Literature Assessment

Department of Communication Studies

Literature Assessment

Below is a review of literary works on the violent uprising topic of employers applying social media sites to screen current or potential employees. Also included is a synopsis of the concern of privacy awareness together with the potential attack of privateness. This books is used for and shows the purpose of an improved understanding of a defieicency of privacy consciousness and the breach of personal privacy in companies, particularly the work environment. RQ1: Are individuals entirely aware of level of privacy issues connected with social networking sites when ever applying for employment? RQ2: Happen to be employers potentially invading privacy when using social media sites to display screen for job? Social Media (Facebook)

In today's society, social media allows us to connect with our relatives and buddies as well as building relationships through acquaintances who share prevalent interest. To do so users are encouraged to give the sites having a large extent of personal information which include contact information, images, where we live or perhaps where jooxie is from and occasionally our current location. In fact , 70 billion pieces of content material are shared per month (Riedy & Wen, 2010). A direct result sharing this all can lead to a rise in spam if not more serious, world wide web stalkers. Not to mention that criminals find access the social media web page passwords by studying information on your post such as hobbies, daily activities, etc . Some post may be used while evidence of believability and could at times possibly be incriminating (Genova, 2009). Last but not least, network sites that contain provocative photographs and responses may be considered unprofessional by employers. Those things we content that we may think of since harmless materials can sometimes be noticed for years to come and could possibly be looked at by id thieves or even your next supervisor. For numerous reasons, many people may not use an appropriate sum of extreme caution. These reasons include the perception of invisiblity provided by the net or even a bogus sense of security offered by less physical interaction (Reidy & Wen, 2010).

This really is such another issue as a result of increasing number of individuals who employ social networking sites just like Facebook during some element of our day-to-day lives. " In early 2012, 56% with the U. S i9000 population reported to have at any time used a social networking site” (Genova, 2009, p. 13). 98% of the users happen to be between the age ranges of 18-24, a prime amount of time in an individual's life to be on the job search. This is a lot more of the reason behind the majority of face book users to be incredibly particular and additional cautious in the material they are posting. This problem brings after the next question. Will be individuals completely aware of level of privacy issues associated with social networking sites the moment applying for a career? Privacy Understanding

The theoretical approach helps you to provide an knowledge of how people comply with the privacy concerns of online community. Are users even which posting several information can consequent in privacy matter? The initial approach looked at is the uses and satisfaction theory. This kind of theory just focuses on how individuals work with social media to fill the necessity of entertainment, human relationships and identification construction. It truly is then presumed that online communities such as face book do fulfill these gratifications, hence we tend to overlook the concern of privacy (Debatin, Lovejoy, Horne & Hughes, 2009). Next analyzed is the Third person have an effect on approach. A perceptual hypothesis is formed once there is some controversy of what we suppose about others and how we all perceive our selves. Were mostly enthusiastic about users' notion (Debatin, Lovejoy, Horne & Hughes, 2009). How does the usage of facebook affect their own personal privacy? Next, we look at the theory of ritualized media employ. This is an approach of focusing on how social media may easily become a program in one's life and...

References: Debatin, B., Lovejoy, J. P., Horn, A., & Barnes, B. N. (2009). Fb and On the net Privacy: Behaviour, Behaviors, and Unintended Implications. Journal Of Computer-Mediated Communication, 15(1), 83-108.

Genova, G. D. (2009). No Place to Play: Current Employee Personal privacy Rights in Social Networking Sites. Business Conversation Quarterly, 72(1), 97-101.

Greenwald, J. (2013). More Claims Forbid Password Demands. Organization Insurance, 47(1), 0003.

Kaupins, G., & Park, T. (2011). Legal and Honest Challenges of Corporate Social network. Journal of Communications Research, 2(2/3), 119-145

Kwoh, M. (2012, March 29). Beware: Potential Companies See The Foolish Things You Do Online. Wall Street Journal -- Eastern Release, B8.

Novelty, recency, K., Steinert, J., & Viswesvaran, C. (2012). Associated with Personality on Social Network Disclosure: Do Psychologically Intelligent Individuals Post Inappropriate Content? Mental Topics, 21(3), 473-486.

Poerio, J., & Bain, D. E. (2012). Social Media in the Workplace: Employer Defenses versus Employee Level of privacy. International Rules News, 41(4), 10-13.

Riedy, M. E., & Wen, J. L. (2010). Electric surveillance of Internet access in the American office: Implications to get Management. Data & Telecommunications Law, 19(1), 87-99.

Aspersion, A., Abril, P., & Levin, A. (2012). The Password or Your Paycheck?: A Job Applicant's Murky Right to Social networking Privacy. Log of Internet Regulation, 16(3), 1-26..

Smith, M., & Burg, J. (2012). What Are the Limits of Employee Privacy?. Gpsolo, 29(6), 8-11.