Saturday, February 15, 2020

Operational management in Hospitality and Tourism industry - Sydney Assignment

Operational management in Hospitality and Tourism industry - Sydney Marriott Harbour - Assignment Example The payment rates to the rooms are depended to the views as the deluxe city view rooms cost AUS$650, Bridge view rooms at AUS$750, and in accordance to technology, the E-Bundle package costs $750. The hotel further provides business clientele with Retail Therapy-city view at a cost of $810 as it comprises of a two-car parking lot and proximity to enjoyable shopping excursions in the city. The hotel’s management adapts to criterion review process and establishes that all the programs are up to the desired performances (Bushel, 2001). However, the management fails to express precise charges on its services thus; they fail to achieve trust from the clients as well, for example, charging $45 for car parks instead of the delineated $35 (Marriott, 2013). Executive summary In relevance to the issue of tourism and service delivery, hotels have continuously diversified investments by inclusion of extra services rather than diversification of investments. Since the services offered vary accordingly from provision of meals to accommodation, and other forms of hospitality, the management may consequently fail to acknowledge the importance of some of the services while trying to acknowledge those of others (Ingram & Roberts, 2000). The study established Sydney Harbour Marriott Hotel as a five star with the most appropriate location and proximity to the Pacific Ocean. A review conducted upon the critical areas of interests and that would affect its credibility and value to the tourism approaches upon their comparison to the competitors (Bergin-Seers & Jago, 2007). Eventually, the study shall implicate on the challenges facing the hotel’s management as a result of failure in delivering of the desired services (Ingram & Roberts, 2000). Specifically, the tourists and other business clients boarding the hotel decry on the poor program presentation. In addition, they disguise parking prices as unethical and contrary to the desired value (Bushel, 2001). An evaluation to the values derived by visitors to the hotel record the lowest margin, which is an indication to the financial disguise of the available services and the exact charges realized after visiting the hotel (Ingram & Roberts, 2000). Description of the Sydney Marriott Harbour This five star hotel is a subsidiary of the Marriott International Inc. of the U.S.A. The Sydney Marriott Harbour conforms to the other Marriott hotels as it competitively boasts over its five star facilities, which enable it cope with the prevailing competition in the Australian hotelier industry with a major target to the tourist clientele group (Wilson, Harris, and Jennie, 2008). Despite the expressed competencies, the hotel ranks fourth in provision of quality services to the clientele community. The present competitors who mainly pose a threat to the hotel are the Hilton Sydney Hotel, Sir Stamford at Circular Quay, Quay West Suites Sydney, and the Intercontinental Sydney Hotel among others (Patiar, 2008). The hotels assume the most appropriate location as Marriott Hotel, but differ in the provision of charges. The hotel relies on the local tourists who are the main clients, while the competitors focus on the

Sunday, February 2, 2020

Ethics in computing or Data Protection Act Research Paper

Ethics in computing or Data Protection Act - Research Paper Example This requires safeguarding data through viable planning. This may require data reliable data back up and protection. These protections required for data are regulated by the data protection Act (1998). While these Acts seemed comprehensive at the time of legislation, they have come to show that there are a number of loop holes that can be exploited by various interest groups to achieve their ends (Strobl, Cave, &, Walley, 2000). According to Strobl, Cave, &, Walley, (2000), data protection is a regulation that places me in an awkward position while doing my project on data bases. This act made it very important for me to ensure I introduce structures geared at protecting the information of the data subjects. To ensure that I never contravened the data protection Act or anybody using the databases does not override the data protection act, I ensured that the available controls provided by the existing file systems are upgraded and if possible combined to improve the level of security of the data (Per Arne Godejord, 2008). While this was not only focused on ensuring that the data inside were protected and that the data subjects rights are upheld, I had to ensure that I had in place proper structures for Access control and auditing. However, I had to come up with plans to ensure that the authentication and encryption processes are always up to date. Updating the programs helped me maintain the integrity of the files. Though it is a requirement of the data protection act to ensure that, the personal data are fairly processed. I had to ensure that I carried out a vulnerability assessment and compliance. This is in line with the requirement of that Act that any personal data be processed in fair and lawful manners. Vulnerability assessment and compliance is important in ensuring that data are not processed against the wish of the data subject. After assessing vulnerability, I also configured