Abstract:This article addresses various ways that cybervetting recruiters (re)construct boundaries around the public–private division. Based on interviews with 37 recruiters in Sweden, we show how the practice of cybervetting is legitimised by the recruiters’ descriptions and accounts in relation to various notions of privacy and norms of information flow. We present this as a boundary work aided by especially two ways of framing information: the repertoire about accessible information and the repertoire of relevant in… Show more
“…Although there are now trends in legislation inhibiting organizations from requesting applicants' social media passwords to conduct screening, there is nothing preventing them from vetting whatever is available for the public to see (Davison et al, 2016; Kluemper, Davison, Cao, & Wu, 2015). In fact, a recent study of hiring managers revealed that they generally believe any personal information on the internet can be used to inform decisions, because the applicant has chosen not to keep that information private (Backman & Hedenus, 2019). However, this is a double‐edged sword for applicants because not posting “enough” information can be viewed as the applicant having something to hide or signaling a lack of technology‐related competency (e.g., Carr, 2016).…”
Section: Applicant Atcmentioning
confidence: 99%
“…Although similar recommendations have been made for cybervetting, the practice is largely unstandardized (e.g., Davison et al, 2016; Roth, Bobko, Van Iddekinge, & Thatcher, 2016) similar to unstructured interviews and resumé evaluation (Gatewood et al, 2008; Highhouse, 2002). One hiring manager who is screening an applicant's profile without any established criteria can have completely different perceptions compared to another manager assessing the same applicant but using their own criteria (Backman & Hedenus, 2019). This lack of standardization prevents consistent, reliable, and valid screening of an applicant's social media profile.…”
The present research describes the development and validation of a measure of job seekers' attitudes toward cybervetting (ATC). Study 1 involved a sample of participants completing an initial pool of items focusing on one platform (i.e., Facebook) and conducting an exploratory factor analysis. Study 2 included a confirmatory factor analysis and an exploratory structural equation model to establish convergent and discriminant validity. Results of both studies confirmed that the hypothesized three‐factor structure (perceived justice, privacy invasion, and face validity) provided a good fit to the data, explained over 67% of total variance, with all three factors demonstrating high internal consistencies. Study 3 examined the measurement equivalence of the ATC measure, and demonstrated its factor structure and reliability, across four social media platforms (Facebook, LinkedIn, Twitter, and Instagram). Comparing applicants' attitudes across platforms showed significantly more favorable perceptions toward LinkedIn‐based cybervetting than for the other three platforms.
“…Although there are now trends in legislation inhibiting organizations from requesting applicants' social media passwords to conduct screening, there is nothing preventing them from vetting whatever is available for the public to see (Davison et al, 2016; Kluemper, Davison, Cao, & Wu, 2015). In fact, a recent study of hiring managers revealed that they generally believe any personal information on the internet can be used to inform decisions, because the applicant has chosen not to keep that information private (Backman & Hedenus, 2019). However, this is a double‐edged sword for applicants because not posting “enough” information can be viewed as the applicant having something to hide or signaling a lack of technology‐related competency (e.g., Carr, 2016).…”
Section: Applicant Atcmentioning
confidence: 99%
“…Although similar recommendations have been made for cybervetting, the practice is largely unstandardized (e.g., Davison et al, 2016; Roth, Bobko, Van Iddekinge, & Thatcher, 2016) similar to unstructured interviews and resumé evaluation (Gatewood et al, 2008; Highhouse, 2002). One hiring manager who is screening an applicant's profile without any established criteria can have completely different perceptions compared to another manager assessing the same applicant but using their own criteria (Backman & Hedenus, 2019). This lack of standardization prevents consistent, reliable, and valid screening of an applicant's social media profile.…”
The present research describes the development and validation of a measure of job seekers' attitudes toward cybervetting (ATC). Study 1 involved a sample of participants completing an initial pool of items focusing on one platform (i.e., Facebook) and conducting an exploratory factor analysis. Study 2 included a confirmatory factor analysis and an exploratory structural equation model to establish convergent and discriminant validity. Results of both studies confirmed that the hypothesized three‐factor structure (perceived justice, privacy invasion, and face validity) provided a good fit to the data, explained over 67% of total variance, with all three factors demonstrating high internal consistencies. Study 3 examined the measurement equivalence of the ATC measure, and demonstrated its factor structure and reliability, across four social media platforms (Facebook, LinkedIn, Twitter, and Instagram). Comparing applicants' attitudes across platforms showed significantly more favorable perceptions toward LinkedIn‐based cybervetting than for the other three platforms.
“…Importantly, these informational norms should not be considered as fixed and static; rather, they are time sensitive and vary across points in time and between cultures, locations and societies [ 1 ]. The Contextual Integrity framework has been used across numerous contexts, ranging from dataflows in smartphone usage [ 22 , 23 ], education [ 24 , 25 ], healthcare [ 26 ] and even recruitment [ 27 ].…”
To control and minimise the spread of COVID-19, various technological solutions have been proposed. In this research, we focus on digital contact tracing and automated triage for hospitals. We conducted an online survey in Flanders (
N
= 1708) to investigate the perceived appropriateness of these systems based on the Contextual Integrity framework, as developed by Nissenbaum [1]. For digital contact tracing, significant differences were found between the appropriateness of using various types of data for different goals. Precise individual location data (i.e. GPS) was considered to be least appropriate and much less appropriate than proximity data (i.e. Bluetooth) or coarser location data (i.e. GSM). Goals for digital contact tracing with a high individual impact were considered to be less appropriate than goals with a low individual or societal impact. In addition, the data showed that respondents would find the usage of digital contact tracing to be less appropriate
after
the pandemic, underlining the temporality of this technological solution. For automated triage, the results indicated that gender is perceived to be significantly less appropriate than the other types of data, including age, to determine the priority of treatment.
“…The popular press [2], practitioner [3,4] and scholar literature [5,6,7] confirm that this practice is becoming widespread. However, the use of this source of information in personnel selection is replete with dangers, including those associated with violations of privacy and laws, discrimination, lack of reliability and validity [8,9,10,11,12,13].…”
Although the analysis of social media to aid decision making in Human Resource (HR) selection is becoming commonplace, there is little empirical research on this phenomenon. This study reports on the use of Social Networking Sites (SNS) by HR professionals to assist applicant selection. It employs a survey methodology based on a cross-sectional questionnaire which was administered to a sample of 10 000 professionals in Portugal. The response rate was 10.5% and the results show that 41% of the respondents use SNS in employee selection. The most used SNS are LinkedIn (89%) and Facebook (58%), and the evaluation of applicant profiles usually takes place before the first interview. Around three quarters of participants indicate to assess applicants by forming a general impression of their adjustment to the organization. The most regularly inferred constructs from profiles are work experience, education and training, written communication skills, maturity and professionalism. Respondents infer more often the outcome person-organization adjustment. The conclusion is that for many Portuguese organizations SNS seem to be a useful complementary tool to the most conventional personnel selection techniques.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.