{"title":"求职者如何应对网络招聘?对威胁、恐惧和访问控制的探讨","authors":"Robin L. Wakefield, Lane T. Wakefield","doi":"10.1145/3645057.3645064","DOIUrl":null,"url":null,"abstract":"The cybervetting activities of potential employers present a significant threat to job-seeking social media users because their content becomes vulnerable to unwanted access and scrutiny. Without control over access, personal information may be gathered from social media and used in ways that harm the job seeker. Access control is a critical element of information privacy that has not received much attention but can help explain individuals' privacy behaviors. We use a protection motivation framework and a fear appeal to examine how job-seeking SNS users respond to cybervetting. We analyze the responses of 375 job-seeking SNS users to understand the relationships among threat perceptions, fear, coping responses, access control, and intention to implement and use an ephemeral application. We argue that when confronted by cybervetting, job-seeking SNS users are favorable toward using an ephemeral application because it bolsters privacy and meets the psychological need for control over access. Our results show that access control moderates the fear response to cybervetting, it is prompted by users' coping responses, and it helps explain why response efficacy and self-efficacy are predictive of behavioral intention.","PeriodicalId":517361,"journal":{"name":"ACM SIGMIS Database: the DATABASE for Advances in Information Systems","volume":"38 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2024-02-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"How Do Job Seekers Respond to Cybervetting? An Exploration of Threats, Fear, and Access Control\",\"authors\":\"Robin L. Wakefield, Lane T. Wakefield\",\"doi\":\"10.1145/3645057.3645064\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The cybervetting activities of potential employers present a significant threat to job-seeking social media users because their content becomes vulnerable to unwanted access and scrutiny. Without control over access, personal information may be gathered from social media and used in ways that harm the job seeker. Access control is a critical element of information privacy that has not received much attention but can help explain individuals' privacy behaviors. We use a protection motivation framework and a fear appeal to examine how job-seeking SNS users respond to cybervetting. We analyze the responses of 375 job-seeking SNS users to understand the relationships among threat perceptions, fear, coping responses, access control, and intention to implement and use an ephemeral application. We argue that when confronted by cybervetting, job-seeking SNS users are favorable toward using an ephemeral application because it bolsters privacy and meets the psychological need for control over access. Our results show that access control moderates the fear response to cybervetting, it is prompted by users' coping responses, and it helps explain why response efficacy and self-efficacy are predictive of behavioral intention.\",\"PeriodicalId\":517361,\"journal\":{\"name\":\"ACM SIGMIS Database: the DATABASE for Advances in Information Systems\",\"volume\":\"38 1\",\"pages\":\"\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2024-02-06\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"ACM SIGMIS Database: the DATABASE for Advances in Information Systems\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/3645057.3645064\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"ACM SIGMIS Database: the DATABASE for Advances in Information Systems","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3645057.3645064","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
How Do Job Seekers Respond to Cybervetting? An Exploration of Threats, Fear, and Access Control
The cybervetting activities of potential employers present a significant threat to job-seeking social media users because their content becomes vulnerable to unwanted access and scrutiny. Without control over access, personal information may be gathered from social media and used in ways that harm the job seeker. Access control is a critical element of information privacy that has not received much attention but can help explain individuals' privacy behaviors. We use a protection motivation framework and a fear appeal to examine how job-seeking SNS users respond to cybervetting. We analyze the responses of 375 job-seeking SNS users to understand the relationships among threat perceptions, fear, coping responses, access control, and intention to implement and use an ephemeral application. We argue that when confronted by cybervetting, job-seeking SNS users are favorable toward using an ephemeral application because it bolsters privacy and meets the psychological need for control over access. Our results show that access control moderates the fear response to cybervetting, it is prompted by users' coping responses, and it helps explain why response efficacy and self-efficacy are predictive of behavioral intention.