There is some connection between players in the credentials value chain, but the relationship is latent.
The credentials value chain starts from the market since they generate demand for skills. Credentials issuing institutions then react to this demand by offering courses and issuing the related credentials to their students who then take it back to the market to find opportunities.
The challenge is that the players within the credentials value chain (Holders, Issuers, and Receivers) are not properly connected; and in such a way that the full potentials of the credential are realized.
Application requirements are always defined but is vaguely related to the supporting credential
Recruitment agents, staff and admission officers will confirm how difficult, time taken and expensive it is to sift and filter through submitted applications checking for those that meet the defined requirements. It’s so difficult that sometimes schools and companies make an offer is even without the supporting documents to confirm adherence to the requirements.
Because submission requirements are vaguely defined, shortlisting application submission will always be a chore.
Academic credentials submitted for an opportunity are always trusted but sometimes verified.
Academic credential verification is undoubtedly something anyone has to go through at a certain point in their lives. Job hunting aside, it’s also important when moving through certain geographical borders, regardless if it’s for work or study.
But we often find companies that hire staff and tertiary institutions that admit students without verifying the credential that was submitted as a supporting document. This is because the applicants were not required to submit a verified credential.
Academic credentials are stored everywhere; yet dormant
What is common with all these storages is that no one really knows they’re there; because they’re actually just sitting there; dormant.