Welcome!

News Feed Item

Facebook Is the Social Network of Choice for 86% of the Workforce, but High Mobility Job Seekers Prefer LinkedIn, Jobvite Study Shows

Jobvite's Job Seeker Nation: Mobility In The Workforce Study Analyzes Job Seeker Behavior in the Two-Tiered Labor Market

SAN MATEO, CA--(Marketwired - July 22, 2014) - Jobvite, the comprehensive recruitment platform for the world's fastest growing companies, today announced the results of the Job Seeker Nation: Mobility In The Workforce Study, derived from the company's annual Job Seeker Nation Survey. Jobvite examined the defining characteristics that set job seekers apart in the two-tiered labor market and how this impacts the methods and tools they use to seek career opportunities.

The data underscores the behavior and characteristics of job seekers in an increasingly divided labor market. This divide has produced heightened demand for highly skilled workers, leaving less skilled workers with fewer opportunities for advancement and mobility within the labor market.

Notable findings include:

A tightening labor market increases demand for skilled workers.

Technology, in combination with the retirement of baby boomers, contributes to increased demand for highly skilled workers. These job seekers have the demand and skill to change jobs more frequently, giving them increased mobility within the labor market. Unlike low mobility workers, these high mobility job seekers are predominately female, college educated and actively use social media and mobile technology in their job search. They have the skills to meet the demands of increasingly competitive and technical fields, making them more optimistic in their career prospects, resulting in the flexibility to switch jobs more frequently. Alternatively, less skilled workers experience more difficulty finding advanced positions resulting in lower mobility when job searching.

Not all job searches are created equal.

Social and mobile technologies have forever changed job seeking. The Job Seeker Nation: Mobility In The Workforce Study found that 70 percent of high and low mobility workers change jobs every 1-5 years, thanks in large part to technological advancements. Regardless of education or skill set, workers never stop searching for jobs, yet the way in which high and low mobility job seekers find jobs differs significantly.

Data shows that twice as many high mobility job seekers use recruiters or social networks during their job search. These job seekers are savvier about their social media privacy and are more likely to use LinkedIn during the job search than low mobility job seekers. Low mobility job seekers prefer to use referrals and Internet job boards in addition to Facebook to find the next career opportunity. However, both tiers of the labor market find the ability to apply for jobs on a smartphone important. This emphasizes the increasing prevalence of mobile for the always-on job seeker as job shopping becomes an extension of everyday life.

High mobility job seekers are more likely to be fully employed, optimistic and open to new opportunities.

As companies struggle to find quality talent to meet demand for technical, highly skilled positions, high mobility job seekers have more choices and opportunities for advancement. Data reveals that education, skill set and demand likely contribute to job seeker's optimism, which contributes to their increased flexibility and mobility within the labor market. Ultimately, more optimistic workers are likely to leave a company for a better opportunity.

Mobile is important to both tiers of the labor market, but not everyone uses the same tools on mobile.

The rise of social and mobile technologies has turned job seeking from an "under the radar" activity into a part of everyday life. This shift in the job seeking experience is changing how and when job seekers interact with companies and seek new career opportunities. While both high and low mobility job seekers actively use mobile in their job search, how they use mobile difference significantly; high mobility job seekers are more inclined to use LinkedIn, whereas low mobility job seekers prefer Facebook. For today's job seeker, mobile is an essential tool in the job hunt, regardless of skill set, education level, or market demand.

"As the economy continues to improve, a divide in the workforce is becoming increasingly apparent," said Dan Finnigan, president and CEO of Jobvite. "Demand for highly skilled, technical positions is rising, leaving less skilled workers to compete for fewer jobs with less opportunity for advancement. This signals a greater need to embrace STEM education and for job seekers to be savvier about their job search with social media and mobile technology. Combined, these factors will help bridge the gap in a fiercely competitive labor market."

On behalf of Jobvite, the polling company, inc., conducted a nationwide online omnibus survey of 2,135 adults (aged 18+), of whom 1,303 were participants in the U.S. labor force. Participants were not necessarily Jobvite customers and were screened based on their education level, employment status, and attitude toward future career opportunities. Non-employed, non-job seekers were excluded from the study.

About Jobvite
Jobvite is the leading recruiting platform for the social web. Today's fastest-growing companies use applicant tracking, recruiter CRM and social recruiting software solutions from Jobvite to target the right talent and build the best teams. Jobvite is a complete, modular Software-as-a-Service (SaaS) platform which can optimize the speed, cost-effectiveness and ease of recruiting for any company. For more information, visit www.jobvite.com.

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

Latest Stories
In his session at 18th Cloud Expo, Sagi Brody, Chief Technology Officer at Webair Internet Development Inc., will focus on real world deployments of DDoS mitigation strategies in every layer of the network. He will give an overview of methods to prevent these attacks and best practices on how to provide protection in complex cloud platforms. He will also outline what we have found in our experience managing and running thousands of Linux and Unix managed service platforms and what specifically c...
We're entering the post-smartphone era, where wearable gadgets from watches and fitness bands to glasses and health aids will power the next technological revolution. With mass adoption of wearable devices comes a new data ecosystem that must be protected. Wearables open new pathways that facilitate the tracking, sharing and storing of consumers’ personal health, location and daily activity data. Consumers have some idea of the data these devices capture, but most don’t realize how revealing and...
Many private cloud projects were built to deliver self-service access to development and test resources. While those clouds delivered faster access to resources, they lacked visibility, control and security needed for production deployments. In their session at 18th Cloud Expo, Steve Anderson, Product Manager at BMC Software, and Rick Lefort, Principal Technical Marketing Consultant at BMC Software, will discuss how a cloud designed for production operations not only helps accelerate developer...
Peak 10, Inc., has announced the implementation of IT service management, a business process alignment initiative based on the widely adopted Information Technology Infrastructure Library (ITIL) framework. The implementation of IT service management enhances Peak 10’s current service-minded approach to IT delivery by propelling the company to deliver higher levels of personalized and prompt service. The majority of Peak 10’s operations employees have been trained and certified in the ITIL frame...
trust and privacy in their ecosystem. Assurance and protection of device identity, secure data encryption and authentication are the key security challenges organizations are trying to address when integrating IoT devices. This holds true for IoT applications in a wide range of industries, for example, healthcare, consumer devices, and manufacturing. In his session at @ThingsExpo, Lancen LaChance, vice president of product management, IoT solutions at GlobalSign, will teach IoT developers how t...
SYS-CON Events announced today the Docker Meets Kubernetes – Intro into the Kubernetes World, being held June 9, 2016, in conjunction with 18th Cloud Expo | @ThingsExpo, at the Javits Center in New York, NY. Register for 'Docker Meets Kubernetes Workshop' Here! This workshop led by Sebastian Scheele, co-founder of Loodse, introduces participants to Kubernetes (container orchestration). Through a combination of instructor-led presentations, demonstrations, and hands-on labs, participants learn ...
SYS-CON Events announced today that Ericsson has been named “Gold Sponsor” of SYS-CON's @ThingsExpo, which will take place on June 7-9, 2016, at the Javits Center in New York, New York. Ericsson is a world leader in the rapidly changing environment of communications technology – providing equipment, software and services to enable transformation through mobility. Some 40 percent of global mobile traffic runs through networks we have supplied. More than 1 billion subscribers around the world re...
In the world of DevOps there are ‘known good practices’ – aka ‘patterns’ – and ‘known bad practices’ – aka ‘anti-patterns.' Many of these patterns and anti-patterns have been developed from real world experience, especially by the early adopters of DevOps theory; but many are more feasible in theory than in practice, especially for more recent entrants to the DevOps scene. In this power panel at @DevOpsSummit at 18th Cloud Expo, moderated by DevOps Conference Chair Andi Mann, panelists will dis...
A critical component of any IoT project is the back-end systems that capture data from remote IoT devices and structure it in a way to answer useful questions. Traditional data warehouse and analytical systems are mature technologies that can be used to handle large data sets, but they are not well suited to many IoT-scale products and the need for real-time insights. At Fuze, we have developed a backend platform as part of our mobility-oriented cloud service that uses Big Data-based approache...
Increasing IoT connectivity is forcing enterprises to find elegant solutions to organize and visualize all incoming data from these connected devices with re-configurable dashboard widgets to effectively allow rapid decision-making for everything from immediate actions in tactical situations to strategic analysis and reporting. In his session at 18th Cloud Expo, Shikhir Singh, Senior Developer Relations Manager at Sencha, will discuss how to create HTML5 dashboards that interact with IoT devic...
The increasing popularity of the Internet of Things necessitates that our physical and cognitive relationship with wearable technology will change rapidly in the near future. This advent means logging has become a thing of the past. Before, it was on us to track our own data, but now that data is automatically available. What does this mean for mHealth and the "connected" body? In her session at @ThingsExpo, Lisa Calkins, CEO and co-founder of Amadeus Consulting, will discuss the impact of wea...
There is an ever-growing explosion of new devices that are connected to the Internet using “cloud” solutions. This rapid growth is creating a massive new demand for efficient access to data. And it’s not just about connecting to that data anymore. This new demand is bringing new issues and challenges and it is important for companies to scale for the coming growth. And with that scaling comes the need for greater security, gathering and data analysis, storage, connectivity and, of course, the...
We’ve worked with dozens of early adopters across numerous industries and will debunk common misperceptions, which starts with understanding that many of the connected products we’ll use over the next 5 years are already products, they’re just not yet connected. With an IoT product, time-in-market provides much more essential feedback than ever before. Innovation comes from what you do with the data that the connected product provides in order to enhance the customer experience and optimize busi...
The IETF draft standard for M2M certificates is a security solution specifically designed for the demanding needs of IoT/M2M applications. In his session at @ThingsExpo, Brian Romansky, VP of Strategic Technology at TrustPoint Innovation, will explain how M2M certificates can efficiently enable confidentiality, integrity, and authenticity on highly constrained devices.
The IoTs will challenge the status quo of how IT and development organizations operate. Or will it? Certainly the fog layer of IoT requires special insights about data ontology, security and transactional integrity. But the developmental challenges are the same: People, Process and Platform. In his session at @ThingsExpo, Craig Sproule, CEO of Metavine, will demonstrate how to move beyond today's coding paradigm and share the must-have mindsets for removing complexity from the development proc...