AN APPROACH TO PERSONNEL SELECTION BASED ON SWARA AND WASPAS METHODS

Authors

  • Darjan Karabašević John Naisbitt University Belgrade, Faculty of Management Zaječar http://orcid.org/0000-0001-5308-2503
  • Dragiša Stanujkić John Naisbitt University Belgrade, Faculty of Management Zaječar http://orcid.org/0000-0002-6846-3074
  • Snežana Urošević University of Belgrade, Technical Faculty in Bor
  • Mlađan Maksimović John Naisbitt University Belgrade, Faculty of Management Zaječar

DOI:

https://doi.org/10.5937/bizinfo1601001K

Keywords:

HRM, recruitment and selection, MCDM, SWARA, WASPAS

Abstract

Human resource management is consisted of all activities that are aimed at ensuring continuous development, satisfying the needs of employees, motivation and retention of employees within the company along with achievement of their goals in an effective manner. Development plan of human resource management in the company is created in accordance with the strategic objectives of the company. Human resource management in the company also has its most important integrative component that is reflected in attracting and retaining employees who possess certain skills and competencies. Therefore, process of recruitment and selection occupies a very important role in the management of human resources. This manuscript propose one approach to problem of personnel selection based on the use of SWARA and WASPAS method. In order to demonstrate efficiency and applicability of the proposed approach, a numerical example is conducted.

Downloads

Download data is not yet available.

References

Archibald, N., Ramirez, G., Rathaus, N., Burke, J., Caswell, B., & Deraison, R. 2015. Nessus. Snort, & Ethereal Power Tools: Customizing Open Source Security Applications, First Edition, Rockland, Syngress.

Beale, J., Deraison, R., Meer, H., Temmingh, R., & Walt, C. V. D. 2004. Nessus network auditing. Syngress Publishing.

Hug, G., & Giampapa, J. A. 2012. Vulnerability assessment of AC state estimation with respect to false data injection cyber-attacks. IEEE Transactions on Smart Grid, 3(3), 1362-1370.

Krštenić, A. 2016. The application of cyber intelligence analysis in countering contemporary challenges, risks and threats. II međunarodna naučno-stručna konferencija bezbednost i krizni menadžment – teorija i praksa bezbednost za budućnost – 2016, pp. 171-177.

Morein, W. G., Stavrou, A., Cook, D. L., Keromytis, A. D., Misra, V., & Rubenstein, D. 2003 October. Using graphic turing tests to counter automated DDoS attacks against web servers. In Proceedings of the 10th ACM conference on Computer and communications security (pp. 8-19). ACM.

Rogers, R. (Ed.). 2011. Nessus network auditing. Elsevier.

Vieira, M., Antunes, N., & Madeira, H. 2009. Using web security scanners to detect vulnerabilities in web services. In Dependable Systems & Networks, 2009. DSN'09. IEEE/IFIP International Conference on (pp. 566-571). IEEE.

Von Solms, R., & Van Niekerk, J. 2013. From information security to cyber security. Computers & Security, 38, 97-102.

Tenable, 2018. Nessus Professional [online] Tenable, Available at: <http://www.tenablesecurity.com/nessus/> [Accessed 28 April 2018].

Acunetix, 2018. Web Server Security and Database Server Security [online] Acunetix, Available at: <https://www.acunetix.com/websitesecurity/webserver-security/> [Accessed 20 April 2018].

Downloads

Published

2016-06-30

How to Cite

Karabašević, D., Stanujkić, D., Urošević, S., & Maksimović, M. (2016). AN APPROACH TO PERSONNEL SELECTION BASED ON SWARA AND WASPAS METHODS. BizInfo (Blace) Journal of Economics, Management and Informatics, 7(1), 1–11. https://doi.org/10.5937/bizinfo1601001K

Most read articles by the same author(s)