Cybervetting job applicants on social media: the new normal?
暂无分享,去创建一个
[1] James Weber. Understanding the Millennials’ Integrated Ethical Decision-Making Process: Assessing the Relationship Between Personal Values and Cognitive Moral Reasoning , 2019 .
[2] Alice E. Marwick,et al. Nothing to hide, nothing to lose? Incentives and disincentives to sharing information with institutions online , 2019 .
[3] Shawn L. Berman,et al. Stakeholder Theory: Seeing the Field Through the Forest , 2019 .
[4] Priscilla M. Regan,et al. Ethical challenges of edtech, big data and personalized learning: twenty-first century student sorting and tracking , 2018, Ethics and Information Technology.
[5] P. Helm. Treating sensitive topics online: a privacy dilemma , 2018, Ethics and Information Technology.
[6] Ming Cheung,et al. Privacy perception and protection on Chinese social media: a case study of WeChat , 2018, Ethics and Information Technology.
[7] Elizabeth Dubois,et al. Journalists’ Use of Social Media to Infer Public Opinion: The Citizens’ Perspective , 2018, Social Science Computer Review.
[8] Wulf Loh. A practice–theoretical account of privacy , 2018, Ethics and Information Technology.
[9] A. Gruzd,et al. Employers’ Use of Young People’s Social Media: Extending Stakeholder Theory to Social Media Data , 2018, Academy of Management Proceedings.
[10] Bree McEwan,et al. Passwords for jobs: Compression of identity in reaction to perceived organizational control via social media surveillance , 2018, New Media Soc..
[11] Ben L. Marder,et al. Hybrid Social Media: Employees’ Use of a Boundary‐Spanning Technology , 2018 .
[12] Jacquelyn A. Burkell,et al. Display and control in online social spaces: Towards a typology of users , 2018, New Media Soc..
[13] Jenna Jacobson,et al. The State of Social Media in Canada 2017 , 2018, SSRN Electronic Journal.
[14] Tat-Seng Chua,et al. Depression Detection via Harvesting Social Media: A Multimodal Dictionary Learning Solution , 2017, IJCAI.
[15] Nora A Draper,et al. From Privacy Pragmatist to Privacy Resigned: Challenging Narratives of Rational Choice in Digital Privacy Debates , 2017 .
[16] Alain Yee-Loong Chong,et al. An updated and expanded assessment of PLS-SEM in information systems research , 2017, Ind. Manag. Data Syst..
[17] D. Scholarios,et al. ‘The Kids are Alert’: Generation Y Responses to Employer Use and Monitoring of Social Networking Sites , 2017 .
[18] Clay Posey,et al. Job Applicants' Information Privacy Protection Responses: Using Social Media for Candidate Screening , 2016, AIS Trans. Hum. Comput. Interact..
[19] Eszter Hargittai,et al. “What Can I Really Do?” Explaining the Privacy Paradox with Online Apathy , 2016 .
[20] Jens-Erik Mai,et al. Big data privacy: The datafication of personal information , 2016, Inf. Soc..
[21] Ifeoma Ajunwa,et al. Limitless Worker Surveillance , 2016 .
[22] Geoffrey S. Hubona,et al. Using PLS path modeling in new technology research: updated guidelines , 2016, Ind. Manag. Data Syst..
[23] Luke Stark,et al. The emotional context of information privacy , 2016, Inf. Soc..
[24] Annika Bergström,et al. Online privacy concerns: A broad approach to understanding the concerns of different groups for different uses , 2015, Comput. Hum. Behav..
[25] Eszter Hargittai,et al. Privacy Management on Facebook: Do Device Type and Location of Posting Matter? , 2015 .
[26] Susanne Almgren,et al. ‘Let’s Get Them Involved’ . . . to Some Extent: Analyzing Online News Participation , 2015 .
[27] Alecia M. Santuzzi,et al. Monitoring What and How: Psychological Implications of Electronic Performance Monitoring , 2015 .
[28] Natalya N. Bazarova,et al. Self‐Disclosure in Social Media: Extending the Functional Approach to Disclosure Motivations and Characteristics on Social Network Sites , 2014 .
[29] Valérie-Inés de La Ville. Young people as company stakeholders? Moving beyond CSR ... , 2014 .
[30] Simon M. Burnett,et al. The Impact of the Cessation of Blogs within the UK Police Blogosphere , 2014 .
[31] Nick Couldry,et al. Big Data from the bottom up , 2014, Big Data Soc..
[32] Paul McKellips. Knock, knock... , 2014, Lab Animal.
[33] C. Lutz,et al. Privacy Concerns and Online Behavior – Not so Paradoxical after All? Viewing the Privacy Paradox Through Different Theoretical Lenses , 2014 .
[34] D. Howcroft,et al. 'Plus ca change, plus la meme chose': researching and theorising the new, new technologies , 2014 .
[35] Anita Whiting,et al. Why people use social media: a uses and gratifications approach , 2013 .
[36] A. Ladkin,et al. In Search of Employment: Online Technologies and Polish Migrants , 2013 .
[37] Paul Schrodt. Content Relevance and Students' Comfort with Disclosure as Moderators of Instructor Disclosures and Credibility in the College Classroom , 2013 .
[38] Eszter Hargittai,et al. New Strategies for Employment? Internet Skills and Online Privacy Practices during People's Job Search , 2013, IEEE Security & Privacy.
[39] Norman M. Sadeh,et al. Expectation and purpose: understanding users' mental models of mobile app privacy through crowdsourcing , 2012, UbiComp.
[40] E. Litt. Knock, Knock. Who's There? The Imagined Audience , 2012 .
[41] D. Boyd,et al. CRITICAL QUESTIONS FOR BIG DATA , 2012 .
[42] Victoria L. Crittenden,et al. The use of social media: an exploratory study of usage among digital natives , 2012 .
[43] H. Nissenbaum. A Contextual Approach to Privacy Online , 2011, Daedalus.
[44] Kirstie Ball,et al. Electronic Monitoring and Surveillance in Call Centres: A Framework for Investigation , 2011 .
[45] Dan-Olof Rooth,et al. The role of automatic obesity stereotypes in real hiring discrimination. , 2011, The Journal of applied psychology.
[46] R. Zachary Finney,et al. Experience, Comfort, and Privacy Concerns: Antecedents of Online Spending , 2011 .
[47] Cliff Lampe,et al. Connection strategies: Social capital implications of Facebook-enabled communication practices , 2011, New Media Soc..
[48] Anabel Quan-Haase,et al. Uses and Gratifications of Social Media: A Comparison of Facebook and Instant Messaging , 2010 .
[49] Michele M. Dornisch,et al. When is trust not enough? The role of perceived privacy of communication tools in comfort with self-disclosure , 2010, Comput. Hum. Behav..
[50] Alice E. Marwick,et al. Youth, Privacy and Reputation (Literature Review) , 2010 .
[51] Simone de Colle,et al. Stakeholder Theory: The State of the Art , 2010 .
[52] Simone de Colle,et al. Stakeholder Theory* , 2010, The Cambridge Handbook of Stakeholder Theory.
[53] George R. Milne,et al. Gender Differences in Privacy-Related Measures for Young Adult Facebook Users , 2010 .
[54] R. Freeman. Strategic Management: A Stakeholder Approach , 2010 .
[55] Wei-Chi Tsai,et al. Does Image Matter to Different Job Applicants? The Influences of Corporate Image and Applicant Individual Differences on Organizational Attractiveness , 2010 .
[56] Leigh Anne Clark,et al. Employer’s Use of Social Networking Sites: A Socially Irresponsible Practice , 2010 .
[57] E. Hargittai. Digital Na(t)ives? Variation in Internet Skills and Uses among Members of the “Net Generation”* , 2010 .
[58] Hairong Li,et al. Consumer Privacy Concerns and Preference for Degree of Regulatory Control , 2009 .
[59] Bernhard Debatin,et al. Facebook and Online Privacy: Attitudes, Behaviors, and Unintended Consequences , 2009, J. Comput. Mediat. Commun..
[60] A. Ryan,et al. Hiring Discrimination Against Arab Minorities: Interactions Between Prejudice and Job Characteristics , 2009 .
[61] J. Palfrey,et al. Born digital: understanding the first generation of digital natives , 2009, Choice Reviews Online.
[62] Seounmi Youn,et al. Gender and Online Privacy among Teens: Risk Perception, Privacy Concerns, and Protection Behaviors , 2008, Cyberpsychology Behav. Soc. Netw..
[63] M. Philp,et al. Intrusions , 2020, Structural Geology: A Quantitative Introduction.
[64] N. Sartorius,et al. Understanding the stigma of mental illness , 2008 .
[65] Heather Richter Lipford,et al. Understanding Privacy Settings in Facebook with an Audience View , 2008, UPSEC.
[66] Katherine A. Karl,et al. Social Networking Profiles: An Examination of Student Attitudes Regarding Use and Appropriateness of Content , 2008, Cyberpsychology Behav. Soc. Netw..
[67] Wayne Visser,et al. The A to Z of Corporate Social Responsibility: A Complete Reference Guide to Concepts, Codes and Organisations , 2008 .
[68] Cliff Lampe,et al. The Benefits of Facebook "Friends: " Social Capital and College Students' Use of Online Social Network Sites , 2007, J. Comput. Mediat. Commun..
[69] Tamara Dinev,et al. An Extended Privacy Calculus Model for E-Commerce Transactions , 2006, Inf. Syst. Res..
[70] Stuart Dillon,et al. Perceived Risk, the Internet Shopping Experience and Online Purchasing Behavior: A New Zealand Perspective , 2005, J. Glob. Inf. Manag..
[71] Ellen Garbarino,et al. GENDER DIFFERENCES IN THE PERCEIVED RISK OF BUYING ONLINE AND THE EFFECTS OF RECEIVING A SITE RECOMMENDATION , 2004 .
[72] P. Petit,et al. Hiring discrimination: a field experiment in the French financial sector , 2004 .
[73] Brett J. O’Hara. Twice Penalized , 2004 .
[74] S. Livingstone. Media Literacy and the Challenge of New Information and Communication Technologies , 2004 .
[75] S. Forsythe,et al. Consumer patronage and risk perceptions in Internet shopping , 2003 .
[76] W. Gouvier,et al. Patterns of discrimination in hiring job applicants with disabilities: The role of disability type, job complexity, and public contact. , 2003 .
[77] Deborah F. Spake,et al. Consumer Comfort in Service Relationships , 2003 .
[78] A. Ryan,et al. Antecedents and Potential Moderators of the Relationship Between Attitudes and Hiring Discrimination on the Basis of Sexual Orientation , 2003 .
[79] Kevin Morrell,et al. The Ethical Business: Challenges and Controversies , 2002 .
[80] Albert H. Segars,et al. An Empirical Examination of the Concern for Information Privacy Instrument , 2002, Inf. Syst. Res..
[81] Kim Sheehan,et al. Toward a Typology of Internet Users and Online Privacy Concerns , 2002, Inf. Soc..
[82] I. Jawahar,et al. Toward a Descriptive Stakeholder Theory: an Organizational Life Cycle Approach , 2001 .
[83] D. Turban,et al. Corporate Social Performance As a Competitive Advantage in Attracting a Quality Workforce , 2000 .
[84] Kevin Gibson,et al. The Moral Basis of Stakeholder Theory , 2000 .
[85] C. K. Mertz,et al. Gender, race, and perceived risk: The 'white male' effect , 2000 .
[86] Peter Bain,et al. Entrapped by the 'electronic panopticon'? worker resistance in the call centre , 2000 .
[87] Mark S. Ackerman,et al. Beyond Concern: Understanding Net Users' Attitudes About Online Privacy , 1999, ArXiv.
[88] A. Wicks,et al. Convergent Stakeholder Theory , 1999 .
[89] Daniel B. Turban,et al. Corporate Social Performance And Organizational Attractiveness To Prospective Employees , 1997 .
[90] A. Gandini,et al. Social Recruiting: Control and Surveillance in a Digitised Job Market , 2018 .
[91] M. N. Ravishankar,et al. The Perils and Promises of Self-Disclosure on Social Media , 2017, Information Systems Frontiers.
[92] Anatoliy A. Gruzd,et al. You're Hired: Examining Acceptance of Social Media Screening of Job Applicants , 2017, AMCIS.
[93] H. Kennedy. Post, Mine, Repeat , 2016 .
[94] T. C. Oshima,et al. All Possible Regressions Using IBM SPSS: A Practitioner’s Guide to Automatic Linear Modeling , 2016 .
[95] Babajide Osatuyi,et al. Empirical Examination of Information Privacy Concerns Instrument in the Social Media Context , 2015, AIS Trans. Replication Res..
[96] Anitha Chennamaneni,et al. Communication Privacy Management and Self-Disclosure on Social Media - A Case of Facebook , 2015, AMCIS.
[97] Jing Zhang,et al. Gender Differences in the Effect of Privacy on Location-Based Services Use on Mobile Phones , 2014, AMCIS.
[98] Jun Heo,et al. Visiting theories that predict college students' self-disclosure on Facebook , 2014, Comput. Hum. Behav..
[99] Hongwei Yang,et al. The Case for Being Automatic: Introducing the Automatic Linear Modeling (LINEAR) Procedure in SPSS Statistics , 2013 .
[100] Dear Mr Sotiropoulos. ARTICLE 29 Data Protection Working Party , 2013 .
[101] Brenda L. Berkelaar. Cyber-vetting: Exploring the implications of online information for career capital and human capital decisions , 2010 .
[102] Joshua Fogel,et al. Internet social network communities: Risk taking, trust, and privacy concerns , 2009, Comput. Hum. Behav..
[103] B. Kirsh,et al. Understanding the stigma of mental illness in employment. , 2009, Work.
[104] Judy Drennan,et al. Privacy, Risk Perception, and Expert Online Behavior: An Exploratory Study of Household End Users , 2006, J. Organ. End User Comput..
[105] Alessandro Acquisti,et al. Privacy and rationality in individual decision making , 2005, IEEE Security & Privacy.
[106] Robert Tolksdorf,et al. The Impact of Semantic Web Technologies on Job Recruitment Processes , 2005, Wirtschaftsinformatik.
[107] Kevin Morrell,et al. The ethical business , 2003 .
[108] Dianna L. Stone,et al. A multiple stakeholder model of privacy in organizations , 1998 .
[109] L. Preston,et al. The Stakeholder Theory of the Corporation: Concepts, Evidence, and Implications , 1995 .
[110] M. Clarkson. A Stakeholder Framework for Analyzing and Evaluating Corporate Social Performance , 1995 .
[111] Robin M. Kowalski,et al. Impression management: A literature review and two-component model. , 1990 .
[112] E. Goffman. The Presentation of Self in Everyday Life , 1959 .