Wednesday, February 26, 2020

Case Study for Human Resource Management Class Essay

Case Study for Human Resource Management Class - Essay Example Ron was also able to proceed with job analysis through the critical-incident technique. They were able to organize a meeting with the supervisors and they were able to come up with a conclusion. The only remaining aspect that they will need to look into is the type of validation strategy they needed to use. They had contradicting views on this matter. Ron believed that it criterion-related validity was appropriate while Bob chose content validity over the other. When Bob finished the evaluation of the agency's current staffing practices, the results tabulated in Exhibit 2.14 clearly depicts the presence of adverse impact. Using the 80 percent rule and by taking two sample groups which has the highest and lowest positions namely Blacks and Women, it shows that there is only 58.04% or less than four fifths of the selection come from the group with lowest rate. Even if there is no adverse impact evident on the selection process, it is still essential to evaluate other components for adverse impact. Aside from the standard 80 percent rule used to determine adverse selection, there are other issues that should be looked into the hiring process including the examination, interview and training of employees.

Monday, February 10, 2020

Management of information technology Essay Example | Topics and Well Written Essays - 2500 words - 1

Management of information technology - Essay Example That same ability raises the specter of nightmarish Orwellian scenarios in which consumer purchasing behavior is captured in databases that are manipulated by corporations and government as a tool for spying. RFID utilizes a tag containing a computer chip that stores data relating to the tagged item, such as color, size, brand, warranty information, etc. Tags can also be affixed to pallets and cartons to identify contents of shipments during the distribution process. An antenna in the tag transmits and receives data through radio waves, which are picked up by a reader (Carlson 2006). In one type of RFID system known as passive, a signal is sent out by the reader creating a magnetic field, which is broadcast by its antenna to create a sensitive detection zone. When a RFID tag enters this zone it picks up the reader’s signals, which turn on the microchip’s transmitter, thus informing the reader of its presence. Passive RFID is a short range system in which the reader must range from one inch to a few feet from the tag in order to engage a signal (Kasavana 2006). Another type of RFID technology is known as active. This is a longer range system because both the tag and reader have power supply units and are capable of sending and receiving signals. The transmission range may be up to one hundred feet due to this mutual transmission. The data on active RFID microchips can also be rewritten (Kasavana 2006). Active tags are far more expensive than passive tags (up to $40 as compared to 15 cents for passive tags) and are therefore less attractive and appropriate in a commercial retail environment (Carlson 2006). Nevertheless, given their long range scanning potential, active RFID has a broader range of potential applications. It also drives greater concerns regarding potential abuse. RFID is considered to be more effective at inventory tracking than traditional bar codes for several reasons. First, it is