Acquisti, A., & Grossklags, J. (2005). Privacy and rationality in individual decision making. IEEE Security and Privacy,3, 26–33. https://doi.org/10.1109/MSP.2005.22.
Agerström, J., & Rooth, D.-O. (2011). The role of automatic obesity stereotypes in real hiring discrimination. Journal of Applied Psychology,96, 790–805. https://doi.org/10.1037/a0021594.
Ajunwa, I., Crawford, K., & Schultz, J. (2017). Limitless worker surveillance. California Law Review,105(3), 735–776. https://doi.org/10.15779/Z38BR8MF94.
Archer-Brown, C., Marder, B., Calvard, T., & Kowalski, T. (2018). Hybrid social media: Employees’ use of a boundary-spanning technology. New Technology, Work and Employment,33, 74–93. https://doi.org/10.1111/ntwe.12103.
Article 29 Data Protection Working Party. (2017). Opinion 2/2017 on data processing at work.
Bailey, J., & Steeves, V. (Eds.). (2015). eGirls, eCitizens. Ottawa, ON: University of Ottawa Press.
Bain, P., & Taylor, P. (2000). Entrapped by the ‘electronic panopticon’? Worker resistance in the call centre. New Technology, Work and Employment,15, 2–18. https://doi.org/10.1111/1468-005X.00061.
Ball, K. S., & Margulis, S. T. (2011). Electronic monitoring and surveillance in call centres: A framework for investigation: Surveillance in call centres. New Technology, Work and Employment,26, 113–126. https://doi.org/10.1111/j.1468-005X.2011.00263.x.
Bazarova, N. N., & Choi, Y. H. (2014). Self-disclosure in social media: Extending the functional approach to disclosure motivations and characteristics on social network sites. Journal of Communication,64, 635–657. https://doi.org/10.1111/jcom.12106.
Bergström, A. (2015). Online privacy concerns: A broad approach to understanding the concerns of different groups for different uses. Computers in Human Behavior,53, 419–426. https://doi.org/10.1016/j.chb.2015.07.025.
Berkelaar, B. L. (2010). Cyber-vetting: Exploring the implications of online information for career capital and human capital decisions. PhD Dissertation. Purdue University, 3444477.
Berkelaar, B. L., & Harrison, M. A. (2017). Cybervetting. In C.R. Scott, L. Lewis (Eds.), The international encyclopedia of organizational communication (pp. 1–7). Hoboken: Wiley.
Berman, S. L., & Johnson-Cramer, M. E. (2016). Stakeholder theory: Seeing the field through the forest. Business & Society,58, 1358–1375.
Bizer, C., Heese, R., Mochol, M., Oldakowski, R., Tolksdorf, R., & Eckstein, R. (2005). The impact of semantic web technologies on job recruitment processes. In O. K. Ferstl, E. J. Sinz, S. Eckert, & T. Isselhorst (Eds.), Wirtschaftsinformatik 2005 (pp. 1367–1381). New York: Springer.
Boyd, D., & Crawford, K. (2012). Critical questions for big data. Information, Communication & Society,15, 662–679.
CareerBuilder. (2014). Number of employers passing on applicants due to social media posts continues to rise, according to New CareerBuilder Survey - CareerBuilder [WWW Document]. Retrieved June 10, 2017, from https://www.careerbuilder.ca/share/aboutus/pressreleasesdetail.aspx?sd=6%2F26%2F2014&id=pr829&ed=12%2F31%2F2014.
CareerBuilder. (2018). More than half of employers have found content on social media that caused them not to hire a candidate, according to recent CareerBuilder Survey. http://press.careerbuilder.com/2018-08-09-More-Than-Half-of-Employers-Have-Found-Content-on-Social-Media-That-Caused-Them-NOT-to-Hire-a-Candidate-According-to-Recent-CareerBuilder-Survey.
Chang, C.-W., & Heo, J. (2014). Visiting theories that predict college students’ self-disclosure on Facebook. Computers in Human Behavior,30, 79–86. https://doi.org/10.1016/j.chb.2013.07.059.
Chen, Z. T., & Cheung, M. (2018). Privacy perception and protection on Chinese social media: A case study of WeChat. Ethics and Information Technology,20, 279–289. https://doi.org/10.1007/s10676-018-9480-6.
Chennamaneni, A., & Taneja, A. (2015). Communication privacy management and self-disclosure on social media—A case of Facebook. In AMCIS 2015 Proc.
Clark, L. A., & Roberts, S. J. (2010). Employer’s use of social networking sites: A socially irresponsible practice. Journal of Business Ethics,95, 507–525.
Clarkson, M. B. E. (1995). A stakeholder framework for analyzing and evaluating corporate social performance. Academy of Management Review,20, 92–117. https://doi.org/10.2307/258888.
Couldry, N., & Powell, A. (2014). Big data from the bottom up. Big Data & Society,1, 2053951714539277. https://doi.org/10.1177/2053951714539277.
Cranor, L. F., Reagle, J., & Ackerman, M. S. (1999). Beyond concern: Understanding net users’ attitudes about online privacy. Florham Park: AT&T Labs-Research.
de Ville, V.-I. (2014). Young people as company stakeholders? Moving beyond CSR. Young Consumers,15, 3–16. https://doi.org/10.1108/YC-03-2013-00363.
Debatin, B., Lovejoy, J. P., Horn, A.-K., & Hughes, B. N. (2009). Facebook and online privacy: Attitudes, behaviors, and unintended consequences. Journal of Computer-Mediated Communication,15, 83–108. https://doi.org/10.1111/j.1083-6101.2009.01494.x.
Derous, E., Nguyen, H.-H., & Ryan, A. M. (2009). Hiring discrimination against Arab minorities: Interactions between prejudice and job characteristics. Human Performance,22, 297–320.
Dinev, T., & Hart, P. (2006). An extended privacy calculus model for E-commerce transactions. Information Systems Research,17, 61–80.
DiRomualdo, T., Girimonte, F., & Osle, H. (2018). The CHRO Agenda: Enabling enterprise digital transformation takes center stage. https://www.thehackettgroup.com/elq-key-issues-hr-1801/.
Donaldson, T., & Preston, L. E. (1995). The stakeholder theory of the corporation: Concepts, evidence, and implications. Academy of Management Review,20, 65–91. https://doi.org/10.2307/258887.
Doolin, B., Dillon, S., Thompson, F., & Corner, J. L. (2005). Perceived risk, the Internet shopping experience and online purchasing behavior: A New Zealand perspective. Journal of Global Information Management,2, 66–88.
Drake, J. R., Hall, D., Becton, J. B., & Posey, C. (2016). Job applicants’ information privacy protection responses: Using social media for candidate screening. AIS Transactions on Human Computer Interaction,8, 160–184.
Draper, N. A. (2016). From privacy pragmatist to privacy resigned: Challenging narratives of rational choice in digital privacy debates. Policy Internet,9, 232–251. https://doi.org/10.1002/poi3.142.
Drennan, J., Mort, G. S., & Previte, J. (2006). Privacy, risk perception, and expert online behavior: An exploratory study of household end users. Journal of Organizational and End User Computing,18, 1–22.
Dubois, E., Gruzd, A., & Jacobson, J. (2020). Journalists’ use of social media to infer public opinion: The citizens’ perspective. Social Science Computer Review, 38(1), 57–74. https://doi.org/10.1177/0894439318791527.
Ellison, N. B., Steinfield, C., & Lampe, C. (2007). The benefits of Facebook “friends:” Social capital and college students’ use of online social network sites. Journal of Computer-Mediated Communication,12, 1143–1168. https://doi.org/10.1111/j.1083-6101.2007.00367.x.
Ellison, N. B., Steinfield, C., & Lampe, C. (2011). Connection strategies: Social capital implications of Facebook-enabled communication practices. New Media & Society,13, 873–892. https://doi.org/10.1177/1461444810385389.
Finucane, M. L., Slovic, P., Mertz, C. K., Flynn, J., & Satterfield, T. A. (2000). Gender, race, and perceived risk: The “white male” effect. Health, Risk & Society,2, 159–172. https://doi.org/10.1080/713670162.
Fogel, J., & Nehmad, E. (2009). Internet social network communities: Risk taking, trust, and privacy concerns. Computers in Human Behavior,25, 153–160.
Forsythe, S. M., & Shi, B. (2003). Consumer patronage and risk perceptions in Internet shopping. Journal of Business Research,56, 867–875. https://doi.org/10.1016/S0148-2963(01)00273-9.
Fortier, A., & Burkell, J. (2016). Display and control in online social spaces: Toward a Typology of users. New Media & Society,20(3), 845–861.
Freeman, R. E. (1984). Strategic management: A stakeholder approach. Cambridge, UK: Cambridge University Press.
Freeman, R. E., Harrison, J. S., Wicks, A. C., Parmar, B. L., & Colle, S. (2010). Stakeholder theory: The state of the art. Cambridge: Cambridge University Press.
Frye, N. E., & Dornisch, M. M. (2010). When is trust not enough? The role of perceived privacy of communication tools in comfort with self-disclosure. Computers in Human Behavior,26, 1120–1127. https://doi.org/10.1016/j.chb.2010.03.016.
Gandini, A., & Pais, I. (2017). Social recruiting: control and surveillance in a digitised job market. In P. V. Moore, M. Upchurch, & X. Whittaker (Eds.), Humans and machines at work, dynamics of virtual work (pp. 125–149). Cham: Palgrave Macmillan. https://doi.org/10.1007/978-3-319-58232-0_6.
Garbarino, E., & Strahilevitz, M. (2004). Gender differences in the perceived risk of buying online and the effects of receiving a site recommendation. Journal of Business Research,57, 768–775. https://doi.org/10.1016/S0148-2963(02)00363-6.
Gibson, K. (2000). The moral basis of stakeholder theory. Journal of Business Ethics,26, 245–257. https://doi.org/10.1023/A:1006110106408.
Goffman, E. (1959). The presentation of self in everyday life. Garden City, NY: Doubleday.
Gouvier, D. W., Jordan, S., & Mayville, S. (2003). Patterns of discrimination in hiring job applicants with disabilities: The role of disability type, job complexity, and public contact. Rehabilitation Psychology,48, 175–181. https://doi.org/10.1037/0090-5518.104.22.168.
Greening, D. W., & Turban, D. B. (2000). Corporate social performance as a competitive advantage in attracting a quality workforce. Business & Society,39, 254–280. https://doi.org/10.1177/000765030003900302.
Gruzd, A., Jacobson, J., & Dubois, E. (2017). You’re hired: Examining acceptance of social media screening of job applicants. In Proceedings of the 23rd Americas Conference on Information Systems. Boston, MA. https://aisel.aisnet.org/amcis2017/DataScience/Presentations/28/.
Gruzd, A., Jacobson, J., Dubois, E., & Mai, P. (2018). State of Social Media in Canada 2017. Toronto: Ryerson University Social Media Lab. https://doi.org/10.5683/SP/AL8Z6R.
Gruzd, A., Jacobson, J., & Dubois, E. (in press). Cyber-vetting and the public life of social media data. Social Media + Society.
Hair, J., Hollingsworth, C. L., Randolph, A. B., & Loong Chong, A. Y. (2017). An updated and expanded assessment of PLS-SEM in information systems research. Industrial Management & Data Systems Information,117, 442–458. https://doi.org/10.1108/IMDS-04-2016-0130.
Hargittai, E. (2010). Digital na(t)ives? Variation in Internet skills and uses among members of the “net generation”. Sociological Inquiry,80, 92–113.
Hargittai, E., & Litt, E. (2013). New strategies for employment? Internet skills and online privacy practices during people’s job search. IEEE Security and Privacy,11, 38–45.
Hargittai, E., & Marwick, A. (2016). “What can I really do?” Explaining the privacy paradox with online apathy. International Journal of Communication,10(21), 3737–3757.
Helm, P. (2018). Treating sensitive topics online: A privacy dilemma. Ethics and Information Technology,20, 303–313. https://doi.org/10.1007/s10676-018-9482-4.
Henseler, J., Hubona, G., & Ray, P. A. (2016). Using PLS path modeling in new technology research: Updated guidelines. Industrial Management & Data Systems Information,116, 2–20. https://doi.org/10.1108/IMDS-09-2015-0382.
Horvath, M., & Ryan, A. M. (2003). Antecedents and potential moderators of the relationship between attitudes and hiring discrimination on the basis of sexual orientation. Sex Roles,48, 115–130. https://doi.org/10.1023/A:1022499121222.
Howcroft, D., & Taylor, P. (2014). ‘Plus ca change, plus la meme chose?’-researching and theorising the ‘new’ new technologies: Editorial. New Technology, Work and Employment,29, 1–8. https://doi.org/10.1111/ntwe.12026.
Hoy, M. G., & Milne, G. (2010). Gender differences in privacy-related measures for young adult Facebook users. Journal of Interactive Advertising,10, 28–45.
Huberty, C. J. (1989). Problems with stepwise methods: Better alternatives. Advances in Social Science Methodology,1, 43–70.
Hurrell, S. A., Scholarios, D., & Richards, J. (2017). ‘The kids are alert’: Generation Y responses to employer use and monitoring of social networking sites. New Technology, Work and Employment,32, 64–83.
Jacobson, J. & Gruzd, A. (2018). Employers’ use of young people’s social media: Extending stakeholder theory to social media data. In Academy of Management Annual Meeting Proceedings. Chicago, IL. https://doi.org/10.5465/AMBPP.2018.18217abstract.
Janta, H., & Ladkin, A. (2013). In search of employment: Online technologies and Polish migrants. New Technology, Work and Employment,28, 241–253. https://doi.org/10.1111/ntwe.12018.
Jawahar, I. M., & McLaughlin, G. L. (2001). Toward a descriptive stakeholder theory: An organizational life cycle approach. Academy of Management Review,26, 397–414.
Jeske, D., & Santuzzi, A. M. (2015). Monitoring what and how: psychological implications of electronic performance monitoring: Electronic performance monitoring of employees. New Technology, Work and Employment,30, 62–78. https://doi.org/10.1111/ntwe.12039.
Jones, T. M., & Wicks, A. C. (1999). Convergent stakeholder theory. Academy of Management Review,24, 206–221. https://doi.org/10.2307/259075.
Kennedy, H. (2016). Post, mine, repeat. London, UK: Palgrave Macmillan UK.
Krupa, T., Kirsh, B., Cockburn, L., & Gewurtz, R. (2009). Understanding the stigma of mental illness in employment. Work,33, 413–425.
Leary, M. R., & Kowalski, R. M. (1990). Impression management: A literature review and two-component model. Psychological Bulletin,107, 34–47.
Lin, J., Amini, S., Hong, J. I., Sadeh, N., Lindqvist, J., & Zhang, J. (2012). Expectation and purpose: Understanding users’ mental models of mobile app privacy through crowdsourcing. In Proceedings of the 2012 ACM Conference on Ubiquitous Computing. ACM, pp. 501–510.
Lipford, H.R., Besmer, A., & Watson, J. (n.d.). Understanding Privacy Settings in Facebook with an Audience View. Usenix.
Litt, E. (2012). Knock, knock. Who’s there? The imagined audience. Journal of Broadcasting & Electronic Media,56, 330–345. https://doi.org/10.1080/08838151.2012.705195.
Livingstone, S. (2004). Media literacy and the challenge of new information and communication technologies. The Communication Review,7, 3–14. https://doi.org/10.1080/10714420490280152.
Loh, W. (2018). A practice–theoretical account of privacy. Ethics and Information Technology,20, 233–247. https://doi.org/10.1007/s10676-018-9469-1.
Lutz, C., & Strathoff, P. (2014). Privacy concerns and online behavior–Not so paradoxical after all? Viewing the Privacy Paradox Through Different Theoretical Lenses. https://doi.org/10.2139/ssrn.2425132.
Mai, J.-E. (2016). Big data privacy: The datafication of personal information. The Information Society,32, 192–199. https://doi.org/10.1080/01972243.2016.1153010.
Mao, E., & Zhang, J. (2014). Gender differences in the effect of privacy on location-based services use on mobile phones. Presented at the Twentieth Americas Conference on Information Systems, Savannah, pp. 1–13.
Marwick, A., & Hargittai, E. (2018). Nothing to hide, nothing to lose? Incentives and disincentives to sharing information with institutions online. Information, Communication & Society, 22(12), 1697–1713. https://doi.org/10.1080/1369118X.2018.1450432.
Marwick, A. E., Murgia-Diaz, D., & Palfrey, J. G. (2010). Youth, privacy and reputation (literature review) (SSRN Scholarly Paper No. ID 1588163). Rochester, NY: Social Science Research Network.
McEwan, B., & Flood, M. (2017). Passwords for jobs: Compression of identity in reaction to perceived organizational control via social media surveillance. New Media & Society,20(5), 1715–1734.
Mellahi, K., Morrell, K., & Wood, G. (2010). The ethical business: challenges and controversies. London, UK: Palgrave Macmillan.
Nissenbaum, H. (2011). A contextual approach to privacy online. Daedalus,140, 32–48.
O’Hara, B. (2004). Twice penalized: Employment discrimination against women with disabilities. Journal of Disability Policy Studies,15, 27–34. https://doi.org/10.1177/10442073040150010501.
Okazaki, S., Li, H., & Hirose, M. (2009). Consumer privacy concerns and preference for degree of regulatory control. Journal of Advertising Research,38, 63–77. https://doi.org/10.2753/JOA0091-3367380405.
Osatuyi, B. (2015). Empirical examination of information privacy concerns instrument in the social media context. AIS Transactions on Replication Research,1, 1–14.
Oshima, T., & Dell-Ross, T. (2016). All possible regressions using IBM SPSS: A practitioner’s guide to automatic linear modeling. In: Georgia Educational Research Association Conference.
Palfrey, J., & Gasser, U. (2010). Born digital: Understanding the first generation of digital natives. New York: Basic Books.
Pedersen, S., Burnett, S., Smith, R., & Grinnall, A. (2014). The impact of the cessation of blogs within the UK police blogosphere: Impact of the cessation of blogs. New Technology, Work and Employment,29, 160–176. https://doi.org/10.1111/ntwe.12028.
Peluchette, J., & Karl, K. (2008). Social networking profiles: An examination of student attitudes regarding use and appropriateness of content. CyberPsychology & Behavior,11, 95–97. https://doi.org/10.1089/cpb.2007.9927.
Petit, P. (2007). The effects of age and family constraints on gender hiring discrimination: A field experiment in the French financial sector. Labour Economics,14, 371–391. https://doi.org/10.1016/j.labeco.2006.01.006.
Quan-Haase, A., & Young, A. L. (2010). Uses and gratifications of social media: A comparison of Facebook and instant messaging. Bulletin of Science, Technology & Society,30, 350–361. https://doi.org/10.1177/0270467610380009.
Regan, P. M., & Jesse, J. (2018). Ethical challenges of edtech, big data and personalized learning: Twenty-first century student sorting and tracking. Ethics and Information Technology,21(3), 167–179. https://doi.org/10.1007/s10676-018-9492-2.
Richey, M., Gonibeed, A., & Ravishankar, M. N. (2017). The perils and promises of self-disclosure on social media. Information Systems Frontiers,20(3), 425–437. https://doi.org/10.1007/s10796-017-9806-7.
RiskAware [WWW Document]. (2017). Retrieved June 10, from, 2017 https://riskaware.com/our-products/social-media-screening/.
Rosenberg, M., & Dance, G. J. X. (2018). ‘You are the product’: Targeted by Cambridge Analytica on Facebook. New York: New York Times.
Schrodt, P. (2013). Content relevance and students’ comfort with disclosure as moderators of instructor disclosures and credibility in the college classroom. Communication Education,62, 352–375. https://doi.org/10.1080/03634523.2013.807348.
Sheehan, K. B. (2002). Toward a typology of Internet users and online privacy concerns. The Information Society,18, 21–32.
Shen, G., Jia, J., Nie, L., Feng, F., Zhang, C., & Hu, T. (2017). Depression detection via harvesting social media: A multimodal dictionary learning solution. In Proceedings of the Twenty-Sixth International Joint Conference on Artificial Intelligence (IJCAI-17) pp. 3838–3844.
Smith, A. (2015). Searching for work in a digital era. Washington: Pew Research Center.
Spake, D. F., Beatty, S. E., Brockman, B. K., & Crutchfield, T. N. (2003). Consumer comfort in service relationships: Measurement and importance. Journal of Service Research,5, 316–332.
Spake, D. F., Zachary Finney, R., & Joseph, M. (2011). Experience, comfort, and privacy concerns: Antecedents of online spending. Journal of Research in Interactive Marketing,5, 5–28. https://doi.org/10.1108/17505931111121507.
Stark, L. (2016). The emotional context of information privacy. The Information Society,32, 14–27. https://doi.org/10.1080/01972243.2015.1107167.
Statistica. (2017a). Facebook users worldwide 2017 [WWW Document]. Statista. Retrieved November 11, 2017, from https://www.statista.com/statistics/264810/number-of-monthly-active-facebook-users-worldwide/.
Statistica. (2017b). Instagram - Statistics & Facts [WWW Document]. www.statista.com. Retrieved November 11, 2017, from https://www.statista.com/topics/1882/instagram/.
Stewart, K. A., & Segars, A. H. (2002). An empirical examination of the concern for information privacy instrument. Information Systems Research,13, 36–49. https://doi.org/10.1287/isre.22.214.171.124.
Stone, D. L., & Stone-Romero, E. F. (1998). A multiple stakeholder model of privacy in organizations. In M. Schminke (Ed.), Managerial Ethics: Moral management of people and processes (pp. 35–60). Mahwah, N.J.: Psychology Press.
Suh, J. J., & Hargittai, E. (2015). Privacy management on Facebook: Do device type and location of posting matter? Social Media Society,1, 1–11.
Townsend, L., & Wallace, C. (n.d.). Social media research: A guide to ethics (No. Economic and Social Research Council [Grant Number ES/M001628/1]). University of Aberdeen.
Tsai, W.-C., & Yang, I. W.-F. (2010). Does image matter to different job applicants? The influences of corporate image and applicant individual differences on organizational attractiveness. International Journal of Selection and Assessment,18, 48–63.
Turban, D. B., & Greening, D. W. (1997). Corporate social performance and organizational attractiveness to prospective employees. Academy of Management Journal,40, 658–672. https://doi.org/10.2307/257057.
Tverdek, E. (2008). What makes information “public”? Public Affairs Quarterly,22, 63–77.
Visser, W., Matten, D., Pohl, M., & Tolhurst, N. (2010). The A to Z of corporate social responsibility. West Sussex, UK: Wiley.
Weber, J. (2017). Understanding the millennials’ integrated ethical decision-making process: Assessing the relationship between personal values and cognitive moral reasoning. Business & Society,58(8), 1671–1706.
Westin, A. F. (2000). Intrusions. Public Perspective, 11(6), 8–11.
Whiting, A., & Williams, D. (2013). Why people use social media: A uses and gratifications approach. Qualitative Market Research: An International Journal,16, 362–369. https://doi.org/10.1108/QMR-06-2013-0041.
Williams, D. L., Crittenden, V. L., Keo, T., & McCarty, P. (2012). The use of social media: An exploratory study of usage among digital natives. Journal of Public Affairs,12, 127–136. https://doi.org/10.1002/pa.1414.
Yang, H. (2013). The case for being automatic: Introducing the Automatic Linear Modeling (LINEAR) procedure in SPSS statistics. Multiple Linear Regression Viewpoints,39, 27–37.
Youn, S., & Hall, K. (2008). Gender and online privacy among teens: Risk perception, privacy concerns, and protection behaviors. CyberPsychology & Behavior,11, 763–765. https://doi.org/10.1089/cpb.2007.0240.