PELATIHAN PEMBUATAN E-PORTFOLIO SISWA UNTUK PKL DAN REKRUTMEN KERJA

Authors

  • Suparno Universitas Doktor Nugroho Magetan
  • Sarmi Dwi Lestariningsih Universitas Doktor Nugroho Magetan

Keywords:

e-portfolio; pelatihan siswa; praktik kerja lapangan; rekrutmen kerja; kompetensi digital.

Abstract

Pelatihan pembuatan e-portfolio bagi siswa merupakan strategi penting dalam meningkatkan kesiapan menghadapi Praktik Kerja Lapangan (PKL) dan proses rekrutmen kerja. E-portfolio berfungsi sebagai media digital yang mendokumentasikan kompetensi, prestasi, pengalaman, serta proyek siswa secara sistematis dan profesional. Penelitian ini bertujuan untuk merancang dan melaksanakan pelatihan e-portfolio yang efektif serta mengevaluasi dampaknya terhadap kemampuan siswa dalam menyusun dan mempresentasikan portofolio digital. Metode yang digunakan meliputi pelatihan berbasis praktik, pendampingan langsung, serta evaluasi melalui kuesioner dan observasi terhadap hasil produk e-portfolio. Pelatihan dirancang dengan pendekatan learning by doing agar siswa mampu memahami struktur konten, desain visual, serta strategi penyajian diri secara profesional. Hasil penelitian menunjukkan bahwa setelah mengikuti pelatihan, sebagian besar siswa mampu menghasilkan e-portfolio yang terstruktur, menarik, dan siap digunakan dalam kegiatan PKL maupun proses rekrutmen kerja. Selain meningkatkan keterampilan teknis dalam penggunaan platform digital, pelatihan ini juga berkontribusi terhadap peningkatan kemampuan komunikasi, kepercayaan diri, dan kesiapan kerja siswa. Dengan demikian, pelatihan e-portfolio direkomendasikan sebagai program penguatan kompetensi digital dan kesiapan karier secara berkelanjutan di lingkungan pendidikan.

Downloads

Download data is not yet available.

References

Anti-Phishing Working Group (APWG). (2024). Phishing activity trends report. https://apwg.org

Beck, U. (1992). Risk society: Towards a new modernity. Sage Publications.

Carayon, P., & Smith, M. J. (2000). Work organization and ergonomics. Applied Ergonomics, 31(6), 649–662. https://doi.org/10.1016/S0003-6870(00)00040-5

Davis, F. D. (1989). Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS Quarterly, 13(3), 319–340. https://doi.org/10.2307/249008

Deci, E. L., & Ryan, R. M. (2000). The “what” and “why” of goal pursuits: Human needs and self-determination of behavior. Psychological Inquiry, 11(4), 227–268. https://doi.org/10.1207/S15327965PLI1104_01

DeLone, W. H., & McLean, E. R. (2003). The DeLone and McLean model of information systems success: A ten-year update. Journal of Management Information Systems, 19(4), 9–30. https://doi.org/10.1080/07421222.2003.11045748

Dumas, M., La Rosa, M., Mendling, J., & Reijers, H. A. (2018). Fundamentals of business process management (2nd ed.). Springer. https://doi.org/10.1007/978-3-662-56509-4

Google & Harris Poll. (2024). Password security & authentication trends report. Google Safety Center.

ISO/IEC. (2013). ISO/IEC 27001:2013 Information technology—Security techniques—Information security management systems—Requirements. International Organization for Standardization.

Kolb, D. A. (1984). Experiential learning: Experience as the source of learning and development. Prentice Hall.

Microsoft Security. (2024). Digital defense report. Microsoft Corporation.

Nonaka, I., & Takeuchi, H. (1995). The knowledge-creating company. Oxford University Press.

Rahman, M. S., & Abdullah, A. (2022). Web-based academic information systems implementation in higher education institutions. International Journal of Advanced Computer Science and Applications, 13(2), 412–419. https://doi.org/10.14569/IJACSA.2022.0130249

Rifai, A., Setiawan, A., & Nugroho, Y. (2021). Digital transformation in higher education: Toward Education 4.0. Journal of Physics: Conference Series, 1833(1), 012046. https://doi.org/10.1088/1742-6596/1833/1/012046

Rogers, R. W. (1975). A protection motivation theory of fear appeals and attitude change. The Journal of Psychology, 91(1), 93–114. https://doi.org/10.1080/00223980.1975.9915803

Schein, E. H. (2010). Organizational culture and leadership (4th ed.). Jossey-Bass.

Schwaber, K., & Sutherland, J. (2020). The Scrum guide: The definitive guide to Scrum. Scrum.org.

Slovic, P., Finucane, M. L., Peters, E., & MacGregor, D. G. (2002). The affect heuristic. In T. Gilovich, D. Griffin, & D. Kahneman (Eds.), Heuristics and biases: The psychology of intuitive judgment (pp. 397–420). Cambridge University Press. https://doi.org/10.1017/CBO9780511808098.025

Stahl, G., Koschmann, T., & Suthers, D. (2006). Computer-supported collaborative learning: An historical perspective. In R. K. Sawyer (Ed.), The Cambridge handbook of the learning sciences. Cambridge University Press. https://doi.org/10.1017/CBO9780511816833.025

Sweller, J. (1988). Cognitive load during problem solving: Effects on learning. Cognitive Science, 12(2), 257–285. https://doi.org/10.1207/s15516709cog1202_4

Venkatesh, V., Thong, J. Y. L., & Xu, X. (2016). Unified theory of acceptance and use of technology: A synthesis and the road ahead. Journal of the Association for Information Systems, 17(5), 328–376. https://doi.org/10.17705/1jais.00428

Verizon. (2025). Data breach investigations report (DBIR). Verizon Enterprise.

Downloads

Published

2025-07-28

Issue

Section

Articles

How to Cite

PELATIHAN PEMBUATAN E-PORTFOLIO SISWA UNTUK PKL DAN REKRUTMEN KERJA. (2025). Eduscotech, 6(2). https://journal.udn.ac.id/index.php/eduscotech/article/view/565

Most read articles by the same author(s)