Catálogo de publicaciones - libros
The Spread of Yield Management Practices: The Need for Systematic Approaches
Fabiola Sfodera
Resumen/Descripción – provisto por la editorial
No disponible.
Palabras clave – provistas por la editorial
Risk Management; Business Strategy/Leadership; Entrepreneurship; Operation Research/Decision Theory; Marketing; Organization
Disponibilidad
Institución detectada | Año de publicación | Navegá | Descargá | Solicitá |
---|---|---|---|---|
No detectada | 2006 | SpringerLink |
Información
Tipo de recurso:
libros
ISBN impreso
978-3-7908-1582-5
ISBN electrónico
978-3-7908-1672-3
Editor responsable
Springer Nature
País de edición
Reino Unido
Fecha de publicación
2006
Información sobre derechos de publicación
© Physica-Verlag Heidelberg 2006
Cobertura temática
Tabla de contenidos
Yield management in advanced systems of hotel management
Fabiola Sfodera
What is the position of yield management in hotel business organisations? What is its potential? Is this totally achieved or is there still an unexpressed margin? And with what organisational form does yield management best develop its potential? Innovations regarding organisational structure and work organisation in hotels have placed in doubt the role and position which yield management currently holds in hotels. This paper analyses, first of all, the principal causes for the failure of yield management systems and then relates these to the organisational structures widespread in the tourism-hospitality business. In this way the characteristics of a mixed or traditional system are analysed, along with the role that yield management plays in it; we shall also analyse a more advanced form of organisation, that of organisational learning, and its ability to strengthen the role and function of yield management, to the point of reaching the most advanced organisational form, still rarely recognisable in practice, which is the learning organisation which manages to develop to the maximum the potential of yield management as a management technique and not merely a technique for the determination of prices and the optimisation of revenue. The paper ends with the formulation of four different scenarios for the evolution of yield management and for their applicability.
Part I - Some strategic aspects of a YMS implementation | Pp. 3-16
How to yield value: the Janus perspective
Bryn Parry; David McCaskey
We certainly covered a great deal of material within this chapter. It is extremely important to become familiar with the techniques discussed to give your web application the best security possible. As mentioned earlier, it is inevitable that someone may try to gain access to your sensitive data. Luckily, the .NET Framework 2.0 provides many options and methods that you can implement to stop these unauthorized attempts. You can never achieve or guarantee total security 100% of the time; however, implementing the methods we discussed in this chapter will give you the safeguards necessary to gain the greatest security possible.
Part I - Some strategic aspects of a YMS implementation | Pp. 19-30
Human issues and the introduction of a yield management system. A case study of a 4* chain hotel
Bob Brotherton; Rebecca Turner
What is the position of yield management in hotel business organisations? What is its potential? Is this totally achieved or is there still an unexpressed margin? And with what organisational form does yield management best develop its potential? Innovations regarding organisational structure and work organisation in hotels have placed in doubt the role and position which yield management currently holds in hotels. This paper analyses, first of all, the principal causes for the failure of yield management systems and then relates these to the organisational structures widespread in the tourism-hospitality business. In this way the characteristics of a mixed or traditional system are analysed, along with the role that yield management plays in it; we shall also analyse a more advanced form of organisation, that of organisational learning, and its ability to strengthen the role and function of yield management, to the point of reaching the most advanced organisational form, still rarely recognisable in practice, which is the learning organisation which manages to develop to the maximum the potential of yield management as a management technique and not merely a technique for the determination of prices and the optimisation of revenue. The paper ends with the formulation of four different scenarios for the evolution of yield management and for their applicability.
Part I - Some strategic aspects of a YMS implementation | Pp. 35-51
Yield Management and trust: the effect of variable pricing on consumer trust in a restaurant brand
Una McMahon Beattie; Adrian Palmer; Patrick McCole; Anthony Ingold
We certainly covered a great deal of material within this chapter. It is extremely important to become familiar with the techniques discussed to give your web application the best security possible. As mentioned earlier, it is inevitable that someone may try to gain access to your sensitive data. Luckily, the .NET Framework 2.0 provides many options and methods that you can implement to stop these unauthorized attempts. You can never achieve or guarantee total security 100% of the time; however, implementing the methods we discussed in this chapter will give you the safeguards necessary to gain the greatest security possible.
Part I - Some strategic aspects of a YMS implementation | Pp. 55-63
Controlling the yield management process in the hospitality business
Paolo Desinano; Maria Stella Minuti; Emanuela Schiaffella
What is the position of yield management in hotel business organisations? What is its potential? Is this totally achieved or is there still an unexpressed margin? And with what organisational form does yield management best develop its potential? Innovations regarding organisational structure and work organisation in hotels have placed in doubt the role and position which yield management currently holds in hotels. This paper analyses, first of all, the principal causes for the failure of yield management systems and then relates these to the organisational structures widespread in the tourism-hospitality business. In this way the characteristics of a mixed or traditional system are analysed, along with the role that yield management plays in it; we shall also analyse a more advanced form of organisation, that of organisational learning, and its ability to strengthen the role and function of yield management, to the point of reaching the most advanced organisational form, still rarely recognisable in practice, which is the learning organisation which manages to develop to the maximum the potential of yield management as a management technique and not merely a technique for the determination of prices and the optimisation of revenue. The paper ends with the formulation of four different scenarios for the evolution of yield management and for their applicability.
Part I - Some strategic aspects of a YMS implementation | Pp. 65-78
Revenue management in visitor attractions: a case study of the EcoTech Centre, Swaffham, Norfolk
Julian Hoseason
We certainly covered a great deal of material within this chapter. It is extremely important to become familiar with the techniques discussed to give your web application the best security possible. As mentioned earlier, it is inevitable that someone may try to gain access to your sensitive data. Luckily, the .NET Framework 2.0 provides many options and methods that you can implement to stop these unauthorized attempts. You can never achieve or guarantee total security 100% of the time; however, implementing the methods we discussed in this chapter will give you the safeguards necessary to gain the greatest security possible.
Part II - Yield management: new applications | Pp. 83-98
Revenue management in the restaurant sector
Charlotte R. Rassing
We certainly covered a great deal of material within this chapter. It is extremely important to become familiar with the techniques discussed to give your web application the best security possible. As mentioned earlier, it is inevitable that someone may try to gain access to your sensitive data. Luckily, the .NET Framework 2.0 provides many options and methods that you can implement to stop these unauthorized attempts. You can never achieve or guarantee total security 100% of the time; however, implementing the methods we discussed in this chapter will give you the safeguards necessary to gain the greatest security possible.
Part II - Yield management: new applications | Pp. 101-112
Revenue management and food service businesses: the case of Italy
Emanuela Schiaffella
We certainly covered a great deal of material within this chapter. It is extremely important to become familiar with the techniques discussed to give your web application the best security possible. As mentioned earlier, it is inevitable that someone may try to gain access to your sensitive data. Luckily, the .NET Framework 2.0 provides many options and methods that you can implement to stop these unauthorized attempts. You can never achieve or guarantee total security 100% of the time; however, implementing the methods we discussed in this chapter will give you the safeguards necessary to gain the greatest security possible.
Part II - Yield management: new applications | Pp. 113-119
Recent events, challenges and options in revenue management
Paolo Desinano
We certainly covered a great deal of material within this chapter. It is extremely important to become familiar with the techniques discussed to give your web application the best security possible. As mentioned earlier, it is inevitable that someone may try to gain access to your sensitive data. Luckily, the .NET Framework 2.0 provides many options and methods that you can implement to stop these unauthorized attempts. You can never achieve or guarantee total security 100% of the time; however, implementing the methods we discussed in this chapter will give you the safeguards necessary to gain the greatest security possible.
Part II - Yield management: new applications | Pp. 121-125
Microsoft Fidelio: Opus 2 overview
Fabiola Sfodera
We certainly covered a great deal of material within this chapter. It is extremely important to become familiar with the techniques discussed to give your web application the best security possible. As mentioned earlier, it is inevitable that someone may try to gain access to your sensitive data. Luckily, the .NET Framework 2.0 provides many options and methods that you can implement to stop these unauthorized attempts. You can never achieve or guarantee total security 100% of the time; however, implementing the methods we discussed in this chapter will give you the safeguards necessary to gain the greatest security possible.
Part III - Information instruments for a YMS in the hospitality industry | Pp. 129-139