You are on page 1of 43

Recruitment and

Selection
Management
GLENN PAUL E. BRIONES,
MBA
glennpaul.briones@unp.edu.ph
09773040146
Raois, Vigan City, Ilocos Sur
Course Description:
In a highly competitive and diverse business world. The
organization needs competent workforce to outshine the changing
world in order to achieve the organization’s ultimate goal.
Moreover, the success of an organization depends on the skills,
attitude and values of the employees. With this subject, the
students will have a deeper understanding and wider range of
knowledge on the role of Recruitment and Selection and the
impact of competitive hiring in choosing the best person among
the pool of applicants.
Course Learning Outcomes:
At the end of the subject the student will learn the following:
• The student will recognize the importance of efficient and effective
staffing in the organization;
• The student will arrange the procedure in the conduct of job analysis that
would lead in the creation of job description and job specification;
• The student will explore and compare the different online platforms in
recruitment;
• Analyze, integrate and assess the staffing support activities, e.g. legal
compliance, planning, and job analysis. (analysis, synthesis and
evaluation);
• Device a comprehensive and systematic recruitment and selection
procedure and determine the most efficient source of recruitment; and
• Adapt the challenges of the 4th Industrial Revolutions and its effect on the
parlance of recruitment and selection
Course Requirements
This subject requires the learner to accomplish the
following:
-Staffing Pattern
-Job Analysis
-Job Description and Specification
-Recruitment Procedure
-Case study/digest
-Mock Job Interview
Grading System
Midterm/Finals 30%
Other Outputs 70%
 Quizzes (short/long) 25%
 Activities 20%
 Project 25%
 FG= MT Grade 50% + TFG 50%
2
Assignment
Policies
Computer Skills: As a student enrolled in online or
blended courses, you will need to have basic
computer skills. You are expected to be able to open
files in standard formats (e.g., MS Office documents,
PDFs, and images), create, save, organize, and
maintain digital files, interact with the learning
management system (LMS), communicate
electronically, and knowledge of web browsing and
searching.
Communication and Participation: In your online and blended
courses, you are expected to be an active participant in the
course. Even though you may not see your classmates and
professor, online and blended courses are designed to include
discussion and other forms of collaboration and communication.
You should be willing and ready to regularly communicate with
classmates and professor online. You will participate in weekly
activities in your courses. You will need to log into your course
and check your official email account or any media available
daily.
Do not hesitate to ask questions. You are strongly encouraged
to contact your professor if you have course related questions
regarding course concepts, assignments, and feedback
provided to you. It is recommended that you contact your
professor using the LMS well in advance of the due date. Also,
your professors have set aside specific times to be available for
phone conferences or chat sessions if you need additional
course-related support. When you email questions one of your
professors refer to the course syllabus to view their policy on
response time. Please note they may not be able to respond to
every email immediately.
Time Management: Managing your time is essential
in online and blended courses. Successful students
are very organized in the studies and take ownership
of their own learning. A best approach is to set aside
specific time each day to focus on your coursework
and studies. Ideally, set that time to be the same
time each day.
Study Environment: Setting a consistent, familiar
study environment is just as essential as managing
your time. If possible, find a well-lit setting that is
free of distraction. Schedule your course studies
around those times you have access to your
distraction-free environment. You may find that
you'll make better use of your time.
Student Course Materials: You are responsible for
maintaining course files, which includes any files (papers,
projects, assessments, presentations, etc.) that you
create. In addition to keeping a digital copy of your file on
your own personal computer, tablet, or external storage
device, you should also make use of a cloud-based storage
solution (e.g., OneDrive). If you lose or cannot locate a
file, contact your course professor to see if s/he is able to
provide the file to you. Once a course is completed, your
professor can provide you with lost course-related digital
Technical Support: If you encounter technical
support issues (e.g., LMS is unavailable, username
and password are not working), you should
immediately contact your professor for advice. In
your communication, be sure to describe the nature
of your problem with as much detail as possible so
he can provide the best possible assistance. You are
encouraged to first do your own troubleshooting if
possible.
General
Class
Policies
Online attendance/late
Success in this course is dependent on your active
participation and engagement throughout the course. As
such, students are required to complete all assignments
by the due date, and to actively participate in class
discussions. Additionally, students are expected to: Log on
at least three times a week – on different days in order to
completely weekly assignments, assessments, discussions
and/or other weekly deliverables as directed by the
instructor and outlined in the syllabus; Participate in the
weekly threaded discussions. 
This means that, in addition to posting a response to the
thread topic presented, students are expected to respond
to each other and comment and questions from the professor
and/or other students; If you find that you cannot meet the
class' minimum discussion requirements due to such
a circumstance, please contact your professor as soon as
possible.  Students will not be marked present for the course in
a particular week if they have not posted on the discussion
forum and/or submit assignment/essay or complete
assessment if administered in that week. 
Be Scholarly
 Do: Use proper language, grammar and spelling. Be
explanatory and justify your opinions. Credit the
ideas of others through citing and linking to
scholarly resources.
 Avoid: Misinforming others when you may not
know the answer. If you are guessing
about something, clearly state that you
do not know the answer.
Be Respectful
 Do: Respect privacy, diversity and opinions of
others. Communicate tactfully and base
disagreements on scholarly ideas or research
evidence.
 Avoid: Sharing another person's professional or
personal information.
Be Professional
 Do: Represent yourself well at all times. Be
truthful, accurate and run a final spell check.
Limit the use of slang and emoticons.
 Avoid: Using profanity or participating in
hostile interactions.
Be Polite
 Do: Address others by name or appropriate title
and be mindful of your tone. Treat people as if you
were in a face-to-face situation.
• Avoid: Using sarcasm, being rude or writing in all
capital letters. Written words can be easily
misinterpreted as they lack non-verbal.
Fostering A Safe
Online
Community
Cyber Security Is Key. A secure site is the first step you can
take to protect your community from outside influence
such as hacking or phishing scams. One of the most
effective methods is to implement a password strength
indicator and basic guidelines for password length and
characters that can be used. Allowing your users to see
just how weak or strong their password can help them
better protect their credentials from hackers. For security
purposes in the use of online class given an application,
the professor will provide a code for each as a system of
Login Problems. Every online community will eventually
run into user login problems. While most login issues are
simple, without long-lasting effects; persisting login
problems create annoyed users. The result is an increase
in users resetting their passwords, emailing or calling
support, and preoccupying your support teams with
these user complaints. Login problems are commonly
caused by having a low server load capacity.
Cont……
Where too many login attempts at once overloads your servers.
It’s important to properly monitor the strain on your server so
you can fix it before you become overwhelmed. Another easy
step to take is to have purposefully unclear error messages as to
which login credentials are bad. By stating that either the
username or password is incorrect; then requiring the user
provide an email address to reset their password, without
acknowledging whether or not there is an account associated
with that email, it limits a hacker's ability to steal the account. As
a general policy, make sure that every information needed to
login should be properly accounted for.
Inactive User Accounts. An inactive user account
remaining that way for a long time, is similar to a car
being parked somewhere for too long – the bad guys will
eventually notice, and when they do they’ll take it. When
hackers become aware of an inactive account, they know
that they can take their time hacking it. In fact, they may
not hack the account through your community site; but
instead will work to hack the user's email and reset the
password. Hacking an inactive account is dangerous for
everyone as no one will know that the account has been
taking over until it’s too late
Cont….
The original owner of the account probably doesn’t know
that their account’s been hacked. In fact, as long as no one
complains, the hacker can remain in control indefinitely. An
easy way to prevent this is to implement a system that
deletes inactive accounts after a certain period of time. By
alerting users that their inactive account will be deleted, it
will give them an advanced notice that they may not be able
to get back into their account, giving them the option to
voluntarily delete, become active again, or simply ignore it
and allow the site to delete it automatically.
Prevent Link Exchanges. Fake links are incredibly easy to
make, and even easier to convince the unsuspecting user
to click on them. When hackers, spammers, and phishers
send a fake link through a message, it can launch any
number of virus or spyware tools that can infect their
account, and even worse, their machine. While links are a
common thing to post in the public areas and are easily
monitored, it should be a best practice to prevent users
from sending clickable hyperlinks in private messages.
Cont….
When sent links appear as plain text, it can be far easier to
prevent users from following through them. This may not
prevent 100% of bad link attacks, but it severely decreases
their presence. There are tools you can implement that
scan links before a post becomes public or a private
message is sent. Potential spam can be flagged before it
appears to your users or even flagged to the user so that
they proceed with caution. In the course of the program,
the student is not allowed to send irrelevant and not
allowed links.
Online Academic integrity
UNP CBAA Online students will demonstrate academic
integrity in all courses. Students will complete coursework
and participate in courses with honesty by the following:
Never share login information, always submit original
coursework (do not plagiarize), Do not receive
unauthorized assistance with coursework, Do give credit
to others in coursework when appropriate to do so. One
way a student violates the Academic Integrity Policy is by
committing an act of plagiarism.  
Cont….
Plagiarism includes, but is not limited to copying,
writing, or presenting another person’s or entity’s
information, ideas, graphics or phrasing without
properly acknowledging the true source via appropriate
citation format. Students are required to use proper
citations in the use of any outside resources.  Please
note that summarized and paraphrased ideas also need
to be cited, not just direct quotations.  
 Data privacy
Republic Act No. 10173, otherwise known as the
Data Privacy Act is a law that seeks to protect all
forms of information, be it private, personal, or
sensitive. It is meant to cover both natural and
juridical persons involved in the processing of
personal information. As such, everyone is required
to strictly follow the law.
Student
Responsibilities
In order to succeed in an online class, students
need to have the required level of computer skills,
motivation and a commitment to learn and work
on their own. Online classes are good for self-
starters: those students who can take the initiative
to complete coursework without the direct
supervision of a professor.
Online learning is not for everyone. Individuals who
prefer face-to-face communication or traditional
group work should weigh these factors in
determining if an online class is appropriate.
Academic standards for online courses are the same
as those for all other courses offered.
For hybrid online courses, students will
have in-class sessions approximately once
a week. Students are expected to
accomplish at least 50% of the class work
online.
For asynchronous online courses, all classes are online, but
there is the possibility that some activities and exams will be
taken in a classroom. Students will receive written directions
from their professor. The interaction between the professor
and the students (and among students) is based on writing
and reading of postings and continuous participation in an
online discussion. Students are expected to write and read a
lot in addition to the textbook, lectures and other required
readings. It is expected that all students will be able to
express and communicate effectively in writing.
Students considering an online
course should e-mail the
professor before registering and
explain their decision to register
for the course.

You might also like