10 Pages
2556 Words
Interoduction Of A Review of Employee Management and Major Challenges in the Telecommunication Industry
Aim:
This dissertation examines how employees are managed in the telecommunications sector and identify the biggest problems employees experience.
Feeling overwhelmed with your assignments? Take a breather and let New Assignment Help ease your burden! Our professional team provides unmatched assignment writing services in the UK, guaranteeing academic success. Explore our free assignment samples for inspiration and guidance.
Objectives:
- To assess how companies in the telecom sector manage their employees.
- To determine the biggest difficulties that workers in the telecom sector encounter.
- To investigate how employee management practices in the telecommunications sector affect workers' performance.
- To recommend ways to enhance employee management procedures in the telecom sector.
- To recommend ways to deal with the major difficulties that workers in the telecom sector encounter.
Methodology: This dissertation will use a systematic assessment of the body of knowledge on employee management strategies and difficulties that workers in the telecommunications sector confront (Haideret. al 2015). The review will include works from both qualitative and quantitative perspectives. Thematic analysis will be used to analyze the data, and tables and charts will show the results. A desk-based research strategy will be used to carry out the study.
Research questions:
- What does the telecommunications sector use the staff management procedures?
What are the biggest difficulties that workers in the telecommunications sector face?
- How do employee management practices in the telecommunications sector affect workers' performance?
- What techniques are suggested for enhancing personnel management procedures in the telecom sector?
- What steps can be taken to overcome the severe difficulties that workers in the telecom sector face?
Research Design: A systematic review is the suggested research design for this dissertation. A comprehensive and organized method of reviewing the body of knowledge on a given subject is known as a systematic review (Aziziet. al, 2021). It entails discovering and choosing pertinent studies, gathering their information, and synthesizing the results. In the social sciences, systematic reviews are a common research methodology, especially helpful when reviewing the literature.
Method and instrument used for data collection: This study will use a desk-based research strategy for data collection. The information will be gathered through reading current research on employee management techniques and difficulties experienced by employees in the telecommunications sector (Vrontiset. al, 2022). A data extraction form will be utilized as the data collecting tool to gather pertinent data from the chosen research. The data extraction form will include fields for the study design, sample size, data collection method, data analysis method, main findings, and limitations. Before usage, the data extraction form will be tested and improved.
Research site: This desk-based study will thoroughly evaluate the literature on staff management strategies and difficulties experienced by workers in the telecommunications sector (Brewster & Hegewisch, 2017). A global study will be done, and literature from other nations and locations will be incorporated.
This desk-based study will thoroughly evaluate the literature on staff management strategies and difficulties experienced by workers in the telecommunications sector (Markoulliet. al 2017). A global study will be done, and literature from other nations and locations will be incorporated.
Collecting data and sampling
The telecommunications market is very competitive and always changing due to technological improvements. The success of telecom businesses in this sector depends on effective workforce management. However, managing staff in this profession has its own unique set of difficulties that call for in-depth knowledge of the workforce's demands and the industry. This study aims to thoroughly evaluate the literature on staff management strategies and the difficulties workers in the telecom sector experience (Mathis et al., 2016). The necessary information for this study will be gathered from pertinent scholarly databases like Scopus, Web of Science, and Google Scholar. The thorough search technique will locate all pertinent research available in these databases. A thorough search approach will be the sampling technique used in this study. The search methodology will be created to locate all pertinent studies in academic databases. The inclusion criteria will be based on the study's caliber, relevance to the research issues, and year of publication (Boštjan?i? & Slana, 2018). Using this strategy, it will be possible to cover a wide range of studies and provide a thorough and accurate review of the present state of knowledge regarding employee management practices and the difficulties employees experience in the telecom sector.
The relevant data from the chosen studies will be extracted using the data extraction form. The form will be made to record important data, like the author of the study, the year it was published, the research methods, and the main conclusions (Simaet. al 2020). Using this method, the researcher will be able to spot recurring themes and patterns in the chosen studies, giving them a new perspective on the difficulties experienced by workers in the telecom sector and the management strategies that have successfully resolved these difficulties. The researcher will choose and review the literature systematically to ensure the findings' validity and reliability (Navimipour & Charband, 2016). The inclusion and exclusion criteria will be precisely stated to enable future researchers to replicate the study, and the data extraction procedure will be documented. Transparency in reporting the results will be maintained, and any constraints or potential biases will be identified and corrected. As a result, this study will shed important light on the methods used in employee management and the difficulties that workers in the telecommunications sector encounter (Chams & García-Blandón, 2019). In order to allow other researchers to expand on this research in the future, a thorough search strategy and data extraction procedure will guarantee that the study is founded on a rigorous and methodical methodology.
Benefit: The study will help various parties, including telecommunications workers, employers, policymakers, and researchers. The results of this study will offer insights into the employee management practices and difficulties that workers in the telecommunications sector experience, which can be utilized to design plans to enhance employee performance and well-being (Davidescuet. al 2020). The study will also offer suggestions for improving staff management procedures in the telecommunications sector, which can result in a more contented and effective workforce for companies and policymakers. The results will be disseminated through academic papers, conference presentations, and reports to pertinent stakeholders to maximize the research's advantages.
Non-maleficence: The study will be done morally and by ethical standards to guarantee that no participant experiences injury or discrimination and that no host organization is inconvenienced. There are no direct participants in this desk-based research project because there are none. No personally identifiable information will be used in the research, and the information will be managed safely. The researcher will take many measures to ensure non-maleficence and ethical behavior throughout the research process and that no harm or bias is done to any individual or organization (Jiang & Messersmith, 2018). First, the researcher will ensure that all information used in the study comes from publically accessible sources and complies with applicable data protection laws. This will aid in preserving the anonymity and privacy of people and organizations that could be mentioned in the literature. The researcher will also conduct the investigation impartially and objectively, taking care to account for any potential biases in the data and taking these into account in the analysis and interpretation of the results. This will make it easier to ensure the study is carried out ethically and without harming or prejudicing individuals or organizations. In order to guarantee anonymity, the researcher will also ensure that the data is processed securely and that all personally identifiable information is deleted from the data extraction form. The paper will also be adequately anonymized to respect the privacy of any people or organizations mentioned in the research.
Consent: Since this research is desk-based and will not include any actual participants, seeking consent from people or organizations is not required. Nevertheless, the researcher will ensure that all information utilized in the study comes from publicly accessible sources and complies with applicable data privacy laws (Kwon & Kim, 2020). The opening of the research paper shall clearly define the nature and goal of the study, and any data consulted will be properly referenced. The researcher will ensure that the nature and objective of the research are clearly described in the introduction of the research paper, even if getting permission from people or organizations will not be required for this desk-based research study. This will ensure the study is performed ethically, transparently, and with all prospective stakeholders informed of its nature and objectives.
The researcher will follow several procedures to ensure the study is conducted morally and without harming or prejudicially affecting individuals or organizations. The research will be carried out responsibly and transparently by following ethical norms, ensuring the results can be trusted and utilized to guide future practice in the telecommunications industry. Although there are no actual participants in this study, anyone who has given information for it can ask to have it removed by getting in touch with the researcher and making the appropriate request. Any data that has been withdrawn will be swiftly deleted from the study, and the researcher will take all necessary measures to make sure of this.
Private life will not be invaded because this research is desk-based and relies on data that is readily available to the public. The researcher will ensure that any information utilized in the study is legitimately obtained and complies with all applicable data protection laws. Researchers must preserve the core ethical value of privacy. Since the data used in this desk-based study will come from publically accessible sources, privacy problems are not anticipated to surface. The researcher will ensure that any data used was obtained legally and that study procedures honor peoples' right to privacy. To protect the confidentiality, personal identifying information will be deleted from the data and handled securely. To guarantee that research is carried out ethically and to foster confidence between the public and researchers, it is crucial to safeguard the privacy and respect individual rights.
Confidentiality: To protect the confidentiality, the data utilized in this study will be treated carefully, and any personally identifying information will be removed from the data extraction form. The researcher will take all necessary measures to guarantee that the study is correctly anonymized and will not reveal identifiable information about people or organizations.
Data storage: Under data protection laws, the research's data will be kept on password-protected PCs and cloud storage facilities. Only the researcher and any co-authors will have access to the data, and to protect privacy, all personally identifiable information will be removed from the data extraction form. After five years have passed since publishing, the data will be safely erased.
Data use and disposal: Since this study will be desk-based and relies on publically accessible data sources, there will not be any direct participants. Any data utilized in the study will be properly cited, and any information used to identify an individual will be erased. The researcher will take all necessary measures to guarantee that the data is acquired legally and complies with applicable protection laws. After five years have passed since publishing, the data will be safely erased.
Use of secondary data: Since the data would come from publically accessible sources, the proposed use of secondary data is unlikely to cause any substantial ethical concerns. To ensure that any data used is trustworthy and pertinent to the study subject, the researcher will take all required precautions. To ensure that the outcomes are accurate and impartial, the researcher will additionally account for any potential biases in the data during analysis and interpretation.
The researcher will also ensure the right techniques are employed to extract and combine the data. This will involve conducting a systematic search for pertinent studies and evaluating the caliber of the ultimately chosen studies. Any study flaws that can compromise the accuracy and dependability of the results will also be noted and reported by the researcher. Overall, it is anticipated that using secondary data in this study would advance knowledge of employee management strategies and difficulties faced by workers in the telecommunications sector.
Reference
- Azizi, M.R., Atlasi, R., Ziapour, A., Abbas, J. and Naemi, R., 2021. Innovative human resource management strategies during the COVID-19 pandemic: A systematic narrative review approach.Heliyon,7(6), p.e07233.
- Boštjan?i?, E. and Slana, Z., 2018. The role of talent management comparing medium-sized and large companies–major challenges in attracting and retaining talented employees.Frontiers in Psychology,9, p.1750.
- Brewster, C. and Hegewisch, A. eds., 2017.Policy and practice in European human resource management: The Price Waterhouse Cranfield survey. Taylor & Francis.
- Chams, N. and García-Blandón, J., 2019.On the importance of sustainable human resource management for adopting sustainable development goals.Resources, Conservation and Recycling,141, pp.109-122.
- Davidescu, A.A., Apostu, S.A., Paul, A. and Casuneanu, I., 2020.Work flexibility, job satisfaction, and job performance among Romanian employees—Implications for sustainable human resource management.Sustainability,12(15), p.6086.
- Haider, M., Rasli, A., Akhtar, C.S., Yusoff, R.B.M., Malik, O.M., Aamir, A., Arif, A., Naveed, S. and Tariq, F., (2015). The impact of human resource practices on employee retention in the telecom sector.International Journal of Economics and Financial Issues,5(1), 63–69.
- Jiang, K. & Messersmith, J. (2018). On the shoulders of giants: A meta-review of strategic human resource management. The International Journal of Human Resource Management,29(1), 6–33.
- Kwon, K. & Kim, T. (2020). An integrative literature review of employee engagement and innovative behavior: Revisiting the JD-R model.Human Resource Management Review,30(2), 100704.
- Markoulli, M.P., Lee, C.I., Byington, E. and Felps, W.A., (2017). Mapping Human Resource Management: Reviewing the field and charting future directions.Human Resource Management Review,27(3), 367–396.
- Mathis, R.L., Jackson, J.H., Valentine, S.R. and Meglich, P., 2016.Human resource management.Cengage Learning.
- Navimipour, N.J. and Charband, Y., 2016. Knowledge sharing mechanisms and techniques in project teams: Literature review, classification, and current trends.Computers in Human Behavior,62, pp.730-742.
- Sima, V., Gheorghe, I.G., Subi?, J. and Nancu, D., 2020. A systematic review of the influences of the Industry 4.0 revolution on human capital development and consumer behavior. Sustainability,12(10), p.4035.
- Vrontis, D., Christofi, M., Pereira, V., Tarba, S., Makrides, A. and Trichina, E., 2022. Artificial intelligence, robotics, advanced technologies and human resource management: a systematic review.The International Journal of Human Resource Management,33(6), pp.1237-1266.