Free Essay

Ethics of Privacy of Social Network Sites on Career Applications

In:

Submitted By margbuffett2003
Words 1176
Pages 5
An increasing trend in the corporate world today is to use internet search engines and social networking sites (SNS) in order to screen job applicants. Employers want to know as much information as possible about their employees before investing the time and money required to incorporate them into their companies. One common site used in these searches is Facebook.com. Facebook is a social networking site originally limited to the use by college community, but in more recent years, it has been open to the general public (Clark & Roberts, 2010). Founded in 2004, the site now has over 1 billion users (Vance, 2012). As one of the most trafficked site in the United States, Facebook is one of the primary networking sites used for pre-employment screening. The site allows the uploading of personal pictures and videos that can be shared with a select group of people or with the public as a whole. Registered users also have the ability to join groups, which range in topic from support of a particular sports team, political issue, or hobbies the person may be interested in (Clark & Roberts, 2010). An employer searching a profile may gain access to all of this information and can use it to decide which candidates to interview and/or hire. While Facebook has many different control settings allowing users to limit and/or block the viewing of their individual profiles, there are numerous ways around these leaving users vulnerable to searches performed by curious employers (Clark & Roberts, 2010). In order to better understand the ethics of employee Facebook checks, one can thoroughly examine the considerations discussed in Clark & Roberts’, “Employer’s Use of Social Networking Sites: A socially Irresponsible Practice.”
The aim of Clark & Robert’s peer reviewed journal was to explore and discuss how the inexpensive, informal online character checks on social networking sites such as Facebook, can be unethical and harmful to society (Clark & Roberts, 2010). This article thoroughly addresses issues such as privacy, corporate social responsibility, as well as all of the ways that these checks can be unethical and harmful to society (Clark & Robertson, 2010). The major audience targeted for this work seems to be employers whom actually conduct these social networking background checks. A secondary audience could also be identified as potential job applicants who may or may not be aware of these potential checks and the harm they may bring to their hiring/interviewing process. Third, this article may be appropriate for the general public who engage in social networking sites so that they may gain awareness regarding the general privacy concerns and, become more insightful into the continuous employee checks of already established employers.
In my opinion, I do believe that this article has some incredibly valid points. I agree with the authors in whole on their negative opinions of employee background checks encompassing SNS. Through these background searches, unverified information can sway a future employer’s decision without any input from the employee in question. The ethical dilemma that arises as a result of these searches is one of fairness (Clark & Roberts, 2010). First of all, the authors point out that it is an invasion of privacy in some aspects. While the actual definition of “privacy” is often skewed because there is no universal acceptance of the definition, the Merriam-Webster Online Dictionary defines it as ‘freedom from unauthorized intrusion” (Clark & Roberts, 2010). In my opinion, if the Facebook profile is set as “private” and open to only those that the user has approved, the SNS background checks that companies perform is in direct violation of this definition. Secondly, employers are using these “unauthorized online checks” to make decisions as to interview/hire a potential applicant. Postings, pictures, and wall information can sway the decision of a potential employer, yet it may have nothing to do with the job or the job requirements. Biased opinions may form and employers may choose not to hire someone based on the groups they belong too, someone they are friends with on Facebook, or even perhaps, their political views stated on their pages. It is possible that this information used to determine the suitability of a prospective employee had little or no bearing on their ability to perform the required work. In conclusion, the personal lives of employees should be separate from their work lives.
The article also addresses issues where employers intermittently check SNS of their already existing employees. Again, I tend to side with the authors when they point out that this is also a possibly unethical practice in many situations. Some employees have been fired because of postings on their Facebook pages. For example, a US flight attendant lost her job simply for posting pictures of herself online in her uniform (Clark & Roberts, 2010). A producer for CNN was also fired for blogging offwork, even though he did not identify himself as a CNN employee (Clark & Roberts, 2010). In my opinion, this was unethical because, not only was it an invasion of the employee’s rights outside of the workplace, but it had no negative impact on the companies or in a way that affected their job performance.
On the other hand, Clark & Robertson do point out a specific time when SNS checks may be considered ethical. For example, it may be an ethical practice to perform SNS checks if the company can establish a link between what is contained on applicant’s SNSs and on-the-job behavior. If this link does exist then the employer may have a legitimate business interest in the online profiles. Charlesworth (2003) provides guidance to employers who are considering a possible invasion of an employee’s privacy. Specific examples include the following: have a legitimate purpose; ensure that the intrusion is offset by a greater utility to the employer; and to ensure that the measure is fair and lawful (Charlesworth, 2003).
In conclusion, I agree with Clarke and Roberts on all of these points discussed in this paper. I believe that it is considered unethical for a company to conduct searches on potential applicants’ or even existing employee’s social networking pages, especially if they are set to be “private.” There should be a line drawn between ones’ personal life and one’s business life. There is no reason for the company to intervene or inquire into an employee’s personal life unless the business is being impacted in some form. I believe that it is unprofessional to hire or not hire someone based on biased opinions that may be formed from taking a look into the personal lives of their potential or existing employees.
References:
Charlesworth, A.J. (2005). Opinion, privacy, personal information and employment. Surveillance & Society, 1(2), 217-222.
Clark, L., & Roberts, S. (2010). Employer’s use of social networking sites: a socially irresponsible practice. Journal of Business ethics, 95, 507-525.
Vance, Ashlie. (2012). Facebook: The making of one billion users. Bloomberg Business week. Retrieved from http://www.businessweek.com/articles/2012-10-04/facebook-the-making-of-1-billion-users

Similar Documents

Premium Essay

Mis 513 Chapter1

...advent of the information age. Define globalization, describe how it evolved over time, and describe the key drivers of globalization. Explain what an information system is, contrasting its data, technology, people, and organizational components. Describe the dual nature of information systems in the success and failure of modern organizations. Describe how computer ethics impact the use of information systems and discuss the ethical concerns associated with information privacy and intellectual property. CHAPTER OVERVIEW This chapter helps the student understand the role of information systems as organizations move into the digital world, and how they have helped fuel globalization. The student will learn what information systems are, how they have evolved to become a vital part of modern organizations, and why this understanding is necessary to become an effective manager in the digital world. The student will also learn how globalization evolved, and what opportunities globalization presents for organizations. The importance of ethics as it relates to IS is discussed especially as it relates to information privacy, accuracy, property, and accessibility. A number of cases and illustrations are used, for example, Apple products and how they have evolved over time (such as the iPhone, Mac Air, iPod, and iPad). CHAPTER OUTLINE PREVIEW Managing in the Digital World: Apple INFORMATION SYSTEMS TODAY The Rise of the Information Age BRIEF CASE Technology at Starbucks Five IT Megatrends...

Words: 3147 - Pages: 13

Premium Essay

The Information Age in Which You Live: Changing the Face of Business

...CHAPTER 1 THE INFORMATION AGE IN WHICH YOU LIVE: CHANGING THE FACE OF BUSINESS JUMP TO THE SUPPORT YOU WANT • Lecture Outline • Modules, Projects, and Data Files • Slide Reviews • Closing Cases • Short-Answer Questions • Assignments and Exercises • Discussion Questions • Industry & Global Perspectives • Additional Assignments and Exercises CONTACT INFORMATION: Stephen Haag (shaag@du.edu) STUDENT LEARNING OUTCOMES 1. Define management information systems (MIS) and describe the three important organizational resources within it – people, information, and information technology. 2. Describe how to use break-even analysis to assess the financial impact of information technology. 3. Describe how to use Porter’s Five Forces Model to evaluate the relative attractiveness of and competitive pressures in an industry. 4. Compare and contrast Porter’s three generic strategies and the run-grow-transform framework as approaches to the development of business strategy. CHAPTER SUMMARY This chapter serves two primary purposes. First the chapter introduces your students to the broad notion of management information systems within an organization and the three key resources on which MIS focuses – people, information, and information technology. Second, the chapter jumps right into the process of appropriately selecting which technologies to use based on the industry in which your organization operates, the identified...

Words: 3890 - Pages: 16

Free Essay

Ethics in the Modern Workplace

...deviance stemmed from generally overt practices that could be weighted for their significance and addressed accordingly. Although this valuation may often be subjective, it could still be made tangible to a manager in ways that suited their (and their organization’s) ethical norm. In today’s workplace, it is not easy to run a successful and profitable company and maintain ethical behavior at all times. There are too many variables involved in running a business that it can sometimes be tough to determine between right and wrong. We will discuss some of the most common and potentially troubling changes in technology that have resulted in electronic surveillance, email monitoring, restricting access to programs and or websites, and social media trafficking. Due to technological advances, workplace deviance is becoming more and more of a concern for today’s employers. In years past, employers did encounter workplace deviance, but it was of a lesser degree. Chuck Williams, author of our management book, describes workplace deviance as, “unethical behavior that violates organizational norms about right and wrong.” Workplace deviance can have both tangible and intangible effects on a company’s assets. With the dawn of the Information Age has come a new and often perplexing set of challenges for the evaluation of workplace deviance. These new challenges span the full spectrum of severity in workplace deviance, from the deliberately belligerent (harassment...

Words: 2353 - Pages: 10

Premium Essay

Management and Information Systems

...Chapter 4 Ethical and Social Issues in Information Systems LEARNING OBJECTIVES After reading this chapter, you will be able to: 1. Analyze the relationships among ethical, social, and political issues that are raised by information systems. 2. Identify the main moral dimensions of an information society and specific principles for conduct that can be used to guide ethical decisions. 3. Evaluate the impact of contemporary information systems and the Internet on the protection of individual privacy and intellectual property. 4. Assess how information systems have affected everyday life. CHAPTER OUTLINE 4.1 UNDERSTANDING ETHICAL AND SOCIAL ISSUES RELATED TO SYSTEMS A Model for Thinking About Ethical, Social, and Political Issues Five Moral Dimensions of the Information Age Key Technology Trends that Raise Ethical Issues ETHICS IN AN INFORMATION SOCIETY Basic Concepts: Responsibility, Accountability, and Liability Ethical Analysis Candidate Ethical Principles Professional Codes of Conduct Some Real-World Ethical Dilemmas THE MORAL DIMENSIONS OF INFORMATION SYSTEMS Information Rights: Privacy and Freedom in the Internet Age Property Rights: Intellectual Property Accountability, Liability, and Control System Quality: Data Quality and System Errors Quality of Life: Equity, Access, and Boundaries HANDS-ON MIS Developing a Web Site Privacy Policy: Dirt Bikes USA Achieving Operational Excellence: Creating a Simple Web Site Using Web Page Development Tools Improving Decision Making: Using...

Words: 20079 - Pages: 81

Premium Essay

Employee Monitoring

...employers have a lot more ways of monitoring their employees as well as a bigger responsibility to make sure employees are not leaking information electronically or just slacking off while they are at work. Employers now will begin monitoring an employee from the time they are screened for the job; social networking sites have made it a lot easier for an employer to look at the lives of the prospective employee to see if they feel that the person is a good fit for their company. Also many employers now will go and put monitoring software on their networks and computers so that they are able to see any information transmitted through their networks, such as e-mails, browsing history and chat sessions. Also an employer will take the time to monitor phone calls made from company phones as well as placing their employees on video surveillance. In order to sustain abiding by the law and working ethically, employers have to take many precautions when monitoring employees so that they do so legally. One method that most people are aware of are the terms and conditions that you usually either sign off on in an employee handbook to send into corporate or are part of the application process in some cases. These terms and conditions essentially say that you are aware that your employer may monitor you without warning and are okay with this because you are given written consent at the time of applying or your orientation. Another method few employers incorporate that many more should...

Words: 899 - Pages: 4

Free Essay

Essay

...IFSM 304 – Ethics in the Information Age Learning Portfolio Assignment Descriptions Here are the detailed Assignment Requirements and Summary (Reflection Paper) that comprise activities for a Learning Portfolio for IFSM 304. These activities, along with class discussion and any other assignments your professor may require will enable you to achieve the course objectives and demonstrate knowledge of key concepts and apply this understanding to real-world digital ethics topics and situations. Understand that your work will comprise a Learning Portfolio for the course and these assignments are linked! You will be faced with work that advances with a progression from a general basic framework for decision making to more specific analysis and critical thinking about more complex ethical issues. Current Events 5% Conference Posting of articles on IT-related Ethical Global issues (multi-national corporation) The purpose of this assignment is to analyze a current event article on global ethical issues from a multi-national corporation perspective. This assignment is designed to increase your knowledge from a corporate viewpoint and enable you to analyze ethical issues from a current GLOBAL situation or event. This will also enhance your research and writing skills and your critical-thinking abilities. Select a current topic (2010 source or later) and find an appropriate article on the topic. Provide the persistent URL (one that anyone can click on to read the...

Words: 3771 - Pages: 16

Premium Essay

Marketing Plan

...Marketing Plan Assignment Marketing Management Table of Contents Marketing Situation 4 SWOT Analysis 5 Objectives and Issues 6 Marketing Strategy 7 Value Proposition 7 Segmentation 7 Targeting 7 Positioning 8 Actions 9 Website 9 Outbound Media Messaging 9 Social Media Promotion 9 Specific Initiatives 9 Budgets, Assumptions, & Risks 10 Controls 11 Appendices 12 References 14 Introduction The Marketing Plan to launch the new Gerrarrom service to new users, is summarised below for January to June 2014. UK based early adopter academics at three specific universities, fit the high knowledge, heavy digital usage profile most likely to value a cutting edge internet experience given their collaborative digital enterprise, and likelihood to rapidly grow usage. Viral marketing is used to secure digital word-of-mouth recommendations from the targeted influencers by competing for attention, referals, and useage activity. The service is positioned for digitally productive academics needing a superior layer of compartmentalised internet, a less intrusive interface and an evolved content feed that provides the one stop shop for all public and private Social Media (SM) productivity. The plan covers the logical flow of considerations, goals and actions defined by Armstrong and Kotler (2012), for creation, definition and communication of value to the target segment. Marketing Situation Gerraroom will drive adoption via unforeseen modes...

Words: 3010 - Pages: 13

Premium Essay

Ethics

...ETHICS IN INFORMATION TECHNOLOGY Third Edition This page intentionally left blank ETHICS IN INFORMATION TECHNOLOGY Third Edition George W. Reynolds Australia • Brazil • Japan • Korea • Mexico • Singapore • Spain • United Kingdom • United States Ethics in Information Technology, Third Edition by George W. Reynolds VP/Editorial Director: Jack Calhoun Publisher: Joe Sabatino Senior Acquisitions Editor: Charles McCormick Jr. Senior Product Manager: Kate Hennessy Mason Development Editor: Mary Pat Shaffer Editorial Assistant: Nora Heink Marketing Manager: Bryant Chrzan Marketing Coordinator: Suellen Ruttkay Content Product Manager: Jennifer Feltri Senior Art Director: Stacy Jenkins Shirley Cover Designer: Itzhack Shelomi Cover Image: iStock Images Technology Project Manager: Chris Valentine Manufacturing Coordinator: Julio Esperas Copyeditor: Green Pen Quality Assurance Proofreader: Suzanne Huizenga Indexer: Alexandra Nickerson Composition: Pre-Press PMG © 2010 Course Technology, Cengage Learning ALL RIGHTS RESERVED. No part of this work covered by the copyright herein may be reproduced, transmitted, stored or used in any form or by any means graphic, electronic, or mechanical, including but not limited to photocopying, recording, scanning, digitizing, taping, Web distribution, information networks, or information storage and retrieval systems, except as permitted under Section 107 or 108 of the 1976 United States Copyright Act, without the prior written permission...

Words: 204343 - Pages: 818

Premium Essay

Impact of Social Media on the Workplace

...Research Report Impact of Social Media on the Workplace By Abdul Asif 300817244 Rajdeep Kaur 300816572 Divyeshkumar Patel 300823773 Surya Chandu Sanaka 300831648 Sai Sravani Velaga 300829096 Submitted to: Prof. Phillip Alalibo GNED 219-071 Winter 2015 1. Introduction of Topic and Clarification of Research Statement “Our research topic is - The Impact of Social Media on the workplace and our research statement states that Social Media have a significant and positive impact on the workplace.” Social media is turning into an inevitable part of our society. It serves as medium to globally link people together, regardless of their physical location. Generally, people are using social media for various reasons, such as to share information, to get in touch with their loved ones, and to look for business colleagues...

Words: 2892 - Pages: 12

Premium Essay

Ethical Hacking

...Ethical Hacking 1 Running head: ETHICAL HACKING: Teaching Students to Hack Ethical Hacking: Teaching Students to Hack Regina D. Hartley East Carolina University Ethical Hacking 2 Abstract One of the fastest growing areas in network security, and certainly an area that generates much discussion, is that of ethical hacking. The purpose of this study is to examine the literature regarding how private sectors and educational institutions are addressing the growing demand for ethical hacking instruction. The study will also examine the opportunity for community colleges in providing this type of instruction. The discussion will conclude with a proposed model of ethical hacking instruction that will be used to teach a course in the summer semester of 2006 through the continuing education department at Caldwell Community College and Technical Institute within the North Carolina Community College System. Ethical Hacking 3 Ethical Hacking: Teaching Students to Hack The growing dependence and importance regarding information technology present within our society is increasingly demanding that professionals find more effective solutions relating to security concerns. Individuals with unethical behaviors are finding a variety of ways of conducting activities that cause businesses and consumers much grief and vast amounts annually in damages. As information security continues to be foremost on the minds of information technology professionals, improvements in this area are critically...

Words: 6103 - Pages: 25

Premium Essay

Bibliography

...Bibliography for Social Network Sites related thesis Aaltonen, S,, Kakderi, C,, Hausmann, V, and Heinze, A. (2013). Social media in Europe: Lessons from an online survey. In proceedings of the 18th UKAIS Annual Conference: Social Information Systems. (pp. Availalable online). USIR. , and 2013, , in: , 19-20 March 2013, Worcester College, Oxford, UK. (conference paper) Acquisti, Alessandro, and Gross, Ralph. (2006). Imagined Communities: Awareness, Information Sharing, and Privacy on the Facebook.In Golle, P. and Danezis, G. (Eds.), Proceedings of 6th Workshop on Privacy Enhancing Technologies. (pp. 36--58).Cambridge, U.K. Robinson College. June 28-30. (conference paper) Acquisti, Alessandro, and Gross, Ralph. (2009). Predicting Social Security numbers from public data. Proceedings of the National Academy of Sciences, 106 (27), 10975-10980. (journal article) Adamic, Lada, Buyukkokten,Orkut, and Eytan Adar. (2003). A social network caught in the Web. First Monday, 8 (6). (journal article) Adrien Guille, Hakim Hacid, Cécile Favre, and Djamel A. Zighed. (2013). Information diffusion in online social networks: a survey. SIGMOD Record, 42 (2). (journal article) Agarwal, S., and Mital, M.. (2009). Focus on Business Practices: An Exploratory Study of Indian University Students' Use of Social Networking Web Sites: Implications for the Workplace. Business Communication Quarterly. (journal article) Ahmed OH, Sullivan SJ, Schneiders AG, and McCrory P. (2010). iSupport:...

Words: 18938 - Pages: 76

Premium Essay

Nokia

...31% in the fourth quarter 2010, up from an estimated 30% in third quarter of 2010 but down from an estimated 35% in the fourth quarter of 2009. Nokia's estimated share of the converged mobile device market was 31% in the fourth quarter, compared with 38% in the third quarter 2010. Nokia produces mobile devices for every major market segment and protocol, including GSM, CDMA, and WCDMA (UMTS). Nokia offers Internet services such as applications, games, music, maps, media and messaging through its Ovi platform. Nokia's subsidiary Nokia Siemens Networks produces telecommunications network equipment, solutions and services. Nokia is also engaged in providing free digital map information and navigation services through its wholly owned subsidiary Navteq. Nokia also has greater dependency on England based company duo namely Symbian Corporation for its mobile operating systems and OVI for its mobile-based application software development and distribution, which has made Nokia as highest-selling mobile-phone vendor within the past few years. Nokia has sites for research and development, manufacture and sales in many countries throughout the world. As of December 2010, Nokia had R&D presence in 16 countries and employed 35,870 people in research and development, representing...

Words: 2818 - Pages: 12

Premium Essay

Ethics

...Preferred Letter Code of Business Brochure Title Alternate Letter Ethics: Brochure Title Our Core Values in Action Alternate Letter Brochure Title Alternate Letter Brochure Title Our Code of Business Ethics reinforces our core values and drives our culture of compliance, ethical decision making and accountability. Our core values shape the culture and define the character of our company. They guide how we behave and make decisions. Accenture will not tolerate retaliation against any employee who raises an issue or uses its Business Ethics Line (or any other appropriate channel) to report an ethical or legal concern. Employees who come forward with concerns play an important role in maintaining our ethical workplace and high-performance business. Contents Page 3 Page 6 Page 8 Page 11 Page 14 Page 17 Page 20 Page 25 Page 28 Page 29 Page 30 Page 31 How to Use the Code of Business Ethics: Our Core Values in Action Our Code at a Glance Client Value Creation One Global Network Respect for the Individual Best People Integrity Stewardship The Five Cs A Model for Making Ethical Decisions Responsibilities Index of Key Terms Visit the Accenture Business Ethics Line Visit the Code of Business Ethics website 2 | Accenture Code of Business Ethics How to Use the Code of Business Ethics: Our Core Values in Action Our Code is built on a foundation of our core values, illuminated by "action statements." Action statements describe the behaviors we seek and “key ideas” provide...

Words: 15252 - Pages: 62

Premium Essay

This Is Something I Am Loading G to Get a User Name, so Cinfising

...2014 ACA Code of Ethics As approved by the ACA Governing Council AMERICAN COUNSELING ASSOCIATION counseling.org Mission The mission of the American Counseling Association is to enhance the quality of life in society by promoting the development of professional counselors, advancing the counseling profession, and using the profession and practice of counseling to promote respect for human dignity and diversity. © 2014 by the American Counseling Association. All rights reserved. Note: This document may be reproduced in its entirety without permission for non-commercial purposes only. Contents ACA Code of Ethics Preamble • 3 ACA Code of Ethics Purpose • 3 Section A The Counseling Relationship • 4 Section B Section Confidentiality and Privacy • 6 C Professional Responsibility • 8 Section D Relationships With Other Professionals • 10 Section E Evaluation, Assessment, and Interpretation • 11 Section F Supervision, Training, and Teaching • 12 Section G Research and Publication • 15 Section H Distance Counseling, Technology, and Social Media • 17 Section I Resolving Ethical Issues • 18 Glossary of Terms • 20 Index • 21 •  2  • ACA Code of Ethics Preamble The American Counseling Association (ACA) is an educational, scientific, and professional organization whose members work in a variety of settings and serve in multiple capacities. Counseling is a professional relationship that empowers...

Words: 17874 - Pages: 72

Free Essay

Intro to Computers

...Introduction to Computers and the Internet 2 Lesson 1 What Is a Computer? n Personal Computer Hardware n Peripherals n Bits and Bytes n Computer Speed and MHz and GHz n Computer Types Lesson 2 Software n Obtaining Application Software Lesson 3 The Internet n Finding Information on the Web n Evaluating Information on the Web Lesson 4 Understanding E-mail n Sending and Receiving E-mail and Other Forms of Digital Communication n Dangerous E-mail Lesson 5 Types of Computer Crimes n Copyright Laws n Acceptable Use Policies Lesson 6 Computer Workers 3 Introduction to Computers and the Internet 4 WORDS TO KNOW BIOS The basic input-output system is the component that checks your computer’s components and causes the operating system to start. CMOS Complementary Metal Oxide Semiconductor is a chip whose configuration is controlled by a setup program. CPU The Central Processing Unit is a chip, located on the motherboard, which performs mathematical calculations and logic functions. Hardware Refers to all the pieces of physical equipment that make up a computer system. Input Data entered into a computer. Lesson 1 What Is a Computer? n n n n n Computers are a vital part of today’s world. They make controlling and using devices faster, easier, and more accurate. They are in everything from automobiles to washing machines...

Words: 9593 - Pages: 39