Skip to main content

雇主的困境

发信人: hanibal (青石子), 信区: JobHunting
标  题: 雇主的困境
发信站: Unknown Space - 未名空间 (Thu Jan 20 00:28:16 2005) WWW-POST

想起学西方经济学的时候, 有个"囚犯的困境": 囚犯在不知道同伙是否会招供的情况
下很难作出对自己最有利的选择.

雇主在雇人, 申请者在求职的时候, 同样也有这样的困境.

基本上, 雇主在面试过程中, 会有一个人选排名. 他希望招到他的第一选择, 可是刚开始
面试的时候, 他并不知道谁是最合适的. 所有面试都结束以后, 他知道谁是他最想要的,
但并不清楚第一选择, 甚至第二选择能否接受offer, 所以第三第四选择最后都有可能成
为同事.

但如果这个申请人知道了自己只是候补, 情绪就可能影响他的决定. 即使最后接受了这个
别人不要的offer, 以后在工作过程中也可能有些疙瘩, 毕竟谁都不愿意当候补. 所以,
雇主在整个招聘过程中, 不能让任何可能的人选感到自己是候补. 甚至已经给出offer了
以后, 他仍然必须对其他候补人员保持最大的热情, 因为他并不知道发出的offer是否会
被接受.......

这就是为什么很多人从雇主的态度上觉得offer已经是囊中之物, 最后却成空.

至于那些安排你面试的秘书或者HR, 你们每一个人都可能是未来的同事, 所以都会非常热
情, 有问必复. 但最后决定作出以后, 她们知道你已经失去了所有的价值与意义, 你们的
生命轨迹不可能再交汇, 就往往态度大变, 甚至对你的一再询问置之不理.

申请者有几个机会选择的时候, 也有相同的困境, 相同的行为. 但毕竟, 这是一个雇方市
场.

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...