{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,4]],"date-time":"2025-05-04T04:03:29Z","timestamp":1746331409364,"version":"3.40.4"},"publisher-location":"Cham","reference-count":31,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319074849"},{"type":"electronic","value":"9783319074856"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-07485-6_42","type":"book-chapter","created":{"date-parts":[[2014,6,10]],"date-time":"2014-06-10T16:52:49Z","timestamp":1402419169000},"page":"429-439","source":"Crossref","is-referenced-by-count":0,"title":["If I Do Not Like Your Online Profile I Will Not Hire You!"],"prefix":"10.1007","author":[{"given":"Birgy","family":"Lorenz","sequence":"first","affiliation":[]},{"given":"Kaido","family":"Kikkas","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"4","key":"42_CR1","doi-asserted-by":"publisher","first-page":"507","DOI":"10.1007\/s10551-010-0436-y","volume":"95","author":"L.A. Clark","year":"2010","unstructured":"Clark, L.A., Roberts, S.J.: Employer\u2019s use of social networking sites: A socially irresponsible practice. Journal of Business Ethics\u00a095(4), 507\u2013525 (2010)","journal-title":"Journal of Business Ethics"},{"key":"42_CR2","doi-asserted-by":"crossref","unstructured":"Counts, S., Stecher, K.: Self-presentation of personality during online profile creation. In: Proc. AAAI Conf. on Weblogs and Social Media, ICWSM (2009)","DOI":"10.1609\/icwsm.v3i1.13961"},{"issue":"6","key":"42_CR3","first-page":"37","volume":"85","author":"D. Coutu","year":"2007","unstructured":"Coutu, D.: We googled you. Harvard Business Review\u00a085(6), 37 (2007)","journal-title":"Harvard Business Review"},{"key":"42_CR4","doi-asserted-by":"crossref","unstructured":"Dafoulas, G.A., Pateli, A.G., Turega, M.: Business-to-employee co-operation support through online job interviews. In: Proceedings of the 13th International Workshop on Database and Expert Systems Applications, pp. 286\u2013292. IEEE (2002)","DOI":"10.1109\/DEXA.2002.1045912"},{"key":"42_CR5","doi-asserted-by":"crossref","unstructured":"Davis, D.: MySpace Isn\u2019t Your Space: Expanding the Fair Credit Reporting Act to Ensure Accountability and Fairness in Employer Searches of Online Social Networking Services. Available at SSRN 1601471 (2007)","DOI":"10.2139\/ssrn.1601471"},{"key":"42_CR6","unstructured":"Facebook statistics by Country Socialbakers (2013), http:\/\/www.socialbakers.com\/facebook-statistics\/ (retrieved)"},{"key":"42_CR7","unstructured":"Falcone, P.: Ninety-six Great Interview Questions to Ask Before You Hire. Amazon Books (2009)"},{"key":"42_CR8","unstructured":"Gindin, S.E.: Nobody Reads Your Privacy Policy or Online Contract: Lessons Learned and Questions Raised by the FTC\u2019s Action against Sears. Nw. J. Tech. & Intell. Prop.\u00a08(1) (2009)"},{"key":"42_CR9","unstructured":"Global mobile statistics 2013 Part A: Mobile subscribers; handset market share; mobile operators MobiThinking (2013), http:\/\/mobithinking.com\/mobile-marketing-tools\/latest-mobile-stats\/a (retrieved)"},{"issue":"3","key":"42_CR10","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1037\/a0015946","volume":"50","author":"R.D. Goffin","year":"2009","unstructured":"Goffin, R.D., Boyd, A.C.: Faking and personality assessment in personnel selection: Advancing models of faking. Canadian Psychology\/Psychologie Canadienne\u00a050(3), 151 (2009)","journal-title":"Canadian Psychology\/Psychologie Canadienne"},{"issue":"3","key":"42_CR11","doi-asserted-by":"publisher","first-page":"253","DOI":"10.1177\/0734016811399421","volume":"36","author":"B. Henson","year":"2011","unstructured":"Henson, B., Reyns, B.W., Fisher, B.S.: Security in the 21st Century Examining the Link Between Online Social Network Activity, Privacy, and Interpersonal Victimization. Criminal Justice Review\u00a036(3), 253\u2013268 (2011)","journal-title":"Criminal Justice Review"},{"key":"42_CR12","unstructured":"Hirsch, D.: The Law and Policy of Online Privacy: Regulation, Self-Regulation or Co-Regulation? ExpressO (2010), http:\/\/works.bepress.com\/dennis_hirsch\/1 (retrieved)"},{"key":"42_CR13","doi-asserted-by":"crossref","unstructured":"Hoofnagle, C., King, J., Li, S., Turow, J.: How different are young adults from older adults when it comes to information privacy attitudes and policies? Available at SSRN 1589864 (2010)","DOI":"10.2139\/ssrn.1589864"},{"key":"42_CR14","series-title":"IFIP AICT","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1007\/978-3-642-14282-6_4","volume-title":"Privacy and Identity Management for Life","author":"R. Leenes","year":"2010","unstructured":"Leenes, R.: Context Is Everything Sociality and Privacy in Online Social Network Sites. In: Bezzi, M., Duquenoy, P., Fischer-H\u00fcbner, S., Hansen, M., Zhang, G. (eds.) Privacy and Identity. IFIP AICT, vol.\u00a0320, pp. 48\u201365. Springer, Heidelberg (2010)"},{"key":"42_CR15","first-page":"155","volume-title":"Social media & mobile internet use among teens and young adults","author":"A. Lenhart","year":"2010","unstructured":"Lenhart, A., Purcell, K., Smith, A., Zickuhr, K.: Social media & mobile internet use among teens and young adults, pp. 155\u2013179. Pew Internet & American Life Project, Washington, DC (2010)"},{"key":"42_CR16","unstructured":"Lorenz, B., Kikkas, K.: Socially engineered commoners as cyber warriors-Estonian future or present? In: 2012 4th International Conference on Cyber Conflict (CYCON), pp. 1\u201312. IEEE (2012)"},{"key":"42_CR17","unstructured":"Madejski, M., Johnson, M.L., Bellovin, S.M.: The failure of online social network privacy settings. Department of Computer Science, Columbia University"},{"issue":"5","key":"42_CR18","first-page":"559","volume":"17","author":"H. Nissenbaum","year":"1998","unstructured":"Nissenbaum, H.: Protecting privacy in an information age: The problem of privacy in public. Law and Philosophy\u00a017(5), 559\u2013596 (1998)","journal-title":"Law and Philosophy"},{"key":"42_CR19","doi-asserted-by":"crossref","unstructured":"Oolo, E., Siibak, A.: Performing for one\u2019s imagined audience: Social steganography and other privacy strategies of Estonian teens on networked publics. Cyberpsychology: Journal of Psychosocial Research on Cyberspace\u00a07(1), article 7 (2013), doi:10.5817\/CP2013-1-7","DOI":"10.5817\/CP2013-1-7"},{"issue":"1","key":"42_CR20","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1111\/j.1467-8608.2010.01611.x","volume":"20","author":"I. Pollach","year":"2011","unstructured":"Pollach, I.: Online privacy as a corporate social responsibility: an empirical study. Business Ethics: A European Review\u00a020(1), 88\u2013102 (2011)","journal-title":"Business Ethics: A European Review"},{"issue":"1","key":"42_CR21","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1111\/j.1744-1714.2011.01127.x","volume":"49","author":"P. Sanchez Abril","year":"2012","unstructured":"Sanchez Abril, P., Levin, A., Del Riego, A.: Blurred Boundaries: Social Media Privacy and the Twenty-First Century Employee. American Business Law Journal\u00a049(1), 63\u2013124 (2012)","journal-title":"American Business Law Journal"},{"key":"42_CR22","first-page":"287","volume":"37","author":"K. Schoening","year":"2010","unstructured":"Schoening, K., Kleisinger, K.: Off-Duty Privacy: How Far Can Employers Go. N. Ky. L. Rev.\u00a037, 287 (2010)","journal-title":"N. Ky. L. Rev."},{"issue":"1","key":"42_CR23","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1108\/14636691211196941","volume":"14","author":"R. Slovensky","year":"2012","unstructured":"Slovensky, R., Ross, W.H.: Should human resource managers use social media to screen job applicants? Managerial and legal issues in the USA. Info\u00a014(1), 55\u201369 (2012)","journal-title":"Info"},{"issue":"4","key":"42_CR24","doi-asserted-by":"crossref","first-page":"989","DOI":"10.2307\/41409970","volume":"35","author":"H.J. Smith","year":"2011","unstructured":"Smith, H.J., Dinev, T., Xu, H.: Information privacy research: An interdisciplinary review. MIS Quarterly\u00a035(4), 989\u20131016 (2011)","journal-title":"MIS Quarterly"},{"key":"42_CR25","unstructured":"Smith-Butler, L.: Workplace Privacy: We\u2019ll Be Watching You. Ohio Northern Law Review\u00a035 (2009)"},{"issue":"3","key":"42_CR26","doi-asserted-by":"publisher","first-page":"477","DOI":"10.2307\/40041279","volume":"154","author":"D. Solove","year":"2006","unstructured":"Solove, D.: A Taxonomy of privacy. University of Pennsylvania Law Review\u00a0154(3), 477\u2013564 (2006)","journal-title":"University of Pennsylvania Law Review"},{"key":"42_CR27","doi-asserted-by":"publisher","first-page":"531","DOI":"10.1145\/1526709.1526781","volume-title":"Proceedings of the 18th International Conference on World Wide Web","author":"E. Zheleva","year":"2009","unstructured":"Zheleva, E., Getoor, L.: To join or not to join: the illusion of privacy in social networks with mixed public and private user profiles. In: Proceedings of the 18th International Conference on World Wide Web, pp. 531\u2013540. ACM, New York (2009)"},{"issue":"1","key":"42_CR28","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1093\/idpl\/ipq003","volume":"1","author":"O. Tene","year":"2011","unstructured":"Tene, O.: Privacy: The new generations. International Data Privacy Law\u00a01(1), 15\u201327 (2011)","journal-title":"International Data Privacy Law"},{"key":"42_CR29","unstructured":"Trochim, W.: Likert scaling, Research Methods Knowledge Base (2006), http:\/\/www.socialresearchmethods.net\/kb\/scallik.php (retrieved)"},{"key":"42_CR30","doi-asserted-by":"crossref","unstructured":"Wang, Y., Norcie, G., Komanduri, S., Acquisti, A., Leon, P.G., Cranor, L.F.: I regretted the minute I pressed share: A qualitative study of regrets on Facebook. In: Proceedings of the Seventh Symposium on Usable Privacy and Security, p. 10. ACM (2011)","DOI":"10.1145\/2078827.2078841"},{"key":"42_CR31","doi-asserted-by":"crossref","unstructured":"Vicknair, J., Elkersh, D., Yancey, K., Budden, M.C.: The Use of Social Networking Websites as a Recruiting Tool for Employers. American Journal of Business Education (AJBE)\u00a03(11) (2010)","DOI":"10.19030\/ajbe.v3i11.57"}],"container-title":["Lecture Notes in Computer Science","Learning and Collaboration Technologies. Technology-Rich Environments for Learning and Collaboration"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-07485-6_42","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,3]],"date-time":"2025-05-03T09:05:34Z","timestamp":1746263134000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-07485-6_42"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319074849","9783319074856"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-07485-6_42","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}