Study shows both e-recruitment and training comprehensiveness help to improve employer branding

2019 ◽  
Vol 27 (5) ◽  
pp. 25-26

Purpose This paper aims to review existing literature about both e-recruitment and training comprehensiveness to find out if there was a link to perceptions of the organization among employees. The authors felt this would lead to more positive beliefs and higher levels of employer branding (EB). Design/methodology/approach To test their beliefs, they analyzed literature published between 1964 and 2017. The strategy was to use the databases of Emerald, EBSCO, Scopus, ProQuest and JSTOR, and search engines like Google Scholar. They searched for key words and came up with 51 articles, 17 dealing with employer branding, 23 about e-recruitment and employer branding, and 11 about training comprehensiveness and employer branding. Findings The authors felt the literature review confirmed their beliefs that e-recruitment was a good way to create a more positive view of organizations, and training comprehensiveness helped to develop both employee skills and levels of commitment. Originality/value Very little research has previously addressed e-recruitment and training comprehensiveness as drivers of EB.

2015 ◽  
Vol 21 (4) ◽  
pp. 421-438
Author(s):  
Ajay K. Jain ◽  
Sherry Sullivan

Purpose – This study aims to provide a literature review of the 56 articles published in the Journal of Management History (JMH) from 2000 to 2004. Design/methodology/approach – The authors conducted a thematic analysis using the categories of person, topic or event to classify articles as well as a citation analysis using Google Scholar. Findings – The number of articles published from 2000 to 2004 was almost 50 per cent fewer than published in the previous five years, and citation rates were lower. Originality/value – Results suggest that high-quality articles focused on persons or topics are more likely to be published in the JMH.


2019 ◽  
Vol 51 (2) ◽  
pp. 125-136 ◽  
Author(s):  
Sovanjeet Mishra ◽  
S. Pavan Kumar

PurposeThe purpose of this paper is to highlight e-recruitment and training comprehensiveness as the untapped antecedents of employer branding (EB) in the relevant literature, which might enhance the employer’s knowledge and lead to organisational development.Design/methodology/approachThis study adopts an exploratory conceptual modelling approach based on the extant literature from 1964 to 2017 using the databases of Emerald, EBSCO, Scopus, Proquest, JSTOR and search engines such as Google Scholar to ensure the reliability of the literature.FindingsThis paper suggests that e-recruitment and training comprehensiveness might be the untapped antecedents of EB as compared to traditional recruitment and training process explored in earlier studies.Research limitations/implicationsThe viewpoint can be further refined through academic conceptualisation and empirical validation.Practical implicationsThis paper lays a conceptual foundation in the emerging area of EB. Ideas expressed herein can be approached by academicians.Originality/valuePast studies have not explored e-recruitment and training comprehensiveness as the antecedents of EB. This work provides knowledge that candidly contributes to the conceptualisation of e-recruitment and training comprehensiveness. Further, this research has the potential to help academicians to understand the antecedents of EB leading to organisational development.


foresight ◽  
2015 ◽  
Vol 17 (3) ◽  
pp. 240-256 ◽  
Author(s):  
Mostafa Safdari Ranjbar ◽  
Gholam Reza Tavakoli

Purpose – The aim of this paper is to promote the authors' understanding of technology intelligence by responding to two questions: What is technology intelligence? How is it accomplished? Design/methodology/approach – To respond to the two main questions about technology intelligence in this paper, the authors have studied relevant academic, peer-reviewed journals and books using the literature databases of Google Scholar, Sciencedirect, Inderscience, Wiley and Emerald Insight. They have used few selection criteria to choose papers and books for inclusion in their study. Findings – Enhancing the authors' understanding of the technology intelligence concept by responding to the two main questions (What is technology intelligence? How is it accomplished?), classifying the main studies in the field of technology intelligence and several practical and theoretical implications are the findings in this paper. Practical implications – A number of practical implications related to technology intelligence structure, process, methods, tools and players are suggested to managers of organizations and companies to improve their technology-related planning processes and decision-making. Originality/value – Despite the considerable level of consensus on the necessity of precise scanning and monitoring technological changes and trends, there is still limited understanding of the technology intelligence concept. This paper intends to enhance the authors' understanding of technology intelligence by responding to two questions: What is technology intelligence? And how is it accomplished?


2020 ◽  
Vol 28 (5) ◽  
pp. 701-717 ◽  
Author(s):  
Joakim Kävrestad ◽  
Markus Lennartsson ◽  
Marcus Birath ◽  
Marcus Nohlberg

Purpose Using authentication to secure data and accounts has grown to be a natural part of computing. Even if several authentication methods are in existence, using passwords remain the most common type of authentication. As long and complex passwords are encouraged by research studies and practitioners alike, computer users design passwords using strategies that enable them to remember their passwords. This paper aims to find strategies that allow for the generation of passwords that are both memorable and computationally secure. Design/methodology/approach The study began with a literature review that was used to identify cognitive password creation strategies that facilitate the creation of passwords that are easy to remember. Using an action-based approach, attack models were created for the resulting creation strategies. The attack models were then used to calculate the entropy for passwords created with different strategies and related to a theoretical cracking time. Findings The result of this study suggests that using phrases with four or more words as passwords will generate passwords that are easy to remember and hard to attack. Originality/value This paper considers passwords from a socio-technical approach and provides insight into how passwords that are easy to remember and hard to crack can be generated. The results can be directly used to create password guidelines and training material that enables users to create usable and secure passwords.


2014 ◽  
Vol 42 (3) ◽  
pp. 446-466 ◽  
Author(s):  
Teressa M. Keenan

Purpose – The aim of this paper is to highlight the relationship between cataloging data and reference service and the importance of including reference librarians, in general resource description and access (RDA) training. Design/methodology/approach – A literature review and the author’s experiences related to implementing RDA are presented with minimal cataloging jargon to help librarians better understand the effects of cataloging standards on reference service. Findings – There is a noticeable lack of research and training related to RDA for audiences beyond technical services. More research is needed to determine how users are interacting with the catalog, how bibliographic data is supporting their discovery and access, what, if any, obstacles reference librarians encounter as a result of RDA and how future iterations of RDA may open bibliographic data to communities beyond the library. Originality/value – This paper is one the few that discuss how RDA may affect reference service. It will be useful for providing librarians with a general understanding of the relationship between cataloging and reference and may serve as a starting point for further research.


2016 ◽  
Vol 117 (11/12) ◽  
pp. 768-771 ◽  
Author(s):  
Bruce Massis

Purpose The purpose of this paper is to reflect on the use of Open Electronic Resources (OER) as a supplement or replacement for textbooks or entire courses in higher education teaching and learning. Design/methodology/approach This paper is a literature review and commentary on this topic that has been addressed by professionals, researchers and practitioners. Findings Librarians are in a unique position to offer support for faculty seeking to incorporate OER into their courses. In an overall effort to serve as an important option to the mounting costs of education, librarians can offer up their knowledge, skill and training in the development and evaluation of OER. Originality/value The value in exploring this topic is to examine the library’s use of OER and their benefits and challenges in a higher education classroom environment.


2017 ◽  
Vol 36 (3) ◽  
pp. 89-95 ◽  
Author(s):  
Jenny Lynne Semenza ◽  
Regina Koury ◽  
Sandra Shropshire

Purpose This paper aims to provide an annotated bibliography of literature on diversity initiatives for 2010-2015 in academic libraries, both in USA and internationally. It aims to help librarians interested in fostering a welcoming and supporting environment for all individuals and engaging library community in discussions about diversity. Design/methodology/approach The authors conducted literature review using EBSCOhost multidisciplinary databases and Google Scholar, using the terms “divers*” and “academic librar*” and limiting search results to 2010-2015 dates. Findings The literature reviewed in this annotated bibliography is a solid start to assist librarians with diversity initiatives from planning collections to wider organization planning purposes. Originality/value No other annotated bibliography currently exists for those interested in conducting vital work of ensuring a respectful and inclusive library environment.


2015 ◽  
Vol 116 (7/8) ◽  
pp. 467-470 ◽  
Author(s):  
Bruce Massis

Purpose – The purpose of this paper is to emphasize that hiring a library employee in possession of a positive and winning attitude can pay enormous benefits for the organization far into the future. Design/methodology/approach – Literature review and commentary on this topic has been addressed by professionals, researchers and practitioners. Findings – While it can be difficult to completely be certain that one has made the right choice with every hire, at least by developing a set of effective interview questions, listening closely to the candidate’s responses and appraising any negative bent in mood or language with the objective of assessing attitude at the outset of the interview can lead to a more successful hiring experience. Originality/value – The value in addressing this issue is to submit that hiring employees for their attitude and training them for their skills can result in a workplace where the positive benefits of such hires can be realized daily.


2020 ◽  
Vol 37 (8) ◽  
pp. 7-9
Author(s):  
Israel Odede

Purpose The paper aims to critically examine the bibliographic utility as a roadmap to increase library consortia and provide an insight into a new library consortia strategy that integrates librarians into a system of sharing both resources and knowledge. Design/methodology/approach This study adopted a literature review approach with a focus on bibliographic utility as a necessary prerequisite for effective library consortia, which is a paradigm shift from the concept of individual ownership to a collective access of distributed network resources and knowledge. Findings The reviewed literature indicated that significant bibliographic utilities and integrated library systems are factors that shaped and developed consortia activities in libraries. Originality/value The bibliographic utility has limited literature, and a few published scholarly studies have combined bibliographic utility and library consortia as strategies to share resources and knowledge


2019 ◽  
Vol 76 (1) ◽  
pp. 333-353 ◽  
Author(s):  
Stephen Macdonald ◽  
Briony Birdi

Purpose Neutrality is a much debated value in library and information science (LIS). The “neutrality debate” is characterised by opinionated discussions in contrasting contexts. The purpose of this paper is to fill a gap in the literature by bringing these conceptions together holistically, with potential to deepen understanding of LIS neutrality. Design/methodology/approach First, a literature review identified conceptions of neutrality reported in the LIS literature. Second, seven phenomenographic interviews with LIS professionals were conducted across three professional sectors. To maximise variation, each sector comprised at least one interview with a professional of five or fewer years’ experience and one with ten or more years’ experience. Third, conceptions from the literature and interviews were compared for similarities and disparities. Findings In four conceptions, each were found in the literature and interviews. In the literature, these were labelled: “favourable”, “tacit value”, “social institutions” and “value-laden profession”, whilst in interviews they were labelled: “core value”, “subservient”, “ambivalent”, and “hidden values”. The study’s main finding notes the “ambivalent” conception in interviews is not captured by a largely polarised literature, which oversimplifies neutrality’s complexity. To accommodate this complexity, it is suggested that future research should look to reconcile perceptions from either side of the “neutral non-neutral divide” through an inclusive normative framework. Originality/value This study’s value lies in its descriptive methodology, which brings LIS neutrality together in a holistic framework. This framework brings a contextual awareness to LIS neutrality lacking in previous research. This awareness has the potential to change the tone of the LIS neutrality debate.


Sign in / Sign up

Export Citation Format

Share Document