{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,15]],"date-time":"2025-12-15T04:25:55Z","timestamp":1765772755946,"version":"3.38.0"},"reference-count":32,"publisher":"SAGE Publications","issue":"5","license":[{"start":{"date-parts":[[2017,5,7]],"date-time":"2017-05-07T00:00:00Z","timestamp":1494115200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["New Media &amp; Society"],"published-print":{"date-parts":[[2018,5]]},"abstract":"<jats:p> News stories regarding societal engagement with technology can carry implicit threats regarding technology use. Comments posted in response to such implicit threats can provide a window into concerns regarding the intersections of technology, privacy, surveillance, and workplaces. Using the framework provided by Tracy and Trethewey\u2019s Crystallized Selves, an iterative qualitative analysis was undertaken to examine 4725 responses to a Yahoo! News article reporting an implicit threat of potential employers asking for interviewees\u2019 Facebook passwords. A series of categories emerged identifying perceived collusion between corporations, the government, and Facebook supported by competition in the labor market. Perceptions and understandings of this practice were influenced by how commentators perceived the labor market, meritocracy, and social media users. <\/jats:p>","DOI":"10.1177\/1461444817706073","type":"journal-article","created":{"date-parts":[[2017,5,8]],"date-time":"2017-05-08T06:39:31Z","timestamp":1494225571000},"page":"1715-1734","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":6,"title":["Passwords for jobs: Compression of identity in reaction to perceived organizational control via social media surveillance"],"prefix":"10.1177","volume":"20","author":[{"given":"Bree","family":"McEwan","sequence":"first","affiliation":[{"name":"DePaul University, USA"}]},{"given":"Michelle","family":"Flood","sequence":"additional","affiliation":[{"name":"University of Iowa, USA"}]}],"member":"179","published-online":{"date-parts":[[2017,5,7]]},"reference":[{"key":"bibr1-1461444817706073","doi-asserted-by":"publisher","DOI":"10.1525\/si.2000.23.1.1"},{"key":"bibr2-1461444817706073","first-page":"85","volume-title":"Lenin and Philosophy and Other Essays","author":"Althusser L","year":"1971"},{"key":"bibr3-1461444817706073","doi-asserted-by":"publisher","DOI":"10.1509\/jmr.10.0353"},{"key":"bibr4-1461444817706073","doi-asserted-by":"publisher","DOI":"10.1089\/cyber.2009.0193"},{"key":"bibr5-1461444817706073","first-page":"39","volume-title":"A Networked Self: Identity, Community, and Culture on Social Network Sites","author":"boyd d","year":"2011"},{"key":"bibr6-1461444817706073","unstructured":"Butler-Kisber L, Poldma T (2010) The power of visual approaches in qualitative inquiry: the use of collage making and concept mapping in experiential research. Journal of Research Practice 6(2): Article M18. Available at: http:\/\/jrp.icaap.org\/index.php\/jrp\/article\/view\/197\/196"},{"volume-title":"Democracy in an Age of Corporate Colonization","year":"1992","author":"Deetz SA","key":"bibr7-1461444817706073"},{"key":"bibr8-1461444817706073","unstructured":"Duggan M, Ellison NB, Lampe C, et al. (2015) Social media update 2014. Pew Research Center. Available at: http:\/\/www.pewinternet.org\/2015\/01\/09\/social-media-update-2014\/"},{"key":"bibr9-1461444817706073","first-page":"151","volume-title":"The Oxford Handbook of Internet Studies","author":"Ellison NB","year":"2013"},{"key":"bibr10-1461444817706073","unstructured":"Facebook (2012) Protecting your passwords and privacy. Facebook.com. Available at: https:\/\/www.facebook.com\/notes\/facebook-and-privacy\/protecting-your-passwords-and-your-privacy\/326598317390057\/"},{"key":"bibr11-1461444817706073","unstructured":"Farmer JAI (2012) Code for collecting Yahoo! News comments, Unpublished."},{"volume-title":"Discipline and Punish: The Birth of the Prison","year":"1975","author":"Foucault M","key":"bibr12-1461444817706073"},{"volume-title":"The Presentation of Self in Everyday Life","year":"1959","author":"Goffman E","key":"bibr13-1461444817706073"},{"key":"bibr14-1461444817706073","volume-title":"Culture\u2019s Consequences: Comparing Values, Behaviors, Institutions and Organizations across Nations","author":"Hofstede G","year":"2001","edition":"2"},{"key":"bibr15-1461444817706073","doi-asserted-by":"publisher","DOI":"10.1177\/0270467610385893"},{"key":"bibr16-1461444817706073","unstructured":"Horn J (2012) Are job seekers really being asked for Facebook passwords? The San Diego Union-Tribune, 20 April. Available at: http:\/\/www.sandiegouniontribune.com\/business\/economy\/sdut-are-facebook-passwords-really-being-requested-job\u20132012apr20-htmlstory.html"},{"key":"bibr17-1461444817706073","doi-asserted-by":"publisher","DOI":"10.1037\/11059-000"},{"key":"bibr18-1461444817706073","unstructured":"Kauffman M (2012) Claim check: employers asking for Facebook passwords. Hartford Courant, 27 March. Available at: http:\/\/courantblogs.com\/investigative-reporting\/claim-check-employers-asking-for-facebook-passwords\/"},{"key":"bibr19-1461444817706073","first-page":"101","volume":"91","author":"Lee C","year":"2013","journal-title":"North Carolina Law Review"},{"key":"bibr20-1461444817706073","first-page":"85","volume-title":"Social Networking and Impression Management: Self-Presentation in the Digital Age","author":"McEwan B","year":"2013"},{"volume-title":"The Meritocracy Myth","year":"2004","author":"McNamee SJ","key":"bibr21-1461444817706073"},{"key":"bibr22-1461444817706073","doi-asserted-by":"publisher","DOI":"10.1177\/1461444810365313"},{"key":"bibr23-1461444817706073","unstructured":"Mitchell A, Gottfried J, Kiley J, et al. (2014) Political polarization and media habits: from Fox News to Facebook, how liberals and conservatives keep up with politics. Pew Research Center. Available at: http:\/\/www.journalism.org\/2014\/10\/21\/about-the-study-2\/"},{"key":"bibr24-1461444817706073","unstructured":"National Conference of State Legislatures (NCSL) (2014) Employer Access to Social Media Usernames and Passwords: 2012 Legislation. NCSL. Available at: http:\/\/www.ncsl.org\/research\/telecommunications-and-information-technology\/employer-access-to-social-media-passwords-2013.aspx#2013"},{"key":"bibr25-1461444817706073","first-page":"207","volume-title":"Frontiers in New Media Research","author":"Papacharissi Z","year":"2013"},{"key":"bibr26-1461444817706073","doi-asserted-by":"publisher","DOI":"10.1177\/160940690900800107"},{"key":"bibr27-1461444817706073","unstructured":"The New York Times (2012) Senators question employer requests for Facebook passwords. The New York Times, 25 March. Available at: http:\/\/www.nytimes.com\/2012\/03\/26\/technology\/senators-want-employers-facebook-password-requests-reviewed.html?_r=0"},{"key":"bibr28-1461444817706073","doi-asserted-by":"publisher","DOI":"10.1111\/j.1468-2885.2005.tb00331.x"},{"key":"bibr29-1461444817706073","unstructured":"Trethewey A, Tracy SJ, Alberts J (2006) Crystallizing frames for work-life. The Electronic Journal of Communication. Available at: http:\/\/www.cios.org\/EJCPUBLIC\/016\/3\/01636.HTML"},{"key":"bibr30-1461444817706073","unstructured":"US Equal Employment Opportunity Commission (n.d.) Discrimination by Type. Available at: http:\/\/www.eeoc.gov\/laws\/types\/"},{"key":"bibr31-1461444817706073","unstructured":"Valdes M, McFarland S (2012) Job seekers getting asked for Facebook passwords. Yahoo News! 20 March. Available at: http:\/\/news.yahoo.com\/job-seekers-getting-asked-facebook-passwords-071251682.html"},{"key":"bibr32-1461444817706073","doi-asserted-by":"publisher","DOI":"10.1177\/1532708610386546"}],"container-title":["New Media &amp; Society"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/1461444817706073","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/full-xml\/10.1177\/1461444817706073","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/1461444817706073","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,2]],"date-time":"2025-03-02T07:48:00Z","timestamp":1740901680000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/10.1177\/1461444817706073"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,5,7]]},"references-count":32,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2018,5]]}},"alternative-id":["10.1177\/1461444817706073"],"URL":"https:\/\/doi.org\/10.1177\/1461444817706073","relation":{},"ISSN":["1461-4448","1461-7315"],"issn-type":[{"type":"print","value":"1461-4448"},{"type":"electronic","value":"1461-7315"}],"subject":[],"published":{"date-parts":[[2017,5,7]]}}}