Monday, July 2, 2018

Trainer's Tips: Responding to Behavioral Interview Questions - Capitol Technology University (Since 1927 Located Near Washington D.C.)

Direct Link: https://www.captechu.edu/blog/trainers-tips-responding-behavioral-interview-questions
www.CapTechU.edu

business handshake
I’ve been coaching students through the interview process over the past eight years. During that time, I’ve done a lot of research, spoken to many employers, and heard feedback from students who have been through interviews.

Along the way, I’ve observed some trends.

Interview questions tend to fall into one of four categories. There are general interview questions, technical interview questions, curveball questions, and behavioral questions.

Behavioral interview questions follow a pattern. The employer is asking you about your past behavior in specific scenarios to try to understand how you will act in the future.

For example, if I ask you how you reacted when you saw a colleague do something unethical, and you tell me that you ignored it because it wasn’t your problem, that can tell me a lot about your character, and whether I should trust you with sensitive information. Understand that the employer is trying to gauge your values, your creative problem-solving skills, or another skill or value.

The best way to answer this question holistically is through the STAR method. With this method, you provide a response that covers the following:

Situation/Task: Were you in a class, at work, in a club? What was the task expected of you or that you were attempting to accomplish?

Action: What steps did you take?

Result: What was the result of your action? What it resolved? What did you learn?

Let me give you an example. An interviewer asks the following question: “Tell me about a time you did not know how to fix a problem or answer a question from a client. What did you do?”

A response using the STAR method:

Once I was in a club that was having trouble finding a meeting time that worked for everyone. We tried talking about it at meeting and taking a vote, but since we were never in the same room at the same time, we couldn’t get a consensus (<Situation/Task). I decided to take some time to research the problem online, and I found a website called Doodle that allows people to select all of the times they are available, which would allow us to generate the data that we needed to make an informed decision about when the most people could be there, so we set that up (<Action). Using this tool resulted in a 200% increase in club attendance and participation. I learned that there are many tools out there to help with productivity and communication, and I also learned that using data instead of consensus to make decisions would result in a better result and would ensure people do not feel that their voices aren’t heard if they aren’t the loudest in the room (<Result). 

See what I did there? The STAR method allowed me to tell a whole story, in a succinct and brief way, while making sure that I covered all of the things that the interviewer wanted to hear from me.

I encourage job seekers to prepare two or three of these stories for each of the following scenarios: showing initiative, showing creative problem solving, showing integrity, showing leadership, and maybe a few others.

I also recommend practicing these stories aloud. You do not want them to last more than a minute or two.

If you are interested in practicing, I host free mock interviews for students and alumni, either in person; over Adobe Connect, Skype, or Google Hangouts; or over the phone.  Please email careers@captechu.edu to set up your appointment.
sarah alspaw
By Sarah Alspaw
Director of Career Development and Student Success

Monday, June 25, 2018

What is Privacy? - Capitol Technology University (Since 1927 Located Near Washington D.C.)

Direct Link: https://www.captechu.edu/blog/what-privacy
www.CapTechU.edu

Jason M. Pittman Cap Tech
Jason M. Pittman, Sc.D.
Dr. Jason M. Pittman is a scholar, professor, and cybersecurity thought leader. He currently is on the full-time faculty at Capitol Technology University. The following is part of an ongoing series on privacy.

I think privacy must end. I think privacy must end if we, as a species, are going to survive in the developing Virtual Age. To illustrate why I think so, I first outlined why privacy is in demand right now. Specifically, I indicated that privacy creates a perceived (but false) information parity, treats information as a currency, and implies information permanency. Knowing that privacy is in demand is to know only half of the conversation, however.

The other half of the conversation is to know what constitutes privacy. To be sure, there are numerous definitions of privacy. Stated another way, there is no universal meaning for privacy. More importantly, there is no universal understanding of what is privacy. While the legal profession has much to say in this regard, I am not at all interested in legal debate. I am also not interested in defining privacy in a general manner.

Instead of simply defining privacy, I want to consider the question of what privacy entails. That is, what information can we determine to be private? I think this is straightforward if we only consider information that we possess. However, when we consider information in a broad context or information that someone else possesses, the question becomes somewhat more difficult.

Modern society operates according to a narrative whereby privacy is something that is under constant assault. Privacy is something breached, compromised or undermined. Privacy is something you had as opposed to have or will have. These notions imply that privacy is a state and, moreover, a static state. I do not think the truth could be further from the implication.

I submit that privacy is a graduated or interval construct. Graduated and interval refer to the ability for privacy to incrementally increase or decrease (think about the delimiter marks on a ruler or thermometer). Moreover, I would argue that privacy is a continuum at both the individual and collective levels. That is, personal privacy can increase or decrease dynamically relative to various forms of information. Further, an individual’s privacy construct can differ from the collective. Meanwhile, the individual’s expectations and tolerance of privacy across the cultural collective is likewise volatile.

We must also consider whether privacy can be envisioned as one construct in a given scenario and, later, a different construct in a differing scenario (or, perhaps even the same scenario replayed)? My point is that proclaiming privacy to be one construct is limiting and possibly dangerous as conceptualizing privacy as a single, static state. Indeed, privacy could be multiple constructs simultaneously. I highly suspect that this is closer to reality. I’m also left wondering how privacy, if it is such a valuable facet of human consciousness, can be so simultaneously versatile and universal at multiple levels of resolution.

I believe the answer exists in understanding privacy as five different information constructs: non-intrusion, seclusion, limitation, and control, and knowing. Thus, I want to spend some time developing a strong understanding of what privacy is as a prerequisite to our later questions. Please, join me as I continue to explore what is privacy.