EFFECTIVE USE OF INFORMATION TECHNOLOGY TO ENHANCE JOB SEEKING PROCESS IN EAST JAVA INDONESIA THROUGH ONLINE JOB SERVICE CENTER

2019 ◽  
Vol 4 (1) ◽  
pp. 28
Author(s):  
Stephanus Eko Wahyudi

As a high populated country, one of Indonesia major problem is unemployment. The Indonesian government has been working on several programs to reduce the unemployment level. In the province level, Disnakertrans Jatim has several initiatives, including: developing Employment Service Center as well as Online Job Service Center. The number of Internet users is increasing significantly in the last several years, including in Indonesia. The use of Information Technology is expected to assist the job seekers to find jobs, and allows companies to find workers effectively. This paper discusses about the development of the Online Job Service Center

2021 ◽  
pp. 0145482X2110591
Author(s):  
Jennifer L. Cmar ◽  
Anne Steverson

Introduction: The purpose of this study was to describe the job-seeking and work experiences of transition-age youths with visual impairments. Methods: We analyzed follow-up data from a quasi-experimental study of a job-search intervention conducted from 2016 to 2019. Participants were 88 youths with visual impairments from three states; approximately half received the job-search intervention, and the other half served as a comparison group. Measures included job-search activities and outcomes, job-seeking barriers, volunteer and work experiences, and parental support for job-seeking. Results: Commonly reported job-search activities were preparing or revising resumes, talking to people about jobs, submitting applications, and submitting resumes, but most participants performed these activities infrequently. Many job-seekers encountered barriers during their job search, and few searches resulted in paid employment. Participants generally reported moderate levels of preparation to handle job-seeking barriers and parental support for job-seeking. Intervention and comparison participants had similar results on most measures, with few exceptions. Discussion: When youths actively search for a job but do not find one, their motivation to continue job-seeking may be reduced, particularly if their preparedness to overcome job-seeking barriers is low. Although many participants had some engagement in volunteer or work activities, short-term work experiences were the most common—and perhaps most misunderstood—work activity. Implications for practitioners: Youths with visual impairments may benefit from feedback on their job-seeking approach, application materials, and interview skills so they can make changes and determine how to focus or refocus their efforts. In addition to offering feedback, service providers can provide ongoing support to youth job-seekers and encourage them to persist in their job search. Explicit discussions about different types of work activities may help transition-age youths understand how short-term work experiences differ from paid jobs.


Connectivity ◽  
2021 ◽  
Vol 149 (1) ◽  
Author(s):  
H. M. Potapov ◽  
◽  
M. V. Nadutenko ◽  
V. V. Prykhodnyuk

The article considers the issue of creating cognitive information technology to support the implementation of NATO standards, which is also inherent in the means of communication of modern telecommunications systems in the Armed Forces of Ukraine and other components of the security and defense sector of Ukraine. It is noted that assessing the state of implementation of NATO standards is a rather complex and important process that requires the analysis of a large amount of poorly structured and unstructured information with varying degrees of restriction of access, which greatly complicates its analysis and processing. The effective use of information technology to solve these problems directly depends on the level of interaction between information processes. The nature of the interaction between them determines their network orientation, and in the environment of the system should be used tools that use information resources from different fields of knowledge. A number of problems have been identified, which are the redundancy, complexity and irrelevance of the regulatory framework in the field of defense; obsolescence of standards and their incompatibility with modern systems, etc. To eliminate them, it is proposed to use cognitive information technology with elements of artificial intelligence, and to assess the state of implementation of standards, it is proposed to use the method of recursive reduction. This method will be used both for structuring and for forming ontologies based on them. A further direction of research initiated in this article is the introduction of the proposed cognitive information technology in the activities of the governing bodies of the Armed Forces of Ukraine and other components of the security and defense sector.


2017 ◽  
Vol 2 (1) ◽  
pp. 112-116
Author(s):  
Akhsani Taqwiym ◽  
Novan Wijaya

Internet technology is currently growing, as well as the flow of communication in the delivery of employment information provided or required by various parties, including government and private. Before the existence of information technology, job vacancy still use conventional method that is by installing announcement on office walls and print media. Along with the development of information technology, job apangan provided at this time, informed very quickly and have many advantages such as job seekers only open information about job vacancy through websites that have been available. But in the delivery of job vacancy has a constraint that there are parties who have bad intentions by spreading vacancies that are not actually there. So it hurts job seekers, whether material or time. Currently, job seekers do not need to come directly to companies that need jobs but can directly send the application via E-mail. To reduce the act of fraud committed by irresponsible person then needed a system that help job seekers get good information and correct. Therefore, the alternative of the solution is to use a web-based information technology system so that job seekers can directly see and communicate with companies that open job vacancies. In the design of a software system contains job vacancy information and job seeker data processing. The designed software is still a prototype, using Data Flow Diagrams (DFD) and Entity Relationship Diagram (ERD).


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Jih-Yu Mao ◽  
Xinyan Mu ◽  
Xin Liu

PurposeSocially responsible organizations strive to foster gender diversity values in the workplace. As women, relative to men, tend to fall victim to gender discrimination more frequently, organizations can promote gender diversity in the workplace by either increasing female employment or discouraging job seekers who resist gender diversity from applying for positions. While more attention has been devoted to the former approach, less attention has been given to the latter.Design/methodology/approachA between-subjects experiment is conducted to test the hypotheses. Participants are randomly assigned to one of five conditions that feature different numbers of women in job advertisements.FindingsFor male job seekers who hold a male breadwinner ideology, their job pursuit intentions decrease as the number of women in job advertisements increases. Perceived person-organization fit acts as the mediating influence.Practical implicationsJob advertisements are purposed to attract job seekers who share similar values. Men who embrace male-dominant values are likely to resist and thwart the progress of gender diversity in the workplace. This study informs practitioners of how by strategically adapting job advertisements, organizations can discourage individuals who are likely to be a poor fit from applying for vacant jobs.Originality/valueThis study focuses on gender discrimination and resistance in a job seeking context from a social dominance perspective. The study informs organizations of the potential benefits of strategically adapting job advertisements.


Author(s):  
Katariina Jalonen ◽  
Mika Kirveennummi ◽  
Vesa Torvinen

Information technology (IT) has radically improved many aspects of organisational activities. Computer-based information systems (CBIS) are constantly developed more effective and efficient. Development of a new CBIS is justified by higher quality of work, more efficient work processes, and more flexible work practices. However, introduction of the new IS can produce a variety of problems. This paper describes the problems observed in the use of a library CBIS in a Finnish scientific library. The results of the study illustrate well the environment which should be understood by the designers of computer-based information systems. One important prerequisite of good (re)design is a wide understanding of the problems that may prevent effective use of a CBIS. In this study we introduce a classification based on the problems which were found in the case. The classification describes the causes and effects of the observed problems.


Author(s):  
A. D. Smith

Even before September 11, 2001, security and privacy was a concern to nearly 80% of the current and potential Internet users around the globe, according to survey released by the Information Technology Association of America (ITAA) (Poulsen, 2000). The survey, commissioned by the American Express Company, randomly polled 11,410 people in 10 countries, and found that nearly half of the respondents enjoyed some form of Internet access. As might be expected, most of the world’s Internet users utilize Internet for e-mail, browsing, and entertainment. However, fewer than 28% do some shopping online, and 24% use the Internet for banking and financial transactions. But when Internet users and non-users of many countries were asked if they agree with the statement, “I am or would be concerned about security and privacy issues when purchasing or making financial transactions online,” 79% agreed. Prior to the tragedy of September 11, 2001, U.S. citizens also expressed legitimate concerns toward the issues of privacy and security, with an 85% showing. The poll released by the Information Technology Association of America also illustrated that approximately 80% have doubts about the U.S. government’s ability to maintain computer security and privacy. Hence, protecting operating systems is a major strategic concern if the success of e-government as a whole is to reach its potential. Although most of these issues are typically not discussed in relationship with e-government, the need for trusted computing systems within e-business and computing systems can be made as an effective argument that all these issues affect e-government systems as well. Secure computing systems issues in terms of e-government are just as important.  The scope of this article is to present a description of one the most generally known security certifications; namely, the trusted computer system evaluation (TCSEC) and its commercial implementation procedure in the commercial product evaluation process and discuss the influence of this evaluation/certification on the incidence of hacker attacks on e-business. As evident by the abundance of marketing literature of different operating systems for e-business that frequently refers to its security strength ranked against popular security certifications, it is very common to rank commercially available operating systems against TCSEC evaluation and/or certification criteria. This article will also explore where the many operating systems stands on this particular evaluation. In essence, given the vulnerabilities exposed after September 11, 2001, strategic security managers should be deeply concerned that the e-business platform they are responsible for contains the highest security standards to prevent any type of potentially harmful hacker attacks. Managers need to have a working knowledge of TCSEC security evaluation/certifications to become better informed when choosing the e-security platform for e-government/e-business. Essentially, the selection of a particular operating system for e-government/e-business have as much to do with factors ranging from existing skills, existing infrastructure, and economic reasons all the way up to political and strategic reasons. In dealing strategically with modern e-business environments, one of the most important factors that management must consider when choosing an operating system for their e-business platform is the security strength to resist computer hacker attacks on the operating system. If, for example, during different hacker attacks, one of the major aspects of these attacks is a certain operating system, as opposed to other systems, then this is a clear message to management to build in proper safeguards in the proposed operating system (Smith & Rupp, 2002a, 2002b). Certainly some of the reasons for frequent hacker attacks may probabilistic in terms and not random events, since Linux and Windows operating systems are more frequently used for e-commerce than other systems. So, it is not surprising that there are practically few reports of successful hacker attacks against operating systems that run e-business platforms (Smith, 2005; Smith & Lias, 2005; Smith & Offodile, 2002). 


2018 ◽  
Vol 215 ◽  
pp. 02010
Author(s):  
Wawan Dhewanto ◽  
Yuliani Dwi Lestari ◽  
Sri Heliana ◽  
Qonita Himmatul Aliya ◽  
Nur Lawiyah

The expansion of information technology and electronic commerce in Indonesia has provides the opportunities for entrepreneurs to develop their business. It can be seen from the rapid growth of SMEs and creative business in Indonesia increased from year to year. Most SMEs have adopted information technology and electronic commerce (e-commerce) for their business. E-commerce was really famous in today business to be discussed. In general e-commerce is radically changing traditional ways of doing business. The government says ecommerce has huge potential to build the economy of the nation because the large number of internet users increase continuously and become the first factors of adopting technology of ecommerce by the organization. Various research has been analyzed widely the adoption of ecommerce by SMEs. The purpose of this research is to examine determinant factors of adoption of technology ecommerce in SMEs and the impact on their organizational business as a result of level of success. Firstly, empirically investigate the determinants factors in internal and external by conducting interview. Secondly, provide new direction addressing why the business adopt ecommerce and what are concerning factors in adopting ecommerce with a successful. Analysis was done by comparing and analyzing six SMEs in South Bandung in a cluster that have same of types of products and adopt technology ecommerce but have a different in many ways. As the result of this study, limited human resource capacity and skills is the main constrains faced by SMEs when adopting technology ecommerce.


Sign in / Sign up

Export Citation Format

Share Document