Definition
Personnel security recruitment refers to activities that influence the number and types of applicants who apply for a security-related position, remain in the applicant pool, and accept an employment offer (Breaugh 2008).
Introduction
Traditionally, companies have relied on IT departments and firewalls to protect information, and employees have been viewed as the weakest link. Increasingly, however, companies are relying on employees to be the first line of defense, and thus human resources processes and policies are becoming imperative to protecting organizations from risks and violations of security. There are three major ways that employees can engage in security breaches in organizations. First, employees can be manipulated by outside influences such as hackers or phishing schemes. For example, in 2015, the US finance team at Ubiquiti made a multimillion dollar transfer for a senior executive, only to later find out that a criminal was posing as the executive (Sollars 2016...
References
Ababneh, K. I., Hackett, R. D., & Schat, A. H. (2014). The role of attributions and fairness in understanding job applicant reactions to selection procedures and decisions. Journal of Business and Psychology, 29(1), 111–129. https://doi.org/10.1007/s10869-013-9304-y.
Acikgoz, Y. (2019). Employee recruitment and job search: Towards a multi-level integration. Human Resource Management Review, 29(1), 1–13. https://doi.org/10.1016/j.hrmr.2018.02.009.
Breaugh, J. A. (2008). Employee recruitment: Current knowledge and important areas for future research. Human Resource Management Review, 18(3), 103–118. https://doi.org/10.1016/j.hrmr.2008.07.003.
Breaugh, J. A., & Starke, M. (2000). Research on employee recruitment: So many studies, so many remaining questions. Journal of Management, 26(3), 405–434. https://doi.org/10.1177/014920630002600303.
Castilla, E. J. (2005). Social networks and employee performance in a call center. American Journal of Sociology, 110(5), 1243–1283.
Chapman, D. S., Uggerslev, K. L., Carroll, S. A., Piasentin, K. A., & Jones, D. A. (2005). Applicant attraction to organizations and job choice: a meta-analytic review of the correlates of recruiting outcomes. Journal of Applied Psychology, 90(5), 928.
Dalal, R. S. (2005). A meta-analysis of the relationship between organizational citizenship behavior and counterproductive work behavior. Journal of Applied Psychology, 90(6), 1241–1255. https://doi.org/10.1037/0021-9010.90.6.1241.
DeOrtentiis, P. S., Van Iddekinge, C. H., Ployhart, R. E., & Heetderks, T. D. (2018). Build or buy? The individual and unit-level performance of internally versus externally selected managers over time. Journal of Applied Psychology, 103(8), 916–928. https://doi.org/10.1037/apl0000312.
Hausknecht, J. P., Day, D. V., & Thomas, S. C. (2004). Applicant reactions to selection procedures: An updated model and meta-analysis. Personnel Psychology, 57(3), 639–683. https://doi.org/10.1111/j.1744-6570.2004.00003.x.
Jex, S. M., & Britt, T. W. (2008). Organizational psychology a scientist-practitioner approach (2nd ed.). Hoboken: Wiley.
Mathis, R., Jackson, J., Valentine, S., & Meglich, P. (2017). Human resource management. Boston: Cengage Learning.
McClurg, L. A., & Butler, D. S. (2006). Workplace theft: A proposed model and research agenda. Southern Business Review, 31(2), 25–34.
Pinks, G. J. (1992). Facilitating organizational commitment through human resource practices. In Personnel management (pp. 1–24). Kingston: Hewson & White Printing Ltd.
Ponemon Institute. (2018). Ponemon institute – The 2018 cost of a data breach study by the Ponemon institute. IBM security services. Retrieved from https://www-01.ibm.com/common/ssi/cgi-bin/ssialias?htmlfid=55017055USEN&
Ryan, A., & Ployhart, R. E. (2000). Applicants’ perceptions of selection procedures and decisions: A critical review and agenda for the future. Journal of Management, 26(3), 565–606. https://doi.org/10.1016/s0149-2063(00)00041-6.
Sollars, M. (2016). Risk-based security: Staff can play the defining role in securing assets. Network Security, 2016(9), 9–12. https://doi.org/10.1016/S1353-4858(16)30087-3.
Turban, D. B., & Cable, D. M. (2003). Firm reputation and applicant pool characteristics. Journal of Organizational Behavior: The International Journal of Industrial, Occupational and Organizational Psychology and Behavior, 24(6), 733–751. https://doi.org/10.1002/job.215.
Zapata, C. P., Olsen, J. E., & Martins, L. L. (2013). Social exchange from the supervisor’s perspective: Employee trustworthiness as a predictor of interpersonal and informational justice. Organizational Behavior and Human Decision Processes, 121(1), 1–12. https://doi.org/10.1016/j.obhdp.2012.11.001.
Zottoli, M. A., & Wanous, J. P. (2000). Recruitment source research: Current status and future directions. Human Resource Management Review, 10(4), 353–382. https://doi.org/10.1016/S1053-4822(00)00032-2.
Further Reading
Acikgozy, Y. & Bergman, S. M. (2016). Social media and employee recruitment: Chasing the run away bandwagon. In R. N. Landers, G. B. Schmidt, R. N. Landers, G. B. Schmidt (Eds.), Social media in employee selection and recruitment: Theory, practice, and current challenges, Springer International Publishing, Cham, Switzerland (2016), pp. 175–195
Gully, S. M., Phillips, J. M., Castellano, W.G., Han, K. & Kim, A. (2013). A mediated moderation model of recruiting socially and environmentally responsible job applicants. Personnel Psychology, 66(4), 935–973, https://doi.org/10.1111/peps.12033
Phillips, J. M., & Gully, S. M. (2015). Multilevel and strategic recruiting: Where have we been, where can we go from here? Journal of Management, 41(5), 1416–1445, https://doi.org/10.1177/0149206315582248
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 Springer Nature Switzerland AG
About this entry
Cite this entry
Compagnone, M., Hickman, D., Acikgoz, Y. (2021). Personnel Security: Recruitment. In: Shapiro, L.R., Maras, MH. (eds) Encyclopedia of Security and Emergency Management. Springer, Cham. https://doi.org/10.1007/978-3-319-70488-3_215
Download citation
DOI: https://doi.org/10.1007/978-3-319-70488-3_215
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-70487-6
Online ISBN: 978-3-319-70488-3
eBook Packages: Law and CriminologyReference Module Humanities and Social SciencesReference Module Business, Economics and Social Sciences