Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

ybervetting refers to the use of online information such as Facebook posts, Linkedln profiles, and Google searches to evaluate job candidates. In roughly f' out

image text in transcribedimage text in transcribedimage text in transcribedimage text in transcribed
image text in transcribedimage text in transcribedimage text in transcribedimage text in transcribed
ybervetting refers to the use of online information such as Facebook posts, Linkedln profiles, and Google searches to evaluate job candidates. In roughly f' out of 10 workplaces in the US, human resource (HR) professionals and other individuals involved in hiring use cybervetting to get to "know a person\" beyond information provided on a resume. But what are cybervetters really attempting to learn, what inferences do they make, and what does any of this have to do with how a candidate will perform on the job? 3roponents of cybervetting often frame the activity as a means to reduce hiring risks and maximize \"culture 1 it\" between new hires and the organization. However, recent research based on interviews with HR professionals shows that its main use is to evaluate job candidates' moral character. Cybervetters use ambiguous digital signals like photos to make broad inferences about individual character and lifestyle choices. Cybervetting seeks to evaluate job candidates\" conformity withor deviation fromsocial norms associated with idealized workers. :or example, when HR professionals express a preference for online profiles that depict \"an active lifestyle," \"going on hikes," or love of skiing, they set up an implicit moral standard: job candidates are expected to engage in and display the correct lifestyle. Usually, the associated activities are irrelevant to performance in the jobs for which candidates are applying. Nonetheless, deviations from ideal worker norms are penalized and can lead to discriminatory hiring outcomes, as when preferred \"active" lifestyles are associated with white, youthful, middle- and upper- class individuals who lack disabilities. The downside of cybervetting also shows up in the search for \"red flags,\" which are online indicators of deviant and potentially problematic behaviors. The most commonly cited red flag is a photo of a person drinking an alcoholic beverage. Deviant acts such as this call into question how job candidates might disrupt the moral order of the workplace. In addition, evaluators often use hypothetical scenarios to imagine how red flag activities might impede candidates' professional performance. Ironically, while cybervetting is pitched as a means to better \"know\" a job candidate, online self- presentation is one of its most common selection criteria. Whether or not a worker is required to interact with the public, job candidates are expected to carefully curate their online profiles. :or example, even at companies that host employee happy hours, HR staff may view social media images of drinking as highly problematic. This ultimately undercuts claims of using cybervetting to reveal authentic personal selves. Instead, it makes online profile management an entirely new criteria for employment. The criteria used to evaluate job candidates via cybervetting can have numerous negative consequences for work organizations. Cybervetting can lead to legal challenges due to concerns about inequitable hiring practices. Screening job candidates based on cybervetting can also lead to an increasingly homogenous workforce, which has been shown to negatively impact creativity and profit margins. Furthermore, cybervetting is perceived by most workers as an invasion of privacy, leading to doubts about the procedural justice of organizations that practice it and a tendency to avoid applying to them. How cybervetting is used in organizations depends on their mission, capacity, and resources. HR staff in non-profit and government organizations are the most skeptical of cybervetting because of concerns that it may reduce equitable hiring and promote privacy invasion. Organizations that emphasize efficiency and profit-making tend to be more open to cybervetting. HR professionals in third party recruitment and staffing agencies are the most enthusiastic practitioners of cybervetting, as these types of organizations are largely shielded from its negative consequences. Organizations can surmount these problems. First, organizational leaders must take responsibility for managing cybervetting and its consequences. This is not the responsibility of job seekers, who may be unaware of whether their online information is perused, how it is evaluated in the present or future, and how they are helped or disadvantaged as a result. Furthermore, advice provided to jobseekers will often be contradictory. For instance, some cybervetters seek authentic selves, while others look for cultivated and censored profiles; some see profile pictures as a must, while others avoid them out of concern for discrimination. Second, if organizational leaders and HR staff choose to engage in cybervetting, they should consider how the online information they use to evaluate job candidates relates to specific tasks involved in their jobs. Instead of using hypothetical scenarios to rationalize choices based on cybervetting after the fact, criteria of evaluation should be developed up front and then applied consistently. Finally, organizational leaders should question whether cybervetting is useful rather than assuming it is. What are the risks? What are the goals? How can the actual contributions and limitations of this practice be gauged, and how do they measure up? In short, they should approach cybervetting with skepticism and a critical eye. If organizational leaders are not willing to address these difficult questions head on, then cybervetting is best avoided. D. Review the following from your textbook, The Legal Environment of Business: Chapter 16, Employment Discrimination, and Read: "Cybervetting in Hiring: the hunt for moral performances." c. Pre-employment screening involves gathering all the information required to make a good hire. This includes identifying candidates that meet predetermined job qualifications and verifying the information they provide. The pre-employment screening process spans from application review to the final hiring decision. A rather new method of screening applicants is Cybervetting. Cybervetting is defined as using online information to assess applicants or potential job candidates. d. Using MS Word, write an APA formatted paper and discuss the following question based on this scenario: "Lisa is the hiring manager for a fast-paced internet fashion magazine. The magazine is geared toward 20-30-year- old men and women. Work hours are long and often require travel. You have applied for this job." a. Examine your social media accounts (Facebook, Instagram, Twitter, Linkedin); if you don't have one, look at a friend's account. What information could Lisa glean from your social media? b. What information gained by Lisa could be a possible violation of anti-discrimination laws? c. In your opinion, is Cybervetting ethical? Does viewing one's social media violate an applicant's privacy? d. The paper should be at least 500 words. Three credible sources must be used and properly cited

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Understanding the Law

Authors: Donald L. Carper, John A. McKinsey

6th edition

538473592, 978-0538473590

More Books

Students also viewed these Law questions

Question

In the context of property, contract law _ _ _ _ _ _ _ _ _ _ .

Answered: 1 week ago

Question

Population

Answered: 1 week ago

Question

The feeling of boredom.

Answered: 1 week ago