Module 2
Module 2
Telephones can have call-barring where certain numbers are not available,
for example international or mobile numbers. In some systems these
restrictions can be applied on a telephone by telephone basis. This means
that executives can make international calls while others cannot.
If this is not necessary, overriding codes can be made to managers that
allow them to make any call from any telephone. A manager can call
overseas from a telephone that has the service banned by first entering
the number.
Email also presents similar challenges as web surfing. Email can be where
an employee accesses personal accounts using the business internet. While
some time is reasonable, how much time is reasonable?
The Business Website
This business tool is unique and must be considered as a separate entity. Whereas the
other tools have common challenges and issues regarding use, access, and cost, the
website of the business can do unprecedented damage to a business and requires
special care and control to ensure the objectives of the business are achieved.
Consider two scenarios. An employee has a company mobile phone and becomes
disgruntled with the business. He can make excessive calls and run up a high bill.
This is unpleasant but not business threatening. The second case has the same upset
employee but in this scenario he has uncontrolled access to the business website. He
could write anything on the site and publish very embarrassing or dangerous
information to millions of internet users. The consequences of the second case are
more significant than the first.
Assuming that the motives of an employee are genuine and honourable, the normal
process of updating a web page can present opportunities to cause harm to the
business. It is possible for incorrect or inaccurate information to be published by
people believing it to be correct. This may be as simple as wrong names, telephone
numbers, email addresses or even incorrect spelling. It may be as damaging as
wrong prices, stock items, stock details, sale information, or plain misleading
information.
A well-managed site will often have an approval process that will hide any changes
to a site until they have been vetted and approved by another person. There may be a
group of authors that have the permission to make changes to the site, and these
people become the first step in the approval process. They can check that language,
style, and content is consistent with the existing material on the site. But any
changes made by an author does not become visible or published on the site until
the edits have been approved by another party, often called an approver.
Software
Software is also a unique item. Where software is distributed on portable
media it will be installed on the various computers and then stored and it
may never be needed again. But should it be required the hardware – the
disk or similar – must be accessible as well as the associated passwords or
install keys. These are often on the disk case or packing, but they may be
sent via email. Replacement keys are obtainable, but it is obviously quicker,
easier, and cheaper to have the key with the disk. It is not unknown for a
company to have useful software that has been made by a manufacturer
that has ceased operation so support in the form of additional keys is not
available.
When the software is sent electronically the key may not be physically attached to the
software. The relevant details need to be recorded to ensure that purchased software is
available for use in the business. As the software has been sent electronically, via email or
download, the software will need to store in manner that is consistent with the long term
life of the software. It has been known for storage media to become obsolete which makes
the content of the media inaccessible. The early format floppy disks of 360KB and 1.2 MB,
the later hard shell 1.44 MB disks cannot be used in modern computers because the disk
drives that read the disks are no longer available. Storing data on CDs may be unsuitable
for long term storage for the same reason.
Software is often useful in the home and this increases the attractiveness of software and
makes it more susceptible to theft. It is unlikely to be a high volume access item so that
any theft may not be detected for some time after the event, and then only after an audit or
stock take. Added to this is that, should the software be required, it will often be because
there has been some incident that requires reinstalling the software so there will often be
a time issue and pressure on accessing the software. Therefore storing software requires
special considerations to ensure it is there and it can be used.
WIKI
“Wiki” is Hawaiian for fast and wiki sites allow users to update the
site with little restriction on access. Businesses can create their
own wiki sites to store information that may be required by the
internal business users. It is especially suited for large business to
be able to publish internal public information, this is information
that is freely available to anyone in the business. If it becomes
known outside the business there should not be any negative
consequences, but the business does not intend to publish the
material.
Areas of a wiki can have restricted access so passwords for various items can be stored with limited
access so that only those with authority to access the information can do so.
A wiki can store text, pictures, video and sound, it can store plain facts (e.g. telephone lists) as well as
training material, training records, manuals, and forms for whatever purpose. Wikis are available
straight out of the box, and operated with little or no web development expertise.
There will need to be some control over what is published, or monitoring as to who publishes the
item. All users must be aware of the consequences if offensive or inappropriate material is
published.
Social Networking
Sites such as Facebook and MySpace can be assets for the
business but they can also be liabilities. There have been
several cases where people have been fired because of
what they wrote on Facebook and the impact the
comments would have on the business. Staff need to be
aware of the consequences of publishing material on the
social sites.
LANDLINE TELEPHONE
Landline telephones can be restricted to local calls if necessary and they
usually have unlimited access. Some businesses may not approve
personal calls, but in most the cost and number of local calls make it
inefficient to monitor.
Property management system: PMSs are responsible for the coordination of all operations carried out in hotel
reception, marketing and sales, room management, accounting, payroll, management reservations, food and
beverage, and other areas. That is, the main function of the PMS is to act as a hub between the different
information systems of the hotel. It is a centralized database of all the transactions the take place within the
establishment and also of those outside the hotel that have an impact on it.
Front office
Front-office systems consist of different technologies ranging
from computer applications to electronic devices to support
human work and to support customers in the process of
achieving self-service. Therefore, they are designed to support
the operations of direct customer service, with features such as
individual and group billing, customer management, check-in
and checkout, etc. These are the systems that we can find in this
area.
Reception
The systems in this area support the tasks performed by the reception, oriented mainly
to control the state of the hotel on the one hand, and to provide information and solve
guests’ needs on the other.
The goal is to control check-ins, check-outs, room status, reservations, etc. Much of this
information is the basis for the other departments of the hotel that receive the
information directly in their information systems or as a paper listing prepared by the
reception. Typically these systems already incorporate visual modes that allow users to
know the status of the rooms in the hotel at a glance. In the second case, one of the main
tasks of the receptionist is to meet the demands of customers in terms of information
and services. The reception is the central point at which these claims are received,
processed, and sent, if necessary, to the appropriate department.
Concierge
The concierge support system is aimed at providing information on activities and attractions
that may be of interest to the customer: restaurants, excursions, other tourist services, ways
to get to a certain point, etc. In this area, we believe it is interesting to highlight the
research by Adler and Gordon (2013), who found that, contrary to what one might think
(because much of the information provided by concierges is widely available on the
Internet), the reality is that hotel guests still prefer that this information be offered to them
in person by the concierge. The concierge uses the technology to provide the most current
and relevant information.
Check-in (assisted or self-service)
The check-in is the process by which the arrival of a customer at a hotel for the
first time during a stay is registered. Therefore, it is the time at which the guest
is assigned a specific room and provided access to it. This type of system takes
care of check-in both for individuals and for groups. Traditionally, information
systems have helped in the process of automating tasks, performing the same
work that was done without technology. However, in recent times self-service
check-in systems have started to become popular. In this system, the tourist
checks in without any operator intervention by using a kiosk or similar system
that delivers the room card.
Online check-in
Online check-in. As an additional step to a self-service check-in at a kiosk, auto check in online
systems facilitate that the guest can check-in prior to the arrival to the hotel. Thus, there may be
two scenarios: in the first one, the hotel room doors are equipped with some kind of technology
that allows guests to open them directly (for example, using their mobile phone or with a numerical
key pad); in this case, provided it is within the time specified by the hotel, once the check-in is done,
the guest can go directly to the room. In the second scenario, when the rooms are not enabled for
this process or when it is necessary for the client to physically stop by the front desk for security
purposes, this process is very fast and the guests just have to be identified, without filling out
documents or a room having to be assigned. These types of systems are particularly interesting
when they provide the customer with a virtual plan of the hotel in which the exact location and
possible views from every room are available, allowing the guest to choose the room that best fits
their desires, similar to what is done when choosing a seat at a concert or sporting event.
Mobile check-in
Mobile check-in. The mobile check-in within the hotel
allows the check-in process assisted by the receptionist
to take place in a more comfortable and enjoyable
environment for the client, instead of having to stand at a
reception desk. The use of tablets allows the receptionist
to sit comfortably with the customer to explain the
features of the hotel and to carry out the check-in
process.
Alarm
Alarm. Automated systems that record the time that the client wishes to be woken up and
carry out the process in the requested schedule. Years ago, this type of systems was seen as
very beneficial to the customer, whereas today they are almost disappearing, as it is
something that the guests can easily manage with their own devices (i.e., mobile phones).
Vending machines
Systems that control the vending machines: adequate stock of products
and the purchase of products with the room card.
Resort customer card
Systems that manage the cards that are delivered to customers so they can
make consumption in all existing points of sale in the hotel: restaurants, bars,
activities, utilities, shops, vending machines, etc. Published studies (e.g.,
Morosan, 2012) have analyzed the possibility of using biometrics (e.g.,
fingerprint, voice, or iris scan recognition) in this area, finding that there is a
willingness to use these technologies whenever they demonstrate greater
utility than traditional card-based systems. As will be shown later in this
article, wearable technologies (i.e., bracelets) could probably be a consensus
solution, since they would be something that the host is always carrying and
has fewer disadvantages regarding the use of personal data.
Night Audit
Systems responsible for posting the room charge to each guest’s account and
cross-checking the accounts at the end of the day. These systems are increasingly
automated, limiting the manual part to reviewing that the process has worked correctly.
Lost objects
Systems to log all the objects lost in a hotel resort in order to
facilitate their return to the right client.
To be continued…
Housekeeping and Rooms
Minibar
Applications and systems that allow keeping track of the purchases a guest has made in the
minibar. These systems also include automated models for detecting minibar consumption,
aimed at both billing and refilling. In the simplest cases, the employee can see from outside
the room if the minibar has been opened, thereby not entering rooms in which the minibar
has not been opened.
Some suggest that IT has led to a revival of minibars, which in many establishments were
eliminated or left empty. Since IT facilitates the detection of use, billing, and refill, costs are
reduced and revenue is increased , making the service more profitable. Currently, the trends
are targeted towards minibars with dynamic pricing and capable of promoting cross-selling.
For example, customers who purchase a movie can get a discount on minibar items while
watching the film.
In any case, we think it is important to highlight the fact that hotels tend to be
relatively slow in the process of implementing IT in the rooms, as they
prioritize technologies that improve productivity or performance (Siguaw et
al., 2000), perhaps understanding that IT in rooms is not that important in
developing strategies nor in making high-level decisions.
Locks
Door-opening systems. Systems in this area range from basic systems based on magnetic
cards to systems based on RFID chips (which, among other things, allow users to replace the
classic card with a bracelet or other object with the chip), to systems based on the use of a
smartphone (for example by the light of the flash or a sound made), smart watch, numeric
code, biometric variable, etc. To the extent that these systems do not require collecting a
physical item at the reception desk, they further facilitate the self-service check-in process,
allowing it to be fully automated.
SmartTV
TVs that also allow guests to access the Internet directly from a TV, book and buy products
and services, access an interactive map of the hotel, or check out, among other options.
Tablets or other IT devices in the room
Much like the concept of SmartTV, in this case what is offered to the guest is to
have mobile devices such as tablets, laptops, game consoles, etc. Today, it is a
trend with very low impact , thus it will be necessary to analyze whether it
evolves.
TV channel management
Systems designed to manage the channels broadcast by the television circuit of
the hotel to be seen by guests in their rooms. These systems are becoming
obsolete and being replaced by more modern systems based on on-demand
content distribution, SmartTVs, etc. However, they are still often used. Their
main feature is a set of channels that are offered free of charge to the customer.
Video on demand
Systems that allow guests to access movies and other content on demand from
their SmartTVs. In this case, the hotel acts as a video club. These on demand
content have to be paid for typically .
Music
From the piped music systems typical in hotels a few years ago, to more complex
systems that combine music provided by the property with the possibility that
customers can play their own music by connecting their own music sources, these
technologies are a current trend in high-end hotels, and are in the process of
generalization.
Environment technology
Technologies that allow guests to customize their room via switches in the room or an
application on their smartphone. They can customize climate variables (temperature and
humidity), lighting, colors, and even smells. The most advanced systems in this area even
allow users to set variables of the bed (e.g., the firmness of the mattress). CRM systems can
allow these values to be recorded for future visits.
Safebox
Systems that have not changed much since they started being installed, being based on a
security code to open and close the box. There are also other systems based on biometric
variables of the user. Today, systems that can be opened from the user’s device (e.g., from a
smartphone) are beginning to be implemented and include a power supply inside the box to
allow customers to charge their devices (e.g., laptops) while they are in the safe.
Management (back office)
As indicated previously, we have grouped in the back-office area a number of
functions that normally have their own identity in the organizational chart of a
typical hotel. However, due to the type of tasks they perform, being less
oriented to direct contact with the customer and more oriented to the
operation of the hotel management, we understand that they are areas in
which information systems are more oriented to supporting the functions
than to developing new services or improving customer service. All this
without prejudice, of course, that proper and efficient management of hotel
services will result ultimately in customer satisfaction.
Personnel
Payroll
Information systems for the calculation of staff payroll.
Personnel management
Information systems to support the tasks of personnel management: recruitment,
hiring, performance evaluation, assignments, career development, training, etc.
Guest accounting
Systems for accounting guests’ consumption during their stay at the hotel and
preparation of the final bill. The system receives information from all points where
consumption takes place in the hotel.
Purchase Management
Inventory
Inventory management in the warehouse.
E-procurement
Purchases of goods and services through the Internet in order to digitize the
entire supply chain to automate the buying cycle in the management process
of the supply chain (SCM).
Engineering
Energy management systems (EMSs; air conditioning, water, electricity, etc.)
Applications to manage energy consumption on the premises of the hotel, as well as analysis
and suggestions for improvement and optimization. It should be noted that energy
management has become an issue that affects not only on the income statement but also
customer interest; hotels that are more energy efficient are more attractive to customers
even to the point of a willingness to pay more.
Maintenance
Systems to manage maintenance of hotel rooms and common areas, getting information
mainly from the maintenance order systems handled by housekeeping and reflecting the
actions taken in each case.
Pools
Automated or semi-automated systems to manage the control of the swimming
pools: water temperature, health parameters, etc. Also systems to help in the
process of detecting possible drownings in the swimming pool, and even
monitor access to the pool at times when it is closed due to the lack of a
lifeguard. These systems could, for example, be based on thermal-imaging
systems .
Gardens
Management of irrigation schedules, water consumption, species planted,
plans for interventions in the gardens, specific cares, etc.
Hotel Management
Stock control
Management and control of food and beverage inventory.
Point-of-sale (PoS)
Systems to manage the PoSs in the hotel. From basic electronic cash register systems that
facilitate the preparation of a customer‘s bill to more complex integrated systems, such as waiters
having a mobile device that collects orders automatically and distributes them to the cash register
and to each cooking area (appetizers, main dishes, drinks, etc.). They also perform a check on the
delivery of the product at the customer’s table.
Table management
Systems to control the bookings and assigned tables for customers with visual interfaces
including a floor plan of the restaurant and the capabilities to join tables, change
reservations, generate separate customer invoices, manage waiting lists, notify waiting
customers that their table is ready, etc. These systems also help control the total service
time at tables, waiting times for food or between meals, etc., enabling subsequent
improvements in the areas where deficiencies are found.
Conferences and events
Control of conference and event development. Therefore, this system handles room
reservations, conference room and sub-room layout, and services associated with those
bookings (e.g., coffee breaks).
Room service
Systems to manage room service: orders, service, billing, etc.
Customer-communication management
As happens with the loyalty cards system, this system could also be part of the
CRM. Customer-communication management systems enable complete
management of all communication with customers: before arrival, during their
stay, and after it. These communications can be used to offer promotions for
upgrades, promote cross-selling, help with activities during the stay, request
evaluation in social networks, and offer discounts on future stays to ensure
customer loyalty.
Customer surveys
Systems to determine the degree of customer satisfaction with hotel
services, analyzing what issues are most valued by guests and services that
cause higher levels of dissatisfaction. Customer surveys sent via the
Internet at the end of the stay, opinions expressed autonomously on social
media, and surveys completed by the guest during their stay, among
others, are used as data sources.
Marketing
Informative website
Management of hotel website information services: prices, location, and, in general,
the features that guests need to know about before going to the hotel or during their
stay.
Mobile website
Management of how the website is seen on a mobile device, with a specific page designed for this
type of device, or through a responsive-design website in which the page adjusts itself to the
device on which it is being viewed.
Virtual tour of the hotel
Systems using visualization techniques for pictures taken with 360 degrees, videos of
the installations, and virtual tours allow tourists to access the facilities of the hotel
almost entirely without having to visit.
Digital Signage
Systems to manage the output of images and through television sets videos in different
areas of the hotel, mainly showing guests information about services, activities close to the
hotel, timetables, offers, etc.
Sales
Hotel-booking module
Systems connected to the hotel website enabling clients to make reservations directly through
it. Thus the hotel has its own marketing channel, than can then be used through the hotel
website, the chain website, or through similar channels that connect directly with this
reservation system.
Channel manager
Systems that enable connections to all types of channels: GDS, travel sites, online travel agencies
(OTAs), etc. They are systems that centralize the management of all hotel sales channels. Thus, the
hotel will just have to introduce a change in the price or availability of a room in one place (the
channel manager) that will then be responsible for replicating this change across all channels in
which the hotel operates. It is necessary to note that in some cases, hotels have more than 100 sales
channels, so the need for this type of product is very high. Sometimes, channel managers also
monitor the prices of the competitors.
CRS (Computer reservation system or central reservation system)
Inventory-management systems of the hotel’s availability and that of its associated
services. Managers upload room rates and availabilities to this system, from which they
will be sent to different GDS. There will also be information about available rooms, rate
terms, hotel information, etc. In CRS we find modules for booking, profile management,
and group and quota management, in addition to the connection to the PMS and GDS.
Wireless networks
Deploying and maintaining wireless networks in the hotel and, where appropriate, billing
customers for using them, according to the zone (i.e., common rooms, open areas, etc.). These
systems must take into account the quality of service, security zones, separation between the
corporate network and customer restrictions on access to certain websites, among other issues. It is
necessary to stress the importance of having free WiFi networks for customer satisfaction, although
providing free connections with low bandwidth and services while charging for more bandwidth
and better-quality service is an accepted behavior. But we must not underestimate the possibilities
that free WiFi offers to hotels, exploiting the option of redirecting guests to pages for upselling,
cross-selling or reporting on new services or offers.
IT Security
Safety management
In a hotel, customers pass through almost all of the areas, often with a mobile device in
their hands. This customer presence on the premises makes safety management a key
issue, being basic to ensure separation between corporate networks and client
communications, restricting access to data from other clients, compliance with data
protection laws, safeguarding credit card information, etc. In general, the situation was
far from ideal: most hotels did not have a department of ICT management; the IT
managers had little or no specific training in this field; and security measures available in
the hotels were extremely basic (e.g., antivirus and firewall only). Thus, credit card
encryption systems, network monitoring, security plans, and vulnerability and access
control systems to the network were uncommon.
THANK YOU!