Cybervetting job applicants on social media: the new normal?

[1]  James Weber Understanding the Millennials’ Integrated Ethical Decision-Making Process: Assessing the Relationship Between Personal Values and Cognitive Moral Reasoning , 2019 .

[2]  Alice E. Marwick,et al.  Nothing to hide, nothing to lose? Incentives and disincentives to sharing information with institutions online , 2019 .

[3]  Shawn L. Berman,et al.  Stakeholder Theory: Seeing the Field Through the Forest , 2019 .

[4]  Priscilla M. Regan,et al.  Ethical challenges of edtech, big data and personalized learning: twenty-first century student sorting and tracking , 2018, Ethics and Information Technology.

[5]  P. Helm Treating sensitive topics online: a privacy dilemma , 2018, Ethics and Information Technology.

[6]  Ming Cheung,et al.  Privacy perception and protection on Chinese social media: a case study of WeChat , 2018, Ethics and Information Technology.

[7]  Elizabeth Dubois,et al.  Journalists’ Use of Social Media to Infer Public Opinion: The Citizens’ Perspective , 2018, Social Science Computer Review.

[8]  Wulf Loh A practice–theoretical account of privacy , 2018, Ethics and Information Technology.

[9]  A. Gruzd,et al.  Employers’ Use of Young People’s Social Media: Extending Stakeholder Theory to Social Media Data , 2018, Academy of Management Proceedings.

[10]  Bree McEwan,et al.  Passwords for jobs: Compression of identity in reaction to perceived organizational control via social media surveillance , 2018, New Media Soc..

[11]  Ben L. Marder,et al.  Hybrid Social Media: Employees’ Use of a Boundary‐Spanning Technology , 2018 .

[12]  Jacquelyn A. Burkell,et al.  Display and control in online social spaces: Towards a typology of users , 2018, New Media Soc..

[13]  Jenna Jacobson,et al.  The State of Social Media in Canada 2017 , 2018, SSRN Electronic Journal.

[14]  Tat-Seng Chua,et al.  Depression Detection via Harvesting Social Media: A Multimodal Dictionary Learning Solution , 2017, IJCAI.

[15]  Nora A Draper,et al.  From Privacy Pragmatist to Privacy Resigned: Challenging Narratives of Rational Choice in Digital Privacy Debates , 2017 .

[16]  Alain Yee-Loong Chong,et al.  An updated and expanded assessment of PLS-SEM in information systems research , 2017, Ind. Manag. Data Syst..

[17]  D. Scholarios,et al.  ‘The Kids are Alert’: Generation Y Responses to Employer Use and Monitoring of Social Networking Sites , 2017 .

[18]  Clay Posey,et al.  Job Applicants' Information Privacy Protection Responses: Using Social Media for Candidate Screening , 2016, AIS Trans. Hum. Comput. Interact..

[19]  Eszter Hargittai,et al.  “What Can I Really Do?” Explaining the Privacy Paradox with Online Apathy , 2016 .

[20]  Jens-Erik Mai,et al.  Big data privacy: The datafication of personal information , 2016, Inf. Soc..

[21]  Ifeoma Ajunwa,et al.  Limitless Worker Surveillance , 2016 .

[22]  Geoffrey S. Hubona,et al.  Using PLS path modeling in new technology research: updated guidelines , 2016, Ind. Manag. Data Syst..

[23]  Luke Stark,et al.  The emotional context of information privacy , 2016, Inf. Soc..

[24]  Annika Bergström,et al.  Online privacy concerns: A broad approach to understanding the concerns of different groups for different uses , 2015, Comput. Hum. Behav..

[25]  Eszter Hargittai,et al.  Privacy Management on Facebook: Do Device Type and Location of Posting Matter? , 2015 .

[26]  Susanne Almgren,et al.  ‘Let’s Get Them Involved’ . . . to Some Extent: Analyzing Online News Participation , 2015 .

[27]  Alecia M. Santuzzi,et al.  Monitoring What and How: Psychological Implications of Electronic Performance Monitoring , 2015 .

[28]  Natalya N. Bazarova,et al.  Self‐Disclosure in Social Media: Extending the Functional Approach to Disclosure Motivations and Characteristics on Social Network Sites , 2014 .

[29]  Valérie-Inés de La Ville Young people as company stakeholders? Moving beyond CSR ... , 2014 .

[30]  Simon M. Burnett,et al.  The Impact of the Cessation of Blogs within the UK Police Blogosphere , 2014 .

[31]  Nick Couldry,et al.  Big Data from the bottom up , 2014, Big Data Soc..

[32]  Paul McKellips Knock, knock... , 2014, Lab Animal.

[33]  C. Lutz,et al.  Privacy Concerns and Online Behavior – Not so Paradoxical after All? Viewing the Privacy Paradox Through Different Theoretical Lenses , 2014 .

[34]  D. Howcroft,et al.  'Plus ca change, plus la meme chose': researching and theorising the new, new technologies , 2014 .

[35]  Anita Whiting,et al.  Why people use social media: a uses and gratifications approach , 2013 .

[36]  A. Ladkin,et al.  In Search of Employment: Online Technologies and Polish Migrants , 2013 .

[37]  Paul Schrodt Content Relevance and Students' Comfort with Disclosure as Moderators of Instructor Disclosures and Credibility in the College Classroom , 2013 .

[38]  Eszter Hargittai,et al.  New Strategies for Employment? Internet Skills and Online Privacy Practices during People's Job Search , 2013, IEEE Security & Privacy.

[39]  Norman M. Sadeh,et al.  Expectation and purpose: understanding users' mental models of mobile app privacy through crowdsourcing , 2012, UbiComp.

[40]  E. Litt Knock, Knock. Who's There? The Imagined Audience , 2012 .

[41]  D. Boyd,et al.  CRITICAL QUESTIONS FOR BIG DATA , 2012 .

[42]  Victoria L. Crittenden,et al.  The use of social media: an exploratory study of usage among digital natives , 2012 .

[43]  H. Nissenbaum A Contextual Approach to Privacy Online , 2011, Daedalus.

[44]  Kirstie Ball,et al.  Electronic Monitoring and Surveillance in Call Centres: A Framework for Investigation , 2011 .

[45]  Dan-Olof Rooth,et al.  The role of automatic obesity stereotypes in real hiring discrimination. , 2011, The Journal of applied psychology.

[46]  R. Zachary Finney,et al.  Experience, Comfort, and Privacy Concerns: Antecedents of Online Spending , 2011 .

[47]  Cliff Lampe,et al.  Connection strategies: Social capital implications of Facebook-enabled communication practices , 2011, New Media Soc..

[48]  Anabel Quan-Haase,et al.  Uses and Gratifications of Social Media: A Comparison of Facebook and Instant Messaging , 2010 .

[49]  Michele M. Dornisch,et al.  When is trust not enough? The role of perceived privacy of communication tools in comfort with self-disclosure , 2010, Comput. Hum. Behav..

[50]  Alice E. Marwick,et al.  Youth, Privacy and Reputation (Literature Review) , 2010 .

[51]  Simone de Colle,et al.  Stakeholder Theory: The State of the Art , 2010 .

[52]  Simone de Colle,et al.  Stakeholder Theory* , 2010, The Cambridge Handbook of Stakeholder Theory.

[53]  George R. Milne,et al.  Gender Differences in Privacy-Related Measures for Young Adult Facebook Users , 2010 .

[54]  R. Freeman Strategic Management: A Stakeholder Approach , 2010 .

[55]  Wei-Chi Tsai,et al.  Does Image Matter to Different Job Applicants? The Influences of Corporate Image and Applicant Individual Differences on Organizational Attractiveness , 2010 .

[56]  Leigh Anne Clark,et al.  Employer’s Use of Social Networking Sites: A Socially Irresponsible Practice , 2010 .

[57]  E. Hargittai Digital Na(t)ives? Variation in Internet Skills and Uses among Members of the “Net Generation”* , 2010 .

[58]  Hairong Li,et al.  Consumer Privacy Concerns and Preference for Degree of Regulatory Control , 2009 .

[59]  Bernhard Debatin,et al.  Facebook and Online Privacy: Attitudes, Behaviors, and Unintended Consequences , 2009, J. Comput. Mediat. Commun..

[60]  A. Ryan,et al.  Hiring Discrimination Against Arab Minorities: Interactions Between Prejudice and Job Characteristics , 2009 .

[61]  J. Palfrey,et al.  Born digital: understanding the first generation of digital natives , 2009, Choice Reviews Online.

[62]  Seounmi Youn,et al.  Gender and Online Privacy among Teens: Risk Perception, Privacy Concerns, and Protection Behaviors , 2008, Cyberpsychology Behav. Soc. Netw..

[63]  M. Philp,et al.  Intrusions , 2020, Structural Geology: A Quantitative Introduction.

[64]  N. Sartorius,et al.  Understanding the stigma of mental illness , 2008 .

[65]  Heather Richter Lipford,et al.  Understanding Privacy Settings in Facebook with an Audience View , 2008, UPSEC.

[66]  Katherine A. Karl,et al.  Social Networking Profiles: An Examination of Student Attitudes Regarding Use and Appropriateness of Content , 2008, Cyberpsychology Behav. Soc. Netw..

[67]  Wayne Visser,et al.  The A to Z of Corporate Social Responsibility: A Complete Reference Guide to Concepts, Codes and Organisations , 2008 .

[68]  Cliff Lampe,et al.  The Benefits of Facebook "Friends: " Social Capital and College Students' Use of Online Social Network Sites , 2007, J. Comput. Mediat. Commun..

[69]  Tamara Dinev,et al.  An Extended Privacy Calculus Model for E-Commerce Transactions , 2006, Inf. Syst. Res..

[70]  Stuart Dillon,et al.  Perceived Risk, the Internet Shopping Experience and Online Purchasing Behavior: A New Zealand Perspective , 2005, J. Glob. Inf. Manag..

[71]  Ellen Garbarino,et al.  GENDER DIFFERENCES IN THE PERCEIVED RISK OF BUYING ONLINE AND THE EFFECTS OF RECEIVING A SITE RECOMMENDATION , 2004 .

[72]  P. Petit,et al.  Hiring discrimination: a field experiment in the French financial sector , 2004 .

[73]  Brett J. O’Hara Twice Penalized , 2004 .

[74]  S. Livingstone Media Literacy and the Challenge of New Information and Communication Technologies , 2004 .

[75]  S. Forsythe,et al.  Consumer patronage and risk perceptions in Internet shopping , 2003 .

[76]  W. Gouvier,et al.  Patterns of discrimination in hiring job applicants with disabilities: The role of disability type, job complexity, and public contact. , 2003 .

[77]  Deborah F. Spake,et al.  Consumer Comfort in Service Relationships , 2003 .

[78]  A. Ryan,et al.  Antecedents and Potential Moderators of the Relationship Between Attitudes and Hiring Discrimination on the Basis of Sexual Orientation , 2003 .

[79]  Kevin Morrell,et al.  The Ethical Business: Challenges and Controversies , 2002 .

[80]  Albert H. Segars,et al.  An Empirical Examination of the Concern for Information Privacy Instrument , 2002, Inf. Syst. Res..

[81]  Kim Sheehan,et al.  Toward a Typology of Internet Users and Online Privacy Concerns , 2002, Inf. Soc..

[82]  I. Jawahar,et al.  Toward a Descriptive Stakeholder Theory: an Organizational Life Cycle Approach , 2001 .

[83]  D. Turban,et al.  Corporate Social Performance As a Competitive Advantage in Attracting a Quality Workforce , 2000 .

[84]  Kevin Gibson,et al.  The Moral Basis of Stakeholder Theory , 2000 .

[85]  C. K. Mertz,et al.  Gender, race, and perceived risk: The 'white male' effect , 2000 .

[86]  Peter Bain,et al.  Entrapped by the 'electronic panopticon'? worker resistance in the call centre , 2000 .

[87]  Mark S. Ackerman,et al.  Beyond Concern: Understanding Net Users' Attitudes About Online Privacy , 1999, ArXiv.

[88]  A. Wicks,et al.  Convergent Stakeholder Theory , 1999 .

[89]  Daniel B. Turban,et al.  Corporate Social Performance And Organizational Attractiveness To Prospective Employees , 1997 .

[90]  A. Gandini,et al.  Social Recruiting: Control and Surveillance in a Digitised Job Market , 2018 .

[91]  M. N. Ravishankar,et al.  The Perils and Promises of Self-Disclosure on Social Media , 2017, Information Systems Frontiers.

[92]  Anatoliy A. Gruzd,et al.  You're Hired: Examining Acceptance of Social Media Screening of Job Applicants , 2017, AMCIS.

[93]  H. Kennedy Post, Mine, Repeat , 2016 .

[94]  T. C. Oshima,et al.  All Possible Regressions Using IBM SPSS: A Practitioner’s Guide to Automatic Linear Modeling , 2016 .

[95]  Babajide Osatuyi,et al.  Empirical Examination of Information Privacy Concerns Instrument in the Social Media Context , 2015, AIS Trans. Replication Res..

[96]  Anitha Chennamaneni,et al.  Communication Privacy Management and Self-Disclosure on Social Media - A Case of Facebook , 2015, AMCIS.

[97]  Jing Zhang,et al.  Gender Differences in the Effect of Privacy on Location-Based Services Use on Mobile Phones , 2014, AMCIS.

[98]  Jun Heo,et al.  Visiting theories that predict college students' self-disclosure on Facebook , 2014, Comput. Hum. Behav..

[99]  Hongwei Yang,et al.  The Case for Being Automatic: Introducing the Automatic Linear Modeling (LINEAR) Procedure in SPSS Statistics , 2013 .

[100]  Dear Mr Sotiropoulos ARTICLE 29 Data Protection Working Party , 2013 .

[101]  Brenda L. Berkelaar Cyber-vetting: Exploring the implications of online information for career capital and human capital decisions , 2010 .

[102]  Joshua Fogel,et al.  Internet social network communities: Risk taking, trust, and privacy concerns , 2009, Comput. Hum. Behav..

[103]  B. Kirsh,et al.  Understanding the stigma of mental illness in employment. , 2009, Work.

[104]  Judy Drennan,et al.  Privacy, Risk Perception, and Expert Online Behavior: An Exploratory Study of Household End Users , 2006, J. Organ. End User Comput..

[105]  Alessandro Acquisti,et al.  Privacy and rationality in individual decision making , 2005, IEEE Security & Privacy.

[106]  Robert Tolksdorf,et al.  The Impact of Semantic Web Technologies on Job Recruitment Processes , 2005, Wirtschaftsinformatik.

[107]  Kevin Morrell,et al.  The ethical business , 2003 .

[108]  Dianna L. Stone,et al.  A multiple stakeholder model of privacy in organizations , 1998 .

[109]  L. Preston,et al.  The Stakeholder Theory of the Corporation: Concepts, Evidence, and Implications , 1995 .

[110]  M. Clarkson A Stakeholder Framework for Analyzing and Evaluating Corporate Social Performance , 1995 .

[111]  Robin M. Kowalski,et al.  Impression management: A literature review and two-component model. , 1990 .

[112]  E. Goffman The Presentation of Self in Everyday Life , 1959 .