Role Competency Matrix: A Step-By-Step Guide to an Objective Competency Management System
✍ Scribed by Mahesh Kuruba
- Publisher
- Springer Singapore
- Year
- 2019
- Tongue
- English
- Leaves
- 177
- Edition
- 1st ed.
- Category
- Library
No coin nor oath required. For personal study only.
✦ Synopsis
This book discusses the Role Competency Matrix (RCM), a competency management system framework that helps organizations to quantify and manage workforce competencies and align them to business needs. An objective and transparent system for both employees and managers alike, the RCM helps managers make quantitative decisions to develop strategies for staffing needs, competency development, career progression and succession planning in the workforce. It also helps employees to identify the roles suited to their aspirations and capabilities and to take responsibility for their development.
“The right people for the right roles” is key to effective workforce management, and workforce competencies must be optimally deployed to improve productivity, enhance job satisfaction and reduce attrition. At the same time, information technology (IT) businesses are under constant pressure to respond quickly to the ever-changing technology and business trends. Although, some organizations take a myopic “hire and fire” approach, in order to succeed, an organization must continually upgrade its workforce’s competencies in line with new demands.
✦ Table of Contents
Front Matter ....Pages i-xix
Introduction (Mahesh Kuruba)....Pages 1-7
People Management Challenges (Mahesh Kuruba)....Pages 9-16
Competency Management (Mahesh Kuruba)....Pages 17-26
Measuring Competency (Mahesh Kuruba)....Pages 27-48
The Role Competency Matrix (Mahesh Kuruba)....Pages 49-75
Role Competency Matrix—Applications (Mahesh Kuruba)....Pages 77-101
Implementing RCM (Mahesh Kuruba)....Pages 103-131
Change Management (Mahesh Kuruba)....Pages 133-139
RCM Analytics (Mahesh Kuruba)....Pages 141-165
Back Matter ....Pages 167-168
✦ Subjects
Computer Science; Computer Appl. in Administrative Data Processing; Management of Computing and Information Systems; Human Resource Management
📜 SIMILAR VOLUMES
Rely on this practical, end-to-end guide on cyber safety and online security written expressly for a non-technical audience. You will have just what you need to protect yourself―step by step, without judgment, and with as little jargon as possible. Just how secure is your computer right now? You pro
<div><p>Rely on this practical, end-to-end guide on cyber safety and online security written expressly for a non-technical audience. You will have just what you need to protect yourself―step by step, without judgment, and with as little jargon as possible. Just how secure is your computer right now?
Rely on this practical, end-to-end guide on cyber safety and online security written expressly for a non-technical audience. You will have just what you need to protect yourself--step by step, without judgment, and with as little jargon as possible. Just how secure is your computer right now? You pr
Насколько защищен ваш компьютер прямо сейчас? Я думаю, что вы, наверное, на самом деле не знаете. Компьютеры и Интернет совершили революцию в современном мире, но если вы похожи на большинство людей, то вы понятия не имеете, как это работает и какие несет реальные угрозы.<br>Just how secure is your
Step-by-step instructions for creating four different eagle designs from a tree trunk or log are detailed in this chainsaw carving guide. The four projects include an eagle head plaque, a standing eagle with a fish, a soaring eagle, and an eagle bench. Each project features a detailed sketch, instru