Cybervetting job applicants on social media: the new normal?
暂无分享,去创建一个
[1] Wei-Chi Tsai,et al. Does Image Matter to Different Job Applicants? The Influences of Corporate Image and Applicant Individual Differences on Organizational Attractiveness , 2010 .
[2] Nora A Draper,et al. From Privacy Pragmatist to Privacy Resigned: Challenging Narratives of Rational Choice in Digital Privacy Debates , 2017 .
[3] Alain Yee-Loong Chong,et al. An updated and expanded assessment of PLS-SEM in information systems research , 2017, Ind. Manag. Data Syst..
[4] Paul Schrodt. Content Relevance and Students' Comfort with Disclosure as Moderators of Instructor Disclosures and Credibility in the College Classroom , 2013 .
[5] E. Hargittai. Digital Na(t)ives? Variation in Internet Skills and Uses among Members of the “Net Generation”* , 2010 .
[6] Kim Sheehan,et al. Toward a Typology of Internet Users and Online Privacy Concerns , 2002, Inf. Soc..
[7] Stuart Dillon,et al. Perceived Risk, the Internet Shopping Experience and Online Purchasing Behavior: A New Zealand Perspective , 2005, J. Glob. Inf. Manag..
[8] Hairong Li,et al. Consumer Privacy Concerns and Preference for Degree of Regulatory Control , 2009 .
[9] Ellen Garbarino,et al. GENDER DIFFERENCES IN THE PERCEIVED RISK OF BUYING ONLINE AND THE EFFECTS OF RECEIVING A SITE RECOMMENDATION , 2004 .
[10] Victoria L. Crittenden,et al. The use of social media: an exploratory study of usage among digital natives , 2012 .
[11] Jacquelyn A. Burkell,et al. Display and control in online social spaces: Towards a typology of users , 2018, New Media Soc..
[12] S. Forsythe,et al. Consumer patronage and risk perceptions in Internet shopping , 2003 .
[13] Jun Heo,et al. Visiting theories that predict college students' self-disclosure on Facebook , 2014, Comput. Hum. Behav..
[14] Judy Drennan,et al. Privacy, Risk Perception, and Expert Online Behavior: An Exploratory Study of Household End Users , 2006, J. Organ. End User Comput..
[15] Eszter Hargittai,et al. Privacy Management on Facebook: Do Device Type and Location of Posting Matter? , 2015 .
[16] Joshua Fogel,et al. Internet social network communities: Risk taking, trust, and privacy concerns , 2009, Comput. Hum. Behav..
[17] W. Gouvier,et al. Patterns of discrimination in hiring job applicants with disabilities: The role of disability type, job complexity, and public contact. , 2003 .
[18] Luke Stark,et al. The emotional context of information privacy , 2016, Inf. Soc..
[19] H. Kennedy. Post, Mine, Repeat , 2016 .
[20] Susanne Almgren,et al. ‘Let’s Get Them Involved’ . . . to Some Extent: Analyzing Online News Participation , 2015 .
[21] Seounmi Youn,et al. Gender and Online Privacy among Teens: Risk Perception, Privacy Concerns, and Protection Behaviors , 2008, Cyberpsychology Behav. Soc. Netw..
[22] Natalya N. Bazarova,et al. Self‐Disclosure in Social Media: Extending the Functional Approach to Disclosure Motivations and Characteristics on Social Network Sites , 2014 .
[23] Katherine A. Karl,et al. Social Networking Profiles: An Examination of Student Attitudes Regarding Use and Appropriateness of Content , 2008, Cyberpsychology Behav. Soc. Netw..
[24] Albert H. Segars,et al. An Empirical Examination of the Concern for Information Privacy Instrument , 2002, Inf. Syst. Res..
[25] Peter Bain,et al. Entrapped by the 'electronic panopticon'? worker resistance in the call centre , 2000 .
[26] Babajide Osatuyi,et al. Empirical Examination of Information Privacy Concerns Instrument in the Social Media Context , 2015, AIS Trans. Replication Res..
[27] M. Clarkson. A Stakeholder Framework for Analyzing and Evaluating Corporate Social Performance , 1995 .
[28] Valérie-Inés de La Ville. Young people as company stakeholders? Moving beyond CSR ... , 2014 .
[29] George R. Milne,et al. Gender Differences in Privacy-Related Measures for Young Adult Facebook Users , 2010 .
[30] Mark S. Ackerman,et al. Beyond Concern: Understanding Net Users' Attitudes About Online Privacy , 1999, ArXiv.
[31] Clay Posey,et al. Job Applicants' Information Privacy Protection Responses: Using Social Media for Candidate Screening , 2016, AIS Trans. Hum. Comput. Interact..
[32] Simone de Colle,et al. Stakeholder Theory: The State of the Art , 2010 .
[33] Nick Couldry,et al. Big Data from the bottom up , 2014, Big Data Soc..
[34] Eszter Hargittai,et al. “What Can I Really Do?” Explaining the Privacy Paradox with Online Apathy , 2016 .
[35] Bree McEwan,et al. Passwords for jobs: Compression of identity in reaction to perceived organizational control via social media surveillance , 2018, New Media Soc..
[36] Leigh Anne Clark,et al. Employer’s Use of Social Networking Sites: A Socially Irresponsible Practice , 2010 .
[37] Cliff Lampe,et al. The Benefits of Facebook "Friends: " Social Capital and College Students' Use of Online Social Network Sites , 2007, J. Comput. Mediat. Commun..
[38] Simon M. Burnett,et al. The Impact of the Cessation of Blogs within the UK Police Blogosphere , 2014 .
[39] Brett J. O’Hara. Twice Penalized , 2004 .
[40] Kirstie Ball,et al. Electronic Monitoring and Surveillance in Call Centres: A Framework for Investigation , 2011 .
[41] Michele M. Dornisch,et al. When is trust not enough? The role of perceived privacy of communication tools in comfort with self-disclosure , 2010, Comput. Hum. Behav..
[42] Robin M. Kowalski,et al. Impression management: A literature review and two-component model. , 1990 .
[43] Dan-Olof Rooth,et al. The role of automatic obesity stereotypes in real hiring discrimination. , 2011, The Journal of applied psychology.
[44] D. Boyd,et al. CRITICAL QUESTIONS FOR BIG DATA , 2012 .
[45] Ifeoma Ajunwa,et al. Limitless Worker Surveillance , 2016 .
[46] L. Preston,et al. The Stakeholder Theory of the Corporation: Concepts, Evidence, and Implications , 1995 .
[47] D. Turban,et al. Corporate Social Performance As a Competitive Advantage in Attracting a Quality Workforce , 2000 .
[48] C. K. Mertz,et al. Gender, race, and perceived risk: The 'white male' effect , 2000 .
[49] Shawn L. Berman,et al. Stakeholder Theory: Seeing the Field Through the Forest , 2019 .
[50] Paul McKellips. Knock, knock... , 2014, Lab Animal.
[51] James Weber. Understanding the Millennials’ Integrated Ethical Decision-Making Process: Assessing the Relationship Between Personal Values and Cognitive Moral Reasoning , 2019 .
[52] Priscilla M. Regan,et al. Ethical challenges of edtech, big data and personalized learning: twenty-first century student sorting and tracking , 2018, Ethics and Information Technology.
[53] Tamara Dinev,et al. An Extended Privacy Calculus Model for E-Commerce Transactions , 2006, Inf. Syst. Res..
[54] D. Malan,et al. The A to Z of corporate social responsibility , 2007 .
[55] Bernhard Debatin,et al. Facebook and Online Privacy: Attitudes, Behaviors, and Unintended Consequences , 2009, J. Comput. Mediat. Commun..
[56] P. Petit,et al. Hiring discrimination: a field experiment in the French financial sector , 2004 .
[57] Jens-Erik Mai,et al. Big data privacy: The datafication of personal information , 2016, Inf. Soc..
[58] J. Palfrey,et al. Born digital: understanding the first generation of digital natives , 2009, Choice Reviews Online.
[59] Kevin Morrell,et al. The Ethical Business: Challenges and Controversies , 2002 .
[60] N. Sartorius,et al. Understanding the stigma of mental illness , 2008 .
[61] Jenna Jacobson,et al. The State of Social Media in Canada 2017 , 2018, SSRN Electronic Journal.
[62] Ben L. Marder,et al. Hybrid Social Media: Employees’ Use of a Boundary‐Spanning Technology , 2018 .
[63] D. Howcroft,et al. 'Plus ca change, plus la meme chose': researching and theorising the new, new technologies , 2014 .
[64] M. N. Ravishankar,et al. The Perils and Promises of Self-Disclosure on Social Media , 2017, Information Systems Frontiers.
[65] A. Gruzd,et al. Employers’ Use of Young People’s Social Media: Extending Stakeholder Theory to Social Media Data , 2018, Academy of Management Proceedings.
[66] Cliff Lampe,et al. Connection strategies: Social capital implications of Facebook-enabled communication practices , 2011, New Media Soc..
[67] T. C. Oshima,et al. All Possible Regressions Using IBM SPSS: A Practitioner’s Guide to Automatic Linear Modeling , 2016 .
[68] Eszter Hargittai,et al. New Strategies for Employment? Internet Skills and Online Privacy Practices during People's Job Search , 2013, IEEE Security & Privacy.
[69] Anatoliy A. Gruzd,et al. You're Hired: Examining Acceptance of Social Media Screening of Job Applicants , 2017, AMCIS.
[70] Anitha Chennamaneni,et al. Communication Privacy Management and Self-Disclosure on Social Media - A Case of Facebook , 2015, AMCIS.
[71] A. Gandini,et al. Social Recruiting: Control and Surveillance in a Digitised Job Market , 2018 .
[72] A. Ladkin,et al. In Search of Employment: Online Technologies and Polish Migrants , 2013 .
[73] Anabel Quan-Haase,et al. Uses and Gratifications of Social Media: A Comparison of Facebook and Instant Messaging , 2010 .
[74] D. Turban,et al. Corporate Social Performance And Organizational Attractiveness To Prospective Employees , 1997 .
[75] A. Wicks,et al. Convergent Stakeholder Theory , 1999 .
[76] I. Jawahar,et al. Toward a Descriptive Stakeholder Theory: an Organizational Life Cycle Approach , 2001 .
[77] Jing Zhang,et al. Gender Differences in the Effect of Privacy on Location-Based Services Use on Mobile Phones , 2014, AMCIS.
[78] A. Ryan,et al. Antecedents and Potential Moderators of the Relationship Between Attitudes and Hiring Discrimination on the Basis of Sexual Orientation , 2003 .
[79] Wulf Loh,et al. A practice–theoretical account of privacy , 2018, Ethics and Information Technology.
[80] Alice E. Marwick,et al. Nothing to hide, nothing to lose? Incentives and disincentives to sharing information with institutions online , 2019 .
[81] Deborah F. Spake,et al. Consumer Comfort in Service Relationships , 2003 .
[82] Robert Tolksdorf,et al. The Impact of Semantic Web Technologies on Job Recruitment Processes , 2005, Wirtschaftsinformatik.
[83] Anita Whiting,et al. Why people use social media: a uses and gratifications approach , 2013 .
[84] Dear Mr Sotiropoulos. ARTICLE 29 Data Protection Working Party , 2013 .
[85] C. Lutz,et al. Privacy Concerns and Online Behavior – Not so Paradoxical after All? Viewing the Privacy Paradox Through Different Theoretical Lenses , 2014 .
[86] D. Scholarios,et al. ‘The Kids are Alert’: Generation Y Responses to Employer Use and Monitoring of Social Networking Sites , 2017 .
[87] Geoffrey S. Hubona,et al. Using PLS path modeling in new technology research: updated guidelines , 2016, Ind. Manag. Data Syst..
[88] Alecia M. Santuzzi,et al. Monitoring What and How: Psychological Implications of Electronic Performance Monitoring , 2015 .
[89] E. Litt. Knock, Knock. Who's There? The Imagined Audience , 2012 .
[90] B. Kirsh,et al. Understanding the stigma of mental illness in employment. , 2009, Work.
[91] Tat-Seng Chua,et al. Depression Detection via Harvesting Social Media: A Multimodal Dictionary Learning Solution , 2017, IJCAI.
[92] Kevin Gibson,et al. The Moral Basis of Stakeholder Theory , 2000 .
[93] R. Zachary Finney,et al. Experience, Comfort, and Privacy Concerns: Antecedents of Online Spending , 2011 .
[94] Elizabeth Dubois,et al. Journalists’ Use of Social Media to Infer Public Opinion: The Citizens’ Perspective , 2018, Social Science Computer Review.
[95] R. Freeman. Strategic Management: A Stakeholder Approach , 2010 .
[96] Dianna L. Stone,et al. A multiple stakeholder model of privacy in organizations , 1998 .
[97] Paula Helm. Treating sensitive topics online: a privacy dilemma , 2018, Ethics and Information Technology.
[98] A. Ryan,et al. Hiring Discrimination Against Arab Minorities: Interactions Between Prejudice and Job Characteristics , 2009 .
[99] Kevin Morrell,et al. The ethical business , 2003 .
[100] Alessandro Acquisti,et al. Privacy and rationality in individual decision making , 2005, IEEE Security & Privacy.
[101] Heather Richter Lipford,et al. Understanding Privacy Settings in Facebook with an Audience View , 2008, UPSEC.
[102] Norman M. Sadeh,et al. Expectation and purpose: understanding users' mental models of mobile app privacy through crowdsourcing , 2012, UbiComp.
[103] E. Goffman. The Presentation of Self in Everyday Life , 1959 .
[104] Annika Bergström,et al. Online privacy concerns: A broad approach to understanding the concerns of different groups for different uses , 2015, Comput. Hum. Behav..
[105] H. Nissenbaum. A Contextual Approach to Privacy Online , 2011, Daedalus.
[106] Hongwei Yang,et al. The Case for Being Automatic: Introducing the Automatic Linear Modeling (LINEAR) Procedure in SPSS Statistics , 2013 .
[107] Alice E. Marwick,et al. Youth, Privacy and Reputation (Literature Review) , 2010 .
[108] Brenda L. Berkelaar. Cyber-vetting: Exploring the implications of online information for career capital and human capital decisions , 2010 .
[109] Ming Cheung,et al. Privacy perception and protection on Chinese social media: a case study of WeChat , 2018, Ethics and Information Technology.
[110] S. Livingstone. Media Literacy and the Challenge of New Information and Communication Technologies , 2004 .