Social Networks and Employment Law: Are you Putting your Organization at Risk?
Social Networks and Employment Law
Are you Putting y
g your Organization at Risk?
Lisa D. G
Li D Grant H
Harpe, Ph D
Industrial Psychologist and Senior Consultant
Social Networking and Its Effects on
Companies and Their Employees
Douglas Baker, Nicole Buoni, Michael Fee, and Caroline Vitale
The purpose of this research is to review the rising use of social
networks by people while on the job. The popul
Running head: SOCIAL RECRUITING
Social Recruiting: The Role of Social Networking Websites
in the Hiring Practices of Major Advertising and Public Relations Firms
A Senior Thesis submitted in partial fulfillment
of the requirements for graduation
Pre-Employment Screening: How Businesses are Utilizing Social Networking Sites to Screen
Mary Kay R. Krupa
A Masters Research Project
Presented in Partial Fulfillment
Of the Requirements for the Degree
Master of Business Administration
Social recruiting has grown up and has seen universal adoption across industries.
Anyone not leveraging social referrals
is behind the curve.
94% of recruiters use or plan
to use social media in their
Employ Respons Rights J (2012) 24:121
To Screen or Not to Screen? Using the Internet
for Selection Decisions
H. Kristl Davison & Catherine C. Maraist &
R. H. Hamilton & Mark N. Bing
Published online: 14 July 2011
# Springer S
Chapter 5: Digital Intellectual Property
1. What is software? What is hardware?
Software is the one that we are using and the one that is produced by many developers
today while the hardware is the one that is used through the software it
Chapter 7: Professional Ethics in Computing
1. What are the professional ethics issues central to therac-25 case?
Professional ethics issues are the one that is most talked about because it is the high
standard and the one that should be
Chapter 1: Introduction to Sociotechnical Computer Ethics
1. What is encompassed in the question why computer ethics? in other words, what more
specific questions are included in the broad question?
Computer ethics is very important becau
Chapter 4: Information Flow, Privacy, and Surveillance
1. What are the significant differences between personal information flow with IT and
personal information flow without IT?
Personal information flow is a personal information within t
Chapter 6: Digital Order
1. What is the difference between security and reliability? How are they related?
Security is the one that a person need and a software and reliability is the assurance in
something to make sure that thing will ha
Chapter 3: Ethics in IT-Configured Societies
1. This chapter considers how technology should be conceptualized. What are the
advantages of thinking about technology as the instrumentation of human action?
The advantage of technology as th
Student at PSU
Student at PSU