Online privacy in job recruitment processes? Boundary work among cybervetting recruiters

17Citations
Citations of this article
50Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

This article addresses various ways that cybervetting recruiters (re)construct boundaries around the public–private division. Based on interviews with 37 recruiters in Sweden, we show how the practice of cybervetting is legitimised by the recruiters’ descriptions and accounts in relation to various notions of privacy and norms of information flow. We present this as a boundary work aided by especially two ways of framing information: the repertoire about accessible information and the repertoire of relevant information. These repertoires help define what information can be conceived of as public or private, and as legitimate versus unethical to search for and to use. Privacy is framed by employers as a responsibility, rather than a right, for social network site users. The findings also underline similarities and differences in jobseekers’ and employers’ norms of information flow, not least considering the right to online privacy.

Cite

CITATION STYLE

APA

Backman, C., & Hedenus, A. (2019). Online privacy in job recruitment processes? Boundary work among cybervetting recruiters. New Technology, Work and Employment, 34(2), 157–173. https://doi.org/10.1111/ntwe.12140

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free