An Aid in Selecting the Brand, Size and Other Strategic Choices for a Hotel

1997 ◽  
Vol 21 (1) ◽  
pp. 71-99 ◽  
Author(s):  
Richard C. Morey ◽  
David A. Dittman

The “go/no-go” decision for a candidate property, i.e., whether or not to actually acquire the site, choose the brand (flag), build and operate the hotel, requires the explicit consideration of the interconnectedness of the many myriad elements affecting the property's potential profits. The many facility design decisions (number and mix of rooms, capacity for F&B operations etc.) as well as other strategic choices (e.g., size of marketing program, level of service aimed for) must recognize the site's competitive features and interactions with the above. Also, the particular design and operational features for a given property will affect its different revenue streams, fixed and variable costs, efficiency and profits. The authors consider developers contemplating acquiring a given site, choosing a brand, building and operating a new hotel. They offer a normative approach for this type of decision which arrives endogenously at possibly attractive options for the brand, design and strategic choices for the site. The final decision as to which option to actually use, if any, should be based on subjecting the above identified scenarios, as well as others, to traditional feasibility analyses where judgment and expert opinion are applied. The authors' implementable approach integrates a “best practices” benchmarking methodology with regression analysis to yield a mathematical programming optimization model. A key advantage of this approach lies in its contrast to conventional approaches for site selection which often ignore the more detailed design and strategic choices. The approach deals explicitly with the complex interfaces between marketing and operations management as the endogenous site and competitive environmental factors interact with the endogenous brand and facility design choices. By identifying attractive options to be further explored (that might otherwise be overlooked), several types of errors are avoided: i) an incorrect “go/no go” decision could be recommended for the site in question; ii) even if the right decision to proceed is made, the forecasted level of annualized profits could be in error, leading to an incorrect priority for the activity; iii) the incorrect brand and facility design choices could be made for the site. Other key advantages of the suggested approach are that 1) various substitution possibilities (between more or less capital, labor, materials etc.) are considered; 2) not only is the best brand and configuration identified, but also a ranking of other brands is available if the “best” brand is not available; 3) the “best practices” at other specific sites (which serve as the basis for the recommendations) are identified, thereby enabling management (possibly through site visits) to isolate the actual cultures, processes and procedures to be transported and emulated at the candidate site. This paper illustrates the approach for two different sites.

1984 ◽  
Vol 16 (1-2) ◽  
pp. 281-295 ◽  
Author(s):  
Donald C Gordon

Large-scale tidal power development in the Bay of Fundy has been given serious consideration for over 60 years. There has been a long history of productive interaction between environmental scientists and engineers durinn the many feasibility studies undertaken. Up until recently, tidal power proposals were dropped on economic grounds. However, large-scale development in the upper reaches of the Bay of Fundy now appears to be economically viable and a pre-commitment design program is highly likely in the near future. A large number of basic scientific research studies have been and are being conducted by government and university scientists. Likely environmental impacts have been examined by scientists and engineers together in a preliminary fashion on several occasions. A full environmental assessment will be conducted before a final decision is made and the results will definately influence the outcome.


2020 ◽  
Vol 4 (Supplement_1) ◽  
pp. 858-858
Author(s):  
Suzanne Meeks

Abstract The GSA publications team sponsors this annual symposium to assist prospective authors to successfully publish their gerontological scholarship in GSA’s high impact and influential journals. The first part of the session will include five brief presentations from the Editors-in-chief of Journals of Gerontology-Series B, Social and Psychological Sciences, The Gerontologist, and Innovation in Aging, plus one of GSA’s managing editors. We will integrate practical tips with principles of publication ethics and scholarly integrity. The topics will be as follows: (1) preparing your manuscript, including how to choose the right journal; (2) strong and ethical scholarly writing for multidisciplinary audiences; (3) transparency, documentation, and Open Science; (4) successfully responding to reviews; and (5) working with Scholar One. Following these presentations, we will hold round table discussions with editors from the GSA journals portfolio. At these roundtables, editors will answer questions related to the podium presentations and other questions specific to each journal. Intended audiences include emerging and international scholars, and authors interested in learning more about best practices and tips for getting their scholarly work published.


1942 ◽  
Vol 36 (5) ◽  
pp. 837-849 ◽  
Author(s):  
Byron Price

To a free people, the very word “censorship” always has been distasteful. In its theory, it runs counter to all democratic principles; in practice, it can never be made popular, can never please anyone.Everything the censor does is contrary to all that we have been taught to believe is right and proper. The Post Office Department, for example, has two proud mottoes: “The mail must go through,” and “The privacy of the mail must be protected at all hazards.” But censorship stops the mail, it invades the privacy of the mail, it disposes of the mail as may seem best. The same thing holds true in the publishing business. Censorship limits the lively competition and free enterprise of reporters. It relegates many a scoop to the waste basket. It wields a blue pencil—both theoretical and actual—on news stories, magazine articles, advertisements, and photographs. Censorship also enters the radio industry, where it may edit scripts and in some cases stop entire programs.Yet even the most vociferous critics of the principle of censorship agree that in war-time some form and amount of censorship is a necessity. It then becomes not merely a curtailment of individual liberty, but a matter of national security. It is one of the many restrictions that must be imposed on people fighting for the right to throw off those restrictions when peace returns.


2021 ◽  
Vol 8 (1) ◽  
Author(s):  
Rashmi Shivni ◽  
Christina Cline ◽  
Morgan Newport ◽  
Shupei Yuan ◽  
Heather E. Bergan-Roller

Abstract Background Seminal reports, based on recommendations by educators, scientists, and in collaboration with students, have called for undergraduate curricula to engage students in some of the same practices as scientists—one of which is communicating science with a general, non-scientific audience (SciComm). Unfortunately, very little research has focused on helping students develop these skills. An important early step in creating effective and efficient curricula is understanding what baseline skills students have prior to instruction. Here, we used the Essential Elements for Effective Science Communication (EEES) framework to survey the SciComm skills of students in an environmental science course in which they had little SciComm training. Results Our analyses revealed that, despite not being given the framework, students included several of the 13 elements, especially those which were explicitly asked for in the assignment instructions. Students commonly targeted broad audiences composed of interested adults, aimed to increase the knowledge and awareness of their audience, and planned and executed remote projects using print on social media. Additionally, students demonstrated flexibility in their skills by slightly differing their choices depending on the context of the assignment, such as creating more engaging content than they had planned for. Conclusions The students exhibited several key baseline skills, even though they had minimal training on the best practices of SciComm; however, more support is required to help students become better communicators, and more work in different contexts may be beneficial to acquire additional perspectives on SciComm skills among a variety of science students. The few elements that were not well highlighted in the students’ projects may not have been as intuitive to novice communicators. Thus, we provide recommendations for how educators can help their undergraduate science students develop valuable, prescribed SciComm skills. Some of these recommendations include helping students determine the right audience for their communication project, providing opportunities for students to try multiple media types, determining the type of language that is appropriate for the audience, and encouraging students to aim for a mix of communication objectives. With this guidance, educators can better prepare their students to become a more open and communicative generation of scientists and citizens.


Fascism ◽  
2019 ◽  
Vol 8 (1) ◽  
pp. 1-8 ◽  
Author(s):  
Roger Griffin

In the entry on ‘Fascism’ published in 1932 in the Enciclopedia Italiana, Benito Mussolini made a prediction. There were, he claimed, good reasons to think that the twentieth century would be a century of ‘authority’, the ‘right’: a fascist century (un secolo fascista). However, after 1945 the many attempts by fascists to perpetuate the dreams of the 1930s have come to naught. Whatever impact they have had at a local level, and however profound the delusion that fascists form a world-wide community of like-minded ultranationalists and racists revolutionaries on the brink of ‘breaking through’, as a factor in the shaping of the modern world, their fascism is clearly a spent force. But history is a kaleidoscope of perspectives that dynamically shift as major new developments force us to rewrite the narrative we impose on it. What if we take Mussolini’s secolo to mean not the twentieth century, but the ‘hundred years since the foundation of Fascism’? Then the story we are telling ourselves changes radically.


2018 ◽  
Vol 37 (03) ◽  
pp. 263-266
Author(s):  
Lucas Meguins ◽  
Linoel Valsechi ◽  
Ronaldo Fernandes ◽  
Dionei Morais ◽  
Antonio Spotti

Introduction Pericallosal artery (PA) aneurysms represent 2 to 9% of all intracranial aneurysms, and their management remains difficult. Objective The aim of the present study is to describe the case of an adult woman with subarachnoid hemorrhage and bilateral PA aneurysm in mirror position. Case Report A 46-year-old woman was referred to our institution 20 days after a sudden severe headache. She informed that she was treating her arterial hypertension irregularly, and consumed ∼ 20 cigarettes/day. The patient was neurologically intact at admission. A non-contrast computed tomography (CT) on the first day of the onset of the symptoms revealed hydrocephaly and subarachnoid hemorrhage (Fisher III). An angio-CT/digital subtraction arteriography showed bilateral PA aneurysms in mirror position. The patient was successfully treated with surgery via the right interhemispheric approach (because the surgeon is right-handed); the surgeon performed the proximal control with temporary clipping, and introduced an external ventricular drain at the end of the surgery. The patient was discharged on the fourth postoperative day without any additional neurological deficits or ventricular shunts. Conclusion Ruptured PA aneurysm is a surgically challenging aneurysm due to the many anatomical nuances and risk of rebleeding. However, the operative management of ruptured bilateral PA aneurysms is feasible and effective.


2013 ◽  
Vol 64 (3) ◽  
Author(s):  
Mastora Mustafar ◽  
Amran Rasli ◽  
Azlin Shafinaz Mohamad Arshad ◽  
Nadhirah Norhalim

The purpose of this paper is to conduct an exploratory investigation on the level of operations management best practices.  A sample random t-test analysis was used upon a high technology company that was selected based on simple random sampling from government agency directory. After various attempts, 72 out of 138 are providing feedback. However, only 34 can be used, the rest did not answer completely. Descriptive analysis and t-test analysis were performed on 34 completed feedbacks. Six factors in the form of quality commitment, customer focus, formalization of performance measurement, people management, process management and technology management were examined as predictors for operations management best practices. Findings indicated that the mean value is more than 3 for all dimensions. Furthermore, most cases are significant as the selected samples are high technology based companies and their workers are knowledgeable in terms of operations management best practices.


Author(s):  
Ayelet Shavit

This epilogue provides a practical flowchart for interpreting the best practices for replication. Taking the specific actions shown in the flowchart will help researchers to bridge, albeit not completely and permanently close, the gaps inherent in replication. At each branch point, making the “wrong” decision—for example, ignoring (that is, not recording) or conflating (that is, not recording separately) the relevant details—closes the door to replication. Making the “right” decision, however, at best only clarifies and quantifies how much further away we remain from exact replication. Either way, the hubris implicit in any attempt to perfectly replicate a project is fated to fail.


Author(s):  
Andi Sartina Ningsih ◽  
Baharuddi n ◽  
Daud Malamassam

The use of candlenut (Aleurites Mollucana., L. Wild) as a non-timber forest product is expected to be a excellent product in the KPHL of Selayar in line with the designation of the area as a Protected Forest Management Unit (KPHL). Candlenut is a non-timber forest product (NTFP) which has great economic potential, but in the management of the candlenut business in the KPHL Selayar has not been able to be optimally developed as the scale of the use of candlenut remain low and the business model conducted appears to be traditional. The study aimed to analyze and identify internal and external factors in formulating the right strategic priorities in the development of the candlenut business at KPHL Selayar. The method employed was a combination of SWOT and AHP by describing internal and external factors, then tabulating it so that it would formulate a priority of strategic choices. The results showed that among the four SWOT groups namely Strengths (S), Weaknesses (W), Opportunities (O) and Threats (T) which became the priority of the SWOT group which had a great influence on the development of the candlenut business, the Strength (S) group with a value of 10.55. Based on the formulated results of the candlenut business development strategy, it was concluded that the priority strategy to be implemented was the S-O 3 strategy, namely increasing the candlenut business collaboration to expand the marketing network with a priority value of 0.107.


Biometrics provides greater security and usability than conventional personal authentication methods. Fingerprints, facial identification systems and voice recognition systems are the features that biometric systems can use. To improve biometric authentication, the proposed method considered that the input image is iris and fingerprint; at first, pre-processing is performed through histogram equalization for all image inputs to enhance the image quality. Then the extraction process of the feature will be performed. The suggested method uses modified Local Binary Pattern (MLBP), GLCM with orientation transformation, and DWT features next to the extracted features to be combined for feature extraction. Then the optimum function is found with the Rider Optimization Algorithm (ROA) for all MLBP, GLCM and DWT. Eventually, the approach suggested is accepted. Deep Neural Network (DNN) performs the proposed authentication process. A DNN is a multilayered artificial neural network between the layers of input and output. The DNN finds the right mathematical manipulation to turn the input into the output, whether it is an acknowledged image or not. Suggested process quality is measured in terms of reliability recognition. In the MATLAB platform, the suggested approach is implemented.


Sign in / Sign up

Export Citation Format

Share Document