Premium
Online privacy in job recruitment processes? Boundary work among cybervetting recruiters
Author(s) -
Backman Christel,
Hedenus Anna
Publication year - 2019
Publication title -
new technology, work and employment
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 1.889
H-Index - 45
eISSN - 1468-005X
pISSN - 0268-1072
DOI - 10.1111/ntwe.12140
Subject(s) - repertoire , framing (construction) , internet privacy , construct (python library) , public relations , private information retrieval , boundary (topology) , relation (database) , social psychology , computer science , sociology , political science , psychology , computer security , engineering , physics , structural engineering , database , acoustics , programming language , mathematical analysis , mathematics
This article addresses various ways that cybervetting recruiters (re)construct boundaries around the public–private division. Based on interviews with 37 recruiters in Sweden, we show how the practice of cybervetting is legitimised by the recruiters’ descriptions and accounts in relation to various notions of privacy and norms of information flow. We present this as a boundary work aided by especially two ways of framing information: the repertoire about accessible information and the repertoire of relevant information. These repertoires help define what information can be conceived of as public or private, and as legitimate versus unethical to search for and to use. Privacy is framed by employers as a responsibility, rather than a right, for social network site users. The findings also underline similarities and differences in jobseekers’ and employers’ norms of information flow, not least considering the right to online privacy.