Screening Job Candidates With Social Media: A Manipulation of Disclosure Requests

In an attempt to find better employee organization fit, recruiters have turned to screening job candidates in part by reviewing their social media accounts. Job candidates may view these practices in a variety of ways, depending on the type of access requested and the individual characteristics of the job candidate. In this study, we measured changes in trust in the employer based on three increasingly intrusive disclosure requests and four individual characteristics. Findings from 162 participants suggest that a request for social media account logins reduces the trust in the employer, whereas collectivism, perceived privacy protection competence, and social media production increases trust in the employer. These findings have important implications for privacy research and for human resource screening practices.

[1]  Elena-Mădălina Vătămănescu,et al.  Facebook Usage as Social Screening. Exploring the Approach of Admissions Officers from Management Colleges , 2015 .

[2]  T. Nichols,et al.  Trust, Employer Exposure and the Employment Relation , 2009 .

[3]  K. MacKay,et al.  Social media usage in hotel human resources: recruitment, hiring and communication. , 2015 .

[4]  Straub,et al.  Editor's Comments: An Update and Extension to SEM Guidelines for Administrative and Social Science Research , 2011 .

[5]  Kun Chang Lee,et al.  Investigating the moderating role of uncertainty avoidance cultural values on multidimensional online trust , 2012, Inf. Manag..

[6]  J. J. Dahlgaard,et al.  A causal model for employee satisfaction , 2000 .

[7]  E. D. Vaughn,et al.  The Writing on the (Facebook) Wall: The Use of Social Networking Sites in Hiring Decisions , 2011 .

[8]  D. Ferrin,et al.  The Role of Trust in Organizational Settings , 2001 .

[9]  I. Yang,et al.  Applicant impression management in job interview: The moderating role of interviewer affectivity , 2010 .

[10]  Robert S. Feldman,et al.  Looking Good and Lying to Do It: Deception as an Impression Management Strategy in Job Interviews , 2006 .

[11]  Jui Ramaprasad,et al.  Social Media, Traditional Media, and Music Sales , 2014, MIS Q..

[12]  Jeff Bohler,et al.  Building Trust through Social Networking , 2017, AMCIS.

[13]  R. W. Rogers,et al.  A Protection Motivation Theory of Fear Appeals and Attitude Change1. , 1975, The Journal of psychology.

[14]  Seounmi Youn Determinants of Online Privacy Concern and Its Influence on Privacy Protection Behaviors Among Young Adolescents , 2009 .

[15]  Mark Srite,et al.  The Role of Espoused National Cultural Values in Technology Acceptance , 2006, MIS Q..

[16]  David De Cremer,et al.  The effects of trust in authority and procedural fairness on cooperation. , 2007, The Journal of applied psychology.

[17]  Albert H. Segars,et al.  An Empirical Examination of the Concern for Information Privacy Instrument , 2002, Inf. Syst. Res..

[18]  Peter A. Rosen,et al.  Social Networking Websites, Personality Ratings, and the Organizational Context: More Than Meets the Eye?1 , 2012 .

[19]  Starling David Hunter,et al.  Pricing Banner Advertisements in a Social Network of Political Weblogs , 2011 .

[20]  Wynne W. Chin,et al.  Handbook of Partial Least Squares , 2010 .

[21]  David Godes,et al.  Introduction to the Special Issue - Social Media and Business Transformation: A Framework for Research , 2013, Inf. Syst. Res..

[22]  Parbudyal Singh,et al.  In justice we trust: A model of the role of trust in the organization in applicant reactions to the selection process , 2008 .

[23]  Christopher P. Furner,et al.  Making it Hard to Lie: Cultural Determinants of Media Choice for Deception , 2009 .

[24]  Jochen Wirtz,et al.  Sifting to efficiently select the right service employees , 2014 .

[25]  Yuan Li,et al.  Theories in online information privacy research: A critical review and an integrated framework , 2012, Decis. Support Syst..

[26]  Lynn Wu,et al.  Social Network Effects on Productivity and Job Security: Evidence from the Adoption of a Social Networking Tool , 2012, Inf. Syst. Res..

[27]  Joey F. George,et al.  Cultural determinants of media choice for deception , 2012, Comput. Hum. Behav..

[28]  Varun Grover,et al.  Knowing your customers: Using a reciprocal relationship to enhance voluntary information disclosure , 2010, Decis. Support Syst..

[29]  Joseph P. Cannon,et al.  Understanding the Influence of National Culture on the Development of Trust , 1998 .

[30]  J. Webster,et al.  The Use of Technologies in the Recruiting, Screening, and Selection Processes for Job Candidates , 2003 .

[31]  Paul Benjamin Lowry,et al.  Limited Information and Quick Decisions: Consumer Privacy Calculus for Mobile Applications , 2016, AIS Trans. Hum. Comput. Interact..

[32]  M. Culnan,et al.  Information Privacy Concerns, Procedural Fairness, and Impersonal Trust: An Empirical Investigation , 1999 .

[33]  Paul E. Spector,et al.  Methodological Urban Legends: The Misuse of Statistical Control Variables , 2011 .

[34]  Sung S. Kim,et al.  Internet Users' Information Privacy-Protective Responses: A Taxonomy and a Nomological Model , 2008, MIS Q..

[35]  T. Das,et al.  Between Trust and Control: Developing Confidence in Partner Cooperation in Alliances , 1998 .

[36]  Tomoki Sekiguchi,et al.  PERSON-ORGANIZATION FIT AND PERSON-JOB FIT IN EMPLOYEE SELECTION: A REVIEW OF THE LITERATURE , 2004 .

[37]  Jeffrey R. Edwards,et al.  The sources and accuracy of job applicants' beliefs about organizational culture. , 2000 .

[38]  S. Hunt,et al.  The Commitment-Trust Theory of Relationship Marketing , 1994 .

[39]  Fred A. Mael,et al.  NONE OF YOUR BUSINESS: PARAMETERS OF BIODATA INVASIVENESS , 1996 .

[40]  Tamara Dinev,et al.  An Extended Privacy Calculus Model for E-Commerce Transactions , 2006, Inf. Syst. Res..

[41]  Detmar W. Straub,et al.  An Update and Extension to SEM Guidelines for Admnistrative and Social Science Research , 2011 .

[42]  Mark Harcourt,et al.  Online social networks: an emergent recruiter tool for attracting and screening , 2013 .

[43]  Kristy J. Lauver,et al.  Distinguishing between Employees' Perceptions of Person-Job and Person-Organization Fit. , 2001 .

[44]  D. Ferrin,et al.  Trust in leadership: meta-analytic findings and implications for research and practice. , 2002, The Journal of applied psychology.

[45]  Paul Michael Di Gangi,et al.  Using Social Media to Support Presentation Skill Development in Traditional Classroom Environments , 2017, J. Organ. End User Comput..

[46]  N. L. Chervany,et al.  Initial Trust Formation in New Organizational Relationships , 1998 .

[47]  Paul A. Pavlou,et al.  Consumer Acceptance of Electronic Commerce: Integrating Trust and Risk with the Technology Acceptance Model , 2003, Int. J. Electron. Commer..

[48]  Zhen Zhu,et al.  A multinational study of espoused national cultural and review characteristics in the formation of trust in online product reviews , 2014, Int. J. Serv. Technol. Manag..

[49]  Todd A. Mooradian,et al.  Who Trusts? Personality, Trust and Knowledge Sharing , 2006 .

[50]  D. Gefen,et al.  E-commerce: the role of familiarity and trust , 2000 .

[51]  J. Rotter Generalized expectancies for interpersonal trust. , 1971 .

[52]  Detmar W. Straub,et al.  Specifying Formative Constructs in Information Systems Research , 2007, MIS Q..

[53]  Wayne D. Hoyer,et al.  Source credibility, information favorability, and job offer acceptance , 1979 .

[54]  Saonee Sarker,et al.  The Role of Communication and Trust in Global Virtual Teams: A Social Network Perspective , 2011, J. Manag. Inf. Syst..

[55]  Richard L. Divine,et al.  Adolescents' Concern for Privacy When Using the Internet: An Empirical Analysis of Predictors and Relationships With Privacy‐Protecting Behaviors , 2007 .

[56]  Robert E. Crossler,et al.  Privacy in the Digital Age: A Review of Information Privacy Research in Information Systems , 2011, MIS Q..

[57]  Soumitra Dutta,et al.  What's your personal social media strategy? , 2010, Harvard business review.

[58]  Brent A. Scott,et al.  Trust, trustworthiness, and trust propensity: a meta-analytic test of their unique relationships with risk taking and job performance. , 2007, The Journal of applied psychology.

[59]  M. Ziegler,et al.  New perspectives on faking in personality assessment. , 2011 .

[60]  William H. Ross,et al.  Should human resource managers use social media to screen job applicants? Managerial and legal issues in the USA , 2012 .

[61]  Michael A. Campion,et al.  Expected Practices in Background Checking: Review of the Human Resource Management Literature , 2009 .

[62]  An Examination of the Combined Effects of Realistic Job Previews, Job Attractiveness and Recruiter Affect on Job Acceptance Decisions , 1989 .

[63]  Ian Grant,et al.  Young Peoples' Relationships with Online Marketing Practices: An Intrusion Too Far? , 2005 .

[64]  John R. Drake,et al.  Asking for Facebook Logins: An Egoist Case for Privacy , 2015, Journal of Business Ethics.

[65]  Sandra W. DeGrassi,et al.  What you see may not be what you get: relationships among self-presentation tactics and ratings of interview and job performance. , 2009, The Journal of applied psychology.

[66]  Charles J. Kacmar,et al.  Developing and Validating Trust Measures for e-Commerce: An Integrative Typology , 2002, Inf. Syst. Res..

[67]  William P. Smith,et al.  You've been tagged! (Then again, maybe not): Employers and Facebook , 2010 .

[68]  C. Johnson-George,et al.  Measurement of specific interpersonal trust: Construction and validation of a scale to assess trust in a specific other. , 1982 .

[69]  Clay Posey,et al.  Job Applicants' Information Privacy Protection Responses: Using Social Media for Candidate Screening , 2016, AIS Trans. Hum. Comput. Interact..

[70]  S. Robinson Trust and Breach of the Psychological Contract , 1996 .

[71]  A. Kristof-brown,et al.  PERCEIVED APPLICANT FIT: DISTINGUISHING BETWEEN RECRUITERS' PERCEPTIONS OF PERSON-JOB AND PERSON-ORGANIZATION FIT , 2000 .

[72]  Rudolf R. Sinkovics,et al.  The Use of Partial Least Squares Path Modeling in International Marketing , 2009 .

[73]  J. Sampson,et al.  Ethical Issues in the Design and Use of Internet-Based Career Assessment , 2000 .