Skip to main content

IT - a means to maintain justice.

Fabrication of resume is not an uncommon act. Many are guilty of that. Especially in an environment where, there is no means to cross reference the resumes, have left many people who are guilty of such a crime in high positions of the government and other commercial sectors.

How often do we cross reference the letters or certificates? How often do we check the given serial numbers or at least the actual certificates when the copies have been submitted? Many times there is even no way to check a tracking number to see whether the person is telling the truth. This is where the importance of databases comes in to action.

Central databases play an important role in reducing such frauds by giving the opportunity for everyone to at least check the serial numbers to trace back to the original. Many times what happen is that people who are 'smart' and wicked enough to commit such crimes play nicely. They won't fake an entire certificate or document, they just change the part they want so even if accidentally some one happens to check, they escape.


Unfortunately even the countries who have all the facilities to cross reference these documents also have found such fraud cases, many have been caught but still few have escaped. The results of a recent survey conducted by CareerBuilder.com indicate that folks in the IT industry rank third among those who lie most in their resumes. Here’s a look at the other stats, and some of the more outrageous lies hiring managers have unearthed.

Toni Bowers writes...

Apparently, the temptation to make their resumes stand out from the crowd is too much for some people to resist. For an article about resume fabrications, Rosemary Haefner, CareerBuilder.com senior career adviser, surveyed hiring managers and workers and found that:

  • 38 percent of those surveyed indicated they had embellished their job responsibilities.
  • 18 percent admitted to lying about their skill set.
  • 12 percent indicated they had been dishonest about their start and end dates of employment.
  • 10 percent confessed to lying about an academic degree.
  • 7 percent said they had lied about the companies they had worked for.
  • 5 percent disclosed that they had been untruthful about their job title.

What I found most interesting about this survey is that the results indicated that some industries seem more likely than others to have incidences of resume fabrication. The hospitality industry reported the most, with 60 percent of employers reporting lies on resumes. The transportation/utilities field was a close second with 59 percent. And rounding out the top three, with 57 percent of hiring managers saying they uncovered lies on resumes was IT.

The article also listed some of the most outrageous untruths found on resumes as reported by hiring managers. My favorites are:

  • Candidate claimed to be a member of the Kennedy family.
  • Applicant invented a school that did not exist.
  • Candidate listed military experience dating back to before he was born.
  • Job seeker included samples of work, which were actually those of the interviewer.
(Toni Bowers, 2008: Techrepublic.com)
---------------------------------------------------------------------------------------------
Its so obvious that there are people who will do anything to get what they want, hence, it is for us to do what ever it takes to keep the integrity of job interviews and reduce such fraud cases. IT may be seen as a way to get hacked or as a path to be a victim of such cases, but this is not always true. Because many times, this IT is the only savior we need.

Comments

Popular posts from this blog

Dhivehi to English translation with Microsoft translator

  The Dhivehi language translation feature included in Microsoft translator and Microsoft 365 lets you press a button and translate written Dhivehi into English. Though there are a few hiccups here and there, the service is great and provides an understanding of the overall document. This is more than what we see from any existing models. I was amazed to see a link in one of my outlook web emails, it says “translate message to: English” which could mean nothing usually, however, when I saw the next sentence which said “Never translate from: Divehi”, I thought why would it says Divehi specifically if it doesn’t understand that the entire email was written in Dhivehi? Out of curiosity, I pressed the button, and to my surprise, it was quite good. The essence of the message was retained very well. For example, something like އިޙްތިރާމް ޤަބޫލުކުރެއްވުން އެދެން could be translated as “ I would like to respect you ”, which is ok in terms of translation, but what it meant was greeti...

Why when shared, Windows XP cannot communicate with winodws Vista in the Same Local network?

Network Map in Microsoft® Windows Vista™ diagrams the connections between network devices to help you troubleshoot connectivity problems. Network Map uses a discovery protocol called Link-Layer Topology Discovery (LLTD) in order to query the other devices on the network to determine how the network is organized. Computers running Windows Vista include the software components that implement the LLTD protocol. For other devices on the network to be placed on the map, they must have a discovery protocol enabled that can respond to the mapping computer's requests. This means in order to communicate windows Xp with Windows Vista we need to install a Portocol known as LLTD from microsoft website, unfortunately only licensed versions of widnows XP can download and install this protocol from microsoft website? "Too bad, Our poor, pirated copy users have to face the dificulties.... " but why most of the asians always use pirated copies of any software they USE? But if u crack wind...

Why Understanding Your Risks is Your Best Cyber Defence

  In today's digital age, headlines blare about "unprecedented data breaches" and "nation-state cyberattacks." It's easy to feel overwhelmed by the ever-evolving cyber threat landscape, where sophisticated zero-day exploits can bypass even the most fortified defences. But amidst this complexity, a fundamental truth remains: effective cybersecurity starts with understanding your risks. As Bruce Schneier stated, "Security is not a product, but a process." Just as a military commander wouldn't enter battle without understanding the terrain and potential threats, organizations must grasp the digital landscape in which they operate. Imagine a battlefield shrouded in thick fog. You wouldn't blindly charge ahead, would you? Risk assessment is akin to possessing a high-powered thermal sight, piercing the fog to reveal the hidden dangers lurking in the digital landscape. It's a systematic process of identifying your organization's critical a...