Feeds

Over half of IT hires in Asia are duds

Employers not happy with recruits

Build a business case: developing custom apps

The IT and telecoms sector will lead the way when it comes to hiring expectations in Asia over the next three months, but over half of new recruits in China and Singapore are duds, according to new stats from Hudson.

The recruitment consultancy’s latest report for the second quarter of 2012 takes an in depth look at China, Hong Kong and Singapore.

It found that while overall only Hong Kong employers were expecting to hire more staff than during the previous quarter, things are looking pretty good for the IT sector.

Two-thirds of those interviewed in China are planning to increase hiring this quarter, with the figure at 49 per cent in Hong Kong – up from 41 per cent last quarter – and at 56 per cent in Singapore, up from 49 per cent.

Cloud computing, security, mobility, BI and e-commerce are some key areas where recruiters are looking for IT pros to fill skills gaps in the region, the report found.

However, Hudson’s findings also revealed that candidates are failing to meet employers' expectations.

At 16 per cent, the IT sector in China had the highest proportion of new recruits regarded as ‘bad’, with only a third regarded as a ‘good’ hire.

In Singapore at least 13 per cent were labelled bad hires while in Hong Kong the impression was more optimistic, with just over half regarded as good.

No doubt with one eye on promoting its services as an ace recruitment specialist, Hudson was keen to point out that employers need the right tools to assess “behaviour, attitudes and cultural fit” just as they do technical and business skills.

The consequences of making bad hiring decisions – according to the employers interviewed for this report – range from negative impacts on staff morale, productivity, team work and customer service to loss of sales and customers.

Crucially the report does not go into detail about the quality or otherwise of ex-pat recruits, but if nothing else it should be a reminder to IT pros looking to move to the region to do their research and be clear from the outset what their employer's expectations are. ®

Build a business case: developing custom apps

More from The Register

next story
Symantec security chap signs for CSIRO's ICT In Schools
Vulture South is closing in on our goal of 20 new recruits to help teachers and kids
A-level results: Before you smile at that jump-for-joy snap...
Uni-ditching teens are COMING FOR YOUR JOBS
How to promote CSIRO's ICT in Schools in your community
Vulture South is closing in on its target to find volunteers to help teach tech in schools
Everyone's an IoT expert but now there's a certificate to prove it
Cisco creates Certification of Things for industrial sensor-footlers
Facebook wants Linux networking as good as FreeBSD
Help The Social NetworkTM make the kernel better
LinkedIn settles missed overtime pay case: Will pay $6m to staffers
US Dept of Labor: It violated Fair Labor Standards Act
NICTA man explains why he volunteers for CSIRO's ICT in Schools
'I feel fantastic after the sessions - It's the best part of my job' says volunteer
The Register is HIRING technology hacks for the WORLD
Live on Earth? Want to be a Vulture? Enquire within
Pleased to meet you. I'm Joe Bloggs, MVP, vExpert, Cisco Champ
What a mouthful. Do customers care? Six title-holders quizzed
prev story

Whitepapers

A new approach to endpoint data protection
What is the best way to ensure comprehensive visibility, management, and control of information on both company-owned and employee-owned devices?
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Maximize storage efficiency across the enterprise
The HP StoreOnce backup solution offers highly flexible, centrally managed, and highly efficient data protection for any enterprise.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.