LinkedIn and recruitment: how profiles differ across occupations

2014 ◽  
Vol 36 (5) ◽  
pp. 583-604 ◽  
Author(s):  
Julie Zide ◽  
Ben Elman ◽  
Comila Shahani-Denning

Purpose – The purpose of this paper is to identify the elements of a LinkedIn profile that hiring professionals focus on most, and then examine LinkedIn profiles in terms of these identified elements across different industries. Design/methodology/approach – The methodology was comprised of two phases. In the first phase, researchers interviewed hiring professionals to determine their usage of LinkedIn. In the second phase, LinkedIn group member profiles from three industries – HR, sales/marketing and industrial/organizational (I/O) psychology – were compared on the 21 variables identified in Phase 1 (n=288). Findings – χ2 and ANOVA tests showed significant differences with respect to ten of the LinkedIn variables in how people presented themselves across the three groups. There were also several gender differences found. Research limitations/implications – A general limitation was the use of a qualitative research approach. A limitation of Phase 1 was that only a small sample of New York City-based hiring professionals was interviewed. Perhaps a wider, more diverse sample would have yielded different variables. In terms of Phase 2, it is possible that just utilizing the second connections of the researchers limited the generalizability of findings. Practical implications – User unwillingness to fully complete the LinkedIn profile suggests that it may not have replaced the traditional resume yet. Sales/marketing professionals were more likely than HR and I/O psychology professionals to complete multiple aspects of a LinkedIn profile. Women were also less likely than men to provide personal information on their profiles. Originality/value – Most of the empirical research on social networking sites has focussed on Facebook, a non-professional site. This is, from the knowledge, the first study that systematically examined the manner in which people present themselves on LinkedIn – the most popular professional site used by applicants and recruiters worldwide.

2015 ◽  
Vol 67 (4) ◽  
pp. 374-391 ◽  
Author(s):  
Elizabeth McDonald ◽  
Marina Rosenfield ◽  
Tim Furlow ◽  
Tara Kron ◽  
Irene Lopatovska

Purpose – The purpose of this paper is to understand patterns in information behavior of academic librarians, individuals who influence information technology adoption in academic libraries and parent institutions. Librarians’ perception of their student patrons’ information behavior was also investigated. Design/methodology/approach – An exploratory study investigated professional and personal information behavior of eight librarians employed by various academic institutions in the Greater New York City area. The data were collected in face-to-face interviews and analyzed using the content analysis technique. Findings – The study found that librarians’ institutional affiliations had no effect on their information behavior. The patterns in librarians’ information behavior at work and leisure suggest that those behaviors are influenced by contextual variables, personal preferences and tasks, and are no different from the general population. Overall, librarians had accurate, evidence-driven understanding of their student patrons’ information behavior. Research limitations/implications – The study findings have limited generalizability due to the small sample size and limited geographical pool of participants. Practical implications – Academic library is often seen as the hub of the adoption of information technologies as librarians introduce new digital content and resources to the rest of academia. Understanding information behavior of academic librarians contributes to understanding factors that are affecting technology adoption in academia overall, and can potentially inform recommendations for optimizing academic library offerings. Originality/value – The study is an original investigation of the relationships between institutional characteristics and librarian demographics, librarian information behavior at work and leisure, and librarians’ perception of students’ information behavior and information preferences.


2005 ◽  
Vol 64 (3) ◽  
pp. 269-275 ◽  
Author(s):  
Angela Dickinson ◽  
Carol Welch ◽  
Laurie Ager ◽  
Aileen Costar

Poor nutritional care within the hospital setting continues despite decades of work chronicling and measuring the problems. To address the problem changes in practice have been attempted to improve the patients’ experience of mealtimes. In order to implement patient-centred mealtimes for older patients by changing the focus from institutional convenience to one that focuses on the requirements of the patients, an action research approach has been used that focuses on action and change, and thus appears to have much to offer those who seek to change practice. The present paper focuses on the first two phases in a three-phase approach. In phase one the nature of everyday mealtime care and the wider context are explored using focus groups, interviews and observations. The data fall into three main themes that all impact on patients’ experiences of mealtimes: institutional and organisational constraints; mealtime care and nursing priorities; eating environment. Following feedback of phase 1 findings to staff and identification of areas of concern a model of practice development was selected to guide the change process of the second phase. Changes to mealtime nursing practice and the ward environment have been made, indicating that action research has the potential to improve the mealtime care of patients.


Author(s):  
Jesús García-Arca ◽  
J. Carlos Prado-Prado ◽  
Arturo J. Fernández-González

PurposeThe purpose of this paper is to propose and validate a framework for improving efficiency in road transport based on key performance indicators (KPIs) and personnel participation. The use of the “Overall Equipment Effectiveness” (OEE) indicator is widespread in factories. The framework adapts OEE to transport management.Design/methodology/approachResearch was divided into two phases. The first phase included development of a participative framework, which was based on the authors’ experience and a literature review related to transport KPIs. The second phase involved the validation of the framework, adopting an “Action Research” approach by leading its implementation in a Spanish retailer.FindingsImplementation of the framework has promoted more efficient transport in the company. The framework could be extrapolated to other companies, particularly, transport and parcel companies. By applying the “Action Research” approach it has been shown that researchers and practitioners can create knowledge by resolving problems that are of interest to both parties.Research limitations/implicationsThe framework has been applied in one company and could achieve broader validation. Additionally, integrating only indicators of transport efficiency into the OEE proposal has meant that other perspectives, such as costs or the environment, have not been dealt with directly.Originality/valueThe framework is a new line of research applied to transport management. The academic and business contributions fall into three areas: transport management, organizational change and the methodology. There are few examples that illustrate “Action Research” adoption within the scope of supply chain management.


2021 ◽  
Author(s):  
Shah Mahdi Hasan ◽  
Kaushik Mahata ◽  
Md Mashud Hyder

Grant-Free Non Orthogonal Multiple Access (NOMA) offers promising solutions to realize uplink (UL) massive Machine Type Communication (mMTC) using limited spectrum resources, while reducing signalling overhead. Because of the sparse, sporadic activities exhibited by the user equipments (UE), the active user detection (AUD) problem is often formulated as a compressive sensing problem. In line of that, greedy sparse recovery algorithms are spearheading the development of compressed sensing based multi-user detectors (CS-MUD). However, for a given number of resources, the performance of CS-MUD algorithms are fundamentally limited at higher overloading of NOMA. To circumvent this issue, in this work, we propose a two-stage hierarchical multi-user detection framework, where the UEs are randomly assigned to some pre-defined clusters. The active UEs split their data transmission frame into two phases. In the first phase an UE uses the sinusoidal spreading sequence (SS) of its cluster. In the second phase the UE uses its own unique random SS. At phase 1 of detection, the active clusters are detected, and a reduced sensing matrix is constructed. This matrix is used in Phase 2 to recover the active UE indices using some sparse recovery algorithm. Numerical investigations validate the efficacy of the proposed algorithm in highly overloaded scenarios.


2018 ◽  
Vol 13 (2) ◽  
pp. 145-168 ◽  
Author(s):  
Buddhini Gayathri Jayatilleke ◽  
Gaya R. Ranawaka ◽  
Chamali Wijesekera ◽  
Malinda C.B. Kumarasinha

Purpose The purpose of this paper is to illustrate the development and testing of an innovative mobile application using design-based research. Design/methodology/approach This paper reports on the process of transformation of existing printed course material into digitized content through design-based research where design, research and practice were concurrently applied through several iterations of the mobile application. For this transformation, one session each from BSc in Nursing, Bachelor of Pharmacy and Bachelor of Medical Laboratory Sciences was selected. In the first phase of the design-based research, the main research question was formulated. In the second phase, a mobile learning application (OUSL MLearn) was designed and developed to address the research question. In the third phase, this application was evaluated by five groups of stakeholders: content experts to validate the content; educational technologists to check the alignment of technical and pedagogical features; novice users to check the overall effectiveness of the application; developer to develop the application, to check the ease of usage; and researchers to identify the impact of this innovation. These stakeholders were closely involved throughout the whole process which lasted over a period of four months. At the end of this development phase, the results were reflected upon and used for further enrichment. Findings It was observed that the developed mobile application was accessible, appealing and pedagogically constructive for users. However, optimization, development time, technical and organizational issues, workload of academics and production costs were identified as major challenges. Research limitations/implications This study was based on the findings of a small sample of potential users. Practical implications The findings have implications for designing culturally adaptive interactive mobile applications. Originality/value This study will benefit practitioners to design culturally sensitive mobile learning courses and researchers to conduct design-based research.


2019 ◽  
Vol 25 (5) ◽  
pp. 1128-1146 ◽  
Author(s):  
Suzanne Mawson ◽  
Laila Kasem

Purpose Few studies have sought to explore the issue of entrepreneurial intention (EI) within refugees, despite wide recognition of refugee entrepreneurial potential. The purpose of this paper is to explore EI among recently arrived Syrian refugees in the UK, including the role that their migration experience plays in shaping these intentions. Design/methodology/approach This paper follows an interpretive phenomenological research approach, contextualised within the EI literature. It draws on data collected from in-depth interviews with nine Syrian refugees, five of whom arrived independently and four of whom arrived via the UK Government’s Syrian Vulnerable Person Resettlement Programme. Findings All participants were found to have strong perceptions of desirability towards entrepreneurship. Individuals who arrived independently demonstrated more confidence in their abilities, and in turn somewhat stronger start-up intentions. The findings indicate that the personal development of independent refugee arrivals linked to their migration experiences may help shape the intention to engage in entrepreneurship. Research limitations/implications As this paper draws on a small sample in a single geographic location, the findings presented are phenomenological, context specific and not necessarily applicable to other spatial locations or to other (refugee) groups. Social implications A number of practical and social implications are provided. Support interventions focussed on strengthening the perceived abilities and capabilities of refugees would be of considerable benefit. Originality/value This paper provides new and important insight into the nature of EI within a novel focal group. It makes a valuable contribution to the literature by considering the issues of context and process, specifically the relationship between personal forced migration experience and the perceived capability to start a business.


2019 ◽  
Vol 19 (2) ◽  
pp. 171-184
Author(s):  
Carollyne Youssef

Purpose While most studies utilise quantitative methodologies to examine issues relevant to sexual offending behaviour, such as treatment programmes and risk assessments; substantially fewer studies have utilised qualitative methods, and specifically Layder’s Adaptive Theory (AT) as a methodology; and there is a paucity of research examining community maintenance programmes altogether. The purpose of this paper is to report on the use of AT to the understanding of the significance of community maintenance programmes for high-risk sexual offenders. Design/methodology/approach Using AT as a unique framework, this study examined an Australian sample of services providers and high-risk sexual offenders participating in a community maintenance programme. In particular, the current research aimed to develop an understanding of community maintenance programmes for released sexual offenders, in a bid to develop a theoretical framework for these programmes. The research had three subject groups, service providers, programme participants who had not reoffended and programme participants who had sexually reoffended. Findings It appears that this methodology is a useful approach to studies within forensic rehabilitation and offender research. Common, reoccurring themes have been gathered through this approach, which would not have been possible with a quantitative methodology. Research limitations/implications While this research methodology was applied to a small sample size, its use suggested that AT was an informative and useful research approach to utilise in offender research more broadly, yielding rich in-depth information. Practical implications Utilising AT provided an in-depth understanding and exploration of experiences for offender populations as well as staff delivering programmes, which enhances the efficacy of programmes delivered by incorporating “user feedback” and allows programme developers to utilise such feedback to improve programmes. An AT approach to offender rehabilitation has been useful in providing exploratory information in the absence of any conceptual or theoretical frameworks and with a very little extant information. Given maintenance programmes are quite understudied, this approach allowed for common themes to emerge in order to guide future research as well as the development of a paradigm. It is worth considering the utility of this methodology for a variety of forensic research, particularly areas which remain understudied. Social implications Sexual offending behaviour is a significant societal concern. A better understanding of what makes programmes more effective for those who use them and run them, will assist in reducing recidivism, which will benefit the community at large. Originality/value Layder’s AT has not been used with an offender population in the past, and specifically within the sexual offending realm, thus this paper offers a unique and effective approach to offender research.


2015 ◽  
Vol 25 (2) ◽  
pp. 279-299 ◽  
Author(s):  
Christy Cheung ◽  
Zach W. Y. Lee ◽  
Tommy K. H. Chan

Purpose – The purpose of this paper is to examine the relative impacts of perceived cost, perceived benefits, and social influence on self-disclosure behaviors in social networking sites under an integrated theoretical framework. Design/methodology/approach – Building upon social exchange theory and privacy calculus theory, an integrated model was developed. The model was tested empirically using a sample of 405 social networking site’s users. Users were required to complete a survey regarding self-disclosure behaviors in Facebook. Findings – The results indicate that social influence is the factor which exhibits the strongest effect on self-disclosure in social networking sites, followed by perceived benefits. Surprisingly, perceived privacy risk does not have any significant impact on self-disclosure. Research limitations/implications – The results inform researchers about the importance to incorporate social influence factors and cultural factors into future online self-disclosure study. Practical implications – The results suggest that users focus on the benefits as well as social influence when they decide to reveal personal information in social networking sites, but pay less attention to the potential privacy risks. Educators are advised to launch educational programs to raise students’ awareness to the potential risks of self-disclosure in social networking sites. Service providers of social networking sites are encouraged to provide intuitive privacy indices showing users the levels of privacy protection. Originality/value – This paper is one of the first to develop and empirically tests an integrated model of self-disclosure in social networking sites.


1980 ◽  
Vol 5 ◽  
pp. 63-68
Author(s):  
L. Goldberg

Many scientific justifications for space astronomy have been prepared by individuals and committees during the past three decades or more. The first such report that I am aware of, called “Astronomical Advantages of an Extraterrestrial Observatory”, was written by Lyman Spitzer in September 1946, and although its goals were extremely modest by today’s standards, the report did dwell with enthusiasm on the ultimate goal of a large reflecting telescope 4-6 meters in diameter with diffraction-limited optics put into earth-satellite orbit. The latest study, from which I shall quote liberally, has just been published by the Astronomy Committee of the U. S. National Academy of Sciences, and provides the scientific foundation for space astronomy in the 1980’s. Space Astronomy was initiated about one month after the date of publication of Spitzer’s report, when the first high-altitude rocket was launched to observe the sun’s ultraviolet radiation. Since that time, space astronomy has completed two phases and is about to embark on a third. In Phase 1, which lasted until the beginning of Sputnik, observations were made for a few minutes at a time from high-altitude rockets. In the second phase, which is just ending, observations were made with relatively small instruments in earth-orbiting satellites. The observing programs carried out with rockets and small satellites were called experiments because their capabilities and objectives were limited and their lifetimes were short -from a few minutes to about a year.


2016 ◽  
Vol 24 (2) ◽  
pp. 228-240 ◽  
Author(s):  
Malcolm Pattinson ◽  
Kathryn Parsons ◽  
Marcus Butavicius ◽  
Agata McCormac ◽  
Dragana Calic

Purpose The purpose of this paper is to report on the use of two studies that assessed the attitudes of typical computer users. The aim of the research was to compare a self-reporting online survey with a set of one-on-one repertory grid technique interviews. More specifically, this research focussed on participant attitudes toward naive and accidental information security behaviours. Design/methodology/approach In the first study, 23 university students responded to an online survey within a university laboratory setting that captured their attitudes toward behaviours in each of seven focus areas. In the second study, the same students participated in a one-on-one repertory grid technique interview that elicited their attitudes toward the same seven behaviours. Results were analysed using Spearman correlations. Findings There were significant correlations for three of the seven behaviours, although attitudes relating to password management, use of social networking sites, information handling and reporting of security incidents were not significantly correlated. Research limitations/implications The small sample size (n = 23) and the fact that participants were not necessarily representative of typical employees, may have impacted on the results. Practical implications This study contributes to the challenge of developing a reliable instrument that will assess individual InfoSec awareness. Senior management will be better placed to design intervention strategies, such as training and education of employees, if individual attitudes are known. This, in turn, will reduce risk-inclined behaviour and a more secure organisation. Originality/value The literature review indicates that this study addresses a genuine gap in the research.


Sign in / Sign up

Export Citation Format

Share Document