MyAssignmenthelp

Call Now: (+61) 416-195-006

Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
post
page
  • Expert Answers
  • Blogs
  • Student Login

Assignment Solution for

Physical and Cyber Threats in the Hotel Industry

Online Tutoring on Physical and Cyber Threats in the Hotel Industry

Introduction

For any hotel, it is necessary to ensure the safety of its guests as any harm to any guest may impact the reputation and earnings of the hotel. One such safety breach happened at Hyatt Hotel in New Delhi, where the son of a political leader brandished a weapon against another guest of the hotel. This incident happened in 2018, and the hotel staff had to interfere to ensure the safety of the guest (Express News Service, 2018). While it is usually considered that security threats in a hotel are physical in nature, however, in recent times the hotel industry is facing a lot of cyber threats as well: Earlier this year, the personal data of 5.2 million guests of Marriot Hotel Chain (worldwide) was stolen through one its franchisee hotel (Zitter, 2020).  Thus, due to the ever-increasing physical and cyber threats, there is a need to examine three aspects of security at hotels: steps taken or being taken by hotels to minimize security breaches and maximize the safety of guests, some recent developments (design, physical, and development), that are contributing towards improving safety and security for guests, and how hotels are improving the ethical conduct towards hotel guests.

 

Hire PhD Expert Tutors in Australia

If you need assistance with Online Tutoring, our professional Online Tutoring experts are here to help!
WhatsApp Get a Quote

 

Steps taken to maximize the safety of guests and minimize security breaches

Chauhan et al (2018) argued that a pre-cursor to ensure guest safety is to establish coordination between departments including front office, security, and hospitality. This coordination is necessary at every stage of security management. There are several stages in security management: identifying the security risk, developing a plan to mitigate the risk, executing the plan to mitigate the risk, and monitoring the progress of risk mitigation.

The first step towards security management is the identification of risk.  As argued by Chauhan et al. (2018), a physical threat in the context of a hotel is usually confined to an unauthorized or illegal activity conducted in the hotel premises only. Chauhan et al (2018) identified some major physical risks for the hotel industry: fire threat, weapon threat, theft emergency, accident emergency, illness and epidemic, and misconduct by a guest.

 

Looking for Online Tutoring?

Hire Qualified Australian Tutors at Low Price
WhatsApp Get a Quote

 

However as identified by HT (2017), for a cyber threat in a hotel, there can be several risky points: One key area that is a risky node is the ‘point-of-sale’ systems as these systems contain information like guest name and credit card details. Since these systems are constantly in use and are not updated or patched (as frequently as needed), so they are at constant risk of being hacked. Another source of cyber threat in any hotel is that personal details of the guests are stored at different locations: facilities, restaurants, and billings, thereby providing widespread access to any unauthorized party to steal the data. This problem multi-folds in case of franchise based hotel chains as they share data with each other to provide customers with a better experience. However, this also means that by hacking at one franchisee, a hacker can access information about global guests as well. A popular tactic used by hackers is ‘phishing’ where the hackers get access to valuable login credentials and other details of the guest. Another popular tactic is ‘ransomware’ where instead of stealing the data, hackers encrypt the data, thereby making it unusable for hotel, until the hotel agrees to pay a ransom. Orfei and Facchini (2016) argued that while the focus of risk management is usually on large hotel chains, however more than half of the cyber-attacks happen against the small hotels as they lack any basic security system to protect themselves against any cyber risk.

The second step toward maximizing the security is planning, therefore there is a need to develop a ‘toolbelt’ of security measures. PwC (2016) identified that while several local and national regulations must be followed by any hotel. However, every hotel should aspire to adopt the best practices in the industry, some of them are discussed next.

Explore unrivaled expertise with MyAssignmentHelp, your go-to platform for Risk Management online tutoring. Our dedicated tutors provide comprehensive guidance, empowering you to navigate complexities with confidence. Elevate your skills and academic performance today with our specialized online tutoring services.

[citationic]

Great

Online Tutoring Services

2,032

Orders Delivered

4.9/5

5 Star Rating

395

PhD Experts

 

Amazing Features

Plagiarism Free Top Quality
Best Price On Time Delivery
100% Money Back 24 x 7 Support

Recent Posts

  • Expert Tips for APA 7 Citations

    Cracking the Code: Expert Tips for APA 7 Citations

    Navigating the world of academic writing can be...
  • Navigating Harvard Style: A Complete Citation Handbook

    Navigating Harvard Style: A Complete Citation Handbook

    In the world of academic writing, proper citati...
  • Comparing Referencing Styles: Harvard vs. APA 7

    Comparing Referencing Styles: Harvard vs. APA 7

    When it comes to academic writing, referencing ...
  • Navigating the AI Landscape: Top Tools for University Students

    Navigating the AI Landscape: Top Tools for University Students

    Artificial Intelligence (AI) is revolutionizing...
  • The Ultimate Guide to Research Paper Writing: 5 Step Strategy

    The Ultimate Guide to Research Paper Writing: 5 Step Strategy

    Writing a research paper can seem like a daunti...

You may also like

  1. Report On The Influence of Social Media on Hospitality and Its Challenges to the Hotel Industry
  2. Cyber Bullying Online Tutoring
  3. Cyber Crime Online Tutoring
  4. Online Tutoring on Vertical Analysis Magnolia Hotel
  5. Q3.Develop and participate in critical discussions on current cyber crime issues and threats.
  6. Online Tutoring on Disaster Recovery Plan
Ask a New Question
*
*
*
*
*
*

Disclaimer: Documents provided by MyAssignmenthelp serve as model papers and are not meant to be submitted directly to the university or reuse/resell in any way. They are written for individual research and reference purpose only.

How to Write an Essay

Term Paper Help

Harvard Referencing

Python Online Tutoring

How to prepare for Exams


Case Study Help

Thesis Help

Coursework Help

Business Plan Help

Academic Tutoring Service


College Online Tutoring

Law Online Tutoring

English Online Tutoring

Nursing Online Tutoring

Literature Review Help


Assignment Help Payment Options
myassignmenthelp.com.au

⭐⭐⭐⭐⭐ 20K+ Satisfied Students. Rated 4.9/5

Upload your requirements and see your grades improving

Order Now

MyAssignmenthelp

Top Searches:| Accounting| Nursing | Auditing | Marketing | Management | Economics | Engineering | Finance | Human Resource | Law | Project Management | Social Media | Supply Chain | Operation Management | Change Management | Leadership | Entrepreneurship | Business Management | Business Plan | Literature Review | Coursework | Dissertation | Case Study | Marketing Plan | Essay Writing | Presentation

© 2025. All rights reserved. MyAssignmenthelp Australia

TOP

  Connect on WHATSAPP: +61-416-195006, Uninterrupted Access 24x7, 100% Confidential

Connect Now
X

Order Now and Get 25% off For September-October only

textbox6129
textarea1740
Select FileChangeRemove
fileupload7305

‹›×

    Ask a New Question

    *Minimum 24 hours are required to deliver Solution

    *
    *
    *
    *
    *
    *

    Privacy Policy - Terms and Conditions