employee information
Recently Published Documents


TOTAL DOCUMENTS

63
(FIVE YEARS 23)

H-INDEX

10
(FIVE YEARS 1)

2021 ◽  
Vol 3 (2) ◽  
pp. 316-325
Author(s):  
Agus Jayadi ◽  
Erwin Fakhruddin

The implementation of service provision and management of data and employee information has not been maximal. Employee information is only available if there is a request from internal and external parties. The research method used was a case study method for BKPSDM of West Sumbawa Regency, for the method of collecting data used were interviews, literature studies, and observations. The system development method was waterfall. After seeing the weaknesses of the running system, the application users are divided into four groups of users, they are SKPD operators, BKPSDM operators, employees and Super Admins. With the existence of e-Human Resources application, it is able to help and facilitate the tasks of General Administration and Employee Subdivision at SKPD in providing employee administration services to BKSDM or vice versa, including proposals for promotion, pension proposals, and proposals for moving work agencies (mutations) by online which is integrated so that the services are able to be effective and efficient.


Author(s):  
Safrinal Safrinal ◽  
Inyak Sukendi ◽  
Supriyanto Supriyanto ◽  
Afrizal Afrizal

The employee information system is one of the data processing activities at the Aceh Language Hall Office, to get information about employees to be more focused and easy to obtain. In this study, researchers only discussed employee problems and data management mechanisms at the Aceh Language Center Office and designed an employee data collection information system using PHP and MySQL. The research objective was to understand the problems of employees and data management at the Aceh Language Center Office and to create a supporting application about employee information systems using PHP and MySQL. The collection of data needed in writing this report was obtained by two methods, namely literature studies related to literature, library books, and other scientific works, field studies by conducting interviews, and direct observation of objects related to this research. The employee information system is carried out by one of the administrative staff and assisted by 2 (two) employee administration staff to record and input employee data. From the results of the study, it can be concluded that the employee information system at the Aceh Language Hall Office has followed the procedure and uses a computer with the PHP and MySQL language programs as the database.


2021 ◽  
Vol 1748 ◽  
pp. 032025
Author(s):  
Jicheng Wang ◽  
Donghai Li ◽  
Zhao Wang ◽  
Taifeng Wan

2021 ◽  
Author(s):  
Paolo Falco ◽  
Henrik Hansen ◽  
John Rand ◽  
Finn Tarp ◽  
Neda Trifković

We look into the relationship between business practices and enterprise productivity using panel data with matched employer and employee information from Myanmar. The data show that micro, small, and medium-size enterprises in Myanmar typically do only a few modern business practices. Even so, through estimates of value-added functions and labour demand relations we find a positive and economically important association between business practices and productivity. The results are confirmed when we utilize employer–employee information to estimate Mincer-type wage regressions. In combination, the value-added functions and the Mincer regressions show that at least half of the productivity gain from improved business practices stems from selection effects of employment of more productive workers. This sorting channel is important to keep in mind when supporting enterprises in Myanmar’s manufacturing sector through entrepreneurial training activities. While our results indicate that implementation of more structured business practices could be a key ingredient of a private sector development strategy in Myanmar, the full effect of such a strategy may take time to materialize. Moreover, entrepreneurial training should be accompanied by labour market initiatives aimed at improving productive matches of employers and employees.


2020 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Forough Nasirpouri Shadbad ◽  
David Biros

PurposeThis study focuses on unintended negative consequences of IT, called technostress. Given that employees are recognized as a major information security threat, it makes sense to investigate how technostress resulting from employees' constant interaction with IT influences the likelihood of security incidents. Although past research studied the concept of security-related technostress, the effect of IT use itself on employees’ extra-role activities such as security-related behaviors is unanswered. Thus, this paper aims to provide an understanding of the negative impact of technostress on employee information security policy (ISP) compliance.Design/methodology/approachDrawing on technostress literature, this research develops a research model that investigates the effect of technostress on employee intention to violate ISPs. It also extends the dimensionality of technostress construct by adding a new dimension called “techno-unreliability” that shows promising results. The authors use online survey data from a sample of 356 employees who have technology-based professions. We apply the structural equation modeling technique to evaluate the proposed research model.FindingsFindings showed that IT use imposes high-level perceptions of a set of technostress creators, which makes users rationalize their ISP violations and engage in non-compliant behaviors. Further analysis of each dimension of technostress showed that techno-complexity, techno-invasion and techno-insecurity account for higher ISP non-compliant behaviors.Originality/valueThis study provides a new understanding of technostress to the context of information security and emphasizes on its negative impact on employee ISP compliance behaviors.


2020 ◽  
Author(s):  
Irina Novikova

The Monograph presents a Holistic Concept of Employment Strategy in the Digital Economy. The Concept is based on the Methodology of Dr. Vladimir L. Kvint. The Concept includes new Economic Categories: Information Potential of Employment, Employee Information Competencies, Workplace Information Components. This Work is of Interest to a Wide Range of Experts, Researchers, Government Officials interested in Issues of Employment Strategy and Human Resources Management in the Digital Economy.


2020 ◽  
Vol 12 (8) ◽  
pp. 3163
Author(s):  
Amanda M. Y. Chu ◽  
Mike K. P. So

This article examines the occurrences of four types of unethical employee information security behavior—misbehavior in networks/applications, dangerous Web use, omissive security behavior, and poor access control—and their relationships with employees’ information security management efforts to maintain sustainable information systems in the workplace. In terms of theoretical contributions, this article identifies and develops reliable and valid instruments to measure different types of unethical employee information security behavior. In addition, it investigates factors affecting different types of such behavior and how such behavior can be used to predict employees’ willingness to report information security incidents. In terms of managerial contributions, the article suggests that information security awareness programs and perceived punishment have differential effects on the four types of unethical behavior and that certain types of unethical information security behavior exert negative effects on employees’ willingness to report information security incidents. The findings will help managers to derive better security rules and policies, which are important for business continuity.


2020 ◽  
Vol 12 (2) ◽  
pp. 1-14
Author(s):  
Eli Hustad ◽  
Frode Mathias Bekkevik ◽  
Ole Reidar Holm ◽  
Polyxeni Vassilakopoulou

Employee information security practices are pivotal to prevent, detect, and respond to security incidents. This article synthesizes insights from research on challenges related to employee information security practices and measures to address them. The challenges identified are associated to idiosyncratic aspects of communities and individuals within organizations (culture and personal characteristics) and to systemic aspects of organizations (procedural and structural arrangements). The measures aimed to enhance systemic capabilities and to adapt security mechanisms to the idiosyncratic characteristics and are categorized as: (a) measures of training and awareness; (b) measures of organizational support; and (c) measures of rewards and penalties. Further research is needed to explore the dynamics related to how challenges emerge, develop, and get addressed over time and also, to explore the interplay between systemic and idiosyncratic aspects. Additionally, research is needed on the role of security managers and how it can be reconfigured to suit flatter organizations.


Sign in / Sign up

Export Citation Format

Share Document