Skip to main content

Home/ Hospitality Technology/ Group items matching "spam" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
xrive007

McDonald?s beacon strategy pushes in-store conversion rate to 20pc | Marketing Dive - 0 views

  • beacon-enabled promotions to customers within its venues via a mobile application, resulting in a conversion rate of 20 percent.
  • enhance its personal relationships with customers as well as increase awareness of a new line of coffee-flavored beverages
  • surprise and delight our customers not only with great food at a reasonable price, but also by enhancing their shopping experience using new technologies
  • ...12 more annotations...
  • the brand seeing 30 percent of users who received the promotion using it more than once.
  • it?s important to send relevant offers to users and not just spam them
  • loyalty app, to reach those fans and deliver relevant offers.
  • Proximity marketing was selected to build in-depth relationships with our customers and to introduce to them our new set of coffee products
  • make it possible for us to see the conversion rate of a visit
  • Each time a Shopping Genie user entered the beacon-enhanced premises, he or she would receive a mobile coupon prompting them to purchase one coffee and receive a beverage from the new drink line for free.
  • tailor users? promotions to their pre-selected likes.
  • easily able to measure conversion rates, as well as consumers? interest in the new products.
  • also able to deduce which customers did not use their offer
  • able to pinpoint that 20 percent of the loyalty app?s users identified themselves as interested in receiving the types of offers that McDonald?s was testing, while 30 percent who received a promotion used the offer more than once.
  • This aided the brand in figuring out which consumers were repeat customers, in addition to when and where they walked in from.
  • they wanted to advertise a product that they had just introduced, and they used beacons to identify customers who were at the point of purchase and change their behavior
ldevaul

How the travel industry can fight back against cyberthreats | SmartBrief - 1 views

  • Travel and hospitality businesses have become lucrative targets in recent years for cybercriminals who have stolen from the industries in attacks that often take more than half a year to identify.
  • In the past three years alone, the hotel industry has faced 13 serious attacks, according to an IntSights study.
  • The travel and leisure sectors suffered a 155.9% year-over-year rise in suspected online fraud attempts worldwide in the second quarter, according to a TransUnion study, compared with a 16.5% increase in overall alleged intrusions.
  • ...21 more annotations...
  • The hotel industry attracts cybercriminals because it handles so many financial transactions in so many countries.
  • The top threat to hotels is phishing, a scam in which hotel guests may receive fake phone calls claiming to be from the front desk. The caller could claim that there is an issue with the credit card on file and that they need to re-verify the payment method. 
  • DarkHotel hacks are another significant threat. These target travelers via hotel Wi-Fi. Digital certificates are sent to guests, like a familiar adobe update, which will retrieve sensitive information. Hotel chains are combating these hacks by suggesting that guests use a virtual private network.
  • Malware (malicious software) is something criminals email employees, under the guise of the attachment or link looking innocent or legitimate. But when the user opens the file or clicks on the link, their system (and more) can be hacked into by the criminal.
  • IT department should routinely update operating systems and back up data and files, and every employee should double-check sources when asked for software administrative permissions. Also, strong firewalls can limit bad traffic and provide security. 
  • Software and hardware can help prevent breaches, but employee training is also an essential part of any hotel’s cybersecurity.
  • In 2018, a Marriott reservation system was hacked. More than 500 million customer records, including credit card information and passport numbers, were stolen. The company said the hack went back four years prior to the discovery and, when it was noticed, the company started using computer and mobile device monitoring software.
  • “Guests can enroll in a service called WebWatcher, which monitors the sites where personal information may be shared and alerts guests if evidence of their personal data is found,”
  • Hotels are not alone in being targeted by cybercriminals: The airline industry has faced serious cyberattacks as well, and many airlines still aren’t equipped to handle them.
  • only around 35% of airlines and 30% of airports are prepared for cyberattacks.
  • "The proliferated effect of the attack on SITA is yet another example of how vulnerable organizations can be solely on the basis of their connections to third-party vendors,"
  • The aviation industry faces dangers such as ransomware and distributed-denial-of-service attacks. Following the SITA attack, HackerOne solutions architect Shlomie Liberow stressed that airlines need to prepare for the worst. 
  • traditional enterprises like airlines have always been an attractive target since few are digital-first businesses, and therefore have relied on legacy software, which is more likely to be out-of-date or have existing vulnerabilities that can be exploited."
  • The airline industry needs to keep third-party vendors in check when it comes to protecting information. Given the high stakes involved, experts suggest that blind trust is not an option. 
  • “You simply cannot know whether your third parties meet your company’s security controls and risk appetite until you’ve completed a full vendor security assessment on them,
  • It’s important to note that the best practice is not a ‘one-and-done’ activity, but through real-time, continuous monitoring.”
  • In 2015, hackers targeted Polish airline LOT’s ground operations system, affecting 1,400 passengers. The hackers made it impossible to create flight plans and flights. It was the first attack of its kind, and it caused concern about cyberattacks one day remotely taking control of planes.
  • To address the threat, the standard advice is to back up and store data in multiple places, including off your physical premises, and have one copy of it be offline
  • Multifactor authentication and long, complicated passwords will take longer to crack. Updating and patching systems regularly helps companies avoid being victimized when a new exploit is discovered.
  • Treating cybersecurity as a companywide concern, not an IT concern, encourages each employee to take ownership of their actions and knowledge and to seek help proactively instead of making an “innocent” mistake that costs the company millions of dollars.
  • Finally, companies should avoid simply throwing money at the problem: Not all cybersecurity solutions work together, which wastes money and increases the risk of a breach.
  •  
    This article discusses ways that the travel industry can combat cyberthreats. The main cyber concern for hotels' is phishing, which is a scam that collects credit card information by pretending to be apart of a hotel's front desk staff. The article mentions that IT departments should do routinely updates to operating systems and back up data and files. Employees should also be trained to help prevent data breaches. The author briefly touched on what to do when your hotel system is hacked and even dives into how the airline industry is still very unequipped to handle cyberattacks and threats. This is a great read to learn how to keep up with best security practices in the hospitality and tourism industry.
amdelgad

What is Proximity Marketing: What Types and How does it Work? Innovative Technologies to Help Business. - 2 views

  • On the one hand, it allows the company to create more comfortable conditions for visitors to the store, on the other hand, it provides retail networks with the analytical data necessary to create targeted messages based on customer preferences (cluster analysis).
  • Thus, messages are delivered only to users who gave their consent and are not intrusive as spam and SMS sendings
  • The technology of proximity marketing allows companies to meet the consumers' need for detailed information about the store's products
  • ...1 more annotation...
  • The technology of proximity marketing allows companies to communicate with visitors by offering them something that will be interesting to them, for example, interactive reviews and electronic coupon codes.
  •  
    This article goes over proximity marketing in a more general sense for those who are new to it. I enjoyed that it really gets into what are the different types, as well as how each of those are used today. When talking about proximity marketing, it gives the business a closer range when they are marketing to their audience. Here are the different types the article listed: - sending advertisements to mobile devices over the Bluetooth network, - Wi-Fi or SMS messages, - distribution of special offers, - digital coupons or promotional codes, - interactive digital scoreboards, - QR or barcodes.
vivduru

The blessing and curse of proximity marketing | Marketing Dive - 1 views

  • Over the last few years, retailers have increasingly seen consumers migrate away from brick-and-mortar retail stores in favor of convenient digital outlets.
  • Proximity marketing is a way to appeal to these fundamental consumer desires without sacrificing a focus on the in-store experience. 
  • This type of technology has potentially widespread applications for retailers and marketers working in partnership with each other and sharing data — for example, in airports or shopping malls where a specific marketer may not have a relationship with a particular consumer, but can provide a platform where other retailers can integrate their apps and reach out to that consumer.
  • ...9 more annotations...
  • The Federal Trade Commission (FTC) has brought several enforcement actions against both online and offline companies for failing to comply with their posted privacy policies, failing to adequately safeguard data, failing to honor consumer opt-out promises and for a general lack of transparency.
  • Today's consumers engage in a shorter purchasing process, but the essential principles that underlie business-to-consumer marketing have not changed — consumers still make emotional buying decisions, they still want to comparison shop t
    • ngerv001
       
      Proximity marketing provides a means to place targeted messages in the hands of consumers, literally. It's the next best thing to actually walking up and putting a product in a customer's hands yourself. Customers might walk right by a sign and ignore it or scroll right past an ad in a social feed but a notification can't be overlooked quite so easily. Sending messages directly to nearby mobile users' phones increases engagement dramatically. Beacons drive promotions that are relevant to what clients are looking for, in real time, in places where it is easy for them to make a purchase.
  • According to recent studies, including a report by Retail Touchpoints, nearly half of retailers in the U.S. la
  • Whether you are a fashion retailer or a chain drugstore, proximity marketing should be on your radar
  • unched proximity marketing programs going into 2016, and the number has only skyrocketed this year. 
  • Department stores such as Macy’s, Nordstrom and Neiman Marcus, as well as major fashion retailers such as Urban Outfitters and American Eagle, are already using beacons to target consumers based on their physical location
  • t a basic level, beacons emit radio signals to connect with nearby consumers’ mobile devices, working in conjunction with a retailer-specific app in order to push certain notifications to consumers when they are in proximity to the beacon — for example, a special offer for a product in the aisle in which they are browsing.
  • From marketers’ perspective, navigating these requirements poses a unique dilemma: how can they create content compelling enough to convince the consumer to stay committed through the opt-in process to share their data?
  • These reports and guidelines highlight the need for consumers to be informed of any data or tracking that they may not expect — for example, interaction with a broad-spectrum beacon that reaches beyond the confines of an affirmatively-downloaded retailer app.
  •  
    This article helped me gain a better undestanding of proximity marketing and beacons. Beacons emit radio signals to connect with nearby consumers' mobile devices. This article discusses some of the pros and cons to proximity marketing in order to best engage consumers. Proximity marketing is a fairly new concept that is beginning to skyrocket.
  • ...1 more comment...
  •  
    I found the information about the legal requirements very interesting. If a notification pops up on my phone to ask if I would like to share information, like location, I almost never do.
  •  
    Modern society is an era of big data. There are indeed many benefits to using proximity marketing. But pay attention to avoid excessive spam, so as not to cause customer dislike.
  •  
    This article talks about the benefits of proximity marketing and why it is the new wave in which companies should get engaged and begin finding ways to utilize this kind of marketing amongst their consumers. The collected data is priceless information for a company to gather about its ideal customers and how to engage them. However, the downsides the article brings up are the legalities around opt-in and the opportunity to allow consumers to opt-out with ease, and the pressures to get the marketing continuously. That is a compliance issue that companies should stay clear and consider. Also, it the importance to build security features to care for this data and information being shared online.
‹ Previous 21 - 24 of 24
Showing 20 items per page