Skip to main content

Understanding Privacy Violation and Fairness Perception of Job Seekers Using Social Media

  • Chapter
  • First Online:
Paradigm Shift in Business

Abstract

Job search with social media offers a wider range of opportunities to job seekers. However, the job seekers' use of social media is impacted by concerns over privacy and fairness, nested in experiences with procedural justice and privacy violations. This study examines how job seekers' perceptions on procedural justice and privacy violation affect their perceptions on fairness and thus their intention to utilize social media in job search. The study uses a structural equation model in the Theory of Reasoned Action to understand the influence of privacy affecting factors on job seekers' intention and actual use of social media. The study findings indicate privacy violation as a critical determinant that negatively affects procedural justice, fairness perception, and intention to use. Further, procedural justice and privacy violation, while having a direct effect on intention to use, have a stronger indirect influence on intention to use, mediated by fairness perception. The study provides insights for employees and employers on addressing privacy concerns.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 139.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 179.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  • Alge, B. J. (2001). Effects of computer surveillance on perceptions of privacy and procedural justice. Journal of Applied Psychology, 86(4), 797.

    Article  Google Scholar 

  • Ajzen, I., & Fishbein, M. (1975). A Bayesian analysis of attribution processes. Psychological Bulletin, 82(2), 261.

    Article  Google Scholar 

  • Boyd, D. (2008). Facebook’s privacy trainwreck: Exposure, invasion, and social convergence. Convergence, 14(1), 13–20.

    Article  Google Scholar 

  • Boyd, D. M., & Ellison, N. B. (2007). Social network sites: Definition, history, and scholarship. Journal of Computer-Mediated Communication, 13(1), 210–230.

    Article  Google Scholar 

  • Brandeis, L., & Warren, S. (1890). The right to privacy. Harvard Law Review, 4(5), 193–220.

    Article  Google Scholar 

  • Byrne, B. M. (2010). Structural equation modeling with AMOS: Basic concepts, applications, and programming (multivariate applications series). New York: Taylor & Francis Group, 396(1), 7384.

    Google Scholar 

  • Colquitt, J. A. (2001). On the dimensionality of organizational justice: A construct validation of a measure. Journal of Applied Psychology, 86(3), 386.

    Article  Google Scholar 

  • Coppola, N. W., Hiltz, S. R., & Rotter, N. G. (2004). Building trust in virtual teams. IEEE Transactions on Professional Communication, 47(2), 95–104.

    Article  Google Scholar 

  • DataReportal. (2022). Digital 2022: Global Overview Report. https://datareportal.com/reports/digital-2022-global-overview-report

  • Davis, F. D. (1989). Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS Quarterly, 319–340.

    Google Scholar 

  • Davis, F. D. (1993). User acceptance of information technology: System characteristics, user perceptions and behavioral impacts. International Journal of Man-Machine Studies, 38(3), 475–487.

    Article  Google Scholar 

  • Donath, J. (2007). Signals in social supernets. Journal of Computer-Mediated Communication, 13(1), 231–251.

    Article  Google Scholar 

  • Dwyer, C., Hiltz, S., & Passerini, K. (2007). Trust and privacy concern within social networking sites: A comparison of Facebook and MySpace. In AMCIS 2007 Proceedings, 339.

    Google Scholar 

  • Fornell, C., & Larcker, D. F. (1981). Evaluating structural equation models with unobservable variables and measurement error. Journal of Marketing Research, 18(1), 39–50.

    Article  Google Scholar 

  • Gallaugher, J., & Ransbotham, S. (2010). Social media and customer dialog management at Starbucks. MIS Quarterly Executive, 9(4).

    Google Scholar 

  • Gross, R., & Acquisti, A. (2005, November). Information revelation and privacy in online social networks. In Proceedings of the 2005 ACM workshop on Privacy in the Electronic Society (pp. 71–80).

    Google Scholar 

  • Hair, J. F., Black, W. C., Babin, B. J., Anderson, R. E., & Tatham, R. L. (1998). Multivariate data analysis (Vol. 5, No. 3, pp. 207–219).

    Google Scholar 

  • Hair, J. F., Black, W. C., Babin, B. J., Anderson, R. E., & Tatham, R. L. (2006). Multivariate data analysis (6th ed.). Pearson Prentice Hall.

    Google Scholar 

  • Hair, J. F., Matthews, L. M., Matthews, R. L., & Sarstedt, M. (2017). PLS-SEM or CB-SEM: Updated guidelines on which method to use. International Journal of Multivariate Data Analysis, 1(2), 107–123.

    Article  Google Scholar 

  • Hu, L. T., & Bentler, P. M. (1999). Cutoff criteria for fit indexes in covariance structure analysis: Conventional criteria versus new alternatives. Structural Equation Modeling: A Multidisciplinary Journal, 6(1), 1–55.

    Article  Google Scholar 

  • Hughes, T. J. (2020). MER Conference 2020: KEYNOTE, Three Apples–The History and Future of Privacy. https://youtu.be/wwo4gBjPZ-g

  • Huy, P. T., Vu, N. H., Hoang, H. T., & Nguyen, H. T. H. (2020). Procedural justice in selection from the lens of psychological contract theory. Organizacija, 53(4), 272–286.

    Article  Google Scholar 

  • Karyda, M., Gritzalis, S., Park, J. H., & Kokolakis, S. (2009). Privacy and fair information practices in ubiquitous environments: Research challenges and future directions. Internet Research, 19(2), 194–208.

    Article  Google Scholar 

  • Lanier, C. D., & Saini, A. (2008). Understanding consumer privacy: A review and future directions. Academy of Marketing Science Review, 12(2), 1–45.

    Google Scholar 

  • Malhotra, N. K., Kim, S. S., & Agarwal, J. (2004). Internet users’ information privacy concerns (IUIPC): The construct, the scale, and a causal model. Information Systems Research, 15(4), 336–355.

    Article  Google Scholar 

  • Martin, K. (2018). The penalty for privacy violations: How privacy violations impact trust online. Journal of Business Research, 82, 103–116.

    Article  Google Scholar 

  • McFarland, L. A., & Ployhart, R. E. (2015). Social media: A contextual framework to guide research and practice. Journal of Applied Psychology, 100(6), 1653.

    Article  Google Scholar 

  • Metzger, M. J. (2004). Privacy, trust, and disclosure: Exploring barriers to electronic commerce. Journal of Computer-Mediated Communication, 9(4), JCMC942.

    Google Scholar 

  • Nissenbaum, H. (2018). Respecting context to protect privacy: Why meaning matters. Science and Engineering Ethics, 24(3), 831–852.

    Article  Google Scholar 

  • Pan, Y., & Zinkhan, G. M. (2006). Exploring the impact of online privacy disclosures on consumer trust. Journal of Retailing, 82(4), 331–338.

    Article  Google Scholar 

  • Pew Research Center. (2014). Public perceptions of privacy and security in the post Snowden era. http://www.pewinternet.org/files/2014/11/PI_PublicPerceptionsofPrivacy_111214.pdf.

  • Phelps, J., Nowak, G., & Ferrell, E. (2000). Privacy concerns and consumer willingness to provide personal information. Journal of Public Policy & Marketing, 19(1), 27–41.

    Article  Google Scholar 

  • Piccoli, G., & Ives, B. (2003). Trust and the unintended effects of behavior control in virtual teams. MIS Quarterly, 365–395.

    Google Scholar 

  • Ranjbarian, B., Fathi, S., & Kamali, A. (2010). The factors affecting on consumers’ repurchase intention toward an automobile brand: An application of reasoned action theory. European Journal of Social Sciences, 16(3), 352–362.

    Google Scholar 

  • Rauniar, R., Rawski, G., Yang, J., & Johnson, B. (2014). Technology acceptance model (TAM) and social media usage: An empirical study on Facebook. Journal of Enterprise Information Management.

    Google Scholar 

  • Rosenblum, D. (2007). What anyone can know: The privacy risks of social networking sites. IEEE Security & Privacy, 5(3), 40–49.

    Article  Google Scholar 

  • Shin, D. H. (2010). The effects of trust, security and privacy in social networking: A security-based approach to understand the pattern of adoption. Interacting with Computers, 22(5), 428–438.

    Article  Google Scholar 

  • Snyder, J. L. (2010). E-mail privacy in the workplace: A boundary regulation perspective. The Journal of Business Communication (1973), 47(3), 266–294.

    Google Scholar 

  • Solove, D. J. (2006). A taxonomy of privacy. University of Pennsylvania Law Review, 477–564.

    Google Scholar 

  • Subbarao, N. V., Chhabra, B., & Mishra, M. (2022a). Social media usage behavior in job search: Implications for corporate image and employer branding. Managing Disruptions in Business: Causes, Conflicts, and Control, 51–79.

    Google Scholar 

  • Subbarao, N. V., Chhabra, B., & Mishra, M. (2022b). A multigroup analysis of active and passive job seekers using social media. Global Business Review, 09721509221124167.

    Google Scholar 

  • Subbarao, N. V., Chhabra, B., & Mishra, M. (2022c). Antecedents and consequences of social media usage behavior in job search: A qualitative study toward a conceptual framework. Inclusive businesses in developing economies: Converging people, profit, and corporate citizenship (pp. 215–241). Springer International Publishing.

    Chapter  Google Scholar 

  • Turow, J., Hennessy, M., & Draper, N. (2015). The tradeoff fallacy: How marketers are misrepresenting American consumers and opening them up to exploitation. https://www.asc.upenn.edu/sites/default/files/TradeoffFallacy_1.pdf

  • Van Esch, P., & Black, J. S. (2019). Factors that influence new generation candidates to engage with and complete digital, AI-enabled recruiting. Business Horizons, 62(6), 729–739.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to N. V. Subbarao .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Subbarao, N.V., Chhabra, B., Mishra, M. (2023). Understanding Privacy Violation and Fairness Perception of Job Seekers Using Social Media. In: Rajagopal, Behl, R. (eds) Paradigm Shift in Business. Palgrave Studies in Democracy, Innovation, and Entrepreneurship for Growth. Palgrave Macmillan, Cham. https://doi.org/10.1007/978-3-031-40439-9_2

Download citation

Publish with us

Policies and ethics