Cybervetting job applicants on social media: the new normal?

With the introduction of new information communication technologies, employers are increasingly engaging in social media screening, also known as cybervetting, as part of their hiring process. Our research, using an online survey with 482 participants, investigates young people’s concerns with their publicly available social media data being used in the context of job hiring. Grounded in stakeholder theory, we analyze the relationship between young people’s concerns with social media screening and their gender, job seeking status, privacy concerns, and social media use. We find that young people are generally not comfortable with social media screening. A key finding of this research is that concern for privacy for public information on social media cannot be fully explained by some “traditional” variables in privacy research. The research extends stakeholder theory to identify how social media data ethics should be inextricably linked to organizational practices. The findings have theoretical implications for a rich conceptualization of stakeholders in an age of social media and practical implications for organizations engaging in cybervetting.

[1]  Wei-Chi Tsai,et al.  Does Image Matter to Different Job Applicants? The Influences of Corporate Image and Applicant Individual Differences on Organizational Attractiveness , 2010 .

[2]  Nora A Draper,et al.  From Privacy Pragmatist to Privacy Resigned: Challenging Narratives of Rational Choice in Digital Privacy Debates , 2017 .

[3]  Alain Yee-Loong Chong,et al.  An updated and expanded assessment of PLS-SEM in information systems research , 2017, Ind. Manag. Data Syst..

[4]  Paul Schrodt Content Relevance and Students' Comfort with Disclosure as Moderators of Instructor Disclosures and Credibility in the College Classroom , 2013 .

[5]  E. Hargittai Digital Na(t)ives? Variation in Internet Skills and Uses among Members of the “Net Generation”* , 2010 .

[6]  Kim Sheehan,et al.  Toward a Typology of Internet Users and Online Privacy Concerns , 2002, Inf. Soc..

[7]  Stuart Dillon,et al.  Perceived Risk, the Internet Shopping Experience and Online Purchasing Behavior: A New Zealand Perspective , 2005, J. Glob. Inf. Manag..

[8]  Hairong Li,et al.  Consumer Privacy Concerns and Preference for Degree of Regulatory Control , 2009 .

[9]  Ellen Garbarino,et al.  GENDER DIFFERENCES IN THE PERCEIVED RISK OF BUYING ONLINE AND THE EFFECTS OF RECEIVING A SITE RECOMMENDATION , 2004 .

[10]  Victoria L. Crittenden,et al.  The use of social media: an exploratory study of usage among digital natives , 2012 .

[11]  Jacquelyn A. Burkell,et al.  Display and control in online social spaces: Towards a typology of users , 2018, New Media Soc..

[12]  S. Forsythe,et al.  Consumer patronage and risk perceptions in Internet shopping , 2003 .

[13]  Jun Heo,et al.  Visiting theories that predict college students' self-disclosure on Facebook , 2014, Comput. Hum. Behav..

[14]  Judy Drennan,et al.  Privacy, Risk Perception, and Expert Online Behavior: An Exploratory Study of Household End Users , 2006, J. Organ. End User Comput..

[15]  Eszter Hargittai,et al.  Privacy Management on Facebook: Do Device Type and Location of Posting Matter? , 2015 .

[16]  Joshua Fogel,et al.  Internet social network communities: Risk taking, trust, and privacy concerns , 2009, Comput. Hum. Behav..

[17]  W. Gouvier,et al.  Patterns of discrimination in hiring job applicants with disabilities: The role of disability type, job complexity, and public contact. , 2003 .

[18]  Luke Stark,et al.  The emotional context of information privacy , 2016, Inf. Soc..

[19]  H. Kennedy Post, Mine, Repeat , 2016 .

[20]  Susanne Almgren,et al.  ‘Let’s Get Them Involved’ . . . to Some Extent: Analyzing Online News Participation , 2015 .

[21]  Seounmi Youn,et al.  Gender and Online Privacy among Teens: Risk Perception, Privacy Concerns, and Protection Behaviors , 2008, Cyberpsychology Behav. Soc. Netw..

[22]  Natalya N. Bazarova,et al.  Self‐Disclosure in Social Media: Extending the Functional Approach to Disclosure Motivations and Characteristics on Social Network Sites , 2014 .

[23]  Katherine A. Karl,et al.  Social Networking Profiles: An Examination of Student Attitudes Regarding Use and Appropriateness of Content , 2008, Cyberpsychology Behav. Soc. Netw..

[24]  Albert H. Segars,et al.  An Empirical Examination of the Concern for Information Privacy Instrument , 2002, Inf. Syst. Res..

[25]  Peter Bain,et al.  Entrapped by the 'electronic panopticon'? worker resistance in the call centre , 2000 .

[26]  Babajide Osatuyi,et al.  Empirical Examination of Information Privacy Concerns Instrument in the Social Media Context , 2015, AIS Trans. Replication Res..

[27]  M. Clarkson A Stakeholder Framework for Analyzing and Evaluating Corporate Social Performance , 1995 .

[28]  Valérie-Inés de La Ville Young people as company stakeholders? Moving beyond CSR ... , 2014 .

[29]  George R. Milne,et al.  Gender Differences in Privacy-Related Measures for Young Adult Facebook Users , 2010 .

[30]  Mark S. Ackerman,et al.  Beyond Concern: Understanding Net Users' Attitudes About Online Privacy , 1999, ArXiv.

[31]  Clay Posey,et al.  Job Applicants' Information Privacy Protection Responses: Using Social Media for Candidate Screening , 2016, AIS Trans. Hum. Comput. Interact..

[32]  Simone de Colle,et al.  Stakeholder Theory: The State of the Art , 2010 .

[33]  Nick Couldry,et al.  Big Data from the bottom up , 2014, Big Data Soc..

[34]  Eszter Hargittai,et al.  “What Can I Really Do?” Explaining the Privacy Paradox with Online Apathy , 2016 .

[35]  Bree McEwan,et al.  Passwords for jobs: Compression of identity in reaction to perceived organizational control via social media surveillance , 2018, New Media Soc..

[36]  Leigh Anne Clark,et al.  Employer’s Use of Social Networking Sites: A Socially Irresponsible Practice , 2010 .

[37]  Cliff Lampe,et al.  The Benefits of Facebook "Friends: " Social Capital and College Students' Use of Online Social Network Sites , 2007, J. Comput. Mediat. Commun..

[38]  Simon M. Burnett,et al.  The Impact of the Cessation of Blogs within the UK Police Blogosphere , 2014 .

[39]  Brett J. O’Hara Twice Penalized , 2004 .

[40]  Kirstie Ball,et al.  Electronic Monitoring and Surveillance in Call Centres: A Framework for Investigation , 2011 .

[41]  Michele M. Dornisch,et al.  When is trust not enough? The role of perceived privacy of communication tools in comfort with self-disclosure , 2010, Comput. Hum. Behav..

[42]  Robin M. Kowalski,et al.  Impression management: A literature review and two-component model. , 1990 .

[43]  Dan-Olof Rooth,et al.  The role of automatic obesity stereotypes in real hiring discrimination. , 2011, The Journal of applied psychology.

[44]  D. Boyd,et al.  CRITICAL QUESTIONS FOR BIG DATA , 2012 .

[45]  Ifeoma Ajunwa,et al.  Limitless Worker Surveillance , 2016 .

[46]  L. Preston,et al.  The Stakeholder Theory of the Corporation: Concepts, Evidence, and Implications , 1995 .

[47]  D. Turban,et al.  Corporate Social Performance As a Competitive Advantage in Attracting a Quality Workforce , 2000 .

[48]  C. K. Mertz,et al.  Gender, race, and perceived risk: The 'white male' effect , 2000 .

[49]  Shawn L. Berman,et al.  Stakeholder Theory: Seeing the Field Through the Forest , 2019 .

[50]  Paul McKellips Knock, knock... , 2014, Lab Animal.

[51]  James Weber Understanding the Millennials’ Integrated Ethical Decision-Making Process: Assessing the Relationship Between Personal Values and Cognitive Moral Reasoning , 2019 .

[52]  Priscilla M. Regan,et al.  Ethical challenges of edtech, big data and personalized learning: twenty-first century student sorting and tracking , 2018, Ethics and Information Technology.

[53]  Tamara Dinev,et al.  An Extended Privacy Calculus Model for E-Commerce Transactions , 2006, Inf. Syst. Res..

[54]  D. Malan,et al.  The A to Z of corporate social responsibility , 2007 .

[55]  Bernhard Debatin,et al.  Facebook and Online Privacy: Attitudes, Behaviors, and Unintended Consequences , 2009, J. Comput. Mediat. Commun..

[56]  P. Petit,et al.  Hiring discrimination: a field experiment in the French financial sector , 2004 .

[57]  Jens-Erik Mai,et al.  Big data privacy: The datafication of personal information , 2016, Inf. Soc..

[58]  J. Palfrey,et al.  Born digital: understanding the first generation of digital natives , 2009, Choice Reviews Online.

[59]  Kevin Morrell,et al.  The Ethical Business: Challenges and Controversies , 2002 .

[60]  N. Sartorius,et al.  Understanding the stigma of mental illness , 2008 .

[61]  Jenna Jacobson,et al.  The State of Social Media in Canada 2017 , 2018, SSRN Electronic Journal.

[62]  Ben L. Marder,et al.  Hybrid Social Media: Employees’ Use of a Boundary‐Spanning Technology , 2018 .

[63]  D. Howcroft,et al.  'Plus ca change, plus la meme chose': researching and theorising the new, new technologies , 2014 .

[64]  M. N. Ravishankar,et al.  The Perils and Promises of Self-Disclosure on Social Media , 2017, Information Systems Frontiers.

[65]  A. Gruzd,et al.  Employers’ Use of Young People’s Social Media: Extending Stakeholder Theory to Social Media Data , 2018, Academy of Management Proceedings.

[66]  Cliff Lampe,et al.  Connection strategies: Social capital implications of Facebook-enabled communication practices , 2011, New Media Soc..

[67]  T. C. Oshima,et al.  All Possible Regressions Using IBM SPSS: A Practitioner’s Guide to Automatic Linear Modeling , 2016 .

[68]  Eszter Hargittai,et al.  New Strategies for Employment? Internet Skills and Online Privacy Practices during People's Job Search , 2013, IEEE Security & Privacy.

[69]  Anatoliy A. Gruzd,et al.  You're Hired: Examining Acceptance of Social Media Screening of Job Applicants , 2017, AMCIS.

[70]  Anitha Chennamaneni,et al.  Communication Privacy Management and Self-Disclosure on Social Media - A Case of Facebook , 2015, AMCIS.

[71]  A. Gandini,et al.  Social Recruiting: Control and Surveillance in a Digitised Job Market , 2018 .

[72]  A. Ladkin,et al.  In Search of Employment: Online Technologies and Polish Migrants , 2013 .

[73]  Anabel Quan-Haase,et al.  Uses and Gratifications of Social Media: A Comparison of Facebook and Instant Messaging , 2010 .

[74]  D. Turban,et al.  Corporate Social Performance And Organizational Attractiveness To Prospective Employees , 1997 .

[75]  A. Wicks,et al.  Convergent Stakeholder Theory , 1999 .

[76]  I. Jawahar,et al.  Toward a Descriptive Stakeholder Theory: an Organizational Life Cycle Approach , 2001 .

[77]  Jing Zhang,et al.  Gender Differences in the Effect of Privacy on Location-Based Services Use on Mobile Phones , 2014, AMCIS.

[78]  A. Ryan,et al.  Antecedents and Potential Moderators of the Relationship Between Attitudes and Hiring Discrimination on the Basis of Sexual Orientation , 2003 .

[79]  Wulf Loh,et al.  A practice–theoretical account of privacy , 2018, Ethics and Information Technology.

[80]  Alice E. Marwick,et al.  Nothing to hide, nothing to lose? Incentives and disincentives to sharing information with institutions online , 2019 .

[81]  Deborah F. Spake,et al.  Consumer Comfort in Service Relationships , 2003 .

[82]  Robert Tolksdorf,et al.  The Impact of Semantic Web Technologies on Job Recruitment Processes , 2005, Wirtschaftsinformatik.

[83]  Anita Whiting,et al.  Why people use social media: a uses and gratifications approach , 2013 .

[84]  Dear Mr Sotiropoulos ARTICLE 29 Data Protection Working Party , 2013 .

[85]  C. Lutz,et al.  Privacy Concerns and Online Behavior – Not so Paradoxical after All? Viewing the Privacy Paradox Through Different Theoretical Lenses , 2014 .

[86]  D. Scholarios,et al.  ‘The Kids are Alert’: Generation Y Responses to Employer Use and Monitoring of Social Networking Sites , 2017 .

[87]  Geoffrey S. Hubona,et al.  Using PLS path modeling in new technology research: updated guidelines , 2016, Ind. Manag. Data Syst..

[88]  Alecia M. Santuzzi,et al.  Monitoring What and How: Psychological Implications of Electronic Performance Monitoring , 2015 .

[89]  E. Litt Knock, Knock. Who's There? The Imagined Audience , 2012 .

[90]  B. Kirsh,et al.  Understanding the stigma of mental illness in employment. , 2009, Work.

[91]  Tat-Seng Chua,et al.  Depression Detection via Harvesting Social Media: A Multimodal Dictionary Learning Solution , 2017, IJCAI.

[92]  Kevin Gibson,et al.  The Moral Basis of Stakeholder Theory , 2000 .

[93]  R. Zachary Finney,et al.  Experience, Comfort, and Privacy Concerns: Antecedents of Online Spending , 2011 .

[94]  Elizabeth Dubois,et al.  Journalists’ Use of Social Media to Infer Public Opinion: The Citizens’ Perspective , 2018, Social Science Computer Review.

[95]  R. Freeman Strategic Management: A Stakeholder Approach , 2010 .

[96]  Dianna L. Stone,et al.  A multiple stakeholder model of privacy in organizations , 1998 .

[97]  Paula Helm Treating sensitive topics online: a privacy dilemma , 2018, Ethics and Information Technology.

[98]  A. Ryan,et al.  Hiring Discrimination Against Arab Minorities: Interactions Between Prejudice and Job Characteristics , 2009 .

[99]  Kevin Morrell,et al.  The ethical business , 2003 .

[100]  Alessandro Acquisti,et al.  Privacy and rationality in individual decision making , 2005, IEEE Security & Privacy.

[101]  Heather Richter Lipford,et al.  Understanding Privacy Settings in Facebook with an Audience View , 2008, UPSEC.

[102]  Norman M. Sadeh,et al.  Expectation and purpose: understanding users' mental models of mobile app privacy through crowdsourcing , 2012, UbiComp.

[103]  E. Goffman The Presentation of Self in Everyday Life , 1959 .

[104]  Annika Bergström,et al.  Online privacy concerns: A broad approach to understanding the concerns of different groups for different uses , 2015, Comput. Hum. Behav..

[105]  H. Nissenbaum A Contextual Approach to Privacy Online , 2011, Daedalus.

[106]  Hongwei Yang,et al.  The Case for Being Automatic: Introducing the Automatic Linear Modeling (LINEAR) Procedure in SPSS Statistics , 2013 .

[107]  Alice E. Marwick,et al.  Youth, Privacy and Reputation (Literature Review) , 2010 .

[108]  Brenda L. Berkelaar Cyber-vetting: Exploring the implications of online information for career capital and human capital decisions , 2010 .

[109]  Ming Cheung,et al.  Privacy perception and protection on Chinese social media: a case study of WeChat , 2018, Ethics and Information Technology.

[110]  S. Livingstone Media Literacy and the Challenge of New Information and Communication Technologies , 2004 .