Skip to main content

Home/ Hospitality Technology/ Group items matching "cyber" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
9More

5 biggest cybersecurity threats | 2021-02-03 | Security Magazine - 0 views

  • Since the beginning of the pandemic, the FBI has seen a fourfold increase in cybersecurity complaints, whereas the global losses from cybercrime exceeded $1 trillion in 2020. 
  • In 2020, almost a third of the breaches incorporated social engineering techniques, of which 90% were phishing.
  • Ransomware is a data-encrypting program that demands payment to release the infected data. The overall sum of ransom demands will have reached $1.4 billion in 2020, with an average sum to rectify the damage reaching up to $1.45 million.
  • ...5 more annotations...
  • here were 4.83 million DDoS attacks attempted in the first half of 2020 alone and each hour of service disruption may have cost businesses as much as $100k on average.
  • Third party software. The top 30 ecommerce retailers in the US are connected to 1,131 third-party resources each and 23% of those assets have at least one critical vulnerability.
  • umber of the attempted breaches grew by 250% compared to 2019.
  • The global market for cloud computing is estimated to grow 17% this year, totaling $227.8 billion.
  • To strengthen the cloud computing defenses in the future, stakeholders should pay attention to proper cloud storage configuration,
  •  
    This article breaks down the 5 largest threats we face in terms of cybersecurity. Since the pandemic started, cybersecurity complaints have increased fourfold. These losses are piling up dramatically, necessitating an increased level of vigilance and preparedness.
3More

The biggest hacks, data breaches of 2020 | ZDNet - 4 views

  • Data breaches, network infiltrations, bulk data theft and sale, identity theft, and ransomware outbreaks have all occurred over 2020 and the underground market shows no signs of stopping.
  • Many companies and organizations, too, have yet to practice reasonable security hygiene, and vulnerabilities pose a constant threat to corporate networks. As a result, we've seen a variety of cyberattacks this year, the worst of which we have documented below
  •  
    This article lists and describes cyber threats that have occurred on companies in 2020. It is very important to note that big companies have been impacted by security breaches. In the article it stated that since work has changed to a "work from home" approach, there has been a raise in cyberattacks and security breaches.
12More

4 Cyber Security Insider Threat Indicators to Pay Attention To | Ekran System - 0 views

  • Insiders can target a variety of assets depending on their motivation.
  • they focus on data that can be either easily sold on the black market (like personal information of clients or employees) or that can be crucial to company operations (such as marketing data, financial information, or intellectual property)
  • Usually,
  • ...8 more annotations...
  • he most frequent goals of insider attacks include data theft, fraud, sabotage, and espionage.
  • Detecting a malicious insider attack can be extremely difficult, particularly when you’re dealing with a calculated attacker or a disgruntled former employee that knows all the ins and outs of your company.
  • Of course, behavioral tells that indicate a potential insider threat can vary depending on the personality and motivation of a malicious insider.
  • 1. Disgruntlement
  • 2. Unusual enthusiasm
  • 3. Unusually frequent trips and vacations  
  • 4. Unexplained changes in financial circumstances  
  • Insider threat detection is tough. There are no ifs, ands, or buts about it. However, every company is vulnerable, and when an insider attack eventually happens, effective detection, a quick response, and thorough investigation can save the company a ton of money in remediation costs and reputational damage.
  •  
    "Insiders can target a variety of assets depending on their motivation. Usually, they focus on data that can be either easily sold on the black market (like personal information of clients or employees) or that can be crucial to company operations (such as marketing data, financial information, or intellectual property). Frequent targets of insider attacks include:  Databases"
1More

Hilton Was Fined $700K for a Data Breach. Under GDPR It Would Be $420M | Digital Guardian - 0 views

  •  
    This article goes over the multiple lawsuits that Marriot had to face due to a massive cyberattack in 2015 where multiple credit card numbers were leaked. I think this is a perfect example of how cloud computing is not a bulletproof system at the moment and how it still has much room to grow. Similar cyberattacks happen all over the world some on a smaller scale and some on a larger one. I believe this is an article that everyone should read to truly understand the reproductions that a company can face if they don't have a strong cyber defense.
22More

What is an HRIS? A key tool for all your human resources needs | CIO - 2 views

  • Absence management
    • yvenisem
       
      I remember I had to manually put this in because the time cards and the leave tracking feautures were not linked.
  • Most HRIS offer broad self-service functionality to streamline HR functionality and ease the administrative burden.
    • yvenisem
       
      I worked in HR for a couple of months and it is INSANE how much paperwork they have to deal with
  • An effective HRIS provides information on just about anything a company needs to track and analyze data about employees, former employees, and applicants, from their first application, through their tenure on the job, to resignation or retirement. It’s a one-stop-shop for individuals, employees, managers and hiring and recruiting professionals to find information when they need it.
    • yvenisem
       
      Best way to describe it, almost sounds like the perfect tool
  • ...7 more annotations...
  • HRIS can free HR administrators from handling non-strategic, mundane HR tasks such as data entry so they can focus on more human-related tasks, such as interviewing and personnel development
    • yvenisem
       
      Most important feature. HR is so much more than paper, we need more interaction with HUMANS
  • An HRIS can also improve privacy and security by securing information digitally.
    • yvenisem
       
      There is a concern for if there was a cyber attack
  • As such, a comprehensive HRIS enables a company to more effectively project and budget its HR costs, and it can improve efficiency when it comes to decision making
    • yvenisem
       
      Especially when it comes to compensation
  • uch procedures can be automated and performed independently, without the need for human supervision or intervention.
    • yvenisem
       
      This is what technology is for and some companies are not yet making the switch
  • Kronos Workforce
    • yvenisem
       
      We use this at my job!
  • Workday
    • yvenisem
       
      We use this for the part-time employees
  • rovide training to ensure your HR professionals are adept at using the solution and know where to go for help.
    • yvenisem
       
      AS WELL AS MANAGERS IN ALL DEPARTMENTS
  •  
    This article briefly introduces HRIS. The article first introduces the reader to what HRIS is, and then briefly introduces the differences between HRIS and HRMS and HCM. The functions of HRIS include management of employee information, company documents, recruiting / ATS (applicant tracking system), benefit administration / open enrollment, absence management, compensation management / payroll, training and development / performance management. Effective HRIS can provide all the information the company needs to track and analyze data about employees, former employees and candidates, from the first application to the term of office until resignation or retirement. HRIS can also improve the efficiency of human resource decisions. Finally, the article also gives considerations for choosing HRIS solutions and HRIS implementation skills.
  •  
    This article goes over the main basics of HRIS's in terms of the different names used, what is is used for, and the benefits of the systems. The benefits section is the meat of the article, as it shows how these systmes can free up time and energy from mundane tasks once they are automated. One example of this is tracking leave. I remember that i had to once go back and add sick, annual, job basis, and family medical leave for over 500 employees because this was not (and still is not) automated. In conjunction with my other projects, this took a couple of months do to because no one had been doing it for a year.
1More

Disney shuts down Playdom forums after suffering data breach, over 350,000 users' data ... - 0 views

  •  
    This article is about the 2016 disney security breach that attached their Playdom platform and exposed thousands of people personal data.
14More

Attacked by Ransomware, Many Companies Opt to Pay Up - CFO - 1 views

    • emmajeenie
       
      The demanded ransom is often a moderate amount that would pale in comparison to the recovery and reputational costs for a company that refuses to pay.
  • Hospitals, for instance, are frequent targets of these kinds of attacks, in part because people’s lives are on the line so they have to make quick decisions.
  • , in a ransomware attack the data isn’t released or leaked or sold. On the contrary, in most cases, data and infrastructure aren’t compromised at all; its owner just can’t access them.
  • ...11 more annotations...
  • y rose 41% from 2018 to 2019 to more than 205,000 globally, according to newly published data.
  • the security firm Coveware estimates the average payout for those that did was about $85,000 during last year’s fourth quarter, and more than $190,000 in December.
  • its leaders give in — and pay the ransom.
  • Organizations have more to lose financially from the inability to conduct business than they do from just paying the ransom
  • It’s like the plot of a James Bond movie: Hackers take control of a global organization’s computer systems and threaten to destroy its records, steal its intellectual property, and drain its bank accounts unless a hefty ransom is deposited into an untraceable offshore bank account by the end of the day.
  • ” the ransom is likely a significantly smaller amount than what it may cost to address a threatening public issue or the time and money necessary to rebuild the confidence in a brand or company.
  • Experts suspect that the actual number of ransomware attacks is much higher than the reported number, citing reasons ranging from fear of job loss, investor withdrawal, and reputational damage
  • Moreover, while public companies are required to report cyberattacks to regulators, private organizations are under no such mandate. Reporting attacks to law enforcement often may cause lengthy investigations
  • A hacker can keep repeating a ransomware attack until the security flaw is fixed or they are caught or reported.
  • Organizations can undertake a few basic defensive actions to mitigate the impact of a ransomware attack. Frequently backing up data and storing it on different networks is one way,
  • reducing the number of outside apps the system uses, fixing software vulnerabilities immediately, and properly training and educating employees on what to look for and whom to alert if something appears suspicious.
15More

Hotels Remain a Prime Target for Hackers - Security Boulevard - 0 views

  • Two years ago, in its “Hotels Outlook Report 2018-2022,” PWC found that hotels are a favorite target for hackers, with the hospitality industry having the second-highest breach numbers after the retail sector
  • . The same report found that 74% of hotels lacked breach protection
  • In 2018, hackers attempted to access Marriott International’s Starwood Hotels & Resorts Worldwide guest reservation database. In the same year, the Radisson Hotel Group identified a breach affecting Radisson Rewards members
  • ...11 more annotations...
  • These breaches can also be costly, with the UK’s Information Commissioner’s Office (ICO) fining Marriott $23.8 million for the Starwood breach.
  • Today, close to 50% of all bookings happen through online travel agencies or online channels, with the share of offline bookings dropping every year.
  • For hotels, the information is exchanged between the payment gateway, the OTA, the intermediary and its central reservations system (CRS
  • These multiple data exchanges among partners leave the data that much more susceptible to breaches
  • , as not all providers have the same security standards.
  • First, they should reduce the temptation to focus on standalone point solutions
  • Instead, they should look at technology providers that help in securing the entire data value chain by focusing on having a security framework that stops data from moving outside of the country (which is where it is typically misused
  • Second, hotels should know the storage practices and policies of all providers, insisting on a zero percent storage rate to reduce the chance of personal data getting expos
  • Similarly, hotels should make sure that partners do not store any credit card information locally, which will reduce the risk of exposure
  • lso, with most companies using some form of cloud infrastructure, hotels should know the structure used by any partner (private, hybrid, public) as well as what protections are in place
  • They will also be taking an important step in protecting their brand identity, as brand will be essential as the recovery from the COVID-19 fallout continues
  •  
    This article points out that hotels are still a huge target for hackers. Hotels need to make sure they reduce the temptation on standalone point solutions. Hotels should focus on having a security framework that stops data from moving outside of he country. To limit hacking as well, hotels should not store information locally. It was surprising to read that 74% of hotels lacked breach protection.
8More

Safety & Security Tips for Hotel Management | Chron.com - 1 views

  • Hotel crime may be even higher than the statistics show, because most hotel guests report the crime to the hotel, but not to the police, and hotel managers might not report the crime to law enforcement.
  • Employees to
  • Train
  • ...3 more annotations...
  • now Safety Procedures
  • Keep Your Guests Informed
  • For example, if you have an intelligent access control system, each guest needs to know that their key card grants them entry to the pool, gym and any other areas that are solely for hotel patrons. It's also important that a hotel guest does not hold the door open for a person who's directly behind him, as this individual might not be a paid hotel guest. If all hotel staff knows the script word for word, this procedure becomes an integral part of hotel check-in. That way, all guests know they've been apprised of their responsibilities in keeping themselves and their valuables safe.
  •  
    Good Evening, This article is about hotel security with tips and suggestions how guest can remain more secure without impeding there vacations. Like Professor Joseph said during his class time when he's on vacation he doesn't watch the immediate surroundings. .Most time crimes are not reported by the guest to local jurisdiction they mostly go to security team and hotel managers who might not want to tarnish there reputation. I remember watching Law and Order SVU quite often most university ploy this same tactic of not reporting crimes. Lastly cyber security is most important to be fixed hotel guest don't wanna have to worry about there personal information getting out on the dark web.
  •  
    This article talks about some security measures hotels can take to tighten security. Controlled employee access areas or controlled guest areas where the room key is needed to get into locations for guests is one way to control unwanted guests. Face recognition systems is a tool to identify guests and others. The use of the mobile device as a room key works as a way to help with security as guests usually have their cellphones on them most of the time. Training employees on security measures can help fill in the gaps of loop holes in the security system.
12More

What you need to consider when choosing a new property management system - 0 views

  • An intuitive interface, as well as an easy-to-read dashboard, go a long way in encouraging employee adoption, reducing training time, and generally improving the working lives of yourself and your team
    • npate083
       
      PMS should be user-friendly so employees can adapt to it faster, reducing training time. It will also make the work easier for your team.
  • A great PMS is one that your team will want to use. Since “good” design is in the eye the beholder, search for a System that balances functionality with an interface that makes sense to you.  
  • GDPR-compliant personal data storage PCI-DSS-compliant processing and card storage Geographic diversity of servers to reduce downtime risk Bank-level encryption of all data Controlled access to the physical area for any on-premise PMS servers
  • ...5 more annotations...
  • robust user access controls
    • npate083
       
      A good PMS system should also have systems in place to maintain guest privacy and payment security.
  • PMS that molds itself to your business,
  • The right PMS is the one that plays well with your existing tech stack. Without the necessary integrations, a PMS cannot perform its functions correctly.
  • One of the reasons why integrations are so important is that a poorly integrated PMS impedes proper reporting
  • All budget certainly matters, it shouldn't be the first criteria. I
  •  
    The article overall discussed the the most necessary things one must observe when choosing a new PMS system. A PMS system must first of foremost be budget friendly. PMS system is the main software for a hotel so the cost is valued highly. Most companies would prefer a pms system that is cost efficient. A PMS system also needs to be easy to use, it must be able to be handle by employees and easy to read and maneuver. The PMS system must also be secure and have controlled access. It also needs to be able to mold to the hotels system.
  •  
    The article overall discussed the the most necessary things one must observe when choosing a new PMS system. A PMS system must first of foremost be budget friendly. PMS system is the main software for a hotel so the cost is valued highly. Most companies would prefer a pms system that is cost efficient. A PMS system also needs to be easy to use, it must be able to be handle by employees and easy to read and maneuver. The PMS system must also be secure and have controlled access. It also needs to be able to mold to the hotels system.
6More

Top Cybersecurity Challenges for the Hospitality Industry | KirkpatrickPrice - 0 views

  • Organizations within the hospitality must consider why they’re a target for cybersecurity attacks, which data privacy and security frameworks and regulations apply to them, and what challenges they will face.
  • Data Collection
  • When Marriott’s guest reservation database was breached, the names, mailing addresses, phone numbers, email addresses, passport numbers, rewards account information, dates of birth, gender, arrival and departure information, reservation dates, communication preferences, and encrypted payment card numbers of up to 383 million guests were compromised –
  • ...2 more annotations...
  • Data collection inherently makes the hospitality industry a target for hackers and cyber attacks
  • If a hacker can get into just one location’s gift shop or front-desk system, they can access a whole lot more
  •  
    This article talks about the many challenges for the hospitality industry due to hacking. One example is interconnected technology. If a hacker can hack into one location, they can hack into multiple connected locations.
7More

Cybersecurity in Tourism & Hospitality: the urge of protecting customer data - NTG - 0 views

  • Organizations in tourism and hospitality have massive databases of personal data nowadays as they ask their consumers to leave their data for better and optimized services.
  • Cybersecurity is defined as the area related to computing and telematics that focuses on protecting the computer infrastructure and avoiding all types of threats, which put at risk the information that is processed, transported and stored in any device.
  • The accommodation industry is beginning to be aware of the relevance of this topic: if hotels do not manage this issue properly, they lose the opportunity to give the clients the reliability and security they need.
  • ...3 more annotations...
  • n many cases, it is the employees themselves who fall into errors that expose the security of the hotel and the privacy of their clients through a lack of cyber security. Incorrectly shared passwords, professional accounts that link to personal devices or the dissemination of internal company information are some of the mistakes employees make. In order to correct these errors and ensure that they do not happen again, training and awareness-raising are the keys.
  • Employees must be informed at all times about the correct practices to be followed, thus avoiding making mistakes that in most cases have terrible consequences, both for the hotel and for the customers themselves.
  • For the peace of mind of the guests, the hotels should complete constant intrusion tests to evaluate the state of the systems, auditing their security from the point of view of possible external attacks. In order to make an optimal security assessment, it is best to carry out controlled attacks on the systems.
  •  
    This paper mainly discusses the importance of network security in tourism and hotel industry. Due to the characteristics of the industry, it is inevitable for hotels to manage and protect their customers' personal data. Therefore, network security is very important for hotels. Then the author analyzes the reasons of the hotel data breach and puts forward solutions. The main approach is conduct network security training for employees and regularly evaluates the system status.
9More

What the Marriott Breach Can Teach Us About Cybersecurity in the Tourism & Hospitality ... - 0 views

  • Marriott breach that compromised the records of up to 500 million customers. The data breach occurred through the IT company, a third party, that managed the Starwood reservation database.
  • Marriott took too long to disclose this breach.  Even though the breach was found in September, disclosure did not occur until nearly three months later — and ultimately, the company failed to protect valuable customer information. The company is already the subject of class action lawsuits that could have a severe impact on the organization.
  • Over the last 3+ years, the Tourism & Hospitality sector has been very average (if even just a bit below) when it comes to cybersecurity performance as compared to other industries.
  • ...5 more annotations...
  • Since 2016, nearly 5% of the tourism & hospitality entities that BitSight tracks (out of a total of almost 2,000) have experienced a publicly disclosed data breach. This is the 4th highest percentage of breach out of the 23 key sectors BitSight monitors, trailing only healthcare, education, and government.
  • Though it is often assumed that larger organizations perform better in cybersecurity, the data on Fortune 1000 companies in this industry suggests otherwis
  • For example, Fortune 1000 tourism & hospitality companies are performing poorly compared to the sector as a whole when it comes to reducing unnecessary Internet exposures (“Open Ports”).
  • For all companies, tourism & hospitality has the 2nd highest percentage of companies with an Open Port grade of D or lower (Education is 1st).
  • Ultimately, cyber incidents like the Marriott breach confirm that companies in this industry need to be much more about proactively mitigating the risk posed by their supply chain given the sensitive consumer information they contain in their databases.
  •  
    Bitsight examines the 2018 Marriott reservation management database breach. Using the breach as an example, this article shows how poorly the hospitality and tourism industry performs in cybersecurity versus other sectors.
9More

Survey Shows US Cybersecurity Attacks Costing Orgs More Money - 0 views

  • Survey Shows US Cybersecurity Attacks Costing Orgs More Money
  • Cybersecurity attacks are leading to estimated financial losses of an average of $884,000, according to an IDG survey.
  • "As organizations prepare for various attacks and breaches, hackers continue to be savvier in their approaches,”
  • ...6 more annotations...
  • “Resilient organizations must have all employees embrace security practices, from awareness training to behavior monitoring to gap protections."
  • Firewalls, spam filtering, network-based antivirus tools, access controls, and encryption were listed as the most effective solutions for detecting or deterring external threat factors.
  • The top three types of cybersecurity incidents also differ depending on whether it was an insider or outsider threat. The report found that outsider threats tend to consist of the following: Unauthorized access to/use of information, systems, or networks Customer records compromised or stolen Confidential records (trade secrets or intellectual property) compromised or stolen
  • The average cost of a data breach is $3.62 million globally, according to the 2017 Cost of a Data Breach Study: Global Overview sponsored by IBM Security and conducted by Ponemon Institute.
  • "Data breaches and the implications associated continue to be an unfortunate reality for today's businesses," Ponemon Institute Chairman and Founder Dr. Larry Ponemon said in a statement. "Year-over-year we see the tremendous cost burden that organizations face following a data breach.”
  • Cybersecurity incidents stemming from insider threats will include private or sensitive information being unintentionally exposed, customer records being compromised or stolen, and employee records being compromised or stolen.
23More

ITInvestmentAnalysis_Hospitality.pdf - 0 views

shared by marble_bird on 12 Jul 20 - No Cached
  • This study aims to determine the feasibility of IT investment in hospitality and determine the value and tangible/ intangible benefits from IT implementation.
  • Nowadays hospitality thinks that technology can improve business effectiveness and efficiency. Hospitality in Indonesia, especially Jakarta was competing to provide the best service in terms of information and technology. Moreover, implementation of IT is one of strategies to improve hotel performance
  • Based on previous research, IT implementation at the hotel has been started since 1980s until 1990an, many hotels that invest millions of dollars for information technology about 4.4 million dollars
  • ...19 more annotations...
  • Gaining competitive advantage [7] such as, IT security investments may stop the competitors to absorb market power. From other studies that point to problems appearing in hospitality to find out if the IT they invested is effective, [8] asserts that many hospitality companies have no procedures to see how effectively their spending on information technology is.
  • Various sources of data that show about IT investment in the hotel, then the problem is the existence of large amount of investment for IT development without understanding IT effectiveness for the hotel [11], the managerial party who difficult to give data about the values and intangible/tangible benefits.
  • According to [14], an IT investment consists of the total life cycle cost of an entire project or project chunk that involves IT, including the post-project operating cost of the system that was implemented. The investment ceases to exist when it is replaced or eliminated for any reason.
  • Evaluating expense or impact of large IT investment may vary from study to study [15]. In order to evaluate IT investment, Information Economics (IE) is a set of calculating tools to measure the benefits and costs of an information technology project.
  • The benefits of IT/IS that organizations use can be viewed by combining Simple ROI analysis and analysis of technology and business domain.
  • This study using Information Economic approach in order to do feasibility assessment that combine technology domain and business domain
  • The data collected includes the financial data of 5-star hotels and IT projects undertaken, as well as the costs for the technology used today. This stage is also done spread the questionnaire online for intangible value analysis of business domain and technology domain
  • The feasibility of IT investment can be known ROI score generated on the economic impact sheet. According to [23], to calculate simple ROI, there are three worksheets, such as: development cost sheet using ratio, ongoing work sheet, and economic impact sheet. The final value of the ROI and the scores of corporate analysis is incorporated into the IE
  • The Scores on the IE Scorecard will show the value and benefits of investment for IT.
  • The huge demand for the Internet makes many hotels present the speed and bandwidth that can satisfy the guests.
  • E-Concierge Service Management. Service to entertain hotel guests and modern travelers is currently working with smartphones in the form of E-Concierge Mobile with technology called Mobile Guest Softphone (MGS).
  • IT Security, the problem that arises when using IT in a company/organization is its security. For companies/organizations and even hotels are also very vulnerable to information that can harm the hotel in case of cyber attack.
  • According to Table 2, Mandarin Oriental Hotel ROI score is 1. This score means that the IT investment is feasible. Above 100% for Simple ROI means that IT implementation give profitability to the hotel and able to invest more in the future
  • Value Linking approach implemented in 5-star hotel, implementation online reservation and e-Concierge management, hotel guests can quickly make room reservations and guest data collection will be better. For e-Concierge the process of entering guests to the room will also be easier
  • This value showed that 5-star hotels in Jakarta have the time and opportunity to invest more in the future. Therefore, it is necessary to focus on future growth and development of existing infrastructure.
  • It can be concluded that IT implementation and IT projects in 5-star hotels in Jakarta are quite useful. E-Concierge, mobile apps and online reservation are most valuable and success investment for 5-star hotel. But, in order to improve the performance of hotel IT, which in terms of security and improve hotel services, need a system improvement in accordance with the hotel program, so it can support the vision and mission of 5-star hotels in Jakarta.
  • The result of financial analysis that is calculated ratio and processed in economic impact sheet obtained simple ROI and can be concluded that in terms of cost, IT investment in 5-star hotels in Jakarta can provide economic benefits for the hotel.
  • The investment quadrant shows that a 5-star hotel has a solid business base, has the time and opportunity to invest in the future. The 5-star hotels in Jakarta also have the time and opportunity to invest more in the future. Therefore, it is necessary to focus on future growth and development of existing infrastructure.
  • This value indicates that IT investment in 5-star hotel in Jakarta is considered economical enough, and quite helpful and useful in supporting hotel business process.
  •  
    This article covers a study performed on various 5-star hotels in Jakarta on the effectiveness and feasibility of IT investments. The study is performed via a questionnaire distributed to hotels in the area with associated data values for analysis. The study finds that IT investment in 5-star hotels in Jakarta is economically feasible and could provide these businesses with competitive advantage and profit.
28More

Council Post: Nine Ways Tech Companies Can Stay Ahead Of The Curve - 2 views

  • Technology is changing at an exponential rate, with new software and systems emerging constantly
  • The fast pace of technological advancements requires businesses in the field to spare no effort in staying up to date with the changes or, indeed, being at the forefront of change, if they want to stand out and be successful.
  • ways in which tech businesses can be prepared for change and stay ahead of the curve.
  • ...20 more annotations...
  • Embrace The Discomfort
  • Be receptive and adaptive to change, however uncomfortable that may be.
  • Tech execs need to disrupt the current thinking within an enterprise, they need to be agile in decision-making, take risks and keep up with the innovation ecosystem.
  • Respond Rapidly To Change
  • Technology executives need to be able to respond rapidly to this change, not let it overwhelm them
  • Be Disruptive And Agile
  • It is important to understand the strengths and weaknesses of your team.
  • Focus On Innovation
  • Innovation isn't about managing at scale. It's about focusing on the one key product that will win an industry
  • Not Be Afraid To Ask 'Dumb' Questions
  • Be Innovative And Proactive Instead Of Reactive
  • With the rate technology advanced in the past, executives needed to be flexible and adaptable
  • Technology leaders need to innovate, to be proactive rather than reactive. The ones who will be successful are the ones who will find new, creative ways to use technology to make their teams better
  • Understand Scale
  • Technol
  • From the internet of things to artificial intelligence, the tech space is ever-evolving and is doing so at breakneck speed
  • his is how critical items, especially in cyber defense strategies, get missed or simply incorrectly configured. Leadership is knowing when your team needs help
  • he best thing I can say will bring success to any technology exec is to get a coach.
  • Their coach helps them be accountable, bounce ideas around and will be there for them when they need advice and support.
  • Are their technologies and teams going to scale to the challenges they are facing today and tomorrow
  •  
    This article looks at the ways that companies can use to remain ahead of the curve in technology. Such ways include being receptive and adaptive to change, understanding the strengths and weaknesses of their teams, responding to change quickly, as well as being disruptive and agile. The article also encourages businesses to pay attention to innovation, and to be proactive and innovative, instead of reactive.
  • ...2 more comments...
  •  
    This is a great read. When a company is willing to see where they can improve (just like anyone in life), it gives them a better edge at being successful. If they turn a blind eye to growth and change, they do not realize how detrimental this can and will be to their company.
  •  
    I thought this article was very informative and useful for companies who are innovative and like to think ahead. It is important to be adaptive and flexible when change arises. It is also important to be quick when responding.
  •  
    This article was very interesting and informative. It is eye-opening to the business owner because it mentions ways in which companies can be steps ahead from the competition. This is important for a company because as things change and evolve, a company needs to be able to adapt to the circumstances to be able to survive and not be replaced by another company.
  •  
    the article explains how companies can stay ahead of the curve in technology and outdo their competitors
59More

Recognizing-events_4.0.pdf - 1 views

shared by marble_bird on 22 Jul 20 - No Cached
  • The purpose of this research is to explore and define the digital maturity of events using the Industry 4.0 model (I4.0) to create a definition for Events 4.0 (E4.0) and to place various relevant technologies on a scale of digital maturity.
  • These surveys and the thorough literature review that preceded them allowed us to map the digital technologies used in events to levels of a digital maturity model.
  • This study has responded to calls from the academic literature to provide a greater understanding of the digital maturity of events and how events engage with digital technology.
  • ...54 more annotations...
  • We found that engagement with technology at events and delegate knowledge satisfactorily coexists for and across a number of different experiential levels. However, relative to I4.0, event research and the events industry appear to be digitally immature.
  • Events are in the midst of rapid social and technological change. With a growing variety of technological means, the industry is fast-paced and increasingly delivered to a discerning consumer market while finding ways to connect with consumers through technology
  • Digital technology is the thread of the fabric of organisations (Li et al., 2018). It is an increasingly important part of how they engage with their customers.
  • Moreover, engagement with events as fans, spectators, delegates or organisers can be augmented with digital technology by improving access and sociability capabilities, refining the personalisation of events, and thereby creating enhanced experiences.
  • As we advance into what many in business and academia consider to be a fourth industrial revolution, the capacity to control and exchange data electronically has extended our ability to create, edit, maintain, transmit and retrieve information.
  • I4.0 can be described as the digitisation and automation of the manufacturing environment. It also creates digital value chains to enable the communication between products, their environment and business partners. Digital applications have impacted the tourism sector too giving rise to ‘Tourism 4.0’
  • The events industry is an ideal environment to benefit from the implementation of a widespread digitised approach with numerous organisations empowering managers and improving the overall event experience with the integration of extensive ICT practices and systems.
  • With the more widespread adoption of digitalization in event delivery and as the supply chains of all events become intertwined with technology, we can learn how the digital maturity of events in the 21st century is shaping event management and event control.
  • The team set out to answer the following research questions: RQ1. Can digital maturity in events be defined? If so, RQ2. How should the levels of digital maturity of events be classified with regard to the digital maturity of the events industry and the development of event management theory?
  • Successful events are no longer measured by simply achieving a respectable attendance, a great deal more engagement is manifest through digital technologies
  • Successful events require organisers to create something that is considered by those who attend as a valuable and memorable experience (Pizam, 2010; Tung, 2011). Creating memorable event experiences can be described as being dependent on a number of factors including creating regular attendee engagement, providing appropriate activities, relevant subject matter, topical and contemporary focus and targeted to a sizable receptive audience.
  • technological factors being one of the most important areas of demand for companies along with the implementation of I4.0. SMEs (Small to medium enterprises) are [lagging] behind in developing strategies to implement new solutions.
  • The development of digital maturity in events can be compared to smart tourism, which Gretzel et al. (2015) expressed as a logical progression from traditional activities. Smart tourism is characterised by an ability to transform large amounts of data into enhanced tourist experiences and increased destination competitiveness thanks to the interconnection of the different stakeholders through latest ICT advancements
  • As the components of I4.0 become more prevalent in the events industry, much value can be obtained from understanding how businesses are adopting new levels of digital engagement in order to engage their audiences
  • it is prudent to suggest that the survival, and future success of events can depend upon digital maturity and transformation
  • owever, dealing with digital maturity requires careful attention as Neuhofer (2016) urges caution advising that applied technology solutions have proven to have the ability to create or destruct the value of the experience.
  • I4.0 therefore acknowledges the impact of connected computers with the key constituents being cyber-physical systems, the Internet of Things, cloud computing and cognitive computing
  • highlighted that the use of communication networks globally has risen dramatically and become ubiquitous due to the rise of smartphone ownership. This has been fuelled by social media, apps and faster broadband speeds to create a networked society
  • By combining the Internet of Things data and big data (extremely large data sets that may be analysed computationally to reveal patterns, trends and associations, especially relating to human behaviour and interactions), event managers are able to create a competitive advantage.
  • As event companies develop new and innovative ways to connect, the events themselves are absorbing aspects of I4.0 at every stage of the process; pushing the boundaries of event experiences far beyond the physical world
  • They are used to promote events before, during and after delivery and are used to gather data and inform decision-making. Generating responses from an event can be achieved using a number of methods and through both qualitative and quantitative data.
  • With the advent of big data and analytics, new sources of valuable data are available to guide decision-making processes in a more informed manner. Businesses were once looking at historical data, but advances in database technology and system processes have led to near real-time data collection and analytics
  • Failure to adopt aspects of digital technology does not necessarily suggest a poor experience or the end for those businesses less digitally mature; not every event business relies on this kind of data support to survive. Instead, this research provides an opportunity to better understand where event businesses do engage and more importantly, how communication between non-digital and fully integrated individuals/businesses can be improved.
  • Digital maturity and transformation today differs from previous periods as it not only provides the change in the main business processes but also reveals the concepts of smart and connected products through service-driven business models
  • Our analysis begins with an attempt to uncover the potential challenges, on-going developments and various strategies that will provide the events industry and academics with a forward-facing approach to the growth of technology within events. By including industry professionals and academics, the research contributes to bridging the gap between practise and academia.
  • Because the research and empirical data collection includes industry perspectives, we believe this research will provide value to event managers, marketers and practitioners around the world who wish to understand more about the digital maturity of events.
  • After conducting the social media analysis (1), it became evident that the discussions appeared to be around topics that utilise digital technology rather than the technology itself. Furthermore, and probably a reflection on the value of the group, a lot of the data included questions about understanding the topics rather than providing usable information to our research.
  • We did not have detailed information about the precise characteristics of the individuals who contributed to the dataset of posts. However, to an extent, their roles listed in LinkedIn were informative. These included events consultants, social media managers, marketing professionals, EventTech managers, CEOs at tech companies and events students.
  • Although this response rate of 52 academics may be considered low, this did allow for the creation of the initial insights into the E4.0 concept and crucially it provides a starting point to better understand the levels of the developing digital maturity model.
  • The most referenced themes were social media, marketing, apps, GDPR and mobile. The top 14 themes are shown in Figure 1 below.
  • The results of the thematic analysis reveal the most pertinent events and technology topics in this group in the time period specified. The most common topics were social media and marketing. Marketing appeared alongside other topics as a verb, a noun and an adjective. This certainly influenced its prominence.
  • This statement reinforces the knowledge and general use of social media during events. Mobile and event apps were recognised as presenting opportunities to enhance events and were considered to be a permanent part of events.
  • Carefully managed and fully integrated data and digital systems including social media, apps and CRM create digital value chains to enable the communication between events, their environment, and business partners.
  • Event organisers invest heavily on social media engagement and expect a great deal in return through social media retweets, tagging and sharing of images. However, it is just as important to understand if delegates consider technology at events that important.
  • Our expert respondents were asked if they considered the events industry to be at the cutting edge of technology. Responses were largely supportive of the suggestion that it is. 64% agree, 22% neither agree nor disagree and 14% disagree.
  • Online registration/digital booking was very familiar with 65% ‘extremely familiar’ with the technology.
  • The survey also collected a selection of qualitative data as respondents were asked to if there were any specific examples of connected/digital technology considered to be essential to the delivery of an event that had not been discussed in the survey. Significantly, 23% answered no to this question.
  • With regard to the digital maturity of the events industry affecting the development of event management theory, the literature review indicates that academics are making contributions to theory and a broad understanding of digital technology exists.
  • industry appears not to be digitally mature. Also, our findings suggest that relative to I4.0 not all events are digitally mature. Therefore, the ‘digital immaturity’ of the events industry may be having some effect on event management theory
  • It became evident from the survey that many respondents suggested they were not familiar with technology that they would all have experienced.
  • The results from the survey suggest that widespread academic understanding of technology at events is extensive. Some digital technology is considered routine, while other comprehensively used technology appears to be unfamiliar to the end user.
  • The growing digital maturity levels form the foundation for E4.0 and will contribute to what Gerbert (2015) described as greater efficiencies and changing traditional relationships among suppliers, producers, and customers.
  • Therefore, satisfaction from the event comes down to providing delegates with the right communication levels they need to complete their individual objectives. This can range from the most basic social engagement to the gathering or observation of big data. Events are evidently a melting pot of experiences and goals and not all of them demand the highest levels of technology to complete.
  • Artificial intelligence has the ability to provide events with endless systems that sense, learn and decide throughout the delivery process though many gaps exist.
  • The data also indicates that there is good knowledge across all types of digital technology. This is reassuring for the development of education as the events industry embraces digitalisation
  • However, as more value is placed on the use of digital technology and events mature through greater access to technology, we see the emergence of an E4.0 era.
  • Thus, this model anticipates that events will grow in their digital maturity to level E3 and E4. Thus, digital technologies may become sufficiently embedded so that data related to one element of an event will be used to inform other elements of an event in real time
  • Online registration and wearable technologies such as delegate smart badges are superficial digital experiences and only considered as a process rather than as a fully perceived digital experience.
  • Our findings indicate that digital communications have enabled a shift in the content of events, marketing and the use of social media as a communication tool before, during and after the event.
  • On the limitations of our research, one might argue that engagement with technology, or indeed lack of it, does not provide evidence of the immaturity of digital technology in events. However, the digital maturity model that we propose is principally informed by the literature on digital technology and events.
  • This research has provided a revealing perspective on the use of digital technology in events. It has built on theory that has been previously developed in this and similar subjects of research, such as business and tourism. From this, the research can claim a number of contributions. It (i) provides an empirical investigation into how event businesses and individuals engage with digitally technology at events, and (ii) it provides a definition of E4.0 and other preceding levels that contribute to digital maturity.
  • Our research has shown that event delegates are aware of the ability to communicate in a reciprocal process with technology rather than through a linear/top down process. This in itself is evidence of E4.0. Furthermore, this research highlights how industry is continually striving to optimise the delegate/event relationship through apps and other technology. The industry’s on-going mission to create deeply flexible communication opportunities is eliminating the possibility of gaps in the communication process in order to optimise delegate engagement at events.
  • A broader discussion on potential issues such as IT & data security, skill-sets, expensive production costs and outages; these are significant problems within internet and cloud-based technology. Furthermore, the emerging topic of E4.0 itself requires both conceptual and empirical development.
  • This research has shown that there remains a great deal to discover about the use of technology at events and many opportunities exist for further research from academics and practitioners working together to provide mutual benefits for both industry and education.
  •  
    This article covers a study performed to determine the digital maturity of events. The research conducted reveals that the majority of industry professionals are aware of technology in events. The study ultimately finds that events have a low digital maturity, but high potential for advancement. The article also addresses the limitations of the study performs and agrees that additional research should be performed to determine the relevance of technology in the events industry while acknowledging that digital engagement is not necessary or conducive to every type of event.
  •  
    This article has discovered the fact that the event industry was digitally immature. It also introduced a new concept which is called E4.0 into the academic literature. The article is meaningful since it has filled a gap in the literature relating to events and digital maturity and responded to some of the calls for research. The authors were also planning to make further research on E4.0, events, and digital maturity. They have mentioned that the studies on E4.0 itself were also requiring deeper research.
3More

How COVID-19 Is Transforming E-Commerce - 1 views

  • U.S. retailers' online year-over-year (YoY) revenue growth is up 68% as of mid-April, surpassing an earlier peak of 49% in early January.
  • There's been a 129% year-over-year growth in U.S. & Canadian e-commerce orders as of April 21 and an impressive 146% growth in all online retail orders. Online conversion rates increased 8.8% in February, reflecting a level of shopping urgency typically seen during Cyber Mondays, according to QuantumMetric.
  • Eliminating Friction Is Key; Customers No Longer Have to Trade Experience for Security
38More

Modern information technologies in the hotel business: development trends and implement... - 0 views

shared by marble_bird on 08 Jun 20 - No Cached
  • Today, the process of digitalization of the Russian economy has a significant impact on hospitality industry.
  • Digitalization is becoming a major trend, which is evident in the distribution models of hotel services, and also actively comes to the sphere of automation of internal business processes
  • Digital innovations are gradually becoming the new standard of hotel service
  • ...34 more annotations...
  • digitalization of hotels also includes introduction of advanced solutions for analytics and security.
  • Digital security systems can not only track the slightest disturbance of the public peace, but also provide additional information.
  • At present day, it is too early to assess the effectiveness of some recent innovations, that are related mostly to the hotel's image and attract customers.
  • The main trends in the use of modern technologies in hospitality industry in the conditions of digitalization of the economy are presented in figure 1.
  • The main disadvantages of traditional technologies include the following: local server requires regular maintenance from the system administrator; access to database is restricted by local network facilities; connection speed is limited by the speed of a local provider and divided among all who are drawn to the sever database
  • Artificial intelligence plays an equally important role in improving the efficiency of public catering enterprises.
  • Use of artificial intelligence also allows to analyze the work of the restaurant, and to detect violations of rules by the staff via control of bills, number of the discount card uses, as well as the number of cancellations and deletions of checks.
  • The issue of privacy that characterizes traditional tourism industry is also addressed through blockchain technology, minimizing exposure to sensitive data in the face of existing problems with cyber attacks and fraud in traditional financial services.
  • if the concept of hospitality industry enterprise changes, it is possible to change the composition of paid licenses.
  • Almost all companies in hospitality industry have started to think about using chatbots to solve specific business problems [9].
  • One of the ways to get competitive advantages for accommodation facilities is to invest and use new technologies. In this regard, augmented reality is the most promising technology for the modern tourism industry. its development and application can increase the competitiveness of destinations.
  • Augmented reality can be used to interact with guests before, during, and after their stay.
  • Augmented reality technologies can be used to stimulate travel purchases (the effect of being present in a hotel room, as well as demonstrating the environment and local services using a virtual reality headset). Also, virtual and augmented reality, including those with tactile sensations, can be implemented by digital concierges to issue recommendations to the client on various issues and types of recreation
  • The API allows one hotel technology system to automatically (i.e., without the participation of hotel employees) interact with another technology system and gain access to its functionality.
  • The largest companies develop APIs for clients or internal use at some stage.
  • The result of the analysis of cash transactions is a regular analysis and detailing of violations, categorization of violations, development of measures to counter violations, training of personnel [13].
  • With the help of speech Analytics tools, specialists can work with 100% of requests. To do this, all dialogues are translated into text and analyzed using a special system.
  • Based on this analysis, you can develop a change program for existing procedures and processes and optimize self-service systems (personal account, website).
  • The result of the introduction of innovative speech analytics technologies will be an increase in sales efficiency, an increase in loyalty and customer satisfaction, a reduction in service costs without loss of quality, and behavioral analytics.
  • Currently, biometrics can already be used to identify and confirm the client's identity. Face scanning technologies when registering with the service.
  • Analysts predict that the international market for biometric solutions for the hotel sector will grow exponentially in the coming years. Biometrics, as the most reliable and accurate authentication system, can provide real-time information about employees and their use of their working time.
  • The result of using this technology is payment without wallets and Bank cards, increasing the speed of customer service, and a high level of security.
  • In 2018, Amazon presented a special version of the voice assistant for hotels — Alexa for Hospitality, which is currently being tested in Marriott hotels.
  • At the same time, the use of Echo speakers in hotels raises concerns about the privacy of personal data. Amazon claims that audio recordings of the guest's voice commands will be deleted every day, and the hotel administration will not have access to both request records and response records.
  • IT outsourcing is the transfer to a third-party contractor (outsourcer) of all or part of the functions for servicing the organization's information needs. Currently, this technology is becoming increasingly common in the hospitality industry.
  • The main point of switching to outsourcing is to optimize the company's costs while significantly improving the quality of services provided. The main criteria for outsourcing are the lack of competitive advantages and not the strategic position of this operation or function for the company
  • The main problems of implementing information technologies in the hospitality and tourism industry include the high cost of these developments, the duration of staff training processes, and the adaptation of the built system of business processes of enterprises.
  • The problem is also the difficulty of attracting investment in the hotel business
  • Another problem with the introduction of information technology in the hotel business is the lack of relevance of regulatory documents and legal barriers to the introduction of innovations
  • In addition, the introduction of modern information technologies in the hospitality industry is complicated by the level of technical and technological complexity of implementation projects.
  • nformation technologies are improving at a rapid pace
  • In the leading Russian hotels that are part of the global hotel chains, the work is fully automated, technological, and has its own computer and Internet services. Such hotels already have a successful experience in implementing modern information technologies.
  • Customers of the hospitality industry already have a lot of experience in using mobile devices.
  • Digital marketing is becoming a key channel of communication between the hotel and the network. At the same time, only the implementation of continuous data collection, processing, analysis and aggregation tasks will allow the management of hospitality enterprises to achieve one of their main goals - to better understand their customers and interact with them.
  •  
    This article describes trends in technology in the hotel industry and the applications of them in the Russian economy. The article discusses what the trends in IT are and how they may apply to the hotel sector of the hospitality industry, providing real-world examples and hypothetical scenarios. The information in this article is insightful to the relationship between hospitality and information technology and provides a perspective on this relationship from the viewpoint of the Russian hotel economy specifically.
« First ‹ Previous 161 - 180 of 196 Next ›
Showing 20 items per page