Skip to main content

Home/ Hospitality Technology/ Group items tagged protecting

Rss Feed Group items tagged

8More

Cybersecurity: A modern hospitality challenge - 2 views

  • These examples show that cybersecurity is an essential concern for both our private and our professional lives, as it can avert potentially disastrous information leaks.
  • The hotel Wi-Fi, for example, could be used to access guest’s private devices, such as mobile phones and laptops, or personal guest information could be leaked from hotel servers and databases if their protection is lacking
  • hey are a specially weak spot for hotels, as every process, be it online bookings, drinks at the bar or treatments at the spa, requires payment by credit card.
  • ...4 more annotations...
  • T
  • The hotel’s problems start with a loss of trust and therefore business by the guests who were affected, and go on to legal issues which could potentially lead to time and money consuming lawsuits.
  • his could include staff training and awareness, regular system checks, as well as the conducting of regular risk assessments.
  • By being ready and equipped to deal with such incidents, the impacts of cyberattacks can be managed and therefore lessened.
  •  
    This article explains how hotels are very prone to cyber attacks since they store personal information of millions of travelers every day. They need to win over the trust of the guests.
27More

Getting E-waste Right | Green Lodging News - 8 views

  • In the past decade, televisions have grown bigger, then flatter, then bigger again. The emphasis is on the new: buy now, because your old television is clearly, decidedly obsolete.
  • The demand for the current and the top of the line strikes a chord especially in the hospitality industry.
  • equal to, or greater than, those offered by their competitors.
  • ...22 more annotations...
  • The result is a product cycle that matches the pace of innovation:
  • Between consumers and businesses, an estimated 50 million tons of electronic waste is disposed of each year. Some of that is recycled properly. The rest is not.
  • Nearly 400 million units of consumer electronics are sold per year. Relatively light regulations and recycling standards result in th
  • Multiple Solutions for Hoteliers Despite the doom and gloom, there are a multitude of solutions to the hospitality industry’s e-waste problem.
  • The remaining 86.4 percent made its way into landfills,
  • Old TVs and computer monitors contain lead, cadmium and brominated flame retardants; all of which are hazardous to personal and environmental well-being.
  • 90 percent of the e-waste that is recycled is sent overseas.
  • Developing countries have become ground zero for e-waste collection
  • . According to the U.S. Environmental Protection Agency, only 13.6 percent of all e-waste was recycled properly in 2007
  • That hotels upgrade their televisions is not an issue as long as their existing units are recycled properly
  • It starts with awareness:
  • Then hoteliers can move to change a different statistic:
  • , hoteliers should seek out domestic recyclers and take care of their e-waste recycling with proven, safe commodities.
  • Environmentally responsible, eco-savvy hotels are in vogue right now, appealing to customers with promises of sustainable travel and accommodation
  • Sustainable building materials, recycling services and even linen reuse programs are tangible ways for guests to see that their hosts are eco-conscious.
  • Green Hospitality with a Backbone
  • Green hospitality makes money, but it mustn’t be without a backbone.
  • Actual green hospitality outweighs the appearance of green hospitality
  • organizations hop on the sustainability bandwagon, it is more important than ever that recycling becomes permanent,
  • This means actively looking for and implementing recycling solutions, not simply shipping our problems overseas.
  • e recycle and reuse more than ever. B
  • E-waste recycling, for most people and companies, is not a day-to-day occurrence, which means we should be ready to handle it when the time comes
  •  
    This article is based on how we can improved e-wastes on doing little changes that will benefit on our future. Most of the e-waste is not recycle properly, we buy things after things and more after more, every time a new technology comes up there is the motivation on buying what is the lasted cool technology, and what about what we have , where does it go ? to the trash or recycle, but we do not know where that recycling goes, I believe learning more about it will help on our routine of how to recycle better and help with this process to proceed right.
  •  
    We quickly move to 'next' as far as technology goes and rarely think about how to get rid of it when obsolete. In the Caribbean for example, there are not may recycling plants for e-waste, in fact, many rarely do recycling on a whole. In the Turks and Caicos, disposing of a television or a phone is as simple as throwing it in the trash among everything else. What happens next? It goes into the landfills and there they lie. Imagine the toxic waste from over 40,000 inhabitants on a small island. While moving with the crowd seems to be the way of the world, I believe government entities must act swiftly in ensuring e-waste is disposed of correctly to preserve this island and its inhabitants for generations to come. The technology should not outpace the disposal thereof.
20More

The Property Management System (PMS) of the future is already here | By Max Starkov - 0 views

  • The traditional, legacy PMS is an on-premises software platform with features and functionality ranging from barebones to rich and very complex. These legacy platforms have a number of serious disadvantages: a) too expensive to install, train staff and maintain, b) their "all-in-one solution approach" stifles innovation and prevent quick adoption of new functionality needed to meet new guest requirements or sudden changes in the market conditions, like the contactless experience from last year, and c) as closed systems they are reluctant to open up to third-party integrations, applications and solutions, depriving the property and its guests from some very innovative and much-needed applications and services.
  • Some of the benefits of the cloud PMS are significant and timely: No upfront costs - its pay-per-use model makes it an operating expense (OpEx), which helps the constricted cash flow Easy to install, train staff and use which increases staff productivity Automation of many administrative tasks, saving the property team time and effort AI driven workflows and database management and intelligence Automatic software upgrades with minimum downtime and no extra cost No need for on-property IT support, which is getting quite unattainable in the post-crisis era Complete automation of redundant processes and tasks, allowing the property to operate with leaner staff The ever-changing data security requirements are handled by professional data security engineers at the cloud PMS vendor Provides guests with contactless guest experience and mobility. Upgrade and up-sell capabilities or easy integration with an upsells vendor, important in this depressed revenue environment Easy access to reporting and performance analytics from any device anywhere. Most importantly, an Open API for seamless, fast and free or low-cost connectivity with the myriad innovative third-party vendors out there. Ex. Oracle's legacy OPERA PMS has 400 API capabilities vs the OPERA Cloud PMS with 3,000 API capabilities.
  • he three main advantages of the OPERTA Cloud PMS over the legacy PMS:
  • ...14 more annotations...
  • Ability to achieve more with fewer resources,
  • Security of data
  • Ability to be agile, adapt and evolve
  • the three key advantages of the cloud PMS over the legacy PMS:
  • Flexibility:
  • According to Laura Calin from Oracle Hospitality, switching from a legacy to a cloud PMS has occurred traditionally when a) on-premises hardware reaches end-of-life and warranties are expiring, or b) when a brand affiliation comes to an end and a replacement system is required.
  • Connectivity:
  • I believe over the next 5 years the adoption of cloud PMS solutions will explode and this will be the highest growth component of the hotel tech stack
  • Why? Low costs, efficiencies, higher productivity and data security aside, in the near and mid-term a full-service 3-4-5-star hotel will need over 100 plus APIs with third-party tech applications and solutions to be able to function and meet the basic needs and wants of today's digitally-savvy travelers.
  • Ease and efficiency:
  • (PMS) is the hotel 's command center for rooms and F&B management, sales and catering, distribution, availability, pricing, reservations, guest interactions, issue resolution, housekeeping, reporting, billing, guest communications, etc. and is often described as "the central nervous system of the hotel operations."
  • Luckily for our industry, the future is already here in the form of a cloud PMS with Open API (application programming interface) integration platform, just on time in this most challenging era in our industry.
  • the three key advantages of the cloud PMS over the legacy PMS:
  • Ever since the emergence of the cloud-first PMS platforms like Cloudbeds and Mews, there has been a monumental shift in the PMS vendor community's mindset: from closed system mentality to cloud PMS with Open API mentality. At Oracle Hospitality, with the adoption of the Oracle's self-service cloud technology tools, the OPERA Cloud PMS with Open API has become the most important innovation strategy
  •  
    This article deals with cloud PMS and its advantages. Some of the advantages stated by the article are efficiency, low cost, and provides guest with more contactless experience. This is a new trend we are starting to see emerge into the industry especially now more than ever after the events that have occurred due to the pandemic.
  •  
    Seems to me this took a lot longer for companies to start getting onboard then I would have anticipated. The cost perspective and ease of use should have attracted people right away. Not having to house or protect on site servers from damage and theft is also a critical point. Not to mention the ability to grow the system when necessary.
  •  
    The article discusses traditional PMS, an on-premises software platform that can range from very basic to extremely powerful and complex. Installation, training and maintenance are expensive for such platforms, and they stifle innovation by not allowing third-party integrations, applications, and solutions. Cloud-based hotel management systems with Open API integration platforms are the future of hotel management software. They are cost-effective and offer many operational benefits. Operating expenses such as the OPERA Cloud PMS improve cash flow, are easy to install, train personnel, and automate many administrative processes. Also, it provides easy access to reporting and performance analytics, as well as contactless guest experiences and mobility.
2More

How Cruise Travel Is Sailing Into a Sustainable Future | TravelPulse - 0 views

  •  
    This article emphasizes the different methods and approaches cruise ships are taking to become more sustainable in the future. They are doing so by pursuing innovations like renewable resources, regenerative travel, providing energy solutions, and more. They are seeking to reduce carbon emissions by 40% by 2030. One of the methods described in the article is that cruise ships are now integrating liquified natural gas (LNG) fueled ships which produce zero sulfur emissions and reduce greenhouse gases by 20% when compared to regular ship fuel. Cruise lines have already started to introduce this kind of innovation to newer ships. Ports are also taking initiatives to become greener by having solar-powered terminals, smart waste separation, electric transportation, etc. Cruise lines are also working with organizations like the Global Sustainable Tourism Council (GSTC) to make sure that culture, environment, and destination laws are enforced and protected.
10More

Hotels in hackers' sights as technology replaces personal touch | Financial Times - 1 views

  • Hotels and hospitality businesses are now the third most targeted by cyber attackers of all industry sectors.
  • they have become a rich mine of data for hackers with nefarious intentions.
  • Hackers see international hotel chains, which process a huge volume of transactions, as easy pickings
  • ...6 more annotations...
  • he increased use of technology to replace face-to-face services such as check-in and on-site payments has only raised this risk.
  • One of the most high-profile cyber incidents in recent times was the breach of Starwood’s database in 2014, before the group was bought by Marriott, the world’s largest hotel chain. That hack, which was only discovered after the deal, exposed the data of about half a billion customers, Marriott said, when it revealed the impact in 2018.
  • The company sped up planned investment into data security and improved technology, such as software that detects suspicious cyber behaviour in real time, Van der Walt adds.
  • As cloud computing services have expanded, hotels have pushed more data storage towards external holders such as Amazon Web Services or Oracle
  • Many hoteliers additionally employ third-party agencies to manage credit card details and keep different forms of data separate:
  • And with guests demanding an increasingly personalised and individually-tailored service, particularly from the well-known hotel brands, data is likely to remain a precious commodity in need of protection.
  •  
    This article explains how and why hotels went from being in the bottom 13% to the top 3 most targeted industry for cyber attacks. It talks about how the implementation of technology to handle customer date has made the industry vulnerable and also how corporations are battling the issue by using separate third party companies to store data and handle credit card information.
8More

Cleaning Up Electronic Waste (E-Waste) | US EPA - 0 views

  • EPA works bilaterally with governments and environmental officials around the world on e-waste management.  U.S. EPA and Taiwan Environmental Protection Administration (Taiwan EPA) coordinate the International E-Waste Management Network (IEMN), which has brought together environmental officials from Asia, Latin America, the Caribbean, Africa, and North America to exchange best practices on e-waste management since 2011. 
  • EPA also collaborates with the Solving the E-waste Problem Initiative (Step)Exit Exit EPA website  to jointly address the e-waste problem in developing countries. Step, formerly known as UNU-Step, was previously an initiative under the United Nations University (UNU)
  • “E-waste”, “electronic waste”, “e-scrap” and “end-of-life electronics” are terms often used to describe used electronics that are nearing the end of their useful life, and are discarded, donated or given to a recycler.
  • ...4 more annotations...
  • An undetermined amount of used electronics is shipped from the United States and other developed countries to developing countries that lack the capacity to reject imports or to handle these materials appropriately. Without proper standards and enforcement, improper practices may result in public health and environmental concerns, even in countries where processing facilities exist.
  • For example, there are problems with open-air burning and acid baths being used to recover valuable materials from electronic components, which expose workers to harmful substances. There are also problems with toxic materials leaching into the environment. These practices can expose workers to high levels of contaminants such as lead, mercury, cadmium and arsenic, which can lead to irreversible health effects, including cancers, miscarriages, neurological damage and diminished IQs.
  • To this end, EPA funded UNU-StEP to lead a study on US exports of used electronics in an attempt to better define the US contribution to the overall e-waste problem.  StEP collaborated with the Massachusetts Institute of Technology (MIT) and the National Center for Electronics Recycling (NCER)
  • In July 2011, the Task Force released the National Strategy for Electronics Stewardship report, which details the federal government’s plan to enhance the management of electronics by: 1) incentivizing greener design of electronics; 2) leading by example; 3) increasing domestic recycling; and 4) reducing harmful exports of e-waste and building capacity in developing countries.  
  •  
    This article is explaining electronic waste and its danger to developing countries when the materials are not properly disposed of. Many countries have joined forces to create the International E-Waste Management Network (IEMN).
7More

Hoteliers: Prioritize Digital Identity Verification in 2023 | Hospitality Technology - 0 views

  • In a digital age where travelers crave instant, one-tap experiences, no hotel can afford to isolate itself - and digital identity verification is a crucial cog in the mobile check-in experience.
  • Digital ID technology validates that an ID is authentic, further mitigating fraudulent activity and deterring bad actors. In addition to scanning their ID and providing biometric data, guests must take a photo of themselves which must fit specific criteria - including visible facial features and clarity of the image - which is then cross-verified for authenticity.
  • Digital identity verification eliminates the friction of another touchpoint in the guest journey, allowing travelers to bypass the front desk, check-in, and access their room key with a few taps on their device.
  • ...3 more annotations...
  • With the added encryption and authentication of digital ID verification, hotels can protect guests from malicious attempts at identity theft and ensure their own defense is in place to shield them from fraud.
  • Hotels have a legal obligation to keep paperwork of their guests on file. However, gathering details and scanning the ID of each guest is not only time-intensive, but also creates room for error. By integrating digital identity verification into the mobile check-in process, hoteliers can ease multiple pain points across their operations: first, by removing the need for front desk staff to check each guests’ ID against their profile; second, by automating what is a legal requirement.  
  • Mobile check-in and digital identity verification should perform the heavy lifting on mundane operational tasks - such as scanning IDs and handing out key cards - freeing up staff time to focus on other elements of the guest experience.  
  •  
    This article touches on the advantages of using biometric digital identity verification in hotels. Guests that have traveled a long way are going to be exhausted and irritated if they need to stand in a long check in line. Using digital identification can not only help speed up the check in process, but also make it more secure. Front desk workers will not have to worry about mixing up documents or mishandling the guest's sensitive information, and will also be freed up to focus on other tasks. This can also help the hotels avoid chargebacks or fraud, as they can prove the guest was there and the added encryption will help stop identity theft.
5More

High Tech Green Computing - 5 Signs the Computer Industry Is Going Green - The Daily Green - 2 views

  • It's about time. Our ever-shrinking world is abuzz with activity attempting to address the manmade rise of greenhouse gases. Eco-visionary James Lovelock published a radical idea in Nature to increase ocean uptake of CO2 through giant ocean tubes. New Zealand has kicked off an ambitious plan to get 90% of its energy from renewable sources by 2025. JC Penney, Office Depot and Kohl's have announced green building plans. In May, General Electric said it had doubled sales from environmentally friendly products, to $12 billion over, in two years .
  •  
    due to people are able to buy more computer or devices the consumption or energy has increased dramatically affecting the global warming and companies are implementing new technology or methods to minimize the negative impact in our habitat.
  • ...1 more comment...
  •  
    I completely agree. More and more companies are turning to Eco-friendly operations, especially since this is a global trend nowadays. It is greatly beneficial to our environment and technology will always keep advancing into that direction. The best example is the USB 3.0 ports mentioned in the article. Companies are striving to have the cutting-edge not only in their going-green emphasis, but also toward their competitors.
  •  
    Seems like going green is on its way to becom a trend. Business going green not only for protecting our environment and limited resource, but also one of the ways of competing with competitors.
  •  
    I love this article and I am so glad to be told that something is changing to being green in high-tech sector. Going green is always a serious issue and all industries should pay attention to it. I am happy to see that computer industry realize that they need to focus on green things and they are really doing something to be green.
42More

Green IT | Green Hotelier - 2 views

  • Reducing energy, emissions and waste are concepts that have been around for many years, but one area that is often overlooked is information technology (IT).
  • it was estimated that 360 million computers were manufactured.
  • quiring over 10 times its weight in fossil fuels to make.
    • cleon087
       
      Computers waste a lot of energy and parts
  • ...30 more annotations...
  • 22kg of toxic chemicals, 240kg of fossil fuels and 1,500 kg of water.
  • consuming 15% of the total electricity used in offices
  • 50 million tons of e-waste was generated worldwide, but only 13% was recycled. US Environmental Protection Agency
  • Reusing working computers is up to 20 times more energy-efficient than recycling them
  • hich utilises the naturally cool environment below ground to reduce power consumption, and increase energy efficiency.
  • o date, more than 28,761 IT assets have been recycled (waiting for latest stats), which equates to 629,408lbs of e-waste diverted from landfill.
    • cleon087
       
      I wonder where is the recycling actually taking pace
  • Big hotel companies have wised up to the costs involved in operating inefficient hardware and are driving system changes to cut wasteful expenditure.
  • nt. A data centre’s life expectancy is relatively long so it is imperative it is built to the highest standards in terms of efficiency as any excess energy use will lead to significant cost implications over the years.
  • most energy-efficient data centre possible.
  • Get the right equipment.
  • Only get the data storage capacity that is currently required and forecast for the lifespan. Many d
  • Don’t have servers or equipment that will not be used.
  • , such as water cooling.
  • Data centres last 30-odd years and you can’t go back in and fix them, so they need to be efficient. Over time, this saves money as they run efficiently. Servers have to be Energy Star-compliant or I won’t even talk to vendors.”
  • cloud computing
    • cleon087
       
      We discussed this in class about the benefits of it.
  • e. Once you know what’s using the power, focus on why and whether it’s possible to reduce consumption. Spotlight on Fairmont Hotels & Resorts - T
  • into account not only the initial outlay cost of hardware, but also the running costs.
    • cleon087
       
      It's not only important to know the start up cost but what it cost to maintain it.
  • e up to 30% more energy, making it significantly more expensive when looking at the total cost of running that appliance during its lifespan.
    • cleon087
       
      It doesn't seem obvious but getting something cheaper will cost heavy in the long term.
  • investigate options to upgrade with the latest energy-efficient components to extend appliances’ working life and efficiency
  • Green labels
  • allows a single user to access several physical devices on one terminal. A computing device dedicated to an individual member of staff or allocated for one software application is highly inefficient and expensive. Virtualisation consolidates resources, requiring less power and cooling.
  • is to reuse, not recycle
  • and flat screens often being replaced well before the end of their shelf life and ending up in landfill, it’s imperative that the most is made of these materials by reusing them productively.
    • cleon087
       
      Normally people just upgrade because something new came out instead of using it until it stops working.
  • Dumping e-waste on developing countries was until recently commonplace, and it has caused huge environmental problems and harm to human health in countries such as Ghana and China. But new legislation, including the EU WEEE Directive and the 2010 US Responsible Electronics Recycling Act, has stopped countries from being able to export e-waste.
  • dopted a scheme where the cost of recycling an electronic item is included in the purchase price. In Switzerland, they’ve been able to return all electronic waste to their place of purchase since 2005, and in the European Union, Taiwan, South Korea and Japan manufacturers must by law recycle 75% of the e-waste they produce.
  • Smaller, more efficient processors.
  • which have greater memory storage capacity while requiring less energy and space. They are due to be on the shelf in about three years.
  • pecialist data centre design.
  • all sizes are starting to view IT outsourcing as a viable option to gain flexibility and reduce short-term costs and increase transparency of cost structures and processes.
  • 6. Water cooling
  •  
    Green IT is an aspect of technology that many people do even consider when thinking about sustainability. According to Computer Aid International, "The production of a computer requires 22kg of toxic chemicals, 240kg of fossil fuels and 1,500 kg of water. 80% of life-cycle energy use is accounted for before we even switch a PC on for the first time." This statistic alone should be enough for us to take action. Marriott has started taking action, however. They created an underground data center where the power consumption goes down and efficiency goes up. Cloud computing is also a massive help due to the fact that the physical software wont be on the desktop computers or laptops being operated so the power consumption will be lowered there as well.
  •  
    Green IT is an aspect of technology that many people do even consider when thinking about sustainability. According to Computer Aid International, "The production of a computer requires 22kg of toxic chemicals, 240kg of fossil fuels and 1,500 kg of water. 80% of life-cycle energy use is accounted for before we even switch a PC on for the first time." This statistic alone should be enough for us to take action. Marriott has started taking action, however. They created an underground data center where the power consumption goes down and efficiency goes up. Cloud computing is also a massive help due to the fact that the physical software wont be on the desktop computers or laptops being operated so the power consumption will be lowered there as well.
  •  
    This article focuses on the importance of having green IT in business. It shows example of other hotels that have already adopted green IT. Not only this but it offers tips for businesses that are looking to adopt green it. It highlights the issue of recycling computers instead of reusing it . They recommend to use the appliance until it doesn't work.
20More

Experts at Davos 2023 sound the alarm on cybersecurity | World Economic Forum - 0 views

  • 2023 will be a consequential year for cybersecurity.
  • "There's a gathering cyber storm,"
  • "This storm is brewing, and it's really hard to anticipate just how bad that will be."
  • ...17 more annotations...
  • cyberattacks such as phishing, ransomware and distributed denial-of-service (DDoS) attacks are on the rise.
  • Cloudflare
  • a major US cybersecurity firm that provides protection services for over 30% of Fortune 500 companies
  • "There's been an enormous amount of insecurity around the world,"
  • "I think 2023 is gonna be a busy year in terms of cyber attacks."
  • Experts warned that cyberattacks are increasing in sophistication and frequency.
  • “This is a global threat, and it calls for a global response,”
  • “This is a global threat, and it calls for a global response and enhanced and coordinated action,” Jürgen Stock, the Secretary-General of the International Criminal Police Organization (INTERPOL),
  • “The key to winning the battle against cybercrime is, of course, to work together to make it a priority across the geopolitical fault lines.”
  • This concern has been raised particularly around critical infrastructure sectors like energy, public transportation and manufacturing. SecurityScorecard, a US cybersecurity rating and analysis firm, reported recently that 48% of critical manufacturing companies surveyed were at significant risk of a cyber breach.
  • “Vulnerabilities within the critical manufacturing sector haven’t gone unnoticed by cybercriminals either,” said Aleksandr Yampolskiy, SecurityScorecard's CEO.
  • The Forum's report also notes that the potential targets for cyberattacks are increasing. Today, targets include not only government agencies or major corporations, but largely any organization that handles consumer data—no matter how small.
  • There is no such thing as a hundred percent security. It's about resilience in the face of insecurity.”
  • Consumers, too, need to increase their cybersecurity awareness in 2023, experts say.
  • As more things get connected to the internet there's just more risk. ”— Matthew Prince, Cloudflare CEO
  • Zero Trust approach to cybersecurity, which creates a framework that eliminates implicit trust and ensures that any user—even those who are supposed to be inside an organization's network—is authenticated and validated at every turn.
5More

The Top 6 Cyberthreat Actors: Today's Most Active Groups - 1 views

  • ALPHV is a relatively new and rapidly growing cybercrime group. First observed near the end of 2021, the ALPHV group gained attention for innovative extortion tactics, and unconventional attack methods.
  • To date, BlackCat ransomware has struck retail, financial, manufacturing, government, technology, education, and transportation, across a range of countries that includes the U.S., Australia, Japan, Italy, Indonesia, India, and Germany.
  • Some of the ransomware it utilizes includes Cobalt Strike, Mimikatz, and AdFind. One of the most dangerous aspects of APT29 is that they have been known to develop their own set of custom tools for hacking campaigns.
  • ...1 more annotation...
  • TA505 is a significant player in the global cybercrime scene, and has been a driver of global trends in the cybercriminal underworld. The group targets education, finance, healthcare, hospitality, and retail worldwide. It is also known for its long-term cyberattack lifecycle, sometimes persisting in a target's network conducting reconnaissance for weeks — even months — successfully avoiding detection as it patiently identifies the highest-value targets in the victim’s environment.
  •  
    This article discusses the most active cyber threats that exist today. I chose this article because it highlights a topic many industry leaders aren't aware of. Many view cyber attacks as crimes of opportunity, which they often are. However, we have to remember that there are also dedicated groups who are committed to acquiring data they shouldn't have. Knowing these groups, their signs, and what industries they target can help create a stronger team and plan to protect against them. These are especially common in hospitality and retail.
50More

Digital Transformation in the Hospitality Industry | Boston Hospitality Review - 0 views

  • We are now experiencing the fourth industrial revolution, a period marked by emerging technologies such as artificial intelligence, robotics, virtual reality, the Internet of Things, and fifth-generation wireless technology.
  • The recent Covid-19 pandemic has accelerated this digital transformation resulting in a widening technology-mediated customer experience.
  • Service robots are “system-based autonomous and adaptable interfaces that interact, communicate, and deliver service to an organization’s customer” (Wirtz et al., 2018, p. 109).
  • ...46 more annotations...
  • The core interactive and communicative features differentiate service robots from other self-service machines, which result in unprecedented human-technology interactions in the hospitality industry.
  • he service production process, disinfection robots, which emit UV light to kill viruses and bacteria, were announced to be used in airports and hotels worldwide to ensure a safe and clean environment (Greg, 2020).
  • The robots drive around autonomously in high-touch public areas and select rooms at the hotel, removing all airborne viruses and bacteria. As an extension of the hotel’s “SmartStaySafety” operation, the use of UVD robots not only provides a safe environment but also assures guests that they are being protected. 
  • In
  • the service delivery process, service robots assist frontline staff in a sequence of service encounters. For instance, the robot concierges assist employees with guest greetings upon arrival, transporting luggage, guiding guests, and delivering room service.
  • service robots can effectively respond and interact with guests, even in multiple languages. 
  • While robots make significant contributions to operational efficiency, they also raise concerns.
  • Service robots are still novel in hospitality. Their ability to cope with unexpected, dynamic conditions remains to be fully explored.
  • If guests do not follow the pre-set route, service robots may fail to respond, which can lead to a service failure.
  • AI-powered online chatbots are also employed to provide swift answers to customers via live chats.
  • provide customers with immediate responses 24 hours a day, significantly improving customer engagement.
  • customers believed VR simulations would be the best tool for hospitality operators to create a compelling customer experience.
  • VR can make a huge difference in a customer’s booking stage.
  • Through the digitally accommodated environment, customers can have a much clearer sense of what they are expecting, thus attracting more prospective customers.
  • VR application is the virtual tour video,
  • This not only offers customers a chance to experience prior to booking, but also allows the hospitality business to benefit from the “try before you buy” marketing strategy. 
  • Unlike VR, which puts customers in a completely virtual environment, augmented reality (AR) is about enhancing the physical environment and the experience of exploring one’s surroundings in real-time.
  • The current applications of AR in hospitality are largely for entertainment and practical purposes.
  • One example is the Best Western Hotel Group’s experiment with AR and Disney stars.
  • Another application of AR is indoor navigation
  • Internet of Things (IoT) refers to “an ever-growing network of connected devices which communicate with a central server as well as with each other” (Car et al., 2019, p. 163).
  • IoT provides integrated services, such as automated door locks, light switches, electric blinds, and voice-assistant devices, which are connected on a network.
  • These allow customers to control or monitor their devices from a central server, such as a mobile phone or a tablet. 
  • For example, customers can use their mobile phones for self-check-in and check-out.
  • Rooms also become “smart” with the help of IoT, which is also called the “connected room” at Hilton hotels.
  • Customers can also use voice-controlled assistants, for example, the Amazon Alexa, to control those in-room features, and order food or drinks, which can be delivered by autonomous delivery robots.
  • In addition, devices, such as luggage carts with GPS function and sensors in the parking lot, can help customers to locate their luggage and cars. Thus, IoT helps improve service processes and makes customer experiences smoother.
  • It obtains real-time data through continuous tracking from various devices, as well as a collection of customer information that was previously unavailable, such as preferences, routines, and habits (Marek & Woźniczka, 2017).
  • there are several emerging issues that hospitality practitioners must take into consideration when embracing digital technologies, which include security, privacy, costs, and human touch in hospitality. 
  • IoT with locational information can send real-time personalized recommendations to customers based on their stored preferences.
  • IoT can collect customers’ preferences for in-room features, and the data can then be used to customize the room settings for their next stay.
  • Security is a fundamental issue in digital transformation in any industry, including hospitality.
  • Also, t
  • he broad connection of various devices brings vulnerability to digital networks.
  • Thus,
  • hospitality managers must prepare for security implications of digital transformation, which can be accomplished by adopting high-security technologies to reduce software vulnerabilities, building resources to mitigate risk of cyber-attacks, and training employees on cyber-attack prevention.
  • Privacy is another important factor as highly personalized services rely on storing and tracking customer preferences and behavior through digital technologies.
  • a transparent, strict, and clear privacy policy clarifying what data can be collected and shared, and who can own the data, is necessary.
  • Another challenge is associated with the high costs of employing these digital technologies.
  • For small businesses, using digital technologies in their daily operations may require significant upfront investments.
  • it is becoming critical for hospitality businesses to consider what digital technologies would most benefit their business.
  • for small hospitality businesses, they need to prioritize what works best for them when adopting digital technologies.
  • the paradox between digital convenience and in-person experience.
  • hospitality, particularly in fine dining restaurants, customer-staff interaction is highly valued by customers.
  • it is important for hospitality businesses to strike a balance between digital convenience and in-person experiences
  • Key considerations include judging what services cannot be replaced by digital tools, preservation of the choice for customers to decide between digital or human services to maximize customer experience, and incorporation of interactive digital features in the process.
  •  
    This article talks about the current applications of 3 innovative technologies and how they are used in the hospitality industry.
10More

What hotels need to know about biometric privacy laws - Document - Gale OneFile: Hospit... - 0 views

  • In order to avoid liability, employers should become familiar with biometric privacy acts, consumer privacy acts and data breach notification requirements.
  • Currently, three states have enacted biometric privacy laws: Illinois, Texas and Washington.
  • Illinois Biometric Information Privacy Act.
  • ...6 more annotations...
  • BIPA restricts the ability of a privacy entity to "collect, capture, purchase, receive through trade, or otherwise obtain a person's or a customer's biometric identifier or biometric information."
  • The Illinois legislature stated that heightened protection for biometric information is justified by the fact that once this type of information has been compromised, it obviously can't be changed (without some serious cosmetic surgery, anyway).
  • Employers also need to be aware of local laws and regulations.
  • Portland
  • bans the use of facial recognition technology by private entities in places of public accommodation, which include hotels and restaurants.
  • With the patchwork of laws and enforcement procedures, the enactment of a uniform federal law would be beneficial.
  •  
    Several states have implemented some form of biometric privacy laws, with the gold standard coming from Illinois. Illinois' BIPA allows for private enforcement, stiff fines, and paying of attorney fees. BIPA prohibits collection, capture, purchasing or receiving a customer's biometric identifier/information. Safeguarding this data is perhaps more important than any other because it cannot be easily changed, if at all. Current lack of federal law and a patchwork of local regulations means that businesses and employees must be knowledgeable of rules and rights that affect them.
12More

Why hotels need strong security for contactless check-in | Hotel Management - 2 views

  • Contactless check-ins have become an important option, allowing guests to bypass the usual check-in at the front desk and access their reserved room using their mobile device.
    • jsanc478
       
      This article talk about how the pandemic change the way hotels will operated now on for a better customer service with their guest as check ins and other updates. One ofd the principle changes will be, mobilize check in. Having the guest check in with the phone and how safe that can be for the guest. There is always fraud around that hack information on business likes this, but how hotels can protect this type of fraud, by linking digital room keys to theirs guest's mobile devices.
  • Some hotels are also allowing their guests to use their mobile devices as digital keys
  • Concerns about this type of fraud are legitimate. Yet, if hotel operators adopt a multilayered approach, it will be more difficult for fraudsters to ply their trade.
  • ...7 more annotations...
  • However, it is also an appealing avenue of potential fraud for hackers because mobile devices are one of the most common targets for identity theft
  • Limiting contactless check-in options only to certain guests,
  • Linking digital room keys to their guests’ mobile devices themselves, rather than to their guests’ phone numbers, ensures the hotel operators are communicating directly
  • Having a multifactor authentication process established for new guests or those guests who are showing a different behavior pattern than in the past
  • Implementing a notification system i
  • Developing rules around certain reservation dollar amounts
  • Every hotel operator will have to design these options based upon the needs of their hotels.
  •  
    More hotels are now using contactless check-ins by allowing the guest to be able to use their mobile devices as their digital room key. This is great for the pandemic to social distance but potentially risky due to hackers. As long as hotel operators adopt multilayer security strategies then they can provide a safe and secure environment for everyone.
« First ‹ Previous 481 - 494 of 494
Showing 20 items per page