Search results
1 – 3 of 3Organizational psychologists and human resource management (HRM) practitioners often have to select the “right fit” candidate by manually scouting data from various sources…
Abstract
Purpose
Organizational psychologists and human resource management (HRM) practitioners often have to select the “right fit” candidate by manually scouting data from various sources including job portals and social media. Given the constant pressure to lower the recruitment costs and the time taken to extend an offer to the right talent, the HR function has to inevitably adopt data analytics and machine learning for employee selection. This paper aims to propose the “Quality of Hire” concept for employee selection using the person-environment (P-E) fit theory and machine learning.
Design/methodology/approach
The authors demonstrate the aforementioned concept using a clustering algorithm, namely, partition around mediod (PAM). Based on a curated data set published by the IBM, the authors examine the dimensions of different P-E fits and determine how these dimensions can lead to selection of the “right fit” candidate by evaluating the outcome of PAM.
Findings
The authors propose a multi-level fit model rooted in the P-E theory, which can improve the quality of hire for an organization.
Research limitations/implications
Theoretically, the authors contribute in the domain of quality of hire using a multi-level fit approach based on the P-E theory. Methodologically, the authors contribute in expanding the HR analytics landscape by implementing PAM algorithm in employee selection.
Originality/value
The proposed work is expected to present a useful case on the application of machine learning for practitioners in organizational psychology, HRM and data science.
Details
Keywords
This paper aims to review the latest management developments across the globe and pinpoint practical implications from cutting-edge research and case studies.
Abstract
Purpose
This paper aims to review the latest management developments across the globe and pinpoint practical implications from cutting-edge research and case studies.
Design/methodology/approach
This briefing is prepared by an independent writer who adds their own impartial comments and places the articles in context.
Findings
Organizations perform better when the right candidates are hired. Through person-environment fit (P-E fit), firms can enhance recruitment and selection by ensuring appropriate fit at different levels of the construct.
Originality/value
The briefing saves busy executives and researchers hours of reading time by selecting only the very best, most pertinent information and presenting it in a condensed and easy-to-digest format.
Details
Keywords
Xiaoyu Li, Osamu Yoshie and Daoping Huang
The purpose of this paper is to detect the existence of unknown wireless devices which could result negative means to the privacy. The perceptual layer of internet of things…
Abstract
Purpose
The purpose of this paper is to detect the existence of unknown wireless devices which could result negative means to the privacy. The perceptual layer of internet of things (IoTs) suffers the most significant privacy disclosing because of limited hardware resources, huge quantity and wide varieties of sensing equipment. Determining whether there are unknown wireless devices in the communicating environment is an effective method to implement the privacy protection for the perceptual layer of IoTs.
Design/methodology/approach
The authors use horizontal hierarchy slicing (HHS) algorithm to extract the morphology feature of signals. Meanwhile, partitioning around medoids algorithm is used to cluster the HHS curves and agglomerative hierarchical clustering algorithm is utilized to distinguish final results. Link quality indicator (LQI) data are chosen as the network parameters in this research.
Findings
Nowadays data encryption and anonymization are the most common methods to protect private information for the perceptual layer of IoTs. However, these efforts are ineffective to avoid privacy disclosure if the communication environment exists unknown wireless nodes which could be malicious devices. How to detect these unknown wireless devices in the communication environment is a valuable topic in the further research.
Originality/value
The authors derive an innovative and passive unknown wireless devices detection method based on the mathematical morphology and machine learning algorithms to detect the existence of unknown wireless devices which could result negative means to the privacy. The simulation results show their effectiveness in privacy protection.
Details