{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,12]],"date-time":"2026-04-12T14:18:34Z","timestamp":1776003514701,"version":"3.50.1"},"reference-count":121,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2020,3,2]],"date-time":"2020-03-02T00:00:00Z","timestamp":1583107200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2020,3,2]],"date-time":"2020-03-02T00:00:00Z","timestamp":1583107200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100002784","name":"Canada Excellence Research Chairs, Government of Canada","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100002784","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Ethics Inf Technol"],"published-print":{"date-parts":[[2020,6]]},"abstract":"<jats:title>Abstract<\/jats:title>\n                  <jats:p>With the introduction of new information communication technologies, employers are increasingly engaging in social media screening, also known as cybervetting, as part of their hiring process. Our research, using an online survey with 482 participants, investigates young people\u2019s concerns with their publicly available social media data being used in the context of job hiring. Grounded in stakeholder theory, we analyze the relationship between young people\u2019s concerns with social media screening and their gender, job seeking status, privacy concerns, and social media use. We find that young people are generally not comfortable with social media screening. A key finding of this research is that concern for privacy for public information on social media cannot be fully explained by some \u201ctraditional\u201d variables in privacy research. The research extends stakeholder theory to identify how social media data ethics should be inextricably linked to organizational practices. The findings have theoretical implications for a rich conceptualization of stakeholders in an age of social media and practical implications for organizations engaging in cybervetting.<\/jats:p>","DOI":"10.1007\/s10676-020-09526-2","type":"journal-article","created":{"date-parts":[[2020,3,2]],"date-time":"2020-03-02T11:03:02Z","timestamp":1583146982000},"page":"175-195","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":32,"title":["Cybervetting job applicants on social media: the new normal?"],"prefix":"10.1007","volume":"22","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1371-1077","authenticated-orcid":false,"given":"Jenna","family":"Jacobson","sequence":"first","affiliation":[]},{"given":"Anatoliy","family":"Gruzd","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,3,2]]},"reference":[{"key":"9526_CR1","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1109\/MSP.2005.22","volume":"3","author":"A Acquisti","year":"2005","unstructured":"Acquisti, A., & Grossklags, J. (2005). Privacy and rationality in individual decision making. IEEE Security and Privacy,3, 26\u201333. https:\/\/doi.org\/10.1109\/MSP.2005.22.","journal-title":"IEEE Security and Privacy"},{"key":"9526_CR2","doi-asserted-by":"publisher","first-page":"790","DOI":"10.1037\/a0021594","volume":"96","author":"J Agerstr\u00f6m","year":"2011","unstructured":"Agerstr\u00f6m, J., & Rooth, D.-O. (2011). The role of automatic obesity stereotypes in real hiring discrimination. Journal of Applied Psychology,96, 790\u2013805. https:\/\/doi.org\/10.1037\/a0021594.","journal-title":"Journal of Applied Psychology"},{"issue":"3","key":"9526_CR3","doi-asserted-by":"publisher","first-page":"735","DOI":"10.15779\/Z38BR8MF94","volume":"105","author":"I Ajunwa","year":"2017","unstructured":"Ajunwa, I., Crawford, K., & Schultz, J. (2017). Limitless worker surveillance. California Law Review,105(3), 735\u2013776. https:\/\/doi.org\/10.15779\/Z38BR8MF94.","journal-title":"California Law Review"},{"key":"9526_CR4","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1111\/ntwe.12103","volume":"33","author":"C Archer-Brown","year":"2018","unstructured":"Archer-Brown, C., Marder, B., Calvard, T., & Kowalski, T. (2018). Hybrid social media: Employees\u2019 use of a boundary-spanning technology. New Technology, Work and Employment,33, 74\u201393. https:\/\/doi.org\/10.1111\/ntwe.12103.","journal-title":"New Technology, Work and Employment"},{"key":"9526_CR5","unstructured":"Article 29 Data Protection Working Party. (2017). Opinion 2\/2017 on data processing at work."},{"key":"9526_CR6","volume-title":"eGirls, eCitizens","year":"2015","unstructured":"Bailey, J., & Steeves, V. (Eds.). (2015). eGirls, eCitizens. Ottawa, ON: University of Ottawa Press."},{"key":"9526_CR7","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1111\/1468-005X.00061","volume":"15","author":"P Bain","year":"2000","unstructured":"Bain, P., & Taylor, P. (2000). Entrapped by the \u2018electronic panopticon\u2019? Worker resistance in the call centre. New Technology, Work and Employment,15, 2\u201318. https:\/\/doi.org\/10.1111\/1468-005X.00061.","journal-title":"New Technology, Work and Employment"},{"key":"9526_CR8","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1111\/j.1468-005X.2011.00263.x","volume":"26","author":"KS Ball","year":"2011","unstructured":"Ball, K. S., & Margulis, S. T. (2011). Electronic monitoring and surveillance in call centres: A framework for investigation: Surveillance in call centres. New Technology, Work and Employment,26, 113\u2013126. https:\/\/doi.org\/10.1111\/j.1468-005X.2011.00263.x.","journal-title":"New Technology, Work and Employment"},{"key":"9526_CR9","doi-asserted-by":"publisher","first-page":"635","DOI":"10.1111\/jcom.12106","volume":"64","author":"NN Bazarova","year":"2014","unstructured":"Bazarova, N. N., & Choi, Y. H. (2014). Self-disclosure in social media: Extending the functional approach to disclosure motivations and characteristics on social network sites. Journal of Communication,64, 635\u2013657. https:\/\/doi.org\/10.1111\/jcom.12106.","journal-title":"Journal of Communication"},{"key":"9526_CR10","doi-asserted-by":"publisher","first-page":"419","DOI":"10.1016\/j.chb.2015.07.025","volume":"53","author":"A Bergstr\u00f6m","year":"2015","unstructured":"Bergstr\u00f6m, A. (2015). Online privacy concerns: A broad approach to understanding the concerns of different groups for different uses. Computers in Human Behavior,53, 419\u2013426. https:\/\/doi.org\/10.1016\/j.chb.2015.07.025.","journal-title":"Computers in Human Behavior"},{"key":"9526_CR11","unstructured":"Berkelaar, B. L. (2010). Cyber-vetting: Exploring the implications of online information for career capital and human capital decisions. PhD Dissertation. Purdue University, 3444477."},{"key":"9526_CR12","first-page":"1","volume-title":"The international encyclopedia of organizational communication","author":"BL Berkelaar","year":"2017","unstructured":"Berkelaar, B. L., & Harrison, M. A. (2017). Cybervetting. In C.R. Scott, L. Lewis (Eds.), The international encyclopedia of organizational communication (pp. 1\u20137). Hoboken: Wiley."},{"key":"9526_CR13","doi-asserted-by":"publisher","first-page":"1358","DOI":"10.1177\/0007650316680039","volume":"58","author":"SL Berman","year":"2016","unstructured":"Berman, S. L., & Johnson-Cramer, M. E. (2016). Stakeholder theory: Seeing the field through the forest. Business & Society,58, 1358\u20131375.","journal-title":"Business & Society"},{"key":"9526_CR14","doi-asserted-by":"publisher","first-page":"1367","DOI":"10.1007\/3-7908-1624-8_72","volume-title":"Wirtschaftsinformatik 2005","author":"C Bizer","year":"2005","unstructured":"Bizer, C., Heese, R., Mochol, M., Oldakowski, R., Tolksdorf, R., & Eckstein, R. (2005). The impact of semantic web technologies on job recruitment processes. In O. K. Ferstl, E. J. Sinz, S. Eckert, & T. Isselhorst (Eds.), Wirtschaftsinformatik 2005 (pp. 1367\u20131381). New York: Springer."},{"key":"9526_CR15","doi-asserted-by":"publisher","first-page":"662","DOI":"10.1080\/1369118X.2012.678878","volume":"15","author":"D Boyd","year":"2012","unstructured":"Boyd, D., & Crawford, K. (2012). Critical questions for big data. Information, Communication & Society,15, 662\u2013679.","journal-title":"Information, Communication & Society"},{"key":"9526_CR17","unstructured":"CareerBuilder. (2014). Number of employers passing on applicants due to social media posts continues to rise, according to New CareerBuilder Survey - CareerBuilder [WWW Document]. Retrieved June 10, 2017, from https:\/\/www.careerbuilder.ca\/share\/aboutus\/pressreleasesdetail.aspx?sd=6%2F26%2F2014&id=pr829&ed=12%2F31%2F2014."},{"key":"9526_CR16","unstructured":"CareerBuilder. (2018). More than half of employers have found content on social media that caused them not to hire a candidate, according to recent CareerBuilder Survey.\u00a0http:\/\/press.careerbuilder.com\/2018-08-09-More-Than-Half-of-Employers-Have-Found-Content-on-Social-Media-That-Caused-Them-NOT-to-Hire-a-Candidate-According-to-Recent-CareerBuilder-Survey."},{"key":"9526_CR18","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1016\/j.chb.2013.07.059","volume":"30","author":"C-W Chang","year":"2014","unstructured":"Chang, C.-W., & Heo, J. (2014). Visiting theories that predict college students\u2019 self-disclosure on Facebook. Computers in Human Behavior,30, 79\u201386. https:\/\/doi.org\/10.1016\/j.chb.2013.07.059.","journal-title":"Computers in Human Behavior"},{"key":"9526_CR19","doi-asserted-by":"publisher","first-page":"279","DOI":"10.1007\/s10676-018-9480-6","volume":"20","author":"ZT Chen","year":"2018","unstructured":"Chen, Z. T., & Cheung, M. (2018). Privacy perception and protection on Chinese social media: A case study of WeChat. Ethics and Information Technology,20, 279\u2013289. https:\/\/doi.org\/10.1007\/s10676-018-9480-6.","journal-title":"Ethics and Information Technology"},{"key":"9526_CR20","unstructured":"Chennamaneni, A., & Taneja, A. (2015). Communication privacy management and self-disclosure on social media\u2014A case of Facebook. In AMCIS 2015 Proc."},{"key":"9526_CR21","doi-asserted-by":"publisher","first-page":"507","DOI":"10.1007\/s10551-010-0436-y","volume":"95","author":"LA Clark","year":"2010","unstructured":"Clark, L. A., & Roberts, S. J. (2010). Employer\u2019s use of social networking sites: A socially irresponsible practice. Journal of Business Ethics,95, 507\u2013525.","journal-title":"Journal of Business Ethics"},{"key":"9526_CR22","doi-asserted-by":"publisher","first-page":"92","DOI":"10.2307\/258888","volume":"20","author":"MBE Clarkson","year":"1995","unstructured":"Clarkson, M. B. E. (1995). A stakeholder framework for analyzing and evaluating corporate social performance. Academy of Management Review,20, 92\u2013117. https:\/\/doi.org\/10.2307\/258888.","journal-title":"Academy of Management Review"},{"key":"9526_CR23","doi-asserted-by":"publisher","first-page":"205395171453927","DOI":"10.1177\/2053951714539277","volume":"1","author":"N Couldry","year":"2014","unstructured":"Couldry, N., & Powell, A. (2014). Big data from the bottom up. Big Data & Society,1, 2053951714539277. https:\/\/doi.org\/10.1177\/2053951714539277.","journal-title":"Big Data & Society"},{"key":"9526_CR24","volume-title":"Beyond concern: Understanding net users\u2019 attitudes about online privacy","author":"LF Cranor","year":"1999","unstructured":"Cranor, L. F., Reagle, J., & Ackerman, M. S. (1999). Beyond concern: Understanding net users\u2019 attitudes about online privacy. Florham Park: AT&T Labs-Research."},{"key":"9526_CR110","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1108\/YC-03-2013-00363","volume":"15","author":"V-I de Ville","year":"2014","unstructured":"de Ville, V.-I. (2014). Young people as company stakeholders? Moving beyond CSR. Young Consumers,15, 3\u201316. https:\/\/doi.org\/10.1108\/YC-03-2013-00363.","journal-title":"Young Consumers"},{"key":"9526_CR25","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1111\/j.1083-6101.2009.01494.x","volume":"15","author":"B Debatin","year":"2009","unstructured":"Debatin, B., Lovejoy, J. P., Horn, A.-K., & Hughes, B. N. (2009). Facebook and online privacy: Attitudes, behaviors, and unintended consequences. Journal of Computer-Mediated Communication,15, 83\u2013108. https:\/\/doi.org\/10.1111\/j.1083-6101.2009.01494.x.","journal-title":"Journal of Computer-Mediated Communication"},{"key":"9526_CR26","doi-asserted-by":"publisher","first-page":"297","DOI":"10.1080\/08959280903120261","volume":"22","author":"E Derous","year":"2009","unstructured":"Derous, E., Nguyen, H.-H., & Ryan, A. M. (2009). Hiring discrimination against Arab minorities: Interactions between prejudice and job characteristics. Human Performance,22, 297\u2013320.","journal-title":"Human Performance"},{"key":"9526_CR27","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1287\/isre.1060.0080","volume":"17","author":"T Dinev","year":"2006","unstructured":"Dinev, T., & Hart, P. (2006). An extended privacy calculus model for E-commerce transactions. Information Systems Research,17, 61\u201380.","journal-title":"Information Systems Research"},{"key":"9526_CR28","unstructured":"DiRomualdo, T., Girimonte, F., & Osle, H. (2018). The CHRO Agenda: Enabling enterprise digital transformation takes center stage.\u00a0https:\/\/www.thehackettgroup.com\/elq-key-issues-hr-1801\/."},{"key":"9526_CR29","doi-asserted-by":"publisher","first-page":"65","DOI":"10.2307\/258887","volume":"20","author":"T Donaldson","year":"1995","unstructured":"Donaldson, T., & Preston, L. E. (1995). The stakeholder theory of the corporation: Concepts, evidence, and implications. Academy of Management Review,20, 65\u201391. https:\/\/doi.org\/10.2307\/258887.","journal-title":"Academy of Management Review"},{"key":"9526_CR30","doi-asserted-by":"publisher","first-page":"66","DOI":"10.4018\/jgim.2005040104","volume":"2","author":"B Doolin","year":"2005","unstructured":"Doolin, B., Dillon, S., Thompson, F., & Corner, J. L. (2005). Perceived risk, the Internet shopping experience and online purchasing behavior: A New Zealand perspective. Journal of Global Information Management,2, 66\u201388.","journal-title":"Journal of Global Information Management"},{"key":"9526_CR31","doi-asserted-by":"publisher","first-page":"160","DOI":"10.17705\/1thci.00084","volume":"8","author":"JR Drake","year":"2016","unstructured":"Drake, J. R., Hall, D., Becton, J. B., & Posey, C. (2016). Job applicants\u2019 information privacy protection responses: Using social media for candidate screening. AIS Transactions on Human Computer Interaction,8, 160\u2013184.","journal-title":"AIS Transactions on Human Computer Interaction"},{"key":"9526_CR32","doi-asserted-by":"publisher","first-page":"232","DOI":"10.1002\/poi3.142","volume":"9","author":"NA Draper","year":"2016","unstructured":"Draper, N. A. (2016). From privacy pragmatist to privacy resigned: Challenging narratives of rational choice in digital privacy debates. Policy Internet,9, 232\u2013251. https:\/\/doi.org\/10.1002\/poi3.142.","journal-title":"Policy Internet"},{"key":"9526_CR33","doi-asserted-by":"publisher","first-page":"1","DOI":"10.4018\/joeuc.2006010101","volume":"18","author":"J Drennan","year":"2006","unstructured":"Drennan, J., Mort, G. S., & Previte, J. (2006). Privacy, risk perception, and expert online behavior: An exploratory study of household end users. Journal of Organizational and End User Computing,18, 1\u201322.","journal-title":"Journal of Organizational and End User Computing"},{"issue":"1","key":"9526_CR134","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1177\/0894439318791527","volume":"38","author":"E Dubois","year":"2020","unstructured":"Dubois, E., Gruzd, A., & Jacobson, J. (2020). Journalists\u2019 use of social media to infer public opinion: The citizens\u2019 perspective. Social Science Computer Review, 38(1), 57\u201374. https:\/\/doi.org\/10.1177\/0894439318791527.","journal-title":"Social Science Computer Review"},{"key":"9526_CR35","doi-asserted-by":"publisher","first-page":"1143","DOI":"10.1111\/j.1083-6101.2007.00367.x","volume":"12","author":"NB Ellison","year":"2007","unstructured":"Ellison, N. B., Steinfield, C., & Lampe, C. (2007). The benefits of Facebook \u201cfriends:\u201d Social capital and college students\u2019 use of online social network sites. Journal of Computer-Mediated Communication,12, 1143\u20131168. https:\/\/doi.org\/10.1111\/j.1083-6101.2007.00367.x.","journal-title":"Journal of Computer-Mediated Communication"},{"key":"9526_CR34","doi-asserted-by":"publisher","first-page":"873","DOI":"10.1177\/1461444810385389","volume":"13","author":"NB Ellison","year":"2011","unstructured":"Ellison, N. B., Steinfield, C., & Lampe, C. (2011). Connection strategies: Social capital implications of Facebook-enabled communication practices. New Media & Society,13, 873\u2013892. https:\/\/doi.org\/10.1177\/1461444810385389.","journal-title":"New Media & Society"},{"key":"9526_CR36","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1080\/713670162","volume":"2","author":"ML Finucane","year":"2000","unstructured":"Finucane, M. L., Slovic, P., Mertz, C. K., Flynn, J., & Satterfield, T. A. (2000). Gender, race, and perceived risk: The \u201cwhite male\u201d effect. Health, Risk & Society,2, 159\u2013172. https:\/\/doi.org\/10.1080\/713670162.","journal-title":"Health, Risk & Society"},{"key":"9526_CR37","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1016\/j.chb.2008.08.006","volume":"25","author":"J Fogel","year":"2009","unstructured":"Fogel, J., & Nehmad, E. (2009). Internet social network communities: Risk taking, trust, and privacy concerns. Computers in Human Behavior,25, 153\u2013160.","journal-title":"Computers in Human Behavior"},{"key":"9526_CR38","doi-asserted-by":"publisher","first-page":"867","DOI":"10.1016\/S0148-2963(01)00273-9","volume":"56","author":"SM Forsythe","year":"2003","unstructured":"Forsythe, S. M., & Shi, B. (2003). Consumer patronage and risk perceptions in Internet shopping. Journal of Business Research,56, 867\u2013875. https:\/\/doi.org\/10.1016\/S0148-2963(01)00273-9.","journal-title":"Journal of Business Research"},{"issue":"3","key":"9526_CR39","doi-asserted-by":"publisher","first-page":"845","DOI":"10.1177\/1461444816675184","volume":"20","author":"A Fortier","year":"2016","unstructured":"Fortier, A., & Burkell, J. (2016). Display and control in online social spaces: Toward a Typology of users. New Media & Society,20(3), 845\u2013861.","journal-title":"New Media & Society"},{"key":"9526_CR40","volume-title":"Strategic management: A stakeholder approach","author":"RE Freeman","year":"1984","unstructured":"Freeman, R. E. (1984). Strategic management: A stakeholder approach. Cambridge, UK: Cambridge University Press."},{"key":"9526_CR41","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511815768","volume-title":"Stakeholder theory: The state of the art","author":"RE Freeman","year":"2010","unstructured":"Freeman, R. E., Harrison, J. S., Wicks, A. C., Parmar, B. L., & Colle, S. (2010). Stakeholder theory: The state of the art. Cambridge: Cambridge University Press."},{"key":"9526_CR42","doi-asserted-by":"publisher","first-page":"1120","DOI":"10.1016\/j.chb.2010.03.016","volume":"26","author":"NE Frye","year":"2010","unstructured":"Frye, N. E., & Dornisch, M. M. (2010). When is trust not enough? The role of perceived privacy of communication tools in comfort with self-disclosure. Computers in Human Behavior,26, 1120\u20131127. https:\/\/doi.org\/10.1016\/j.chb.2010.03.016.","journal-title":"Computers in Human Behavior"},{"key":"9526_CR43","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1007\/978-3-319-58232-0_6","volume-title":"Humans and machines at work, dynamics of virtual work","author":"A Gandini","year":"2017","unstructured":"Gandini, A., & Pais, I. (2017). Social recruiting: control and surveillance in a digitised job market. In P. V. Moore, M. Upchurch, & X. Whittaker (Eds.), Humans and machines at work, dynamics of virtual work (pp. 125\u2013149). Cham: Palgrave Macmillan. https:\/\/doi.org\/10.1007\/978-3-319-58232-0_6."},{"key":"9526_CR44","doi-asserted-by":"publisher","first-page":"768","DOI":"10.1016\/S0148-2963(02)00363-6","volume":"57","author":"E Garbarino","year":"2004","unstructured":"Garbarino, E., & Strahilevitz, M. (2004). Gender differences in the perceived risk of buying online and the effects of receiving a site recommendation. Journal of Business Research,57, 768\u2013775. https:\/\/doi.org\/10.1016\/S0148-2963(02)00363-6.","journal-title":"Journal of Business Research"},{"key":"9526_CR45","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1023\/A:1006110106408","volume":"26","author":"K Gibson","year":"2000","unstructured":"Gibson, K. (2000). The moral basis of stakeholder theory. Journal of Business Ethics,26, 245\u2013257. https:\/\/doi.org\/10.1023\/A:1006110106408.","journal-title":"Journal of Business Ethics"},{"key":"9526_CR46","volume-title":"The presentation of self in everyday life","author":"E Goffman","year":"1959","unstructured":"Goffman, E. (1959). The presentation of self in everyday life. Garden City, NY: Doubleday."},{"key":"9526_CR47","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1037\/0090-5550.48.3.175","volume":"48","author":"DW Gouvier","year":"2003","unstructured":"Gouvier, D. W., Jordan, S., & Mayville, S. (2003). Patterns of discrimination in hiring job applicants with disabilities: The role of disability type, job complexity, and public contact. Rehabilitation Psychology,48, 175\u2013181. https:\/\/doi.org\/10.1037\/0090-5550.48.3.175.","journal-title":"Rehabilitation Psychology"},{"key":"9526_CR48","doi-asserted-by":"publisher","first-page":"254","DOI":"10.1177\/000765030003900302","volume":"39","author":"DW Greening","year":"2000","unstructured":"Greening, D. W., & Turban, D. B. (2000). Corporate social performance as a competitive advantage in attracting a quality workforce. Business & Society,39, 254\u2013280. https:\/\/doi.org\/10.1177\/000765030003900302.","journal-title":"Business & Society"},{"key":"9526_CR131","unstructured":"Gruzd, A., Jacobson, J., & Dubois, E. (2017). You\u2019re hired: Examining acceptance of social media screening of job applicants. In Proceedings of the 23rd Americas Conference on Information Systems. Boston, MA. https:\/\/aisel.aisnet.org\/amcis2017\/DataScience\/Presentations\/28\/."},{"key":"9526_CR49","doi-asserted-by":"publisher","DOI":"10.5683\/SP\/AL8Z6R","volume-title":"State of Social Media in Canada 2017 (No. DOI:10.5683\/SP\/AL8Z6R)","author":"A Gruzd","year":"2018","unstructured":"Gruzd, A., Jacobson, J., Dubois, E., & Mai, P. (2018). State of Social Media in Canada 2017. Toronto: Ryerson University Social Media Lab. https:\/\/doi.org\/10.5683\/SP\/AL8Z6R."},{"key":"9526_CR133","unstructured":"Gruzd, A., Jacobson, J., & Dubois, E. (in press). Cyber-vetting and the public life of social media data. Social Media + Society."},{"key":"9526_CR50","doi-asserted-by":"publisher","first-page":"442","DOI":"10.1108\/IMDS-04-2016-0130","volume":"117","author":"J Hair","year":"2017","unstructured":"Hair, J., Hollingsworth, C. L., Randolph, A. B., & Loong Chong, A. Y. (2017). An updated and expanded assessment of PLS-SEM in information systems research. Industrial Management & Data Systems Information,117, 442\u2013458. https:\/\/doi.org\/10.1108\/IMDS-04-2016-0130.","journal-title":"Industrial Management & Data Systems Information"},{"key":"9526_CR51","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1111\/j.1475-682X.2009.00317.x","volume":"80","author":"E Hargittai","year":"2010","unstructured":"Hargittai, E. (2010). Digital na(t)ives? Variation in Internet skills and uses among members of the \u201cnet generation\u201d. Sociological Inquiry,80, 92\u2013113.","journal-title":"Sociological Inquiry"},{"key":"9526_CR52","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1109\/MSP.2013.64","volume":"11","author":"E Hargittai","year":"2013","unstructured":"Hargittai, E., & Litt, E. (2013). New strategies for employment? Internet skills and online privacy practices during people\u2019s job search. IEEE Security and Privacy,11, 38\u201345.","journal-title":"IEEE Security and Privacy"},{"key":"9526_CR53","first-page":"21","volume":"10","author":"E Hargittai","year":"2016","unstructured":"Hargittai, E., & Marwick, A. (2016). \u201cWhat can I really do?\u201d Explaining the privacy paradox with online apathy. International Journal of Communication,10(21), 3737\u20133757.","journal-title":"International Journal of Communication"},{"key":"9526_CR54","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1007\/s10676-018-9482-4","volume":"20","author":"P Helm","year":"2018","unstructured":"Helm, P. (2018). Treating sensitive topics online: A privacy dilemma. Ethics and Information Technology,20, 303\u2013313. https:\/\/doi.org\/10.1007\/s10676-018-9482-4.","journal-title":"Ethics and Information Technology"},{"key":"9526_CR55","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1108\/IMDS-09-2015-0382","volume":"116","author":"J Henseler","year":"2016","unstructured":"Henseler, J., Hubona, G., & Ray, P. A. (2016). Using PLS path modeling in new technology research: Updated guidelines. Industrial Management & Data Systems Information,116, 2\u201320. https:\/\/doi.org\/10.1108\/IMDS-09-2015-0382.","journal-title":"Industrial Management & Data Systems Information"},{"key":"9526_CR56","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1023\/A:1022499121222","volume":"48","author":"M Horvath","year":"2003","unstructured":"Horvath, M., & Ryan, A. M. (2003). Antecedents and potential moderators of the relationship between attitudes and hiring discrimination on the basis of sexual orientation. Sex Roles,48, 115\u2013130. https:\/\/doi.org\/10.1023\/A:1022499121222.","journal-title":"Sex Roles"},{"key":"9526_CR57","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1111\/ntwe.12026","volume":"29","author":"D Howcroft","year":"2014","unstructured":"Howcroft, D., & Taylor, P. (2014). \u2018Plus ca change, plus la meme chose?\u2019-researching and theorising the \u2018new\u2019 new technologies: Editorial. New Technology, Work and Employment,29, 1\u20138. https:\/\/doi.org\/10.1111\/ntwe.12026.","journal-title":"New Technology, Work and Employment"},{"key":"9526_CR58","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1080\/15252019.2010.10722168","volume":"10","author":"MG Hoy","year":"2010","unstructured":"Hoy, M. G., & Milne, G. (2010). Gender differences in privacy-related measures for young adult Facebook users. Journal of Interactive Advertising,10, 28\u201345.","journal-title":"Journal of Interactive Advertising"},{"key":"9526_CR59","first-page":"43","volume":"1","author":"CJ Huberty","year":"1989","unstructured":"Huberty, C. J. (1989). Problems with stepwise methods: Better alternatives. Advances in Social Science Methodology,1, 43\u201370.","journal-title":"Advances in Social Science Methodology"},{"key":"9526_CR60","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1111\/ntwe.12085","volume":"32","author":"SA Hurrell","year":"2017","unstructured":"Hurrell, S. A., Scholarios, D., & Richards, J. (2017). \u2018The kids are alert\u2019: Generation Y responses to employer use and monitoring of social networking sites. New Technology, Work and Employment,32, 64\u201383.","journal-title":"New Technology, Work and Employment"},{"issue":"1","key":"9526_CR132","doi-asserted-by":"publisher","first-page":"18217","DOI":"10.5465\/AMBPP.2018.18217abstract","volume":"2018","author":"Jenna Jacobson","year":"2018","unstructured":"Jacobson, J. & Gruzd, A. (2018). Employers\u2019 use of young people\u2019s social media: Extending stakeholder theory to social media data. In Academy of Management Annual Meeting Proceedings. Chicago, IL. https:\/\/doi.org\/10.5465\/AMBPP.2018.18217abstract.","journal-title":"Academy of Management Proceedings"},{"key":"9526_CR61","doi-asserted-by":"publisher","first-page":"241","DOI":"10.1111\/ntwe.12018","volume":"28","author":"H Janta","year":"2013","unstructured":"Janta, H., & Ladkin, A. (2013). In search of employment: Online technologies and Polish migrants. New Technology, Work and Employment,28, 241\u2013253. https:\/\/doi.org\/10.1111\/ntwe.12018.","journal-title":"New Technology, Work and Employment"},{"key":"9526_CR62","doi-asserted-by":"publisher","first-page":"397","DOI":"10.5465\/amr.2001.4845803","volume":"26","author":"IM Jawahar","year":"2001","unstructured":"Jawahar, I. M., & McLaughlin, G. L. (2001). Toward a descriptive stakeholder theory: An organizational life cycle approach. Academy of Management Review,26, 397\u2013414.","journal-title":"Academy of Management Review"},{"key":"9526_CR63","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1111\/ntwe.12039","volume":"30","author":"D Jeske","year":"2015","unstructured":"Jeske, D., & Santuzzi, A. M. (2015). Monitoring what and how: psychological implications of electronic performance monitoring: Electronic performance monitoring of employees. New Technology, Work and Employment,30, 62\u201378. https:\/\/doi.org\/10.1111\/ntwe.12039.","journal-title":"New Technology, Work and Employment"},{"key":"9526_CR64","doi-asserted-by":"publisher","first-page":"206","DOI":"10.2307\/259075","volume":"24","author":"TM Jones","year":"1999","unstructured":"Jones, T. M., & Wicks, A. C. (1999). Convergent stakeholder theory. Academy of Management Review,24, 206\u2013221. https:\/\/doi.org\/10.2307\/259075.","journal-title":"Academy of Management Review"},{"key":"9526_CR65","doi-asserted-by":"publisher","DOI":"10.1057\/978-1-137-35398-6","volume-title":"Post, mine, repeat","author":"H Kennedy","year":"2016","unstructured":"Kennedy, H. (2016). Post, mine, repeat. London, UK: Palgrave Macmillan UK."},{"key":"9526_CR66","doi-asserted-by":"publisher","first-page":"413","DOI":"10.3233\/WOR-2009-0890","volume":"33","author":"T Krupa","year":"2009","unstructured":"Krupa, T., Kirsh, B., Cockburn, L., & Gewurtz, R. (2009). Understanding the stigma of mental illness in employment. Work,33, 413\u2013425.","journal-title":"Work"},{"key":"9526_CR67","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1037\/0033-2909.107.1.34","volume":"107","author":"MR Leary","year":"1990","unstructured":"Leary, M. R., & Kowalski, R. M. (1990). Impression management: A literature review and two-component model. Psychological Bulletin,107, 34\u201347.","journal-title":"Psychological Bulletin"},{"key":"9526_CR68","doi-asserted-by":"crossref","unstructured":"Lin, J., Amini, S., Hong, J. I., Sadeh, N., Lindqvist, J., & Zhang, J. (2012). Expectation and purpose: Understanding users\u2019 mental models of mobile app privacy through crowdsourcing. In Proceedings of the 2012 ACM Conference on Ubiquitous Computing. ACM, pp. 501\u2013510.","DOI":"10.1145\/2370216.2370290"},{"key":"9526_CR69","unstructured":"Lipford, H.R., Besmer, A., & Watson, J. (n.d.). Understanding Privacy Settings in Facebook with an Audience View. Usenix."},{"key":"9526_CR70","doi-asserted-by":"publisher","first-page":"330","DOI":"10.1080\/08838151.2012.705195","volume":"56","author":"E Litt","year":"2012","unstructured":"Litt, E. (2012). Knock, knock. Who\u2019s there? The imagined audience. Journal of Broadcasting & Electronic Media,56, 330\u2013345. https:\/\/doi.org\/10.1080\/08838151.2012.705195.","journal-title":"Journal of Broadcasting & Electronic Media"},{"key":"9526_CR71","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1080\/10714420490280152","volume":"7","author":"S Livingstone","year":"2004","unstructured":"Livingstone, S. (2004). Media literacy and the challenge of new information and communication technologies. The Communication Review,7, 3\u201314. https:\/\/doi.org\/10.1080\/10714420490280152.","journal-title":"The Communication Review"},{"key":"9526_CR72","doi-asserted-by":"publisher","first-page":"233","DOI":"10.1007\/s10676-018-9469-1","volume":"20","author":"W Loh","year":"2018","unstructured":"Loh, W. (2018). A practice\u2013theoretical account of privacy. Ethics and Information Technology,20, 233\u2013247. https:\/\/doi.org\/10.1007\/s10676-018-9469-1.","journal-title":"Ethics and Information Technology"},{"key":"9526_CR73","doi-asserted-by":"publisher","first-page":"11","DOI":"10.2139\/ssrn.2425132","volume":"1","author":"C Lutz","year":"2014","unstructured":"Lutz, C., & Strathoff, P. (2014). Privacy concerns and online behavior\u2013Not so paradoxical after all? Viewing the Privacy Paradox Through Different Theoretical Lenses. https:\/\/doi.org\/10.2139\/ssrn.2425132.","journal-title":"Viewing the Privacy Paradox Through Different Theoretical Lenses"},{"key":"9526_CR74","doi-asserted-by":"publisher","first-page":"192","DOI":"10.1080\/01972243.2016.1153010","volume":"32","author":"J-E Mai","year":"2016","unstructured":"Mai, J.-E. (2016). Big data privacy: The datafication of personal information. The Information Society,32, 192\u2013199. https:\/\/doi.org\/10.1080\/01972243.2016.1153010.","journal-title":"The Information Society"},{"key":"9526_CR75","unstructured":"Mao, E., & Zhang, J. (2014). Gender differences in the effect of privacy on location-based services use on mobile phones. Presented at the Twentieth Americas Conference on Information Systems, Savannah, pp. 1\u201313."},{"key":"9526_CR76","doi-asserted-by":"publisher","DOI":"10.1080\/1369118X.2018.1450432","author":"A Marwick","year":"2018","unstructured":"Marwick, A., & Hargittai, E. (2018). Nothing to hide, nothing to lose? Incentives and disincentives to sharing information with institutions online. Information, Communication & Society,\u00a022(12),\u00a01697\u20131713.\u00a0https:\/\/doi.org\/10.1080\/1369118X.2018.1450432.","journal-title":"Information, Communication & Society"},{"key":"9526_CR77","volume-title":"Youth, privacy and reputation (literature review) (SSRN Scholarly Paper No. ID 1588163)","author":"AE Marwick","year":"2010","unstructured":"Marwick, A. E., Murgia-Diaz, D., & Palfrey, J. G. (2010). Youth, privacy and reputation (literature review) (SSRN Scholarly Paper No. ID 1588163). Rochester, NY: Social Science Research Network."},{"issue":"5","key":"9526_CR78","doi-asserted-by":"publisher","first-page":"1715","DOI":"10.1177\/1461444817706073","volume":"20","author":"B McEwan","year":"2017","unstructured":"McEwan, B., & Flood, M. (2017). Passwords for jobs: Compression of identity in reaction to perceived organizational control via social media surveillance. New Media & Society,20(5), 1715\u20131734.","journal-title":"New Media & Society"},{"key":"9526_CR79","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-230-31359-0","volume-title":"The ethical business: challenges and controversies","author":"K Mellahi","year":"2010","unstructured":"Mellahi, K., Morrell, K., & Wood, G. (2010). The ethical business: challenges and controversies. London, UK: Palgrave Macmillan."},{"key":"9526_CR80","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1162\/DAED_a_00113","volume":"140","author":"H Nissenbaum","year":"2011","unstructured":"Nissenbaum, H. (2011). A contextual approach to privacy online. Daedalus,140, 32\u201348.","journal-title":"Daedalus"},{"key":"9526_CR81","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1177\/10442073040150010501","volume":"15","author":"B O\u2019Hara","year":"2004","unstructured":"O\u2019Hara, B. (2004). Twice penalized: Employment discrimination against women with disabilities. Journal of Disability Policy Studies,15, 27\u201334. https:\/\/doi.org\/10.1177\/10442073040150010501.","journal-title":"Journal of Disability Policy Studies"},{"key":"9526_CR82","doi-asserted-by":"publisher","first-page":"63","DOI":"10.2753\/JOA0091-3367380405","volume":"38","author":"S Okazaki","year":"2009","unstructured":"Okazaki, S., Li, H., & Hirose, M. (2009). Consumer privacy concerns and preference for degree of regulatory control. Journal of Advertising Research,38, 63\u201377. https:\/\/doi.org\/10.2753\/JOA0091-3367380405.","journal-title":"Journal of Advertising Research"},{"key":"9526_CR83","doi-asserted-by":"publisher","first-page":"1","DOI":"10.17705\/1atrr.00003","volume":"1","author":"B Osatuyi","year":"2015","unstructured":"Osatuyi, B. (2015). Empirical examination of information privacy concerns instrument in the social media context. AIS Transactions on Replication Research,1, 1\u201314.","journal-title":"AIS Transactions on Replication Research"},{"key":"9526_CR84","unstructured":"Oshima, T., & Dell-Ross, T. (2016). All possible regressions using IBM SPSS: A practitioner\u2019s guide to automatic linear modeling. In: Georgia Educational Research Association Conference."},{"key":"9526_CR85","volume-title":"Born digital: Understanding the first generation of digital natives","author":"J Palfrey","year":"2010","unstructured":"Palfrey, J., & Gasser, U. (2010). Born digital: Understanding the first generation of digital natives. New York: Basic Books."},{"key":"9526_CR86","doi-asserted-by":"publisher","first-page":"160","DOI":"10.1111\/ntwe.12028","volume":"29","author":"S Pedersen","year":"2014","unstructured":"Pedersen, S., Burnett, S., Smith, R., & Grinnall, A. (2014). The impact of the cessation of blogs within the UK police blogosphere: Impact of the cessation of blogs. New Technology, Work and Employment,29, 160\u2013176. https:\/\/doi.org\/10.1111\/ntwe.12028.","journal-title":"New Technology, Work and Employment"},{"key":"9526_CR87","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1089\/cpb.2007.9927","volume":"11","author":"J Peluchette","year":"2008","unstructured":"Peluchette, J., & Karl, K. (2008). Social networking profiles: An examination of student attitudes regarding use and appropriateness of content. CyberPsychology & Behavior,11, 95\u201397. https:\/\/doi.org\/10.1089\/cpb.2007.9927.","journal-title":"CyberPsychology & Behavior"},{"key":"9526_CR88","doi-asserted-by":"publisher","first-page":"371","DOI":"10.1016\/j.labeco.2006.01.006","volume":"14","author":"P Petit","year":"2007","unstructured":"Petit, P. (2007). The effects of age and family constraints on gender hiring discrimination: A field experiment in the French financial sector. Labour Economics,14, 371\u2013391. https:\/\/doi.org\/10.1016\/j.labeco.2006.01.006.","journal-title":"Labour Economics"},{"key":"9526_CR89","doi-asserted-by":"publisher","first-page":"350","DOI":"10.1177\/0270467610380009","volume":"30","author":"A Quan-Haase","year":"2010","unstructured":"Quan-Haase, A., & Young, A. L. (2010). Uses and gratifications of social media: A comparison of Facebook and instant messaging. Bulletin of Science, Technology & Society,30, 350\u2013361. https:\/\/doi.org\/10.1177\/0270467610380009.","journal-title":"Bulletin of Science, Technology & Society"},{"issue":"3","key":"9526_CR90","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1007\/s10676-018-9492-2","volume":"21","author":"PM Regan","year":"2018","unstructured":"Regan, P. M., & Jesse, J. (2018). Ethical challenges of edtech, big data and personalized learning: Twenty-first century student sorting and tracking. Ethics and Information Technology,21(3), 167\u2013179. https:\/\/doi.org\/10.1007\/s10676-018-9492-2.","journal-title":"Ethics and Information Technology"},{"issue":"3","key":"9526_CR91","doi-asserted-by":"publisher","first-page":"425","DOI":"10.1007\/s10796-017-9806-7","volume":"20","author":"M Richey","year":"2017","unstructured":"Richey, M., Gonibeed, A., & Ravishankar, M. N. (2017). The perils and promises of self-disclosure on social media. Information Systems Frontiers,20(3), 425\u2013437. https:\/\/doi.org\/10.1007\/s10796-017-9806-7.","journal-title":"Information Systems Frontiers"},{"key":"9526_CR92","unstructured":"RiskAware [WWW Document]. (2017). Retrieved June 10, from, 2017 https:\/\/riskaware.com\/our-products\/social-media-screening\/."},{"key":"9526_CR93","volume-title":"\u2018You are the product\u2019: Targeted by Cambridge analytica on Facebook","author":"M Rosenberg","year":"2018","unstructured":"Rosenberg, M., & Dance, G. J. X. (2018). \u2018You are the product\u2019: Targeted by Cambridge Analytica on Facebook. New York: New York Times."},{"key":"9526_CR94","doi-asserted-by":"publisher","first-page":"352","DOI":"10.1080\/03634523.2013.807348","volume":"62","author":"P Schrodt","year":"2013","unstructured":"Schrodt, P. (2013). Content relevance and students\u2019 comfort with disclosure as moderators of instructor disclosures and credibility in the college classroom. Communication Education,62, 352\u2013375. https:\/\/doi.org\/10.1080\/03634523.2013.807348.","journal-title":"Communication Education"},{"key":"9526_CR95","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1080\/01972240252818207","volume":"18","author":"KB Sheehan","year":"2002","unstructured":"Sheehan, K. B. (2002). Toward a typology of Internet users and online privacy concerns. The Information Society,18, 21\u201332.","journal-title":"The Information Society"},{"key":"9526_CR96","doi-asserted-by":"crossref","unstructured":"Shen, G., Jia, J., Nie, L., Feng, F., Zhang, C., & Hu, T. (2017). Depression detection via harvesting social media: A multimodal dictionary learning solution. In Proceedings of the Twenty-Sixth International Joint Conference on Artificial Intelligence (IJCAI-17) pp. 3838\u20133844.","DOI":"10.24963\/ijcai.2017\/536"},{"key":"9526_CR97","volume-title":"Searching for work in a digital era","author":"A Smith","year":"2015","unstructured":"Smith, A. (2015). Searching for work in a digital era. Washington: Pew Research Center."},{"key":"9526_CR98","doi-asserted-by":"publisher","first-page":"316","DOI":"10.1177\/1094670503005004004","volume":"5","author":"DF Spake","year":"2003","unstructured":"Spake, D. F., Beatty, S. E., Brockman, B. K., & Crutchfield, T. N. (2003). Consumer comfort in service relationships: Measurement and importance. Journal of Service Research,5, 316\u2013332.","journal-title":"Journal of Service Research"},{"key":"9526_CR99","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1108\/17505931111121507","volume":"5","author":"DF Spake","year":"2011","unstructured":"Spake, D. F., Zachary Finney, R., & Joseph, M. (2011). Experience, comfort, and privacy concerns: Antecedents of online spending. Journal of Research in Interactive Marketing,5, 5\u201328. https:\/\/doi.org\/10.1108\/17505931111121507.","journal-title":"Journal of Research in Interactive Marketing"},{"key":"9526_CR100","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1080\/01972243.2015.1107167","volume":"32","author":"L Stark","year":"2016","unstructured":"Stark, L. (2016). The emotional context of information privacy. The Information Society,32, 14\u201327. https:\/\/doi.org\/10.1080\/01972243.2015.1107167.","journal-title":"The Information Society"},{"key":"9526_CR101","unstructured":"Statistica. (2017a). Facebook users worldwide 2017 [WWW Document]. Statista. Retrieved November 11, 2017, from https:\/\/www.statista.com\/statistics\/264810\/number-of-monthly-active-facebook-users-worldwide\/."},{"key":"9526_CR102","unstructured":"Statistica. (2017b). Instagram - Statistics & Facts [WWW Document]. www.statista.com. Retrieved November 11, 2017, from https:\/\/www.statista.com\/topics\/1882\/instagram\/."},{"key":"9526_CR103","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1287\/isre.13.1.36.97","volume":"13","author":"KA Stewart","year":"2002","unstructured":"Stewart, K. A., & Segars, A. H. (2002). An empirical examination of the concern for information privacy instrument. Information Systems Research,13, 36\u201349. https:\/\/doi.org\/10.1287\/isre.13.1.36.97.","journal-title":"Information Systems Research"},{"key":"9526_CR104","first-page":"35","volume-title":"Managerial Ethics: Moral management of people and processes","author":"DL Stone","year":"1998","unstructured":"Stone, D. L., & Stone-Romero, E. F. (1998). A multiple stakeholder model of privacy in organizations. In M. Schminke (Ed.), Managerial Ethics: Moral management of people and processes (pp. 35\u201360). Mahwah, N.J.: Psychology Press."},{"key":"9526_CR105","first-page":"1","volume":"1","author":"JJ Suh","year":"2015","unstructured":"Suh, J. J., & Hargittai, E. (2015). Privacy management on Facebook: Do device type and location of posting matter? Social Media Society,1, 1\u201311.","journal-title":"Social Media Society"},{"key":"9526_CR106","unstructured":"Townsend, L., & Wallace, C. (n.d.). Social media research: A guide to ethics (No. Economic and Social Research Council [Grant Number ES\/M001628\/1]). University of Aberdeen."},{"key":"9526_CR107","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1111\/j.1468-2389.2010.00488.x","volume":"18","author":"W-C Tsai","year":"2010","unstructured":"Tsai, W.-C., & Yang, I. W.-F. (2010). Does image matter to different job applicants? The influences of corporate image and applicant individual differences on organizational attractiveness. International Journal of Selection and Assessment,18, 48\u201363.","journal-title":"International Journal of Selection and Assessment"},{"key":"9526_CR108","doi-asserted-by":"publisher","first-page":"658","DOI":"10.2307\/257057","volume":"40","author":"DB Turban","year":"1997","unstructured":"Turban, D. B., & Greening, D. W. (1997). Corporate social performance and organizational attractiveness to prospective employees. Academy of Management Journal,40, 658\u2013672. https:\/\/doi.org\/10.2307\/257057.","journal-title":"Academy of Management Journal"},{"key":"9526_CR109","first-page":"63","volume":"22","author":"E Tverdek","year":"2008","unstructured":"Tverdek, E. (2008). What makes information \u201cpublic\u201d? Public Affairs Quarterly,22, 63\u201377.","journal-title":"Public Affairs Quarterly"},{"key":"9526_CR111","volume-title":"The A to Z of corporate social responsibility","author":"W Visser","year":"2010","unstructured":"Visser, W., Matten, D., Pohl, M., & Tolhurst, N. (2010). The A to Z of corporate social responsibility. West Sussex, UK: Wiley."},{"issue":"8","key":"9526_CR112","doi-asserted-by":"publisher","first-page":"1671","DOI":"10.1177\/0007650317726985","volume":"58","author":"J Weber","year":"2017","unstructured":"Weber, J. (2017). Understanding the millennials\u2019 integrated ethical decision-making process: Assessing the relationship between personal values and cognitive moral reasoning. Business & Society,58(8), 1671\u20131706.","journal-title":"Business & Society"},{"issue":"6","key":"9526_CR130","first-page":"8","volume":"11","author":"AF Westin","year":"2000","unstructured":"Westin, A. F. (2000). Intrusions. Public Perspective, 11(6), 8\u201311.","journal-title":"Public Perspective"},{"key":"9526_CR113","doi-asserted-by":"publisher","first-page":"362","DOI":"10.1108\/QMR-06-2013-0041","volume":"16","author":"A Whiting","year":"2013","unstructured":"Whiting, A., & Williams, D. (2013). Why people use social media: A uses and gratifications approach. Qualitative Market Research: An International Journal,16, 362\u2013369. https:\/\/doi.org\/10.1108\/QMR-06-2013-0041.","journal-title":"Qualitative Market Research: An International Journal"},{"key":"9526_CR114","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1002\/pa.1414","volume":"12","author":"DL Williams","year":"2012","unstructured":"Williams, D. L., Crittenden, V. L., Keo, T., & McCarty, P. (2012). The use of social media: An exploratory study of usage among digital natives. Journal of Public Affairs,12, 127\u2013136. https:\/\/doi.org\/10.1002\/pa.1414.","journal-title":"Journal of Public Affairs"},{"key":"9526_CR115","first-page":"27","volume":"39","author":"H Yang","year":"2013","unstructured":"Yang, H. (2013). The case for being automatic: Introducing the Automatic Linear Modeling (LINEAR) procedure in SPSS statistics. Multiple Linear Regression Viewpoints,39, 27\u201337.","journal-title":"Multiple Linear Regression Viewpoints"},{"key":"9526_CR116","doi-asserted-by":"publisher","first-page":"763","DOI":"10.1089\/cpb.2007.0240","volume":"11","author":"S Youn","year":"2008","unstructured":"Youn, S., & Hall, K. (2008). Gender and online privacy among teens: Risk perception, privacy concerns, and protection behaviors. CyberPsychology & Behavior,11, 763\u2013765. https:\/\/doi.org\/10.1089\/cpb.2007.0240.","journal-title":"CyberPsychology & Behavior"}],"container-title":["Ethics and Information Technology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10676-020-09526-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10676-020-09526-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10676-020-09526-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,3,1]],"date-time":"2021-03-01T19:37:47Z","timestamp":1614627467000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10676-020-09526-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,3,2]]},"references-count":121,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2020,6]]}},"alternative-id":["9526"],"URL":"https:\/\/doi.org\/10.1007\/s10676-020-09526-2","relation":{"has-preprint":[{"id-type":"doi","id":"10.32920\/25475317","asserted-by":"object"},{"id-type":"doi","id":"10.32920\/25475317.v1","asserted-by":"object"}]},"ISSN":["1388-1957","1572-8439"],"issn-type":[{"value":"1388-1957","type":"print"},{"value":"1572-8439","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,3,2]]},"assertion":[{"value":"2 March 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}