Sunteți pe pagina 1din 4

RESUME:

INFORMATION TECNOLOGY IN HUMAN RESOURCE

INTANIA AISHA MELATI


MUHAMMAD ADIB IMANULLAH BIN MD SABRI

FACULTY OF ECONOMIC AND BUSSINESS

AIRLANGGA UNIVERSITY

2017
The Computer Evolution
The first computer, ENIAC, is made in 1960. It is a large and very costly mainframe.
Because of the physical size and costs of these systems, they were almost always highly
centralized and, more often than not, considered an extension of the accounting function. So
in 1970, minicomputers are made. The minicomputers were much smaller in size and cost,
and they were often programmed to perform specific functions for a particular business
activity. It’s the first computer with decentralized concept for it’s uses in distributed data
processing. It is then further developed in 1976, when Apple first launching their personal
computers. Microcomputer or personal computer is a very small computer, ranging in size
from a “computer on a chip” to a typewriter-size unit. However, nowadays, modern
computers are much more user-friendly than those of the past. It uses easy interfaces that
make managers are able to easily use it without having to deeply understand the computer
programming.

Internet
The Internet is a global collection of independently operating, but interconnected, computers.
The type of information available and most useful for human resource managers on the
Internet can be placed into two broad functional categories: (1) conversational resources or
(2) reference resources. Conversational resources allow users to have conversations with
individuals anywhere in the world, for example mailing list and newsgroup. While reference
resources focusing on reference-oriented information, mostly using the World Wide Web
(www)

Intranet
An intranet is a private computer network that uses Internet products and technologies to
provide multimedia applications within organizations. Intranet uses for HR in basic
applications such as employee communication, company directory, company handbook,
including policies and guidelines, weather, news, and stock information. Intermediate use of
Intranet is for linkage to outside benefits providers, employee-assistance programs, web-
based e-mail, e-learning, online job postings, calendar, address book, and project scheduling,
online travel bookings, and document management. More advanced use, for example,benefits
enrollment, performance management, salary and wage reviews, succession planning linked
to skill/competency management programs, online recruitment and hiring, ability to submit
electronic forms, electronic paycheck information, including pay stubs and w-2s, and
business intelligence

Client/ Server Network


Client/server networks are systems that use personal computers (PCs) linked together to
process information in a very efficient manner. The real benefit of a client/server system is
that it allows a user to enter a request and receive only the specific data needed.

Human Resource Information System


An HRIS is a database system that contains all relevant human resource information and
provides facilities for maintaining and accessing these data. The potential applications of
HRIS are such as for clerical applications, applicant search expenditures, risk management,
training management, training experiences, financial planning, turnover analysis, succession
planning, flexible-benefits administration, compliance with government regulations,
attendance reporting and analysis, human resource planning, accident reporting and
prevention, and strategic planning.

Component of HRIS
There are three component of HRIS which are input function, data maintenance function, and
output function. Input function provides the capabilities needed to get human resource
information into the HRIS. The data maintenance function is responsible for the actual
updating of the data stored in the various storage devices. While output function is concerned
with the information and reports produced by the system

Procedures for Implementing HRIS


Step 1: Inception of idea.
Step 2: Feasibility study.
Step 3: Top management support
Step 4: Selecting a project team.
Step 5: Defining the requirements
Step 6: Software/hardware selection.
Step 7: Training
Step 8: Tailoring the system.
Step 9: Collecting the data.
Step 10: Testing the system.
Step 11: Starting up.
Step 12: Running in parallel.
Step 13: Maintenance.
Step 14: Evaluation.

Fostering Data Security


Some of the actions that human resources can take to foster data security include:
• educate all HR employees concerning data security
• conduct background checks on all new employees
• include a data security workshop as part of new-employee orientation
• periodically emphasize data security education
• develop a code of conduct for data security
• require nondisclosure agreements for all employees handling sensitive data
• encrypt all confidential HR files and limit access
• use a team-oriented approach to data security
• use available low-tech devices
• and work with security or compliance people to establish spot checks and audits.

Privacy and Legal Concerns


Privacy concerns include determining
 what types of employee information should be stored,
 who has access to computer hardware and data, and
 who can access and modify databases
Because organizations can be held accountable and liable, procedures and practices should be
adopted to ensure that the collection, maintenance, use, and dissemination of personal
information is necessary, lawful, current, and accurate

S-ar putea să vă placă și