PELATIHAN PEMBUATAN E-PORTFOLIO SISWA UNTUK PKL DAN REKRUTMEN KERJA
Keywords:
e-portfolio; pelatihan siswa; praktik kerja lapangan; rekrutmen kerja; kompetensi digital.Abstract
Pelatihan pembuatan e-portfolio bagi siswa merupakan strategi penting dalam meningkatkan kesiapan menghadapi Praktik Kerja Lapangan (PKL) dan proses rekrutmen kerja. E-portfolio berfungsi sebagai media digital yang mendokumentasikan kompetensi, prestasi, pengalaman, serta proyek siswa secara sistematis dan profesional. Penelitian ini bertujuan untuk merancang dan melaksanakan pelatihan e-portfolio yang efektif serta mengevaluasi dampaknya terhadap kemampuan siswa dalam menyusun dan mempresentasikan portofolio digital. Metode yang digunakan meliputi pelatihan berbasis praktik, pendampingan langsung, serta evaluasi melalui kuesioner dan observasi terhadap hasil produk e-portfolio. Pelatihan dirancang dengan pendekatan learning by doing agar siswa mampu memahami struktur konten, desain visual, serta strategi penyajian diri secara profesional. Hasil penelitian menunjukkan bahwa setelah mengikuti pelatihan, sebagian besar siswa mampu menghasilkan e-portfolio yang terstruktur, menarik, dan siap digunakan dalam kegiatan PKL maupun proses rekrutmen kerja. Selain meningkatkan keterampilan teknis dalam penggunaan platform digital, pelatihan ini juga berkontribusi terhadap peningkatan kemampuan komunikasi, kepercayaan diri, dan kesiapan kerja siswa. Dengan demikian, pelatihan e-portfolio direkomendasikan sebagai program penguatan kompetensi digital dan kesiapan karier secara berkelanjutan di lingkungan pendidikan.
Downloads
References
Anti-Phishing Working Group (APWG). (2024). Phishing activity trends report. https://apwg.org
Beck, U. (1992). Risk society: Towards a new modernity. Sage Publications.
Carayon, P., & Smith, M. J. (2000). Work organization and ergonomics. Applied Ergonomics, 31(6), 649–662. https://doi.org/10.1016/S0003-6870(00)00040-5
Davis, F. D. (1989). Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS Quarterly, 13(3), 319–340. https://doi.org/10.2307/249008
Deci, E. L., & Ryan, R. M. (2000). The “what” and “why” of goal pursuits: Human needs and self-determination of behavior. Psychological Inquiry, 11(4), 227–268. https://doi.org/10.1207/S15327965PLI1104_01
DeLone, W. H., & McLean, E. R. (2003). The DeLone and McLean model of information systems success: A ten-year update. Journal of Management Information Systems, 19(4), 9–30. https://doi.org/10.1080/07421222.2003.11045748
Dumas, M., La Rosa, M., Mendling, J., & Reijers, H. A. (2018). Fundamentals of business process management (2nd ed.). Springer. https://doi.org/10.1007/978-3-662-56509-4
Google & Harris Poll. (2024). Password security & authentication trends report. Google Safety Center.
ISO/IEC. (2013). ISO/IEC 27001:2013 Information technology—Security techniques—Information security management systems—Requirements. International Organization for Standardization.
Kolb, D. A. (1984). Experiential learning: Experience as the source of learning and development. Prentice Hall.
Microsoft Security. (2024). Digital defense report. Microsoft Corporation.
Nonaka, I., & Takeuchi, H. (1995). The knowledge-creating company. Oxford University Press.
Rahman, M. S., & Abdullah, A. (2022). Web-based academic information systems implementation in higher education institutions. International Journal of Advanced Computer Science and Applications, 13(2), 412–419. https://doi.org/10.14569/IJACSA.2022.0130249
Rifai, A., Setiawan, A., & Nugroho, Y. (2021). Digital transformation in higher education: Toward Education 4.0. Journal of Physics: Conference Series, 1833(1), 012046. https://doi.org/10.1088/1742-6596/1833/1/012046
Rogers, R. W. (1975). A protection motivation theory of fear appeals and attitude change. The Journal of Psychology, 91(1), 93–114. https://doi.org/10.1080/00223980.1975.9915803
Schein, E. H. (2010). Organizational culture and leadership (4th ed.). Jossey-Bass.
Schwaber, K., & Sutherland, J. (2020). The Scrum guide: The definitive guide to Scrum. Scrum.org.
Slovic, P., Finucane, M. L., Peters, E., & MacGregor, D. G. (2002). The affect heuristic. In T. Gilovich, D. Griffin, & D. Kahneman (Eds.), Heuristics and biases: The psychology of intuitive judgment (pp. 397–420). Cambridge University Press. https://doi.org/10.1017/CBO9780511808098.025
Stahl, G., Koschmann, T., & Suthers, D. (2006). Computer-supported collaborative learning: An historical perspective. In R. K. Sawyer (Ed.), The Cambridge handbook of the learning sciences. Cambridge University Press. https://doi.org/10.1017/CBO9780511816833.025
Sweller, J. (1988). Cognitive load during problem solving: Effects on learning. Cognitive Science, 12(2), 257–285. https://doi.org/10.1207/s15516709cog1202_4
Venkatesh, V., Thong, J. Y. L., & Xu, X. (2016). Unified theory of acceptance and use of technology: A synthesis and the road ahead. Journal of the Association for Information Systems, 17(5), 328–376. https://doi.org/10.17705/1jais.00428
Verizon. (2025). Data breach investigations report (DBIR). Verizon Enterprise.
Downloads
Published
Issue
Section
License
Copyright (c) 2025 Suparno, Sarmi Dwi Lestariningsih

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
Authors who publish with this journal agree to the following terms:
1. Copyright on any article is retained by the author(s).
2. The author grants the journal, right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgment of the work’s authorship and initial publication in this journal.
3. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal’s published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
4. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work.
5. The article and any associated published material is distributed under the Creative Commons Attribution-ShareAlike 4.0 International License



