Main Article Content

Abstract

The hospitality industry is susceptible to emergencies and disasters and must be managed in order to mitigate potential impacts. This paper explores biometric technology and their potential usage in the hospitality industry. This paper reviews the viable biometric technologies and further with a discussion of their applications in the hospitality industry to enhance security and increase operational efficiency. Tracking employees and hotel guests may bolster emergency management response time by locating individuals, ensuring secure areas, and aiding individuals in evacuation procedures. In this study, various scenarios in which biometrics can be used are explored. The paper concludes with a discussion on the urgent need for biometric technologies to be installed the hospitality industry to reduce errors and eliminate potential terrorist activities.

Keywords

Hotel Biometric technology Emergency management Mitigation Planning.

Article Details

How to Cite
AlBattat, A. R. (2015). Biometric Technologies in Emergency Management: The Case of Hotels. International Journal of Tourism & Hospitality Reviews, 1(1), 32–36. https://doi.org/10.18510/ijthr.2014.115

References

  1. Aziz, H. (1995). Understanding attacks on tourists in Egypt. Tourism Management, 16(2), 91-95. DOI: https://doi.org/10.1016/0261-5177(94)00016-4
  2. Biometric Institute. (N.D). Working Definitions. Available from: http://www.biometricsinstitute.org/pages/aboutbiometrics. html. Retrieved 27.03.2014.
  3. Cassedy, K. (1991). Crisis Management Planning in the Travel and Tourism Industry: A Study of Three Destination Cases and a Crisis Management Planning Manual. San Francisco: Pacific Asia Travel Association.
  4. Chin, J. (2003). Lessons learned from 9/11 by NYC hotel security: A model for other cities. Hotel/Casino/Resort Security. March, 10.
  5. Davis, A. (1997). The body as password. Available from: http://www.wired.com/wired/archive/5.07/biometrics. html?pg=2. Last accessed on 2014 Mar 25
  6. Economist. (2003). The print edition: Prepared to be scanned. Available from: http://www.economist.com/scince/tq/displayStory.cfm?story_id=456, http://www.elsafe.com/binary?id=29450. Accessed 27.03.2014.
  7. ElSafe. (N.D.). Available from: http://www.elsafe.com/page?id=456, http://www.elsafe.com/binary?id=29450.
  8. Faulkner, B. (2001). Towards a framework for tourism disaster management. Tourism Management, 22(2), 135-147. DOI: https://doi.org/10.1016/S0261-5177(00)00048-0
  9. Faulkner, B., Laws, E., & Moscardo, G. (1998). Embracing and Managing Change in Tourism: International Case Studies. London: Routledge.
  10. Faulkner, B., & Russell, R. (1997). Chaos and complexity in tourism: In search of a new perspective. Pacific Tourism Review, 1(2), 93-102.
  11. Find Biometrics. (2007). Biometric Sensors and Detectors. Available from: http://www.findbiometrics.com/solutions/biometric-sensors-detectors/. Accessed 27.03.2014.
  12. Fink, S. (1986). Crisis Management: Planning for the Inevitable. New York, NY: American Management Association.
  13. Henderson, J. (2003). Communicating in a crisis: Flight SQ 006. Tourism Management, 24(3), 279-287. DOI: https://doi.org/10.1016/S0261-5177(02)00070-5
  14. Henderson, J. (2008). Managing crises: UK civil aviation, BAA airports and the August 2006 terrorist threat. Tourism and Hospitality Research, 8(2), 125-136. DOI: https://doi.org/10.1057/thr.2008.12
  15. Hospitality Upgrade. (2003). Available from: http://www.hospitalityupgrade.com/__852568890071b5b7. nsf/0/08b538906813 c0b085256c8e3e?Open Document& Highlight=0,biometric. Last accessed on 2014 Mar 23.
  16. IATA. (1998). Crisis Communication Manual. Monreal: Air Transport Association.
  17. Jarvis, A. (N.D). Facial recognition, retinal iris scans, DNA, fingerprinting, brain printing, ear matching, smart cards. What’s Next? Available from: http://www.forensicevidence.com/site/ID/ID_Biometric_jarvis.html. Last accessed on 2014 Mar 09.
  18. Kroeker, K.L. (2002). Graphics and security: Exploring visual biometrics. Computer Graphics and Applications, IEEE, 22(4), 16-21. DOI: https://doi.org/10.1109/MCG.2002.1016693
  19. Lehrman, C.K. (1986). When fact and fantasy collide crisis management in the travel industry. Public Relations Journal, 42(4), 25-28.
  20. Levin, G. (2001). Real World, Most Demanding Biometric System Usage. Paper presented at the Biometric Consortium.
  21. Meyersa, M., & Millsb, J.E. (2007). Are biometric technologies the wave of the future in tourism and hospitality? CERIAS Tech Report 2005-07. Center for Education and Research in Information Assurance and Security, Purdue University, West Lafayette, IN 47907-2086.
  22. National Center for State Courts. (2003). Biometric Facial Recognition. Available from: http://www.ctl.ncsc.dni.us/biomet%20web/bmfacial.html. Accessed 27.03.2014.
  23. National Center for State Courts. (N.D.). Available from: http://www.ctl.ncsc.dni.us/biomet%20web/BMFacial.html, http://www.ctl.ncsc.dni.us/biomet%20web/BMIris.html. Retrieved 28.03.2014.
  24. National Information Assurance Partnership. (2003). U.S. Government Approved Protection Profile - U.S. Government Biometric Verification Mode Protection Profile for Medium Robustness Environments, Version 1.0. pp. 15. Available from: https://www.niap-ccevs.org/pp/PP_BVM_MR_v1.0/. Accessed 27.03.2014.
  25. Pizam, A. (2002). Tourism and terrorism. International Journal of Hospitality Management, 21, 1-3. DOI: https://doi.org/10.1016/S0278-4319(01)00037-8
  26. Prideaux, B. (1999). Tourism perspectives of the Asian financial crisis: Lessons for the future. Current Issues in Tourism, 2(4), 279-293. DOI: https://doi.org/10.1080/13683509908667856
  27. Prideaux, B. (2004). The need to use disaster planning frameworks to respond to major tourism disasters. Journal of Travel and Tourism Marketing, 15(4), 281-298. DOI: https://doi.org/10.1300/J073v15n04_04
  28. Richardson, B. (1993). Why we need to teach crisis management and to use case studies to do it. Management Learning, 24(2), 138-148. DOI: https://doi.org/10.1177/135050769302400203
  29. Ross, A., Jain, A., & Pankanti, S. (N.D.). Capturing hand geometry and extracting features. Available from: http://www.biometrics.ese.msu.edu/hand_proto.html. Last accessed on 2014 Apr 17.
  30. Santana, G. (2004). Crisis management and tourism. Journal of Travel and Tourism Marketing, 15(4), 299-321. DOI: https://doi.org/10.1300/J073v15n04_05
  31. Spangler, T. (Producer). (2004) Face Invaders, Ziff Media, pp.3, access date 27 March 2014.
  32. Tinari, M. (2003). Reducing Lawsuit Vulnerability of Your Hotel Parking Areas: Advise From a Legal Expert. Hotel/Casino/Resort Security September, 3-4.
  33. Turner, B.A. (1976). The organizational and interorganizational development of disasters. Administrative Science Quarterly, 21(3), 378-397. DOI: https://doi.org/10.2307/2391850
  34. Wayman, J. (2000). Available from: http://www.biomet.ch/aboutus.htm. Last accessed on 2014 Mar 07
  35. Witt, S.F., & Moore, S.A. (1992). Promoting tourism in the face of terrorism: The role of special events in Northern Ireland. Journal of International Consumer Marketing, 4(3), 63-75. DOI: https://doi.org/10.1300/J046v04n03_05