A surge in computer crimes, driven by the shift to network computers and by the growing popularity of the internet, has formed a vast demand for information security experts who can help defend companies, computer systems. Many companies bring outside consultants, like our firm, to bring in the most experienced network security experts who are often known as hackers or “computer whizzes”. Hackers’ revolutionary style is steadily gaining acceptance in corporations and governments, however more conservative organizations feel safer contracting experts from established consulting firms.
Out temp agency is an employment agency, which assist these corporations and governments to fill temporary positions. For example, temps are often hired to work during seasonal increases in businesses to cover vacations, illnesses and in our case to help monitor and prevent computer crimes. Our firm has expanded the role in the employment sector to fill “temp to perm” positions where candidate’s positions start out on a temporary job, but could become permanent if the employer decides to hire the candidate.
A third party recruiter, such as myself, works on my own through our agency and acts as an independent client between our clients companies and the candidates we recruit, for a position. Our firm targets mostly technical schools where I would go and do presentations for prospective candidates who are interested in working with different government agencies assisting them with their computer systems. My knowledge that I have acquired while University of Phoenix by taking courses such as Organizational behavior and skills for professional development which taught me how to apply motivational theories to groups, demonstrate effective presentation skills, visual aids and strategies has given me the expertise needed to fulfill the requirement of this recruiting position. In addition my personal skills such as communication skills, people oriented skills, organizational skills and good decision making skills has provided the professionalism that I need in order to execute my delivery to these future candidates.
The Research paper on Computer Based Training Business Interchange
COMPUTER BASED TRAINING (CBT) BUSINESS INTERCHANGE Dallas Baptist University Spring 1999 MISM 6330, Section 01 Database Management Systems Instructor: Mary Braswell, MBA Mary L. Everitt 19 April 1999 Table of Contents Introduction Computer-based training (CBT) is an all-encompassing term used to describe any computer-delivered training including CD-ROM and the World Wide Web. CBT courseware ...
[color=darkred][/color:2bccf64a71][/color][size=18:2bccf64a71][/size:2bccf64a71]