You are on page 1of 5

CASE STUDYApplied Business Tools And Technologies in Hospitality

GROUP BASTA PANG LAST

GROUP MEMBER:
Jalyn Balbaboco
Adams Canaleta
Angel Cataburan
Matthew Fortaleza
Christine Gepulla
John Laurence Marcelo
Rain Navarro
Jerimiah Samiling
Jan Margaret Soriano
CASE STUDY #1: Airbnb Superhost Secretly Recorded Guests with Hidden
Bedroom Camera

Study Questions:

A. What is the write-up all about? What technology-related issue/s is/are


apparent?

- The write-up is about a disturbing incident involving an Airbnb “super


host” in China who was arrested after a guest staying in his house
discovered a hidden camera recording her in the bedroom. The issue
here is a significant breach of privacy due to the misuse of technology.
The guest, who had a background in information security, noticed an
unusual light in the Wi-Fi router and, upon investigation, found a
digital memory card inside the router. It was revealed that the host had
been secretly recording guests since March 2019.

B. What possible impacts or problems may arise in conjunction with the issue/s
in the given case?

- Researchers discovered that the Airbnb lodging had not taken


reasonable steps to protect the guests’ privacy, safety, and security in
this case study. The implications of failing to adequately protect hotel
guests’ privacy, safety and security may be disastrous or, at the very
least, they risk losing their patrons’ trust in the establishment. The
reputation of the hotel will suffer, and fewer guests will choose to stay
there.
-

C. How can Airbnb and other similar businesses prevent such from happening
again? What measures can you recommend?

- Airbnb and other similar platforms should prioritize host verification,


ongoing monitoring, education, transparency, and legal compliance in
order to stop situations like hidden camera recordings. Important
initiatives include enhancing host screening, informing hosts and
guests about privacy expectations, and encouraging open disclosures
of surveillance equipment. For prompt action against offenders, it is
also essential to enable community reporting, conduct privacy and
security reviews, and establish clear emergency response processes.
Security can be improved by the use of technology, such as scanning
properties for concealed devices during onboarding and cybersecurity
safeguards to prevent unwanted access to linked devices. Users will
ultimately experience a safer and more reliable environment thanks to
collaboration with peers in the industry and independent assessments.

D. Considering the above case, would you consider technological developments


as advantageous? Why or why not? Justify your response.

- Technology is developing quickly in the twenty-first century. It has


become an essential part of our everyday routine. It enables us to
exchange information that we would not otherwise be able to obtain.
Everyone nowadays uses technology on a daily basis for purposes
such as education, communication, health, job generation, and
company growth. On my opinion technological development is
advantageous although it has pros and cons considering the scenario
cameras can use to identify crime but can also use as crime like in the
scenario. Some adults are not familiar with new technology like that
and can be a victim.

CASE STUDY #2: 700,000 Choice Hotels Records Leaked in Data Breach,
Ransom Demanded

A. What is the write-up all about? What technology-related issue/s is/are


apparent?

- The incident involving Choice Hotels resulted in a data breach,


resulting in the theft of 700,000 guest records. The breach exposed
sensitive information, including names, email addresses, and phone
numbers, highlighting the importance of proper database security. A
ransom note was discovered on the exposed database, posing a threat
to cybersecurity. The incident also highlighted the need for third-party
vendor risk management, as the actions of these vendors can impact
data security. The delay in responding to the incident underscores the
need for robust cybersecurity measures, responsible disclosure
practices, and proactive third-party vendor risk management.

B. What possible impacts or problems may arise in conjunction with the issue/s
in the given case?

- Hackers can use this information to create phishing campaigns, for


example by crafting malicious messages and making them appear
authentic, via email or text message, in order to obtain information.
More sensitive and valuable. These are the potential problems or
consequences that can arise due to data privacy leakage and theft.
Additionally, it can lead to spam being sent to visitors’ inboxes.
Hackers can also use stolen data for illegal or criminal activities that
damage the identity and reputation of the data owner.

C. How can Choice Hotels and other similar businesses prevent such from
happening again? What measures can you recommend?

- Choice Hotels is implementing measures to enhance cybersecurity and


protect customer data. These measures include strong access controls,
regular security audits, data encryption, vendor security assessments,
employee training, an incident response plan, a responsible disclosure
program, data classification and segmentation, software patching and
updates, monitoring and intrusion detection systems, user education
and phishing awareness, regular backup and disaster recovery,
compliance with data protection laws, and continuous security
improvement. Strong access controls are essential for securing
databases and systems, including sensitive data.

D. Considering the above case, would you consider technological developments


as advantageous? Why or why not? Justify your response.

- Yes, I would still consider technological development as an advantage


because it can also enhance operational efficiency and help
companies to reduce costs by replacing expensive human labor. In
additions, it will improve customer service by facilitating smooth staff
engagement and communication. Technological development helps
people to interact in different locations in real time with it people can
share their views and opinions without having to meet physically.
- In conclusion, technological advancements have both advantages and
disadvantages. Technology increases security, communication, and
efficiency, but it also creates new hazards and difficulties. In order to
maximize the benefits while minimizing the drawbacks, firms must
stay abreast of technological advancements, put in place strong
security measures, and be watchful against new dangers.

You might also like