Skip to main content

Home/ Hospitality Technology/ Group items matching "Behavior" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
guanhuahao

Top Cybersecurity Tools for Business - 0 views

  • All cyber threats are not equal. Some may hold your data for ransom, while others may destroy your information for good.
  • Digital tech analysis firm Juniper Research predict that the cost of data breaches will rise from $3 trillion annually to over $5 trillion in 2024.
  • organizations should look to Next Generation Anti-Virus solutions (NGAV) to protect their assets. NGAV takes traditional AV and then adds advanced analytics, behavioral analysis powered in real-time by large scale cloud back-ends to thwart known and unknown attacks. Leading NGAV solutions include Sentinel One, Carbon Black, and CrowdStrike.
  • ...16 more annotations...
  • The National Institute of Standards and Technology (NIST) offers cybersecurity guidelines for best practices to manage cyber risk. These include identify, protect, detect, respond and recover. Another resource is the NCSA’s national program, CyberSecure My Business.
  • Firewall Often referred to as a company's "first line of defense," a firewall is a security control that filters and screens network traffic entering and exiting your corporate network.
  • People can rely on the password manager to create and store dozens of passwords in an encrypted database without having to remember them.
  • Password managers are quite helpful, and some are even free.
  • store the first part of sensitive site passwords
  • but keep the last few digits memorized and fill them manually.
  • This way, if there is ever a compromise of the password database, hackers don't have those full passwords.
  • You should also consider implementing multi-factor authentication (MFA). MFA authentication uses more than one thing or "factor" to log you in
  • , biometrics is part of this last category
  • SPAM & Malware filters screen email for unwanted and dangerous elements, blocking them before they ever reach your users.
  • In the world of cybersecurity, there's a phrase, "humans are the weakest link." An employee who accidentally clicks on the wrong link or email attachment can put in motion a chain of events that results in a cyber breach. Security awareness training is an anti-phishing tactic all organizations should employ.
  • RDP access must be protected by a VPN connection.
  • reduce the risk of getting hacked is to ensure your systems and software are updated regularly, or "patched.
  • patching shouldn't end with the operating system. Your patch program should also look to patch all other applications running on your systems
  • regardless of the security tools implemented to prevent a data breach, you should plan for a compromise occurring.  
  • That's where 24/7/365 network and endpoint monitoring comes in
  •  
    Cyber attacks open more and more often and varied since cybercriminals are becoming more cunning and their methods more challenging to detect. This article introduces some types of strategies implemented to protect companies' businesses from cyber threats and cybercriminals. Including using Anti-virus software, firewalls, password managers (very useful while some even free), VPN, patch management program which not only for operating program but also for other applications running on your system, consider the email SPAM/Malware filters and security awareness training for the employee since "humans are the weakest link." An employee who accidentally clicks on the wrong link can put in motion a chain of events that results in a cyber breach. Finally, plan a 24/7/365 network and endpoint monitoring.
anonymous

Why 2021 Will Be The Year Of Adaptive Cybersecurity - 0 views

  •  
    This article describes the changes that cybersecurity will see in 2021. This comes from a PwC research article that based on surveys from over 3200 businesses, there is going to be a huge increase in spending for adaptive cybersecurity. "cybersecurity needs to become more adaptive using new technologies, including artificial intelligence, machine learning, behavioral analytics, multi-factor authentication, crowdsourcing and security-integrated DevOps (DevSecOps). "
zihanwang

What's the difference between a PMS and a POS? - Preno HQ - Preno HQ - 1 views

  • A Property Management System (PMS) takes care of the day-to-day front-desk functions of an accommodation business.
  • A Point-Of-Sale system (POS) is used anywhere when you need to conduct sales transactions.
  • A PMS-POS integration allows guest billing information from each of your necessary touchpoints (front desk, bar, spa etc) to be sent to your PMS and added to a centralised guest account. 
  • ...2 more annotations...
  • An integration between your PMS and POS provides deeper value than simply managing transactions.
  • While an integration between a PMS and POS is operationally imperative, there are add-ons that can streamline the process further.
  •  
    This article introduce what the difference between a PMS and a POS and it specific illustrate what benefits the PMS-POS system can brings to the hotels. This article give us a deepen understanding of PMS and POS systems.
  •  
    Generally, PMS and POS are quite different systems. A PMS is used in front desk operations and a POS is used in processing transactions. However, they can be integrated and reduce errors in data transfer, comparing to manual systems. PMS-POS integration can provide much more than simply managing transactions. The additional benefits include intelligence on customer behavior and the occupancy-revenue relationship, along with helping in identifying the most contributing marketing segment.
zihanwang

Data Security in the Hospitality Industry | CSU-Global Blog - 0 views

  • Restaurants, hotels, and other companies in the hospitality sector often have complex ownership structures in which there’s a franchisor, an individual owner or group of owners, and a management company that acts as the operator. Each of these groups may use different computer systems to store information, and the information can also frequently move across those systems.
  • Cybercriminals use this reliance on cards to infect point-of-sale (POS) systems with malware that steals credit and debit card information by scraping the data. In fact, it was reported in 2017 that out of 21 of the most high-profile hotel company data breaches that have occurred since 2010, 20 of them were a result of malware affecting POS systems.
  • Well-trained staff also know how to recognize social engineering attempts, and they understand an organization’s compliance requirements. The risk is that the hospitality industry involves a great deal of of seasonal work in which people might move on after only a few months, or they might be transferred.
  • ...14 more annotations...
  • This type of data risk is more subtle, and it involves employees selling data to third parties without the knowledge of the organization that employs them
  • Data security risks in the hospitality industry extend far beyond the reputation hit that a hotel can take if guests’ data is compromised. Industry and political regulators are becoming stricter in governing how organizations process and store personal data.
  • the job turnover rate in hospitality is as high as 90 percent
  • High Staff Turnover
  • From the perspective of cyber criminals, hospitality appears to offer an ideal target for conducting crimes, such as identity theft and credit card fraud, due to the existence of multiple databases and devices containing both Payment Card Information (PCI) and Personally Identifiable Information (PII).
  • Information security is a pivotal aspect of many industries
  • Complex Ownership Structures
  • Reliance on Paying By Card
  • Here are five of the biggest data security concerns in the hospitality industry:
  • Compliance
  • Insider Threats
  • Best data-protection practices for companies in the hospitality sector include… Always encrypting payment card information.Operating a continuous training program in cybersecurity to maintain a well-trained workforce.Always adhering to relevant regulations, such as PCI DSS.Use cybersecurity measures such as firewalls, network monitoring, anti-malware, and traffic filtering to protect against common threats.Conduct tests against your organization’s cybersecurity defenses in which you mirror the behavior of an actual hacker.Know where your data is and enforce the principle of least privileges to limit acce
  • ss to sensitive information.
  • organizations in the hospitality sector are better placed to implement a comprehensive information security strategy that entails the necessary procedures, processes, and people to improve cybersecurity within the hospitality industry.
  •  
    The article talks about cyber security threats in the hospitality industry. Threats range from high staff turn over so staff isn't trained thoroughly, to insider threats where employees can sell information to third parties, to Cyber-criminals who infect POS systems with credit cards.
  •  
    Data information security is very important to a business development.In my opinion, I think the relationship is inversely proportional. In other words, the more effective cyber security budget is invested, the less potential impact there is of customer information being stolen (being hacked). Cybersecurity is the practice of protecting systems, networks, and programs from digital attacks. These cyberattacks are usually aimed at accessing, changing, or destroying sensitive information; extorting money from users; or interrupting normal business processes.
sharlabrunsvold

At Disney Parks, a Bracelet Meant to Build Loyalty (and Sales) - The New York Times - 3 views

  • The initiative is part of a broader effort, estimated by analysts to cost between $800 million and $1 billion, to make visiting Disney parks less daunting and more amenable to modern consumer behavior. Disney is betting that happier guests will spend more money.
  • Disney is not the first vacation company to use wristbands equipped with radio frequency identification, or RFID, chips. Great Wolf Resorts, an operator of 11 water parks in North America, has been using them since 2006.
  • The logistical challenges involved in pulling this off are extensive. Disney has 60,000 employees here and many must be retrained to use new technology.
  • ...1 more annotation...
  • At Disney
  •  
    Since most of us no longer give Magic Bands at Walt Disney World a second thought, I thought it would be interesting to look into the past to see how they were interrupted before they were launched. This article discusses the risks, challenges, costs, and competitors at the time. It dives into the discussion many Disney fans had about their privacy and well-being, and it directly aligns with our material this week. We can now see the pay off of this specific management information system, showing their importance in a business's success.
tcale003

Oracle OPERA: What You Need to Know When Evaluating Hotel Software - 1 views

    • tcale003
       
      The Oracle Opera (formerly Micros) is the biggest Property Management System utilized in the hospitality industry. Oracle OPERA is a cloud-based Property Management System that integrates a variety of functions into one place. While OPERA is used for a single property, it is built with multi-property in mind and, therefore, it is not usually used in very small properties.
  • which types of hotels OPERA is a great fit for and discuss how independent hotels, boutiques and chains all benefit in different ways.  We'll also cover the impact of Oracle Cloud on its hospitality solutions division and whether Oracle's PMS is actually in the cloud.
  • WebRezPro Integrates Tenerum Payment Gateway
  • ...22 more annotations...
  • WebRezPro Integrates Tenerum Payment Gateway
  • Apr 16,2020
  • WebRezPro Integrates Tenerum Payment Gateway
  • WebRezPro Integrates Tenerum Payment Gateway
  • This article provides a comprehensive resource for hoteliers immersed in the process of vendor evaluation.  Oracle Hospitality's OPERA (formerly Micros) is the largest PMS player in the hospitality industry and in this article we'll review how their hotel management software can improve operational efficiency for your business then point out some areas that every buyer should be aware of as they consider the solution.
  • OPERA has comprehensive guest profiling capability, which allows your staff to keep track of guest preferences. These rich guest profiles can be quickly accessed to better personalize stays. Staff can see useful details, such as stay history, past communications, and previous service requests, to inform their approach to each guest.
  • vendors?
  • Oracle OPERA is a cloud-based property management system that integrates several functionalities into a single platform.
  • In addition to the core property management functionality, such as room assignments, check-in/check-out, and rate management, OPERA includes integrated channel and rate management with group travel functionality to handle more complex requests. 
  • While OPERA can be used for a single property, it’s built with multi-property in mind.
  • Since OPERA is an integrated platform, hotels with more complex operations stand to benefit the most. For example, a hotel that uses Oracle POS (point of sale) and kitchen management can integrate full F&B operational functionality into the OPERA property management system. Such deep integration improves outcomes on the customer service front and gives hotel management stronger reports to monitor KPIs and profitability. 
  • The ideal customer segment is a hotel group with many larger properties that offer full service.
  • WebRezPro Integrates Tenerum Payment Gateway
  • Personalized guest profiles
  • Advanced rate management
  • OPERA has advanced rate and room availability restrictions, as well as enhanced rate-management capability offering a vast number of room pricing options, including best available rate, dynamic rates, daily rates, base rate, and negotiated rates. These rates can then be distributed via OPERA’s integrated channel manager.
  • Intelligent accommodation management
  • Proper allocation of room inventory avoids overbookings of specific room types and ensures that rooms are cleaned and maintained in a timely manner.
  • Mobil
  • OPERA now offers a completely mobile version of its flagship software, called OPERA Mobile Cloud Service. Staff can access the following information via any smartphone or tablet device: Check-in/check-out, reservation management, room status, task sheet, room maintenance, as well as Track It and Post It mobile that can provide real-time status updates on rooms and maintenance requests. 
  • Loyalty support
  • To drive loyalty-based marketing, guest behaviors accrue automatically to profiles, so hotels can build relevant packages and services based on guest history, including the length of stay, expenditure in restaurants and bars, and other preferences. T
anaslip

New Distribution Capability (NDC) in air travel: Airlines, GDS and the impact on the industry - 0 views

  • New Distribution Capability (NDC) in air travel: Airlines, GDS and the impact on the industry By Altexsoft Team On Mar 3, 2019
  • Two fundamental needs connect all airlines: revenue and passenger satisfaction.
  • Considering that getting in touch with the end user is nearly impossible via the channels provided by global distribution systems (or GDSs), a new standard emerged to resolve the issue. The air travel industry confronted big changes when the New Distribution Capability (or NDC) debuted in 2012. Lufthansa, British Airways, American Airlines, and Iberia were the first to adopt NDC. And the technology continues to make its way in airline distribution, as well as other means of improving airline operations.
  • ...9 more annotations...
  • NDC stands for the New Distribution Capability, which is essentially an XML standard created by the International Air Transportation Association (IATA) to allow airline service providers to deliver rich content and ancillaries to their customers.
  • Personalised shopping experience and access to customer information. Currently, most of the customer personal data remain in the hands of middlemen, OTAs and GDSs. This means that airlines get just basic information about their clients, which doesn’t allow for personalising the shopping experience, the thing that has become a standard in modern travel eCommerce.
  • Content and pricing autonomy.
  • Currently, most airlines publish their tariffs via ATPCO, the tech provider and main source of pricing data.
  • Rich content offers, ancillaries, and discounts. Distributing the flight data via GDS’s EDIFACT (Electronic Data Interchange for Administration, Commerce, and Transport), airlines are unable to include ancillaries in their offers.
  • Product differentiation. The traditional GDS model only permits airlines to display prices and schedules.
  • Reduced reliance on legacy systems. Most airlines use legacy passenger service systems (PSS) that contain reservation info, fares, and schedule.
  • As a result, NDC was supposed to break the oligopoly of GDSs that formed over time.
  • According to the latest IATA NDC program update, the list of certified deployments reached 65 carriers. The number seems to have grown significantly since 2017 when IATA reported only 50 airlines adopting NDC. But, compared to the overall number of airlines connected to the major three GDSs, which is over 400, NDC adopters seem to be a minority.
  •  
    NDC or New Distribution Capability is a new subset within GDS systems to provide airlines with detailed information about customer in order to enhance the personalized service. NDC will be able to provide pricing independence and direction information to airlines about their passengers. The system is more flexible and accurate in order to improve the experience from what GDS would provide.
  •  
    This article tells us about a new communication protocol which is called NDC. NDC stands for the New Distribution Capability. You can also find some information about how airline distribution works in general.
anonymous

The Hidden Benefits of Restaurant POS Software | QSR magazine - 0 views

  • The retail and restaurant industries run on many systems, but the one thing that ensures a smooth and efficient operation for them will always be the POS system they have in place.
  • modern POS systems impact a business positively in so many ways
  • the point-of-sale system makes critical aspects of the business such as sales, payments, and inventory more streamlined
  • ...13 more annotations...
  • More detailed and accurate reportsThe importance of reports to any business—or organization for that matter—can never be stressed enough. Ideally, all business decisions are based on the information contained in reports, and that’s why it’s absolutely essential that they contain nothing but detailed and accurate data.
  • Today’s POS systems make use of a Cloud-based system to store and integrate information, which can be easily accessed by businesses for data that will allow the generation of incredibly detailed sales and inventory reports, among other things
  • Enhanced labor and human resource functions
  • Even if the POS system you’re running is the most basic available, it’s likely capable of performing timekeeping tasks as well hooking up with the payroll system of the company.
  • With one or two fewer tasks to perform, your employees will have more time attending to other urgent duties, like providing top-notch customer service.
  • Personalized customer experienceWhen you’re running a POS system for your business, keep in mind that it has a customer database that contains information that can help you make the customer experience more personalized.
  • With just a few clicks, you can get your hands on a treasure trove of information that will allow you to track customer behavior, their order history, and personal details, among other things.
  • You can also have it create reward programs, which not only influence people to make buying decisions but also foster loyalty to your brand. Such programs make your customers feel that they’re important to you,
  • More secure and convenient card and mobile transactions
  • With a POS system, there is no more need for businesses to spend money on separate peripherals that will help with the processing of purchase.
  • Most important of all, credit and debit card payments processed via POS are proving to be faster, safer, and more secure.
  • There seems to be no end to the benefits that your retail store or restaurant can get from POS software. As POS systems stand today, they are practically capable of doing just about anything for your business, and automatically at that.
  • With a more modern, more dependable POS system in place, reaching your business goals will immediately become easier.
  •  
    Point of sale systems have helped restaurants, hotels, etc in a major way. There are several benefits to the modernized POS software. POS systems offer more detailed and accurate reports for businesses. Businesses are able to use Cloud-bases systems to store information. This information can then be used to generate detailed sales and inventory reports. They also offer a benefit when it comes to labor and human resources. POS systems help takeaway a few tasks that employees used to have to do. THis helps improve customer service. POS systems also offer a more personalized customer experience and more secure and convenient card and mobile transactions.
corrie242

Top 9 Technology Trends in Event Management Right Now - Meetingbox - 2 views

  • Studies reveal that technology adoption in event management is capable of increasing attendance by 20% and productivity by 27% and decreasing costs to at most 30%!
  • Speed, utility and engagement are the three main pillars
  • 5G
  • ...16 more annotations...
  • With the increasing complexity of experiences, the necessity to map out these experiences increases as well. With tools like drag and drop diagramming, 3D walkthroughs and seating software, planners and venues can map out experiences in detail.
  • Event diagramming
  • With increasing implementation and relevance for augmented reality and virtual experiences, this technology will be the threshold for the biggest paradigm shift yet in event technology and automation.
  • Projection mapping
  • you can create an augmented reality experience by turning existing walls and structures into 3D interactive displays. This tool allows event planners to incorporate transformational design elements into any space they seem fit. Projection mapping proves to be a cost-efficient and effective way to create optical illusions in nearly every location.
  • Beacon technology
  • A similar tool to the already existing Radio frequency ID (RFID), Beacon technology discreetly tracks attendee behavior and preferences, which can be used as an engagement tool to create personalized experiences for attendees and provides event insights for event planners. Wondering how it works: Beacon devices equipped with Bluetooth low-energy signals can broadcast data to any mobile phone that supports Bluetooth connectivity.
  • Virtual and Augmented Reality
  • Facial recognition
  • benefit for planners from a security perspective.
  • reports of security breaches at major events
  • They could be used for gathering real-time data that can help event planners enhance the experience and security of their attendees.
  • Event automation tools
  • provide all the information concerning an event such as schedule, speakers, registration, networking, and support. There are also apps integrated with chatbots that offer a higher level of support to the organizational team.
  • Data Security
  • Cybersecurity data breach is a scaring reality nowadays. And therefore, the question “Is the event organizer doing enough to protect the data collected from guests?” is more important than ever. Planners should take this issue seriously.
  •  
    This article outlines the current technology trends in event management. It also entails what strategies event planners are using to market mega-events, to attract attendees and to get real-time feedback about the event.
laurenperdomo

https://www.restaurant-hospitality.com/finance/recognizing-signs-embezzlement - 1 views

  • “Things to look out for are uneven income flows, changes in patterns of income or net profits, and odd tipping patterns on credit cards,”
  • “Other unusual activity can include people who are adamant about working together or picking certain shifts, shipments paid for that aren’t delivered, and straight-out theft of product, cash, or drinks.”
  • Looking for things such as stacks of quarters by a bar till and unmarked bottles in a bar break can signal that an employee is keeping track of money in the register.”
  • ...8 more annotations...
  • “There’s often skimming of the register, voiding of tickets, and wasting of food,” he said. “As you move to the back office, there’s a lot more opportunity to handle cash and receipts, create phony vendor companies, and use company cards for personal purchases.”
  • At the end of the day, the only way you’ll ever know if there’s a thief among the ranks is by performing regular checks and audits.
  • The owner should have a firm hand on all activities, change shifts and responsibilities, and a firm hand on the cash and checkbook,”
  • “Other recommended tactics include paid professional spotters, and, of course, security cameras, especially at the bar.”
  • “It’s important to have a bookkeeper in charge of the everyday numbers and an accountant, preferable a CPA, to review the books. This provides a nice check and balance if the owner is not overly hands-on or proficient with numbers.”
  • “Simply monitoring employees and ensuring a system of oversight will lessen the likelihood that a normally compliant employee will be tempted into a crime of opportunity,”
  • “Run a transparent inventory to ensure employees know you are tracking usage. Beware of employees wearing large coats or clothing out of season and suspicious behavior.”
  • “It’s easy to look at the bookkeeper, but it can come from anywhere. Start by looking through the profit-and-loss statement every few weeks; it will show symptoms. And don’t have a set routine; show up to work randomly.”
  •  
    This article mentions ways in which an owner can detect if theft is taking place at his restaurant, ways in which this could be prevented and also what do in the case of an actual theft.
  •  
    This article have mentioned the reality that restaurant theft and embezzlement are pretty common and are causing problems, yet the most owners and managers are not willing to deal with the issues with law enforcement. The reasons include unwilling to ruin the employees' lives and the threshold of establishing a theft case. However, the article suggested that seeking advice from accountants (preferably CPAs) and lawyers is a brilliant way of dealing with these issues. It can give the owner better understandings of the situation, and deal with the wrongdoers in a cleverer way.
jackyreis

Can You Use Your POS To Help Eliminate Restaurant Fraud? - Total Food Service - 0 views

  • Can You Use Your POS To Help Eliminate Restaurant Fraud?
  • Fraud comes up a lot in the restaurant industry. It’s with good reason. In a business where margins are always tight, customers literally walk in and out, fraud continues to be a constant concern.
  • But did you know your POS has other features to help in your efforts to keep transactions safe and your business secure? Scammers are a crafty lot.
  • ...14 more annotations...
  • Auto-grat scams
  • Automatic tip calculation is a genuine convenience for large parties and those who have difficulty determining appropriate gratuities.
  • Your POS has the ability to determine which tables qualify for an automatic gratuity, so management can easily see which large parties in your dining room will be targeted. If you see cash left after a table has already paid a bill, you may want to intervene and remind the guest that gratuity was already covered, and additional cash should only be left if they intended to do so.
  • Coupon scams
  • Discounts are a fantastic marketing tool. But they’re only good if the customer is aware of the deal.
  • Thankfully, your POS system can ensure all active coupons loaded into the system, and that they’re applied directly to an order, rather than after a cash transaction is complete.
  • Voided transactions
  • Except there are no guests behind those transactions – just wads of unaccounted cash. In a slow restaurant bar, this would never fly. But in a thumping nightclub with high ticket table service bills throughout the facility, a “mere” $500 discrepancy is a drop in the bucket for management, and an easy target for scammers looking to pad their own pockets. Even worse? Serving up complimentary drinks for cash transactions and pocketing the money but adding a tip to the jar as a cover-up.
  • The “Wagon Wheel”
  • In this scenario, a waiter transfers an item like a soda from one check to another prior to closing the tab when a guest pays in cash
  • Then, the next time a guest orders that soda, the server starts the ticket on that tab and continue to transfer the soda while they pockets the cash. Sometimes known as the “revolving soda,” this frequently happens with items like beverages where the server or bartender is preparing their own.
  • To avoid this, restaurant owner’s can monitor activity and behaviors such as low sales of server-controlled items like drinks, compare bartender performance over the same shift, or set restrictions requiring a manager to authorize any transfers.
  • The list goes on. But, thanks to loss prevention features built into modern POS systems, hospitality managers now have the ability to get ahead of scams being run.
  • By leveraging algorithms to identify patterns and suspicious transactions, such as increases in coupon redemption or notably low cash totals, and help you bore down to the source of the problems, before they get out of hand.
marble_bird

Roche2016_Article_RecreationalDivingImpactsOnCor.pdf - 0 views

shared by marble_bird on 07 Jul 20 - No Cached
  • Recreational diving on coral reefs is an activity that has experienced rapidly growing levels of popularity and participation.
  • the potential role of dive impacts in contributing to coral reef damage is a concern at heavily dived locations. Management measures to address this issue increasingly include the introduction of programmes designed to encourage environmentally responsible practices within the dive industry.
  • Coral reefs are a threatened, but globally important ecosystem, providing key services to local communities such as coastal defence, sediment production, and fisheries benefits
  • ...45 more annotations...
  • The role of dive supervision was assessed by recording dive guide interventions underwater, and how this was affected by dive group size.
  • Over recent decades, tourism activities benefiting from the pleasing aesthetics and biodiversity of coral reefs, primarily SCUBA diving and snorkelling, have experienced rapidly increasing numbers of participants globally
  • We found evidence that the ability of dive guides to intervene and correct diver behaviour in the event of a reef contact decreases with larger diver group sizes. Divers from operators with high levels of compliance with the Green Fins programme exhibited significantly lower reef contact rates than those from dive operators with low levels of compliance.
  • Damage to corals on dived reefs often occurs as a result of skeletal breakage, particularly in branching species (Guzner et al. 2010;H a s l e ra n dO t t 2008). Tissue abrasion can also result from diver contact (Hawkins et al. 1999), and a recent study reported a higher incidence of coral disease in areas heavily used for recreational diving
  • It is possible that other diver characteristics such as qualification level or dive experience may affect the ability to respond to dive briefings, although several studies have failed to find a correlation between divers’ reef contact rates and experience
  • Due to the difficulties of effectively addressing global stressors, an emerging recommendation is the focus of coral reef management on local scales (e.g. Anthony et al. 2014). A frequent challenge facing managers and policy makers at local levels relates to the maximisation of tourism benefits whilst simultaneously reducing its environmental impacts
  • Alternatively, previous experience and possible affinity and attachment to a specific dive site may influence how closely divers follow pre-dive briefings and affect their behaviour underwater, as suggested by place attachment theory
  • The methodologies which have been developed to minimise the environmental impact of SCUBA diving on coral reefs can be summarised as follows: (1) managing or restricting diver numbers, (2) regulating the locations in which SCUBA diving activities occur, (3) regulating the types of equipment used, and 4) implementing programmes which seek to manage the methods used by the dive industry in providing their services. Restricting diver numbers is based on the concept of a reef dive site’s ‘carrying capacity’; a level beyond which diving impacts become readily apparent.
  • Restriction of SCUBA diving equipment has focused on banning the use of accessories believed to increase reef contacts within marine protected areas such as gloves, muck sticks, or underwater cameras; however, such regulations are often unpopular within the SCUBA diving community
  • Governments and reef managers seek evidence that the effort expended in implementing programmes translates into measurable benefits; however, research into the effectiveness of such programmes at influencing diver behaviour and reducing diving impacts is limited.
  • In this study, we focused on dive operators participating in the Green Fins diving programme at three major dive locations within the Philippines.
  • Nonetheless, levels of dive supervision underwater would intuitively appear to be linked to rates of reef contact, and when examined, the willingness of dive guides to intervene in correcting diver behaviour underwater has been found to significantly reduce diver contact rates
  • Malapascua Island, Moalboal, and Puerto Galera.
  • divers may have been aware that a Green Fins compliance assessment was taking place, but they were unaware that diver contacts with the reef were being specifically recorded. Green Fins environmental assessments and diver observations were conducted simultaneously.
  • Dive guides and guest divers from 44 dive operators participating in the Green Fins programme were followed
  • Diver characteristics with potential to influence underwater behaviour were categorised as the following factors: diver qualification level (three levels), dive experience (five levels), and previous number of dives at site (three levels).
  • Divers were assigned a unique diver number, and then followed and observed underwater for the entire duration of their dive.
  • If the overall group was very large such that the dive guide could not be seen from the rear of the group, the pair immediately behind the dive guide was selected.
  • Compliance with the Green Fins approach was determined by utilising diver contact rates and dive guide intervention rates as at the dependent variables of interest, and by defining dive operators according to those who had received a high score (above the median score) versus those with a low score (below the median score) on the most recent conducted Green Fins assessment
  • The part of the body or item of equipment making contact with the reef was recorded as follows: hand, fin, knee, camera, muck stick (a handheld stainless steel or aluminium rod approximately 30 cm in length) and equipment (e.g. tank, submersible pressure gauges, octopus regulator), and multiple (parts of the body and equipment simultaneously). The time during the dive at which the contact occurred was also recorded.
  • If observable damage (i.e. breakage, obvious physical damage, or injury) occurred as a result of the contact this was recorded, together with the apparent awareness of the diver to the contact, regardless of damage caused.
  • Contacts made with a camera (77.7 %) accounted for the highest proportion of contacts which resulted in damage, followed by contacts made with the knee (43.3 %), multiple body and equipment parts (38.2 %), equipment (30.7 %), fins (29.8 %), hands (24.7 %), and muck sticks (23.5 %).
  • A total of 100 SCUBA divers were observed at three diving locations within the Philippines (Table 1). The majority (72 %) of these divers were male, and diving experience ranged from those completing diving training to those who were instructors elsewhere with experience of hundreds of dives.
  • Following dive completion, divers that had been observed underwater were asked to complete a survey to determine diver characteristics.
  • Most contacts were made with fins (45.5 %, n = 261); however, hands (19.5 %, n = 112) and dive equipment (15.9 %, n = 91) were also major contributors to the total number of contacts
  • Interventions were defined as an event in which the dive guide intervened in diver behaviour through signalling or demonstrating correct behaviour in order to minimise or prevent contact with the reef.
  • A total of 81 interventions were observed (in comparison to 573 reef contacts—see Fig. 4 for the distribution of contacts and interventions);
  • Camera systems were carried by 55 % of divers; camera-wielding divers accounted for 52.7 % of the total contacts made with the reef. Of divers who utilised a camera, 35 % carried a non-specialist compact type and 20 % carried an SLR type within a specialist underwater housing.
  • Mean (±SE) dive time was 49.3 ± 0.42 min. A total of 573 diver contacts with the reef were recorded during all assessed dives.
  • The difference in the frequency of interventions was statistically significant (ANOVA, f = 4.81, P = 0.03)
  • although a significant portion (36 %) appeared unaware of the contact they made with the reef.
  • In addition to overall contact levels, some studies have also quantified reef contacts either as the mean number of contacts per diver over the duration of a dive or the diver contact rate per minute of dive time. The mean contact rates of 5.7 contacts per dive, or 0.12 contacts per min, which we observed at dive sites in the Philippines are lower than those previously reported
  • All divers observed within the present study were diving with operators participating to various degrees in the Green Fins environmentally responsible diving programme.
  • Identifying factors and policy measures which influence SCUBA diver behaviour underwater can help coral reef managers determine where to most effectively focus effort and funding with respect to dive management. In this study, we found that 88 % of the divers observed made at least one contact with the reef at some point
  • Divers who are more conservation aware and who contact the reef less may preferentially choose to dive with environmentally ‘accredited’ dive operators; indeed, this assumption partially drives dive operator participation in such programmes.
  • Underwater interventions by dive guides have been suggested to be the most successful deterrent to diver contact with reefs (Barker and Roberts 2004). In this study, there was no significant difference in the intervention rates between dive centres of high and low Green Fins compliance. Therefore, we cannot attribute the observed difference in diver reef contact rates to differences in intervention rates between these two groups.
  • Studies examining the effect of carrying camera equipment on the frequency of diver contacts with the reef have produced conflicting results.
  • Additionally, the administration of a pre-dive briefing can influence diver contact rates underwater (Medio et al. 1997). The Green Fins programme incorporates the use of a pre-dive briefing that emphasises the importance of refraining from contacting the reef, which would be expected to result in lower diver contact rates.
  • A concern amongst representatives of the diving industry is the use of muck sticks to manipulate animals unnecessarily—pushing animals out of holes for better viewing, stressing animals to show customers their stress behaviour (e.g. an octopus changing colour), and physically breaking hard coral to be used in photographs.
  • When examining the part of the body or dive equipment which made contact with the reef, we found that the majority of contacts were made with fins, in agreement with Krieger and Chadwick (2013) and Rouphael and Inglis (1998).
  • It has previously been noted that dive guides customarily perform different roles at dive locations globally; at some locations, they act primarily to lead the dive group around the reef, whilst at others, pairing with and closely supervising individual divers throughout the course of a dive
  • this suggests that dive guides carry out the closest supervision during the initial phase of the dive and then switch to a ‘dive leader’ role at the front of a dive group.
  • This study provides evidence that the effective implementation of environmentally responsible practices, via programmes designed to reduce diving impacts, may translate to reduced diver reef contacts.
  • Many diver characteristics which might intuitively be expected to impact reef contact rates, such as level of qualification and overall experience, were not significant influencing factors in this study, and high versus low levels of Green Fins compliance did not influence the number of interventions made by dive guides underwater.
  • For continued economic benefit and conservation of Philippine reef dive locations, we recommend that management measures facilitate high levels of compliance with environmentally responsible diving programmes to reduce the impact of diving on coral reefs.
  •  
    This article discusses a study performed at various diving locations in the Philippines to determine whether or not measures taken by Green Fin diving guides were effective in reducing contact with coral reef systems. The study also recorded the average number of contacts with the reef during a dive, as well as the equipment or body part which came into contact with the reef most often, and which actions resulted in the most damage. The study finds that adherence to Green Fin standards or other policies may significantly impact diver behaviors and reduce the level of contact with sensitive coral reefs during SCUBA dives.
marble_bird

Modern information technologies in the hotel business: development trends and implementation issues Modern information technologies in the hotel business: development trends and implementation issues.pdf - 0 views

shared by marble_bird on 08 Jun 20 - No Cached
  • Today, the process of digitalization of the Russian economy has a significant impact on hospitality industry.
  • Digitalization is becoming a major trend, which is evident in the distribution models of hotel services, and also actively comes to the sphere of automation of internal business processes
  • Digital innovations are gradually becoming the new standard of hotel service
  • ...34 more annotations...
  • digitalization of hotels also includes introduction of advanced solutions for analytics and security.
  • Digital security systems can not only track the slightest disturbance of the public peace, but also provide additional information.
  • At present day, it is too early to assess the effectiveness of some recent innovations, that are related mostly to the hotel's image and attract customers.
  • The main trends in the use of modern technologies in hospitality industry in the conditions of digitalization of the economy are presented in figure 1.
  • The main disadvantages of traditional technologies include the following: local server requires regular maintenance from the system administrator; access to database is restricted by local network facilities; connection speed is limited by the speed of a local provider and divided among all who are drawn to the sever database
  • Artificial intelligence plays an equally important role in improving the efficiency of public catering enterprises.
  • Use of artificial intelligence also allows to analyze the work of the restaurant, and to detect violations of rules by the staff via control of bills, number of the discount card uses, as well as the number of cancellations and deletions of checks.
  • The issue of privacy that characterizes traditional tourism industry is also addressed through blockchain technology, minimizing exposure to sensitive data in the face of existing problems with cyber attacks and fraud in traditional financial services.
  • if the concept of hospitality industry enterprise changes, it is possible to change the composition of paid licenses.
  • Almost all companies in hospitality industry have started to think about using chatbots to solve specific business problems [9].
  • One of the ways to get competitive advantages for accommodation facilities is to invest and use new technologies. In this regard, augmented reality is the most promising technology for the modern tourism industry. its development and application can increase the competitiveness of destinations.
  • Augmented reality can be used to interact with guests before, during, and after their stay.
  • Augmented reality technologies can be used to stimulate travel purchases (the effect of being present in a hotel room, as well as demonstrating the environment and local services using a virtual reality headset). Also, virtual and augmented reality, including those with tactile sensations, can be implemented by digital concierges to issue recommendations to the client on various issues and types of recreation
  • The API allows one hotel technology system to automatically (i.e., without the participation of hotel employees) interact with another technology system and gain access to its functionality.
  • The largest companies develop APIs for clients or internal use at some stage.
  • The result of the analysis of cash transactions is a regular analysis and detailing of violations, categorization of violations, development of measures to counter violations, training of personnel [13].
  • With the help of speech Analytics tools, specialists can work with 100% of requests. To do this, all dialogues are translated into text and analyzed using a special system.
  • Based on this analysis, you can develop a change program for existing procedures and processes and optimize self-service systems (personal account, website).
  • The result of the introduction of innovative speech analytics technologies will be an increase in sales efficiency, an increase in loyalty and customer satisfaction, a reduction in service costs without loss of quality, and behavioral analytics.
  • Currently, biometrics can already be used to identify and confirm the client's identity. Face scanning technologies when registering with the service.
  • Analysts predict that the international market for biometric solutions for the hotel sector will grow exponentially in the coming years. Biometrics, as the most reliable and accurate authentication system, can provide real-time information about employees and their use of their working time.
  • The result of using this technology is payment without wallets and Bank cards, increasing the speed of customer service, and a high level of security.
  • In 2018, Amazon presented a special version of the voice assistant for hotels — Alexa for Hospitality, which is currently being tested in Marriott hotels.
  • At the same time, the use of Echo speakers in hotels raises concerns about the privacy of personal data. Amazon claims that audio recordings of the guest's voice commands will be deleted every day, and the hotel administration will not have access to both request records and response records.
  • IT outsourcing is the transfer to a third-party contractor (outsourcer) of all or part of the functions for servicing the organization's information needs. Currently, this technology is becoming increasingly common in the hospitality industry.
  • The main point of switching to outsourcing is to optimize the company's costs while significantly improving the quality of services provided. The main criteria for outsourcing are the lack of competitive advantages and not the strategic position of this operation or function for the company
  • The main problems of implementing information technologies in the hospitality and tourism industry include the high cost of these developments, the duration of staff training processes, and the adaptation of the built system of business processes of enterprises.
  • The problem is also the difficulty of attracting investment in the hotel business
  • Another problem with the introduction of information technology in the hotel business is the lack of relevance of regulatory documents and legal barriers to the introduction of innovations
  • In addition, the introduction of modern information technologies in the hospitality industry is complicated by the level of technical and technological complexity of implementation projects.
  • nformation technologies are improving at a rapid pace
  • In the leading Russian hotels that are part of the global hotel chains, the work is fully automated, technological, and has its own computer and Internet services. Such hotels already have a successful experience in implementing modern information technologies.
  • Customers of the hospitality industry already have a lot of experience in using mobile devices.
  • Digital marketing is becoming a key channel of communication between the hotel and the network. At the same time, only the implementation of continuous data collection, processing, analysis and aggregation tasks will allow the management of hospitality enterprises to achieve one of their main goals - to better understand their customers and interact with them.
  •  
    This article describes trends in technology in the hotel industry and the applications of them in the Russian economy. The article discusses what the trends in IT are and how they may apply to the hotel sector of the hospitality industry, providing real-world examples and hypothetical scenarios. The information in this article is insightful to the relationship between hospitality and information technology and provides a perspective on this relationship from the viewpoint of the Russian hotel economy specifically.
blevi022

How is Point of Sale Software Changing in 2020? : Tech : Tech Times - 1 views

  • a retail POS system is like a Midas touch to your business; it enhances it and enhances it for good, adorning it with golden profits. 
  • The idea of POS software is simple. It excludes every chance of human errors and inconsistencies, holds back your company's loss, and increases the productivity of your checkout counter
  • A Step Towards Cashless Business Schemes: Mobile POS
  • ...9 more annotations...
  • Some restaurants which have adopted such highly technical software have observed some fine changes in their business sales. For instance, a restaurant adopted a cloud-based POS system; this allowed the restaurant owner to split bills, quickly scan the items they are searching for in the menu, track server performances and process online orders, train employees, look for trends, and build customer directories. This obviously led to positive results and increased their overall sales by 30 percent. 
  • here are a few ways you might want to behold to believe that POS systems have changed in 2020 for the better
  • Integrating The Transactions Into One Through Shared Commerce
  • It has been a high time since businesses have advanced from conventional cash registers and card swiping machines to cloud-based POS Systems. The very retail POS systems have proved to be a business bliss encouraging greater flexibility, brilliance, and control in business terms
  • With revolving time and turning generations, most customers prefer to make payments through their mobile wallets. The statistics suggest that by 2025, 75 percent of all transactions will be cashless, assuming the hyped popularity of mobile wallet systems. Therefore, looking upon such predictions requires the businesses to notch up their technical sides and promote cashless transactions.
  • POS Systems Have Advanced To Feature CRM
  • The featuring of CRM has tended to increase sales, boost revenue, and help the business outgrow itself. Where the previous form, if POS systems only tend to provide general and basic data insights regarding customer behavior, the new integrated POS with CRM gives more advanced and clear visions on customer insights.
  • POS Systems With The Mighty Powers of Big Data
  • The big data feature tends to provide you insights on how the performances of your business, how many deals you closed, and how many sales you made. It also analyzes how wl you are doing on an annual level. It accounts for your profits to compare each month, thereby making you aware whether your performance is improving or degrading.
  •  
    This article provides an overview of the ways POS systems are advancing and evolving in 2020. It goes on to explain the most important developments in POS.
ryanrodgers2014

Hospitality business intelligence | AltexSoft - 4 views

  • Data analytics is one of the key directions for digital transformation in various industries, travel included. And hospitality is no exception: The hotel industry, by its nature, operates large amounts of data. The sources range from inventory to distribution channels, from customer behavior data to housekeeping records. As business grows, these become impossible to analyze and keep track of manually or by using spreadsheets.
  • Business intelligence systems take charge of extracting data from various sources, transforming it, collecting it in a centralized repository, and finally querying this repository to present data as meaningful charts and diagrams for humans to put to use.
    • ryanrodgers2014
       
      Business intelligence (BI) software is a useful tool that allows hotels to be more effective in gathering data and utilizing the information appropriately to optimize their revenue while operating in a highly competitive market. BI exist to help us collect information from multiple sources and to transform the information into a meaningful way to better understand data. Business Intelligence also provides a competitive advantage by giving us a clearer view of what is going on internally and externally, and allows us to forecast more accurately demand, property level expenses, and overall annual yields. This article reviews the specifics of hotel data sources, the advantages of using BI software in the hospitality industry as well as defines some of the barriers the hospitality industry faces in using Business Intelligence software. Though the advantages of BI can provide us with an abundance of data sources and information by associating customer segmentation via POS/PMS systems to channels distribution sources it also can be a struggle to integrate with your own data platforms.
tredunbar

7 POS Trends for 2020/2021: Latest Predictions You Should Be Thinking About - Financesonline.com - 2 views

  • global point of the sale terminals market is expected to reach USD 108.46[1] billion by 202
  • One of the biggest POS industry trends right now is mobile payment transactions which saw a 40.2% year on year growth[2]
  • it’s also important to have a reliable billing and invoicing program together with your POS sale
  • ...30 more annotations...
  • 54% of consumers[4] in the US preferred to use their debit cards to make payments
  • 46% of US consumers rarely use money[4] anymore
  • 45% have security as their top priority. Offering a secure payment method improves the trust your customers have with your business.
  • using mobile devices like tablets and mobile devices to make transactions faster
  • 53% of retailers and business owners are upgrading their POS[3] systems
  • Asia Pacific countries have fully embraced the use of mobile payment methods. eMarketer found that more than 45.2% of China’s population use mobile payment[8] for their everyday use. 
  • 61% of quick-service restaurants in the US have embraced cloud-based POS[5]. In fact, 60% of new merchants are asking for cloud POS[6] rather than legacy POS.
  • 61% of merchants[7] are looking into getting cloud-based POS
  • Cloud-based POS replaces all of that with a single app. Any update will come from the cloud to whatever device you are using.
  • you can make the transition to the cloud-based system slowly
  • Most cloud-based POS can integrate with the programs that your business is already using
  • Accepting mobile payments for your business is easy. It mostly consists of scanning codes or tapping the smartphone on the terminal and authenticating the transaction
  • Mobile POS offers convenience as it takes the point of sale system to the customer, rather than the other way around
  • Accepting mobile payment methods allows lines to move faster and gives your customers a sense of satisfaction
  • Mobile payments are safe to use. A lot of these systems are EMV compatible and use the latest secure credit card processing technology to protect you and your customers
  • 15% of businesses in the US are already using AI-enabled POS
  • Prevent fraud and ensure customer information is secure through an AI
  • AI can personalize a customer’s behavior and offer relevant product displays based on their past purchases
  • AI lets you know your customer’s buying habits. That way, you can order more of what’s being bought, increasing profits
  • 83% of shoppers are willing to provide their information[11] in exchange for a personalized experience
  • Get insights on what your customers are purchasing more of. This gives you an idea of what they are going to buy next based on their most recent purchase from your store
  • create a comprehensive marketing strategy that can help promote your brand and products
  • present real-time data in an easy to understand format like a graph
  • payment options include smartphone payment options that support RFID like Apple Pay, Samsung Pay, and Google Pay
  • instead of waving the device over the POS terminal, customers will need cellular data to complete the transaction
  • A mobile POS system often consists of a tablet that accepts card, cash, and mobile payment options. Additionally, these systems can also be used as a standalone register for a self-checkout kiosk
  • a reliable POS system, you can easily keep track of everything in your store
  • It can also serve as a digital menu, where customers can input their orders. The orders will be sent directly to the kitchen, encouraging customers to order more
  • Rather than giving the card to a server and letting them run the transaction at the counter, customers can pay from the table
  • retail shops that offer self-checkouts, you can make your mobile POS into a static till
  •  
    The article focuses on trends that companies utilizing a POS system should look at deploying. Bolstered by figures supporting the success of the emergent trends, the article seeks to encourage operators to make the move sooner rather than later. The most prominent trends revolve around more efficient payment access. Customers appreciate the speed and available payment options. Companies are also able to manage customer data effectively and securely while also managing inventory and marketing. AI integration is also a forward trend that is allowing businesses to tailor their tactics to each customer individually. Perhaps the most important trend that is affecting other transaction systems as well is cloud based POS.
jordanfernandez

Proximity Marketing: Often Creepy, but It Doesn't Have to Be. | Center for Digital Ethics & Policy - 0 views

  • Imagine you’re out shopping one Saturday afternoon. You walk into a department store and see a big sign that reads, “Get our app and save!” You love a good deal so you scan the QR code and select “download.” You scroll through a user agreement with about 10,000 words of legalese and click “agree.”
  • As you walk down the street later, your phone is abuzz with notifications you’ve never received before: a constant stream of ads from each store you pass. You wonder how they’re reaching you, until you realize the department store app is still running — it must connect to other stores.
  • Target merged its “Cartwheel” coupon app — used by 27 million shoppers, saving them more than $1 billion — with the main Target app and incorporated new features.
  • ...9 more annotations...
  • This beats traditional advertising, which connects to consumers before they’re in a store — while they’re sitting on the couch at home watching television, for instance — and relies on them to remember the message later.
  • By using proximity marketing technology, stores can catch up by providing some of the perks of online shopping in person, like easy access to discounts, saved shopping lists and personalized recommendations.
  • Lastly, proximity marketing tools allow companies to gather behavioral data about their customers, including how often they visit a store and when, how long they stay and what areas of the store they gravitate toward.
  • Proximity marketing — location-based direct marketing in which a business or other organization sends offers, promotions, alerts or other messages to a person's smartphone based on the device’s location — is annoying, creepy and downright invasive in this story. But it doesn’t have to be. When implemented ethically, proximity marketing can provide worthwhile benefits to marketers and consumers alike.
  • But completely opting-out of proximity marketing — agreeing to all or nothing — should not be the only way consumers can protect themselves.
  • Their recommendations include displaying in-store signage notifying shoppers that their location data is being collected, letting consumers opt-out of analytics services, limiting how data is used and never selling personally identifiable data to a third party.
  • If retailers want their customers to shed the “malicious” connotation that comes with data tracking, they need to be upfront about how they are using that data, including location.
  • Target’s privacy notice is currently 4,359 words and the top of the page reads, “We may change or add to this privacy policy, so we encourage you to review it periodically.” How many customers read the whole statement and check back periodically for updates?
  • So let’s reimagine our scene in the department store: Again, you download its app. This time, the user agreement is a few clear bullet points. The app walks you through a quick Q&A to find out if it can access your location to make your shopping experience easier. It asks if it can share your information with its partners — other stores, whose names the user agreement lists out explicitly — and gives you an option to opt out.
  •  
    This article addresses what proximity marketing is and how it can be beneficial to marketers and consumers if done right. It talks about how companies throw hundreds of pages of legalese when downloading new apps that people never read. They recommend to include displaying in store signage notifying shoppers that their location data is being collected, letting consumers opt out of analytic services and limiting how data is used without selling personal identifiable data to third party. I believe if companies make it easier for us to trust them with our data more people will use this style of marketing.
nbakir

Five Influential Marketing Trends in the Tourism and Hospitality Field | By Shangzhi (Charles) Qiu - Hospitality Net - 1 views

  •  
    The article concentrates on the latest and most fashionable marketing practices in the hospitality sector. It is noteworthy that the industry learns from other sectors and strives to match its practices to realize growth. The author, Shangzhi Charles Qui, identifies five major marketing trends likely to influence the future of hospitality and tourism. They include augmented reality, virtual reality, viral, human spirit, and collaborative marketing. In line with augmented reality, it would be critical in the industry to provide a new view of the world with extra information. According to Qui (2016), augmented reality suits the industry since it "has already been used in improving tourist experience, particularly adding entertaining elements to the journey." Virtual reality suits the industry as it will provide a more direct user experience instead of relying on photos and videos. The author observes viral marketing using social networks that have been used by Unilever, Volkswagen, and Nike. A critical aspect is that "viral marketing is based on the power of word-of-mouth (WOM)," making it more effective in transforming the purchase behavior of customers (Qui, 2016). Based on human spirit marketing, customers are leaning towards products that touch their spirituality; that is, their hearts. The last trend, collaborative marketing, increases interactions between businesses and customers, businesses and businesses, and consumers and consumers. It applies to the industry because "collaboration is particularly important in destination marketing effort due to the fragmented nature of the tourism industry" (Qui, 2016). Therefore, it will become the commonest marketing strategy in the future.
xrive007

McDonald?s beacon strategy pushes in-store conversion rate to 20pc | Marketing Dive - 0 views

  • beacon-enabled promotions to customers within its venues via a mobile application, resulting in a conversion rate of 20 percent.
  • enhance its personal relationships with customers as well as increase awareness of a new line of coffee-flavored beverages
  • surprise and delight our customers not only with great food at a reasonable price, but also by enhancing their shopping experience using new technologies
  • ...12 more annotations...
  • the brand seeing 30 percent of users who received the promotion using it more than once.
  • it?s important to send relevant offers to users and not just spam them
  • loyalty app, to reach those fans and deliver relevant offers.
  • Proximity marketing was selected to build in-depth relationships with our customers and to introduce to them our new set of coffee products
  • make it possible for us to see the conversion rate of a visit
  • Each time a Shopping Genie user entered the beacon-enhanced premises, he or she would receive a mobile coupon prompting them to purchase one coffee and receive a beverage from the new drink line for free.
  • tailor users? promotions to their pre-selected likes.
  • easily able to measure conversion rates, as well as consumers? interest in the new products.
  • also able to deduce which customers did not use their offer
  • able to pinpoint that 20 percent of the loyalty app?s users identified themselves as interested in receiving the types of offers that McDonald?s was testing, while 30 percent who received a promotion used the offer more than once.
  • This aided the brand in figuring out which consumers were repeat customers, in addition to when and where they walked in from.
  • they wanted to advertise a product that they had just introduced, and they used beacons to identify customers who were at the point of purchase and change their behavior
isabelladlp

Confidentiality in the Hospitality Industry - 0 views

  • No specific laws govern confidentiality in the hospitality industry, but your contracts and policies should clearly dictate what degree of privacy customers can expect.
  • Hospitality businesses routinely swipe customer credit cards and may gain other sensitive financial data, such as a customer's bank account information.
  • If you inadvertently leak this data, you could be legally liable for your negligence, resulting in costly lawsuits.
  • ...18 more annotations...
  • If your connection isn't password protected, anyone can access the system.
  • And even with a password, computer-savvy network users can gain access to another user's data.
  • Hospitality workers don't have any special legal authority, so they can't physically restrain a customer. Instead, they should call the police if they suspect criminal activity.
  • Your company's confidentiality policy can educate customers about the amount of privacy they can expect.
  • If you promise a customer a specific amount of confidentiality and then break that agreement, you've broken your contract and can be sued.
  • No one can contract to engage in illegal behavior, and if someone is in immediate danger, it's your duty to take steps to protect him.
  • It also establishes guidelines for employees to follow, and a clear policy can even protect you against lawsuits.
  • The U.S. Supreme Court has established that hotel customers have a "reasonable expectation of privacy" in hotel rooms.
  • You can't enter or search a guest's room without her explicit consent, but guests are not entitled to any special privacy
  • As a business owner, you value the privacy of company secrets and procedures, which is why you expect your employees to maintain some standard of confidentiality
  • confidentiality in employment is implicit, regardless of whether employees have signed an agreement.
  • If a member of your staff violates this explicit or implicit agreement, the penalty for breach of confidentiality can be severe and long-lasting.
  • an employee who signs this type of agreement agrees that a violation of confidentiality is also a violation of the employment contract. The penalty for breach of confidentiality isn’t restricted to employees who have signed confidentiality agreements,
  • if you own a computer security company and an employee’s laptop is stolen, and that employee didn’t encrypt sensitive data on that computer per company policy, it could constitute a breach of confidentiality.
  • Healthcare privacy is essential, not only to protect a patient’s right to decide who has access to sensitive information but also to protect doctors and other healthcare professionals from malpractice claims.
  • Theft is a violation of criminal law that in some instances can be punishable by a stiff fine or imprisonment.
  • As a business owner, you would report the theft to law enforcement, and the state or federal government would charge your employee with the crime.
  • Employers will not look favorably on any prospective employees who were terminated due to a confidentiality breach, or convicted of a crime related to that type of violation.
« First ‹ Previous 161 - 180 of 216 Next › Last »
Showing 20 items per page