Impact of Information Technology in the Tourism Industry
Verified
Added on 2023/04/03
|9
|2072
|234
AI Summary
This report discusses the impact of Information Technology (IT) in the tourism industry, focusing on Marriott International. It explores the relevance and importance of IT, requirements for applying IT in the business, use of IT in the business, advantages and risks associated with IT, and maintenance and monitoring of IT systems.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Surname1 Student’s Name Tutor’s Name Course Date
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Surnamei Contents Abbreviations.............................................................................................................................................ii 1.0 Information Technology in the tourism industry.............................................................................1 1.1 Introduction.....................................................................................................................................1 1.2 Relevance and importance of IT..................................................................................................1 1.3 Requirements for applying IT in the business............................................................................1 1.4 Use of IT in the business...............................................................................................................2 1.5 Advantages of IT............................................................................................................................2 1.6 Risks associated with the use of IT..............................................................................................3 1.7 Maintenance and monitoring........................................................................................................3 2.0 Conclusion..........................................................................................................................................4 References................................................................................................................................................5 i
Surnameii Abbreviations IT-Information Technology MI-Marriott International IMIS-Integrated Management Information System ii
Surname1 1.0 Information Technology in the tourism industry 1.1 Introduction Businesses today are going digital. Reliability on Information Technology (IT) has increased as businesses strive for efficiency, effectiveness of products and improve customer relations while contributing to a country’s economy. This report discusses the impact of IT in businesses in relation to Marriott International. Marriott International is an internationalcompanythatdealswithhotelsandtravels;thetourismindustry.It manages a portfolio of hotels located in 131 countries. It also partners with different investors(Marriott International). The report narrows down to impact of IT in the tourism businesssinceMarriottInternationalisahospitalitybusiness.Bothpositiveand negative impacts are discussed. The relevancy of IT in MI is described as well as the risks it brings to the business. Maintenance of the IT infrastructure is also discussed and recommendations given. 1.2 Relevance and importance of IT MI has its hotels and other properties located globally. It therefore implies that eachentityhasasystemthatstoresrecords.Sincethepropertyisunderone management, the management would therefore find it necessary to have an Integrated Management Information System (IMIS) that merges information from the respective entities to one location. The IMIS integrates all the processes of the company into a single framework in order to achieve unified objectives.With the use of a management information system, the management of MI can access clear and unified information about its company from any locality without having to physically be present. Inquiries about a certain hotel can be done at another hotel using IMIS. The IMIS helps reduce duplication and improves efficiency (Berisha, 2015).The data breach that MI faced in Starwood reservation system clearly shows that MI uses an integrated information system. 1.3 Requirements for applying IT in the business BeforeusingITinthehospitalityindustry,planninghastobedone. Requirements for the business are analyzed and defined using modeling tools. These requirementscaneitherbesystem,functionalornon-functionalandtechnical requirements needed to operate the IT software. This step helps know what type of system is best suitable for the organization.In the case of MI the requirements include the hardware-computers and servers, and the system processes. After requirements analysis the design specification has to be done. The cost effectiveness has to be calculated.One of the reasons for deploying IT is to cut on the costs. Therefore, before deploying IT, it is important for the company to evaluate cost effectiveness (Schacter, Gilbert and Wegner 2011). Since MI has different hotels, deploying an IMIS saves on the operational costs and time. The time that an employee would take to go to a different hotel to make inquiries is reduced since the information being inquired is available in the integrated system.The importance of the adaptability has to be reviewed. 1
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Surname2 Upon successful installation or implementation, proper measures have to be takentoensuresustainability.Inthecasewhereinformationsystemswerenot previously used, then training has to be done for the staff. The customers and clients have to be informed about the reservation systems that are made available online and step by step illustration of how to better access the hotel services should be provided. A support system has to be put in place. 1.4 Use of IT in the business Communicationwithcustomershasimproved.Externally,theinternetisa technologicaladvancementthathasimprovedavailabilityofbusinessservicesto clients. MI has a website with a functional support system and contact details. All the services they offer are made available online for clients to have an easier time. A potential client would not need to physically go to a hotel to inquire. The MI website has a search section that allows the client to search for a hotel of choice and make inquiries. Due to the internet, MI is able to avail other services it offers to its clients. Apart from hotel bookings, it also offers affiliate programs, shopping experiences, career opportunities, and investment opportunities and is also a travelling agency. All these services have been integrated into the IMIS. Internally, employees are able to attend to clients’ needs without hesitation because they have the information required at their disposal. In case a client wants to book the hotel and no rooms are available, the employee can easily browse through the hotels and find the next available option for the client. They do not need to make phone calls to other hotels(Manzoor, 2017). 1.5 Advantages of IT Availability of services to clients is an advantage(Michalek, 2010). Customers use technology to interact with a business. When a potential client needs to look for a service near them, they use their technological devices, smart phones, tablets or computers, and the internet to find them. MI uses its website to make services available to its customers. Help lines are provided to aid in customer support. It has a blog that posts important updates about its services including the Starwood reservation security breach. A business that uses IT gains a competitive advantage. MI partners with different investors globally. It has kept a portfolio of its hotels and properties. The portfolio helps a potential client evaluate whether MI would be the best company to be involved with. A travel agency or hotel that claims to offer the same services as MI would not get clients if at all their portfolio is not made available to clients. More clients results to increased revenue. Improvement in production of services(Adekeye). More work is done using the machines compared to manual labor. Processing storage, analysis and sharing of the huge amounts of data is made easier. A lot of errors and delays often occur from manual labor. Using IT would help meet the business requirements effectively (Langat, 2
Surname3 2017).Fromtheaccuratereportsgeneratedecisionmakingcaneasilybedone (Berisha, 2014). An IMIS helps to save on costs (Schacter, Gilbert and Wegner 2011). The cost of having different systems to manage different data to clients would be costly. MI deals with different services. This implies that different data set is stored. Some clients have hotel reservations while others are using the affiliate program. These data have different entities. Instead of storing them in different systems, an IMIS is used. The system has replaced manual labor hence reducing labor costs (Langat, 2017). 1.6 Risks associated with the use of IT However advantageous IT is to businesses, it has risks emerging as it advances. One of the major risks associated with IT is information security (Mizoguchi, 2012). Risks lead to unauthorized modification, unavailability of data or theft (Goldstein and Chernobai 2011). Most customers use their internet enabled devices to look for services. These devices are prone to viruses and malware. Denial of service and cyber attacks is also on the rise. Data storage and cloud computing are the most affected areas. In November, 2018, Marriott International announced the Starwood guest reservation data breach. Hackers targeted information of up to 500 million guests who had stayed in the hotels for the previous years. Some of the information illegally accessed included encrypted payment card numbers, addresses, mobile numbers, guests’ reservation dates, names, their preferences of communication and passport numbers(Starwood Guest Reservation Database Security Incident, 2019). Privacy is being able to control information about oneself (Friedewald et al. 2013).The incident in MI violated privacy law. Clients, employees and partners trust that their details are confidential when protected by the systems. However, the information kept is prone to hacking and phishing. Once confidential information such as customer credit card number is retrieved, it could be used for cyber crimes and identity theft (Abdul et al. 2015). These risks can be counter measured using software development methodologies or designing (Wiesche et al. 2013). 1.7 Maintenance and monitoring In order to maintain the use of IT, whole process of system development has to berepeated. Thefirst stepis tohaverequests for system maintenance.System requests can be done when a new product is needed or an improvement needs to be done on an existing product. These requests then become changes to be implemented. The changes are then designed. After designing the changes are implemented. The maintenance can be done in four ways. Corrective maintenance- to make changes in the flaws of a system, preventive maintenance to avoid possible problems in future, perfective maintenance to improve product features or adaptive maintenance to make the system more suitable for business evolution. It is important to make sure that only changes that are authorized are made to the system(Ahmad, 2015). 3
Surname4 Installing firewalls, setting intrusion detection systems and having antivirus systems would help secure information (Whitman and Herbert (2011)). 2.0 Conclusion Havinganinformationsysteminabusinesshasadvantagesaswellas disadvantages. In the hospitality sector, IT is being used in collection, processing, analysis and storage of customer details, hotel reservations, searching for specific services in a hotel, accounts and billing, and ticketing for travel agencies. IT has improvedcustomerrelations,helpeddifferenthotelsandtravelagenciesgain competitive advantage, aided in decision making and reduced operational and labor costs.All the information about the activities taking place is kept in a database. The database can remotely be accessed therefore risk security threats such as cyber crimes,identitytheftandcreditcardfraud.Allthesegoagainstprivacyand confidentiality principles. In order to prevent incidents security risks, effective risk management plans should be used. MI responded to the security breach by first creating a support site for its clients and assuring its clients that they are working on the issue. They worked on removing duplicate information that existed and emailed different guests of Starwood abouttheincident.Callcenterswereprovidedtoanswercustomerquestions. Continuous modification of the system has to be done in order to meet requirements. This is done depending on the required changes- whether the business needs to expand, introduction of a new product, to prevent future problems or to correct existing errors. 4
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Surname5 References Abdul, m., Nazura,Abdul, R., Anita, Taji and Hossein. (2015). Cyberspace Identity Theft: An Overview.Mediterranean Journal of Social Sciences. 6. 10.5901/mjss.2015. volume 6(4s3), p.290. Adekeye, A. The importance of management information systems.Library Department, UniversityofIlorin,Ilorin,Nigeria,[pdf]LibraryReview46,5.Availableat: http://www.vra.com/kmportal/online_resources/mis/The%20importance%20of %20MIS.pdf [Accessed 27 May 2019] Ahmad, D. (2015).maintaining information systems. Berisha,A.(2014).ManagementInformationSystemandDecision-Making,[pdf] Availableat: https://www.researchgate.net/publication/287205806_Management_Information_Syste m_and_Decision-Making [Accessed 26 May. 2019] Berisha-Shaqiri. (2015).Management Information System and Competitive Advantage. Mediterranean Journal of Social Sciences. 6. 10.5901/mjss.2015. volume 6(1), p.204. Friedewald, Michael and Finn, Rachel and Wright and David. (2013). Seven Types of Privacy. 10.1007/978-94-. Goldstein , J.and Chernobai, A. (2011).An Event Study Analysis of the Economic Impact of IT Operational Risk and its Subcategories.Journal of the Association for Information Systems, volume(12), pp. 606-631. Langat, M. (2017).effect of IMIS (integrated management information system) strategy ontheachievementofcorporateobjectives:acasestudyofthecommunication authorityofkenya(ca)[pdf]Availableat: http://erepo.usiu.ac.ke/bitstream/handle/11732/3310/LANGAT%20MERCY %20CHEROTICH%20MBA%202017.pdf[Accessed 27 May 2019] Manzoor, Engr. Dr. Amir. (2017). Information Technology in Business. 2nded. MarriottInternational.(n.d.).AboutMarriott.[online]Availableat: https://www.marriott.com/marriott/aboutmarriott.mi [Accessed 24 May. 2019]. Michalek,D.(2010).BenefitsofManagementInformationSystemsandImportant ConditionsforSuccessfulImplementationandRunning.[pdf]Availableat:
Surname6 https://stc.fs.cvut.cz/history/2010/sbornik/papers/pdf/MichalekDavid-306466.pdf [Accessed 27 May 2019] Mizoguchi,T.(2012).InformationTechnologyRisksinToday’sEnvironment.[pdf] Availableat: https://chapters.theiia.org/sandiego/Documents/Seminars/SD_IIA___ISACA_Event_041 112_Deloitte_IA_Top_Ten_Risks.pdf[Accessed 27 May 2019] Schacter, D., Gilbert, DT. and Wegner, DM. (2011).Psychology (2nd Edition). New York: Worth;Publisher's Version StarwoodGuestReservationDatabaseSecurityIncident.(2019). https://answers.kroll.com/. Whitman, M. and Herbert, J. (2011).Principles of information security. 4thed. Wiesche,M.,Keskinov,H.,Schermann,M.andKrcmar,H.(2013).Classifying Information Systems Risks: What Have We Learned So Far?. In2013 46th Hawaii International Conference on System Sciences, pp. 5013-5022. IEEE.