Академический Документы
Профессиональный Документы
Культура Документы
research-article2014
Article
Online Employment
Screening and Digital
Career Capital: Exploring
Employers Use of
Online Information for
Personnel Selection
Abstract
This study explores how employers report using online information to
evaluate job candidates during personnel selection. Qualitative analysis
of 45 in-depth employer interviews emphasizes how new and different
information visibility afforded by the Internet simultaneously replicates and
shifts how employers evaluate reconstructed information about candidates
during personnel selection. Data revealed that employers evaluate the
relative presence or absence of certain types of visual, textual, relational, and
technological information in patterned and idiosyncratic ways. We discuss
the likely consequences for theory and practices of personnel selection and
careers, emphasizing the increasing expectations for workers to curate digital
career capital to manage the expanding contexts within which employers
construct and evaluate professional and/or workplace identities.
Keywords
cybervetting, personnel selection, digital career capital, curating online
identity, information visibility, organizational processes, impression
management
1The
2Purdue
Corresponding Author:
Brenda L. Berkelaar, Department of Communication Studies, The University of Texas at
Austin, 2504A Whitis Avenue (A1105), Austin, TX 78712-0115, USA.
Email: b.berkelaar@austin.utexas.edu
85
86
reveals how employers acquire, recontextualize, and use the presence and
absence of different types of online information to make sense of job candidates. Thus, this study addresses ongoing calls to consider everyday practices
of personnel selection (Dipboye, 2014) and the impact of new technologies
on organizational processes and outcomes (Treem & Leonardi, 2012).
Understanding how employers use online information can inform personnel
selection practicesthe outcomes of which affect organizational productivity, employee satisfaction (Ployhart & Weekley, 2010), individual quality of
life, and social justice (Cheney, Lair, Ritz, & Kendall, 2009). This study also
highlights how growing information visibilityand expectations thereof
affects employment relationships and career management. In particular, we
consider how cybervetting increases demands on individuals to curate their
digital professional image in spatio-temporal contexts previously excluded
from personnel selection. We begin by describing the information context of
contemporary personnel selection before examining how cybervettings
characteristics likely influence job candidate evaluations.
87
and brand (Edwards, 2005) amplify employer interest, encouraging employers to view such information as valuable, even necessary, for assessing fit
(Berkelaar et al., 2014). Employers who buy into the employee-as-brand
mindset assume that employee actions outside contexts or times typically
associated with paid-work contracts can affect an organizations imageand
should be controlled (Edwards, 2005). Employers have long wanted such
information; however, until recently, acquiring it was usually cost- or timeprohibitive, limited to recommendations, references, or conversations made
possible by shared networks. Now, the growing popularity of online activities
(Bohn & Short, 2009) and advances in search and aggregation make different
sources and types of information visiblethat is, both available and easily
accessible (Treem & Leonardi, 2012). Although employers desire for such
information is not new, how employers are fulfilling this desire is quite new.
Cybervettingthe process whereby employers seek information about job
candidates onlineis typically covert, enabled by the Internets extractive
possibilities (Ramirez, Walther, Burgoon, & Sunnafrank, 2002). Cybervetting
often focuses on acquiring information from non-institutional, non-governmental, and informal online sources (Berkelaar et al., 2014) such as social
media (Table 1). However, search engine and aggregator results often intermingle social media and governmental, institutional, and/or (former) employment information. By shifting sources and contexts, cybervetting alters the
scope of information and the proportion of work versus non-work information, and when and how different information becomes included in personnel
selection. Such changes affect evaluations and subsequent decisions (Case,
2012; Jablin, 2001), making cybervetting an important, timely site for understanding contemporary personnel selection.
88
Cybervetting
Sources
Search engines
Social network sites
Aggregators
e-commerce
Virtual worlds
(Micro-)blogs
Types
Age
Interests/hobbies
Political views
Relationships
Relational/familial status
Sexual orientation
Access
Individually determined
Restricted
Corporate privacy
policies
Institutional/organizational
permission required
Individual notification and
approval required
Construction
and
Management
Informal
Emergent
Formal
Institutionalized/legislated
Due process requirements
Goals for
Information
Construction
Individually oriented
Social; and/or
Personal/private
Collectively oriented
Public records
Institutional records
Credit information
Criminal records
Political donations
Vital records
89
et al., 2002), and information aggregation (Solove, 2008). It is not just job
candidates, but also other people and technologies, that create, share, order,
and compile informationoften for purposes other than employment (boyd,
2007). Even if individuals restrict access to social media sites, impressions
are shaped by friends, physical attributes (Walther et al., 2008), the design
of online spaces (Back et al., 2010), and the (unintentional) aggregation and
information visibility of the technologies themselves (Zuboff, 1989). In contrast to credit reports or criminal background checks, most online information
is created via informal, emergent processes (boyd, 2007) without due process. Even if individuals attempt to manage online information, data fragments often remain after removal attempts (Solove, 2008), sources may
refuse to remove information, and information may be broadcast further than
expected as networks are more expansive and visible than people realize
(boyd, 2007). Consequently, employers acquire information candidates may
not have intended to share with them or to share in that way (Solove, 2008).
Such information is desirable for those trying to get a sense of candidates
real identities (Berger & Douglas, 1981) although it may not always be as
credible as often believed.
Information acquired online is reconfigured based on the algorithms of the
particular search engines or aggregators (e.g., Bing produces different
results and differently ordered results than Google. Because cybervetting
occurs asynchronously and remotely, information becomes temporally and
physically decontextualized from its original context. Even if the information
acquired was framed appropriately for its originally intended communicative
context and audience, employers likely recontextualize job candidate information given personnel selection goals because evaluators embodied context
and evaluative intent shape attributions (McGlone & Pfeister, 2009).
Decontextualization and recontextualization affect evaluations as communications intended for other audiences and contexts are filtered through individual differences (Mayfield & Carlson, 1966; Metzger et al., 2010) and
professional norms (Cheney et al., 2009). Given that research demonstrates a
lack of interrater reliability for popular offline selection strategies (Mayfield
& Carlson, 1966), it is likely such effects will be amplified during cybervetting because information cues often become more salient and attributions
more extreme in distributed contexts (DeAndrea & Walther, 2011).
Yet, employers rarely consider the implications of their information-seeking practices. Employers often assume expertise enables accurate evaluations
(Miron-Shatz & Ben-Shakhar, 2008). However, consistent with satisficing
and common information-seeking heuristics (Metzger et al., 2010), employers stop searching after quickly reviewing initial search results (Berkelaar et
al., 2014). Negative information is rarely verified (Jablin, 2001) and is often
90
more salient when evaluating job candidates (Jablin, 2001; Webster, 1964).
More problematically, attempts to discount irrelevant information tend to
make such information hyperaccessible and therefore more salient (MironShatz & Ben-Shakhar, 2008).
Many people presume online information is better because it is easier to
access more data online (Treem & Leonardi, 2012); however, online information tends to be incomplete and fragmented (Solove, 2008). The common
presumption that more is better often obscures the need to critically evaluate
information quality and relevance (Dipboye, 2014; Metzger et al., 2010).
Such beliefs will likely improve evaluations for those who disclose more, all
else being equal.
In particular, cybervetting can increase the proportion of non-work information considered during personnel selection (Cross-Tab, 2010) because the
Internet makes certain information more visible: interests, hobbies, interpersonal interactions, religious/political views, relationship/parental status, and
sexual orientation (Bohn & Short, 2009). The Internet also provides more
relational, technological, and visual information than most conventional
sources and does so in a streamlined fashion (boyd, 2007). Research on
offline selection highlights how such differences can alter attributions (Jablin,
2001) such as when access to visual cues alters evaluations (e.g., attractive
applicants ranked higher; Dipboye, Fromkin, & Wilback, 1975).
Our point is not that cybervetting is a completely different personnel
selection process; rather, we argue that cybervettings communicative characteristics are an understudied yet consequential aspect of personnel selection. Cybervettings communicative characteristics expand the spaces and
time within which job candidates are evaluated, the content considered, and
the order and configuration of informationall of which affect evaluations
and subsequent decisions (Case, 2012). To locate and elaborate more fully on
the ways cybervettings characteristics affect personnel selection, we asked
employers to describe what information they acquire and how they use, and
have used this information to inform job candidate evaluations.
Method
Sample
Participants included 45 employers (24 men, 21 women) who had actively
participated in hiring. Ranging in age from 23 to 60 years (median = 35),
participants were primarily Caucasian (82%). The sample primarily included
human resource (HR) staff, recruiters, and hiring managers (~75%) because
these are the primary roles involved in personnel selection. Because hiring
91
Data Collection
The first author recruited participants using purposive, snowball sampling to
help identify information rich, key informants, who could offer insights of
theoretical interest and were willing to discuss sensitive topics (Charmaz,
2006). We contacted initial participants primarily via cold calls and professional contexts, recruiting a few via social media. Our intent was to create
different recruitment chains as disconnected from the researchers as possible
to mitigate limitations of snowball sampling. We initially targeted HR personnel and recruiters. We expanded levels and roles as potential characteristics of interest (e.g., industry, organization size, type, organizational role,
occupation) emerged from the data. After each interview, participants were
asked whether they could recommend people who might offer different perspectives. We contacted subsequent participants based on whether they
seemed likely to help refine and test emerging themes (Charmaz, 2006).
Our semi-structured interview protocol allowed us to gain unexpected
insights while focusing the research on a central topic of interest (Charmaz,
2006). The first author initially asked participants to describe personnel
selection experiences and types and sources of information used. She then
asked about interpretations and evaluations made using online information.
More than half of the participants spontaneously described their use of online
information for personnel selection. Besides asking for examples of specific
situations, the first author probed for types and sources of information and the
relevance of such information for personnel selection as needed. Given
cybervettings debated legality and ethicality and many organizations protection of hiring practices as proprietary (Shilling, 2009), we included indirect and hypothetical questions known to increase response rates and accuracy
92
for sensitive questions (e.g., Can you tell me about someone who . . .;
Charmaz, 2006). With participant consent, all interviews were audiotaped,
transcribed, and verified against recordings for accuracy. Interviews averaged 54 minutes (range: 30-90 minutes), for a total of 38.7 hours recorded
and 682 single-spaced transcription pages, along with more than 300 pages of
handwritten field notes, and 12 pages of typed notes for three corrupted/poorquality recordings. After 40 interviews, responses seemed to be replicating
earlier participant responses. To verify this assumption, the first author interviewed five additional employers, and we discussed emerging results with
experts. These processes helped confirm our conclusion that the data were
saturated (Lindlof & Taylor, 2010).
Data Analysis
As part of a larger project, this study focused on how employers reported
using online information for personnel selection. A separate analysis examined employer and applicant data on information ethics and an emerging digital social contract (Berkelaar, 2014). For this study, we relied on systematic
inductive and abductive data analyses (Ezzy, 2002). Taking a constant comparative approach informed by sensitizing concepts (Charmaz, 2006), we
compared and contrasted each subsequent interview with what had (not)
emerged previously. We used Atlas.ti to memo throughout data collection
and analysis. We noted emerging themes, codes, and ideas suggested by each
interview. On our first reading, we recorded initial thoughts and reactions
paying particular attention to how participants reported identifying and evaluating applicants online information. We attended to the information types
acquired and interpretations and valuations employers constructed.
After initial coding, we reread and recoded data; ran reports of all coded
items, including surrounding text to retain context; and then grouped codes
into initial axial groupings, reevaluating occurrences of the themes in the data
set based on new groupings. We generated alternative groupings to question
our initial assumptions and to test and evaluate emerging codes: We sorted,
disassembled, and reassembled the codes multiple times, independently, collaboratively, and in conversation with experts (Charmaz, 2006). During this
process, we noted how participants evaluated different types of information
in terms of absences and presences. Once confident we had identified prominent themes, we reread the data, coding for additional occurrences and testing
themes by identifying negative cases. For example, initial uses of technological information seemed isolated to people working in technology industries
or roles. After rereading the data, it became evident that people used technological artifacts to evaluate job candidates across industries and occupations.
93
Findings
We focus on how employers report using the presence of visual, textual,
relational, and technological online information combined with the
absence of expected online information to construct and evaluate careers
and employability. These data show how employers evaluations and
expectations replicate and shift conventional personnel selection processes
(Table 2).
94
How used
Textual
To qualify or disqualify
candidates in terms of character,
professionalism, written
communication skills
To assess whether people had a
singular passion aligned with the
position
Relational
Technological
95
96
Not only does this example illustrate how employers flag information that
might contribute to evaluations, it also suggests expanding professional
expectations for workers across organizational levels. Employers may now
cybervet average candidates for entry-level sales and customer service
positions as well as more prominent upper-management positions that have
been conventionally held to higher information visibility standards.
Moreover, the specificity and preponderance of negative examples reportedly used to disqualify candidates demonstrates the continuing salience of
negative information during personnel selection (Jablin, 2001). This is
likely because these employers reported using images to avoid risk and
minimize costs.
When making sense of online artifacts, employers consistently recontextualized information through an employment lens. Thus, even if a job candidates behavior might be considered appropriate for a pictures original
context or intended audience, employers disqualified candidates whose
online information violated norms for employment audiences or contexts. I
wouldnt hire them, participants repeatedly asserted:
97
If they leave something on their Facebook account that they shouldnt have
there and they know who I am and . . . that Ill be able to see that stuff, theyve
made a decision that impacts their job rather than me making a decision that
impacts their job.
Thus, employers expected applicants to be aware of cybervetting and employers evaluative perspective, even as employers themselves abdicated responsibility. Instead, employers placed responsibility (and blame) on candidates:
Evaluations depend on applicant behavior (theyve made a decision)
because applicants should be aware of employment audiences (know who I
am). Employers did not consider how their communicative involvement or
cybervettings covert processes affected evaluations or whether visible online
records provided sufficient or accurate indicators of identity or employability.
Yet, these descriptions demonstrate how employers communicatively deand, then, recontextualized applicant information. Participants decontextualized online informationfailing to consider intended contexts and
audiences. Simultaneously, employers recontextualized through contemporary frames of professionalism (Cheney & Ashcraft, 2007). Moreover,
employers consistently articulated the socially acceptable party line that
protected information (e.g., age, race, pregnancy status) would not be considered. Participants emphatically asserted that even if they acquired irrelevant information, they could exclude it from evaluationsI can ignore
itdespite findings to the contrary (Miron-Shatz & Ben-Shakhar, 2008).
Thus, in contrast to offline sources, online information provides access to
different visual cues, often during early stages of review, thereby altering
what informs early impressions.
Textual information. Employers did not exclusively focus on salacious vices
or illegal behavior. Three quarters of the participants described using textual
information to construct and evaluate images of job candidates. Employers
reported using online textual information to evaluate written communication
skills, professionalism, character, motivation, and passion.
Given that employers continue to rank written communication as a top
skill (Graduate Management Admission Council, 2014), it is unsurprising
that employers used online information to assess writing skills. Participants
repeatedly noted how online sources access everyday writing in contrast to
formally edited cover letters and rsums considered subject to extreme
impression management. Participants reported examining various writing
contexts online to efficiently construct a picture of applicants career potential regardless of job: I look at their writing. I look at how they write online.
I look at their blogs. I look at their Facebook. I look any place where theyre
98
writing online. Such information provides access to the everyday interactions (e.g., email, text, memos) that dominate many employees work.
Employers also reported using textual information to construct and value
applicants professional image. How as well as what and how often applicants
wrote mattered when making sense of candidates professionalism. Emphasis
on spelling, grammar, and formal English presumably evidenced levels of
professionalism, attention to detail, and suitability for employment. In particular, a subset of four employers who did not text or use social network sites
themselves expressed greater concerns about writing than those who reported
using a broader range of media. As one manager emphatically maintained,
I really cannot stand typos, and I dont like it when people type injargon is
not the right wordbut just the shorthand that people use . . . the one who does
write out all the words and is kind of maybe a little more like me and kind of a
freakazoid about that kind of stuff . . . if theyre more well-spoken than the
others in writing, thats a plus.
99
how often a person wrote about a particular topic operated as a proxy for motivations. When assessing content created by or about applicants, employers
noted that online information provided access to individuals core passions or
drive: Online, you can learn tons about their true interests and hobbies,
[plus] often times I can tell if someone has too much time on their hands. Such
examples evidence employers assumptions that people have a singular passion, and should choose and do work in it (Berkelaar & Buzzanell, 2014).
Some reported specific examples where they did not hire or promote people
who had visible online information about incompatible non-work hobbies.
Moreover, employers consistently suggested that visible free time should be
spent doing something worthwhile from employers perspective (not that
Farmville game) otherwise candidates motivation would be questioned.
Unlike visual information, textual information sometimes helped qualify
rather than disqualify job candidates, particularly in white-collar work.
Employers ascribed greater professional commitment to candidates who had
online evidence of work-related behavior outside work times and spaces
compared with those who did not. Participant responses suggested that the
right online information could add value and help discriminate the good
applicants from the best. As one IT recruiter exemplified,
[I want to see their] life outside of the interview, see if they are trying to help
others in the support forums . . . [Its] the final endorsement . . . If theres
nothing there, why would I want to hire them over someone else . . . if youre
using that as just kind of a gauge of what a person is doing with their life, its a
good thing to do.
100
101
102
103
104
Thus, employers disqualified candidates who were absent online or who were
not present in expected spheres.
In general, these employers used the absence of expected information to
construct a sense of job candidates as less committed. They did not consider
alternative explanations for information absences. They situated their assumptions of visibility in contemporary notions that equate visibility and transparency with honesty. Indeed, the majority of these employers argued that job
candidates should be unconcerned by cybervetting if they have nothing to
hide, a phrase repeatedly used by these employers to justify cybervetting.
By framing themselves and/or cybervetting as honest and straightforward
and implicating those who hide or remove information as less honest or ethical, employers may reflect a nave understanding of the potential for misinterpretation. This also may arise from having a boring, more normal, and
less decorated life: I dont know how I would feel if I was someone who
had, you know, a colorful lifestyle . . . You know, someone with a story [e.g.,
biker chick, gay/lesbian]. Would I feel differently? Maybe I would. Like
this director, participants may feel as though they have nothing to hide
because they conform to dominant social norms.
Thus, although these employers advised digital scrubbing before job
searches, their responses also indicated that attempts at digital clean slates
may be detrimental. Not having an online presence creates information void
during evaluation processes, which may be as much of a liability as having
red flags. Not only is expertise defined through visibility (Treem & Leonardi,
2012), our data suggest job candidates might also need to communicate interests and passions for specific types of work to be considered valuable in the
marketplace.
Such need for a digitally visible career is complicated by information
noise. To be valuable, desirable information needs to be clearly linked to
particular applicants. For people with popular names, information about people with the same name can create de facto or functional invisibilityor
potentially problematic misinformation. Although it is beneficial to disassociate from red flags, candidates need to be visible when seeking employment
or promotions. Unless people work diligently and have access to IT expertise
and resources, it is difficult to make their names, and associated information
stand out from the professional athletes, beauty queens, show dogs, semipro
wrestlers, and others with whom candidates report sharing names (Berkelaar,
2010). Moreover, employers did not express concerns that information might
be inaccurate or might not refer to candidates under scrutinyrather, their
focus seemed to be on minimizing any possible perception of negative effect
to their organizations because of online information that seemed to be connected to particular individuals.
105
Discussion
This study contributes to communication and personnel selection research in
two ways. First, by examining what information employers report acquiring
online and how they indicate making sense of acquired and missing information, we help explicate cybervetting as a new tool for employment sensemaking (Table 2). Employers use of easily accessible secondary sources and
unobtrusive observations aligns with research on information seeking (Berger
& Douglas, 1981; Case, 2012; Treem & Leonardi, 2012) and personnel selection (Dipboye, 2014; Jablin, 2001). However, cybervetting differs in how it
leverages increasing information visibility to expand contexts, times, and
roles considered during selection and associated impression management.
Empirically examining cybervetting answers calls to consider everyday personnel selection (Dipboye, 2014) and to explicate when, if, and how online
and offline processes align (Treem & Leonardi, 2012; Williams, 2010).
Second, in light of increasing information visibility and other technology
affordances (Treem & Leonardi, 2012) undergirding cybervetting, we show
how cybervetting offers a useful context to examine contemporary assumptions and expectations about work and careers and the contested, changing
nature of contemporary professionalism and employment relationships.
Although new technology affordances have been explored within conventional organizational boundaries (e.g., when using organizationally sponsored or developed tools and/or within paid-work times, places, or roles;
Treem & Leonardi, 2012; Zuboff, 1989), this study examines how cybervetting expands personnel selection beyond conventional timespacerole
boundaries of paid work. In highlighting how information visibility and
expectations thereof appear to be reshaping personnel selection, our data
suggest that employers now expect, acquire, and make sense of moreand
oftentimes differentnon-work information during personnel selection.
Specifically, cybervetting further erodes boundaries between work and nonwork in ways similar to, yet beyond, fuzzy workhome boundaries (Golden,
2013). Thus, cybervetting offers a context in which to address calls for
research on redefinitions of what counts as work and non-work in the digital
era, including how familial, civic, personal, and professional identities are
constructed, promoted, and evaluated (Cheney & Ashcraft, 2007; Gregg,
2011).
Although our study provided access to employers sensemaking of applicants online information, our approach and sample size limit generalizability.
Despite gathering data from diverse industries, organizations, and roles, we
cannot make claims about potential occupational, cultural, or demographic
characteristics. Future research should consider different occupational or
106
Theoretical Implications
This study illuminates how cybervetting and the information visibility and
collapsed spatio-temporal contexts undergirding it are changing the assumptions and everyday work of personnel selection and impression management
and expanding these practices into non-work life. Such extensions increase
sociotechnical and communicative demands for employers who cybervet and
for current and potential employees who now need to digitally curate their
professional image. Employers expect qualified job candidates to consciously
and consistently construct an online professional presence across time, space,
and (role) contexts previously excluded from personnel selection. At the
same time, job candidates are increasingly distanced from these sensemaking
and sensegiving processes (Weick, 1995). Because employers extract information during cybervetting, workers lack many of the cues used to adjust
impression management and sensegiving (Hogan, 2010) in the more interactive if asynchronous exchanges of conventional personnel selection. Because
cybervetting often involves acquiring information intended for, created by,
and/or aggregated by other people and technologies, workers often only learn
about and can monitor online information after the fact (Hogan, 2010). This
distancing is motivation for, and an effect of, cybervetting.
Thus, this study shifts attention from more episodic information exchange
and meaning-making processes (Dipboye, 2014) toward persistent development and management of a relatively new phenomenon that we label digital
career capital, which builds on Inkson and Arthurs (2001) notion of career
capitalthe competencies, identities, motivations, and relationships providing career value. Drawing on our findings about how employers value applicants using information presences and absences, digital career capital extends
earlier perspectives by emphasizing the importance of making career capital,
and thus employability, digitally and persistently visible. Rather than focusing on visible employability during active job searches, workers are expected
107
to cultivate enduring shows of competence, professionalism, and connectedness across any sources employers might use. As part of this process, workers
are expected to fulfill growing expectations to view and enact work as ones
singular passion (Berkelaar & Buzzanell, 2014).
Such expectations require sophisticated impression management skills as
people work to develop and manage the stable, desirable, schema-compatible
image (Goffman, 1959) employers desire during early sensemaking (Weick,
1995). Cybervetting highlights how individuals sensegiving and impression
management need to take into account physical and temporal distance as well
as information reordering and recontextualization. Even as research in online
impression management provides clues into how people leverage different
technological affordances to manage online impressions, such research often
focuses on particular platforms (e.g., Twitter; Marwick & boyd, 2010) or
agreed-upon role contexts (e.g., supervisors and supervisees managing
impressions using organizational technologies; Erhardt & Gibbs, 2014).
Moreover, although research suggests that employees working at a distance
increase their use of impression management tactics (Barsness, Diekmann, &
Seidel, 2005), it is not clear whether and how impression management tactics
increase when individuals do not or cannot identify (and therefore do not
respond to) specific audiences and/or discrete (sets of) impression management situations. Researchers do not fully understand how impression management works when people need to manage the multiple roles, context
collapse, and other-sourced information implicated in cybervetting, although
Marwick and boyds (2010) Twitter study provides early insights. Future
research should explore the ironic likelihood that awareness of cybervetting
will extend career-oriented impression management into online contexts (see
Lair et al., 2005) originally considered desirable because of their perceived
lack of career-related impression management.
These data suggest that employers cybervetting demands workers lifelong attention to and mindfulness about how digital artifacts might be perceived and reassembled by employers. As employers engage in sensemaking
about information acquired or found missing through cybervetting, they
attempt to locate individuals across time, space, (role) and context (Maclean,
Harvey, & Chia, 2012) often appealing to agreed-upon assumptions of what
constitutes the professional or professionalism (Cheney & Ashcraft, 2007).
Before becoming job candidates and paid workers, individuals are now
expected to prioritize workplace standards and expectations in online communication. Such asymmetrical expansion of work interests is consistent
with empirical (Golden, 2013) and conceptual (Deetz, 1992) research on
worklife boundaries and arguments that organizational socialization may
happen earlier than often assumed (Berkelaar, 2013). By considering workers
108
Practical Applications
At least two possible applications emerge from this analysis. First, employers
need to consider how cybervettings communicative and information consequences shape effectiveness of personnel selection practices. Employers currently rely on intuitive, communication-as-transmission processes because of
time and resource constraints and the risks and pressures of failed selection
decisionsbecause when youre tired, cold, and hungry, any old map will
do (Anacona, 2012, p. 6). Researchers could help employers adapt evidencebased selection strategies to meet cybervettings temporal and habitual conveniences and employers needs for outcome accuracy, while also attending
to the practical ethics of cybervetting.
A second pragmatic implication involves quandaries between applicants
need to simultaneously manage present and absent information online and
positive and negative digital artifacts that could affect employability.
Although people have habitually monitored their professional image
(Goffman, 1959), digital impression management and information curation
involve relatively sophisticated communication strategies. Making relevant,
audience-valued information visible demands attending to the Internets collapsed contexts, myriad authors, temporal demands, artifact decontextualization and recontextualization, and invisible audiences (boyd, 2007). However,
cybervetting offers few, if any, and mostly ambiguous, longer term cues for
workers (e.g., repeatedly not getting the job), with little ability to self-correct
as retrievable deletions might prompt questions about the authentic person
(Hogan, 2010; Marwick & boyd, 2010). Moreover, non-work goals, relationships, and narratives (boyd, 2007) necessarily compete with professional
images workers want to create when seeking employment.
Conceptualizing cybervetting as a problem to be redressed through training that fixes people who do not fit the ideal worker image precludes challenging assumptions of what indicates competence; what skills, commitments,
and roles are (de)valued; what is useful and ethical from multiple standpoints;
and variations within and among social identity groups that might be problematically interpreted. To handle such quandaries, educators and researchers
should work with employers and workers to make visible potential strategic
109
Funding
The author(s) disclosed receipt of the following financial support for the research,
authorship, and/or publication of this article: This research was partially funded by a
Bilsland Strategic Initiatives grant sponsored by Purdue University.
References
Anacona, D. (2012). Sensemaking: Framing and acting in the unknown. In S. Snook,
N. Nohira, & R. Khurana (Eds.), The handbook for teaching leadership: Knowing,
doing, and being (pp. 3-20). Thousand Oaks, CA: Sage.
Back, M., Stopfer, J., Vazire, S., Gaddis, S., Schmukle, S., Egloff, B., & Gosling,
S. (2010). Facebook profiles reflect actual personality, not self-idealization.
Psychological Science, 21, 372-374. doi:10.1177/0956797609360756
Barsness, Z. I., Diekmann, K. A., & Seidel, M. L. (2005). Motivation and opportunity:
The role of remote work, demographic dissimilarity, and social network centrality in impression management. Academy of Management Journal, 48, 401-419.
doi:10.5465/AMJ.2005.17407906
Berger, C. R., & Douglas, W. (1981). Studies in interpersonal epistemology: III.
Anticipated interaction, self-monitoring, and observational context selection.
Communication Monographs, 48, 183-196. doi:10.1080/03637758109376058
Berkelaar, B. L. (2010). Cyber-vetting: Exploring the implications of online information for career capital and human capital decisions (Unpublished doctoral dissertation). Purdue University, West Lafayette, IN.
Berkelaar, B. L. (2013). Joining and leaving organizations in a global information
society. In E. Cohen (Ed.), Communication yearbook 37 (pp. 33-64). Thousand
Oaks, CA: Sage.
110
111
112
Maclean, M., Harvey, C., & Chia, R. (2012). Sensemaking, storytelling, and
the legitimization of elite business careers. Human Relations, 65, 17-40.
doi:10.1177/0018726711425616
Marwick, A. E., & boyd, d. (2010). I tweet honestly, I tweet passionately: Twitter
users, context collapse, and the imagined audience. New Media & Society, 13,
114-133. doi:10.1177/1461444810365313
Mayfield, E. C., & Carlson, R. E. (1966). Interview decisions: First results
from a long-term research project. Personnel Psychology, 19, 4155.
doi:10.1111/j.1744-750.1966.tb02434.x.
McGlone, M., & Pfeister, R. A. (2009). Does time fly when youre having fun or
do you? Affect, agency, and embodiment in temporal communication. Journal
of Language and Social Psychology, 28, 3-31. doi:10.1177/0261927X08325744
Metzger, M., Flanigan, A., & Medders, R. (2010). Social and heuristic approaches
to credibility evaluation online. Journal of Communication, 60, 413439.
doi:10.1111/j.1460-2466.2010.01488.x
Miron-Shatz, T., & Ben-Shakhar, G. (2008). Disregarding preliminary information when rating job applicants performance: Mission impossible? Journal of
Applied Social Psychology, 3, 1271-1294. doi:10.1111/j.1559-1816.2008
Peebles, K. A. (2012). Negligent hiring and the information age: How state legislatures can save employers from inevitable liability. William & Mary Law Review,
35, 1396-1433.
Ployhart, R. E., & Weekley, J. (2010). Strategy, selection, and sustained competitive
advantage. In J. Farr & N. Tippins (Eds.), The handbook of employee selection
(pp. 195-212). New York, NY: Routledge.
Ramirez, A., Jr., Walther, J. B., Burgoon, J. K., & Sunnafrank, M. (2002).
Information-seeking strategies, uncertainty, and computer-mediated communication: Toward a conceptual model. Human Communication Research, 28, 213228. doi:10.1111/j.1468-2958.2002.tb00804.x
Scott, C. (2013). Anonymous agencies, backstreet businesses, and covert collectives:
Rethinking organizations in the 21st century. Stanford, CA: Stanford University
Press.
Shilling, D. (2009). Complete guide to human resources and the law. New York,
NY: Aspen.
Solove, D. J. (2008). Understanding privacy. Cambridge, MA: Harvard University Press.
Treem, J., & Leonardi, P. (2012). Social media uses in organizations: Exploring the
affordances of visibility, editability, persistence, and association. In C. Salmon
(Ed.), Communication Yearbook, 37 (pp. 143-186). Thousand Oaks, CA: SAGE.
Walther, J. B., Van Der Heide, B., Kim, S., Westerman, D., & Tong, S. T. (2008).
The role of friends appearance and behavior on evaluations of individuals on
Facebook: Are we known by the company we keep. Human Communication
Research, 34, 28-49. doi:10.1111/j.1468-2958.2007.00312.x
Webster, E. C. (1964). Decision making in the employment interview. Montreal,
Quebec, Canada: Industrial Relations Centre, McGill University.
Weick, K. E. (1995). Sensemaking in organizations. Thousand Oaks, CA: SAGE.
113
Weiss, B., & Feldman, R. S. (2006). Looking good and lying to do it: Deception as
an impression management strategy in job interviews. Journal of Applied Social
Psychology, 36, 1070-1086. doi:10.1111/j.0021-9029.2006.00055.x
Williams, D. (2010). The mapping principle, and a research framework for virtual worlds. Communication Theory, 20, 451-470. doi:10.1111/j.14682885.2010.01371.x
Zuboff, S. (1989). In the age of the smart machine: The future of work and power.
New York, NY: Basic Books.
Author Biographies
Brenda L. Berkelaar, PhD, Purdue University, is an assistant professor of communication studies in the Moody College of Communication at the University of Texas at
Austin. Her research centers on work and career, with a particular emphasis on the
ways new technologies shape how we understand and practice work and career.
Patrice M. Buzzanell, PhD, Purdue University, is a professor of communication in
the Brian Lamb School of Communication (and professor of engineering education by
courtesy) at Purdue University. Her research centers on the everyday negotiations and
structures that produce and are produced by the intersections of organizational communication, career, and gender.