How to Select the Right Employees Hiring and keeping competent employees is critical to business success. However, you must develop a strategy to discover them. With the right employees you can accomplish many organizational goals. Fortunately, when a conflict arises in an organization, a good business team will know how to handle the situation. Whether a person is a manager, subordinate, or president, it is very important that you avoid a bad hire. The recruitment process must be handled carefully and taken very seriously. Objectivity, responsibility, qualifications, and a good offer make it possible to recruit potential employees. Recruitment in the public sector must be fair, open, and representative. Usually, the recruitment process involves a few steps. It includes advertisement, testing and screening, preparation, and decision- making. (Denhardt, Robert, Public Administration, Harcourt Brace and Co., Orlando, FL., 1999, pg. 213) The most scrutinized process of recruitment has been testing and screening. This process can happen through interviews, references, recommendations, and proper review of the applications. You can also use higher measures such as performance, assessments, job-related knowledge, and various tests. Without accurate screening, you are likely to hire someone that will not be productive to your organization. This is a fair process to attract prospective employees. Next, you must make sure that individuals have the appropriate qualifications that meet the job description. Then, after intense review you should be able to identify the best-qualified applicant. The standard recruitment process in the federal system has been described as "slow, unimaginative, and, unassertive. (Cohen, Steven and Eim... ...ring incompetent people. Bibliography Cohen, Steven and Eimicke, William. The New Effective Public Manager, Jossey-Bass Inc. San Francisco, CA, 1988 Denhardt, Robert. Public Administration, Harcourt & Brace Co., Orlando, FL, 1999. Falcone, Paul. 96 Great Interview Questions to ask Before you Hire, American Management Association, NY, New York, 1997 Greenberg, Jerald. Managing Behavioral in Organizations, Prentice-Hall, Inc., 1999 Miner, Mary and Miner, John. Employee Selection Within The Law, The Bureau of National Affairs Inc., Washington, DC, 1978. Northcraft, Gregory and Neale, Margaret. Organizational Behavior, The Dryden Press, 1990 Stahl, O. Public Personnel Administration, Harper and Row, NY, New York, 1971 Whetten, David and Cameron, Kim, Developing Management Skills, Addison-Wesley Educational Publishers Inc., 1998
Examine the Movements of their Employees at Work - Essay Example
It is this monitoring that has raised ethical issues causing detrimental effects to both employer and employee. Whereas employers justify their actions with the right to get value from their employees and resources, employeesâ€™ have objected with the reasoning that their personal privacy is being unlawfully breached. Background Employee monitoring can be defined as the act of surveillance and monitoring employeesâ€™ actions during stipulated working hours by use of employer equipment (Stanton & Stam, 2006). It entails the use of computers to record, evaluate and observe an employeesâ€™ use of computer, plus communications like web sites visited and emails sent or received besides telephone calls made. However, it is legal for employers to use computer programs to monitor employees (Duquenoy, Jones & Blundell, 2008). Employee surveillance has gained prominence as a prerequisite and in the same breath a contentious issue due to the complexity and prevalent use of technology at the work place. Employers are worried with employeesâ€™ proper behavior and conformity to work related regulations. Hence some critics believe employee monitoring is an inalienable responsibility. To others it is an invasion to privacy. Managers employ different ways of monitoring employeesâ€™ internet use, emails and their location to capitalize on employee productivity, uphold the integrity of the firm and to defend the interest of clientele and work mates (Duquenoy, Jones & Blundell, 2008). When managers start to probe into employeesâ€™ private life, mistrust and acrimony are built between employeesâ€™ and managers. Many workers have lost their employment and a lot more companies have had to face lawsuits filed against them because people believe that the use of internal company communications should remain confidential (Bassick, 2007). Managers and owners of private firms have had several reasons to scrutinize the activities of their employees. Some are driven by the displeasure when employees misuse company money and waste time to carry out non-work related tasks. Others would want to confirm any suspicion of criminal, fraudulent or unwanted conduct by their employees; observe application of safety and health regulations; make certain to compliance of internal employment policies; verify the quality of work done; protect staff from harassment or unjust treatment in the office and so forth (Lane, 2003). Managers base their actions on the basis that they have a right to examine employee productivity and to guard against fraud and theft. This will ultimately lead to employee monitoring (Lane, 2003). Some of the areas prone to abuse in the work places include use of company resources like vehicles, technology adapted at workplace like electronic communication, and adherence to acceptable working hours. In this report, I will review employee monitoring on their use of electronic communication at the workplace, more so the ethical dilemma facing managers and employees. Hence the questions of how far should managers go to examine employee movements? With the arrival of advanced technological capabilities, many professional and personal tasks are becoming quicker and more convenient to carry out. For instance, email has been viewed as a convenient substitute to making telephone calls because it is perceived as private. In the real sense it is public because it leaves a record long after it has been deleted (Bassick, 2007). Thus a skilled person can easily retrieve it from a networked communication system.
Write something about yourself. No need to be fancy, just an overview.