc. Over all affecting the quality of life for those affected by this issue. As we evolve with technology, it becomes more of a issue to maintain and to properly dispose of systems no longer being used. This article describes different advancements that are being made in to help resolve this issue.
sabrinajalane

https://www.hotelmanagement.net/tech/10-ways-smart-technology-reshaping-hotel-industry - 0 views

-From operations to guest experience to marketing, smart hotel technology offers a variety of cost savings and revenue opportunities, and it is enabling hotel owners to reach new levels of profitab...

Technology hospitality hotel Tech

started by sabrinajalane on 27 Sep 20 no follow-up yet
esuarezrijsdijk

The Messy Business Of Reinventing Happiness - 0 views

  • Iger planned to pump nearly $1 billion into this venture, called MyMagic+, a sweeping plan to overhaul the digital infrastructure of Disney’s theme parks, which would upend how they operated and connected with consumers. At the core of the project was the MagicBand, an electronic wristband that Iger envisioned guests would use to gain entry to Disney World and access attractions; make purchases at restaurants; and unlock their hotel room doors. It would push the boundaries of experience design and wearable computing, and impact everything from Disney’s retail operations and data-mining capabilities to its hospitality and transportation services.
  • Disney World, Parks’ crown jewel, seemed to be losing its luster. According to multiple sources, certain key metrics, including guests’ “intent to return,” were dropping; around half of first-time attendees signaled they likely would not come back because of long lines, high ticket costs, and other park pain points. Simultaneously, the stunningly fast adoption of social media and smartphones threatened the relevance of the parks. If Disney wanted these more tech-oriented generations to love it as much as their parents, who had grown up with fewer entertainment alternatives, had, it would have to embrace change now.
  • There were the endless lines for rides, food, and bathrooms; parents juggling maps, hotel keys, baby carriages, and bottles of SPF 75; and kids pulling families on long treks to try to visit every attraction. The park was filled with complications, such as a tiered ticketing system with wonky rules.
  • ...12 more annotations...
  • The NGE team had big dreams for the MagicBand. It would need to interact with short- and long-range sensors that would be installed around the park. The short-range sensors would let guests scan their MagicBand at sales terminals in Disney park stores to pay for merchandise, for example, or to seamlessly check in at their hotel.
  • The long-range sensors would allow Disney to track guests as they navigated the park. The potential benefits were manifold. By monitoring where crowds were forming, the company could better optimize flow.
  • The MagicBand would also collect valuable consumer data.
  • The tussle over digital access points,
  • The tussle over digital access points
  • where customers would use their MagicBands to enter each ride, was typical of the dysfunction between Frog and Imagineering.
  • More than 28,000 hotel doors needed their locks replaced in order to connect wirelessly with the MagicBand, even as some 80% of the rooms at Disney’s resorts, on average, were occupied. Two dozen workers spent eight months upgrading 120 doors per day. The company rolled out 6,000 mobile devices to support MyMagic+ in the parks. More than 70,000 cast members got MyMagic+ awareness training, with 15,000 learning service-specific tasks for, say, FastPass+ kiosks or MagicBand merchandising
  • Disney World’s physical infrastructure, which was first built in the late 1960s, needed major capital improvements. Two hundred eighty-three park-entry touch points needed to be upgraded. Much of Disney World lacked a Wi-Fi connection, so in order for guests and cast members to take advantage of MyMagic+ and its mobile apps (which would offer a map service and real-time wait times for attractions), the company had to install more than 30 million square feet of Wi-Fi coverage.
  • There is no line at the main entrance to the park, where cast members and a row of polished, golden digital access points greet me, and it takes just seconds to stream through with my MagicBand. According to Disney, the MagicBand has cut turnstile transaction time by 30%. Park capacity has also increased.
  • “Honestly, it’s not so magical,” one cast member tells me about MyMagic+, echoing a common sentiment I hear from park employees during my visit. “It’s just for your hotel room [door] and paying for things.” When you look closely, there’s less to MyMagic+ than what some on the team had hoped for.
  • MyMagic+’s rocky rollout makes the Imagineers’ case for conservatism in the face of technological change seem sound. A slew of problems reared up after launch
  • The Imagineers and Frog certainly did disagree during the MyMagic+ development, as did many others, and that disagreement had repercussions and costs. But it ultimately led to a successful conclusion. What Staggs calls “constructive discomfort” is what sophisticated collaboration is all about.
  •  
    This article offers a telling account of how Disney developed and implemented the MyMagic+ initiative, providing important insights into how major corporations approach massive tech-related capital investments. Among the most salient takeaways: 1) how Disney recognized that the parks' pain points could be addressed through the public's growing predilection for personal, always-connected; 2) how these massive internal projects can pit different departments against each other, and how sometimes that antagonism can lead to beneficial results; and 3) how a project like MyMagic+ can have a profound positive impact on the company and still be considered by many to have not fulfilled its potential.
sharline86

What the Marriott Breach Can Teach Us About Cybersecurity in the Tourism & Hospitality ... - 0 views

  • Marriott breach that compromised the records of up to 500 million customers. The data breach occurred through the IT company, a third party, that managed the Starwood reservation database.
  • Marriott took too long to disclose this breach.  Even though the breach was found in September, disclosure did not occur until nearly three months later — and ultimately, the company failed to protect valuable customer information. The company is already the subject of class action lawsuits that could have a severe impact on the organization.
  • Over the last 3+ years, the Tourism & Hospitality sector has been very average (if even just a bit below) when it comes to cybersecurity performance as compared to other industries.
  • ...5 more annotations...
  • Since 2016, nearly 5% of the tourism & hospitality entities that BitSight tracks (out of a total of almost 2,000) have experienced a publicly disclosed data breach. This is the 4th highest percentage of breach out of the 23 key sectors BitSight monitors, trailing only healthcare, education, and government.
  • Though it is often assumed that larger organizations perform better in cybersecurity, the data on Fortune 1000 companies in this industry suggests otherwis
  • For example, Fortune 1000 tourism & hospitality companies are performing poorly compared to the sector as a whole when it comes to reducing unnecessary Internet exposures (“Open Ports”).
  • For all companies, tourism & hospitality has the 2nd highest percentage of companies with an Open Port grade of D or lower (Education is 1st).
  • Ultimately, cyber incidents like the Marriott breach confirm that companies in this industry need to be much more about proactively mitigating the risk posed by their supply chain given the sensitive consumer information they contain in their databases.
  •  
    Bitsight examines the 2018 Marriott reservation management database breach. Using the breach as an example, this article shows how poorly the hospitality and tourism industry performs in cybersecurity versus other sectors.
anonymous

Survey Shows US Cybersecurity Attacks Costing Orgs More Money - 0 views

  • Survey Shows US Cybersecurity Attacks Costing Orgs More Money
  • Cybersecurity attacks are leading to estimated financial losses of an average of $884,000, according to an IDG survey.
  • "As organizations prepare for various attacks and breaches, hackers continue to be savvier in their approaches,”
  • ...6 more annotations...
  • “Resilient organizations must have all employees embrace security practices, from awareness training to behavior monitoring to gap protections."
  • Firewalls, spam filtering, network-based antivirus tools, access controls, and encryption were listed as the most effective solutions for detecting or deterring external threat factors.
  • The top three types of cybersecurity incidents also differ depending on whether it was an insider or outsider threat. The report found that outsider threats tend to consist of the following: Unauthorized access to/use of information, systems, or networks Customer records compromised or stolen Confidential records (trade secrets or intellectual property) compromised or stolen
  • The average cost of a data breach is $3.62 million globally, according to the 2017 Cost of a Data Breach Study: Global Overview sponsored by IBM Security and conducted by Ponemon Institute.
  • "Data breaches and the implications associated continue to be an unfortunate reality for today's businesses," Ponemon Institute Chairman and Founder Dr. Larry Ponemon said in a statement. "Year-over-year we see the tremendous cost burden that organizations face following a data breach.”
  • Cybersecurity incidents stemming from insider threats will include private or sensitive information being unintentionally exposed, customer records being compromised or stolen, and employee records being compromised or stolen.
jalipman

Sun, Sand and Cyber: Does the Hospitality Industry Need to Invest in Cybersecurity Now?... - 0 views

  • To ensure businesses are in the best possible position to compete during and long after the Coronavirus pandemic is over, both customers and employees need to be educated on the security measures on offer to feel comforted in this brave new business climate. 
  • For businesses to feel empowered against today’s many challenges, a consistent approach to risk management is absolutely crucial. A CISO with the authority to carry out real change and impart strong governance across the business would be hugely valuable.
    • jalipman
       
      An entity to regulate and update cyber security in order to keep all information safe would be very helpful. But it could be argued that an organization that has access to all systems could pose a larger risk to cyber security than it would negate.
  • These burdens come into sharper focus when you consider the digital environment in which hotels are operating. Individual hotels are often connected to the organization’s national or international network, meaning only one hotel has to be breached before the entire company is at risk of hemorrhaging huge volumes of its data.
    • jalipman
       
      This is a good example of why every hotel needs to be constantly updating and on alert for cyber attacks because if one hotel server is compromised the entire national system is at risk.
  • ...9 more annotations...
  • Most crucially, a cybersecurity strategy must include a solid plan for Business Continuity and Disaster Recovery in order to prepare for any worst-case scenarios. In the era of COVID-19, incidents of the worst kind are fast emerging and businesses deserve a fighting chance to succeed.
  • The root of this cyber crisis lies in the way hotels are hampered by disparate legacy systems and out-of-date software where breaches are rife for the taking, particularly on hotels’ Point of Sale (POS) systems and other external vendors. Adding to this, hotels often outsource their customer IT connectivity but unfortunately forget to consistently monitor and audit suppliers’ security measures. 
  • Today, the systems used for various functions in a hotel’s back and front operations are manned by employees who are not yet well-equipped to pick up on and counter large-scale cyber-attacks until it’s too late.
    • jalipman
       
      Simply put, hotels are not focusing enough on these attacks and their security systems are made primarily to identify and ongoing attack rather than preemptively stop them.
  • Mobile phones, tables and laptops connected to open networks become a hunting ground for hackers to harvest banking details through card payments. 
    • jalipman
       
      Not only is personal information stored but guests use these open networks for many different things allow hackers a direct link to the guests devices as well.
  • Worth billions of pounds, the hospitality industry is a perfect victim for cyber-criminals. Its make-up of luxury resorts and hotels alongside huge volumes of high net-worth individuals has fast become prey for hacker
  • While financial services and the public sector have been forced to endure an endless stream of cybercrime, the hospitality industry has also become a prime contender for hackers in the wake of its rich data-base. 
    • jalipman
       
      The constant influx of new information makes hospitality company databases prime targets for hackers.
  • No matter the size of the business, inefficient cyber support diverts crucial time from business activities and relationships with customers.
    • jalipman
       
      Not allocating for proper cybersecurity not only puts you at risk but takes away from time you spend on business when you are dealing with potential or ongoing threats that would have been better addressed by a proper cyber security system.
  • With global business fighting relentlessly to survive against the chaotic threat of the Coronavirus, all industries are exposed to criminal cyber-threats, and so the security of highly sensitive data must be handled appropriately.
    • jalipman
       
      In unprecedented times like we are currently going through things like cybersecurity will be put on the back burner in order to deal with issues at hand but this can create environments for cyber attacks.
  • British Airways and Marriott International are two major hospitality companies to be victims of high-profile breaches in recent memory. They serve as a stark reminder of the heavy costs faced when the safety of customers’ data is compromised. 
anonymous

What Is IT Security? - Information Technology Security - Cisco - 0 views

  • Although IT security and information security sound similar, they do refer to different types of security. Information security refers to the processes and tools designed to protect sensitive business information from invasion, whereas IT security refers to securing digital data, through computer network security.
  • Network security is used to prevent unauthorized or malicious users from getting inside your network. This ensures that usability, reliability, and integrity are uncompromised. This type of security is necessary to prevent a hacker from accessing data inside the network. It also prevents them from negatively affecting your users’ ability to access or use the network.
  • Internet security involves the protection of information that is sent and received in browsers, as well as network security involving web-based applications. These protections are designed to monitor incoming internet traffic for malware as well as unwanted traffic. This protection may come in the form of firewalls, antimalware, and antispyware
  • ...3 more annotations...
  • Endpoint security provides protection at the device level. Devices that may be secured by endpoint security include cell phones, tablets, laptops, and desktop computers. Endpoint security will prevent your devices from accessing malicious networks that may be a threat to your organization. Advance malware protection and device management software are examples of endpoint security.
  • Applications, data, and identities are moving to the cloud, meaning users are connecting directly to the Internet and are not protected by the traditional security stack. Cloud security can help secure the usage of software-as-a-service (SaaS) applications and the public cloud.  A cloud-access security broker (CASB), secure Internet gateway (SIG), and cloud-based unified threat management (UTM) can be used for cloud security.
  • With application security, applications are specifically coded at the time of their creation to be as secure as possible, to help ensure they are not vulnerable to attacks. This added layer of security involves evaluating the code of an app and identifying the vulnerabilities that may exist within the software.
  •  
    IT security is a set of cybersecurity strategies that prevents unauthorized access to organizational assets such as computers, networks, and data. It maintains the integrity and confidentiality of sensitive information, blocking the access of sophisticated hackers. IT security includes Network security, Internet security, Endpoint security, Cloud security, and Application security.
marble_bird

Hotel_ITSec.pdf - 0 views

shared by marble_bird on 15 Jul 20 - No Cached
  • During the past decade, information technology (IT) has significantly changed the way the hotel industry controls and manages operations. While many technologies have been utilized, some newer technologies have emerged in the literature and in practice, and many of them impact the hotel’s security.
  • Among the results, this study identified a gap between hoteliers’ understanding of IT budget adequacy and the adequacy of installed IT security systems.
  • Advancements in technology are increasing at a remarkable rate. As technology becomes more important, organizations that do not keep up with these advancements could lose business opportunities to other competitors that do
  • ...53 more annotations...
  • The four leading technologies which have showed a high adoption rate from the industry and have received attention from academia are: self-service, wireless, green, and security technologies. The advantages of these technologies for hoteliers include enhanced customer services and operational efficiency (Doyle, 2007), decreased guest wait times, more efficient methods to settle bills (Singh & Kasavana, 2005), reduction of energy costs (Meeroff & Scarlatos, 2007), and protection of sensitive customer data and credit card numbers
  • In addition, exploring the influential factors of security system usage will provide greater depth of knowledge with respect to why some hotels have adopted more security systems than others.
  • there is still a lack of understanding of the nature of risk associated with inadequate IT security, especially among operators of hotels that do not have their own IT departments.
  • Self-service technologies are commonly defined as devices or applications which permit users to produce a service independent from the direct involvement of the service provider (Meuter, Ostrom, Roundtree, & Bitner, 2000). The use of self-service technologies in the hotel industry has grown considerably, especially in the areas of self check-in, in-room check-out, and foodservice kiosks
  • IT systems refer to general support systems such as mainframe computer, mid-range computer, and local area network.
  • Some of the most significant wireless technology applications involve the use of mobile handheld devices, such as personal digital assistants (PDA), tablet PCs, and cellular phones, or RFID (radio frequency identification). RFID utilizes computer chips and antennas, allowing the chips to wirelessly communicate with a receiver.
  • While the major usage of RFID in the hotel industry was for inventory control purposes, it also has the potential to be utilized in ways that can provide more conveniences for the guests.
  • Other possible uses include placing RFID tags on items of high value as a means of theft prevention or integrating tags into guest loyalty cards for easy identification
  • IT investment that lowers environmental impact and IT that manages the environmental impact of other systems are commonly referred to as “green technology”
  • Many hoteliers might think becoming more environmentally friendly will cost more for their hotels. However, it has been demonstrated that “going green” is not only the right thing to do for the environment but also provides tangible bottom-line benefits for hotels by reducing consumption of energy and water, as well as other related costs.
  • Some of the risk factors involved include reliability, security, and privacy issues
  • A hotel with more technologies being utilized will install more security systems than those with fewer technologies.
  • Many of these attacks involve attempts by thieves to gain access to customer credit card data, and these attempts constitute a major portion of the risk inherent in IT security
  • if a system is breached and the merchant is not PCI compliant, the merchant then is responsible for all costs associated with improperly used credit card information taken from that system (Kress, 2008). These losses could bankrupt a business if the security breach goes undetected for even a short time.
  • IT security systems are those measures taken to protect the confidentiality and integrity of proprietary data.
  • two main paradigms of adoption are believed to occur: bottom-up adoption and top-down adoption.
  • Thus, it is reasonable to assume that organizational factors (e.g., financial factor, human resource) will influence the implementation stage of security systems at a hotel.
  • A hotel with sufficient IT budget will install more security systems than those with insufficient IT budget.
  • That is, if a hotel does not have its own IT department, it will have a negative influence on successfully installing or maintaining necessary security systems.
  • A hotel with its own IT department will install more security systems than those without.
  • Overall, the state of IT spending on security continues undiminished because managed security services are required for almost every application (Communications News, 2007).
  • risk associated with a breach of IT systems security (e.g., network break-ins) is very high. Consequently, no sector of the business community is exempt from attacks on their IT systems, with an attack being defined as a technique used to exploit a system’s vulnerabilities.
  • Given the importance of security and privacy at a luxury hotel, this study expects luxury properties to have installed more security systems than other segments
  • Most hotel employees use their property management systems for hotel operations and should be able to check their e-mails.
  • To justify the low response rate, previous studies which have compared response rates of mail and e-mail for surveys were reviewed.
  • the large majority of respondent properties do not have their own IT departments. Second, the people making IT decisions generally do not have IT backgrounds or training. Third, the large majority of respondent properties have little more than firewalls or antivirus software to protect their proprietary data, and these systems alone are not adequate to meet PCI standards, as they do not take steps to encrypt and protect cardholder data, maintain a vulnerability management program, implement strong access control measures, regularly monitor and test their networks, and maintain an information security policy as required by the Security Standards Council.
  • The respondents were asked to select from a total of fourteen securities related systems
  • The profile of the respondents revealed that they were experienced hoteliers with more than ten years experience in the industry
  • Fifty-three percent of the respondents reported that they were with chain hotels that would be considered mid-range properties with an average of 175 rooms (median of 107). Over 80% of the respondents reported working in operations, while fewer than 4% reported working in either IT or engineering (Table 1).
  • Nearly 70% of the respondents’ properties did not have their own IT department (69.2% did not have, and 30.8% had their own IT departments, n = 234, missing data = 10).
  • Fifty-three percent of them (n = 244) thought the most important goal for hotel technology would be enhancing the customer’s experience.
  • second identified goal was utilizing technology to help generate revenue (41%)
  • differentiate properties from their competition (20%), to lower expenses (16%), and to increase security (6%).
  • Internet kiosks in the lobby represented the most frequently used self-service technology (36.5%, n = 244), followed by kiosks for airline check-in/board pass
  • With respect to security systems currently in use, antivirus security systems represented the most frequently used security system (92.2%), followed by hardware firewalls, software firewalls, physical security, and encrypted login security systems.
  • intrusion detection was the most frequently identified system (15.6%), followed by vulnerability assessment scanning (13.5%), Internet scanning (13.1%), antivirus (11.5%), digital ID server (11.5%), and nonreusable passwords (9.8%; Table 2).
  • Thus, the hypothesis was supported that there was a linear relationship between the three factors and the adequacy of security systems.
  • The positive standardized coefficient (β) of .389 indicates that there was a statistically significant (p < .001) linear relationship between IT usage (the number of wireless, self-service, and green technologies a hotel was using) and the adequacy of security systems
  • The study revealed certain things of interest, the most significant of which is the need for greater emphasis on IT security among hoteliers.
  • only about 30% of all respondents reported having their own IT departments. Since budget hotel properties are extremely unlikely to have an IT department, it is highly likely that the very large majority of IT decisions throughout the industry are being made by hotel operators for whom IT is not their primary area of concern.
  • Furthermore, the focus of hoteliers for future IT implementations is enhancing the guest experience (53%) and generating revenue (41%). Very few respondents (6%) identified increasing security as a 5-year IT goal.
  • While almost all respondents use information systems as part of their jobs, very few are trained in the development, maintenance, and secure use of these systems.
  • no correlation was found between the respondents’ perceived adequacy of their IT budgets and the adequacy of installed security systems, as adequacy of IT budget did not appear as a significant term in the regression analysis.
  • Nearly 10% of respondents do not have so much as anti-virus protection for their systems, and nearly half do not even take simple physical precautions to protect their IT systems.
  • we note that no correlation exists between the respondents’ perceived adequacy of their IT budgets and the number of installed IT security systems, as the number of installed systems was not a significant factor in the regression analysis.
  • The sample obtained in this study represented the targeted sample: over 80% of the respondents were working in hotel operations. Furthermore, the purpose of this study was to explore hotel operators’ insight of technology usage, IT budget, and security measures rather than to confirm existing theories or to generalize the results.
  • it is reasonable to conclude that the respondents did not have an adequate understanding of the nature of the IT security hazards facing them for the average property does not have installed systems adequate to meet PCI standards, yet they reported having adequate budgets.
  • In order to adequately protect proprietary data, one must have an understanding of network security, which is an understanding apart from software functionality.
  • Properties with their own IT departments, however, reported that they had a higher number of installed IS security systems than did those properties without their own IT departments.
  • roperties without their own IT departments, in particular, have a less adequate understanding of their IT security needs than may be necessary.
  • This study found hoteliers’ lack of attention to security provision, training in IT, and PCI compliance can place hoteliers at great risk. For example, the cost of a single incident at a noncompliant property could result in the loss of the entire business.
  • It will be useful to examine the reasons why luxury properties are more likely to employ adequate security measures to determine whether this greater use is attributable to better understanding of security issues or some other factor.
  • The study was limited by the nature of online surveys; the response rate was quite low. Future studies could test the proposed research model via paper-based mail surveys to increase a response rate.
  •  
    This article covers a study performed on various hotels to determine management's level of IT knowledge and security implementations in relation to the hotel's IT security budget. The article discusses four types of technology impacting the hotel industry and how management responses to trending technology can affect a business, particularly in terms of a data breach and overall security. The study finds that an alarming percentage of hotel managers are not adequately informed on the risks and procedures of IT management and security, and many do not have proper IT security measures in place despite having an appropriate budget.
robfitzpatrick

5 Signs Your Hotel Should Invest in Technology - Hospitality Tech News - 0 views

  • Integrated booking systems, social media, smartphones, metasearch, property management systems, artificial intelligence, and advances in smart appliances
  • smoother processes that make their lives easier and provide improved guest experiences
  • using technology to look and book their next trip, including hotels.
  • ...14 more annotations...
  • In 2018 digital travel sales
  • reach $694.41 billion
  • hotel technologies remain the new frontier for hoteliers who want to reach and attract more travelers to their properties.
  • most of their marketing budget on online activities
  • Direct bookings remain more profitable for the hotel industry
  • Other than metasearch and mobile sites, make sure you have a well-designed website and an efficient booking engine
  • digital foundation as very important in the coming years for ensuring personalized guest experiences
  • personalization of experiences
  • to enhance guest satisfaction by providing a seamless experience.
  • closely monitor the guest cycle by collecting data on specific guest preferences, locations, and behaviors, which helps in providing personalized services to the guests in the future.
  • The hotel technologies ensure enhanced guest experiences, increased employee productivity, and improved operating efficiency.
  • room status updates, queuing rush rooms, and maintenance tasks.
  • leisure travelers reading an average of 6-7 reviews before booking
  • investing in an online reputation management tool is crucial for every hospitality business.
  •  
    The article highlights the hospitality industry's issues by not adopting and investing in new technologies and the solutions to those problems. In 2018 digital travel sales worldwide reached $694 billion, indicating that having an online presence is a must to reach and attract more travelers. Hotels have increased spending on marketing techniques with metasearch and online travel review sites to increase online visibility. A majority of marketing budget spending now goes into online activities. The goal is to drive more direct bookings, and these techniques, along with mobile sites, are effective distribution channels. In addition to this, hotels are investing in reputation management tools to maintain a positive online reputation. Over 95% of travelers read reviews before booking reservations, so having a positive presence is crucial. Technology is also driving the personalization of the guest experience. Investments into services like mobile check-in/check-out, keyless entry, smart climate and lighting control, location-based digital guided tours, and in-room tablets enhance guest satisfaction and provide a more seamless experience. With the emergence of the pandemic, this technology is getting pushed to the forefront of investments as must-haves to comply with new regulations and gain consumer confidence in coming back. This technology also collects data on your guest's preferences and behaviors, which will lead to better personalized services on their future stays. In addition to enhancing the guest experience, it also enhances your hotel operations. Investing in technologies increases employee productivity and improves operating efficiency.
jessielee214

2019 Hotel Accounting Trends Are All About the As | Hospitality Technology - 1 views

  • From an industry perspective, the next chapter of hospitality accounting will be all about the three “A’s”: apps, automation and analytics. Faced with greater demands in 2019, hoteliers will be forced to find new forms of automation to speed up financial processes and improve visibility on the backend, while enticing guests to utilize mobile apps through enhanced personalization on the frontend.
  • Mobile app reporting not only streamlines efficiencies and allows easier access to data, it also allows today’s hotelier to be more agile. GMs and other personnel can be on the go and still have KPIs, productivity data and real-time stats in the palm of their hand.
  • Good data supports good management. As more guests tap into hotel apps on the front end, hoteliers can track, analyze and adjust their offerings on the backend to meet guests’ needs, all while supporting a business synergy and strategy that makes sense.
  • ...31 more annotations...
  • Increased automation will remove manual workloads and streamline processes. Putting the right industry-specific accounting software in place will be a game-changer for hotels looking to pinpoint inefficiencies and significantly reduce expenses across property lines.
  • During the next wave of hospitality technology, more and more hoteliers will recognize the power of analytics and adapt their strategy accordingly. Smart operators will seek out the most versatile technology on the market to collect and store information through data warehousing, which enhances data mining, analytics reporting, decision support and business forecasting.
  • Hotels have already begun replacing front-desk employees with apps, robots and automated kiosks. As a result, finding high-quality labor (at a reasonable cost) is no easy task.
  • As we continue to live in an increasingly customized world, hoteliers will seek targeted accounting tech partners to replace one-size-fits-all solutions.
  • Apps/AI Over the last decade, the hospitality industry has developed a fixation on mobile technology that has revolutionized hotel management. In the next phase, this trend will continue with full force—and any service that is currently delivered using pen and paper will eventually make the shift to mobile.
  • Hoteliers are already using their mobile apps for real-time data analysis, allowing them to make informed decisions whether they are on property, near their work areas, in the field or on the fly.
  • Predictive analytics and forecasting tools will continue to allow management teams to better anticipate and adjust decisions to meet future guest needs without sacrificing bottom-line results.
  • While there has been significant introductions with regard to guest-facing apps, and apps focused exclusively to enhance the guest experience, the untold value in mobile apps, for the operator, is behind the curtain
  • Automation Rising demands from guests will require hotels to be more responsive than ever. To keep up with the pace, managers will need to access an array of critical information on-the-fly, from in-house guest preferences to upcoming reservations, restaurant volumes, spa bookings and so forth—with automatic alerts set up that notify staff members when there’s a deviation from the plan related to forecasts or scheduling changes.
  • By combining varied data sources into one centralized location, or data warehouse, an API-powered data system will provide a holistic snapshot of entire portfolio raw data into a user-friendly format with gauges, dashboards, trendlines and more to equip hoteliers with the answers they need to impact bottom-lines.
  • Analytics The phenomenon of “big data” has infiltrated the professional world, spanning industries and transforming all facets of business, from accounting and operations management to marketing and business development. No longer bogged down by paper and binders, today’s hoteliers can access numerous data sets at every turn, from STR reports to PMS documents and guest satisfaction surveys.
  • On a micro level, big data will help property managers faced with countless day-to-day decisions make more informed choices on the floor, from keeping track of labor expenses to assessing the cost of a new light fixture.
  • On a macro level, corporate and regional managers will have the extended oversight necessary to ensure the right decisions are made at every level of the company from the ground-up.
  • And finally—partnering with a hotel-specific provider will continue to be invaluable for hoteliers to speed up their internal processes, minimize investment, reduce errors, and increase overall performance to make more informed decisions on the horizon.
  • the next chapter of hospitality accounting will be all about the three “A’s”: apps, automation and analytics.
  • Apps/AI
  • this trend will continue with full force—and any service that is currently delivered using pen and paper will eventually make the shift to mobile.
  • significant introductions with regard to guest-facing apps, and apps focused exclusively to enhance the guest experience, the untold value in mobile apps, for the operator, is behind the curtain.
  • Mobile app reporting not only streamlines efficiencies and allows easier access to data, it also allows today’s hotelier to be more agile.
  • interact with and enhance the guest experience by being more available and more attentive on the floor. Removing the chains and restrictions of the desktop and expediting report compilation, hoteliers can truly begin to refocus on delivering the best experience possible without worrying about becoming mired in the weeds of business ineffeciencies.
  • Predictive analytics and forecasting tools will continue to allow management teams to better anticipate and adjust decisions to meet future guest needs without sacrificing bottom-line results.
  • Good data supports good management. As more guests tap into hotel apps on the front end, hoteliers can track, analyze and adjust their offerings on the backend to meet guests’ needs, all while supporting a business synergy and strategy that makes sense.
  • Automation
  • managers will need to access an array of critical information on-the-fly, from in-house guest preferences to upcoming reservations, restaurant volumes, spa bookings and so forth—with automatic alerts set up that notify staff members when there’s a deviation from the plan related to forecasts or scheduling changes.
  • Increased automation will remove manual workloads and streamline processes. Putting the right industry-specific accounting software in place will be a game-changer for hotels looking to pinpoint inefficiencies and significantly reduce expenses across property lines.
  • Analytics
  • Smart operators will seek out the most versatile technology on the market to collect and store information through data warehousing, which enhances data mining, analytics reporting, decision support and business forecasting. These capabilities will result in increased efficiencies, reduction of expenses and improvement of overall performance and profitability.
  • Over the next five years, the advantages of having a big data strategy will be infinite. Hoteliers who decide to apply big data in a meaningful way will reap the rewards in every facet of their business, from sales and marketing to guest satisfaction. On a micro level, big data will help property managers faced with countless day-to-day decisions make more informed choices on the floor, from keeping track of labor expenses to assessing the cost of a new light fixture. Using consistent data monitoring and evaluation, hotel teams will be able to deliver a higher level of service while making informed strides every day.
  • Technology and Labor
  • Effective labor management technology can help proactively notify management when there’s an issue and eliminate overtime before it happens to ensure that guest satisfaction remains high while balancing profitability. Mobile and dashboard data related to key functions that consume labor will become the GM’s best friend.
  • finally—partnering with a hotel-specific provider will continue to be invaluable for hoteliers to speed up their internal processes, minimize investment, reduce errors, and increase overall performance to make more informed decisions on the horizon
  •  
    Accounting trends in the hospitality industry are always evolving with technology. Hotels are looking for technology that will catch their data and analyze it all while delivering it in a more user friendly app. Apps, Automation & Analytics are the A's of hotel accounting and technology.
  • ...1 more comment...
  •  
    Currently, accounting is about three different things. First, there are apps. Apps can be used to help hoteliers make informed decisions based off the analysis of real-time data. They are able to make these decisions from basically anywhere. Second is automation. Automation helps get rid of the looming manual workloads most hotels endure. The third thing is analytics. In today's hospitality industry, hoteliers are able to access data sets from wherever they may be. According to this article, apps, robots, and automated kiosks have already started to replace front-desk employees.
  •  
    Accounting cannot be without data. In my opinion it is mainly about data analysis. With automation and analytics, it will be more reliable and descriptive. Apps helps mainly in its portability and time efficiency.
  •  
    The article talks about three future trends called A's - apps, automation, and analytics. It makes examples of their function and works. In my opinion, the A's can use in any industry, not only in hospitality. They can help us work more efficiently and shorter working hours.
kristenagosto21

AI in the Hospitality Industry: Pros and Cons - Hotel-Online - 0 views

  • AI can assist hospitality professionals to improve the experiences of travelers. In fact, the use cases of AI in the industry is quite impressive, and the technology seems to be well-positioned to enable people to enjoy their stay.
  • Six service delivery robots perform such duties as taking amenities to guest rooms and patrolling the buildings. According to reports, the company has saved the security team 111 manhours, as human employees could now watch live footage provided by robots instead of monitoring the facilities themselves. In addition to saving time, the robots also help with handling unexpected staff absences and high occupancy periods more effectively
  • Pro: The Ability to Enable Travelers to Research Travel Options with a Chatbot This one is also about personalization. A recent study done by Booking.com revealed that 75 percent of customers preferred self-service options to get answers for simple requests, which makes chatbots a perfect option in this case.
  • ...3 more annotations...
  • According to ChatbotGuide.org, Booking.com’s chatbot is capable of handling about 50 percent of users’ post-booking accommodation-related requests. In case it can’t provide an appropriate answer, it redirects the user to a human customer service team member.
  • Con: AI is Still Developing Even though AI has made tremendous progress in recent years, the field is pretty much in its infancy. In fact, Andrew Moore, Google’s vice president and an AI leader, has the following to say on this matter, according to CNet: “AI is currently very, very stupid… It’s not something we could press to do general-purpose reasoning involving things like analogies or creative thinking or jumping outside the box.”
  • Con: Data Privacy Issues This is one of the most pressing concerns that all businesses looking to take advantage of AI will face. Data collected by the technology during interactions with users can be potentially used for other purposes, therefore, the risk of data privacy violation is involved.
  •  
    In this article, Donald Fomby discusses the Pros and Cons in the Hospitality Industry by giving great examples of AI being used in the industry today.
ovila009

Proximity Marketing Examples: 28 Retail Companies Nailing it with their Campaigns | Bea... - 0 views

  • Unacast’s latest Q4 Proxbook report confirms that beacon deployments are on track and the numbers align with ABI Research’s forecast of 400 million beacons to be deployed by 2020
  • we bring you a comprehensive list of 28 retail companies that are making a mark with their proximity marketing campaigns via beacons.
  • Eat touted this move as a “strategic pillar” in its communications because it allowed the company to access more information about customer behaviour and drive business intelligence to make precise decisions about how consumer behaviour can be influenced.
  • ...35 more annotations...
  • As a part of this program, the chain tapped a popular Turkish loyalty app called Shopping Genie, to target customers while they were around the premises of a local McD Café.  Customers got mobile coupons, via the app, which prompted them to purchase a coffee and receive a beverage from the new drink line for free. This proximity marketing campaign via beacons helped McDonald’s achieve 20% conversion rate with 30% of users who received the promotion!
  • Bluetooth beacons were deployed at the point of purchase, where customers were waiting in line to pay or just moving around.
  • These beacon notifications offered two Red Bull cans for $4! Apart from making a profit out of campaigns, Red Bull also monitored the entire campaign in real-time and captured customer behaviour.
  • The retail giant used GE light bulbs to house beacons and send push notifications of specials and discount coupons to in-store customers. These beacon-equipped LED bulbs can track shoppers within a store by using the beacons hidden inside them
  • Carrefour has extensive iBeacon networks in all 28 of its hypermarkets in Romania through which the retail chain offers its consumers a simple, intuitive, and fun app for orientation inside hypermarkets from area to area
  • The retailer’s beacon-enabled app automates the commercial content delivery and collects essential data about in-store consumer behaviour. Its proximity marketing campaign keeps consumers informed about the products, services, and actual special offers from each of the store departments.
  • Popular convenience store group Nisa piloted iBeacon technology to track its shoppers by attaching Bluetooth Low Energy (BLE) beacons to trolleys and baskets
  • These sensors picked up the signals emitted by beacons and collected location data which was then fed to a cloud-based server for analysis.
  • used iBeacon technology to gamify the Ladies’ Night event with brands providing offers, discounts, freebies, and prize giveaways. Many retailers such as Hotel Chocolat, Krispy Kreme, Cath Kidston, and House of Fraser, participated in the event
  • The event was highly successful as it saw more than 500 app downloads within the first three hours, with over 500 offers redeemed. All 120 hotspot offers were redeemed within the first 52 minutes of the event.
  • Best Buy implemented a beacon strategy to help boost sales and improve personalisation of experience. The retail giant chose to use their own application as well as Shopkick retailing app to offer rewards to shoppers, simply for stepping foot in the door.
  • Hammerson rolled out beacons across their shopping centres to improve personalisation of consumers’ shopping experience. Their beacon-enabled Plus app was initially trialled at Les Terrasses du Port in Marseille and it ranked among the top 10 lifestyle apps in France.
  • The app also allows a consumer to call for assistance. A member of the staff receives the request informing them that a customer is waiting for help
  • UK supermarket Waitrose started using iBeacon technology at its relatively new experimental Swindon store to deliver price promotions to consumers when they were near a particular aisle or food counter
  • UK supermarket giant Tesco launched its “biggest trial” of iBeacon technology, in partnership with consumer goods company Unilever, by deploying beacons in 270 stores across London. They launched the ‘Mpulse app’ as a part of the Pink and Black marketing campaign
  • using beacons to target passers-by based on their interest. They change campaigns based on distinct seasons including prom season at colleges
  • Oscar Mayer worked out an interesting deal with the supermarkets which would allow them to place beacons at the deli counter. This location helps them convince shoppers to buy the specials of the week while waiting at the counter.
  • Amazon, the retail giant started a new convenience store in Seattle, U.S. in Jan 2018. Amazon Go is an 1800 sq feet mini market filled with food and technology. They have deployed an array of cameras, beacons and other proximity sensors to make the store one-of-a-kind
  • World-famous brands such as Hamleys, Armani, Longchamp, and Hackett form the 80% of the retail companies that have deployed beacons in their Regent Street stores with the aim of pushing exclusive and personalised marketing messages to customers via iBeacon technology. Shoppers receive alerts and tailored content about everything, from new in-store promotions to exclusive offers only available for visitors to Regent Street, as they pass
  • Neiman Marcus, the high-end retail chain, piloted beacons at three stores—Austin, TX, Walnut Creek, CA, and San Antonio.
  • Rite Aid has installed beacons in over 4,500 US stores for retargeting and personalization of user experience. This large-scale beacon deployment by the Pharmacy chain is the largest beacon installation program in a retail setting till date. In fact, it has even surpassed the one undertaken by the famous Macy’s
  • a collection of beacon-level proximity data to strategize their retargeting plan and achieve personalization capabilities similar to those that have been used in e-commerce
  • Walgreens has innovated considerably in the mobile retail space by using iBeacon and other technologies at over 7000 locations.
  • leveraged iBeacon technology at ten of its stores to boost its loyalty program.
  • Target, the second largest general merchandise retailer in the US, announced that it will start testing beacon technology in 50 of its stores nationwide.
  • The recommendations may appear both as push alerts and in-app updates on the Target app’s “Target Run” page, which is designed like a social media news feed offering deals, top-pinned items on Pinterest, and more
  • beacons to bridge the gap between online shopping and in-store experience. Their beacon-enabled app notifies consumers if any item in their mobile shopping bag is in stock,
  • The store has deployed beacons with individualized campaigns for each department, which makes the customer experience interesting and focussed
  • Macy’s expanded its beacon program to all stores nationwide, by installing more than 4,000 beacons. This step was a part of the retailer’s efforts to make bigger investments in omnichannel retail technologies. This Thanksgiving, Macy’s also used a beacon-triggered mobile app game at its 700 stores, to engage shoppers
  • Urban Outfitters announced that they will be rolling out beacons at 15 of their stores located in Philadelphia, Boston, New York, Atlanta, New Jersey, and Delaware, more than a year ago. The US multichannel fashion and homewares retailer decided to take a different route unlike the conventional route of using aggressive promotions.
  • Kenneth Cole is using beacons to create more compelling, personalized customer experiences with an aim to “provide value and offer at the time of need when customers are in the store
  • launched beacon networks in more than 100 of its top-performing stores located in states such as Chicago, Dallas, Miami, New York, and San Francisco. The idea was to implement iBeacon technology at the stores with the highest traffic levels and best traction with Shopkick.
  • Supermarket giant Woolworths successfully completed a beacon trial with one store using iBeacon technology to improve customer service around click-and-collect. Thereafter, the chain announced that they are looking to roll out beacons across all of its 254 click-and-collect stores with the aim of allowing consumers to place their order online and pick them up in-store
  • it has decided to distribute free BLE beacons to about 150,000 gas-station convenience stores in the United States and Canada
  • Alex and Ani used beacons in all of its 40 stores to optimize store layouts and product placement. Contrary to popular belief that beacons are only for ‘pushing’ ads, the popular Rhode Island-based jewellery brand used beacons differently in its trial period without using them to promote flash sales and other discount promotions.
  •  
    the article gives examples of retail stores and how they use proximity marketing to promote their products
zhuan007

The Importance of Offsite Backups - IT Directorship - 0 views

  • Just as saving a file periodically is good practice, keeping an offsite backup will help to mitigate the business risks associated with corrupt or lost data. Offsite backups combined with a disaster recovery plan allow businesses to get back up and running faster
  • The key to protecting your business and its stakeholders, is the proactive prevention of data loss – never keep all your data in one basket.
  • A cold site is usually an empty space with basic facilities which may or may not have equipment available.
  • ...3 more annotations...
  • A hot site is the most expensive option but requires the least amount of time to get back to capacity following a disaster.
  • Its important to stay up to date on policy changes to ensure you are protecting both the business and business stakeholders.
  • Monitoring, reporting and testing your business's backup solution are all best practices to mitigate the risk of data loss for your business.
  •  
    This ariticle briefly summarizes the important of offsite backups for business. A couple offsite backup solutions are provided as cloud backups, remote disaster recovery sites, tape backups. The concerns of policy changes and improving backup practices are mentioned as well.
jlewinsky

Hotels: Are Your Cyber Defenses Ready for 2021? | Hospitality Technology - 0 views

  • Two of the top five biggest data breaches made public in 2020 were at hotel chains. Attackers stole personal information including names, emails and addresses from 5.2 million guests at Marriott and 10.6 million guests of MGM Resorts.
  • To ensure a swift recovery from COVID-19, the hospitality industry must shore up its cybersecurity protections — or risk more headline-making breaches in the future.
  • Risk is especially high at hotels because attackers have multiple points of entry.
  • ...14 more annotations...
  • Breaches undermine hospitality brands’ reputations and erode customer trust. Eighty-one percent of consumers will stop engaging with a brand after a breach, according to a 2019 study.
  • When it comes to cybersecurity, companies today have two options: Defend the fort or devalue the data. The former is the more traditional approach. By strengthening the digital “walls” around your data — via firewalls, intrusion detection, 24/7 monitoring and other security protections — the defend-the-fort approach works to keep attackers from accessing your systems at all.
  • However, one of the biggest vulnerabilities may be on the hotel grounds themselves.
  • hotels have multiple point of sale (POS) terminals across different locations, from the front desk to restaurants, all of which are connected to each other. If a POS device is not properly secured, attackers can use malware or other attack vectors to steal clear-text credit card numbers and other data.
  • POS attacks remain one of the most common causes of data breaches in accommodations and food services.
  • Guests may share their credit card numbers with the hotel in advance via a booking app or website, opening up the possibility of web-based attacks. Loyalty programs are another source of online vulnerability, with an estimated $1 billion a year lost to account fraud and related crimes.
  • One important and underutilized aspect of cyberdefense is employee training.
  • Make sure your employees use strong passwords and know how to spot fraud and spear phishing attacks. You may also want to limit employee access to confidential data, so if an account gets hacked, private guest information doesn’t go with it
  • You should also make sure your software is up to date with all security patches, as attackers often exploit known weaknesses in programs. Isolating POS devices from the rest of the network can also limit the damage from malware infections at that entry point.
  • it’s unlikely that even the strongest digital “walls'' will prevent all incursions. Defenses are important, but the ever-changing nature of technology means that new, hard-to-catch vulnerabilities will pop up all the time.
  • important to devalue your data, rendering it unusable to attackers who gain access to your systems. One way to do this is to implement point-to-point encryption (P2PE) by encrypting payment information from the moment it enters your network at the POS
  • Encrypted data is unintelligible to anyone who doesn’t have the right digital key. Implementing P2PE is the only way to ensure that clear-text payment data doesn’t fall into the hands of attackers targeting POS systems with malware.
  • Data that’s stored for the long term, like passport information or credit card numbers saved to a loyalty program, can also be devalued through tokenization. Data that’s tokenized gets replaced with an alphanumeric pseudonym, so the actual sensitive information isn’t stored on your servers. This method helps secure guest information beyond the initial transaction at the POS.
  • Hotels that reckon with their security vulnerabilities now will protect themselves from fines and other fallout from data breaches as business rebounds. They’ll also build deeper, more trusting relationships with customers by keeping their personal information secure. By strengthening security protections and devaluing their data, hotels can set themselves up for a brighter future. 
  •  
    This article describes the vulnerabilities in the security systems of the hotel Industry. The POS system was recognized as one of the most vulnerable areas that are more targeted by hackers. This is due to the multiple stations where the POS systems are located on the premises of the hotel. Likewise having POS systems independent of the hotels security system left the system open to hackers. Two options to defending the cyber-defense, are digital walls and employee training. Digital walls works by keeping hackers from accessing the systems. Although even with a strong firewall it is recommended to implement point-to-point encryption (P2PE), this encrypts payment information of guest. the other is tokenization. This uses alphanumeric pseudonym to protect data stored for long periods of time. Another way to prevent cyberattacks is employee training, encourage the use of strong passwords an dhow to detect fraud and phishing attacks.
« First ‹ Previous 361 - 380 of 458 Next › Last »
Showing 20 items per page